chat
expand_more

Abnormal Engineering Stories #7: Understanding the Role of the CTO

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
December 16, 2021

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.

After 20+ years as an operator, Tim has joined Menlo Ventures as an Investment Partner, a position that lends itself nicely to his obsession with dabbling in different types of technologies and problem-solving. He invests in a variety of fields including cybersecurity, cloud, AI/ML, dev ops, deep tech, and quantum computing. During our conversation, Tim and I discuss:

  • The role of the CTO and the responsibilities that come with the title
  • The benefits of being a CTO who still codes
  • Solving people problems with empathy and why leadership doesn't always fit into a framework
  • Recent technology trends Tim has seen as an investor

We hope you enjoy it! Please do subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories #7: Understanding the Role of the CTO

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More
B Automotive Data Blog
Research reveals the automotive industry has become a popular target for business email compromise and vendor email compromise attacks. Learn why.
Read More