Jacek Materna

Jacek Materna

San Antonio, Texas, United States
2K followers 500+ connections

About

Hands-on revenue focused operator with experience in scaling of B2B/SaaS focused…

Activity

Join now to see all activity

Experience

  • Full Circle Insights Graphic

    Full Circle Insights

    San Antonio, Texas, United States, Warsaw, Poland

  • -

    United States

  • -

    United States

  • -

    United States

  • -

    Portland, New York City, United States

  • -

    San Antonio, Krakow, Poland

  • -

    San Antonio, Texas, United States

  • -

    Ottawa, Canada Area

  • -

    Ottawa, Canada Area

  • -

    Ottawa, Canada Area

Education

Volunteer Experience

  • Build Sec Foundry Graphic

    Advisor

    Build Sec Foundry

    - Present 8 years 11 months

    Science and Technology

    Build Sec Foundry is part of a cybersecurity initiative powered by the San Antonio Chamber of Commerce. Our program accelerates startups to build innovative solutions for a secure future. We are housed in Geekdom in the downtown tech district and currently support three local cyber-security product startups: Symmetry, Level Effect, and InfoCyte.

    http://buildsecfoundry.com

  • RealCo Micro VC Graphic

    Advisor

    RealCo Micro VC

    - Present 7 years 9 months

    Science and Technology

    RealCo is a long-term accelerator that invests in, incubates, and accelerates B2B tech startups. I Talk to awesome founders about their new ventures.

    realco.com

  • SYLVAN-HIGHLANDS NEIGHBORHOOD ASSOCIATION Graphic

    Board Treasurer

    SYLVAN-HIGHLANDS NEIGHBORHOOD ASSOCIATION

    - Present 2 years 3 months

    Civil Rights and Social Action

    https://sylvanhighlands.org/

  • Forbes Technology Council Graphic

    Member

    Forbes Technology Council

    - Present 6 years 8 months

  • Tech Bloc Graphic

    Founding Member

    Tech Bloc

    - 5 years 4 months

    Science and Technology

    San Antonio Tech is on the rise. Tech Bloc was launched to activate and advance technology and entrepreneurism in the city to make it a vibrant place to live and work.

    https://www.satechbloc.com

  • Mentor

    Alamo Heights High School

    - 9 months

    Education

    Incubator Program.

    I help student teams build business startups going from 0-1 ending with a $10,000 Pitch night in front of real investors. Think shark tank meets high schools kids. It's really a lot of fun watching kids go from the beginning the end of the program.

  • Mentor

    CyberPatriot Teams

    - 2 years 2 months

    Science and Technology

    Mentored 10 CyberPatriot Teams in San Antonio spanning Junior and Seniors. Prepped team to go all the way at CyberPatriot VIII in Baltimore.

    https://www.uscyberpatriot.org

  • Organizer

    CyberDEF Dojo

    - 1 year 9 months

    Science and Technology

    Largest cyber-security community in Antonio. Helped re-launch the community and found its new home at SecureLogix HQ - aggressively expanded membership by 500 during my time.

    www.cyberdefdojo.com

Publications

  • On-Premise Is Dead, Long Live On-Premise

    Forbes

    Over the past decade, information technology (IT) has seen a huge transformation. Cloud computing has changed the way we all work and consume software. Cloud has become so pervasive that if you asked most people in tech today, they’d probably tell you on-premise is dead and companies either run on the cloud or are moving to the cloud. This is true. However, on-premise is not dead; it’s just being redefined. In fact, over three million servers were shipped worldwide in the first quarter of 2018…

    Over the past decade, information technology (IT) has seen a huge transformation. Cloud computing has changed the way we all work and consume software. Cloud has become so pervasive that if you asked most people in tech today, they’d probably tell you on-premise is dead and companies either run on the cloud or are moving to the cloud. This is true. However, on-premise is not dead; it’s just being redefined. In fact, over three million servers were shipped worldwide in the first quarter of 2018 alone -- a record that’s set to increase by as much as 25% in the year ahead.

    See publication
  • GDPR is here, but it doesn’t mean your business is done prepping

    TheNextWeb

    It’s been just a few weeks since the General Data Protection Regulation came into effect, and aside from some high level lawsuits from activist lawyers looking to prove a point, it’s been pretty much business as usual.

    See publication
  • Key articles in the GDPR for the enterprise

    CSOOnline

    Major data breaches are on the rise and information law is rising in response. The GDPR is perhaps the most prominent example of this shift to a more customer-centric data protection ideology.

    See publication
  • Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

    McGraw-Hill Osborne Media

    Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new…

    Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

    See how hackers target vulnerable UC devices and entire networks
    Defend against TDoS, toll fraud, and service abuse
    Block calling number hacks and calling number spoofing
    Thwart voice social engineering and phishing exploits
    Employ voice spam mitigation products and filters
    Fortify Cisco Unified Communications Manager
    Use encryption to prevent eavesdropping and MITM attacks
    Avoid injection of malicious audio, video, and media files
    Use fuzzers to test and buttress your VoIP applications
    Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

    Other authors
    See publication
  • Can the cloud model save Industrial Manufacturing?

    Medium

    Large industrial manufacturing organizations are digitally transforming by adopting the same flexibility and agile principles as cloud software companies.

    See publication
  • Security starts at source code  —  in the cloud

    CSO Online

    Enterprises are overwhelmed, spending more every year and still losing. Something is missing. By ignoring the root cause of the issue, vendors are simply stacking more and more software on top the same post-deployment problem.

    See publication
  • Shadow IT — it’s not what you think.

    Hackernoon/Medium

    Despite its negative, chaotic connotation, shadow IT offers some of the most exciting opportunities for startups and investors looking to power next generation business applications. The opportunity behind shadow IT is an increasingly growing market that impacts every digital transforming organization in the world.

    See publication

Patents

  • BIOMETRIC MOBILE AUTHENTICATION FOR REAL-TIME COMMUNICATIONS

    Filed US US20170076076A1

    An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element…

    An authentication system generally includes an authentication application, a cloud element, a third-party database, a mobile device, and an authentication consumer. The authentication system further includes a network, whereby the mobile device and the cloud element communicate; a network, whereby a user and the mobile device communicate with the authentication consumer; a network, whereby the cloud element and the authentication consumer communicate; and a network whereby the cloud element and the third-party database communicate.

    Other inventors
    See patent
  • CLOUD BASED COMMERCIAL LOAN SERVICING SYSTEM

    Filed US 62,241,268

    This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the…

    This invention relates to commercial loan servicing processes and, more specifically, to a loan funds control methodology that is utilized in loan funds distribution including incremental loan funding based on validated budgets, purchase orders and invoices and on validated payment of such invoices, thereby reducing the risk of such loans for all parties subject to the use and ownership of the loan. The use of the invention may be illustrated in its application of the invention in the construction industry in which, from time to time, borrowers may misapply loan proceeds so that invoices unrelated to the specific project are paid and invoices related to the project go unpaid, thus impairing the credit rating of the borrower, reducing cash available to the vendor and damaging the collateral rights of the lender.

  • Systems and methods for voip network security

    Filed US US 20100064362 A1

    According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting…

    According to an aspect of the present invention there is provided a VoIP asset discovery system for discovering and identifying VoIP assets on a VoIP network, the asset discovery system comprising an IP address module for determining at least one IP address to discover, a port scanner for scanning VoIP specific ports of the received IP addresses, a service detection module for detecting a VoIP service at the received IP addresses. The asset discovery system further comprises a fingerprinting module for fingerprinting VoIP applications based on responses received to specific queries and a correlation module for correlating the information from the port scanner module, the service detection module, and the fingerprinting module to identify the instances of the discovered assets.

    Other inventors
    See patent

Languages

  • English

    Native or bilingual proficiency

  • French

    Professional working proficiency

  • Polish

    Native or bilingual proficiency

Recommendations received

More activity by Jacek

View Jacek’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jacek directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Jacek Materna

Add new skills with these courses