Deceptive Bytes appointed Gidon Pely as a board member
Deceptive Bytes is happy to announce Gidon Pely joining as its board member, helping in the strategic planning for the company’s growth.

With over 25 years of experience in the Cyber security & Fintech markets, Gidon is a business advisor to boards and senior management, specializing in corporate development and sales & business strategy.
Gidon’s vast experience includes Accellion and prior to that as the VP of Business Development & Strategic partners at CyberArk (NASDAQ: CYBR), playing a leading role in the company’s path toward becoming a public company. Before Joining CyberArk, Gidon was VP of sales in Digital-Compaq and served in the Israeli Prime minister’s office.
In the last few years, he also serves as a member of various international board committees and advisory boards.
Gidon earned his B.A. from the Open University – Israel, specializing in Economics & Psychology.
“Gidon is a great addition to our board and we’re happy to have him with us. He is a seasoned business leader, as he brings many years of experience in the corporate, startup & cyber worlds.
Gidon will be an integral part of the implementation of our growth strategy for the coming years as we help shape the future of the endpoint security market with our Active Endpoint Deception platform.”
Sagi Lamay, CEO
Don’t Miss a Thing
Sign up today and we’ll send an email when new posts come out.
We collect and use this information in accordance with our privacy policy.
Related content

Deceptive Bytes mentioned in Gartner’s research on Top Use Cases in Preemptive Cyber Defense
18/11/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Case study – preventing Malgent trojan horse
12/09/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

The Role of Large Language Models in Enhancing Ransomware and Malware Threats
22/08/2024
Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...