top 100 influencers

This list brings together top influencers in the security world. Their twitter and LinkedIn links are given alongside to quickly follow your favorite influencer

You can follow all influencers on twitter here (Click on subscribe)

 

Top Influencers 01-20Top Influencers 20-40Top Influencers 40-60Top Influencers 60-80Top Influencers 80-100
Dmitri Alperovitch

Dmitri Alperovitch

Co-Founder and CTO, CrowdStrike
Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike. A renowned Researcher, a thought-leader on cybersecurity strategy and has served as Special Advisor to Department of Defense. In 2016, Alperovitch revealed Russian intelligence agencies’ hack of the Democratic National Committee (DNC), events which unveiled the full scope of cyber-influence operations being launched against the 2016 US Election. In 2010 and 2011, Alperovitch led the global team hat investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and gave those incidents their names. He has received numerous awards and recognitions, including Fortune’s “40 Under 40,” Politico 50, MIT’s “Innovators Under 35” and Foreign Policy’s Leading Global Thinker.
Brian Krebs

Brian Krebs

Cybersecurity Blogger

Brian Krebs is a Journalist and Investigative Reporter. Krebs is the author of KrebsOnSecurity.com, a daily blog on computer security and cybercrime. From 1995 to 2009, he was a reporter for the Washington Post, where he covered tech policy, privacy and computer security, and authored the Security Fix blog. He is also known for interviewing hacker 0x80. On March 14, 2013, he became one of the first journalists to become a victim of swatting.

Mikko Hyppönen

Mikko Hyppönen

Chief Research Officer, F-Secure

Mikko Hypponen is the Chief Research Officer at F-Secure in Finland.
He has fought the biggest virus outbreaks in the net over the last 20 years. His TED Talk is the most viewed computer security talk in the world. Tagged as a “Code Warrior” by Vanity Fair, Hypponen is a go-to expert on cybercrime for international news media.

Eugene Kaspersky

Eugene Kaspersky

Chief Executive Officer, Kaspersky Lab

Eugene Kaspersky is an IT Security expert, CEO and co-founder of Kaspersky Lab—an international company with regional offices in 30 countries and employing over 2,500 specialists. Kaspersky graduated from Moscow’s Institute of Cryptography, Telecommunications and Computer Science in 1987. He is known not only as a businessman, but also a thought leader in the security industry—for over 15 years since Kaspersky Lab was founded. From Flame to Gauss and Madi, he has been at the forefront of all the company’s groundbreaking malware discoveries, all the while sharing his expert insight with businesses and consumers alike. Just recently he was included on Foreign Policy’s list of Top Global Thinkers of 2012 for his contribution to IT security awareness on a global scale.

Troy Hunt

Troy Hunt

Information Security Author & Instructor at Pluralsight

Troy Hunt is a Pluralsight Author and Instructor, Microsoft Regional Director and world-renowned Internet Security Specialist who travels the world speaking at events and training technology professionals. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.

 

Graham Cluley

Graham Cluley

Cybersecurity Blogger

Graham Cluley is one of the world’s leading experts in viruses and spam, and works as Senior Technology Consultant at Sophos. He has given talks around the world at events such as EICAR, ICSA, Virus Bulletin and the European Internet Security Forum on the virus threat, and is a respected industry expert. Graham has made many media appearances commenting on the threats posed by spam and viruses, including BBC TV News, Good Morning America, CNN, BBC Panorama, BBC Newsnight, ITN, Channel 4 News, 5 News, Sky News, GMTV, BBC Breakfast, IRN, CNet Radio, BBC Radio 1, Radio 2, Radio 4, Radio 5 Live, and BBC World Service. Graham has also written regular columns on computer security for publications such as IT Week, Computer Weekly and VNUNet.

Dave Kennedy

Dave Kennedy

Co-founder and chief hacking officer,

David was the Chief Security Officer (CSO) for Diebold Incorporated. He developed a global security program that tackled all aspects of information security and risk management. He started TrustedSec and Binary Defense Systems (BDS) with the vision in working with companies for information security. He is the founder of DerbyCon, a large-scale information security conference. He was also one of the founding members of the “Penetration Testing Execution Standard (PTES)“. PTES is the industry leading standard and guidelines around how penetration tests should be performed and methodologies which is also now adopted by the Payment Card Industry (PCI) Data Security Standard (DSS) Guidelines for Penetration Testing. He is the creator of several widely popular open-source tools including “The Social-Engineer Toolkit” (SET), PenTesters Framework (PTF), Artillery, and Fast-Track.

Jeremiah Grossman

Jeremiah Grossman

CEO, Bit Discovery

Jeremiah Grossman’s career spans nearly 20 years. He founded WhiteHat Security and is currently the Chief of Security Strategy at SentinelOne. Grossman possesses a unique combination of technology savvy, customer advocacy and personal passion for application security. A world-renowned web security expert, speaker and influential blogger, he brings a lifetime of information security experience, both homegrown and from his days as Yahoo!’s Information Security Engineer. The ultimate “WhiteHat,” he is also Founder of the Web Application Security Consortium and serves on the advisory board of Risk I/O and SD Elements. In his spare time, he practices Brazilian jiu-jitsu and has earned a black belt.

Katie Moussouris

Katie Moussouris

Founder and CEO, Luta Security, Inc.

Katie Moussouris is a noted authority on vulnerability disclosure and bug bounties, and Founder and CEO of Luta Security, a company that specializes in process improvement for handling vulnerabilities. She created Microsoft’s bug bounty programs and started Microsoft Vulnerability Research. She is also a Subject Matter Expert for ISO standards in vuln disclosure (29147), vuln handling processes (30111) and secure development (27034). She is a Visiting Scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow and Harvard Belfer Affiliate. She is also part of the official US Wassenaar delegation. She is on various CFP review boards and is an adviser to the Center for Democracy and Technology.

Richard Bejtlich

Richard Bejtlich

Strategist, TaoSecurity LLC

Richard Bejtlich is an advisor to the security ecosystem. He was previously Chief Security Strategist at FireEye, and Mandiant’s Chief Security Officer when FireEye acquired Mandiant in 2013. At General Electric, as Director of Incident Response, he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. His fourth book is “The Practice of Network Security Monitoring”

Chris Wysopal

Chris Wysopal

CoFounder & CTO, Veracode

Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode, which he co-founded in 2006. He oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He is the author of The Art of Software Security Testing.

Runa A. Sandvik

Runa A. Sandvik

Senior Diretor of Information Security, The NewYork Times

Runa A. Sandvik is a Privacy and Security Researcher, working at the intersection of technology, law and policy. She teaches digital security to journalists and helps media organizations improve their security posture. She is a Technical Advisor to Freedom of the Press Foundation and the TrueCrypt Audit project, and a member of the review board for Black Hat Europe.

Joshua Corman

Joshua Corman

CSO and SVP, PTC

Joshua Corman is the CSO and SVP at PTC. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to increasing dependence on technology. Corman’s unique approach to security in the context of human factors, adversary motivations and social impact has positioned him as one of the most trusted names in security.

Alex Stamos

Alex Stamos

CSO, Facebook

Alex Stamos is a computer security expert and chief information security officer at Facebook. He previously served as chief information security officer at Yahoo! beginning in 2014. Before working in the technology industry, Stamos attended the University of California, Berkeley, where he graduated in 2001 with a degree in EECS. He went on to co-found iSEC Partners, a security consulting firm, which was purchased in 2010 by the British NCC Group.

Parisa Tabriz

Parisa Tabriz

Director of Engineering, Google

Parisa Tabriz is a computer security expert who works for Google as a Director of Engineering. She has been called Google’s “Security Princess” due to her experience in hacking and internet security. She heads a team of 30 experts responsible for the security of Google Chrome.She is also responsible for training Google staff interested in moving into the internet security field. Tabriz co-founded the Our Security Advocates conference.

Phil Cracknell

Phil Cracknell

Cyber Security Consultant, UK Power Company

Phil is a highly technical, business-focussed CISO/Information Security Specialist with notable success in directing and implementing a broad range of corporate security initiatives. In 2006 Phil became the UK President of the ISSA (Information Systems Security Association) and sits on a number of committees and steering groups for ISO27001 user group, IISP, Eurim and IRM. He was CTO of uk-based security product company NetSurity Ltd.

Phil Agcaoili

Phil Agcaoili

SVP & CISO, Elavon

Phil Agcaoili is a Senior Vice President at U.S. Bancorp and the Chief Information Security Officer at Elavon. He has been an influential leader in the information security industry for 25 years and has established industry-leading security organizations from startups to the Fortune 25. He was previously the CISO at Cox Communications, VeriSign and SecureIT, and led successful global security teams at Dell, Scientific-Atlanta and General Electric.

Dan Goodin

Dan Goodin

Security Editor, Ars Technica

Dan Goodin is Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, and hardware hacking. A journalist with more than 15 years experience, he has been chronicling the exploits of white-hat, grey-hat and black-hat hackers since 2005 as a reporter for the Associated Press and later, The Register. He has a Bachelor’s Degree in English from the University of Massachusetts and a Masters of Journalism from UC Berkeley.

Alison Gianotto

Alison Gianotto

Founder & CEO, Grokabiity Inc.

Passionate about creating order from chaos, developing systems and workflow to make the right thing the easy thing, and advocating risk management as a valuable tool for innovation. Frequent speaker at conferences about technology and security/privacy issues. creator of Downworthy, a fun little Chrome extension that changes hyperbolic viral news site headlines into something funnier.

Brian Honan

Brian Honan

CEO, BH consulting

Brian Honan is recognized as an industry expert on information security, providing consulting services to clients in various industry segments. Honan’s work also includes advising various Government security agencies and the European Commission on matters relating to information security. In 2008, he founded the Irish Reporting and Information Security Service (IRISS www.iriss.ie) which is Ireland’s first CERT (Computer Emergency Response Team). He has addressed a number of major conferences on information security. He is author of the book “ISO 27001 in a Windows Environment,” he has published a number of technical papers and he has been technical editor and reviewer of a number of industry recognized publications. He is also the European editor for the SANS Institute’s weekly SANS NewsBites.

Mohit Kumar

Mohit Kumar

Founder & CEO, HackerNews

Entrepreneur, Cyber Security Researcher, Trainer, Infosec Journalist, Speaker, Traveller & Part-time Hacker. Mohit started THN as a dedicated Cybersecurity and Hacking News platform to educate people on how to use the Internet in the safest way. Founder & CEO — Attracting over 10 million monthly readers, ‘The Hacker News,’ has internationally been recognized as the leading, most trusted news source of hacking, cyber security & technology for the technologists & nerds.Co-Founder & Director — ‘The Hackers Conference,’ India’s first unique cyber security and hacking conference.

Mark Dowd

Mark Dowd

Co-founder & Director, Azimuth Security

Mark is a director and founder of Azimuth Security. The bulk of his professional career has been focused in the area of application security research. Mark spent a number of years as a senior researcher at IBM’s Internet Security Systems (ISS) X-Force, during which he discovered a number of high-profile vulnerabilities in ubiquitous Internet software. In addition to professional vulnerability research, Mark’s previous experience includes serving as a principal security architect for McAfee, as well as performing a variety of information security consulting services independently and for ITAC Consulting.

Pierluigi Paganini

Pierluigi Paganini

Chief Security Officer, CSE- CybeSec Enterprise SpA

Pierluigi Paganini is Chief Technology Officer at CSE – CybSec Enterprise SpA. He is a member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group, member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation, Director of the Master in Cyber Security at the Link Campus University. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at “Cyber Defense Magazine”, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing, and a strong belief that security is founded on the information sharing lead Pierluigi to launch the security blog “Security Affairs” recently awarded as the Best European Personal Security Blog. Author of the Books “The Deep Dark Web” and “Digital Virtual Currency and Bitcoin.”

Martin McKeay

Martin McKeay

Senior Security Advocate, Akamai Technologies

Martin McKeay is a Senior Security Advocate at Akamai, joining the company in 2011. As a member of Akamai’s Security Intelligence Team, he is responsible for researching security threats, customer education and industry intelligence. With over fifteen years of experience in the security space and five years of direct Payment Card Industry work, McKeay has provided expertise to hundreds of companies. He is also the author of the Network Security Blog and host of the Network Security Podcast. He writes for the Security Intelligence Blog and InfoSecurity Magazine.

Michael Zalewski

Michael Zalewski

White-hat Hacker/ Former Google employee

Michał Zalewski, also known by the user name lcamtuf is a “white hat” hacker, computer security expert from Poland and a former Google Inc. employee. He has been a prolific vulnerability researcher and a frequent Bugtraq poster and has authored a number of programs for Unix-like operating systems.In 2005, Zalewski authored Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, a computer security book published by No Starch Press and subsequently translated into a number of languages. In 2011, Zalewski authored The Tangled Web: A Guide to Securing Modern Web Applications, also published by No Starch Press.For his continued research on browser security, he was named one of the 15 most influential people in security and among the 100 most influential people in IT. Zalewski was one of the original creators of Argante, a virtual open source operating system. Among other projects, he also created p0f and American fuzzy lop.

Chris Hoff

Chris Hoff

SVP, Global lead - Cyber Security Defense, Bank of America Merrill lynch

Christofer Hoff has more than 20 years experience in high-profile global roles in network and information security architecture, engineering, operations and management. In previous roles, Hoff has served as VP of Strategic Planning and the Technical Marketing Engineering team and as Global Chief Security Architect of the Advanced Technology Team at Juniper Networks. As Director of Cloud & Virtualization Solutions at Cisco Systems, he focused on virtualization and cloud computing security, spending most of his time interacting with global enterprises and service providers, governments, and the defense and intelligence communities. Hoff is a founding member of and technical advisor to the Cloud Security Alliance, as well as founder of the CloudAudit project and the HacKid conference.

Aloria

Aloria

Security Engineer, Tumblr

Aloria is the Tumblr security engineer. She provides her followers all the tips of how to be secure on the internet. Previously she worked as Security engineer at Spotify and also APPSEC professor ay New York University.

Jennifer Leggio

Jennifer Leggio

CMO & Security Writer for ZDNet (Zero Day), Flash point/ CBS interactive

Jennifer Leggio is the worlds most known Infosec women right now. She worked with ZDNET and Forbes tech contributor. She is co-managing the Security Bloggers Network and have been running the Security Bloggers Meet-Up at RSA Conference since 2007. She has been a contributing writer on social media, marketing strategy and public relations for Forbes.com as well as CBS Interactive/ZDNet, where she launched the first “Social Business”.

Georgia Weidman

Georgia Weidman

Founder and CTO, Shevirah Inc.

Georgia Weidman is from Austin,Texas and the founder of Bulb Security. Prior to this she worked as an Security analyst in the companies like IBM, Gemini Security Solution, Neohapsis. She completed her education in Computer and network security from James Madison University. She provides security trainings, services and solution on Bulb Security. She is one of the well known name in the industry right now. She is the author of Penetration Testing: A Hands-On Introduction to Hacking from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.

Robin Wood

Robin Wood

Freelance security consultant and researcher, co-founder of SteelCon

A freelance security consultant specialising in web app testing. Having a background as a developer helped him see inside the apps during testing and explain problems to the development team afterwards. The author of a large number of open source tools and a regular contributor to various mailing lists and forums. His popular tools include the Wifi Pineapple, Pipal and CeWL. He is an Associate Lecturer at Sheffield Hallam University

Michael Dahn

Michael Dahn

Payment Policy Relations, Stripe

Mike Dahn has lead industry relations and payment policy at large fintech and financial institutions. He focuses on enabling innovative product pathways in highly regulated environments. His background in cybersecurity helped develop new PCI security specifications that enable mobile card acceptance. He works with EMVco as well as global payment associations (AusPayNet, UK Finance) to bridge interoperability with emerging payment methods. Previously, Mike lead industry relations at Square bringing innovative products to a global market, and has trained over 10,000 professionals around the world. Mike’s volunteer efforts include creating and globalizing a network of locally organized security conferences in 100+ cities across 30+ countries; former Board of Directors at Infragard, an FBI public-private partnership; and Board of Directors at several San Francisco foundations.

Andy Ellis

Andy Ellis

CSO, Akamai Technologies

Andy Ellis is Akamai’s Chief Security Officer, governing the safety, resilience and compliance of its planetary-scale network. He is the designer of several critical Akamai technologies, including its secure TLS acceleration network and many of the core components of the company’s web security solutions. Ellis is a frequent speaker on issues of Internet security, safety and risk management, has participated in the FCC-CSRIC and NIAC, and is an affiliate of Harvard’s Berkman-Klein Center on Internet & Society. He is a graduate of MIT and a former US Air Force officer, the recipient of the CSO Compass Award, the Air Force Commendation Medal, the Wine Spectator Award of Excellence, and the Spirit of Disneyland Award.

Avram Marius Gabriel

Avram Marius Gabriel

Web App Penetration testing, Freelance security consultant

Avram Marius Gabriel, has gained the top spot on PayPal’s Wall of Fame as well as being recognised for responsibly disclosing security bugs in the websites of Facebook, Google, Evernote, eBay Inc., and Twitter. All of these discoveries have been made outside of working hours.

Wendy Nather

Wendy Nather

Director, Advisory CISOs, Duo security

Wendy Nather is Director of Advisory CISOs at Duo Security. She was previously the Research Director at the Retail ISAC, as well as Research Director of the Information Security Practice at independent analyst firm 451 Research. Nather led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She speaks regularly on topics ranging from threat intelligence to identity and access management, risk analysis, incident response, data security, and societal and privacy issues. Nather is Co-Author of The Cloud Security Rules, and was listed as one of SC Magazine’s Women in IT Security “Power Players” in 2014.

Nicolas Brulez

Nicolas Brulez

Reverse Engineering Instructor, RECON

In the past 8 years, Nicolas worked at Kaspersky Lab as a Principal Malware Researcher. Prior to joining Kaspersky Lab, Nicolas worked as a senior virus researcher for Websense Security Labs, and as the head of software security at Digital River/Silicon Realms when he was in charge of the anti-reverse engineering techniques used in the Armadillo protection system. Over the last 17 years, Nicolas has authored numerous articles and papers on reverse engineering and presented at various security conferences such as RECON, ToorCon, SSTIC, Virus Bulletin, Hacker Halted, RuxCon, TakeDownCon, Pacsec etc.

Andrew Hay

Andrew Hay

Co-Founder and CTO, Leo Cyber Security

Andrew Hay is an information security industry veteran with close to 20 years of experience as a Security Practitioner, Industry Analyst and Executive. As the Co-Founder and CTO for LEO Cyber Security, he is responsible for the creation and driving of the strategic vision for the company. Andrew has served in various roles and responsibilities at a number of companies including DataGravity, OpenDNS (now a Cisco company), CloudPassage, Inc., 451 Research, the University of Lethbridge, Capital G Bank Ltd. (now Clarien Bank Bermuda), Q1 Labs (now IBM), Nokia (now Check Point), Nortel Networks, Magma Communications (now Primus Canada), and Taima Corp (now Convergys). He is an Instructor at SANS institute

Alex Hutton

Alex Hutton

Director of Operations Risk and Governance

Alex Hutton is currently Director of Operational Risk at Zions Bancorporation. Prior to this, Hutton has been an entrepreneur involved with several successful startups. He served as CEO for Risk Management Insight. He served as a principal in the Risk Intelligence group for Verizon, involved in the development of the VDBIR. He is an avid security blogger, speaker and conference organizer. He brings a wealth of knowledge and experience on risk management and metrics to any discussion. He is a passionate and experienced public speaker.

Rich Mogull

Rich Mogull

Founder & VP of Products, DisruptOPS

Rich is the VP of Product for DisruptOPS and Analyst and CEO of Securosis. With twenty years of experience in information security, physical security, and risk management, Rich is one of the foremost experts on cloud security, having driven development of the Cloud Security Alliance’s V4 Guidance and the associated CCSK training curriculum. Prior to founding DisruptOPS and Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, Rich worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator

Eleanor Dallaway

Eleanor Dallaway

Editor & group publisher, Reed exhibitions

Eleanor Dallaway is Editor of Infosecurity Magazine, and as a result of her eight years in the job, knows more about information security than most English Literature graduates should. She spends her working days interviewing industry professionals, keeping the website updated with news on an hourly basis, editing the magazine, and attending industry events.

David Ulevitch

David Ulevitch

SVP/ General Manager, CISCO security business group

David Ulevitch is Vice President for Cisco’s Security Business Group. Ulevitch is responsible for the company’s cloud security strategy and product development. He joined Cisco through the acquisition of OpenDNS, a cloud security company he founded in 2005 with the goal of delivering a safer and faster Internet experience. Under his leadership, the cloud-delivered service today protects a global audience of more than 65 million people across more than 10,000 enterprise customers, including many of the largest companies in the world. A noted Internet and security expert, Ulevitch has a bachelor of science degree in anthropology from Washington University.

Aaron Portnoy

Aaron Portnoy

Sr.Principal Cyber Engineer, Raytheon

Reverse engineer and vulnerability researcher with over 12 years of experience in the field. He was also the co-founder and CTO of Exodus Intelligence. Directed all research and development efforts for the company as well as served as primary contact for all press inquiries. Collaborated with other co-founders with regard to company strategy, customer relations, marketing, business development, sales, and finances. Personally maintained the largest contribution of zero-day vulnerability discoveries for the company. Grew the company from four to over twenty employees in three years.

Jennifer J. Minella

Jennifer J. Minella

VP of Engineering and security, Carolina Advanced Digital

Jennifer Minella is currently VP of Engineering and Consulting CISO with Carolina Advanced Digital, Inc. In her engineering role, Minella leads strategic research and consulting for government agencies, educational institutions and Fortune 100 and 500 corporations. In addition to her normal business roles, Minella is a published Author, Editorial Contributor and trusted Adviser for information security topics to media. No stranger to public speaking, she’s presented at RSA Conference, NSA Trusted Computing Conference, Interop, Infosec World, Deep Sec, SecTor, CSI and many others.

Nick Sullivan

Nick Sullivan

head of cryptography, CloudFaretw

Nick Sullivan is a leading cryptography and security expert. He founded and built the security team at CloudFlare, one of the world’s leading web security companies. He is a digital rights management pioneer in his work building Apple’s multi-billion dollar iTunes store. He is the author of over a dozen computer security patents and holds an MSc in Cryptography and a BMath in Pure Mathematics.

Darren Argyle

Darren Argyle

CISO, icare NSW

An accomplished executive with close to 25 years international information/cyber security experience, broad expertise in providing hands-on leadership, strategic C-level/board direction and programme execution. Certified professional with a lively but disciplined approach to advancing secure business in global open-networked digital environments. Entrepreneurial drive with appreciation of user-experience, and a demonstrated track record of collaborating and developing consensus, with leaders across multiple business units. I am actively seeking opportunities as a Advisory Board Member / Non-Executive Director (NED) to provide cyber security strategic expertise to boards/cyber startups globally.

Gal Shpantzer

Gal Shpantzer

Contributing Analyst, securosis

Gal Shpantzer has 16 years of experience as an Independent Security Professional and is a Trusted Advisor to CISOs of large corporations, technology and pharma startups, universities and nonprofits/NGOs. He now focuses on emerging threats to availability as well as confidentiality, specifically preparing for ransomware and nukeware. He founded the privacy subgroup of the NIST Smart Grid cybersecurity task group. With Dr. Christophe Veltsos he presented the ongoing Security Outliers project, focusing on the role of culture in risk management, at RSA, CSI, BSides and Baythreat conferences.

Neira Jones

Neira Jones

Independent Advisor & International Speaker

With more than 20 years in financial services, Neira has played a leading role in revolutionising payment security. Currently Partner at Accourt Ltd, she is responsible for the Risk & Digital practice providing strategic advice to organisations wishing to deploy a business-led approach to risk and security. Formerly Director of Payment Security and Fraud at Barclaycard, she was responsible for the security compliance and risk management of some 100,000 merchants and 3rd parties, as well as developing innovative fraud offerings. She received the Acquiring Personality of the Year 2013 Award (Merchant Payments Ecosystem) and the SC Magazine Information Security Person of the Year Award 2012. She has also worked for Oracle and Unisys.

Alejandro Ramos

Alejandro Ramos

Global Digital Security Officer, Telefonicatw

Security industry veteran and Chief Digital Security Officer at Telefonica. He previously spent five years at ING working on security strategy for Spain and Portugal. Earlier roles include security-manager-whatever, at SIA, a security services and product company based in Madrid. Associate professor at Universidad Europea de Madrid in the Master of Information Security degree for the subjects:Penetration Test, Forensics and Hardening (Linux)

Ashar Javed

Ashar Javed

pentester, Hyundai Autoever Europe Gmbh

Ashar Javed currently works on penetration testing, source code review, and mobile application vulnerability assessments at Hyundai AutoEver Europe GmbH (an IT service company for Hyundai & KIA Motors). He works alongside developers and external third-party application vendors in order to eliminate web vulnerabilities. He has spent three years as a security researcher for Ruhr-Universität Bochum, Germany.Ashar delivered talks at the main security events like Black Hat Europe 2014, Hack in the Box Kuala Lumpur 2013, OWASP Spain (2014, 2015), SAP product security conference 2015, International PHP Conference 2015, ISACA Ireland 2014, RSA Europe (OWASP Seminar) 2013 and DeepSec Austria (2013, 2014 & 2015).

Michael Coates

Michael Coates

CISO, Twitter

Michael Coates is the Chief Information Security Officer at Twitter. He leads Twitter’s security program across all elements of information security. Coates was Chairman and is a current member of the global board of directors for OWASP, the largest open source application security community. Prior to 2015, he was Director of Product Security at Shape and worked with an amazing team to drastically change the way organizations defend against modern application attacks. From 2010 through 2013 Coates was at Mozilla where he built and lead the security assurance program to protect nearly half a billion Firefox users, and Mozilla web applications and infrastructure. Prior to 2010 he maintained a diverse set of technical security roles assessing the security posture of banks, governments and enterprises.

Bob Rudis

Bob Rudis

Chief Data Scientist, Rapid7

Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is a Chief Security Data Scientist at Rapid7. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), author (Data-Driven Security), speaker and regular contributor to the open source community (github.com/hrbrmstr). He currently serves on the Board of Directors for the Society of Information Risk Analysts, is on the editorial board of SANS Securing the Human program and was Co-chair of the 2014 Metricon security metrics/analytics conference. He holds a bachelor’s degree in computer science from the University of Scranton.

Martin Fisher

Martin Fisher

Manager IT security, Northside Hospital

Martin Fisher has been in IT for more than 25 years and in information security for the last 14 years. He currently serves as the information security leader for a multi-hospital, 13,000-employee healthcare provider in Atlanta, Georgia. In the past he has worked in the commercial aviation and finance sectors for organizations large and small. Fisher has been heavily involved in the information security community as a member of the organizational staff of BSides Las Vegas and BSides Atlanta. Fisher is passionate about “doing security right” and has spoken internationally on a variety of information security topics in venues such as SOURCEBoston, ShmooCon, SecurityZone, and SUMIT_2013. He is also the host of The Southern Fried Security podcast, which has reached thousands of information security practitioners for the last six years.

Mike Murray

Mike Murray

VP, Security Intelligence, Lookout

Michael Murray is the Director of Product Security at GE Healthcare, responsible for providing architecture and security assessment services to support GE Healthcare’s engineering teams in building secure products. A career information security professional, Murray has taken leadership roles in organizations ranging from small consulting firms to Fortune 100 companies. Before joining GE, Michael was Co-founder and Managing Partner of MAD Security / The Hacker Academy.

Theresa Payton

Theresa Payton

President & CEO, Fortalice Solutions

Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of Fortalice Solutions, an industry-leading security consulting company, and co-founder of Dark Cubed, a cybersecurity product companyheresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa was named one of the top 25 Most Influential People in Security by Security Magazine and One of Infosec’s Rising Stars and Hidden Gems by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.

Adam Ely

Adam Ely

VP & Deputy CISO, Walmart

Adam Ely is an entrepreneur and operations executive having founded a security product company and held leadership roles with several Fortune 100 companies. Ely is currently Vice President and Deputy Chief Information Security Officer with Walmart. Prior to this role he co-founded Bluebox Security, acquired in 2016, was the CISO of Salesforce’s Heroku business unit, and led security and compliance at TiVo and within The Walt Disney Company.

Rebecca Herold

Rebecca Herold

President, SIMBUS360

Rebecca Herold, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, has over 25 years of IT, info sec, privacy & security experience; is CEO & Founder (2004) of Rebecca Herold & Associates, LLC, aka The Privacy Professor(R); and President & Co-Founder (2014) of SIMBUS360. Rebecca is also an entrepreneur, author and Adjunct Professor for the Norwich University Master of Science in Information Assurance Program. Rebecca has led the NIST Smart Grid privacy group since June 2009 and has been an officer for the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group since June 2015Some of Rebecca’s books include: The Practical Guide to HIPAA Privacy and Security Compliance (2 editions), Data Privacy for the Smart Grid, The Privacy Papers, Managing an Information Security and Privacy Awareness and Training Program (2 editions)

Aleks Gostev

Aleks Gostev

Chief Security Expert, Kaspersky Lab

Aleks has headed the Global Research and Analysis Team at Kaspersky Lab since 2008, and specializes in all aspects of information security, including mobile malware. His responsibilities include detecting and analyzing new malware. His research and analytical articles are published both on dedicated IT sites and in the mass media. He has been with the company since 2002, and is based in Moscow. Prior to joining Kaspersky Lab, Aleks worked as CTO at KomiSat, as Manager of the ISP department at Komite, and as System Administrator at SMZ. In 1996, he founded the Republic of Komi Antivirus Center, and in 1998, he acted as project coordinator of the Wildlist Russia Project, an initiative which was launched with the aim of collecting and analyzing information about malware outbreaks in the Russian Federation.

E.J. Hilbert

E.J. Hilbert

Director of Risk and Compliance, Path Network

E.J. Hilbert is a security and privacy professional with over 20 years of experience and particular expertise in cyber based attacks.He currently serves as the CEO of Path Networks and President of Secure Credit Systems. Both are blocked chained based technology firms seeking to disrupt the current markets.Prior to his current role, he served as Vice President, Cyber Security Division at Gavin De Becker and Associates.In 2009, EJ founded and served as the President of Online Intelligence LLC. Online Intelligence, “OI”, provided online investigations, brand protection and internet traffic forensic services to online and social media advertisers, merchants, celebrities and other interested parties.E.J., was a Special Agent for FBI based in Southern California, where he was the lead case agent for numerous cyber-crime, white collar, counter intelligence and counterterrorism investigations.

Andrew Jaquith

Andrew Jaquith

Managing Director, Goldman Sachs

Andrew Jaquith is a senior information security and risk executive with a passion for quantifying risk. As Managing Director at Goldman Sachs, he manages the firm’s Technology Risk Analytics and Measurement program. Andrew has demonstrated success as a senior leader, with two successful startup exits, and as an implementer of data-driven analytics systems. He literally wrote the book on security metrics, used by a generation of risk professionals to connect security to the corner office.

David Mortman

David Mortman

SVP, Cloud Security Architect, Bank of America

David Mortman has been doing Information Security for 20 years. He is currently Chief Security Architect and Distinguished Engineer at Dell Software, as well as a Contributing Analyst at Securosis. Most recently, he was the Director of Security and Operations at C3. Previously, Mortman was the CISO at Siebel Systems and the Manager of Global Security at Network Associates. He speaks regularly at Black Hat, Defcon, RSA and other conferences. Additionally, he blogs at emergentchaos.com, newschoolsecurity.com and securosis.com. He sits on a variety of advisory boards, including Qualys, Lookout and Virtuosi. He holds a B.S. in Chemistry from the University of Chicago.

Benjamin Tomhave

Benjamin Tomhave

Manager, Security Engineering and Architecture, Pearson

Ben Tomhave, Manager of Security Engineering for a multinational education company and Principal at Falcon’s View Consulting, is a security industry veteran, progressive thinker and culture warrior. He holds an MS in engineering management from the George Washington University and is a CISSP. He’s previously held positions with Gartner, AOL, Wells Fargo, ICSA Labs, LockPath and E&Y. He is former Co-Chair of the American Bar Association Information Security Committee, a Senior Member of ISSA, former Board Member for the Society of Information Risk Analysts, and former Board Member for OWASP NoVA. He is a published Author and experienced public Speaker, including engagements with the RSA Conference, MISTI, ISSA, Secure360, RVAsec, RMISC, DevOps Connect, as well as Gartner events.

Shawn Henry

Shawn Henry

President, Services Division, and Chief Security Officer, CrowdStrike

Shawn Henry is the president of CrowdStrike Services and CSO and a retired executive assistant director of the FBI. Henry, who served in three FBI field offices and at the bureau’s headquarters, is credited with boosting the FBI’s computer crime and cybersecurity investigative capabilities. He oversaw computer crime investigations spanning the globe, including denial-of-service attacks, bank and corporate breaches, and state-sponsored intrusions. He posted FBI cyberexperts in police agencies around the world, including the Netherlands, Romania, Ukraine and Estonia. Henry earned a bachelor’s degree in business administration from Hofstra University and a master’s degree in criminal justice administration from Virginia Commonwealth University.

Troels Oerting

Troels Oerting

Head, Global Centre for Cybersecurity (GCC), World Economic forum

Experienced Cyber Security professional previously working as Group CISO/CSO for Barclays Plc. He was at Europol where he held several roles including Head of Europol’s Counter Terrorist and Financial Intelligence Centre and notably, Head of the European Cybercrime Centre. He began his career in law enforcement and held multiple senior roles within the Danish National Police including Director, Serious Organized Crime Agency and Director of Operations, Danish Security Intelligence Service. External Lecturer – Executive MBA, Cyber Security at Copenhagen Business School

Zane Lackey

Zane Lackey

Founder/CSO, Signal Sciences

Zane Lackey is the Co-Founder/Chief Security Officer at Signal Sciences and serves on the Advisory Boards of the Internet Bug Bounty Program and the US State Department-backed Open Technology Fund. Prior to Signal Sciences, Lackey was the Director of Security Engineering at Etsy and a Senior Security Consultant at iSEC Partners. He has been featured in notable media outlets such as the BBC, Associated Press, Forbes, Wired, CNET, Network World, and SC Magazine. A frequent speaker at top industry conferences, he has presented at Black Hat, RSAC, USENIX, Velocity, Microsoft BlueHat, SANS, OWASP, QCon, and has given invited lectures at Facebook, Goldman Sachs, IBM and the Federal Trade Commission.

Richard Rushing

Richard Rushing

CISO, Motorola Mobility

Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policiesM, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.

Craig Froelich

Craig Froelich

CISO, Bank of America

Craig is chief information security officer for Bank of America. He leads the Global Information Security team responsible for the bank’s information security strategy, policy and programs. He serves as a member of the Global Technology & Operations senior leadership team. Prior to Countrywide Financial’s acquisition by Bank of America, he was responsible for Countrywide’s cybersecurity technology, data and voice networks, crisis management and security operations. Froelich currently serves on the board of directors as chairman of the Financial Services-Information Sharing and Analysis Center (FS-ISAC) and the executive committee of BITS, the technology policy division of the Financial Services Roundtable. Since 2010, he has filed for eleven information security patents.

Jared Carstensen

Jared Carstensen

CISO, CRH

Jared Carstensen is an internationally recognized information and cyber security professional with broad experience in the design, implementation and governance of security controls, business strategies and frameworks across global organizations, spanning multiple sectors. For the past 13 years, he has been advising Fortune 500, law enforcement and intelligence agencies, government and state departments, manufacturing, pharmaceutical, telecommunications, utilities and financial services entities on all areas of information and cybersecurity. He is the CISO for a FTSE 100 company located in Dublin, Ireland. He is a member of the IT Governance Institute Expert Panel, and is an author of the book “Cloud Computing: Assessing the Risks.” He has spoken at over 100 events globally.

Malik Mesellem

Malik Mesellem

CEO, IT Security Auditor & Penetration Tester, MME BVBAtw

Malik Mesellem is an IT security professional with over 15 years of experience. Malik has always had a passion for Ethical Hacking and Penetration Testing… obsessed with Windows and Web Application (in)Security. In 2010, he started his own company, MME BVBA. MME is specialized in IT Security Audits, User Awareness Campaigns, Vulnerability Assessments, Penetration Testing and Security Training. Malik gives master classes, lectures and workshops on conferences and for several institutions. Malik is an OWASP ZAP evangelist and used to be a mentor for the SANS Institute, mentoring the SANS ‘SEC560 – Network Penetration Testing and Ethical Hacking’ course. Malik is also the founder and developer of bWAPP. bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web vulnerabilities! It covers all major known web bugs, including all risks from the OWASP Top 10 project. It has 100.000+ downloads worldwide.

Dan Cornell

Dan Cornell

CTO, Denim Group Lts

A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. Cornell is an active member of the development community and a sought-after Speaker on topics of web application security, speaking at international conferences including TEDx, RSA Security Conference, OWASP AppSec USA and EU and Black Hat Arsenal.

Josh Goldfarb

Josh Goldfarb

Co-founder, CPO, IDRRA

Josh is currently Co-Founder and Chief Product Officer at IDRRA. Prior to joining IDRRA, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Josh is an experienced cyber security analyst who applies his analytical methodology to help organizations build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security posture. Josh has worked with numerous clients in both the public and private sectors at both the strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT), where he built from the ground up and subsequently ran the network, media, and malware analysis/forensics capabilities for US-CERT.

Jake Kouns

Jake Kouns

CISO, Risk Based Security

Jake Kouns is the CISO for Risk Based Security that provides vulnerabilities and data breach intelligence. He previously oversaw the operations of the Open Sourced Vulnerability Database (OSVDB.org) and DataLossDB. Kouns has presented at many well-known security conferences, including RSA, Black Hat, DEF CON, DerbyCon, Bsides, CISO Executive Summit, IEEE, FIRST, CanSecWest, InfoSecWorld, SOURCE and SyScan.He is the co-author of Information Technology Risk Management in Enterprise Environments, Wiley, 2010, and The Chief Information Security Officer, IT Governance, 2011.He has briefed the DHS and Pentagon on Cyber Liability Insurance issues and is frequently interviewed as an expert in the security industry by Information Week, eWeek, Forbes, PC World, CSO, and CIO Magazine.

Thom Langford

Thom Langford

CISO, Publicis Group

Thom Langford is the Director of Sapient’s Global Security Office, responsible for all aspects of delivery and internal security, risk and compliance, and business continuity across Sapient’s global operations. Having successfully built security and IT programmes from the ground up, Langford brings an often opinionated view of risk, both in assessments and management, but manages to do so with humour and pragmatism (mostly). An international public speaker and award winning security blogger, he contributes to a number of industry blogs and publications. He is also the sole founder of Host Unknown, a loose collective of three Infosec luminaries, combined to make security education and infotainment films.

Bruno Kerouanton

Bruno Kerouanton

CISO, Swiss Republic and Canton of Jura

As head of IT Security for the Republic and Canton of Jura in Switzerland, Bruno is faced with the challenges of securing the city’s infrastructure and applications. Bruno is also part of the Swiss National Security Network, has twice been rewarded the French CSO of the year award, in 2005 and 2010, and has been a teacher at prestigious French Engineering university Mines Nancy. On top of that, Bruno has spoken at various InfoSec conferences and served as a supervisor for ISC2’s CISSP exam. For a taste of Bruno’s approach to being a CISO, his presentation on the CISO’s evolution for a recent ISC2 event offers fantastic insights.

Teaching IT/Cyber Security for HEC / Mines Paris Strategic Executive MBA.

Jaya Baloo

Jaya Baloo

CISO, KPN Telecom

Jaya Baloo the CISO of KPN Telecom in the Netherlands. She won the Cyber Security Executive of the Year Award in 2015. Baloo works with an amazing information security team of highly driven specialists. Working in the information security arena for the past 18 years, she has worked mostly for global telecommunications companies such as Verizon and France Telecom. Baloo is also a frequent speaker at security conferences on subjects around lawful interception, mass surveillance and cryptography.

Eddie Schwartz

Eddie Schwartz

EVP cyber services, DarkMatter LLC

Eddie Schwartz is Executive Vice President of Cyber Services for DarkMatter and has worked in the cybersecurity field for almost 30 years. Schwartz has led large enterprise and startup security companies across a broad range of product and service categories. Previously, he helped pioneer advertising fraud detection at security startup White Ops as President and Chief Operating Officer.

Lisa Hall

Lisa Hall

Senior Manager, Security Risk and Compliance, Practice Fusion

Lisa Hall is currently working as senior manager, Security Risk and Compliance at Practoce Fusion. With over 10 years of experience in the information security field, She focuses on strong strategic planning, risk management and compliance, driving process adoption company-wide, and prioritizing information security resources and strengthening internal controls to minimize risk and improve business performance.

Michael D. Peters

Michael D. Peters

Systems security engineer, Independent Security Professional

Michael has been an independent information security consultant, executive, researcher, author, and catalyst with many years of information technology and business leadership experience. Michael’s current and previous executive positions include CSO, CISO and advising CIO. Michael D. Peters is a current member of the Metro Atlanta and Kentuckiana ISSA chapters, a founding member and past president of the Kentuckiana and Montgomery ISSA chapters. he is the author of “Securing the C Level”, “Governance Documentation and Information Technology Security Policies Demystified”, “The Security Trifecta”, and thousands of blogging, tweeting, social media networking and professional network syndication and industry feature publications. He has contributed significantly towards curriculum development as adjunct and professional certifications in security, technology, cyber-law, and privacy.

Myrna Soto

Myrna Soto

Corporate SVP & Global CISO, Comcast

Myrna Soto is SVP and CIISO at Comcast. In her role, Myrna is responsible for Enterprise Information and Infrastructure Security for Comcast. She is also responsible for Synergy and Integration efforts with NBCUniversal. She is the Executive Champion for the Hispanic Affinity group at Comcast “Unidos.” She is also an Executive Committee Board Member of HITEC (Hispanic IT Executive Council) and is a Member of the Board of Directors for CMS Energy and Consumers Energy. Prior to Comcast, she served as CISO and VP of Information Technology Governance for MGM Resorts International. She also held senior leadership positions with American Express, Royal Caribbean Cruise Line, Norwegian Cruise Lines, Kemper and Broadspire.

Dan Lohrmann

Dan Lohrmann

CSO & Chief Strategist, Security Mentor

Internationally recognized cybersecurity leader, technologist, speaker, blogger and author. Led Michigan government’s cybersecurity and technology infrastructure teams from 2002-2014: SC Magazine CSO of the Year, Governing Magazine Public Official of the Year and Computerworld Premier 100 Leader. Trusted source for government cybersecurity counsel. Advised leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses. Contributor for professional media outlets, such as Government Technology Magazine, CSO, Computerworld, Huffington Post, Governing, Bloomberg, PBS, Yahoo Finance, NY Mag, TechCrunch.

Marc Goodwin

Marc Goodwin

Staff Security Engineer, Mozilla

Marc Goodman is a New York Times best-selling author, global strategist and consultant focused on the profound change technology is having on security, business and international affairs. He is the Founder of the Future Crimes Institute and currently serves as the Chair for Policy, Law and Ethics at Silicon Valley’s Singularity University. He has built his expertise in international cybercrime and terrorism, working with organizations such as INTERPOL, the UN Counterterrorism Task Force, NATO and the U.S. Government. His professional experiences include working as a police officer, undercover investigator and counterterrorism strategist. Goodman’s best-selling book, Future Crimes, was selected as Amazon’s Best Business Book of 2015 and has been named one of the Washington Post’s Top Ten Best Books of 2015.

Thomas Stamulis

Thomas Stamulis

Senior Director, Alvarez & Marsal

Cybersecurity thought leader with over 30 years’ experience in information security for commercial industries and government and a 20-year veteran as a US Army counterintelligence agent. Collaboratively works with C-level executives to identify high-risk processes and develop appropriate mitigation controls in a timely and cost effective manner. A skilled self-starter with executive, departmental and team management experience delivering governance, risk & compliance aligning with ISO-27002, NIST, FFIEC, GLB, NYDFS, HIPAA, SOX-404, COBIT, PCI, and FISMA regulatory requirements to fortune 100 organizations and the Federal Government.

Dale Drew

Dale Drew

Chief Security Officer, Zayo Group

Dale is currently the Chief Security Officer at Zayo Group, a global telecommunications service provider, specializing in Optical, Internet and Colocation services. Prior to Zayo, Dale was the Chief Security Strategist at CenturyLink and the Chief Security Officer for Level 3. Dale Drew is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, working in Federal/State Law Enforcement and with Internet Service Providers (ISP). Dale brings a practical capability to integrating security into the culture of the business, enabling the company to be more flexible, with demonstrable results.

Gerhard Eschelbeck

Gerhard Eschelbeck

VP Security & Privacy Engineering, Google

Gerhard Eschelbeck is a well-regarded information technology executive with strong operational and strategic experience. Over the past decade, he has been transforming traditional security technologies and delivering them as Software-as-a-Service (SaaS) solutions leveraging cloud computing architectures and subscription business models. Gerhard has a passion for creating and championing new technologies and for developing and growing successful organizations and people. He is also a trusted advisor to a number of early stage startup companies.He was named one of InfoWorld’s 25 Most Influential CTO’s in 2003 and 2004, and received this honor a third time in 2006. Gerhard is a frequent contributor to the SANS Top 20 expert consensus identifying the most critical security vulnerabilities. Gerhard is also a highly regarded author and is perhaps best known for publishing the “Laws of Vulnerabilities.” He is one of the inventors of the Common Vulnerability Scoring System (CVSS) and holds numerous patents in the field of managed network security.

Andy Greenberg

Andy Greenberg

Senior Writer, Wired

Andy Greenberg is a senior writer for WIRED, covering security, privacy, information freedom, and hacker culture. He’s the author of the book This Machine Kills Secrets, about WikiLeaks, cryptography, and the cypherpunks, which was selected as an Editor’s Choice by The New York Times Book Review in 2012. Before coming to WIRED, he spent seven years as a senior reporter for Forbes magazine. His Forbes cover story on data mining firm Palantir, co-written with Ryan Mac, was a Gerald Loeb Award finalist. He’s won two Security Bloggers Network awards for stories on digital arms sales and car hacking.

Kevin Poulsen

Kevin Poulsen

Contributing Editor, The Daily Beast

Kevin Poulsen is a Contributing Editor at the Daily Beast . He is the Author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground.

Kevin Mitnick

Kevin Mitnick

CEO and Chief 'White Hat' Hacker, Mitnick Security

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin and his Global Ghost Team now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. Kevin’s books include ‘Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers’ and ‘Art of Deception: Controlling the Human Element of Security’, which are mandatory readings for security professionals.

Stuart Mcclure

Stuart Mcclure

CEO/President & Founder, Cylance

Stuart leads Cylance as its CEO and visionary for the first math-based approach to threat detection, protection and response. Prior to Cylance, Stuart was EVP, Global CTO and General Manager at McAfee/Intel Security. Stuart is the creator and lead-author of the most successful security book of all time, Hacking Exposed. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry’s leading authorities in information security today.

Dan Kaminsky

Dan Kaminsky

Chief Scientist & Founder, White Ops

Dan Kaminsky is an American security researcher. He is the Chief Scientist of White Ops, a firm specializing in detecting malware activity via JavaScript. He has worked for Cisco, Avaya, and IOActive, where he was the Director of Penetration Testing. He is known among computer security experts for his work on DNS cache poisoning, and for showing that the Sony Rootkit had infected at least 568,200 computers and for his talks at the Black Hat Briefings. Kaminsky released Interpolique, a beta framework for addressing injection attacks such as SQL Injection and Cross Site Scripting in a manner comfortable to developers.

Eva Galperin

Eva Galperin

Director of CyberSecurity, Electronic Frontier Foundation

Eva Galperin is EFF’s Director of Cyber Security. Prior to 2007, when she came to work for EFF, Galperin worked in security and IT in Silicon Valley and earned degrees in political science and international relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world. To that end, she has applied the combination of her political science and technical background to everything from organizing EFF’s Tor Relay Challenge, to writing privacy and security training materials (including Surveillance Self-Defense and the Digital First Aid Kit), and publishing research on malware in Syria, Vietnam, Kazakhstan. When she is not collecting new and exotic malware, she practices aerial circus arts and learning new languages.

Bruce Schneier

Bruce Schneier

CTO, IBM Resilient

Bruce Schneier is an internationally renowned security technologist, called a security guru by The Economist. He is the author of 14 books, including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, as well as hundreds of articles, essays and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a Fellow at the Berkman Klein Center for Internet and Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a Board Member of the Electronic Frontier Foundation, AccessNow and the Tor Project; and an Advisory Board Member of EPIC and VerifiedVoting.org. He is also a Special Advisor to IBM Security and the Chief Technology Officer of IBM Resilient.

Edward Snowden

Edward Snowden

President, Freedom of the press

Edward Snowden is a former intelligence officer who served the CIA, NSA, and DIA for nearly a decade as a subject matter expert on technology and cybersecurity. In 2013, he revealed the NSA was unconstitutionally seizing the private records of billions of individuals who had not been suspected of any wrongdoing, resulting in the largest debate about reforms to US surveillance policy since 1978. He has received awards for courage, integrity, and public service, and was named the top global thinker of 2013 by Foreign Policy magazine. Today, he works on methods of enforcing human rights through the application and development of new technologies. He joined the board of Freedom of the Press Foundation in February 2014 and was named the president of the board in 2016.

Ed Skoudis

Ed Skoudis

Founder/ Fellow, Counter Hack/ SANS institute

Ed Skoudis has taught cyber-incident response and advanced penetration testing techniques to more than 14,000 cybersecurity professionals. His courses distill the essence of real-world, frontline case studies he accumulates, because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost. He is also the Creator of NetWars and CyberCity, the cyber-simulators that provide continuous skills development and evaluation to ensure cyber-skills remain up to date in military units and corporations with major assets at risk.

Neil MacDonald

Neil MacDonald

VP and Gartner Fellow Emeritus, Gartner

Neil MacDonald is a Vice President, Distinguished Analyst and Gartner Fellow Emeritus in Gartner Research, based in Stamford, Connecticut. MacDonald is a member of Gartner’s information security and privacy research team, focusing on securing next-generation virtualized and cloud-based computing environments from advanced attacks. Specific research areas include endpoint protection, virtualization security, application security, protection of cloud-based workloads and protection from advanced targeted attacks, using context-aware security and Big Data analytics approaches. He identified the market for cloud access security brokers in his 2012 report, “The Growing Importance of Cloud Access Security Brokers,” co-authored with Peter Firstbrook.