Steve Grobman

Steve Grobman is senior vice president and chief technology officer (CTO) for McAfee. In this role, Grobman sets the technical strategy and direction to create technologies which protect smart, connected computing devices and infrastructure worldwide. He drives McAfee innovation and leads thousands of technical resources to deliver robust and sophisticated cybersecurity solutions that protect corporate and consumer assets. Grobman is a trusted advisor to the industry and media in the field of cybersecurity defense and the evolving threat landscape.

Prior to joining McAfee, Grobman was at Intel where he spent over two decades in senior technical leadership positions related to the field of cybersecurity. His roles varied from protecting Intel’s own assets as an IT security architect to building new security architecture into hardware and software as the chief architect for Intel’s vPro platform. After the acquisition of McAfee in 2012, Grobman moved into the CTO office to drive new research and innovation capabilities for the division and was named worldwide CTO in 2014.

He has published multiple technical papers and books, and holds 24 U.S. and international patents in the fields of security, software, and computer architecture, with another roughly 20 patents pending.

Grobman earned his bachelor's degree in computer science from North Carolina State University.
I had the pleasure of sitting on a panel at CyberScoop’s CyberTalks event this week, which coincides this year with the RSA 2018 Conference in San Francisco. Our discussion focused on the need to protect election systems from would-be hackers seeking to change results, sow discord in our election processes, and undermine confidence in our ...
Read Blog
In a technology-driven age, entrepreneurs, organizations, and nations succeed or fail in large part based on how effectively they develop, implement, and protect technology. One of the most notable aspects of “The Economic Impact of Cybercrime” report released recently is the prominence of cyber espionage, the cyber-theft of intellectual property (IP) and business confidential information. ...
Read Blog
My last post discussed the challenges of working to out-innovate our adversaries given the growing variety of objectives they might pursue, and the growing variety of methods they might use in pursuit of those objectives. As mentioned, part of the answer to these challenges lies in thinking differently about threat defense, and in understanding that ...
Read Blog
Deep down, if I think about who I am, I’m a scientist who loves to solve problems. If you think about cybersecurity, its problems are unique in that we are not only competing against industry competitors, we are also competing against the adversaries behind the cyber-attacks. My recent keynote at MPOWER17 Las Vegas focused on ...
Read Blog
Artificial intelligence and machine learning have never been more prominent in the public forum. CBS’s 60 Minutes recently featured a segment promising myriad benefits to humanity in fields ranging from medicine to manufacturing. World chess champion Garry Kasparov recently debuted a book on his historic chess game with IBM’s Deep Blue. Industry luminaries continue to opine about the ...
Read Blog
The morning of Friday, May 12 multiple sources in Spain began reporting an outbreak of the ransomware now identified as WannaCry. Upon learning of these incidents, McAfee immediately began working to analyze samples of the ransomware and develop mitigation guidance and detection updates for its customers. By Friday afternoon, McAfee's Global Threat Intelligence system was ...
Read Blog