Chief Executive Officer and Co-Founder
Prior to starting PhishMe, Rohyt has served as Managing Director at Mandiant, Principal Consultant at Foundstone, and Researcher at the Software Engineering Institute. He is also an Adjunct Professor at Carnegie Mellon University.
He is a contributing author for Osborne's Hack Notes – Network Security, as well as Addison Wesley's Extrusion Detection: Security Monitoring for Internal Intrusions.
Rohyt is a regular speaker at various industry conferences including Black Hat, OWASP, Hack in the Box, InfoSec World, and several forums catering to the FBI, US Secret Service, and US Military.
He has written technical articles and columns for online publications like Securityfocus and SC magazine, and has been interviewed by CNBC, CNN, BBC, Forbes magazine, eWeek, and other mainstream media.
Rohyt holds a Bachelor of Engineering degree from Bombay University, and a Master of Science from Carnegie Mellon University.
Co-Founder and CTO
Aaron is the Co-Founder and CTO of PhishMe, Inc. directing all aspects of development and research that drives the feature set of this market leading solution. The PhishMe method for awareness training was incubated from consulting services provided by Intrepidus Group, a company that Aaron Co-Founded with Rohyt Belani in 2007. Aaron remains on the board of directors for Intrepidus Group to ensure it focuses on forging new service lines and attracting motivated researchers and consultants.
Before PhishMe and Intrepidus Group, Aaron served as Principal Consultant for McAfee’s Foundstone division where he was a lead instructor and known for his ability to mentor and develop junior consultants into expert penetration testers.
Prior to his seven years of consulting experience, Aaron worked for large Internet Service Providers handling security and abuse incidents, subpoena compliance, and datacenter security.
Aaron's biggest achievement is building industry recognized Intrepidus Group and incubating PhishMe out of it. He enjoys the diverse personalities in the information security community and is known for building creative environment’s needed to promote rich personal and professional development. His creative touch is evident in the unique way he recruits and retains talent and his style further extends itself into his leadership role at PhishMe.
Aaron is a speaker at regional conferences and associations as well large conferences such as BlackHat, DefCon, Shmoocon, etc. His expert opinion is a valuable resource for many media outlets interested in security.
Executive Vice President
Jim has over twenty-two years experience in sales, operations and executive management primarily focused in information security. His eleven years as a federal agent provided the opportunity to work a variety of highly publicized cases both in the United States and globally. Jim specializes in helping early to mid-stage companies develop revenue though services and product sales, build effective sales organizations and manage explosive growth.
Most recently, Jim was one of the founders and the Chief Operating Officer of Mandiant, an information security start-up focused on incident response and computer forensics. He drove corporate strategy, initial revenue development and delivery, as well as building the sales program, resulting in an average of 90% annual revenue growth over four years.
Previously, Jim held executive and management positions in both sales and consulting organizations to include Trident Data Systems (acquired by Veridian), Veritect (acquired by General Dynamics), Foundstone (acquired by McAfee) and Oakley Networks (acquired by Raytheon). Jim's last Law Enforcement position was serving as the Deputy Director of Computer Crime Investigations for the Air Force Office of Special Investigations. In this role, he provided oversight and onsite investigation into the penetration of the Department of Defense's systems around the globe. He appeared as an expert witness in both the United States and the United Kingdom on highly publicized cases. Jim's field experience includes numerous undercover operations in counter-narcotics and specialized operations as a part of the national surveillance team.
Jim holds a B.S. in Computer Science from St. Michaels College and is a regular presenter and guest lecturer on proactive information security and incident response. Jim authored a chapter in Hacker Challenge, and numerous articles in IT security publications.
Vice President, Product Management and Services
Scott Gréaux graduated from the Pennsylvania State University and has since held roles of increasing responsibility from application developer to CTO to President of a boutique marketing firm. Most recently Scott served as General Electric's Deputy Chief Information Security Officer where he led key global initiatives such as Policy and Policy Frameworks, Security Awareness, Advanced Threat initiative coordination and Information Security metric reporting. During his tenure he was uniquely positioned to see the threat of advanced phishing techniques and developed a multi-faceted program to address the phishing risk in a large enterprise.
Scott brings his extensive experience and unique blend of business management and creative marketing practice to PhishMe where he works with customers to develop robust anti-phishing programs. Greaux also oversees PhishMe’s managed service offering, support operations and leads PhishMe’s Customer Advisory Board where he works with customers and industry thought leaders to align PhishMe features with the ever changing threat landscape.
Director of Engineering
Doug has led the development and Engineering effort at PhishMe since April 2009. As PhishMe has grown, so have his responsibilities. Not only does Doug lead our team of talented developers, he also designs, plans, and oversees application and network architecture projects needed to support our rapidly expanding service offering.
Prior to joining the PhishMe team, Doug was a member of an elite team of security researchers at a defense contractor where he worked closely with operators and directors in the Defense and Intelligence communities. In that role he developed various web applications, custom servers, and proprietary protocols for prominent mission-critical national security operations.
Before his role in the defense community, Doug worked at an online advertisement company where he developed software which served tens-of-millions of advertisements daily and also was the sole developer for a domain parking service (for which he apologizes to the internet community ;).
Doug holds a Bachelor of Science from the University at Buffalo's School of Management.