Andrew Hay is the chief information security officer for Data Gravity, a storage security startup. Previously, Hay held positions as a director of research, a senior security analyst, and an information security officer—so he brings a great deal of industry knowledge to his Twitter account. He tweets “suggested readings” on cybersecurity-related topics to his 11,000 followers regularly, making his account a great follow.
Mikko Hypponen is the chief research officer of Helsinki-based cybersecurity firm F-Secure. He and his team have worked for over twenty years debugging some of the largest viruses in the world, including the SoBig.F worm. His work has appeared in numerous large publications (like the New York Times and Wired magazine), and he has given several noteworthy TED talks on cybersecurity. His number of followers—over 132,000—speaks for itself!.
Michael Kaiser is the executive director of the National Cyber Security Alliance (NCSA). The NCSA leads StaySafeOnline, which helps businesses, schools, and individuals learn more about cybersecurity and data privacy best practices. Kaiser regularly retweets information from the the NCSA, opinion pieces he’s authored, and other bits of cybersecurity news.
Author, researcher, and DevOps-devotee Gene Kim is the founder and former chief technology officer of technology solutions provider Tripwire. He’s also a cybersecurity researcher who has written numerous texts on IT operations, security, and compliance, including “The Phoenix Project: A Novel About IT.” Take a look at his website for more information about him, and follow him on Twitter for his tweets about DevOps and IT operations.
Wendy Nather is the research director at the Retail Cyber Intelligence Sharing Center. She brings over 30 years of experience in IT and cybersecurity to the Twitterverse, and her Twitter feed is chock-full of her own opinions as well as industry retweets. She also writes on her personal blog at Idoneous Security, and the infrequent entries are worth the read.
Bruce Schneier is true veteran in the information security community. Schneier is an expert on cryptography and has written numerous books on network security. Currently, Schneier is chief technology officer for Resilient Systems, and IBM-owned incident response company. Follow himto get the latest on his blog and to see what he’s currently reading.
Have you heard that international superstar Taylor Swift is also an InfoSec expert? Well, she isn’t, but this Twitter account is still a hilarious parody on that topic. SwiftOnSecurity has over 137,000 followers—the most of anyone on this list—and is well-known for satirical, cantankerous tweets and GIFs on everything from IT security to today’s political climate.
Parisa Tabriz manages Google’s information security team and has been dubbed the company’s “Security Princess.” Her job—detailed in this CNN article—“is to hack into the most popular web browser on the planet, trying to find flaws in the system before the ‘black hats’ do.” She’s very active on Twitter, so her 15,000+ followers gain a good deal of real-time information about hacking and IT security.
Which cybersecurity managers and influencers are we missing?
We know this list is just the tip of the iceberg as far as thought leaders in the cybersecurity space are concerned. If you know someone that should appear on the next iteration of this list, tweet us @BitSight and let us know!
If you’re using a “one-size fits all” approach to managing your vendor lifecycle, you are missing opportunities to save money and operate more efficiently. Vendor management efficiencies don’t end in the onboarding stage: using a...
If you’re experiencing frustrating delays and procedural roadblocks during your vendor management process, you’re not alone. Security managers are seeing an increase in the number of third-parties integrating with their business, and ...
During this dynamic and stressful workplace environment 2020 has brought us, finding the most efficient ways to perform in your job has never been more important. When it comes to managing your vendor lifecycle, there are three ways you...