Who’s Who in Cybersecurity? · 2020. 10. 16. · 1 “Who’s Who” Introduction Onalytica has...
Transcript of Who’s Who in Cybersecurity? · 2020. 10. 16. · 1 “Who’s Who” Introduction Onalytica has...
-
Who’s Who in Cybersecurity?The Top Influencers and Brands
Clelia Arci - OnalyticaPhilip Peters - Palo Alto
-
Contents
“Who’s Who” Introduction Cybersecurity Introduction Brand Employees & Industry Practitioners Personas
Professional Influencers & Social AmplifiersEvent Speakers
RolesAnalystsJournalists
SectorsThreat ProtectionInformation & ComplianceCloud Security
BrandsCybersecurity BrandsMethodology
123557889
10101112131314
-
1
“Who’s Who” Introduction
Onalytica has been creating Top 100 Influencer lists for the past 10 years, connecting brands with influencer communities. The marketplace is now looking to understand who is influential beyond Twitter social amplifiers. Over recent years there have been more and more companies producing lists based on Twitter followers. We want to break away from that.
Each Who’s Who report will provide you with the top Social Influencers, Content Creators, Event Speakers, Industry Analysts, Brand Employees, Brands and Publications across individual topics such as AI, Climate Change, The Future of Work, FinTech, Energy Policy, Obesity, etc.
The influential experts are selected using Onalytica’s 4 Rs methodology (Reach, Resonance, Relevance and Reference). Quantitative data is pulled through LinkedIn, Twitter, Personal Blogs, YouTube, Podcast, and Forbes channels, and our qualitative data is pulled by our insights and analytics team, capturing offline influence.
All the influential experts featured are categorised by influencer persona, the sector they work in, their role within that sector, and more from our curated database of 1m+ influencers.
We are striving for this report to be a One-Stop Shop for the Movers & Shakers of the industry so any feedback to further improve the lists is always gratefully received.
-
2
Cybersecurity Introduction
Cybersecurity is a necessity in day-to-day life, a study by the Ponemon Institute and Keeper Security has shown that cybersecurity risks are increasing due to prolonged remote working. The report found 60% of those surveyed said their organisation had been hit by a cyber attack. The issues that Zoom faced throughout April and May 2020 highlight how easy it is to become a victim of cybercrime. The importance of cybersecurity is clear, which is why this ‘Who’s Who’ report focuses on the voices raising awareness and driving solutions within cybersecurity. We have broken the industry down and looked at those working, speaking and writing within the space. “In cybersecurity, we’re not just looking to partner with influencers who have the biggest following or the loudest voice. It’s more important to focus on the ones having the right conversations in the right communities.”
- Philip Peters, Global Social Media & Content Lead, Palo Alto Networks
-
3
Brand Employees & Industry Practitioners
Rex JohnsonComputer Aid, IncDirector of CybersecurityTwitter: @RexSecurityLinkedIn: Click Here
Wendi WhitmoreIBMVice President, IBM X-ForceTwitter: @wendiwhitmoreLinkedIn: Click Here
Neil R. WylerRSA SecurityThreat Hunting & Incident Response SpecialistTwitter: @Grifter801LinkedIn: Click Here
Siân JohnMicrosoftEMEA Director, Cybersecurity StrategyTwitter: @sbj24LinkedIn: Click Here
Philip QuadeFortinetCISOTwitter: @pquade_cisoLinkedIn: Click Here
Raj SamaniMcAfeeMcAfee Fellow, Chief ScientistTwitter: @Raj_SamaniLinkedIn: Click Here
Rohit GhaiRSA SecurityCEOTwitter: @rohit_ghaiLinkedIn: Click Here
Kevin BeaumontMicrosoftSenior Threat Intelligence AnalystTwitter: @GossiTheDogLinkedIn: Click Here
Ann JohnsonMicrosoftCorporate Vice PresidentTwitter: @ajohnsocyberLinkedIn: Click Here
Wendy NatherCiscoHead of Advisory CISOsTwitter: @wendynatherLinkedIn: Click Here
Listed below are the most prominent & influential Subject Matter Expert voices from Enterprise brands. These people are working within the industry and also act as spokespeople to drive awareness & engagement for their employers.
Katie MoussourisLuta SecurityFounder & CEOTwitter: @k8em0LinkedIn: Click Here
https://twitter.com/RexSecurityhttps://twitter.com/RexSecurityhttps://www.linkedin.com/in/rex-johnson-464a481/https://twitter.com/wendiwhitmorehttps://twitter.com/wendiwhitmorehttps://www.linkedin.com/in/wendiwhitmore2/https://twitter.com/Grifter801https://twitter.com/Grifter801https://www.linkedin.com/in/neilwyler/https://twitter.com/sbj24https://twitter.com/sbj24https://www.linkedin.com/in/sian-john/https://twitter.com/pquade_cisohttps://twitter.com/pquade_cisohttps://www.linkedin.com/in/philip-quade/https://twitter.com/Raj_Samanihttps://twitter.com/Raj_Samanihttps://www.linkedin.com/in/raj-samani-3697b9/https://twitter.com/rohit_ghaihttps://twitter.com/rohit_ghaihttps://www.linkedin.com/in/rohitghai/https://twitter.com/GossiTheDoghttps://twitter.com/GossiTheDoghttps://www.linkedin.com/in/kevin-beaumont-security/https://twitter.com/ajohnsocyberhttps://twitter.com/ajohnsocyberhttps://www.linkedin.com/in/ann-johnsons/https://twitter.com/wendynatherhttps://twitter.com/wendynatherhttps://www.linkedin.com/in/wendynather/https://twitter.com/k8em0https://twitter.com/k8em0https://www.linkedin.com/in/kmoussouris/
-
4
Brand Employees & Industry Practitioners ctd.
Omar SantosCiscoPrincipal Engineer - PSIRT - Security Research and OperationsTwitter: @santosomarLinkedIn: Click Here
Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here
Dr. ir Johannes DrooghaagJohannes DrooghaagConsultantTwitter: @DrJDrooghaagLinkedIn: Click Here
Camille StewartGoogleSecurity & Privacy PolicyTwitter: @CamilleEsqLinkedIn: Click Here
Ryan NaraineIntel CorporationDirector, Security StrategyTwitter: @ryanaraineLinkedIn: Click Here
Cristin GoodwinMicrosoftAssistant General CounselTwitter: @CristinGoodwinLinkedIn: Click Here
Zulfikar RamzanRSA SecurityChief Digital OfficerTwitter: @Zulfikar_RamzanLinkedIn: Click Here
Becky PinkardAldermore Bank PLCCISOTwitter: @BeckyPinkardLinkedIn: Click Here
John LambertMicrosoftDistinguished EngineerTwitter: @JohnLaTwCLinkedIn: Click Here
Eugene KasperskyKaperskyCEOTwitter: @e_kasperskyLinkedIn: Click Here
J Wolfgang GoerlichCiscoAdvisory CISO, Duo SecurityTwitter: @jwgoerlichLinkedIn: Click Here
Robert M. LeeDragosFounder & CEOTwitter: @RobertMLeeLinkedIn: Click Here
https://twitter.com/santosomarhttps://twitter.com/santosomarhttps://www.linkedin.com/in/santosomar/https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/DrJDrooghaaghttps://www.linkedin.com/in/johannesdrooghaag/https://twitter.com/CamilleEsqhttps://twitter.com/CamilleEsqhttps://www.linkedin.com/in/camillestewartesq/https://twitter.com/ryanarainehttps://twitter.com/ryanarainehttps://www.linkedin.com/in/ryanaraine/https://twitter.com/CristinGoodwinhttps://twitter.com/CristinGoodwinhttps://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/https://twitter.com/Zulfikar_Ramzanhttps://twitter.com/Zulfikar_Ramzanhttps://www.linkedin.com/in/zulfikar-ramzan-aa581/https://twitter.com/BeckyPinkardhttps://twitter.com/BeckyPinkardhttps://www.linkedin.com/in/bpinkard/https://twitter.com/JohnLaTwChttps://twitter.com/JohnLaTwChttps://www.linkedin.com/in/johnjlambert/https://twitter.com/e_kasperskyhttps://twitter.com/e_kasperskyhttps://www.linkedin.com/in/eugenekaspersky/https://twitter.com/jwgoerlichhttps://twitter.com/jwgoerlichhttps://www.linkedin.com/in/jwgoerlich/https://twitter.com/RobertMLeehttps://twitter.com/RobertMLeehttps://www.linkedin.com/in/robmichaellee/
-
5
Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here
Javvad MalikKnowBe4Security Awareness AdvocateTwitter: @J4vv4DLinkedIn: Click Here
Diana KellySecurityCurveCTO & Founding PartnerTwitter: @dianakelley14LinkedIn: Click Here
Jo PetersonClarify360VP - Cloud + Security ServicesTwitter: @digitalcloudgalLinkedIn: Click Here
Brian KrebsIndependentReporter/Publisher, CybersecurityTwitter: @briankrebsLinkedIn: Click Here
Dan LohrmannSecurity Mentor, IncChief Strategist & CSOTwitter: @govcsoLinkedIn: Click Here
Bruce SchneierInrupt, Inc.Chief of Security ArchitectureTwitter: @schneierblogLinkedIn: N/A
Kevin L. JacksonGC GlobalNetCEOTwitter: @Kevin_JacksonLinkedIn: Click Here
Chuck BrooksBrooks Consulting InternationalPresidentTwitter: @ChuckDBrooksLinkedIn: Click Here
Professional Influencers & Social Amplifiers
Here are the people who are creating and sharing content on cybersecurity on LinkedIn & Twitter that generate high social engagement.
These people are considered influencers. They are also commissioned by many brands to amplify relevant content to their audiences.
Personas
Michael FisherWhitcraft GroupSenior Systems AnalystTwitter: @Fisher85MLinkedIn: Click Here
https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/J4vv4Dhttps://twitter.com/J4vv4Dhttps://www.linkedin.com/in/javvad/https://twitter.com/dianakelley14https://twitter.com/dianakelley14https://www.linkedin.com/in/dianakelleysecuritycurve/https://twitter.com/digitalcloudgalhttps://twitter.com/digitalcloudgalhttps://www.linkedin.com/in/jopeterson1/https://twitter.com/briankrebshttps://twitter.com/briankrebshttps://www.linkedin.com/in/bkrebs/https://twitter.com/govcsohttps://twitter.com/govcsohttps://www.linkedin.com/in/danlohrmann/https://twitter.com/schneierbloghttps://twitter.com/schneierbloghttps://twitter.com/Kevin_Jacksonhttps://twitter.com/Kevin_Jacksonhttps://www.linkedin.com/in/kjackson/https://twitter.com/ChuckDBrookshttps://twitter.com/ChuckDBrookshttps://www.linkedin.com/in/chuckbrooks/https://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://www.linkedin.com/in/fisher85m/
-
6
Professional Influencers & Social Amplifiersctd.
Joseph MennIndependentAuthorTwitter: @josephmennLinkedIn: Click Here
Lance SpitznerSANS InstituteDirector, SANS Security AwarenessTwitter: @lspitznerLinkedIn: Click Here
Avrohom Gottheil#AskTheCEO MediaCEOTwitter: @avrohomgLinkedIn: Click Here
Shira RubinoffPrime Tech PartnersPresident & Co-FounderTwitter: @ShirastweetLinkedIn: Click Here
Marco CiappelliITSP MagazineCo-FounderTwitter: @MarcoCiappelliLinkedIn: Click Here
Rich TehraniTMCCEOTwitter: @rtehraniLinkedIn: Click Here
Paula PiccardOwnerSocial Media ConsultantTwitter: @Paula_PiccardLinkedIn: Click Here
Ludmila Morozova-BussCapitol Technology UniversityPh.D Student/ResearcherTwitter: @TopCyberNewsLinkedIn: Click Here
Joseph SteinbergIndependentAdvisorTwitter: @JosephSteinbergLinkedIn: Click Here
https://twitter.com/josephmennhttps://twitter.com/josephmennhttps://www.linkedin.com/in/josephmenn/https://twitter.com/lspitznerhttps://twitter.com/lspitznerhttps://www.linkedin.com/in/lance-spitzner-0ab0ba1/https://twitter.com/avrohomghttps://twitter.com/avrohomghttps://twitter.com/Shirastweethttps://twitter.com/Shirastweethttps://www.linkedin.com/in/shirarubinoff/https://twitter.com/MarcoCiappellihttps://twitter.com/MarcoCiappellihttps://www.linkedin.com/in/marco-ciappelli/https://twitter.com/rtehranihttps://twitter.com/rtehranihttps://www.linkedin.com/in/richtehrani/https://twitter.com/Paula_Piccardhttps://www.linkedin.com/in/paulapiccard/https://twitter.com/TopCyberNewshttps://twitter.com/TopCyberNewshttps://www.linkedin.com/in/ludmilamorozova/https://twitter.com/JosephSteinberghttps://twitter.com/JosephSteinberghttps://www.linkedin.com/in/josephsteinberg/
-
7
Event Speakers
Bob CarverVerizonPrincipal Cybersecurity Threat Intelligence and AnalyticsTwitter: @cybersecboardrmLinkedIn: Click Here
Graham CluleyIndependentCybercrime researcher, blogger, podcaster, public speakerTwitter: @gcluleyLinkedIn: Click Here
Rob MayRamsacManaging DirectorTwitter: @robmay70LinkedIn: Click Here
Tyler Cohen WoodPrivate ConsultancySpeaker, Pvt Consultant, AuthorTwitter: @TylerCohenWoodLinkedIn: Click Here
Jane FranklandCybersecurity Capital LtdOwner & CEOTwitter: @JaneFranklandLinkedIn: Click Here
Rich TehraniTMCCEOTwitter: @rtehraniLinkedIn: Click Here
Shira RubinoffPrime Tech PartnersPresident & Co-FounderTwitter: @ShirastweetLinkedIn: Click Here
Mirko RossAsvinCEOTwitter: @mirko_rossLinkedIn: Click Here
Jessica BarkerCygentaCo-Founder & Socio-Technical LeadTwitter: @drjessicabarkerLinkedIn: Click Here
Mark LyndNetsyncHead of Digital BusinessTwitter: @mclyndLinkedIn: Click Here
Below is a sample of people who are keynote speakers in cybersecurity or have spoken at cybersecurity events over the past few years.
https://twitter.com/cybersecboardrmhttps://twitter.com/cybersecboardrmhttps://www.linkedin.com/in/bobcarver/https://twitter.com/gcluleyhttps://twitter.com/gcluleyhttps://www.linkedin.com/in/grahamcluley/https://twitter.com/robmay70https://twitter.com/robmay70https://www.linkedin.com/in/rpvmay/https://twitter.com/TylerCohenWoodhttps://twitter.com/TylerCohenWoodhttps://twitter.com/TylerCohenWoodhttps://twitter.com/JaneFranklandhttps://twitter.com/JaneFranklandhttps://www.linkedin.com/in/janefrankland/https://twitter.com/rtehranihttps://twitter.com/rtehranihttps://www.linkedin.com/in/richtehrani/https://twitter.com/Shirastweethttps://twitter.com/Shirastweethttps://www.linkedin.com/in/shirarubinoff/https://twitter.com/mirko_rosshttps://twitter.com/mirko_rosshttps://www.linkedin.com/in/mirko-ross/https://twitter.com/drjessicabarkerhttps://twitter.com/drjessicabarkerhttps://www.linkedin.com/in/jessica-barker/https://twitter.com/mclyndhttps://twitter.com/mclyndhttps://www.linkedin.com/in/marklynd/
-
8
Analysts
Roles
Cory WolffLayer 8 SecurityCybersecurity AnalystTwitter: @cwolff411LinkedIn: Click Here
Paul McKayForresterSenior AnalystTwitter: @PMcKayAnalystLinkedIn: Click Here
Jeff PollardForresterVP & Principal AnalystTwitter: @jeff_pollard2LinkedIn: Click Here
Rebecca LucasRAND EuropeAnalystTwitter: N/ALinkedIn: Click Here
Scott CrawfordS&P Global Market IntelligenceInformation Security Research HeadTwitter: @s_crawfordLinkedIn: Click Here
Heather Marie VitalePeratonSenior Cybersecurity AnalystTwitter: @prettyhowtwnLinkedIn: Click Here
Caitlin GruenbergCyberGRXManager, Assessment OperationsTwitter: @CaitGru32LinkedIn: Click Here
Bash OsmanTechGeek365FounderTwitter: @BashKOsmanLinkedIn: N/A
Michael FisherWhitcraft GroupSenior Systems AnalystTwitter: @Fisher85MLinkedIn: Click Here
Joseph KrullAite GroupSenior AnalystTwitter: @joe_krullLinkedIn: Click Here
Here is a sample of the prominent analysts who are visible on LinkedIn & Twitter. These experts are sharing and discussing topics relevant to cybersecurity.
https://twitter.com/cwolff411https://twitter.com/cwolff411https://www.linkedin.com/in/corywolff/https://twitter.com/PMcKayAnalysthttps://twitter.com/PMcKayAnalysthttps://www.linkedin.com/in/paul-mckay-5304a115/https://twitter.com/jeff_pollard2https://twitter.com/jeff_pollard2https://www.linkedin.com/in/jpollard96/https://www.linkedin.com/in/rebeccaplucas/https://twitter.com/s_crawfordhttps://twitter.com/s_crawfordhttps://www.linkedin.com/in/scottacrawford/https://twitter.com/prettyhowtwnhttps://twitter.com/prettyhowtwnhttps://www.linkedin.com/in/heathermarievitale/https://twitter.com/CaitGru32https://twitter.com/CaitGru32https://www.linkedin.com/in/caitlin-gruenberg-671017b/https://twitter.com/BashKOsmanhttps://twitter.com/BashKOsmanhttps://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://twitter.com/Fisher85Mhttps://twitter.com/joe_krullhttps://twitter.com/joe_krullhttps://www.linkedin.com/in/jokrull/
-
9
Journalists
Steve MorganCybercrime MagazineFounder & Editor-in-ChiefTwitter: @CybersecuritySFLinkedIn: Click Here
Chris BingReutersCybersecurity ReporterTwitter: @Bing_ChrisLinkedIn: Click Here
Kim NashThe Wall Street JournalDeputy EditorTwitter: @knash99LinkedIn: Click Here
Jeff ElderBusiness InsiderCybersecurity ReporterTwitter: @JeffElderLinkedIn: Click Here
Kim ZetterIndependentInvestigative Journalist & AuthorTwitter: @KimZetterLinkedIn: Click Here
Mohit KumarThe Hacker NewsFounder & Editor-in-ChiefTwitter: @unix_rootLinkedIn: Click Here
Brian KrebsIndependentReporter/Publisher, CybersecurityTwitter: @briankrebsLinkedIn: Click Here
Kelly Jackson HigginsDark ReadingExecutive DirectorTwitter: @kjhigginsLinkedIn: Click Here
Nicole PerlrothThe New York TimesCybersecurity ReporterTwitter: @nicoleperlrothLinkedIn: Click Here
Joe UchillSC MagazineSenior ReporterTwitter: @JoeUchillLinkedIn: Click Here
The people listed below are a sample of editors, reporters & journalists who are prominent online personally and who represent media publications or work freelance. They also publish lots of relevant content on cybersecurity.
https://twitter.com/CybersecuritySFhttps://twitter.com/CybersecuritySFhttps://www.linkedin.com/in/cybersecuritysf/https://twitter.com/Bing_Chrishttps://twitter.com/Bing_Chrishttps://www.linkedin.com/in/christopher-b-a4402566/https://twitter.com/knash99https://twitter.com/knash99https://www.linkedin.com/in/kimnash/https://twitter.com/JeffElderhttps://twitter.com/JeffElderhttps://www.linkedin.com/in/jeffcelder/https://twitter.com/KimZetterhttps://twitter.com/KimZetterhttps://www.linkedin.com/in/kim-zetter-20421b/https://twitter.com/unix_roothttps://twitter.com/unix_roothttps://www.linkedin.com/in/hackermohitkumar/https://twitter.com/briankrebshttps://twitter.com/briankrebshttps://www.linkedin.com/in/bkrebs/https://twitter.com/kjhigginshttps://twitter.com/kjhigginshttps://www.linkedin.com/in/kellyj2/https://twitter.com/nicoleperlrothhttps://twitter.com/nicoleperlrothhttps://www.linkedin.com/in/nicoleperlroth/https://twitter.com/JoeUchillhttps://twitter.com/JoeUchillhttps://www.linkedin.com/in/joeuchill/
-
10
Threat Protection
Sectors
Omar SantosCiscoPrincipal Engineer - PSIRT - Security Research and OperationsTwitter: @santosomarLinkedIn: Click Here
Mick BaccioSplunkSecurity AdvisorTwitter: @nohackmeLinkedIn: Click Here
Selena LarsonDragosCyber Threat AnalystTwitter: @selenalarsonLinkedIn: Click Here
Vitali KremezVK Intel LLCFounder & CEOTwitter: @VK_IntelLinkedIn: Click Here
Sergio CaltagironeThreat Intelligence AcademyCEOTwitter: @cnoanalysisLinkedIn: Click Here
Joan RossInsightCyberChief Intelligence OfficerTwitter: @Joanross_bizLinkedIn: Click Here
Kevin BeaumontMicrosoftSenior Threat Intelligence AnalystTwitter: @GossiTheDogLinkedIn: Click Here
Adam ShostackThe Black Hat BriefingsReview Board MemberTwitter: @adamshostackLinkedIn: Click Here
Linda BellIBMCyber Resiliency AdvisorTwitter: @LindaCisspLinkedIn: Click Here
Cheryl BiswasTDCyber Security SpecialistTwitter: @3ncr1pt3dLinkedIn: Click Here
Below are people who have spoken online about threat protection in the context of cybersecurity, or people who work within the threat protection and cybersecurity sector.
https://twitter.com/santosomarhttps://twitter.com/santosomarhttps://www.linkedin.com/in/santosomar/https://twitter.com/nohackmehttps://twitter.com/nohackmehttps://www.linkedin.com/in/nohackme/https://twitter.com/selenalarsonhttps://twitter.com/selenalarsonhttps://www.linkedin.com/in/selenalarson/https://twitter.com/VK_Intelhttps://twitter.com/VK_Intelhttps://www.linkedin.com/in/vitali-kremez-021905104/https://twitter.com/cnoanalysishttps://twitter.com/cnoanalysishttps://www.linkedin.com/in/sergiocaltagirone/https://twitter.com/Joanross_bizhttps://twitter.com/Joanross_bizhttps://www.linkedin.com/in/joanross/https://twitter.com/GossiTheDoghttps://twitter.com/GossiTheDoghttps://www.linkedin.com/in/kevin-beaumont-security/https://twitter.com/adamshostackhttps://twitter.com/adamshostackhttps://www.linkedin.com/in/shostack/https://twitter.com/LindaCissphttps://twitter.com/LindaCissphttps://www.linkedin.com/in/lindawbell/https://twitter.com/3ncr1pt3dhttps://twitter.com/3ncr1pt3dhttps://www.linkedin.com/in/cherylbiswas/
-
11
Information & Compliance
Richard BellMicro FocusHead of Global Cybersecurity & IT ComplianceTwitter: @securityspeakLinkedIn: Click Here
Edna ConwayMicrosoftVP, Global Security, Risk & Compli-ance (Azure)Twitter: @Edna_ConwayLinkedIn: Click Here
Mariano M. del RíoSecureTechCybersecurity & Compliance ConsultantTwitter: @mmdelrioLinkedIn: Click Here
Daniel P. WallaceGrow Forward LLCPrincipal Information Security Consultant & Project ManagerTwitter: @dpwallaceLinkedIn: Click Here
Otavio FreireSafeGuard CyberPresident, CTO & Co-FounderTwitter: @OtavioFreireLinkedIn: Click Here
Rox KulliyeSecureDAMChief Technologist CSFTwitter: @2rkivaLinkedIn: Click Here
Dr. Teju OyewoleIndigoIT Security | Compliance ManagerTwitter: N/ALinkedIn: Click Here
Jonathan ArmstrongCorderyPartnerTwitter: @armstrongjpLinkedIn: Click Here
David ClarkeData Breach TrainingData breach Trainer & ConsultantTwitter: @1DavidClarkeLinkedIn: Click Here
Wayne AndersonMicrosoftSr. Security & Compliance ArchitectTwitter: @DigitalSecArchLinkedIn: Click Here
Information & compliance plays a big role in Cybersecurity, below is a small sample of influencers who discuss or work within compliance and cybersecurity.
https://twitter.com/securityspeakhttps://twitter.com/securityspeakhttps://www.linkedin.com/in/rbell/https://twitter.com/Edna_Conwayhttps://twitter.com/Edna_Conwayhttps://www.linkedin.com/in/ednaconway/https://twitter.com/mmdelriohttps://twitter.com/mmdelriohttps://www.linkedin.com/in/mmdelrio/https://twitter.com/dpwallacehttps://twitter.com/dpwallacehttps://www.linkedin.com/in/wallacedan/https://twitter.com/OtavioFreirehttps://twitter.com/OtavioFreirehttps://www.linkedin.com/in/ofreire/https://twitter.com/2rkivahttps://twitter.com/2rkivahttps://www.linkedin.com/in/roxkulliye/https://www.linkedin.com/in/drtejuoyewole/https://twitter.com/armstrongjphttps://twitter.com/armstrongjphttps://www.linkedin.com/in/jparmstrong/https://twitter.com/1DavidClarkehttps://twitter.com/1DavidClarkehttps://www.linkedin.com/in/1davidclarke/https://twitter.com/DigitalSecArchhttps://twitter.com/DigitalSecArchhttps://www.linkedin.com/in/wayneanderson/
-
12
Cloud Security
Todd D. LyleGrounding the Cloud Leadership SeriesAuthor/ResearcherTwitter: @todddlyleLinkedIn: Click Here
Roger GspanAxians ICT Austria GmbHHead of Consultant Network & CybersecurityTwitter: @RogerGspanLinkedIn: Click Here
Jo PetersonClarify360VP - Cloud + Security ServicesTwitter: @digitalcloudgalLinkedIn: Click Here
Nikhil AgarwalDeloitteCyber Risk Advisory/Cloud SecurityTwitter: @reachtonikhilLinkedIn: Click Here
Teri Radichel2nd Sight LabCEOTwitter: @TeriRadichelLinkedIn: Click Here
Riyaz WalikarAppseccoHead of Security Research and TestingTwitter: @riyazwalikarLinkedIn: Click Here
Ratan JyotiUjjivan Small Financial Bank LimitedChief Information Security OfficerTwitter: @reach2ratanLinkedIn: Click Here
Charbel NemnomitnetX Cloud ArchitectTwitter: @CHARBELNEMNOMLinkedIn: Click Here
Kayode OlafunmiloyeAMDSenior Manager - Cloud Security Strategy + ArchitectureTwitter: N/ALinkedIn: Click Here
Doug CahillEnterprise StrategyVice President and Group Director, CybersecurityTwitter: @DougCahillLinkedIn: Click Here
Cloud security is a major concern for cybersecurity and needs to be part of the conversation. Below is a sample of influential experts who discuss Cloud security online, have discussed Cloud security in the context of cybersecurity, or work within the sector.
Dr. ir Johannes DrooghaagJohannes DrooghaagConsultantTwitter: @DrJDrooghaagLinkedIn: Click Here
https://twitter.com/todddlylehttps://twitter.com/todddlylehttps://www.linkedin.com/in/todddlyle/https://twitter.com/RogerGspanhttps://twitter.com/RogerGspanhttps://www.linkedin.com/in/roger-gspan-a7668268/https://twitter.com/digitalcloudgalhttps://twitter.com/digitalcloudgalhttps://www.linkedin.com/in/jopeterson1/https://twitter.com/reachtonikhilhttps://twitter.com/reachtonikhilhttps://www.linkedin.com/in/reachtonikhil/https://twitter.com/TeriRadichelhttps://twitter.com/TeriRadichelhttps://www.linkedin.com/in/teriradichel/https://twitter.com/riyazwalikarhttps://twitter.com/riyazwalikarhttps://www.linkedin.com/in/riyazw/https://twitter.com/reach2ratanhttps://www.linkedin.com/in/ratanjyoti/https://twitter.com/CHARBELNEMNOMhttps://twitter.com/CHARBELNEMNOMhttps://www.linkedin.com/in/cnemnom/https://www.linkedin.com/in/kayode-olafunmiloye-487827/https://twitter.com/DougCahillhttps://twitter.com/DougCahillhttps://www.linkedin.com/in/dougcahill/https://twitter.com/DrJDrooghaaghttps://www.linkedin.com/in/johannesdrooghaag/
-
13
Cybersecurity Brands
Brands
FortinetRanking: 50Twitter: @FortinetLinkedIn: Click Here
McAfeeRanking: 50Twitter: @McAfeeLinkedIn: Click Here
ProofpointRanking: 50Twitter: @proofpointLinkedIn: Click Here
Palo Alto NetworksRanking: 50Twitter: @PaloAltoNtwksLinkedIn: Click Here
DarktraceRanking: 50Twitter: @DarktraceLinkedIn: Click Here
ImpervaRanking: 50Twitter: @ImpervaLinkedIn: Click Here
Check Point SoftwareRanking: 100Twitter: @CheckPointSWLinkedIn: Click Here
Trend MicroRanking: 50Twitter: @TrendMicroLinkedIn: Click Here
RSA SecurityRanking: 50Twitter: @RSAsecurityLinkedIn: Click Here
FireEye, IncRanking: 50Twitter: @FireEyeLinkedIn: Click Here
Below is a sample of brands who provide cybersecurity solutions and are producing relevant thought leadership content.
https://twitter.com/Fortinethttps://twitter.com/Fortinethttps://www.linkedin.com/company/fortinet/https://twitter.com/McAfeehttps://twitter.com/McAfeehttps://www.linkedin.com/company/mcafee/https://twitter.com/proofpointhttps://twitter.com/proofpointhttps://www.linkedin.com/company/proofpoint/https://twitter.com/PaloAltoNtwkshttps://twitter.com/PaloAltoNtwkshttps://www.linkedin.com/company/palo-alto-networks/https://twitter.com/Darktracehttps://twitter.com/Darktracehttps://www.linkedin.com/company/darktrace/https://twitter.com/Impervahttps://twitter.com/Impervahttps://www.linkedin.com/company/imperva/https://twitter.com/CheckPointSWhttps://twitter.com/CheckPointSWhttps://www.linkedin.com/company/check-point-software-technologies/https://twitter.com/TrendMicrohttps://twitter.com/TrendMicrohttps://www.linkedin.com/company/trend-micro/https://twitter.com/RSAsecurityhttps://twitter.com/RSAsecurityhttps://www.linkedin.com/company/rsasecurity/about/https://twitter.com/FireEyehttps://twitter.com/FireEyehttps://www.linkedin.com/company/fireeye/
-
14
Methodology
Our Who’s Who lists are created using the Onalytica platform which has a curated database of over 1 million influencers. Our platform allows you to discover, validate and categorise influencers quickly and easily via keyword searches. Our lists are made using carefully created Boolean queries which then rank influencers by resonance, relevance, reach and reference, meaning influencers are not only ranked by themselves, but also by how much other influencers are referring to them. The lists are then validated, and filters are used to split the influencers up into the categories that are seen in the list.
This Who’s Who list should give you an insight into the Cybersecurity industry and help break it down. We always want to make sure you are getting the most valuable information available from our lists, so feedback is always welcome!
If you want to learn more about Onalytica, or if you’d like to see our platform in action, feel free to get in touch!
Get in Touch
https://onalytica.com/contact/