X

Fifteen Cybersecurity Professionals You Should Follow

The modern cloud is an essential resource for businesses of every size. Virtually limitless processing power and data storage create a platform that can streamline existing business models and create entirely new possibilities for revenue streams.

As more data moves to the cloud, however, security is an ever-increasing concern. Keeping data safe is a complex problem that requires sophisticated solutions. It’s about creating layers of security to cover every potential vulnerability: multidimensional threat protection.

To stay up-to-date on the continually evolving threat landscape, follow these experts.

Fifteen Influential Cybersecurity Experts To Follow

Dez Blanchfield—Strategy and Policy Consultant, Starboard IT

With more than 25 years of experience in the IT industry, Dez Blanchfield is a strategic leader in business and digital transformation. His specialties include cloud computing, big data and analytics, virtualization, and distributed computing—just to name a few. His company, Gara Guru, is a leading provider of digital business solutions for companies around the world.

Follow Dez Blanchfield: LinkedIn | Twitter

Brian Krebs—Reporter and Publisher, Krebs Security

Brian Krebs is an independent investigative journalist who has been writing about internet security—specifically, computer crime and underground cybercrime—for the past decade. At KrebsOnSecurity.com, Krebs updates his readers daily about computer security and cybercrime.

Follow Brian Krebs: LinkedIn | Twitter

Kevin Jackson—Founder, GovCloud Network

Kevin Jackson founded GovCloud Network to help professionals revolutionize their business models using advanced technology. At ATT Influencer 2018, he discussed eliminating the “wall and moat” cybersecurity mentality, introducing data-centric methods that reduce the risk associated with employee, third-party, and supplier access to company data.

Follow Kevin Jackson: LinkedIn | Twitter

Ken Westin—Senior Security Strategist, Splunk

Named “The Good Hacker” by Oregon Business Magazine, Ken Westin has trained and assisted law enforcement agencies in using advanced technologies and social media as investigative tools. His experience ranges from security to product development, and his expertise has been featured in Wired, Forbes, New York Times, and The Economist.

Follow Ken Westin: LinkedIn | Twitter

Kim Zetter—Senior Writer, Wired

Kim Zetter is a journalist who has written for Wired on topics of cybercrime, hackers, cyber warfare, and surveillance for more than a decade. She is also a speaker and the author of Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.

Follow Kim Zetter: LinkedIn | Twitter

Eleanor Dallaway—Editor, InfoSecurity Magazine

Eleanor Dallaway is the Editor of InfoSecurity Magazine, a publication that provides knowledge and insight into the information security industry. With nearly a decade’s worth of experience in the field, Dallaway is well-versed in information security, updating the magazine's website on an hourly basis with industry news and trends.

Follow Eleanor Dallaway: LinkedIn | Twitter

Kevin Mitnick—CEO and Chief “White Hat” Hacker, Mitnick Security Consulting, LLC

Kevin Mitnick made the FBI’s Most Wanted list after hacking into 40 major corporations. Now, he’s a trusted security consultant to the Fortune 500 and governments around the world. As CEO and Chief “White Hat” Hacker at Mitnick Security Consulting, Mitnick mentors professionals on social engineering. He is the author of two books on hacking and cybersecurity, as well as a New York Times bestselling autobiography.

Follow Kevin Mitnick: LinkedIn | Twitter

Eric Vanderburg—Vice President of Cybersecurity, TCDI

Eric Vanderburg is a cybersecurity leader, consultant, author, and thought leader who helps companies protect the confidentiality, integrity, and availability of their data and critical systems. His blog, Security Thinking Cap, is a must-read for anyone interested in technology and security.

Follow Eric Vanderburg: LinkedIn | Twitter

Teri Radichel—CEO, 2nd Sight Lab, LLC

Through consulting, writing, research, and training, Teri Radichel has helped thousands of companies increase their cloud security. After working in web hosting and production, she moved into security research and began writing articles for publications, including Dark Reading and InfoSecurity Magazine. She has more than 25 years of experience working in software architecture and engineering, cybersecurity, and business operations.

Follow Teri Radichel: LinkedIn | Twitter

Richard Bejtlich—Principal Security Strategist, Corelight, Inc.

Richard Bejtlich began his digital security career as a military intelligence officer for the Air Force Computer Emergency Response Team in the late 1990s. Since then, he has worked for General Electric, FireEye, and Corelight, where he currently serves as Principal Security Strategist. Bejtlich is the author of four books, and he keeps digital security pros updated on industry news via his Twitter account and his blog, TaoSecurity.

Follow Richard Bejtlich: LinkedIn | Twitter

Jack Daniel—Cofounder, Security BSides

Storyteller first, security professional second, Jack Daniel is a network and security systems engineer with a focus on practical information security for small enterprises. His specialties include network security, analysis, design, and information security education. Daniel frequently speaks about technology, security, and compliance, and he cohosts the Security Weekly podcast.

Follow Jack Daniel: LinkedIn | Twitter

Matt Blaze—McDevitt Chair of Computer Science and Law, Georgetown University

After nearly a decade and a half teaching computer and information science at the University of Pennsylvania, Matt Blaze recently moved to Georgetown University, where he focuses on interdisciplinary research in the areas of computer science and law. He is an expert on the architecture and design of secure systems based on cryptographic techniques.

Follow Matt Blaze: Twitter

Jo Peterson—Vice President of Cloud Services, Clarify360

Jo Peterson is an influential cloud thought leader who believes cloud is the driving force behind digital change. She works with CIOs and CISOs to optimize business results via the cloud. From strategy, building, and migration to cloud operations, compliance and optimization, Peterson leads customers through their entire cloud journeys.

Follow Jo Peterson: LinkedIn | Twitter

Anton Chuvakin—Research Vice President and Distinguished Analyst, Gartner

Dr. Anton Chuvakin is an expert security analyst and the author of multiple books about security and compliance. He has published papers on log management, SIEM, correlation, and security data analysis, and has won accolades for his writing. He speaks at conferences and teaches in classrooms around the world, and runs one of the most popular blogs in the industry.

Follow Anton Chuvakin: LinkedIn | Twitter

David Linthicum—Chief Cloud Strategy Officer, Deloitte Consulting

Recently named the #1 Cloud Influencer by an Apollo Research report, David Linthicum is a cloud computing thought leader, executive, consultant, author, and speaker. He teaches cloud strategy and cloud security classes online at Lynda.com. Lithicum has also written more than 13 books, published more than 5,000 articles, and presented at more than 500 conferences.

Follow David Linthicum: LinkedIn | Twitter

Cybersecurity Requires Complex Solutions

Hackers have found vulnerabilities at every possible entry point, down to introducing malware into servers before they even have an operating system installed. Keeping data safe in a continually evolving threat landscape requires constant vigilance. Follow these 15 cybersecurity experts to keep up with the latest developments.

Ready to learn more? Read our latest Cybersecurity Intelligence Report on bot management.

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.Captcha