Kenna Security is now part of Cisco

|Learn more

Borrow a Bee for a Day!

Oct 28, 2011
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Here at HoneyApps, we’ve been fortunate enough to have built a great team of really talented individuals. In the spirit of Thanksgiving a few of our employees have decided to give back by allowing you to borrow them and their skills for a day. The catch? You make a donation to a charity agreed to by you and the worker bee. In fact, timing, location, and type of work is to be decided by you and the worker bee. Interested? Get in touch with one of the bees!

  • Jason Rohwedder – jro@risk.io – Jason is donating two separate days before the end of the year and would prefer the donation to benefit orphaned children or victims of human trafficking. Jason is skilled in most things dev+ops, likes cloud architecture, systems and application monitoring, provisioning and automating with chef, RPM packaging, and, of course, Ruby on Rails.  You can find out more about his experiences through his LinkedIn profile.
  • Andrea Bailiff-Gush – andrea@risk.io – Andrea is donating a day during the month of November for her digital marketing services. Andrea is skilled in marketing strategy and analytics through SEM, SEO, PR, affiliate marketing, website design and social media, messaging and product positioning and working with influencers to getting product visiblity in a market. Andrea’s LinkedIn profilegives additional information on her skill set and background. Andrea would prefer for her donation to benefit hunger relief.
  • Ed Bellis – ed@risk.io – Ed is donating a day of information security and risk management consulting. He has been working in Information Security and Technology for nearly 20 years, most recently as the CISO of Orbitz. You can take a look at his LinkedIn profile to get a better understand of his background and skills. Having lost his father to cancer over 10 years ago, he would love to give a donation to the American Cancer Society in exchange for his services.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.