Show Notes
Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a software engineer, expert in product and an entrepreneur.
Erik is great at asking questions, that is one of his superpowers. One of his strategies to build a product is to sit down with customers, ask them what they want him to do, deeply understand their persona, and gather data.
Erik builds his thesis for success, and knows how to distinguish a good company from a great company by analyzing which one has a philosophy that goes beyond the software.
Erik offers advice for listeners on how to operate better on their company.
1:03 - Intro
2:37 – Bio
6:18 – The difference between building a product and building a business
7:18 – What are Erik’s strengths based on his past experiences
9:20 – How Erik stays away from tinkering with the code, and more of the technical aspects
11:48 – Erik’s power of understanding the concepts by asking questions
13:19 – The difference between a good company and a great company
15:20 – What Erik thinks about the future of technology and the cyber security of the future
19:30 – Erik’s thoughts about automating security operation
26:07 – Erik’s advice for listeners to operate better in their company’s environment
27:50 – How to stay up to date with Panther Labs.
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Erik Goldman: Panther Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Visit our sponsor Panther Labs
Recent Episodes
Staying Ahead in the Age of AI Agents with Marco Figueroa
Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are ...
I Built an AI Version of Myself – Here’s Why with Marcus J. Carey
The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and ...
Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore ...
We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still ...
The AI Shift You Can’t Ignore with Marco Figueroa
AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty ...
Superhuman Productivity and AI Mastery with Pedram Amini
What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this ...
Cybersecurity Meets AI: The Good, The Bad & The Janky
There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make ...
A Human-Centric Approach to Cybersecurity with Edna Conway
What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to ...
Rise of the Machines: Why Your Attack Surface Has More Holes Than ...
Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product ...
How a Game Turned a Watchmaker into a Cybersecurity Pro with ...
What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and ...
Managing and Mitigating Cyber Risks For Your Assets with Jerich ...
What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon.