Donate to Feed The Children Inc and I’ll share from my experience with you.

Short Quiv
A Short Quiv is a one sentence question, followed by a one sentence answer. Quick, simple, and to the point.
Ask me
Quiv
You may ask any question (within reason). It should be limited to what you believe the Giver is able to answer.
Ask me
Phone call
You can have a short, up to 15 minute phone call with the Giver, at a time convenient to both of you.
Call me
... Short Quiv Donate $25
Guru 5 (1)

Mr. Menny Barzilay

public speaking
ManagementNetworkingProject ManagementIntegrationSystem ArchitectureLinuxDisaster RecoveryNetwork SecurityOperating SystemsRisk ManagementStrategic PlanningVirtualizationSoftware DevelopmentCloud ComputingSecurityPoliticsIT StrategyTCP/IPEnterprise ArchitectureIT ManagementInformation SecurityInformation Technology

CEO & Cyber Security Strategist at FortyTwo

IsraelComputer and Network Security
Current
  • CEO @ FortyTwo
  • Strategic Advisor to the Interdisciplinary Cyber Research Center @ Tel Aviv University
  • Co-founder and Co-Manager @ The Israeli Cyber Security Experts Committee
  • Public Speaker - Cyber Crime and Information Security @ FortyTwo

Summary

Menny is an internationally known cyber security expert. He is a former CISO in the intelligence forces of the Israeli Defense Forces (Capt. (Res), and worked at Bank Hapoalim Group (the largest Israeli banking group) for 10 years in various positions including the head of the IT Audit Department.

Menny is a strategic advisor to international enterprises as well as startup companies. He is a member of the Senior Cyber Forum at the Yuval Ne’eman Workshop for Science, Technology and Security and the Interdisciplinary Cyber Research Center at the Tel-Aviv University. He is a member of the International Cyber Security Conference organizers team and co-created the Israeli hacking challenge. Menny also leads an esteemed community of Israeli cyber security experts.

In addition to his ongoing activities, Menny lectures and serves as the host and panelists at conventions, conferences and professional work groups worldwide and his publications are featured in renowned computer magazines.

Read more

Please choose how we can both help the cause

Short Quiv
A Short Quiv is a one sentence question, followed by a one sentence answer. Quick, simple, and to the point.
EXAMPLE: In your experience, what are the top 3 PR agencies for early-stage mobile startups?
Ask me
Quiv
You may ask any question (within reason). It should be limited to what you believe the Giver is able to answer.
EXAMPLE: As a photographer - can you provide some guidance on what type of camera equipment you would recommend for indoor stills?
Ask me
Phone call
You can have a short, up to 15 minute phone call with the Giver, at a time convenient to both of you.
EXAMPLE: I'd like to discuss your experience in replace an engine on a 1967 Ford Mustang.
Call me
Video chat
You can have a short, up to 30 minute video conversation with the Giver, at a time convenient to both of you.
EXAMPLE: Before I go on a 6 months trek in the Amazon, I’d like to learn from your experiences there.
Coming soon...
Meet for a coffee
You can set up a meeting, up to 45 minute long with the Quiver. You will need to buy the coffee :-)
EXAMPLE: You've had a lot of experience scaling companies. I'd like to spend some time with you to learn from your experience.
Coming soon...

Advice given to support my cause

Amit Shafrir

Quiv: "Menny, given your deep knowledge and background in Cyber security, can you share, what are the most important things that a private user should do in order to be more secure?"

Read more
Menny Barzilay

Answer: "I’d be happy to.

I recommend everyone to do the following tasks immediately:

1. Use a pin code / fingerprint authentication on your mobile phone. Your mobile phone is the door to your digital life. If someone steals it, they can immediately access your (Gmail, Facebook, Twitter, etc.) accounts and change their passwords. A simple authentication mechanism will prevent that. And if you feel that it’s not comfortable, don’t worry, you get used to it in two-three years.

2. Backup your files. Preferably, use a big and famous cloud service provider such as Google Drive, Dropbox, Microsoft OneDrive, etc. Cyber threats such as Ransomware attacks are becoming more and more common. If you don’t want to lose you files – always have a backup.

3. Don’t reuse passwords. In that I mean – don’t use the same passwords for different websites and services. You don’t want to be in a position where if one website got hacked, hackers can now access all your other accounts. The way hackers work is that they search for a small and simple to hack sites. After stealing all the usernames and passwords from those sites they will automatically try to use them to access all the big websites. If you used the same passwords, your more important accounts will be stolen as well in seconds.

4. Use strong authentication. Many websites today (Such as Gmail, Facebook, Twitter, and others) allow you to strengthen your authentication process by sending you a text message with a onetime password, anytime you try to logon from an unfamiliar computer. This is a great way to prevent hackers from accessing you accounts since now they need, not only to steal your username and password (Which they can do while sitting in another country), but to also steal your mobile phone (Which is something that requires physical access). It’s true that this method is not foolproof, but it is one of the most important things you can do to dramatically reduce the ability to take control over your accounts. There is also a bonus to it. Now, if someone else is trying to logon into your account, you will receive a text message.

5. Install updates. From time to time you receive a message from different applications (such as Microsoft Windows, Acrobat Reader, iTunes, and so one) that there are new updates ready for you. You should install these drivers as soon as possible since many times they include fixes to critical security flaws. Remember that there is always a risk that a new update will cause a malfunction on your computer (It’s rare but can happen). But you don’t need to worry about it. You know why? Cause you already have a backup in place (see item 1 above).

6. Never install hacked applications. If you don’t want to pay for the application – don’t use it. This is not just about ethics and law. It is an important security principle. Many times, hacked applications come with a virus inside. And the moment you’ve installed the application, you’ve installed the virus as well.

7. Don’t click. The most effective way to hack someone is to send him or her a malware (malicious software) and hope they will click on it. You might receive a message like “Hi, you just won a billion-gazillion dollar reward. Here is the PDF with all the details”. The moment you’ll open the PDF, it will infect your computer with a malware. It doesn’t have to be a PDF file. Hackers can also send you a link to a poisoned website or many other different types of files. Don't open any file and don’t click on any link if you are not sure that this is not a hacking attempt. Even if these files were sent to you by a friend. When hackers take control over someone’s account they will use it to attack his friends.

8. Finally, remember that everything is hackable. All the above recommendation will dramatically reduce the ability of a hacker to hack you. But it is not a 100% game. If you have a really really sensitive document or a picture – make sure you encrypt it and keep it off the web.

For anything else – I’m here for you.

Menny"

Read more
Amit Shafrir

Feedback "Great advice. Thank you!"

Read more

Feed The Children Inc

International, National Security

Founded in 1979, Feed The Children is a Christian-themed foreign relief agency whose contributions consist of cash and donated goods.

Providing hope, food, clothing, medical supplies and equipment, educational materials, and other necessities for those without life's essentials; exists to end childhood hunger.