Content Type
Date Range
Step three in a three-part series, this checklist breaks down factors for product owners to identify sensitive data, evaluate roles and map roles to data access.
Tom is the Senior Director of Professional Services at Snyk, where he leads a team delivering solutions to secure software development. Previously, he served as Vice President of Consulting at Bishop Fox, a globally recognized offensive security firm, and as Senior Manager of Penetration Testing at Veracode. Over his career, Tom has held diverse roles as a penetration tester, security consultant, and leader of vulnerability management and security awareness programs. Tom has over 24 years of experience in information technology, including 19 years specializing in cybersecurity and offensive security.
Rachel Bierner is the Co-founder and CEO of Qubric Security, a cybersecurity consulting firm that enables secure organizational growth and resilience for its clients. She has held leadership roles in cloud security, cybersecurity strategic planning, technology delivery, and operations at two of the top three U.S. financial institutions. She also served as a management consultant at a "big 4" global consulting firm, where she led software configuration and development teams for clients that ranged from technology start-ups to multinational enterprises.