Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Sounil Yu Joins YL Ventures as Chief Information Security Officer-in-Residence

Sounil Yu
April 6, 2020

YL Ventures, the Silicon Valley venture capital firm investing in Israeli cybersecurity startups, announced that Sounil Yu, former Chief Security Scientist at Bank of America, will join the YL Ventures team as its full-time CISO (Chief Information Security Officer)-in-Residence.

Sounil’s world-class cybersecurity expertise further enriches YL Ventures’ ability to provide entrepreneurs – pre- and post-investment – first-hand insights into product development, customer needs and how global enterprises evaluate cybersecurity vendors and their solutions.

Prior to joining YL Ventures, Sounil spent seven years at Bank of America, most recently as their Chief Security Scientist, leading a cross-functional team focused on driving cybersecurity innovation by leveraging unconventional thinking and alternative approaches to address key challenges in cybersecurity.

Sounil is the creator of the influential Cyber Defense Matrix, a popular tool for organizing, evaluating and discovering security capabilities and solutions, and the inventor of the DIE Resiliency Framework which has shaped the views of the overall security ecosystem. In a career spanning more than three decades, he has enjoyed productive tenures supporting Fortune 100 firms and national security organizations. Sounil is a consummate cybersecurity professional, with 22 granted patents encompassing threat modeling, intrusion monitoring, endpoint security, attribution and other cybersecurity and IT disciplines.

Sounil’s knowledge, experience, industry-wide reputation and considerable network will help him vet investment candidates and advise start-up founders. “I’m eager to be working with Israeli entrepreneurs, especially those that operate on the frontlines of cybersecurity. I also hope to put the Cyber Defense Matrix to the test to gauge how it can help them discover capability gaps in the market, reveal common patterns and develop solutions to fill those gaps.”

In a natural progression from his current participation in the YL Ventures’ Venture Advisory Board (consisting of 80+ cybersecurity experts and executives from global enterprises), as CISO-in-Residence, Sounil will continue to foster the success of early-stage portfolio companies. Moreover, he will work directly with entrepreneurs pre- and post-investment, supporting their ideation processes, highlighting green field market opportunities, validating their value propositions, refining go-to-market strategies and optimizing their early-stage success in closing paying customers.

“Security teams have continuously evolving needs that require ingenuity and the best minds to develop elegant solutions,” commented Sounil. “YL Ventures attracts some of the most brilliant minds from the Israeli tech community and directs their talent and energy towards addressing these needs. YL Ventures’ portfolio is well known for bringing forward-thinking deep technology solutions with lasting value to enterprise customers.” he added.

“Sounil will play a key role in our mission to support the cybersecurity industry’s most brilliant entrepreneurs and foster game-changing cybersecurity startups,” noted YL Ventures Managing Partner, Yoav Leitersdorf. “Sounil’s unique vision, impressive stature and unparalleled track record in cybersecurity will amplify our team’s multi-disciplinary expertise dedicated to making portfolio companies competitive and valuable.”

Sounil replaces Roger Hale in the CISO-in-Residence role. Hale will continue supporting YL Ventures as a Venture Advisor.

KEYWORDS: Chief Information Security Officer (CISO) cyber security cybersecurity information security IT security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Sounil Yu

    5 Minutes with Sounil Yu, CISO-in-Residence at YL Ventures

    See More
  • Ryan_Gurney

    Ryan Gurney joins YL Ventures as CISO-in-Residence

    See More
  • SEC0920-cover-feat14-slide-Yu-900x550

    Security's Most Influential People in Security 2020 - Sounil Yu

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing