Sign in to view Jeremy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Washington DC-Baltimore Area Contact Info
Sign in to view Jeremy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
5K followers 500+ connections
Washington DC-Baltimore Area Contact Info
Sign in to view Jeremy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
5K followers 500+ connections
View mutual connections with Jeremy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jeremy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Join to view profile
Sign in to view Jeremy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
FireTail.io
Company Website
- Report this profile
About
Founder & CEO at FireTail, innovators in end-to-end API security. APIs are the number one…
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Services
- Cybersecurity
- Public Speaking
- Executive Coaching
- Management Consulting
- Leadership Development
Request proposal
Articles by Jeremy
-
Continuing to evolve in data
Sep 9, 2015
Continuing to evolve in data
In previous posts, I've described the basic process that we at FlockData have seen with the organizations we've worked…
10
3 Comments
-
Bangalore, Kochin, then Singapore
Aug 5, 2015
Bangalore, Kochin, then Singapore
If you'd like to connect with me in the next few weeks, check Bangalore (this week), Kochin (next week) and Singapore…
7
1 Comment
-
After the basics, build out
Jul 29, 2015
After the basics, build out
In my last post, I talked about starting with intuitive and natural approaches to modeling data when starting new…
6
-
Start with the basics: What, How and Why
Jul 15, 2015
Start with the basics: What, How and Why
When you're starting a project that involves collecting data (user accounts, etc) that you might want to analyze (and…
11
1 Comment
-
Revisiting the problems of schemas
Jul 2, 2015
Revisiting the problems of schemas
In a previous post, I examined how schemas are preventing data intelligence. That post struck a nerve with some, based…
2
-
Evolving towards simplicity
Jun 24, 2015
Evolving towards simplicity
Organizations of all kinds are constantly looking for ways to do things better. That can mean: Faster Cheaper Better…
2
-
FlockData content now live
Jun 16, 2015
FlockData content now live
We've been working hard on sharing more information about what we're up to over here at FlockData. We're hoping to both…
1
-
Why we still do startup demos
Jun 10, 2015
Why we still do startup demos
FlockData will be demoing at a Startups Ignite event this evening, June 10, 2015, in Reston, Virginia, USA. This begs a…
6
2 Comments
-
From Data to Information: the NZ Budget
Jun 4, 2015
From Data to Information: the NZ Budget
Recently the New Zealand government delivered its 2015 annual budget. We decided to test what we could learn from it.
2
-
Selling "Solutions" vs "Products"
May 27, 2015
Selling "Solutions" vs "Products"
So many companies claim to be in the business of selling "Solutions". After all, why would you sell Products when you…
4
See all articles
Activity
Sign in to view Jeremy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
🚀 BlackHat EU was amazing this year, this time with a lot of new faces from the watchTowr Europe and US teams 🇬🇧 🇺🇸thanks to everyone that…
🚀 BlackHat EU was amazing this year, this time with a lot of new faces from the watchTowr Europe and US teams 🇬🇧 🇺🇸thanks to everyone that…
Liked by Jeremy Snyder
-
Tie, Tie, No Tie. Can't remember the last time I wore a tie 👔 😇 Some wayback machine artifacts in this article. Thanks to all at the University of…
Tie, Tie, No Tie. Can't remember the last time I wore a tie 👔 😇 Some wayback machine artifacts in this article. Thanks to all at the University of…
Liked by Jeremy Snyder
-
Thanks Confidence Staveley for joining us!
Thanks Confidence Staveley for joining us!
Shared by Jeremy Snyder
Join now to see all activity
Experience & Education
-
FireTail.io
******* *** ***
-
********
******** ********
-
***** **********
******** ***** ******
View Jeremy’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Licenses & Certifications
-
AWS Certified Solutions Architect – Associate
Amazon Web Services (AWS)
-
Amazon Web Services Cloud Practitioner
Amazon Web Services (AWS)
Projects
Languages
-
English
-
-
Finnish
-
-
Spanish
-
-
French
-
-
Portuguese
-
Recommendations received
- Oluwole Adekunle “Working with Jeremy and the team has been an amazing experience. Our first foray into dedicated Cyber Security Solutions and I have been fortunate enough to work with the most sought after Cyber Security product sets in its class globally.With Cutting Edge Technology, excellent Customer focus and Partner support it is well geared to tackle the myriad Cyber security challenges of emerging markets. Looking forward to further strengthening of the relationship in my target markets. ”
- Toh Shang Yee, Dr. hc. DBA FMIM FCIIS FBCS CCISO ChCSP “Jeremy is a great person to work with when come to security of the business. I truly appreciate the time and effort he demonstrated outstanding than anybody else for an excellence in cloud cybersecurity consultations and advisories. I am highly recommending Jeremy if you need a strategic cybersecurity advisor.”
29 people have recommended Jeremy
Join now to view
More activity by Jeremy
-
New episode of #ModernCyber out NOW!Join Jeremy Snyder and guest Confidence Staveley as they delve into the evolving landscape of API security…
New episode of #ModernCyber out NOW!Join Jeremy Snyder and guest Confidence Staveley as they delve into the evolving landscape of API security…
Liked by Jeremy Snyder
-
No AI without APIs :)
No AI without APIs :)
Liked by Jeremy Snyder
-
I've always viewed technology as a transformative force for building a more sustainable future. APIs are not just about connecting systems; they…
I've always viewed technology as a transformative force for building a more sustainable future. APIs are not just about connecting systems; they…
Liked by Jeremy Snyder
-
So this happened last weekend. :) It’s been quite the journey. Stay tuned for parts 2 and 3 where I share about it, and my clients’, tales and…
So this happened last weekend. :) It’s been quite the journey. Stay tuned for parts 2 and 3 where I share about it, and my clients’, tales and…
Liked by Jeremy Snyder
-
What an incredible #AWSreInvent! Startups were front and center from Visionaries in the Stadium featuring Andrew Ng, Angela Duckworth, and Jon Jones,…
What an incredible #AWSreInvent! Startups were front and center from Visionaries in the Stadium featuring Andrew Ng, Angela Duckworth, and Jon Jones,…
Liked by Jeremy Snyder
-
Thank you to Anjai "AJ" Gandhi and Elay Cohen for another great event yesterday bringing together some of the best (and most genuine) go to market…
Thank you to Anjai "AJ" Gandhi and Elay Cohen for another great event yesterday bringing together some of the best (and most genuine) go to market…
Liked by Jeremy Snyder
View Jeremy’s full profile
- See who you know in common
- Get introduced
- Contact Jeremy directly
Sign in
Stay updated on your professional world
Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
- Todd Switzer New York, NY Connect
- Padman Ramankutty Pleasanton, CA Connect
- Paul Cushman Greater Chicago Area Connect
- Paul V. Weinstein San Francisco Bay Area Connect
- Larry Augustin San Francisco Bay Area Connect
- Dave Elchoness Boulder, CO Connect
- Michael McAuliffe New York, NY Connect
- Jeff Mirmelstein Greater Chicago Area Connect
- Mark Roberge Marblehead, MA Connect
- Eli Katz New York City Metropolitan Area Connect
Explore more posts
- Shiven Ramji
- Carlos Mena Registration list will be closing soon (approaching capacity) for the OWASP New York Chapter Meetup and hands-on workshop. We have a fabulous venue, thanks to Dell, and we have to respect their capacity rules. Workshop Topic: Vulnerability Reachability Analysis Using OSS Tools.Workshop Abstract: New vulnerabilities are disclosed every day in dependencies that you or your team may be using. But how do you know if you are actually using the vulnerable code? This talk will show you how to use two different types of tools to analyze reachability – deciding if the vulnerability needs to be prioritized based on your own code usage.Register here:https://lnkd.in/gdDBkm79 11
- Ran Nahmias This is a thought-provoking view on something that should be considered a best practice everywhere. Technical knowledge alone does not make someone a great leader. Instead, it is the proficiency in communicating knowledge that allows a leader to collaborate well with others. This is why it's so important that we talk about company culture, employee well-being, and change management as part of the cybersecurity equation. The efficacy of these processes often defines the effectiveness of any strategy, initiative, or implementation.Carol Lee; ISACA Silicon Valley#Cybersecurity #Leadership #ChangeManagement 3
- Muralidharan Palanisamy ⚡ The #PKI world is abuzz with Apple’s revised #TLS certificate validity proposal—aiming for just 47 days by 2028. With shorter validity periods on the horizon, organizations must modernize their certificate lifecycle management to avoid outages and enhance #security. This blog covers the updated timeline, the importance of #automation, and why crypto-agility is non-negotiable in today’s fast-evolving threat landscape. Read the blog and prepare your organization for what’s next! 🚀⬇️ 6
- Garret Grajek, CEH, CISSP, CGEIT YouAttest for PoLP (Principle of Least Privilege): Now more than ever: https://lnkd.in/gNwwgzmpKnow your identities, and privileges, w/ (now AI-powered) YouAttest, contact us: https://lnkd.in/g96pUae#ITSecurity #governance #cybersecurity #compliance #mspsecurity 14 1 Comment
- .Kasper .Gubi .. The US Navy’s "Information Superiority Vision" is built on three key pillars: Optimize, Secure, and Decide. By integrating Zero Trust principles, the "Secure" pillar ensures data and systems remain protected and resilient throughout their lifecycle.The report highlights the need for rapid innovation and IT improvements to maintain the Navy's competitive edge in a digital, threat-filled environment.Similarly, Danish Defense’s 2023 Cyber Strategy focuses on integrating advanced technologies and data-driven approaches to national security, emphasizing critical infrastructure protection and information security. Here to the Danish doctrine for CYOPS addresses the need to maintain Information Superiority.#Navy #Armedforces #Defence #Cybersecurity #InformationSuperiority 34
- Apurva Davé This is one of the first, in-depth research studies on what's happening with Non-Human Identities in the wild. And the results are... wild. It's worth taking a quick look at this report (it's ungated) if you even just have a passing interest in #NHI management. 5 1 Comment
- Dustin Goodwin I have experienced firsthand how even a moderate-sized infrastructure (~400 VMs) has superior self-hosting economics vs. the public cloud. I am curious what others are experiencing. What are you dealing with on the public cloud cost front? 18 6 Comments
- Alex Hemmati If you are in the #insiderrisk #insiderthreat space or you find it interesting, this is indeed the conference you MUST attend! Please find registration information below and stop by our booth! #cybersecurity #zerotrust #dtexsystems #insiderrisk #insiderthreat 2
- Snir Ben Shimol These numbers confirm we have a remediation problem. As Chris mentioned, prioritizing vulnerabilities is critical—but how do you decide which system will be hacked first? How can an enterprise manage a backlog of ~30 critical, exploitable vulnerabilities if each one takes 3 months to remediate? And what if remediation isn’t possible?We’re working on these challenges and are eager to help solve the remediation problem. I’d love to hear your thoughts! 13 2 Comments
- Geoff Belknap Some thoughts on Modelling and Sizing security orgs. 82 7 Comments
- Jack Horgan 🚨Live from the frontlines of #CMMC compliance!🚨Just caught Summit7’s latest livestream, packed with updates, insights, and what’s on the horizon for the #DoD contractor community. As someone deeply immersed in helping organizations navigate compliance (hello, NIST 800-171r2!👋), I’m always on the lookout for actionable insights—and this session delivers. Whether you're just starting your #CMMC journey or fine-tuning your processes, this is a must-watch! 💡👏 A big thank you to the Summit7 team for keeping us all informed and ready to meet the challenge. Let’s keep raising the bar in #Cybersecurity and protecting what matters most! 🖥️🔒#Compliance #CMMC #CybersecurityLeadership 1
- Russ Hunsaker 🐺 Through hundreds of security and technology integrations available to customers today, the Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyzes more than 5.5 trillion security events per week from a global base of over 5,700 customers.Watch Ian McShane, our Vice President of Product, explain how our AI-driven platform empowers organizations of almost any size to achieve security operations at the push of a button. Learn more here: https://lnkd.in/g2US4Phg#EndCyberRisk 5
- Andrew Shea One hundred and thirty eight billion in losses per this article. I share this to help senior executives and board members gain understanding and ultimately support to fund the evolution of Third Party Risk Management. The professionals in this space are some of the hardest working dedicated folks I know. They deserve to be heard as they articulate the depth and breadth of this challenge and the resources needed to address it. Tomorrow is the Third Party Risk Association (TPRA) - Third Party Risk Management virtual solutions conference. It’s time to evolve. Join us. Owlin 7 1 Comment
- Richard Staynings Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy. Delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in the cybersecurity field. Wolfgang shares his expertise on creating effective security programs, fostering trust within teams, and navigating the challenges of the CISO role. Tune in to gain valuable insights on cybersecurity strategy and the significance of collaborative relationships in achieving security goals.#cybersecurity #securitystrategy #secruitydesign #securityframeworks #securityteams #sponsored #ciso #securityleadership #collaboration #leadershiphttps://lnkd.in/gH3MVM_r 6
- Kevin Beaver Check out this podcast interview with me just after my TribalNet keynote in Vegas recently. I was asked a random question at the end about the first concert I attended that you might find interesting (and it's not just what's listed in the podcast description).#infosec #CISO #CIO #businessleaders #cybersecurity #podcast #keynotespeaker #backtobasics #rockconcerts #ISAC 5
- Brian Gallagher What defines value? After three years of effort, this week marks the start of the federal government's enforcement of new secure software development requirements. Starting with GSA and then shifting to all commercial vendors selling to all agencies, the Office of Management and Budget industry-changing mandate is now in action. For years, vendors commented that they thought this would never happen, but guess what? It did. Attacks on nations' software are skyrocketing, and as a nation, we need to take steps to produce more secure software by design. Before implementing tools such as application security testing (SCA/SAST/DAST), you must ensure your organization has a proper foundation. This is why the NIST 800-218 Secure Software Development Framework (#SSDF) starts with organizations preparing themselves to ensure that their people, processes, and technology are prepared to perform secure software development at the organization level. CodeLock, Inc. received a grant from VIPC | Virginia Innovation Partnership Corporation to develop a dashboard to provide companies across the country with the resources they need to get started and comply with these new requirements. Over the last month, we have uploaded templates for policies and procedures that your organizations need to have in order to meet specific practice areas. Rather than you having to create this from scratch, we did the work for you, saving thousands of hours and the finances associated with that work. You can get a CodeLock account today and access all of these resources for only $19/month. Do no wait to take action, get started with the compliance process today.If you made it this far into my post, congratulations! Send me a message, and I will give you a discount code to get started for free. #ZeroTrust, #CyberSecurity, #SoftwareDevelopment, #DepartmentOfDefense, #InfoSec, #NationalSecurity, #DefenseTech, #CyberDefense, #SecureSoftware, #MilitaryTechnology, #DevSecOps, #InformationSecurity, #CyberAwareness, #GovernmentTech, #CyberThreats, #TechInnovation, #DigitalTransformation, #CloudSecurity, #DataProtection, #NetworkSecurity, #SecurityArchitecture, #CyberResilience, #IdentityManagement, #Encryption, #Compliance, #SecureCoding, #CyberRiskManagement, #AIInCybersecurity, #ThreatIntelligence, #CriticalInfrastructure, #CyberLaw, #CyberEthics, #TechnologyLeadership, #PublicSectorInnovation, #TechGovernance, #SecureByDesign, #PrivacyByDesign, #MilitaryInnovation, #DefenseStrategies, #CyberWarfare, #CyberDiplomacy, #GovernmentContracting, #DefenseContractors, #MilitaryTec, #TechPolicy, #SecureInfrastructure, #NationalCybersecurity, #TechForDefense, #SecureDevelopment, #GovernmentIT 13 1 Comment
- Henrique Bernardes B Teixeira If you care about Machine IDs 🤖 and you missed this webinar I participated in June, here is the free recording! 🎥It was an honor to chat with Mandy Andress from Elastic, Jake Bernardes from anecdotes and Itamar Apelblat from Token Security #MachineIdentity #nhi #machineIDmanagement 19
- Darace Rose Explore the recent surge in cyberattacks targeting U.S. water systems, the potential dangers to public health and safety, and what's being done to prevent future incidents. Discover how hackers could be threatening your tap water, and learn how cybersecurity measures are being ramped up to protect vital infrastructure. Don't forget to subscribe to Oppos for more crucial updates and expert insights. https://smpl.is/9eazm 17
- Daniel Lee CxOs, it's time to rethink your network security approach. ZTNA alone won't cut it in today's threat landscape. Discover why ZTNA integrated into SASE is the key to securing your business end-to-end 👇#SASE #ZTNA 3
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jeremy Snyder in United States
- Jeremy Snyder Los Angeles, CA
- Jeremy Snyder Greater Tampa Bay Area
- Jeremy Snyder Experienced Digital Product Leader | ex- Meta | MBA | Army Veteran San Francisco Bay Area
219 others named Jeremy Snyder in United States are on LinkedIn
See others named Jeremy Snyder
Add new skills with these courses
- 1h 32m Cloud Concepts: Planning an App Migration Strategy
- 1h 36m Amazon Web Services: Exploring Business Solutions
- 1h 24m AWS Certified Solutions Architect - Associate (SAA-C03) Cert Prep: 1 Cloud Services Overview
See all courses