This list brings together the technology leaders in the security field. Their twitter and LinkedIn links are given alongside to quickly follow your favorite influencer
Andrew Hay is an information security industry veteran with close to 20 years of experience as a Security Practitioner, Industry Analyst and Executive. As the Co-Founder and CTO for LEO Cyber Security, he is responsible for the creation and driving of the strategic vision for the company. Andrew has served in various roles and responsibilities at a number of companies including DataGravity, OpenDNS (now a Cisco company), CloudPassage, Inc., 451 Research, the University of Lethbridge, Capital G Bank Ltd. (now Clarien Bank Bermuda), Q1 Labs (now IBM), Nokia (now Check Point), Nortel Networks, Magma Communications (now Primus Canada), and Taima Corp (now Convergys). He is an Instructor at SANS institute
Rich is the VP of Product for DisruptOPS and Analyst and CEO of Securosis. With twenty years of experience in information security, physical security, and risk management, Rich is one of the foremost experts on cloud security, having driven development of the Cloud Security Alliance’s V4 Guidance and the associated CCSK training curriculum. Prior to founding DisruptOPS and Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, Rich worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator
Zane Lackey is the Co-Founder/Chief Security Officer at Signal Sciences and serves on the Advisory Boards of the Internet Bug Bounty Program and the US State Department-backed Open Technology Fund. Prior to Signal Sciences, Lackey was the Director of Security Engineering at Etsy and a Senior Security Consultant at iSEC Partners. He has been featured in notable media outlets such as the BBC, Associated Press, Forbes, Wired, CNET, Network World, and SC Magazine. A frequent speaker at top industry conferences, he has presented at Black Hat, RSAC, USENIX, Velocity, Microsoft BlueHat, SANS, OWASP, QCon, and has given invited lectures at Facebook, Goldman Sachs, IBM and the Federal Trade Commission.
Josh is currently Co-Founder and Chief Product Officer at IDRRA. Prior to joining IDRRA, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Josh is an experienced cyber security analyst who applies his analytical methodology to help organizations build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security posture. Josh has worked with numerous clients in both the public and private sectors at both the strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT), where he built from the ground up and subsequently ran the network, media, and malware analysis/forensics capabilities for US-CERT.
Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike. A renowned Researcher, a thought-leader on cybersecurity strategy and has served as Special Advisor to Department of Defense. In 2016, Alperovitch revealed Russian intelligence agencies’ hack of the Democratic National Committee (DNC), events which unveiled the full scope of cyber-influence operations being launched against the 2016 US Election. In 2010 and 2011, Alperovitch led the global team hat investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and gave those incidents their names. He has received numerous awards and recognitions, including Fortune’s “40 Under 40,” Politico 50, MIT’s “Innovators Under 35” and Foreign Policy’s Leading Global Thinker.
Mikko Hypponen is the Chief Research Officer at F-Secure in Finland.
He has fought the biggest virus outbreaks in the net over the last 20 years. His TED Talk is the most viewed computer security talk in the world. Tagged as a “Code Warrior” by Vanity Fair, Hypponen is a go-to expert on cybercrime for international news media.
Eugene Kaspersky is an IT Security expert, CEO and co-founder of Kaspersky Lab—an international company with regional offices in 30 countries and employing over 2,500 specialists. Kaspersky graduated from Moscow’s Institute of Cryptography, Telecommunications and Computer Science in 1987. He is known not only as a businessman, but also a thought leader in the security industry—for over 15 years since Kaspersky Lab was founded. From Flame to Gauss and Madi, he has been at the forefront of all the company’s groundbreaking malware discoveries, all the while sharing his expert insight with businesses and consumers alike. Just recently he was included on Foreign Policy’s list of Top Global Thinkers of 2012 for his contribution to IT security awareness on a global scale.
Troy Hunt is a Pluralsight Author and Instructor, Microsoft Regional Director and world-renowned Internet Security Specialist who travels the world speaking at events and training technology professionals. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.
Jeremiah Grossman’s career spans nearly 20 years. He founded WhiteHat Security and is currently the Chief of Security Strategy at SentinelOne. Grossman possesses a unique combination of technology savvy, customer advocacy and personal passion for application security. A world-renowned web security expert, speaker and influential blogger, he brings a lifetime of information security experience, both homegrown and from his days as Yahoo!’s Information Security Engineer. The ultimate “WhiteHat,” he is also Founder of the Web Application Security Consortium and serves on the advisory board of Risk I/O and SD Elements. In his spare time, he practices Brazilian jiu-jitsu and has earned a black belt.
Katie Moussouris is a noted authority on vulnerability disclosure and bug bounties, and Founder and CEO of Luta Security, a company that specializes in process improvement for handling vulnerabilities. She created Microsoft’s bug bounty programs and started Microsoft Vulnerability Research. She is also a Subject Matter Expert for ISO standards in vuln disclosure (29147), vuln handling processes (30111) and secure development (27034). She is a Visiting Scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow and Harvard Belfer Affiliate. She is also part of the official US Wassenaar delegation. She is on various CFP review boards and is an adviser to the Center for Democracy and Technology.
Richard Bejtlich is an advisor to the security ecosystem. He was previously Chief Security Strategist at FireEye, and Mandiant’s Chief Security Officer when FireEye acquired Mandiant in 2013. At General Electric, as Director of Incident Response, he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. His fourth book is “The Practice of Network Security Monitoring”
Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode, which he co-founded in 2006. He oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He is the author of The Art of Software Security Testing.
Runa A. Sandvik is a Privacy and Security Researcher, working at the intersection of technology, law and policy. She teaches digital security to journalists and helps media organizations improve their security posture. She is a Technical Advisor to Freedom of the Press Foundation and the TrueCrypt Audit project, and a member of the review board for Black Hat Europe.
Parisa Tabriz is a computer security expert who works for Google as a Director of Engineering. She has been called Google’s “Security Princess” due to her experience in hacking and internet security. She heads a team of 30 experts responsible for the security of Google Chrome.She is also responsible for training Google staff interested in moving into the internet security field. Tabriz co-founded the Our Security Advocates conference.
Passionate about creating order from chaos, developing systems and workflow to make the right thing the easy thing, and advocating risk management as a valuable tool for innovation. Frequent speaker at conferences about technology and security/privacy issues. creator of Downworthy, a fun little Chrome extension that changes hyperbolic viral news site headlines into something funnier.
Brian Honan is recognized as an industry expert on information security, providing consulting services to clients in various industry segments. Honan’s work also includes advising various Government security agencies and the European Commission on matters relating to information security. In 2008, he founded the Irish Reporting and Information Security Service (IRISS www.iriss.ie) which is Ireland’s first CERT (Computer Emergency Response Team). He has addressed a number of major conferences on information security. He is author of the book “ISO 27001 in a Windows Environment,” he has published a number of technical papers and he has been technical editor and reviewer of a number of industry recognized publications. He is also the European editor for the SANS Institute’s weekly SANS NewsBites.
Entrepreneur, Cyber Security Researcher, Trainer, Infosec Journalist, Speaker, Traveller & Part-time Hacker. Mohit started THN as a dedicated Cybersecurity and Hacking News platform to educate people on how to use the Internet in the safest way. Founder & CEO — Attracting over 10 million monthly readers, ‘The Hacker News,’ has internationally been recognized as the leading, most trusted news source of hacking, cyber security & technology for the technologists & nerds.Co-Founder & Director — ‘The Hackers Conference,’ India’s first unique cyber security and hacking conference.
Mark is a director and founder of Azimuth Security. The bulk of his professional career has been focused in the area of application security research. Mark spent a number of years as a senior researcher at IBM’s Internet Security Systems (ISS) X-Force, during which he discovered a number of high-profile vulnerabilities in ubiquitous Internet software. In addition to professional vulnerability research, Mark’s previous experience includes serving as a principal security architect for McAfee, as well as performing a variety of information security consulting services independently and for ITAC Consulting.
Christofer Hoff has more than 20 years experience in high-profile global roles in network and information security architecture, engineering, operations and management. In previous roles, Hoff has served as VP of Strategic Planning and the Technical Marketing Engineering team and as Global Chief Security Architect of the Advanced Technology Team at Juniper Networks. As Director of Cloud & Virtualization Solutions at Cisco Systems, he focused on virtualization and cloud computing security, spending most of his time interacting with global enterprises and service providers, governments, and the defense and intelligence communities. Hoff is a founding member of and technical advisor to the Cloud Security Alliance, as well as founder of the CloudAudit project and the HacKid conference.
Georgia Weidman is from Austin,Texas and the founder of Bulb Security. Prior to this she worked as an Security analyst in the companies like IBM, Gemini Security Solution, Neohapsis. She completed her education in Computer and network security from James Madison University. She provides security trainings, services and solution on Bulb Security. She is one of the well known name in the industry right now. She is the author of Penetration Testing: A Hands-On Introduction to Hacking from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.
A freelance security consultant specialising in web app testing. Having a background as a developer helped him see inside the apps during testing and explain problems to the development team afterwards. The author of a large number of open source tools and a regular contributor to various mailing lists and forums. His popular tools include the Wifi Pineapple, Pipal and CeWL. He is an Associate Lecturer at Sheffield Hallam University
Alex Hutton is currently Director of Operational Risk at Zions Bancorporation. Prior to this, Hutton has been an entrepreneur involved with several successful startups. He served as CEO for Risk Management Insight. He served as a principal in the Risk Intelligence group for Verizon, involved in the development of the VDBIR. He is an avid security blogger, speaker and conference organizer. He brings a wealth of knowledge and experience on risk management and metrics to any discussion. He is a passionate and experienced public speaker.
David Ulevitch is Vice President for Cisco’s Security Business Group. Ulevitch is responsible for the company’s cloud security strategy and product development. He joined Cisco through the acquisition of OpenDNS, a cloud security company he founded in 2005 with the goal of delivering a safer and faster Internet experience. Under his leadership, the cloud-delivered service today protects a global audience of more than 65 million people across more than 10,000 enterprise customers, including many of the largest companies in the world. A noted Internet and security expert, Ulevitch has a bachelor of science degree in anthropology from Washington University.
Nick Sullivan is a leading cryptography and security expert. He founded and built the security team at CloudFlare, one of the world’s leading web security companies. He is a digital rights management pioneer in his work building Apple’s multi-billion dollar iTunes store. He is the author of over a dozen computer security patents and holds an MSc in Cryptography and a BMath in Pure Mathematics.
Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is a Chief Security Data Scientist at Rapid7. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), author (Data-Driven Security), speaker and regular contributor to the open source community (github.com/hrbrmstr). He currently serves on the Board of Directors for the Society of Information Risk Analysts, is on the editorial board of SANS Securing the Human program and was Co-chair of the 2014 Metricon security metrics/analytics conference. He holds a bachelor’s degree in computer science from the University of Scranton.
Michael Murray is the Director of Product Security at GE Healthcare, responsible for providing architecture and security assessment services to support GE Healthcare’s engineering teams in building secure products. A career information security professional, Murray has taken leadership roles in organizations ranging from small consulting firms to Fortune 100 companies. Before joining GE, Michael was Co-founder and Managing Partner of MAD Security / The Hacker Academy.
Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of Fortalice Solutions, an industry-leading security consulting company, and co-founder of Dark Cubed, a cybersecurity product companyheresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa was named one of the top 25 Most Influential People in Security by Security Magazine and One of Infosec’s Rising Stars and Hidden Gems by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.
Adam Ely is an entrepreneur and operations executive having founded a security product company and held leadership roles with several Fortune 100 companies. Ely is currently Vice President and Deputy Chief Information Security Officer with Walmart. Prior to this role he co-founded Bluebox Security, acquired in 2016, was the CISO of Salesforce’s Heroku business unit, and led security and compliance at TiVo and within The Walt Disney Company.
Rebecca Herold, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, has over 25 years of IT, info sec, privacy & security experience; is CEO & Founder (2004) of Rebecca Herold & Associates, LLC, aka The Privacy Professor(R); and President & Co-Founder (2014) of SIMBUS360. Rebecca is also an entrepreneur, author and Adjunct Professor for the Norwich University Master of Science in Information Assurance Program. Rebecca has led the NIST Smart Grid privacy group since June 2009 and has been an officer for the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group since June 2015Some of Rebecca’s books include: The Practical Guide to HIPAA Privacy and Security Compliance (2 editions), Data Privacy for the Smart Grid, The Privacy Papers, Managing an Information Security and Privacy Awareness and Training Program (2 editions)
Aleks has headed the Global Research and Analysis Team at Kaspersky Lab since 2008, and specializes in all aspects of information security, including mobile malware. His responsibilities include detecting and analyzing new malware. His research and analytical articles are published both on dedicated IT sites and in the mass media. He has been with the company since 2002, and is based in Moscow. Prior to joining Kaspersky Lab, Aleks worked as CTO at KomiSat, as Manager of the ISP department at Komite, and as System Administrator at SMZ. In 1996, he founded the Republic of Komi Antivirus Center, and in 1998, he acted as project coordinator of the Wildlist Russia Project, an initiative which was launched with the aim of collecting and analyzing information about malware outbreaks in the Russian Federation.
E.J. Hilbert is a security and privacy professional with over 20 years of experience and particular expertise in cyber based attacks.He currently serves as the CEO of Path Networks and President of Secure Credit Systems. Both are blocked chained based technology firms seeking to disrupt the current markets.Prior to his current role, he served as Vice President, Cyber Security Division at Gavin De Becker and Associates.In 2009, EJ founded and served as the President of Online Intelligence LLC. Online Intelligence, “OI”, provided online investigations, brand protection and internet traffic forensic services to online and social media advertisers, merchants, celebrities and other interested parties.E.J., was a Special Agent for FBI based in Southern California, where he was the lead case agent for numerous cyber-crime, white collar, counter intelligence and counterterrorism investigations.
Andrew Jaquith is a senior information security and risk executive with a passion for quantifying risk. As Managing Director at Goldman Sachs, he manages the firm’s Technology Risk Analytics and Measurement program. Andrew has demonstrated success as a senior leader, with two successful startup exits, and as an implementer of data-driven analytics systems. He literally wrote the book on security metrics, used by a generation of risk professionals to connect security to the corner office.
David Mortman has been doing Information Security for 20 years. He is currently Chief Security Architect and Distinguished Engineer at Dell Software, as well as a Contributing Analyst at Securosis. Most recently, he was the Director of Security and Operations at C3. Previously, Mortman was the CISO at Siebel Systems and the Manager of Global Security at Network Associates. He speaks regularly at Black Hat, Defcon, RSA and other conferences. Additionally, he blogs at emergentchaos.com, newschoolsecurity.com and securosis.com. He sits on a variety of advisory boards, including Qualys, Lookout and Virtuosi. He holds a B.S. in Chemistry from the University of Chicago.
Experienced Cyber Security professional previously working as Group CISO/CSO for Barclays Plc. He was at Europol where he held several roles including Head of Europol’s Counter Terrorist and Financial Intelligence Centre and notably, Head of the European Cybercrime Centre. He began his career in law enforcement and held multiple senior roles within the Danish National Police including Director, Serious Organized Crime Agency and Director of Operations, Danish Security Intelligence Service. External Lecturer – Executive MBA, Cyber Security at Copenhagen Business School
Malik Mesellem is an IT security professional with over 15 years of experience. Malik has always had a passion for Ethical Hacking and Penetration Testing… obsessed with Windows and Web Application (in)Security. In 2010, he started his own company, MME BVBA. MME is specialized in IT Security Audits, User Awareness Campaigns, Vulnerability Assessments, Penetration Testing and Security Training. Malik gives master classes, lectures and workshops on conferences and for several institutions. Malik is an OWASP ZAP evangelist and used to be a mentor for the SANS Institute, mentoring the SANS ‘SEC560 – Network Penetration Testing and Ethical Hacking’ course. Malik is also the founder and developer of bWAPP. bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web vulnerabilities! It covers all major known web bugs, including all risks from the OWASP Top 10 project. It has 100.000+ downloads worldwide.
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. Cornell is an active member of the development community and a sought-after Speaker on topics of web application security, speaking at international conferences including TEDx, RSA Security Conference, OWASP AppSec USA and EU and Black Hat Arsenal.
Eddie Schwartz is Executive Vice President of Cyber Services for DarkMatter and has worked in the cybersecurity field for almost 30 years. Schwartz has led large enterprise and startup security companies across a broad range of product and service categories. Previously, he helped pioneer advertising fraud detection at security startup White Ops as President and Chief Operating Officer.
Cybersecurity thought leader with over 30 years’ experience in information security for commercial industries and government and a 20-year veteran as a US Army counterintelligence agent. Collaboratively works with C-level executives to identify high-risk processes and develop appropriate mitigation controls in a timely and cost effective manner. A skilled self-starter with executive, departmental and team management experience delivering governance, risk & compliance aligning with ISO-27002, NIST, FFIEC, GLB, NYDFS, HIPAA, SOX-404, COBIT, PCI, and FISMA regulatory requirements to fortune 100 organizations and the Federal Government.
Dale is currently the Chief Security Officer at Zayo Group, a global telecommunications service provider, specializing in Optical, Internet and Colocation services. Prior to Zayo, Dale was the Chief Security Strategist at CenturyLink and the Chief Security Officer for Level 3. Dale Drew is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, working in Federal/State Law Enforcement and with Internet Service Providers (ISP). Dale brings a practical capability to integrating security into the culture of the business, enabling the company to be more flexible, with demonstrable results.
Gerhard Eschelbeck is a well-regarded information technology executive with strong operational and strategic experience. Over the past decade, he has been transforming traditional security technologies and delivering them as Software-as-a-Service (SaaS) solutions leveraging cloud computing architectures and subscription business models. Gerhard has a passion for creating and championing new technologies and for developing and growing successful organizations and people. He is also a trusted advisor to a number of early stage startup companies.He was named one of InfoWorld’s 25 Most Influential CTO’s in 2003 and 2004, and received this honor a third time in 2006. Gerhard is a frequent contributor to the SANS Top 20 expert consensus identifying the most critical security vulnerabilities. Gerhard is also a highly regarded author and is perhaps best known for publishing the “Laws of Vulnerabilities.” He is one of the inventors of the Common Vulnerability Scoring System (CVSS) and holds numerous patents in the field of managed network security.
Stuart leads Cylance as its CEO and visionary for the first math-based approach to threat detection, protection and response. Prior to Cylance, Stuart was EVP, Global CTO and General Manager at McAfee/Intel Security. Stuart is the creator and lead-author of the most successful security book of all time, Hacking Exposed. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry’s leading authorities in information security today.
Eva Galperin is EFF’s Director of Cyber Security. Prior to 2007, when she came to work for EFF, Galperin worked in security and IT in Silicon Valley and earned degrees in political science and international relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world. To that end, she has applied the combination of her political science and technical background to everything from organizing EFF’s Tor Relay Challenge, to writing privacy and security training materials (including Surveillance Self-Defense and the Digital First Aid Kit), and publishing research on malware in Syria, Vietnam, Kazakhstan. When she is not collecting new and exotic malware, she practices aerial circus arts and learning new languages.
Bruce Schneier is an internationally renowned security technologist, called a security guru by The Economist. He is the author of 14 books, including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, as well as hundreds of articles, essays and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a Fellow at the Berkman Klein Center for Internet and Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a Board Member of the Electronic Frontier Foundation, AccessNow and the Tor Project; and an Advisory Board Member of EPIC and VerifiedVoting.org. He is also a Special Advisor to IBM Security and the Chief Technology Officer of IBM Resilient.
Edward Snowden is a former intelligence officer who served the CIA, NSA, and DIA for nearly a decade as a subject matter expert on technology and cybersecurity. In 2013, he revealed the NSA was unconstitutionally seizing the private records of billions of individuals who had not been suspected of any wrongdoing, resulting in the largest debate about reforms to US surveillance policy since 1978. He has received awards for courage, integrity, and public service, and was named the top global thinker of 2013 by Foreign Policy magazine. Today, he works on methods of enforcing human rights through the application and development of new technologies. He joined the board of Freedom of the Press Foundation in February 2014 and was named the president of the board in 2016.
Ed Skoudis has taught cyber-incident response and advanced penetration testing techniques to more than 14,000 cybersecurity professionals. His courses distill the essence of real-world, frontline case studies he accumulates, because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost. He is also the Creator of NetWars and CyberCity, the cyber-simulators that provide continuous skills development and evaluation to ensure cyber-skills remain up to date in military units and corporations with major assets at risk.
David was the Chief Security Officer (CSO) for Diebold Incorporated. He developed a global security program that tackled all aspects of information security and risk management. He started TrustedSec and Binary Defense Systems (BDS) with the vision in working with companies for information security. He is the founder of DerbyCon, a large-scale information security conference. He was also one of the founding members of the “Penetration Testing Execution Standard (PTES)“. PTES is the industry leading standard and guidelines around how penetration tests should be performed and methodologies which is also now adopted by the Payment Card Industry (PCI) Data Security Standard (DSS) Guidelines for Penetration Testing. He is the creator of several widely popular open-source tools including “The Social-Engineer Toolkit” (SET), PenTesters Framework (PTF), Artillery, and Fast-Track.
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin and his Global Ghost Team now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. Kevin’s books include ‘Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers’ and ‘Art of Deception: Controlling the Human Element of Security’, which are mandatory readings for security professionals.