loader from loading.io

The Cloud Hack at Capital One

Game Changers Silicon Valley

Release Date: 08/07/2019

Part 2: Companies are Bought not Sold show art Part 2: Companies are Bought not Sold

Game Changers Silicon Valley

The media spends most of their time in the “happy part of Silicon Valley”, where companies are funded, grow, and are acquired. The sale of the company sounds like a naturally occurring event, but the effort to sell a startup company is incredibly demanding and the fact is: there are very few public forums that talk about the challenges and effort required. This podcast explores the strategies a startup can execute as preparation for an exit.

info_outline
Companies are Bought, not Sold, Part 1 show art Companies are Bought, not Sold, Part 1

Game Changers Silicon Valley

All entrepreneurs need an exit plan, an opportunity to see their company, generally through an acquisition with an established corporation. The difficult question is knowing when to sell, the terms of the sale and finding the right acquisition partner.

info_outline
Igniting a Startup Ecosystem show art Igniting a Startup Ecosystem

Game Changers Silicon Valley

Every city or metropolitan area desires to emulate the startup ecosystem using the Silicon Valley model. However, every major metropolitan area is facing the challenge of creating a start-up ecosystem or seeing their most promising companies and talented human resources move to other cities where an active start-up ecosystem does exist. This podcast will look into the development of the startup ecosystem in the State of Texas.

info_outline
The Future of Milk show art The Future of Milk

Game Changers Silicon Valley

The dairy industry is a well-established industry that has received some productivity enhancements over the years. such as automated milking machines.  The dairy sector is now going through a transformation in Ireland.  Private industry and the government are making a move to apply 21st-century innovation and productivity enhancements to transform the entire dairy supply chain along with the products that are being produced.

info_outline
Finding the Seed Investor for your Startup with with Jonathan Wu and Jim Connor show art Finding the Seed Investor for your Startup with with Jonathan Wu and Jim Connor

Game Changers Silicon Valley

If you are first time entrepreneurs with no track record in the startup world, then you are likely to find the most receptive investor audience within the angel investor community. 

info_outline
The Cloud Hack at Capital One show art The Cloud Hack at Capital One

Game Changers Silicon Valley

On Monday of last week, Capital One announced a data breach affecting an estimated 106 million Credit card customers and applicants. One noteworthy point is that this cyber theft was conducted against data stored in the cloud-hosted by Amazon Web Services.  In the past, most cyber intrusions have been conducted against a corporate data center. The heightened complexity and interdependency of applications deployed in the cloud have introduced some new exposures and vulnerabilities.

info_outline
Texas Hold 'em for the Angel Investor show art Texas Hold 'em for the Angel Investor

Game Changers Silicon Valley

This startup story begins with an accelerator hosted by Texas State University and a startup named SioTeX.

info_outline
Agtech, the Last Frontier, with Sonia Lo, Roger Royse and Jim Connor show art Agtech, the Last Frontier, with Sonia Lo, Roger Royse and Jim Connor

Game Changers Silicon Valley

According to a United Nations study by the year 2050, the world’s population will reach 9.1 billion which is 34 percent higher than today. In order to feed this larger, more urban, and richer population, food production must increase by 70 percent. So the question is given the limits of available farmland and water resources, how are we going to meet this increase in food demand? This podcast is about the role in Agtech to meet the expected growth in food demand over the next 30 years.

info_outline
Who is Protecting Your Digital Identity show art Who is Protecting Your Digital Identity

Game Changers Silicon Valley

During the RSA conference in San Francisco, I came across another source of digital identity theft, easily overlooked and there is was, staring me in the face one morning when I checked my name on a “financial aggregation” web site.  These are sites that collect information about each of us and then sell that information to anyone, anyone who will attest with an online click that they will only use the information in an authorized procedure, such as qualifying for benefits, or employment verification.

info_outline
Disrupting Venture Capital show art Disrupting Venture Capital

Game Changers Silicon Valley

What are your options if you have a real business but there is a lack of engagement from venture capital? 

info_outline
 
More Episodes

John Dickson, Denim Group

On Monday of last week, Capital One announced a data breach affecting an estimated 106 million Credit card customers and applicants. This is one of the largest Data breaches experienced by a large bank.  One noteworthy point is that this cyber theft was conducted against data stored in the cloud-hosted by Amazon Web Services.  In the past, most cyber intrusions have been conducted against a corporate data center. 

Capital One is just one of the many companies that have migrated to cloud services technology to improve performance, deliver software enhancements, and reduce costs by closing down dedicated data centers.  But, the heightened complexity and interdependency of applications deployed in the cloud has also introduced some new exposures and vulnerabilities.

While attending the RSA conference in San Francisco this year, I had an opportunity to meet with John Dickson of the Denim Group.  John explained how the migration to the cloud-based infrastructure is a completely new concept verses, how apps were developed five years ago.  He also discusses the approach used to create cloud applications known as continuous integration, continuous deployment, or CICD.  The sheer complexity of the many moving parts in this technology can lead to simple missteps in security, leading to a data breach.