RSAC 2024: CyberMaxx Plays Offense with User, Data Protection

Aaron Shaha, CISO at CyberMaxx, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss what an “offense that fuels defense” strategy entails.

Terry Sweeney, Contributing Editor

May 20, 2024

7 Min View
Source: Informa Tech

Aaron Shaha, CISO at CyberMaxx, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss what an “offense that fuels defense” strategy entails, as well as the industry sectors that should consider adopting it. Shaha goes on to address how threat hunting has changed in recent months and the disturbing trend of ransomware attackers targeting the healthcare industry. He also weighs in on whether healthcare organizations are doing enough to promote security and create greater security awareness within their cultures. He also divulges the kinds of things that keep him up at night as a CISO.

Aaron Shaha, CISO at CyberMaxx is a Strategic Information Security Executive and subject matter expert with a record of pioneering cyber security trends by developing novel security tools and techniques that align with corporate objectives. Known for building and leading strong teams that provide technology enabled business solutions for start-ups, industry leaders (Deloitte and its Fortune clients) and government agencies (NSA). Skilled at developing information security strategies and standards, leading threat detection and incident response teams to mitigate risk and communicating effectively across all levels of an organization.

About the Author

Terry Sweeney

Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights