Cybercrime , Endpoint Security , Events

Investing in Solutions for Tomorrow’s Attacks

Andy Ellis Describes How Innovation Can Fix Cybersecurity’s Vulnerabilities
Andy Ellis, operating partner at YL Ventures

Potential investors in the cybersecurity sector need a deep understanding of what the pinch points are for cybersecurity practitioners. Andy Ellis, a 20-year CSO at Akamai who is now an operating partner at YL Ventures, discusses what cybersecurity sectors are attracting investment - and why.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Ellis, an operating partner at YL Ventures, discusses:

  • The hot cyber sectors for investment - and why they're hot;
  • How to identify products and services to solve tomorrow’s attacks;
  • Why Israel is an attractive place for cyber startups.

Ellis was recently appointed operating partner at YL Ventures, a prominent seed-stage global venture capital firm investing in Israeli cybersecurity startups. He also serves as the CEO and principal at leadership development firm Duha. Ellis spent 20 years as the CSO at global web and internet security services company Akamai Technologies, where he advanced the CISO/CSO role while helping increase the company's security business to over $1 billion annual revenue.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.