newpush
Bob Besharat is an accomplished technology executive with extensive experience in product development, cybersecurity, and engineering leadership. Currently serving as Chief Innovation Officer at newpush since November 2018, Bob drives the vision and development of innovative products and services aligned with organizational objectives. Previous roles include EVP Global Portfolio and EVP Product Development at newpush, Senior Vice President of Engineering and Development at eSentire, and Chief Technology Officer at CGI and CSC. Bob's educational background includes a certification in Executive Leadership from Cornell University and a Bachelor's degree in Computer Science from Carleton University.
This person is not in any teams
This person is not in any offices
newpush
Innovation in Cybersecurity | The Connective Platform™ As a global leader in comprehensive cyber protection helping Organizations leverage comprehensive Cybersecurity and Attack Surface Management (ASM) covering Assets (CAASM), People (SAT), and Access (IAM+IGA), NewPush works with CIOs and CISOs to help them successfully develop and execute their cybersecurity, risk reduction, and compliance programs. NewPush created The Connective Platform™ to provide a holistic, comprehensive approach that ensures that the security posture of an enterprise is completely understood, examined, exposed, and continuously remediated. The Connective Platform does this by: • Providing an overlay to the corporate cyber assessment and remediation environment. This accumulates and consolidates data from all other deployed security tools, presenting an up-to-the-minute, cohesive, and comprehensive picture of the entire security footprint. • Harvesting the full power of existing tools and investments by contextualizing their output, and translating technical information into the business intelligence required for decision making. • Providing in-depth and near real-time view of access, identity, and vulnerabilities, thereby facilitating expeditious and accurate decisions. • Increasing the visibility of previously unknown, hidden threats by holistically examining the corporate IT security landscape. • Automating manual processes, thereby increasing the accuracy of intelligence, improving security, and reducing the associated costs. • Instilling a culture of cybersecurity awareness with separate tracks for individual and corporate responsibility.