

Rohit Dhamankar
Vice President of Product Strategy for Fortra. Discusses Fortra's mission to break the attack chain and their work on Cobalt Strike.
Top 3 podcasts with Rohit Dhamankar
Ranked by the Snipd community

May 21, 2025 • 1h 17min
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
Rohit Dhamankar, Vice President of Product Strategy at Fortra, shares insights on combatting the misuse of Cobalt Strike, resulting in an impressive 80% drop in cybercriminal activities. Theresa Lanowitz, Chief Evangelist at Level Blue, discusses the Level Blue Futures Report, emphasizing the importance of cyber resilience in business strategies and incident response. They explore how CISOs can secure board-level positions, the shift from technical expertise to business acumen, and promoting proactive cybersecurity measures to align with business goals.

Sep 15, 2025 • 1h 41min
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
This installment features Jeff Pollard, VP at Forrester Research and co-author of the AEGIS Framework, which addresses the challenges AI poses for security leaders. Rohit Dhamankar from Fortra highlights the importance of offensive security in regulatory compliance. Michael Leland of Island sheds light on compromised credentials and browser security. The discussion dives into the urgent need for proactive measures against AI-driven risks, recent funding news, and the balance between technological advancements and privacy concerns, making for a thought-provoking conversation.

Jan 15, 2024 • 31min
Encore: Examining the current state of security orchestration. [CyberWire-X]
Rohit Dhamankar, Fortra's VP of Product Strategy, and Steve Winterfeld, Akamai's Advisory CISO, join Rick Howard to discuss CISO initiatives, including vendor consolidation and attack surface management. They explore the challenges of security orchestration, the shift to cloud-based platforms, and the potential of AI and ML in cybersecurity. The chapter also highlights the complexity of security environments and the importance of culture, vendor selection, and automation in addressing these challenges.