EB

Eyal Benishti

CEO at IRONSCALES and 4 other companies
On the record
Represented by:
Share profile 
Link:
Bio
Edit

As Chief Executive Officer at IRONSCALES, Eyal Benishti pioneered the development of the world’s first self-learning email security solution that combines AI, machine learning, and human insights to automatically stop advanced phishing, BEC, and account takeover attacks.

Eyal brings to his executive leadership role over 15 years of software industry experience with enterprise and startup companies. Prior to founding IRONSCALES in 2013, he was a security researcher and malware analyst at Radware and worked as technical lead for various information security solutions at Imperva.

Previously, he held a variety of R&D roles with Comverse and Amdocs. A passionate cybersecurity researcher from a young age, Eyal earned his bachelor’s degree in computer science and mathematics from Bar-Ilan University in Israel.

Employment
Sign up to view all
  • Rogue Content: A Growing Threat Beyond Shadow IT
    Eyal warns that rogue content, unlike Shadow IT, "lacks control, leading to security and compliance blindspots." Common sources include personal cloud storage and generative AI. He suggests using AI/ML models for detection and stresses the role of organizational culture in its spread. Eyal urges investment in AI detection technologies to combat these evolving threats.
  • Defending Against Deepfakes: A Multi-Layered Approach
    Eyal emphasizes a multi-faceted defense against deepfakes, combining technology, training, and policy measures. "Emerging AI tools can detect synthetic manipulations," he notes. Robust security-awareness training and strict verification protocols are crucial. Organizations should focus on financial operations, adopt secondary verification for high-risk requests, and have a crisis management plan to mitigate potential attacks.
  • CIOs Urged to Combat Voice Cloning Threats with Education and Verification
    Eyal warns of the "Wild West era" of deepfake tech, urging CIOs to adopt education, verification protocols, and interactive testing. He emphasizes training on deepfake indicators and phishing simulations. Implementing verification policies like segregation of duties and multi-step authentication, along with fostering a culture of skepticism, are key to defending against voice cloning threats.
Recent Quotes
Sign up to view all
  • While email phishing is the oldest and most recognizable cyberattack technique, it remains an extremely complex problem that today requires the power of both artificial and human intelligence in an ongoing cycle of innovation for it to have any positive effect on an organization’s security posture.

Headshots