Abnormal Engineering Stories #7: Understanding the Role of the CTO

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
December 16, 2021

Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.

After 20+ years as an operator, Tim has joined Menlo Ventures as an Investment Partner, a position that lends itself nicely to his obsession with dabbling in different types of technologies and problem-solving. He invests in a variety of fields including cybersecurity, cloud, AI/ML, dev ops, deep tech, and quantum computing. During our conversation, Tim and I discuss:

  • The role of the CTO and the responsibilities that come with the title
  • The benefits of being a CTO who still codes
  • Solving people problems with empathy and why leadership doesn't always fit into a framework
  • Recent technology trends Tim has seen as an investor

We hope you enjoy it! Please do subscribe on Apple, Spotify, or Google Podcasts.

Abnormal Engineering Stories #7: Understanding the Role of the CTO

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B Business Email Compromise Response
Knowing what to do after receiving a business email compromise attack is essential for preventing costly consequences. Learn how to respond to BEC attacks.
Read More
B 36 M
Vendor email compromise is expensive. See how Abnormal protected our customer from a $36 million invoice fraud attack.
Read More
B Keeping VIP Emails Safe
Learn why executives are popular targets for account takeovers, the consequences of a successful takeover, and how organizations can prevent these attacks.
Read More
B TAG Cyber Future of Cloud Email Security
In the final post of our series with Ed Amoroso, the TAG Cyber CEO discusses some of the defensive and offensive trends for cloud email.
Read More
B SVB Closure Cybersecurity Threats
The Silicon Valley Bank (SVB) closure has created opportunities for threat actors to launch more convincing email attacks. Here's how to lower your risk.
Read More
B 3 14 23 Fraud
Discover how Abnormal detects and remediates payment fraud and invoice email attacks that bypass secure email gateways (SEGs).
Read More