The modern cloud is an essential resource for businesses of every size. Virtually limitless processing power and data storage create a platform that can streamline existing business models and create entirely new possibilities for revenue streams.
As more data moves to the cloud, however, security is an ever-increasing concern. Keeping data safe is a complex problem that requires sophisticated solutions. It’s about creating layers of security to cover every potential vulnerability: multidimensional threat protection.
To stay up-to-date on the continually evolving threat landscape, follow these experts.
Fifteen Influential Cybersecurity Experts To Follow
Dez Blanchfield—Strategy and Policy Consultant, Starboard IT
With more than 25 years of experience in the IT industry, Dez Blanchfield is a strategic leader in business and digital transformation. His specialties include cloud computing, big data and analytics, virtualization, and distributed computing—just to name a few. His company, Gara Guru, is a leading provider of digital business solutions for companies around the world.
Follow Dez Blanchfield: LinkedIn | Twitter
Brian Krebs—Reporter and Publisher, Krebs Security
Brian Krebs is an independent investigative journalist who has been writing about internet security—specifically, computer crime and underground cybercrime—for the past decade. At KrebsOnSecurity.com, Krebs updates his readers daily about computer security and cybercrime.
Follow Brian Krebs: LinkedIn | Twitter
Kevin Jackson—Founder, GovCloud Network
Kevin Jackson founded GovCloud Network to help professionals revolutionize their business models using advanced technology. At ATT Influencer 2018, he discussed eliminating the “wall and moat” cybersecurity mentality, introducing data-centric methods that reduce the risk associated with employee, third-party, and supplier access to company data.
Follow Kevin Jackson: LinkedIn | Twitter
Ken Westin—Senior Security Strategist, Splunk
Named “The Good Hacker” by Oregon Business Magazine, Ken Westin has trained and assisted law enforcement agencies in using advanced technologies and social media as investigative tools. His experience ranges from security to product development, and his expertise has been featured in Wired, Forbes, New York Times, and The Economist.
Follow Ken Westin: LinkedIn | Twitter
Kim Zetter—Senior Writer, Wired
Kim Zetter is a journalist who has written for Wired on topics of cybercrime, hackers, cyber warfare, and surveillance for more than a decade. She is also a speaker and the author of Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.
Follow Kim Zetter: LinkedIn | Twitter
Eleanor Dallaway—Editor, InfoSecurity Magazine
Eleanor Dallaway is the Editor of InfoSecurity Magazine, a publication that provides knowledge and insight into the information security industry. With nearly a decade’s worth of experience in the field, Dallaway is well-versed in information security, updating the magazine’s website on an hourly basis with industry news and trends.
Follow Eleanor Dallaway: LinkedIn | Twitter
Kevin Mitnick—CEO and Chief “White Hat” Hacker, Mitnick Security Consulting, LLC
Kevin Mitnick made the FBI’s Most Wanted list after hacking into 40 major corporations. Now, he’s a trusted security consultant to the Fortune 500 and governments around the world. As CEO and Chief “White Hat” Hacker at Mitnick Security Consulting, Mitnick mentors professionals on social engineering. He is the author of two books on hacking and cybersecurity, as well as a New York Times bestselling autobiography.
Follow Kevin Mitnick: LinkedIn | Twitter
Eric Vanderburg—Vice President of Cybersecurity, TCDI
Eric Vanderburg is a cybersecurity leader, consultant, author, and thought leader who helps companies protect the confidentiality, integrity, and availability of their data and critical systems. His blog, Security Thinking Cap, is a must-read for anyone interested in technology and security.
Follow Eric Vanderburg: LinkedIn | Twitter
Teri Radichel—CEO, 2nd Sight Lab, LLC
Through consulting, writing, research, and training, Teri Radichel has helped thousands of companies increase their cloud security. After working in web hosting and production, she moved into security research and began writing articles for publications, including Dark Reading and InfoSecurity Magazine. She has more than 25 years of experience working in software architecture and engineering, cybersecurity, and business operations.
Follow Teri Radichel: LinkedIn | Twitter
Richard Bejtlich—Principal Security Strategist, Corelight, Inc.
Richard Bejtlich began his digital security career as a military intelligence officer for the Air Force Computer Emergency Response Team in the late 1990s. Since then, he has worked for General Electric, FireEye, and Corelight, where he currently serves as Principal Security Strategist. Bejtlich is the author of four books, and he keeps digital security pros updated on industry news via his Twitter account and his blog, TaoSecurity.
Follow Richard Bejtlich: LinkedIn | Twitter
Jack Daniel—Cofounder, Security BSides
Storyteller first, security professional second, Jack Daniel is a network and security systems engineer with a focus on practical information security for small enterprises. His specialties include network security, analysis, design, and information security education. Daniel frequently speaks about technology, security, and compliance, and he cohosts the Security Weekly podcast.
Follow Jack Daniel: LinkedIn | Twitter
Matt Blaze—McDevitt Chair of Computer Science and Law, Georgetown University
After nearly a decade and a half teaching computer and information science at the University of Pennsylvania, Matt Blaze recently moved to Georgetown University, where he focuses on interdisciplinary research in the areas of computer science and law. He is an expert on the architecture and design of secure systems based on cryptographic techniques.
Follow Matt Blaze: Twitter
Jo Peterson—Vice President of Cloud Services, Clarify360
Jo Peterson is an influential cloud thought leader who believes cloud is the driving force behind digital change. She works with CIOs and CISOs to optimize business results via the cloud. From strategy, building, and migration to cloud operations, compliance and optimization, Peterson leads customers through their entire cloud journeys.
Follow Jo Peterson: LinkedIn | Twitter
Anton Chuvakin—Research Vice President and Distinguished Analyst, Gartner
Dr. Anton Chuvakin is an expert security analyst and the author of multiple books about security and compliance. He has published papers on log management, SIEM, correlation, and security data analysis, and has won accolades for his writing. He speaks at conferences and teaches in classrooms around the world, and runs one of the most popular blogs in the industry.
Follow Anton Chuvakin: LinkedIn | Twitter
David Linthicum—Chief Cloud Strategy Officer, Deloitte Consulting
Recently named the #1 Cloud Influencer by an Apollo Research report, David Linthicum is a cloud computing thought leader, executive, consultant, author, and speaker. He teaches cloud strategy and cloud security classes online at Lynda.com. Lithicum has also written more than 13 books, published more than 5,000 articles, and presented at more than 500 conferences.
Follow David Linthicum: LinkedIn | Twitter
Cybersecurity Requires Complex Solutions
Hackers have found vulnerabilities at every possible entry point, down to introducing malware into servers before they even have an operating system installed. Keeping data safe in a continually evolving threat landscape requires constant vigilance. Follow these 15 cybersecurity experts to keep up with the latest developments.
Ready to learn more? Read our latest Cybersecurity Intelligence Report on bot management.
