Steve Grobman

Steve Grobman is senior vice president and chief technology officer at McAfee. In this role, he sets the technical strategy and direction to create technologies that protect smart, connected computing devices and infrastructure worldwide. He leads McAfee’s development of next-generation cyberdefense and data science technologies, threat and vulnerability research, and internal CISO and IT organizations.

Prior to joining McAfee, he dedicated more than two decades to senior technical leadership positions related to cybersecurity at Intel Corporation, where he was an Intel Fellow.

He has written numerous technical papers and books and holds 27 U.S. patents. He earned his bachelor's degree in computer science from North Carolina State University.
I had the pleasure of sitting on a panel at CyberScoop’s CyberTalks event this week, which coincides this year with the RSA 2018 Conference in San Francisco. Our discussion focused on the need to protect election systems from would-be hackers seeking to change results, sow discord in our election processes, and undermine confidence in our ...
Read Blog
In a technology-driven age, entrepreneurs, organizations, and nations succeed or fail in large part based on how effectively they develop, implement, and protect technology. One of the most notable aspects of “The Economic Impact of Cybercrime” report released recently is the prominence of cyber espionage, the cyber-theft of intellectual property (IP) and business confidential information. ...
Read Blog
My last post discussed the challenges of working to out-innovate our adversaries given the growing variety of objectives they might pursue, and the growing variety of methods they might use in pursuit of those objectives. As mentioned, part of the answer to these challenges lies in thinking differently about threat defense, and in understanding that ...
Read Blog
Deep down, if I think about who I am, I’m a scientist who loves to solve problems. If you think about cybersecurity, its problems are unique in that we are not only competing against industry competitors, we are also competing against the adversaries behind the cyber-attacks. My recent keynote at MPOWER17 Las Vegas focused on ...
Read Blog