chat
expand_more

Abnormal Engineering Stories #7: Understanding the Role of the CTO

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
December 16, 2021

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.

After 20+ years as an operator, Tim has joined Menlo Ventures as an Investment Partner, a position that lends itself nicely to his obsession with dabbling in different types of technologies and problem-solving. He invests in a variety of fields including cybersecurity, cloud, AI/ML, dev ops, deep tech, and quantum computing. During our conversation, Tim and I discuss:

  • The role of the CTO and the responsibilities that come with the title
  • The benefits of being a CTO who still codes
  • Solving people problems with empathy and why leadership doesn't always fit into a framework
  • Recent technology trends Tim has seen as an investor

We hope you enjoy it! Please do subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories #7: Understanding the Role of the CTO

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Missed Attack Vendor Relationships
Discover how attackers exploit vendor relationships for credential phishing and how Abnormal Security’s AI-driven defense stops these attacks in real time, preventing account takeovers and minimizing risk.
Read More
B 1500x1500 MKT790 Deep Seek Open Graph Images
Cyber attackers may be using DeepSeek to create more email attacks. Worry less about AI-powered attacks with AI-powered protection from Abnormal Security.
Read More
ABN Innovate Blog 4 L1 R1
Did you miss Innovate 2025? Check out our major key takeaways from the conference, where we dive into how AI is transforming cyber threats, and cybersecurity, today.
Read More
B Proofpoint Customer Story Blog 11
See how Abnormal's AI helped a premium hospitality provider detect 1,366 threats missed by Proofpoint and save 766 hours/month in employee productivity.
Read More
B Ghost GPT Blog
Cybercriminals use GhostGPT, an uncensored AI chatbot, for malware creation, BEC scams, and more. Learn about the risks and how AI fights back.
Read More
B APAC Email Security Threats
Email attacks on APAC organizations, including phishing and BEC, are rising. See why AI-native email security is crucial to countering modern cyber threats.
Read More