Posts by Rhonda Shantz

Rhonda Shantz is chief marketing officer at Centrify, where she provides innovative enterprise marketing strategies to extend Centrify’s brand awareness globally. Prior to Centrify, Shantz held tech-sector leadership roles at Rocket Fuel, Symantec, and Hewlett Packard. She was a partner and technology practice lead at Porter Novelli, consulting with clients including McAfee, PeopleSoft, HP, Wells Fargo and Qualcomm. She holds a Bachelor of Applied Science, Computer Science from California State University Chico and a Master of Business Administration from California State University Sacramento.


Centrify Perspective

The Year in Review: Centrify Builds Momentum

By , December 28, 2017

The Centrify solution made great strides in 2017, chronicled in Part I of this blog. Product enhancements, combined with the market’s growing understanding of the essential role identity plays in effective cybersecurity propelled the business forward. Here are some additional business highlights: The Centrify/Ponemon study Early in 2017, Centrify sponsored a Ponemon research study to discover the business and financial impact of a data breach on areas like shareholder value, brand reputation and the responsibility of C-suite. The study found that breaches ranked among the top three most negative events that can happen to an organization, and the loss of…

Centrify Perspective

The Year in Review: Rethink Security

By , December 26, 2017

During a year of high-profile breaches like Equifax, HBO and Uber, as well as the realization that Yahoo’s highly-publicized 2013 breach compromised the accounts of all three billion of its users, the tide started to turn in 2017. Organizations, industry experts, thought leaders, the media and even consumers began to understand the status quo simply isn’t working. Ideas like Zero Trust and comprehensive identity protection moved center stage and the Centrify solution advanced into the spotlight. After a survey at the RSA Conference revealed that just 55 percent of IT pros believe their company’s current technology ensures security, and a…

Hot Topics

The Internet Wants YOU: Consider a Career in Cybersecurity

By , October 25, 2017

Back in May, I blogged about the lack of women in technology and cybersecurity in particular. Weeks after that article was published, Cybersecurity Ventures released a report estimating that the number of unfilled cybersecurity jobs would increase from one million today to 3.5 million in 2021. That’s a lot of people required for an industry that already has a zero percent unemployment rate. And if the report is right, we have a few short years to address the problem before the current cybercrime epidemic truly explodes. Maybe it’s time to recognize that the number of women in tech is on a slippery…

Centrify Perspective

Reflecting on Centrify’s Rethink Security Approach

By , August 21, 2017

In the last 12 months, Centrify is the only company to be acknowledged for it’s  vision and leadership in the Gartner Magic Quadrant for Identity and Access Management-as-a-Service,  The Forrester Wave: Privileged Identity Management, and in the Gartner Critical Capabilities for IDaaS Research for Workforce to SaaS, 2016. These acknowledgements demonstrate our growing influence in the industry with a unique point of view for customers who recognize the increased value in securing access for all enterprise identities in one, built from the ground up platform vs. the point solutions offered by others in the industry. Our mantra has been and…

Hot Topics

Breaches Rank in Top Three Negative Impacts on Brand Reputation – Above CEO Scandal

By , June 26, 2017

A recent Ponemon Institute study set out to examine the attitudes and perspectives of three key stakeholder populations inside a business environment: Marketing practitioners, IT practitioners and consumers. A key objective of the Centrify-sponsored study was to understand the impact of a data breach on a company’s customers, stock price and overall brand reputation. Among the survey’s key findings: A data breach now outranks a scandal involving the CEO in terms of adverse impact on a company’s reputation. In fact, breaches ranked in the top three most negative events, following shoddy customer service and an environmental incident. Negative Affects on…

Hot Topics

Why So Few Women in Cybersecurity?

By , May 8, 2017

I’ve seen quite a few articles lately on why there aren’t more women in cybersecurity. It’s a good question, but I think to answer that, we have to look at tech in general. First, let’s step back and acknowledge the progress that has been made. Today’s average tech company looks nothing like it did in the 1980s when I was earning a bachelor’s degree in computer science and then later a master’s degree in business. At that time, women working in any roles in technology were a minority. Today, that’s improved in a number of areas within tech including marketing,…

Hot Topics

Confronting the New Cyber Security Reality: Part 2

By , April 12, 2017

Since 2013, breaches have compromised nearly six billion records—that’s an average of almost four million records every day and over 162,000 records every hour! It’s time to face the facts. Today’s security is no longer secure. Enterprise networks have expanded beyond traditional perimeters to include more devices, apps (on-premises and in the cloud) and people. In the absence of these boundaries, the identities that make up modern enterprises are easier to compromise than ever before, and hackers are targeting these identities at an alarming rate. In fact, Forrester estimates 80% of security breaches involve privileged credentials. Traditional security approaches, like passwords…

Hot Topics

Confronting the New Cyber Security Reality: Part 1

By , March 14, 2017

During the peak of the 2016 U.S. presidential election cycle, two groups of hackers accessed the Democratic National Convention servers. The leak made public emails detailing the DNC’s interactions with the media, both primary candidates’ campaigns and campaign contributions, and personal information about DNC donors, including credit card and Social Security numbers. This historical breach will forever be known for its impact on the 2016 Presidential election. Recently, we’ve seen the frequency of breaches like the DNC attack skyrocket—and no organization is safe. Over the past two years, sixty-six percent of organizations report experiencing five or more breaches, according to…