chat
expand_more

Launching the Enterprise Software Innovators Podcast

The new podcast features exclusive interviews with Fortune 500 technology leaders about innovation in the enterprise.
February 16, 2022

Today, I'm excited to announce the launch of Enterprise Software Innovators, co-hosted by Saam Motamedi, a general partner at Greylock Partners, and myself. In the first season, we chat with leading technology executives, who each offer an insider’s perspective into how disruptive and innovative technologies are deployed at scale within their organizations, as well as the hard-fought lessons learned during the process.

Blog esi podcast twitter

Why We’re Focused on Innovation in Enterprises

There is certainly no shortage of content about startups and the leaders behind them who are building innovative products and technologies. And while that content is incredibly important, it only covers half of the puzzle. Equally important are the examples of how these technologies are actually implemented in the real world, and the impact they have on their customers.

The application of exciting innovations at scale is where the true value lies, and we sought out a range of CIO and CTO guests from disparate specializations to help tell those stories with their behind-the-scenes experience.

An Inside View to Enterprise Innovation

The maiden launch of Enterprise Software Innovators features three episodes.

  • Episode 1 is a conversation with Michael Keithley, CIO of United Talent Agency, who has consistently been forward-thinking in his approach to utilizing technology in the entertainment industry.

  • Episode 2 features Shamim Mohammad, CIO and CTO of CarMax, who candidly shares how CarMax saw a changing landscape and disrupted their existing brick-and-mortar business to implement innovative digital solutions for their customers.

  • Episode 3 is with Jay Dominick, CIO of Princeton University, who shares examples of the unique technology challenges Princeton faced in the wake of COVID-19.

As we continue the podcast, you can expect to hear from guests from companies including Align Technologies, Workday, Box, and more.

(For a full list of season 1 episode summaries, check out our recap blog here.)

Exclusive Conversations Each Month

The inaugural season features a unique array of guests who are deploying innovative technology and methodologies to advance their industry. Keep an eye out for future episodes and visit the Enterprise Software Innovators website for each episode, alongside key takeaways and industry insights. In addition, the podcast is available below and on all popular podcast platforms including Apple Podcasts, Google Podcasts, Spotify, and wherever else podcasts are found.

Launching the Enterprise Software Innovators Podcast

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B H1 2025 Email Threat Report Blog
Explore new research on how AI is amplifying the impact of BEC and VEC attacks and learn how to defend against these evolving email security threats.
Read More
B Exploiting Google Services Blog
Cybercriminals misuse Google services for phishing, ad hijacking, and more. Learn five attack methods and how to protect your accounts.
Read More
B AI vs AI
Uncover the dangers of AI-driven scams. Our ethical hacker demonstrates real-time social engineering attacks, highlighting essential cybersecurity strategies for 2025.
Read More
B Misclassification Adaptation Blog
Learn how Abnormal Security minimizes false positives and false negatives with a multi-layered approach to cyberattack detection and email security.
Read More
B Docusign Phish
Threat actors are exploiting Docusign to bypass traditional email security, but Abnormal Security’s AI-powered platform stops these attacks by detecting behavioral anomalies in real time.
Read More
B Phishing Loop Bypass MFA Compromise Accounts Blog
A new phishing campaign targeting Microsoft ADFS bypasses MFA with social engineering and technical deception. Learn how attackers take over accounts—and how to stop them.
Read More