“Having built multiple, successful software companies over the span of 15 years, you come to know the successful DNA that it takes to go from Zero to One. Jacek has it. We / I feel very blessed to have him as the COO of Enflux. It is clear that Jacek will have an immeasurable impact on the company and I'm proud to be associated with him. ”
About
Hands-on revenue focused operator with experience in scaling of B2B/SaaS focused…
Activity
-
I’ve been interviewing demand generation leaders, and there are some amazing people out there. If you know one, send them my way—I need a rockstar…
I’ve been interviewing demand generation leaders, and there are some amazing people out there. If you know one, send them my way—I need a rockstar…
Liked by Jacek Materna
-
I've seen the future of SaaS pricing, and it's KINDA what you think. Here is the prediction that Nathan Latka recently said on the SaaS revolution…
I've seen the future of SaaS pricing, and it's KINDA what you think. Here is the prediction that Nathan Latka recently said on the SaaS revolution…
Liked by Jacek Materna
Experience
Education
Volunteer Experience
-
Advisor
Build Sec Foundry
- Present 9 years 3 months
Science and Technology
Build Sec Foundry is part of a cybersecurity initiative powered by the San Antonio Chamber of Commerce. Our program accelerates startups to build innovative solutions for a secure future. We are housed in Geekdom in the downtown tech district and currently support three local cyber-security product startups: Symmetry, Level Effect, and InfoCyte.
http://buildsecfoundry.com -
Advisor
RealCo Micro VC
- Present 8 years 1 month
Science and Technology
RealCo is a long-term accelerator that invests in, incubates, and accelerates B2B tech startups. I Talk to awesome founders about their new ventures.
realco.com -
Board Treasurer
SYLVAN-HIGHLANDS NEIGHBORHOOD ASSOCIATION
- 1 year 11 months
Civil Rights and Social Action
https://sylvanhighlands.org/
-
-
Founding Member
Tech Bloc
- 5 years 4 months
Science and Technology
San Antonio Tech is on the rise. Tech Bloc was launched to activate and advance technology and entrepreneurism in the city to make it a vibrant place to live and work.
https://www.satechbloc.com -
Mentor
Alamo Heights High School
- 9 months
Education
Incubator Program.
I help student teams build business startups going from 0-1 ending with a $10,000 Pitch night in front of real investors. Think shark tank meets high schools kids. It's really a lot of fun watching kids go from the beginning the end of the program. -
Mentor
CyberPatriot Teams
- 2 years 2 months
Science and Technology
Mentored 10 CyberPatriot Teams in San Antonio spanning Junior and Seniors. Prepped team to go all the way at CyberPatriot VIII in Baltimore.
https://www.uscyberpatriot.org -
Organizer
CyberDEF Dojo
- 1 year 9 months
Science and Technology
Largest cyber-security community in Antonio. Helped re-launch the community and found its new home at SecureLogix HQ - aggressively expanded membership by 500 during my time.
www.cyberdefdojo.com
Publications
-
GDPR is here, but it doesn’t mean your business is done prepping
TheNextWeb
It’s been just a few weeks since the General Data Protection Regulation came into effect, and aside from some high level lawsuits from activist lawyers looking to prove a point, it’s been pretty much business as usual.
-
Key articles in the GDPR for the enterprise
CSOOnline
Major data breaches are on the rise and information law is rising in response. The GDPR is perhaps the most prominent example of this shift to a more customer-centric data protection ideology.
-
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
McGraw-Hill Osborne Media
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new…
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
See how hackers target vulnerable UC devices and entire networks
Defend against TDoS, toll fraud, and service abuse
Block calling number hacks and calling number spoofing
Thwart voice social engineering and phishing exploits
Employ voice spam mitigation products and filters
Fortify Cisco Unified Communications Manager
Use encryption to prevent eavesdropping and MITM attacks
Avoid injection of malicious audio, video, and media files
Use fuzzers to test and buttress your VoIP applications
Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTCOther authorsSee publication -
Can the cloud model save Industrial Manufacturing?
Medium
Large industrial manufacturing organizations are digitally transforming by adopting the same flexibility and agile principles as cloud software companies.
-
Secure Software Development Lifecycle— SDLC — Why Bounty Programs Are A Good Fit
Medium
Defense in Depth
-
Security starts at source code — in the cloud
CSO Online
Enterprises are overwhelmed, spending more every year and still losing. Something is missing. By ignoring the root cause of the issue, vendors are simply stacking more and more software on top the same post-deployment problem.
-
Shadow IT — it’s not what you think.
Hackernoon/Medium
Despite its negative, chaotic connotation, shadow IT offers some of the most exciting opportunities for startups and investors looking to power next generation business applications. The opportunity behind shadow IT is an increasingly growing market that impacts every digital transforming organization in the world.
Patents
-
BIOMETRIC MOBILE AUTHENTICATION FOR REAL-TIME COMMUNICATIONS
Filed US US20170076076A1
An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element…
An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element and the third-party database communicate.
Other inventorsSee patent -
CLOUD BASED COMMERCIAL LOAN SERVICING SYSTEM
Filed US 62,241,268
This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the…
This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the construction industry in which, from time to time, borrowers may misapply loan proceeds so that invoices unrelated to the specific project are paid and invoices related to the project go unpaid, thus impairing the credit rating of the borrower, reducing cash available to the vendor and damaging the collateral rights of the lender.
-
Systems and methods for voip network security
Filed US US 20100064362 A1
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting…
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting module for fingerprinting VoIP applications based on responses received to specific queries and a correlation module for correlating the information from the port scanner module, the service detection module, and the fingerprinting module to identify the instances of the discovered assets.
Other inventorsSee patent
Languages
-
English
Native or bilingual proficiency
-
French
Professional working proficiency
-
Polish
Native or bilingual proficiency
Recommendations received
12 people have recommended Jacek
Join now to viewMore activity by Jacek
-
Faculty & admins—how do you handle category tagging? Manually tagging assessment items is time-consuming and inconsistent, yet it’s critical for…
Faculty & admins—how do you handle category tagging? Manually tagging assessment items is time-consuming and inconsistent, yet it’s critical for…
Liked by Jacek Materna
-
Yes, marketers, events still drive demand. They still are an efficient way to drive millions in pipeline. Yes, millions. Events, tradeshows, and…
Yes, marketers, events still drive demand. They still are an efficient way to drive millions in pipeline. Yes, millions. Events, tradeshows, and…
Liked by Jacek Materna
-
We all take it for granted that companies can trade off growth 💹 for profitability 💰. But that’s not necessarily true. Even if that’s what we've…
We all take it for granted that companies can trade off growth 💹 for profitability 💰. But that’s not necessarily true. Even if that’s what we've…
Liked by Jacek Materna
-
🚀 Did you know that 46% of Gen Z is considering alternatives to traditional college, like bootcamps, certifications, or direct-to-work pathways?…
🚀 Did you know that 46% of Gen Z is considering alternatives to traditional college, like bootcamps, certifications, or direct-to-work pathways?…
Liked by Jacek Materna
-
Soaking up marketing inspiration along with some sun at #B2BMX2025. Love that I can share this experience with my team while sharing some of my own…
Soaking up marketing inspiration along with some sun at #B2BMX2025. Love that I can share this experience with my team while sharing some of my own…
Liked by Jacek Materna
-
What an incredible night. #TheMortgageOffice took on Dallas and decided to host a happy hour for our clients after a few customer visits and shadows.…
What an incredible night. #TheMortgageOffice took on Dallas and decided to host a happy hour for our clients after a few customer visits and shadows.…
Liked by Jacek Materna
-
BREAKING: IBM to acquire DataStax in major AI deal. My interview with CEO Bosworth: IBM announced it is acquiring DataStax today. Lets reverse…
BREAKING: IBM to acquire DataStax in major AI deal. My interview with CEO Bosworth: IBM announced it is acquiring DataStax today. Lets reverse…
Liked by Jacek Materna
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More