Who’s Who in Cybersecurity? · 2020. 10. 16. · 1 “Who’s Who” Introduction Onalytica has...

17
Who’s Who in Cybersecurity? The Top Influencers and Brands Clelia Arci - Onalytica Philip Peters - Palo Alto

Transcript of Who’s Who in Cybersecurity? · 2020. 10. 16. · 1 “Who’s Who” Introduction Onalytica has...

  • Who’s Who in Cybersecurity?The Top Influencers and Brands

    Clelia Arci - OnalyticaPhilip Peters - Palo Alto

  • Contents

    “Who’s Who” Introduction Cybersecurity Introduction Brand Employees & Industry Practitioners Personas

    Professional Influencers & Social AmplifiersEvent Speakers

    RolesAnalystsJournalists

    SectorsThreat ProtectionInformation & ComplianceCloud Security

    BrandsCybersecurity BrandsMethodology

    123557889

    10101112131314

  • 1

    “Who’s Who” Introduction

    Onalytica has been creating Top 100 Influencer lists for the past 10 years, connecting brands with influencer communities. The marketplace is now looking to understand who is influential beyond Twitter social amplifiers. Over recent years there have been more and more companies producing lists based on Twitter followers. We want to break away from that.

    Each Who’s Who report will provide you with the top Social Influencers, Content Creators, Event Speakers, Industry Analysts, Brand Employees, Brands and Publications across individual topics such as AI, Climate Change, The Future of Work, FinTech, Energy Policy, Obesity, etc.

    The influential experts are selected using Onalytica’s 4 Rs methodology (Reach, Resonance, Relevance and Reference). Quantitative data is pulled through LinkedIn, Twitter, Personal Blogs, YouTube, Podcast, and Forbes channels, and our qualitative data is pulled by our insights and analytics team, capturing offline influence.

    All the influential experts featured are categorised by influencer persona, the sector they work in, their role within that sector, and more from our curated database of 1m+ influencers.

    We are striving for this report to be a One-Stop Shop for the Movers & Shakers of the industry so any feedback to further improve the lists is always gratefully received.

  • 2

    Cybersecurity Introduction

    Cybersecurity is a necessity in day-to-day life, a study by the Ponemon Institute and Keeper Security has shown that cybersecurity risks are increasing due to prolonged remote working. The report found 60% of those surveyed said their organisation had been hit by a cyber attack. The issues that Zoom faced throughout April and May 2020 highlight how easy it is to become a victim of cybercrime. The importance of cybersecurity is clear, which is why this ‘Who’s Who’ report focuses on the voices raising awareness and driving solutions within cybersecurity. We have broken the industry down and looked at those working, speaking and writing within the space. “In cybersecurity, we’re not just looking to partner with influencers who have the biggest following or the loudest voice. It’s more important to focus on the ones having the right conversations in the right communities.”

    - Philip Peters, Global Social Media & Content Lead, Palo Alto Networks

  • 3

    Brand Employees & Industry Practitioners

    Rex JohnsonComputer Aid, IncDirector of CybersecurityTwitter: @RexSecurityLinkedIn: Click Here

    Wendi WhitmoreIBMVice President, IBM X-ForceTwitter: @wendiwhitmoreLinkedIn: Click Here

    Neil R. WylerRSA SecurityThreat Hunting & Incident Response SpecialistTwitter: @Grifter801LinkedIn: Click Here

    Siân JohnMicrosoftEMEA Director, Cybersecurity StrategyTwitter: @sbj24LinkedIn: Click Here

    Philip QuadeFortinetCISOTwitter: @pquade_cisoLinkedIn: Click Here

    Raj SamaniMcAfeeMcAfee Fellow, Chief ScientistTwitter: @Raj_SamaniLinkedIn: Click Here

    Rohit GhaiRSA SecurityCEOTwitter: @rohit_ghaiLinkedIn: Click Here

    Kevin BeaumontMicrosoftSenior Threat Intelligence AnalystTwitter: @GossiTheDogLinkedIn: Click Here

    Ann JohnsonMicrosoftCorporate Vice PresidentTwitter: @ajohnsocyberLinkedIn: Click Here

    Wendy NatherCiscoHead of Advisory CISOsTwitter: @wendynatherLinkedIn: Click Here

    Listed below are the most prominent & influential Subject Matter Expert voices from Enterprise brands. These people are working within the industry and also act as spokespeople to drive awareness & engagement for their employers.

    Katie MoussourisLuta SecurityFounder & CEOTwitter: @k8em0LinkedIn: Click Here

    https://twitter.com/RexSecurityhttps://twitter.com/RexSecurityhttps://www.linkedin.com/in/rex-johnson-464a481/https://twitter.com/wendiwhitmorehttps://twitter.com/wendiwhitmorehttps://www.linkedin.com/in/wendiwhitmore2/https://twitter.com/Grifter801https://twitter.com/Grifter801https://www.linkedin.com/in/neilwyler/https://twitter.com/sbj24https://twitter.com/sbj24https://www.linkedin.com/in/sian-john/https://twitter.com/pquade_cisohttps://twitter.com/pquade_cisohttps://www.linkedin.com/in/philip-quade/https://twitter.com/Raj_Samanihttps://twitter.com/Raj_Samanihttps://www.linkedin.com/in/raj-samani-3697b9/https://twitter.com/rohit_ghaihttps://twitter.com/rohit_ghaihttps://www.linkedin.com/in/rohitghai/https://twitter.com/GossiTheDoghttps://twitter.com/GossiTheDoghttps://www.linkedin.com/in/kevin-beaumont-security/https://twitter.com/ajohnsocyberhttps://twitter.com/ajohnsocyberhttps://www.linkedin.com/in/ann-johnsons/https://twitter.com/wendynatherhttps://twitter.com/wendynatherhttps://www.linkedin.com/in/wendynather/https://twitter.com/k8em0https://twitter.com/k8em0https://www.linkedin.com/in/kmoussouris/

  • 4

    Brand Employees & Industry Practitioners ctd.

    Omar SantosCiscoPrincipal Engineer - PSIRT - Security Research and OperationsTwitter: @santosomarLinkedIn: Click Here

    Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here

    Dr. ir Johannes DrooghaagJohannes DrooghaagConsultantTwitter: @DrJDrooghaagLinkedIn: Click Here

    Camille StewartGoogleSecurity & Privacy PolicyTwitter: @CamilleEsqLinkedIn: Click Here

    Ryan NaraineIntel CorporationDirector, Security StrategyTwitter: @ryanaraineLinkedIn: Click Here

    Cristin GoodwinMicrosoftAssistant General CounselTwitter: @CristinGoodwinLinkedIn: Click Here

    Zulfikar RamzanRSA SecurityChief Digital OfficerTwitter: @Zulfikar_RamzanLinkedIn: Click Here

    Becky PinkardAldermore Bank PLCCISOTwitter: @BeckyPinkardLinkedIn: Click Here

    John LambertMicrosoftDistinguished EngineerTwitter: @JohnLaTwCLinkedIn: Click Here

    Eugene KasperskyKaperskyCEOTwitter: @e_kasperskyLinkedIn: Click Here

    J Wolfgang GoerlichCiscoAdvisory CISO, Duo SecurityTwitter: @jwgoerlichLinkedIn: Click Here

    Robert M. LeeDragosFounder & CEOTwitter: @RobertMLeeLinkedIn: Click Here

    https://twitter.com/santosomarhttps://twitter.com/santosomarhttps://www.linkedin.com/in/santosomar/https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/DrJDrooghaaghttps://www.linkedin.com/in/johannesdrooghaag/https://twitter.com/CamilleEsqhttps://twitter.com/CamilleEsqhttps://www.linkedin.com/in/camillestewartesq/https://twitter.com/ryanarainehttps://twitter.com/ryanarainehttps://www.linkedin.com/in/ryanaraine/https://twitter.com/CristinGoodwinhttps://twitter.com/CristinGoodwinhttps://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/https://twitter.com/Zulfikar_Ramzanhttps://twitter.com/Zulfikar_Ramzanhttps://www.linkedin.com/in/zulfikar-ramzan-aa581/https://twitter.com/BeckyPinkardhttps://twitter.com/BeckyPinkardhttps://www.linkedin.com/in/bpinkard/https://twitter.com/JohnLaTwChttps://twitter.com/JohnLaTwChttps://www.linkedin.com/in/johnjlambert/https://twitter.com/e_kasperskyhttps://twitter.com/e_kasperskyhttps://www.linkedin.com/in/eugenekaspersky/https://twitter.com/jwgoerlichhttps://twitter.com/jwgoerlichhttps://www.linkedin.com/in/jwgoerlich/https://twitter.com/RobertMLeehttps://twitter.com/RobertMLeehttps://www.linkedin.com/in/robmichaellee/

  • 5

    Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here

    Javvad MalikKnowBe4Security Awareness AdvocateTwitter: @J4vv4DLinkedIn: Click Here

    Diana KellySecurityCurveCTO & Founding PartnerTwitter: @dianakelley14LinkedIn: Click Here

    Jo PetersonClarify360VP - Cloud + Security ServicesTwitter: @digitalcloudgalLinkedIn: Click Here

    Brian KrebsIndependentReporter/Publisher, CybersecurityTwitter: @briankrebsLinkedIn: Click Here

    Dan LohrmannSecurity Mentor, IncChief Strategist & CSOTwitter: @govcsoLinkedIn: Click Here

    Bruce SchneierInrupt, Inc.Chief of Security ArchitectureTwitter: @schneierblogLinkedIn: N/A

    Kevin L. JacksonGC GlobalNetCEOTwitter: @Kevin_JacksonLinkedIn: Click Here

    Chuck BrooksBrooks Consulting InternationalPresidentTwitter: @ChuckDBrooksLinkedIn: Click Here

    Professional Influencers & Social Amplifiers

    Here are the people who are creating and sharing content on cybersecurity on LinkedIn & Twitter that generate high social engagement.

    These people are considered influencers. They are also commissioned by many brands to amplify relevant content to their audiences.

    Personas

    Michael FisherWhitcraft GroupSenior Systems AnalystTwitter: @Fisher85MLinkedIn: Click Here

    https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/J4vv4Dhttps://twitter.com/J4vv4Dhttps://www.linkedin.com/in/javvad/https://twitter.com/dianakelley14https://twitter.com/dianakelley14https://www.linkedin.com/in/dianakelleysecuritycurve/https://twitter.com/digitalcloudgalhttps://twitter.com/digitalcloudgalhttps://www.linkedin.com/in/jopeterson1/https://twitter.com/briankrebshttps://twitter.com/briankrebshttps://www.linkedin.com/in/bkrebs/https://twitter.com/govcsohttps://twitter.com/govcsohttps://www.linkedin.com/in/danlohrmann/https://twitter.com/schneierbloghttps://twitter.com/schneierbloghttps://twitter.com/Kevin_Jacksonhttps://twitter.com/Kevin_Jacksonhttps://www.linkedin.com/in/kjackson/https://twitter.com/ChuckDBrookshttps://twitter.com/ChuckDBrookshttps://www.linkedin.com/in/chuckbrooks/https://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://www.linkedin.com/in/fisher85m/

  • 6

    Professional Influencers & Social Amplifiersctd.

    Joseph MennIndependentAuthorTwitter: @josephmennLinkedIn: Click Here

    Lance SpitznerSANS InstituteDirector, SANS Security AwarenessTwitter: @lspitznerLinkedIn: Click Here

    Avrohom Gottheil#AskTheCEO MediaCEOTwitter: @avrohomgLinkedIn: Click Here

    Shira RubinoffPrime Tech PartnersPresident & Co-FounderTwitter: @ShirastweetLinkedIn: Click Here

    Marco CiappelliITSP MagazineCo-FounderTwitter: @MarcoCiappelliLinkedIn: Click Here

    Rich TehraniTMCCEOTwitter: @rtehraniLinkedIn: Click Here

    Paula PiccardOwnerSocial Media ConsultantTwitter: @Paula_PiccardLinkedIn: Click Here

    Ludmila Morozova-BussCapitol Technology UniversityPh.D Student/ResearcherTwitter: @TopCyberNewsLinkedIn: Click Here

    Joseph SteinbergIndependentAdvisorTwitter: @JosephSteinbergLinkedIn: Click Here

    https://twitter.com/josephmennhttps://twitter.com/josephmennhttps://www.linkedin.com/in/josephmenn/https://twitter.com/lspitznerhttps://twitter.com/lspitznerhttps://www.linkedin.com/in/lance-spitzner-0ab0ba1/https://twitter.com/avrohomghttps://twitter.com/avrohomghttps://twitter.com/Shirastweethttps://twitter.com/Shirastweethttps://www.linkedin.com/in/shirarubinoff/https://twitter.com/MarcoCiappellihttps://twitter.com/MarcoCiappellihttps://www.linkedin.com/in/marco-ciappelli/https://twitter.com/rtehranihttps://twitter.com/rtehranihttps://www.linkedin.com/in/richtehrani/https://twitter.com/Paula_Piccardhttps://www.linkedin.com/in/paulapiccard/https://twitter.com/TopCyberNewshttps://twitter.com/TopCyberNewshttps://www.linkedin.com/in/ludmilamorozova/https://twitter.com/JosephSteinberghttps://twitter.com/JosephSteinberghttps://www.linkedin.com/in/josephsteinberg/

  • 7

    Event Speakers

    Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here

    Graham CluleyIndependentCybercrime researcher, blogger, podcaster, public speakerTwitter: @gcluleyLinkedIn: Click Here

    Rob MayRamsacManaging DirectorTwitter: @robmay70LinkedIn: Click Here

    Tyler Cohen WoodPrivate ConsultancySpeaker, Pvt Consultant, AuthorTwitter: @TylerCohenWoodLinkedIn: Click Here

    Jane FranklandCybersecurity Capital LtdOwner & CEOTwitter: @JaneFranklandLinkedIn: Click Here

    Rich TehraniTMCCEOTwitter: @rtehraniLinkedIn: Click Here

    Shira RubinoffPrime Tech PartnersPresident & Co-FounderTwitter: @ShirastweetLinkedIn: Click Here

    Mirko RossAsvinCEOTwitter: @mirko_rossLinkedIn: Click Here

    Jessica BarkerCygentaCo-Founder & Socio-Technical LeadTwitter: @drjessicabarkerLinkedIn: Click Here

    Mark LyndNetsyncHead of Digital BusinessTwitter: @mclyndLinkedIn: Click Here

    Below is a sample of people who are keynote speakers in cybersecurity or have spoken at cybersecurity events over the past few years.

    https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/gcluleyhttps://twitter.com/gcluleyhttps://www.linkedin.com/in/grahamcluley/https://twitter.com/robmay70https://twitter.com/robmay70https://www.linkedin.com/in/rpvmay/https://twitter.com/TylerCohenWoodhttps://twitter.com/TylerCohenWoodhttps://twitter.com/TylerCohenWoodhttps://twitter.com/JaneFranklandhttps://twitter.com/JaneFranklandhttps://www.linkedin.com/in/janefrankland/https://twitter.com/rtehranihttps://twitter.com/rtehranihttps://www.linkedin.com/in/richtehrani/https://twitter.com/Shirastweethttps://twitter.com/Shirastweethttps://www.linkedin.com/in/shirarubinoff/https://twitter.com/mirko_rosshttps://twitter.com/mirko_rosshttps://www.linkedin.com/in/mirko-ross/https://twitter.com/drjessicabarkerhttps://twitter.com/drjessicabarkerhttps://www.linkedin.com/in/jessica-barker/https://twitter.com/mclyndhttps://twitter.com/mclyndhttps://www.linkedin.com/in/marklynd/

  • 8

    Analysts

    Roles

    Cory WolffLayer 8 SecurityCybersecurity AnalystTwitter: @cwolff411LinkedIn: Click Here

    Paul McKayForresterSenior AnalystTwitter: @PMcKayAnalystLinkedIn: Click Here

    Jeff PollardForresterVP & Principal AnalystTwitter: @jeff_pollard2LinkedIn: Click Here

    Rebecca LucasRAND EuropeAnalystTwitter: N/ALinkedIn: Click Here

    Scott CrawfordS&P Global Market IntelligenceInformation Security Research HeadTwitter: @s_crawfordLinkedIn: Click Here

    Heather Marie VitalePeratonSenior Cybersecurity AnalystTwitter: @prettyhowtwnLinkedIn: Click Here

    Caitlin GruenbergCyberGRXManager, Assessment OperationsTwitter: @CaitGru32LinkedIn: Click Here

    Bash OsmanTechGeek365FounderTwitter: @BashKOsmanLinkedIn: N/A

    Michael FisherWhitcraft GroupSenior Systems AnalystTwitter: @Fisher85MLinkedIn: Click Here

    Joseph KrullAite GroupSenior AnalystTwitter: @joe_krullLinkedIn: Click Here

    Here is a sample of the prominent analysts who are visible on LinkedIn & Twitter. These experts are sharing and discussing topics relevant to cybersecurity.

    https://twitter.com/cwolff411https://twitter.com/cwolff411https://www.linkedin.com/in/corywolff/https://twitter.com/PMcKayAnalysthttps://twitter.com/PMcKayAnalysthttps://www.linkedin.com/in/paul-mckay-5304a115/https://twitter.com/jeff_pollard2https://twitter.com/jeff_pollard2https://www.linkedin.com/in/jpollard96/https://www.linkedin.com/in/rebeccaplucas/https://twitter.com/s_crawfordhttps://twitter.com/s_crawfordhttps://www.linkedin.com/in/scottacrawford/https://twitter.com/prettyhowtwnhttps://twitter.com/prettyhowtwnhttps://www.linkedin.com/in/heathermarievitale/https://twitter.com/CaitGru32https://twitter.com/CaitGru32https://www.linkedin.com/in/caitlin-gruenberg-671017b/https://twitter.com/BashKOsmanhttps://twitter.com/BashKOsmanhttps://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://twitter.com/joe_krullhttps://twitter.com/joe_krullhttps://www.linkedin.com/in/jokrull/

  • 9

    Journalists

    Steve MorganCybercrime MagazineFounder & Editor-in-ChiefTwitter: @CybersecuritySFLinkedIn: Click Here

    Chris BingReutersCybersecurity ReporterTwitter: @Bing_ChrisLinkedIn: Click Here

    Kim NashThe Wall Street JournalDeputy EditorTwitter: @knash99LinkedIn: Click Here

    Jeff ElderBusiness InsiderCybersecurity ReporterTwitter: @JeffElderLinkedIn: Click Here

    Kim ZetterIndependentInvestigative Journalist & AuthorTwitter: @KimZetterLinkedIn: Click Here

    Mohit KumarThe Hacker NewsFounder & Editor-in-ChiefTwitter: @unix_rootLinkedIn: Click Here

    Brian KrebsIndependentReporter/Publisher, CybersecurityTwitter: @briankrebsLinkedIn: Click Here

    Kelly Jackson HigginsDark ReadingExecutive DirectorTwitter: @kjhigginsLinkedIn: Click Here

    Nicole PerlrothThe New York TimesCybersecurity ReporterTwitter: @nicoleperlrothLinkedIn: Click Here

    Joe UchillSC MagazineSenior ReporterTwitter: @JoeUchillLinkedIn: Click Here

    The people listed below are a sample of editors, reporters & journalists who are prominent online personally and who represent media publications or work freelance. They also publish lots of relevant content on cybersecurity.

    https://twitter.com/CybersecuritySFhttps://twitter.com/CybersecuritySFhttps://www.linkedin.com/in/cybersecuritysf/https://twitter.com/Bing_Chrishttps://twitter.com/Bing_Chrishttps://www.linkedin.com/in/christopher-b-a4402566/https://twitter.com/knash99https://twitter.com/knash99https://www.linkedin.com/in/kimnash/https://twitter.com/JeffElderhttps://twitter.com/JeffElderhttps://www.linkedin.com/in/jeffcelder/https://twitter.com/KimZetterhttps://twitter.com/KimZetterhttps://www.linkedin.com/in/kim-zetter-20421b/https://twitter.com/unix_roothttps://twitter.com/unix_roothttps://www.linkedin.com/in/hackermohitkumar/https://twitter.com/briankrebshttps://twitter.com/briankrebshttps://www.linkedin.com/in/bkrebs/https://twitter.com/kjhigginshttps://twitter.com/kjhigginshttps://www.linkedin.com/in/kellyj2/https://twitter.com/nicoleperlrothhttps://twitter.com/nicoleperlrothhttps://www.linkedin.com/in/nicoleperlroth/https://twitter.com/JoeUchillhttps://twitter.com/JoeUchillhttps://www.linkedin.com/in/joeuchill/

  • 10

    Threat Protection

    Sectors

    Omar SantosCiscoPrincipal Engineer - PSIRT - Security Research and OperationsTwitter: @santosomarLinkedIn: Click Here

    Mick BaccioSplunkSecurity AdvisorTwitter: @nohackmeLinkedIn: Click Here

    Selena LarsonDragosCyber Threat AnalystTwitter: @selenalarsonLinkedIn: Click Here

    Vitali KremezVK Intel LLCFounder & CEOTwitter: @VK_IntelLinkedIn: Click Here

    Sergio CaltagironeThreat Intelligence AcademyCEOTwitter: @cnoanalysisLinkedIn: Click Here

    Joan RossInsightCyberChief Intelligence OfficerTwitter: @Joanross_bizLinkedIn: Click Here

    Kevin BeaumontMicrosoftSenior Threat Intelligence AnalystTwitter: @GossiTheDogLinkedIn: Click Here

    Adam ShostackThe Black Hat BriefingsReview Board MemberTwitter: @adamshostackLinkedIn: Click Here

    Linda BellIBMCyber Resiliency AdvisorTwitter: @LindaCisspLinkedIn: Click Here

    Cheryl BiswasTDCyber Security SpecialistTwitter: @3ncr1pt3dLinkedIn: Click Here

    Below are people who have spoken online about threat protection in the context of cybersecurity, or people who work within the threat protection and cybersecurity sector.

    https://twitter.com/santosomarhttps://twitter.com/santosomarhttps://www.linkedin.com/in/santosomar/https://twitter.com/nohackmehttps://twitter.com/nohackmehttps://www.linkedin.com/in/nohackme/https://twitter.com/selenalarsonhttps://twitter.com/selenalarsonhttps://www.linkedin.com/in/selenalarson/https://twitter.com/VK_Intelhttps://twitter.com/VK_Intelhttps://www.linkedin.com/in/vitali-kremez-021905104/https://twitter.com/cnoanalysishttps://twitter.com/cnoanalysishttps://www.linkedin.com/in/sergiocaltagirone/https://twitter.com/Joanross_bizhttps://twitter.com/Joanross_bizhttps://www.linkedin.com/in/joanross/https://twitter.com/GossiTheDoghttps://twitter.com/GossiTheDoghttps://www.linkedin.com/in/kevin-beaumont-security/https://twitter.com/adamshostackhttps://twitter.com/adamshostackhttps://www.linkedin.com/in/shostack/https://twitter.com/LindaCissphttps://twitter.com/LindaCissphttps://www.linkedin.com/in/lindawbell/https://twitter.com/3ncr1pt3dhttps://twitter.com/3ncr1pt3dhttps://www.linkedin.com/in/cherylbiswas/

  • 11

    Information & Compliance

    Richard BellMicro FocusHead of Global Cybersecurity & IT ComplianceTwitter: @securityspeakLinkedIn: Click Here

    Edna ConwayMicrosoftVP, Global Security, Risk & Compli-ance (Azure)Twitter: @Edna_ConwayLinkedIn: Click Here

    Mariano M. del RíoSecureTechCybersecurity & Compliance ConsultantTwitter: @mmdelrioLinkedIn: Click Here

    Daniel P. WallaceGrow Forward LLCPrincipal Information Security Consultant & Project ManagerTwitter: @dpwallaceLinkedIn: Click Here

    Otavio FreireSafeGuard CyberPresident, CTO & Co-FounderTwitter: @OtavioFreireLinkedIn: Click Here

    Rox KulliyeSecureDAMChief Technologist CSFTwitter: @2rkivaLinkedIn: Click Here

    Dr. Teju OyewoleIndigoIT Security | Compliance ManagerTwitter: N/ALinkedIn: Click Here

    Jonathan ArmstrongCorderyPartnerTwitter: @armstrongjpLinkedIn: Click Here

    David ClarkeData Breach TrainingData breach Trainer & ConsultantTwitter: @1DavidClarkeLinkedIn: Click Here

    Wayne AndersonMicrosoftSr. Security & Compliance ArchitectTwitter: @DigitalSecArchLinkedIn: Click Here

    Information & compliance plays a big role in Cybersecurity, below is a small sample of influencers who discuss or work within compliance and cybersecurity.

    https://twitter.com/securityspeakhttps://twitter.com/securityspeakhttps://www.linkedin.com/in/rbell/https://twitter.com/Edna_Conwayhttps://twitter.com/Edna_Conwayhttps://www.linkedin.com/in/ednaconway/https://twitter.com/mmdelriohttps://twitter.com/mmdelriohttps://www.linkedin.com/in/mmdelrio/https://twitter.com/dpwallacehttps://twitter.com/dpwallacehttps://www.linkedin.com/in/wallacedan/https://twitter.com/OtavioFreirehttps://twitter.com/OtavioFreirehttps://www.linkedin.com/in/ofreire/https://twitter.com/2rkivahttps://twitter.com/2rkivahttps://www.linkedin.com/in/roxkulliye/https://www.linkedin.com/in/drtejuoyewole/https://twitter.com/armstrongjphttps://twitter.com/armstrongjphttps://www.linkedin.com/in/jparmstrong/https://twitter.com/1DavidClarkehttps://twitter.com/1DavidClarkehttps://www.linkedin.com/in/1davidclarke/https://twitter.com/DigitalSecArchhttps://twitter.com/DigitalSecArchhttps://www.linkedin.com/in/wayneanderson/

  • 12

    Cloud Security

    Todd D. LyleGrounding the Cloud Leadership SeriesAuthor/ResearcherTwitter: @todddlyleLinkedIn: Click Here

    Roger GspanAxians ICT Austria GmbHHead of Consultant Network & CybersecurityTwitter: @RogerGspanLinkedIn: Click Here

    Jo PetersonClarify360VP - Cloud + Security ServicesTwitter: @digitalcloudgalLinkedIn: Click Here

    Nikhil AgarwalDeloitteCyber Risk Advisory/Cloud SecurityTwitter: @reachtonikhilLinkedIn: Click Here

    Teri Radichel2nd Sight LabCEOTwitter: @TeriRadichelLinkedIn: Click Here

    Riyaz WalikarAppseccoHead of Security Research and TestingTwitter: @riyazwalikarLinkedIn: Click Here

    Ratan JyotiUjjivan Small Financial Bank LimitedChief Information Security OfficerTwitter: @reach2ratanLinkedIn: Click Here

    Charbel NemnomitnetX Cloud ArchitectTwitter: @CHARBELNEMNOMLinkedIn: Click Here

    Kayode OlafunmiloyeAMDSenior Manager - Cloud Security Strategy + ArchitectureTwitter: N/ALinkedIn: Click Here

    Doug CahillEnterprise StrategyVice President and Group Director, CybersecurityTwitter: @DougCahillLinkedIn: Click Here

    Cloud security is a major concern for cybersecurity and needs to be part of the conversation. Below is a sample of influential experts who discuss Cloud security online, have discussed Cloud security in the context of cybersecurity, or work within the sector.

    Dr. ir Johannes DrooghaagJohannes DrooghaagConsultantTwitter: @DrJDrooghaagLinkedIn: Click Here

    https://twitter.com/todddlylehttps://twitter.com/todddlylehttps://www.linkedin.com/in/todddlyle/https://twitter.com/RogerGspanhttps://twitter.com/RogerGspanhttps://www.linkedin.com/in/roger-gspan-a7668268/https://twitter.com/digitalcloudgalhttps://twitter.com/digitalcloudgalhttps://www.linkedin.com/in/jopeterson1/https://twitter.com/reachtonikhilhttps://twitter.com/reachtonikhilhttps://www.linkedin.com/in/reachtonikhil/https://twitter.com/TeriRadichelhttps://twitter.com/TeriRadichelhttps://www.linkedin.com/in/teriradichel/https://twitter.com/riyazwalikarhttps://twitter.com/riyazwalikarhttps://www.linkedin.com/in/riyazw/https://twitter.com/reach2ratanhttps://www.linkedin.com/in/ratanjyoti/https://twitter.com/CHARBELNEMNOMhttps://twitter.com/CHARBELNEMNOMhttps://www.linkedin.com/in/cnemnom/https://www.linkedin.com/in/kayode-olafunmiloye-487827/https://twitter.com/DougCahillhttps://twitter.com/DougCahillhttps://www.linkedin.com/in/dougcahill/https://twitter.com/DrJDrooghaaghttps://www.linkedin.com/in/johannesdrooghaag/

  • 13

    Cybersecurity Brands

    Brands

    FortinetRanking: 50Twitter: @FortinetLinkedIn: Click Here

    McAfeeRanking: 50Twitter: @McAfeeLinkedIn: Click Here

    ProofpointRanking: 50Twitter: @proofpointLinkedIn: Click Here

    Palo Alto NetworksRanking: 50Twitter: @PaloAltoNtwksLinkedIn: Click Here

    DarktraceRanking: 50Twitter: @DarktraceLinkedIn: Click Here

    ImpervaRanking: 50Twitter: @ImpervaLinkedIn: Click Here

    Check Point SoftwareRanking: 100Twitter: @CheckPointSWLinkedIn: Click Here

    Trend MicroRanking: 50Twitter: @TrendMicroLinkedIn: Click Here

    RSA SecurityRanking: 50Twitter: @RSAsecurityLinkedIn: Click Here

    FireEye, IncRanking: 50Twitter: @FireEyeLinkedIn: Click Here

    Below is a sample of brands who provide cybersecurity solutions and are producing relevant thought leadership content.

    https://twitter.com/Fortinethttps://twitter.com/Fortinethttps://www.linkedin.com/company/fortinet/https://twitter.com/McAfeehttps://twitter.com/McAfeehttps://www.linkedin.com/company/mcafee/https://twitter.com/proofpointhttps://twitter.com/proofpointhttps://www.linkedin.com/company/proofpoint/https://twitter.com/PaloAltoNtwkshttps://twitter.com/PaloAltoNtwkshttps://www.linkedin.com/company/palo-alto-networks/https://twitter.com/Darktracehttps://twitter.com/Darktracehttps://www.linkedin.com/company/darktrace/https://twitter.com/Impervahttps://twitter.com/Impervahttps://www.linkedin.com/company/imperva/https://twitter.com/CheckPointSWhttps://twitter.com/CheckPointSWhttps://www.linkedin.com/company/check-point-software-technologies/https://twitter.com/TrendMicrohttps://twitter.com/TrendMicrohttps://www.linkedin.com/company/trend-micro/https://twitter.com/RSAsecurityhttps://twitter.com/RSAsecurityhttps://www.linkedin.com/company/rsasecurity/about/https://twitter.com/FireEyehttps://twitter.com/FireEyehttps://www.linkedin.com/company/fireeye/

  • 14

    Methodology

    Our Who’s Who lists are created using the Onalytica platform which has a curated database of over 1 million influencers. Our platform allows you to discover, validate and categorise influencers quickly and easily via keyword searches. Our lists are made using carefully created Boolean queries which then rank influencers by resonance, relevance, reach and reference, meaning influencers are not only ranked by themselves, but also by how much other influencers are referring to them. The lists are then validated, and filters are used to split the influencers up into the categories that are seen in the list.

    This Who’s Who list should give you an insight into the Cybersecurity industry and help break it down. We always want to make sure you are getting the most valuable information available from our lists, so feedback is always welcome!

    If you want to learn more about Onalytica, or if you’d like to see our platform in action, feel free to get in touch!

    Get in Touch

    https://onalytica.com/contact/