4.2 • 365 Ratings
🗓️ 4 June 2025
⏱️ 29 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome back to Equity, TechCrunch's flagship podcast about the business of startups. |
0:16.1 | I'm Rebecca Boulon, and this is the episode where we bring on industry experts to help us explore a trend in the tech world and dive deep. |
0:22.3 | With the $50 billion Chinese AI market, potentially slipping out of reach for U.S. chipmakers like |
0:27.1 | NVIDIA and with cyber threats escalating from state actors and criminal groups alike, |
0:31.5 | it's a strong reminder of just how connected tech and geopolitics really are. If you understand that better than today's guest, Dmitri El |
0:37.6 | Paravich, co-founder and former CTO of CrowdStrike, bestselling author, and chairman of the |
0:42.3 | Silverado Policy Accelerator. Dmitri, welcome to the show. Thanks so much for having me. |
0:47.2 | Really appreciate you being here. I don't know if we have time to go over all of your |
0:50.5 | accolades and your entire pedigree, But I'd love to hear a little bit about |
0:54.2 | you starting CrowdStrike and working there until what was at 2020. Yeah, I've been in |
0:59.5 | cybersecurity industry, really my entire life. I started company with my dad when I was still |
1:04.0 | in high school, focused on cryptography, the emerging field of encryption, study in college. |
1:10.5 | CrowdStrike really came out of an investigation |
1:13.2 | I had done. I was an executive at a company called McAfee, which was at the time one of the biggest |
1:18.2 | cybersecurity firms. And in January of 2010, I worked together with Google, who had been |
1:24.4 | compromised by the Chinese nation-state operators at the time, and I investigated |
1:29.8 | that operation, realized that there were many other victims that were involved in that intrusion, |
1:34.8 | and they were focused on stealing intellectual property from these companies that they were |
1:38.8 | also going after at Google specifically email accounts of dissidents, Tibetan dissidents and others that the Chinese |
1:45.6 | wanted to surveil. But this was really the first time that the public had learned that |
1:50.5 | nation state hackers were not just targeting governments that were not just engaged in traditional |
1:55.3 | espionage. They were also stealing massive amounts of intellectual property. And then over |
... |
Transcript will be available on the free plan in 1 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from TechCrunch, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechCrunch and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.