BN

Balázs Nagy

Chief Executive Officer at newpush

Balázs Nagy is a seasoned executive with extensive experience in IT and cybersecurity, currently serving as Chief Executive Officer at NewPush since October 1999, where leadership focuses on enabling expert teams to deliver IT projects. Prior roles include Chief Technology Officer at Cloudmetrx.net from August 2014 to January 2015, and Chief Business Intelligence Advisor, where contributions involved the design and delivery of healthcare solutions utilizing Big Data and Data Science technologies. Nagy also worked as a Technical Architect at American Management Systems from February 1999 to October 2000, leading multimillion-dollar projects and holding a patent in telecommunications billing. Early career achievements include presidency at Chimie Paris Service Edutes, managing a consulting team. Education includes multiple master's degrees in economics and petroleum engineering from prestigious institutions, along with a foundation in chemical engineering.

Location

Baltimore, United States

Links


Org chart

No direct reports

Teams

This person is not in any teams


Offices


newpush

Innovation in Cybersecurity | The Connective Platform™ As a global leader in comprehensive cyber protection helping Organizations leverage comprehensive Cybersecurity and Attack Surface Management (ASM) covering Assets (CAASM), People (SAT), and Access (IAM+IGA), NewPush works with CIOs and CISOs to help them successfully develop and execute their cybersecurity, risk reduction, and compliance programs. NewPush created The Connective Platform™ to provide a holistic, comprehensive approach that ensures that the security posture of an enterprise is completely understood, examined, exposed, and continuously remediated. The Connective Platform does this by: • Providing an overlay to the corporate cyber assessment and remediation environment. This accumulates and consolidates data from all other deployed security tools, presenting an up-to-the-minute, cohesive, and comprehensive picture of the entire security footprint. • Harvesting the full power of existing tools and investments by contextualizing their output, and translating technical information into the business intelligence required for decision making. • Providing in-depth and near real-time view of access, identity, and vulnerabilities, thereby facilitating expeditious and accurate decisions. • Increasing the visibility of previously unknown, hidden threats by holistically examining the corporate IT security landscape. • Automating manual processes, thereby increasing the accuracy of intelligence, improving security, and reducing the associated costs. • Instilling a culture of cybersecurity awareness with separate tracks for individual and corporate responsibility.