“Having built multiple, successful software companies over the span of 15 years, you come to know the successful DNA that it takes to go from Zero to One. Jacek has it. We / I feel very blessed to have him as the COO of Enflux. It is clear that Jacek will have an immeasurable impact on the company and I'm proud to be associated with him. ”
About
Hands-on revenue focused operator with experience in scaling of B2B/SaaS focused…
Activity
-
New hire! Help us welcome Marek Ceglarz to the Full Circle Insights team! 🎉 Marek has completed his second week and is crushing it already! 🔥 He…
New hire! Help us welcome Marek Ceglarz to the Full Circle Insights team! 🎉 Marek has completed his second week and is crushing it already! 🔥 He…
Liked by Jacek Materna
-
Is Marketing Attribution really dead? Not if done right. There's been chatter about the decline of traditional attribution methods, but it’s not…
Is Marketing Attribution really dead? Not if done right. There's been chatter about the decline of traditional attribution methods, but it’s not…
Posted by Jacek Materna
-
Why People Love Salesforce CRM! Salesforce CRM is a game-changer because it: 🌟Simplifies workflows with an intuitive, easy-to-use…
Why People Love Salesforce CRM! Salesforce CRM is a game-changer because it: 🌟Simplifies workflows with an intuitive, easy-to-use…
Liked by Jacek Materna
Experience
Education
Volunteer Experience
-
Advisor
Build Sec Foundry
- Present 8 years 11 months
Science and Technology
Build Sec Foundry is part of a cybersecurity initiative powered by the San Antonio Chamber of Commerce. Our program accelerates startups to build innovative solutions for a secure future. We are housed in Geekdom in the downtown tech district and currently support three local cyber-security product startups: Symmetry, Level Effect, and InfoCyte.
http://buildsecfoundry.com -
Advisor
RealCo Micro VC
- Present 7 years 9 months
Science and Technology
RealCo is a long-term accelerator that invests in, incubates, and accelerates B2B tech startups. I Talk to awesome founders about their new ventures.
realco.com -
Board Treasurer
SYLVAN-HIGHLANDS NEIGHBORHOOD ASSOCIATION
- Present 2 years 3 months
Civil Rights and Social Action
https://sylvanhighlands.org/
-
Founding Member
Tech Bloc
- 5 years 4 months
Science and Technology
San Antonio Tech is on the rise. Tech Bloc was launched to activate and advance technology and entrepreneurism in the city to make it a vibrant place to live and work.
https://www.satechbloc.com -
Mentor
Alamo Heights High School
- 9 months
Education
Incubator Program.
I help student teams build business startups going from 0-1 ending with a $10,000 Pitch night in front of real investors. Think shark tank meets high schools kids. It's really a lot of fun watching kids go from the beginning the end of the program. -
Mentor
CyberPatriot Teams
- 2 years 2 months
Science and Technology
Mentored 10 CyberPatriot Teams in San Antonio spanning Junior and Seniors. Prepped team to go all the way at CyberPatriot VIII in Baltimore.
https://www.uscyberpatriot.org -
Organizer
CyberDEF Dojo
- 1 year 9 months
Science and Technology
Largest cyber-security community in Antonio. Helped re-launch the community and found its new home at SecureLogix HQ - aggressively expanded membership by 500 during my time.
www.cyberdefdojo.com
Publications
-
On-Premise Is Dead, Long Live On-Premise
Forbes
Over the past decade, information technology (IT) has seen a huge transformation. Cloud computing has changed the way we all work and consume software. Cloud has become so pervasive that if you asked most people in tech today, they’d probably tell you on-premise is dead and companies either run on the cloud or are moving to the cloud. This is true. However, on-premise is not dead; it’s just being redefined. In fact, over three million servers were shipped worldwide in the first quarter of 2018…
Over the past decade, information technology (IT) has seen a huge transformation. Cloud computing has changed the way we all work and consume software. Cloud has become so pervasive that if you asked most people in tech today, they’d probably tell you on-premise is dead and companies either run on the cloud or are moving to the cloud. This is true. However, on-premise is not dead; it’s just being redefined. In fact, over three million servers were shipped worldwide in the first quarter of 2018 alone -- a record that’s set to increase by as much as 25% in the year ahead.
-
GDPR is here, but it doesn’t mean your business is done prepping
TheNextWeb
It’s been just a few weeks since the General Data Protection Regulation came into effect, and aside from some high level lawsuits from activist lawyers looking to prove a point, it’s been pretty much business as usual.
-
Key articles in the GDPR for the enterprise
CSOOnline
Major data breaches are on the rise and information law is rising in response. The GDPR is perhaps the most prominent example of this shift to a more customer-centric data protection ideology.
-
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
McGraw-Hill Osborne Media
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new…
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
See how hackers target vulnerable UC devices and entire networks
Defend against TDoS, toll fraud, and service abuse
Block calling number hacks and calling number spoofing
Thwart voice social engineering and phishing exploits
Employ voice spam mitigation products and filters
Fortify Cisco Unified Communications Manager
Use encryption to prevent eavesdropping and MITM attacks
Avoid injection of malicious audio, video, and media files
Use fuzzers to test and buttress your VoIP applications
Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTCOther authorsSee publication -
Can the cloud model save Industrial Manufacturing?
Medium
Large industrial manufacturing organizations are digitally transforming by adopting the same flexibility and agile principles as cloud software companies.
-
Secure Software Development Lifecycle— SDLC — Why Bounty Programs Are A Good Fit
Medium
Defense in Depth
-
Security starts at source code — in the cloud
CSO Online
Enterprises are overwhelmed, spending more every year and still losing. Something is missing. By ignoring the root cause of the issue, vendors are simply stacking more and more software on top the same post-deployment problem.
-
Shadow IT — it’s not what you think.
Hackernoon/Medium
Despite its negative, chaotic connotation, shadow IT offers some of the most exciting opportunities for startups and investors looking to power next generation business applications. The opportunity behind shadow IT is an increasingly growing market that impacts every digital transforming organization in the world.
Patents
-
BIOMETRIC MOBILE AUTHENTICATION FOR REAL-TIME COMMUNICATIONS
Filed US US20170076076A1
An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element…
An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element and the third-party database communicate.
Other inventorsSee patent -
CLOUD BASED COMMERCIAL LOAN SERVICING SYSTEM
Filed US 62,241,268
This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the…
This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the construction industry in which, from time to time, borrowers may misapply loan proceeds so that invoices unrelated to the specific project are paid and invoices related to the project go unpaid, thus impairing the credit rating of the borrower, reducing cash available to the vendor and damaging the collateral rights of the lender.
-
Systems and methods for voip network security
Filed US US 20100064362 A1
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting…
According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting module for fingerprinting VoIP applications based on responses received to specific queries and a correlation module for correlating the information from the port scanner module, the service detection module, and the fingerprinting module to identify the instances of the discovered assets.
Other inventorsSee patent
Languages
-
English
Native or bilingual proficiency
-
French
Professional working proficiency
-
Polish
Native or bilingual proficiency
Recommendations received
12 people have recommended Jacek
Join now to viewMore activity by Jacek
-
ABM and Performance Marketing: Today's GTM Most B2B companies are embracing a hybrid go-to-market strategy, balancing both account-level and…
ABM and Performance Marketing: Today's GTM Most B2B companies are embracing a hybrid go-to-market strategy, balancing both account-level and…
Posted by Jacek Materna
-
Last week the Full Circle Insights crew came together at our San Antonio, TX HQ for an unforgettable on-site. We got down to business with roadmap…
Last week the Full Circle Insights crew came together at our San Antonio, TX HQ for an unforgettable on-site. We got down to business with roadmap…
Liked by Jacek Materna
-
Does your board reporting drown your MOps team in busy work for days? Here's what often happens a few days before the board meeting: - Ops pulls 12…
Does your board reporting drown your MOps team in busy work for days? Here's what often happens a few days before the board meeting: - Ops pulls 12…
Liked by Jacek Materna
-
The ❄️ season is nearly here! The Illumio Marketing Ops team is gearing up for our 2nd annual team trip. 🏂 A blend of teamwork, fun, and fresh 🏔️…
The ❄️ season is nearly here! The Illumio Marketing Ops team is gearing up for our 2nd annual team trip. 🏂 A blend of teamwork, fun, and fresh 🏔️…
Liked by Jacek Materna
-
After a very rewarding 11+ years at JetBrains, I'm excited to share that I will be joining Duende Software, Inc. in January. Thanks, JetBrains, for a…
After a very rewarding 11+ years at JetBrains, I'm excited to share that I will be joining Duende Software, Inc. in January. Thanks, JetBrains, for a…
Liked by Jacek Materna
-
Help us welcome Tomas Cruz to the Full Circle Insights team! 🎉 Tomas joined us two weeks ago helping optimize our social media channels and…
Help us welcome Tomas Cruz to the Full Circle Insights team! 🎉 Tomas joined us two weeks ago helping optimize our social media channels and…
Liked by Jacek Materna
-
Something so simple could be wreaking havoc on your reporting, sales process, and systems integrations. That thing? Duplicates…
Something so simple could be wreaking havoc on your reporting, sales process, and systems integrations. That thing? Duplicates…
Liked by Jacek Materna
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More