Joel York
Chief Marketing Officer, Accellion
Joel York joined Accellion in 2018 with 20 years of experience in cloud marketing, sales and product management. A seasoned executive and entrepreneur, Joel’s successes span growing startups to enterprise market leaders, such as Navis and SPSS. As CMO of Meltwater, he led worldwide product management, digital marketing, field marketing, and public relations. He spearheaded growth at Xignite as VP Sales and Marketing to lead the company from A to B round. Prior to Accellion, he founded Markodojo, an innovative marketing management SaaS. Joel is also a thought leader in the cloud community, advisor, board member, speaker and author of the popular cloud blog Chaotic Flow.
Joel holds a BS in Physics from Caltech, an MS from Cornell, and an MBA from the University of Chicago.
All Posts by Joel York
This Is How All CISOs Should Build a Business Case
Whether you’re deciding what to wear or where to eat, having options is ideal. The same is true when it comes to presenting your business case to your CIO or Board of Directors: you’re better off if you can give them options. Present them with three options: 1) a bare-minimum, 2) centrist, and 3) best-case, no holds barred approach to your cybersecurity program or a strategic initiative. This lets them know you’ve done your homework and it puts the onus on the decision maker, not you.
CISO Street recently interviewed Bryan Kissinger, CISO for Trace3 and author of “The Business Minded CISO.” In this video, Bryan discusses the best approach for building a business case for a security program.
THIS Is Why There Was an Increase in Malware Clickbait
When employees started working from home so, too, did the hackers. The rampant digital transformation opened up vulnerabilities for organizations that prioritized moving to digital quickly over moving to digital securely. Many organizations saw phishing emails containing malicious Zoom links or malware disguised as COVID-19 related webpages. Hackers easily took advantage and attacked these vulnerable devices now residing outside of the organization.
These Cloud Challenges Could Knock You Back Down to Earth
The cloud made the transition to working from home during the pandemic a lot easier. Applications like Office 365 allowed employees to transition from the corporate office to the home office with little disruption. The successful shift to telework proved that if an employee has a good internet connection, he or she can work from practically anywhere. Organizations continue to move systems and workflows to the cloud with the realization that the shift to remote work may stick even after everyone has been vaccinated. Buyers must beware, though, as this rush to the cloud brings plenty of challenges and invites risk.
Our CMMC Panelists Answer Your Questions
Stacy Bostjanick, Director of CMMC Policy for the OUSD A&S, DoD, Mike Raeder, former Deputy CISO, Director Information Security for Northrop Grumman, and Alise Brzezinski, Practice Lead CMMC for Fortalice Solutions collaborated to answer viewer questions from our latest webinar, “Everything You Wanted to Know About CMMC Preparedness”. If you missed this webinar or would like to watch it again, you can view it below.
This CISO’s Top 2 Security Risks May Surprise You
If you’re a CISO, dealing with risk is the name of the game. CISOs however don’t play to win; they play not to lose. To prevent an attack, they need to know their environment inside and out.
Want to Stress Out Your CISO? Here’s How.
Lots of C-level executives deal with stress. CISO stress however may be unlike most others. Poorly defined expectations, a lack of training for the role, and exclusion from broader strategic discussions can lead a CISO to drink. In fact, a recent survey revealed a disturbing number of CISOs deal with work-related stress by consuming alcohol or other forms of self-medication.
A Conversation with Brian Fricke
In this interview, Brian explains how he transitioned employees from the office to the home, the need to redefine normal in a post-pandemic world, how he balances the company’s security needs with employee productivity and how he sees the CISO role evolving. He also shares the strangest issue he’s faced as a CISO, and what he does every Friday morning to stay engaged with his team.
Want to Be a CISO? Know This First.
“Trust but verify” is a mantra CISOs have traditionally applied to IT security but are now embracing when vetting technologies and technology vendors. Confined by tight budgets and an aversion to shelfware, CISOs need to be extremely confident in their technology investments. Ultimately, referrals, not flashy demos, matter. So for technology vendors looking to sell to CISOs, make sure your current customers love your product before selling it to anyone else.
Referrals, Not Fancy Product Demonstrations, Impress CISOs
“Trust but verify” is a mantra CISOs have traditionally applied to IT security but are now embracing when vetting technologies and technology vendors. Confined by tight budgets and an aversion to shelfware, CISOs need to be extremely confident in their technology investments. Ultimately, referrals, not flashy demos, matter. So for technology vendors looking to sell to CISOs, make sure your current customers love your product before selling it to anyone else.
Only the Human Firewall Stands Between Hackers and Your Data
It’s no secret that employees – whether they’re your employees or a partner’s – are the weakest link in your cybersecurity program. Regardless of an organization’s product, service, size, or industry, employees play an integral role in ensuring the business operates efficiently. Unfortunately, employees also play an integral role in exposing the organization’s intellectual property to unauthorized parties.
Here’s How New CISOs Set a Course for Success
When a CISO starts a new job, she naturally wants to build a cybersecurity program of which she and her employer can be proud. But her success depends largely on the tools she has, including people, tools, and processes.
Jimmy Xu Answers Your DevSecOps Questions
Jimmy Xu, Director of DevSecOps & Cloud Security at Trace3, recently presented “Mastering DevSecOps.” Jimmy’s presentation generated lots of great questions, which he graciously answered below. If you missed his presentation or would like to watch it again, you can view it below.