05-15-2024, 05:10 PM
News The Cybersecurity Guardians: Meet the Top 30 cybersecurity Influencers to Follo
<p><img width="960" height="557" src="https://thecyberexpress.com/wp-content/uploads/Cybersecurity-Influencers.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="cybersecurity influencer" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Cybersecurity-Influencers.jpg 960w, https://thecyberexpress.com/wp-content/u...00x174.jpg 300w, https://thecyberexpress.com/wp-content/u...68x446.jpg 768w, https://thecyberexpress.com/wp-content/u...00x348.jpg 600w, https://thecyberexpress.com/wp-content/u...150x87.jpg 150w, https://thecyberexpress.com/wp-content/u...50x435.jpg 750w" sizes="(max-width: 960px) 100vw, 960px" /></p><span style="font-weight: 400;">The ever-evolving landscape of cybersecurity is shaped by a dedicated group of individuals. These pioneers, through their research, entrepreneurship, and tireless efforts, have left a significant mark on the industry. </span>
<span style="font-weight: 400;">From seasoned security leaders steering the helm of major companies, to passionate bloggers, journalists, podcasters, and authors, this diverse group offers a wealth of perspectives on the ever-present fight against cybercrime. </span>
<span style="font-weight: 400;">Veterans with decades of experience share the stage with innovative minds constantly pushing boundaries. Whether it's investigative journalists uncovering cybercrime rings, ethical hackers forging new defensive strategies, or company founders shaping the future of online safety, these influencers are united in a common cause. </span>
<span style="font-weight: 400;">They leverage social media to not only stay updated on the latest threats but also advocate for increased awareness and education. This list compiles the top 30 most influential <a href="https://thecyberexpress.com/social-media-awareness-day-cybersecurity/" target="_blank" rel="noopener">cybersecurity influencers</a> who actively share their expertise online. If you're interested in cybersecurity, following and engaging with these influential figures is a surefire way to stay informed and inspired.</span>
<h2><span style="font-weight: 400;">Top 30 Cybersecurity Influencers of 2024</span></h2>
<h3>30. Alexandre Blanc -<a href="https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/" target="_blank" rel="nofollow noopener"> President and Owner at Alexandre Blanc Cyber</a></h3>
<img class="alignnone wp-image-68501 size-full" src="https://thecyberexpress.com/wp-content/uploads/alexandre-blanc-Cybersecurity-Influencers-of-2024.webp" alt="alexandre blanc cybersecurity influencer " width="541" height="377" />
<span style="font-weight: 400;">Alexandre Blanc is a renowned Cybersecurity dvisor, ISO/IEC 27001 and 27701 Lead Implementer, and a recognised security expert. With a track record of holding successful cybersecurity <a class="wpil_keyword_link" title="events" href="https://thecyberexpress.com/cyber-security-events/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3986">events</a>, Blanc serves as an Independent Strategic and Security Advisor, providing invaluable counsel to various organisations. His expertise spans incident response management, digital transformations, and <a class="wpil_keyword_link" title="dark web" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3984">dark web</a> investigations. </span>
<span style="font-weight: 400;">Recognised as a LinkedIn Top Voice in Technology and named among the top security experts with over 75k followers on LinkedIn, Blanc's insights are highly sought-after in the <a href="https://thecyberexpress.com/cybersecurity-for-civil-society/" target="_blank" rel="noopener">cybersecurity community</a>. Through publications, speaking engagements, and advisory roles, he continues uplift the IT and security industry. </span>
<h3>29. Alissa Abdullah - <a href="https://www.ischool.berkeley.edu/people/alissa-dr-j-abdullah" target="_blank" rel="nofollow noopener">Deputy CSO at Mastercard</a></h3>
<img class="alignnone wp-image-68502 size-full" src="https://thecyberexpress.com/wp-content/uploads/Alissa-Abdullah-Deputy-CSO-at-Mastercard-1.webp" alt="Alissa Abdullah - Deputy CSO at Mastercard Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Alissa Abdullah, PhD, is a distinguished senior information technology and cybersecurity executive with a rich background spanning Fortune 100 companies, the White House, and the government intelligence community. Currently serving as Deputy Chief Security Officer for Mastercard, she brings over 20 years of experience in IT strategy, fiscal management, and leading large government programmes. </span>
<span style="font-weight: 400;">Abdullah's strategic leadership extends beyond her corporate role; she serves as a board member for organisations like Girls in Tech, Inc. and Smartsheet, while also lecturing at the University of California, Berkeley. With a PhD in Information Technology Management, and over 17k followers on LinkedIn, she is a recognised authority in <a href="https://thecyberexpress.com/cybersecurity-concerns-for-openais-gpt-4o/" target="_blank" rel="noopener">cybersecurity</a> and IT leadership. </span>
<h3>29. Jane Frankland -<a href="https://www.legalsecurityforum.com/speakers/jane-frankland/" target="_blank" rel="nofollow noopener"> CEO at KnewStart</a></h3>
<img class="alignnone wp-image-68503 size-full" src="https://thecyberexpress.com/wp-content/uploads/Jane-Frankland-CEO-at-KnewStart-1.webp" alt="Jane Frankland - CEO at KnewStart Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Jane Frankland is a prominent figure in cybersecurity with a career spanning over two decades of experience in the field. As a cybersecurity influencer and LinkedIn Top Voice, she has established herself as an award-winning leader, coach, board advisor, author, and speaker. </span>
<span style="font-weight: 400;">Frankland's expertise lies in bridging the gap between business strategy and technical cybersecurity needs, enabling smoother and more effective engagements. With a portfolio career, she works with major brands as an influencer, leadership coach, and board advisor. Additionally, Frankland is deeply involved in initiatives promoting diversity and inclusion in cybersecurity, aligning her work with the UN Sustainable Development Goals. </span>
<h3>27. Mark Lynd -<a href="https://www.netsync.com/bio/mark-lynd/" target="_blank" rel="nofollow noopener"> Head of Executive Advisory & Corporate Strategy at NETSYNC</a></h3>
<img class="alignnone wp-image-68504 size-full" src="https://thecyberexpress.com/wp-content/uploads/Mark-Lynd-Head-of-Executive-Advisory-Corporate-Strategy-at-NETSYNC-1.webp" alt="Mark Lynd - Head of Executive Advisory & Corporate Strategy at NETSYNC Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Mark Lynd is a globally recognised cybersecurity strategist, and keynote speaker in cybersecurity and AI. With over 25 years of experience, including four stints as a CIO & CISO for global companies, he excels in technology, cybersecurity, and AI. </span>
<span style="font-weight: 400;">Currently, he serves as the Head of Executive Advisory & Corporate Strategy at Netsync, a global technology reseller, where he concentrates on cybersecurity, AI, <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3979">data</a> center, IoT, and digital transformation. Lynd's accolades include being ranked globally for security and AI thought leadership, and he's authored acclaimed books and eBooks. </span>
<span style="font-weight: 400;">He holds a Bachelor of Science from the University of Tulsa and is a proud military veteran. </span>
<h3>26. Naomi Buckwalter -<a href="https://www.sans.org/profiles/naomi-buckwalter/" target="_blank" rel="nofollow noopener"> Director of Product Security at Contrast Security</a></h3>
<img class="alignnone wp-image-68505 size-full" src="https://thecyberexpress.com/wp-content/uploads/Naomi-Buckwalter-Director-of-Product-Security-at-Contrast-Security-1.webp" alt="Naomi Buckwalter - Director of Product Security at Contrast Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Naomi Buckwalter is an accomplished Information Security Leader, Nonprofit Director, Keynote Speaker, and LinkedIn Learning Instructor. </span><span style="font-weight: 400;">With extensive experience in directing information security programmes, she has notably served as Director of Product Security at Contrast Security and Director of Information Security & IT at Beam Dental. Buckwalter's expertise encompasses compliance, <a class="wpil_keyword_link" title="risk management" href="https://thecyberexpress.com/what-is-risk-management/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3987">risk management</a>, and security operations. </span>
<span style="font-weight: 400;">She is also the Founder & Executive Director of the Cybersecurity Gatebreakers Foundation, aiming to revolutionise cybersecurity hiring practices. </span><span style="font-weight: 400;">With a background in computer science and over 99K followers on LinkedIn, she is recognised for her contributions as a cybersecurity thought leader and advocate for diversity in tech. </span>
<h3>25. Raj Samani-<a href="https://globalinitiative.net/profile/raj-samani/" target="_blank" rel="nofollow noopener"> Chief Scientist for Cybersecurity</a></h3>
[caption id="attachment_68506" align="alignnone" width="541"]<img class="wp-image-68506 size-full" src="https://thecyberexpress.com/wp-content/uploads/Raj-Samani-Chief-Scientist-for-Cybersecurity-1.webp" alt="Raj Samani- Chief Scientist for Cybersecurity" width="541" height="377" /> Source: Australian <a class="wpil_keyword_link" title="Cyber" href="https://thecyberexpress.com/cyber-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3989">Cyber</a> Conference 2024[/caption]
<span style="font-weight: 400;">Raj Samani is currently a Chief Scientist at Rapid7 and has experience in this industry spanning 20 years. He has worked with law enforcement and is also advisor to the European Cybercrime Centre. Samani is a sought-after speaker at industry conferences, a published author, and continues to make appearances in podcasts where he discusses his expertise surrounding threat intelligence, cyber defence strategies, and emerging threats. </span>
<span style="font-weight: 400;">With his following of over 15.2k followers on LinkedIn and 14.4k on Twitter, Samani is influential to his followers due to the cybersecurity related articles, updates and insights he shares, often engaging not only cybersecurity enthusiasts but also professionals. </span>
<h3>24. Tyler Cohen Wood-<a href="https://www.darkcryptonite.com/tyler" target="_blank" rel="nofollow noopener"> Co- Founder of Dark Cryptonite</a></h3>
[caption id="attachment_68507" align="alignnone" width="541"]<img class="wp-image-68507 size-full" src="https://thecyberexpress.com/wp-content/uploads/Tyler-Cohen-Wood-cybersecurity-influencer.webp" alt="Tyler Cohen Wood- Co- Founder of Dark Cryptonite" width="541" height="377" /> Source: BankInfoSecurity[/caption]
<span style="font-weight: 400;">Tyler Cohen Wood is a prominent and respected figure in the cybersecurity field. Currently the co-founder of Dark Cryptonite, a Special Comms method of cybersecurity, Woods has over 20 years of experience in the intelligence community. Woods previously served as Senior Intelligence Officer at the Defence Intelligence Agency (DIA) and Cyber Branch Chief at the DIA's Science and Technology Directorate. </span>
<span style="font-weight: 400;">Woods is also a keynote speaker and provides insight into global cyber threats and national security due to her knowledge on digital <a class="wpil_keyword_link" title="privacy" href="https://thecyberexpress.com/what-is-privacy/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3982">privacy</a> and national security. Woods has a following of over 27k on LinkedIn, attention she’s garnered due to her ability to share insightful commentary on <a href="https://thecyberexpress.com/nsa-releases-guidance-ai-security/" target="_blank" rel="noopener">cybersecurity issues</a> which explains complex technical concepts easily for all types of audiences. </span>
<h3>23. Theresa Payton-<a href="https://www.fortalicesolutions.com/authors/trackerpayton" target="_blank" rel="nofollow noopener"> CEO of Fortalice Solutions</a></h3>
[caption id="attachment_68509" align="alignnone" width="541"]<img class="wp-image-68509 size-full" src="https://thecyberexpress.com/wp-content/uploads/Theresa-Payton-CEO-of-Fortalice-Solutions-1.webp" alt="Theresa Payton- CEO of Fortalice Solutions" width="541" height="377" /> Source: Experience McIntire[/caption]
<span style="font-weight: 400;">Theresa Payton was the first ever female Chief Information Officer for the White House from 2006-2008, serving under George W. Bush, and is now the CEO of her company Fortalice Solutions which she founded in 2008.</span>
<span style="font-weight: 400;"> Payton is best known for consulting as that is the purpose of her company, providing services like risk assessments, incident response, and digital forensics to government agencies and different industries and businesses about cybersecurity strategy and best IT practices. </span>
<span style="font-weight: 400;">Payton has over 25k followers on LinkedIn and this is due to her continuous and avid blogging exposing cybercrimes and tackling cybersecurity on her</span><a href="https://www.fortalicesolutions.com/authors/trackerpayton"> <span style="font-weight: 400;">companies page.</span></a>
<h3>22. Bill Brenner-<a href="https://muckrack.com/billbrenner70" target="_blank" rel="nofollow noopener">Vice President, Custom and Research Content Strategy, CyberRisk Alliance </a></h3>
[caption id="attachment_68510" align="alignnone" width="541"]<img class="wp-image-68510 size-full" src="https://thecyberexpress.com/wp-content/uploads/Bill-Brenner-cybersecurity-influencer-1.webp" alt="Bill Brenner-Vice President, Custom and Research Content Strategy, CyberRisk Alliance" width="541" height="377" /> Source: SC Magazine[/caption]
<span style="font-weight: 400;">Bill Brenner is an experienced professional in the cybersecurity field and has ventured into many areas including journalist, editor, and community manager. His work has focused on cybersecurity education and awareness.</span>
<span style="font-weight: 400;"> Brenner is currently the Vice President of Custom and Research Content Strategy at CyberRisk Alliance. Brenners 15.7k followers on Twitter come from his influence surrounding articles posted on CS Media and Techtarget which are informative and relevant to cybersecurity professionals. </span>
<h3>21. Brian Honan-<a href="https://bhconsulting.ie/our-team/#1086b5099958f07b2" target="_blank" rel="nofollow noopener"> CEO of BH Consulting</a></h3>
[caption id="attachment_68511" align="alignnone" width="541"]<img class="wp-image-68511 size-full" src="https://thecyberexpress.com/wp-content/uploads/Brian-Honan-CEO-of-BH-Consulting-1.webp" alt="Brian Honan- CEO of BH Consulting" width="541" height="377" /> Source: BH Consulting[/caption]
<span style="font-weight: 400;">Brian Honan is the CEO of BH Consulting and has over 30 years of experience in cybersecurity. He was formerly a special advisor on <a class="wpil_keyword_link" title="cyber security" href="https://thecyberexpress.com/what-is-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3990">cyber security</a> to Europol’s Cyber Crime Centre, along with being an advisor to the European Union Agency for Network and Information Security. </span>
<span style="font-weight: 400;">Honan’s work in consultancy is not just aimed at government agencies but also multinational corporations, and small businesses. Honan advocates highly for education in the field and is a founding member of the Irish Reporting and Information Security Service (IRISS-CERT). </span>
<span style="font-weight: 400;">His following of 36.2k on Twitter can be attested to the articles and blogs he’s written and posted along with presentations at industry conferences worldwide. </span>
<h3>20. Magda Chelly-<a href="https://www.magda-on-cyber.com/" target="_blank" rel="nofollow noopener"> Senior Cybersecurity Expert</a></h3>
[caption id="attachment_68513" align="alignnone" width="541"]<img class="wp-image-68513 size-full" src="https://thecyberexpress.com/wp-content/uploads/Magda-Chelly-Senior-Cybersecurity-Expert-1.webp" alt="Magda Chelly- Senior Cybersecurity Expert" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Magda Chelly is the first Tunisian woman to be on the advisory board of Blackhat. She has over 10 years of experience in security architecture, risk management, and incident response. Chelly is also a published author and is also known to be a keynote speaker who can deliver her talks in five different languages. </span>
<span style="font-weight: 400;">She is currently the Managing Director at Responsible Cyber where she helps organisations implement effective cybersecurity strategies, while also being the founder of Women of Security (WoSEC) Singapore which aims to encourage women to join the field of cybersecurity. </span>
<span style="font-weight: 400;">Chelly has over 57k followers on LinkedIn due to her posts on cybersecurity, but also her diversity initiatives which make her an advocate in the field. </span>
<h3>19. Marcus J. Carey- <a href="https://theorg.com/org/reliaquest/org-chart/marcus-j-carey" target="_blank" rel="nofollow noopener">Principal Research Scientist at ReliaQuest, CEO of ThreatCare</a></h3>
[caption id="attachment_68514" align="alignnone" width="541"]<img class="wp-image-68514 size-full" src="https://thecyberexpress.com/wp-content/uploads/Marcus-J.-Carey-Principal-Research-Scientist-at-ReliaQuest-CEO-of-ThreatCare-1.webp" alt="Marcus J. Carey- Principal Research Scientist at ReliaQuest, CEO of ThreatCare" width="541" height="377" /> Source: Facebook[/caption]
<span style="font-weight: 400;">Marcus J Carey is a former Navy Cryptologist who is now in cybersecurity innovation. He has worked many roles including penetration tester, security researcher, and security <a class="wpil_keyword_link" title="engineer" href="https://thecyberexpress.com/how-to-become-a-cyber-security-engineer/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3981">engineer</a>, all of which helped to gain new and revolutionary insights into offensive and defensive cybersecurity techniques. </span>
<span style="font-weight: 400;">Carey is famous for the books he has written surrounding <a href="https://thecyberexpress.com/tce-cyberwatch-weekly-round-up-3/" target="_blank" rel="noopener">hackers and cybersecurity</a> and is an established CEO of Threatcare, a cybersecurity company focused on providing proactive threat detection and risk assessment solutions. </span>
<span style="font-weight: 400;">His 52.4k Twitter followers stem from the expertise he shares on social media and his importance in educating future professionals in the field. He is also sought after for speaking in industry conferences. </span>
<h3>18. Andy Greenberg- <a href="https://www.wired.com/author/andy-greenberg/" target="_blank" rel="nofollow noopener">Senior Writer at </a><a href="https://www.wired.com/author/andy-greenberg/">WIRED</a></h3>
[caption id="attachment_68515" align="alignnone" width="541"]<img class="wp-image-68515 size-full" src="https://thecyberexpress.com/wp-content/uploads/Andy-Greenberg-Senior-Writer-at-WIRED-1.webp" alt="Andy Greenberg- Senior Writer at WIRED" width="541" height="377" /> Source: Penguin Random House[/caption]
<span style="font-weight: 400;">Andy Greenberg is currently a senior writer at Wired magazine, and has written many articles investigating high-profile cyber incidents, <a class="wpil_keyword_link" title="hacking" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3985">hacking</a> groups, and emerging cybersecurity threats. </span>
<span style="font-weight: 400;">Greenberg's reports often focus on the details of cyberattacks and looks at the broader implications for people, the government, and the industry as a whole. </span>
<span style="font-weight: 400;">His 70.4k followers on </span><span style="font-weight: 400;">Twitter</span><span style="font-weight: 400;"> are influenced by his updates and in-depth articles exploring the world of cybersecurity, not only informing the general public but also professionals about the hazards. </span>
<h3>17. Paul Asadoorian<a href="https://securitypodcaster.com/" target="_blank" rel="nofollow noopener">- IT Security Engineer</a></h3>
[caption id="attachment_68516" align="alignnone" width="541"]<img class="wp-image-68516 size-full" src="https://thecyberexpress.com/wp-content/uploads/Paul-Asadoorian-IT-Security-Engineer-1.webp" alt="Paul Asadoorian- IT Security Engineer" width="541" height="377" /> Source: SC Magazine[/caption]
<span style="font-weight: 400;">Paul Asadoorian is a professional in the cybersecurity field for over 20 years, but his following comes from his blogs and podcasts. He’s best known as the founder and host of Security Weekly where Asadoorian brings together experts and practitioners from the cybersecurity field to discuss latest news and research in the field such as <a class="wpil_keyword_link" title="network security" href="https://thecyberexpress.com/what-is-network-security/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3991">network security</a>, application security, incident response, etc. </span>
<span style="font-weight: 400;">Additionally, he is also the founder and CEO of Offensive Countermeasures, a company that helps cybersecurity professionals enhance their skills and stay ahead of evolving threats. </span><span style="font-weight: 400;">His 77.3k followers on Twitter are mostly due to his large social media presence as a podcaster and his posts surrounding resources , opinions, and promotion of Security Weekly. </span>
<h3>16. Nicole Perlroth- <a href="https://www.nytimes.com/by/nicole-perlroth" target="_blank" rel="nofollow noopener">New York Times</a></h3>
[caption id="attachment_68518" align="alignnone" width="541"]<img class="wp-image-68518 size-full" src="https://thecyberexpress.com/wp-content/uploads/Nicole-Perlroth-New-York-Times-1.webp" alt="Nicole Perlroth- New York Times" width="541" height="377" /> Source:[/caption]
<span style="font-weight: 400;">Nicole Perlroth is a Pulitzer Prize-winning journalist who covers cybersecurity and digital espionage for The New York Times. She is regarded for her intensive reporting on cyber threats, hacking incidents, and the intersection of technology and national security. </span>
<span style="font-weight: 400;">Perlroth has also written a </span><span style="font-weight: 400;">book</span><span style="font-weight: 400;"> on the cyberweapons arms race. With 91.5k followers on Twitter, Perlroth shares her own articles, as well as insights and updates related to cybersecurity and technology which creates engagement for her from both cybersecurity professionals and general readers interested in security. </span>
<h3>15. Graham Cluley-<a href="https://www.smashingsecurity.com/" target="_blank" rel="nofollow noopener"> Smashing Security</a></h3>
[caption id="attachment_67630" align="alignnone" width="523"]<img class="wp-image-67630" src="https://thecyberexpress.com/wp-content/uploads/Graham-Cluley-Smashing-Security.webp" alt="Graham Cluley- Smashing Security" width="523" height="523" /> Source: Smashing Security[/caption]
<span style="font-weight: 400;">Graham Cluley is an author and blogger who has written books on cybersecurity and continues to be avid in sharing news and stories on cybersecurity through the written word and speech. Currently, Graham Cluley is an independent cybersecurity analyst, writer, and public speaker. </span>
<span style="font-weight: 400;">He also runs a</span><a href="https://www.smashingsecurity.com/" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">podcast</span></a><span style="font-weight: 400;"> where he discusses internet threats and safety in an entertaining, engaging and informative way. Cluley’s 112.9k Twitter followers are updated with his podcast, tweets and YouTube videos which explain cybersecurity topics and how to tackle them in a way patented to the general users of the internet. </span>
<h3><span style="font-weight: 400;">14. Rachel Tobac-</span><a href="https://www.socialproofsecurity.com/" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">Hacker and CEO of SocialProof Security</span></a><span style="font-weight: 400;"> </span></h3>
[caption id="attachment_68522" align="alignnone" width="541"]<img class="wp-image-68522 size-full" src="https://thecyberexpress.com/wp-content/uploads/Rachel-Tobac-Hacker-and-CEO-of-SocialProof-Security╤A.webp" alt="Rachel Tobac- Hacker and CEO of SocialProof Security " width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Rachel Tobac is an ethical <a class="wpil_keyword_link" title="hacker" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3980">hacker</a> who helps companies keep safe through her work as CEO of SocialProof Security, which she co-founded. The company focuses on educating employees to recognize and deal with cyberattacks. She has a background in behavioural psychology and uses it to improve <a href="https://thecyberexpress.com/embracing-cybersecurity-awareness-month/" target="_blank" rel="noopener">cybersecurity awareness</a> and defences in the general public. </span>
<span style="font-weight: 400;">Tobac also works with the non-profit Women in Security and Privacy (WISP) where she helps women advance in the security field and often speaks for underrepresented groups to pursue a career in cybersecurity. Tobac’s 106k strong following on Twitter is due to her activism and due to the tips and updates she shares related to the industry, with some posts being popular for starting debates amongst professionals. </span>
<h3>13. Katie Moussouris- <a href="https://www.forbes.com/profile/katie-moussouris/" target="_blank" rel="nofollow noopener">Founder of Luta Security</a></h3>
[caption id="attachment_68523" align="alignnone" width="541"]<img class="wp-image-68523 size-full" src="https://thecyberexpress.com/wp-content/uploads/Katie-Moussouris-Founder-of-Luta-Security-1.webp" alt="Katie Moussouris- Founder of Luta Security" width="541" height="377" /> Source: SANS Cyber Security Certifications & Research[/caption]
<span style="font-weight: 400;">Katie Moussouris is the Founder of Luta Security which encompasses her aims surrounding vulnerability disclosure and safer and responsible research in security. She is a leading figure in both the aspects and has 20 years of experience on the field. Some of Moussouris’s leading work is the Microsoft's bug bounty programme, which she developed and was one of the first-of-its-kind in the industry. </span>
<span style="font-weight: 400;">She also advocates for vulnerability disclosure, which merits more transparency between security researchers and organisations. Moussouris’s 115.5k followers come from her revolutionary developments. She is a frequent speaker at cybersecurity conferences and events. She often posts and talks about her advocacy for <a class="wpil_keyword_link" title="ethical hacking" href="https://thecyberexpress.com/what-is-ethical-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3988">ethical hacking</a> and responsible security practices along with her expertise on vulnerability disclosure and bug bounty programmes. </span>
<h3>12. Chuck Brooks- <a href="https://www.brooksci.com/aboutus" target="_blank" rel="nofollow noopener">President of Brooks Consulting International </a></h3>
[caption id="attachment_68524" align="alignnone" width="541"]<img class="wp-image-68524 size-full" src="https://thecyberexpress.com/wp-content/uploads/Chuck-Brooks-President-of-Brooks-Consulting-International╤A.webp" alt="Chuck Brooks- President of Brooks Consulting International " width="541" height="377" /> Source: The Official Cybersecurity Summit[/caption]
<span style="font-weight: 400;">Brooks is the president of his consulting company where he advises clients on cybersecurity strategy, risk assessment, and business development. Along with that, he is a featured author in many technology and cybersecurity blogs.</span>
<span style="font-weight: 400;"> Brooks has previously worked in advisory roles with corporations and also at government agencies, including the Department of Homeland Security and the Defence Intelligence Agency. </span>
<span style="font-weight: 400;">Brooks’ 116k LinkedIn followers are due to his regular contributions to industry research and news, media articles. Along with that, he is a popular keynote speaker who shares his expertise on a wide range of cybersecurity topics. </span>
<h3>11. Daniel Miessler- <a href="https://github.com/danielmiessler" target="_blank" rel="nofollow noopener">Founder of Unsupervised Learning</a></h3>
[caption id="attachment_68525" align="alignnone" width="541"]<img class="wp-image-68525 size-full" src="https://thecyberexpress.com/wp-content/uploads/Daniel-Miessler-Founder-of-Unsupervised-Learning-1.webp" alt="Daniel Miessler- Founder of Unsupervised Learning" width="541" height="377" /> Source: The Official Cybersecurity Summit[/caption]
<span style="font-weight: 400;">Miessler is the founder and CEO of Unsupervised Learning where he writes informative articles and tackles relevant issues surrounding cybersecurity and what the world after AI means for human beings. </span>
<span style="font-weight: 400;">Miesslers following of 139.4k on Twitter comes from professionals in the field and novice enthusiasts engaging with his content and discussions due to his experience in the field. He also avidly shares articles, podcasts, bringing his audience up to speed with cybersecurity. </span>
<h3>10. Kevin Beaumont-<a href="https://doublepulsar.com/" target="_blank" rel="nofollow noopener"> Internet Cyber Personality</a></h3>
[caption id="attachment_68526" align="alignnone" width="541"]<img class="wp-image-68526 size-full" src="https://thecyberexpress.com/wp-content/uploads/Kevin-Beaumont-Internet-Cyber-Personality.webp" alt="Kevin Beaumont- Internet Cyber Personality" width="541" height="377" /> Source: iTWire[/caption]
<span style="font-weight: 400;">Kevin Beaumont is an experienced professional who has worked in various cybersecurity roles, including security engineer and consultant. He also specialises in threat detection and incident response. Kevin is now the Head of Cybersecurity Operations at Arcadia Ltd. along with being a cybersecurity researcher who runs his own platform where he discusses cybersecurity. </span>
<span style="font-weight: 400;">Beaumont appeals to newer, younger cybersecurity enthusiasts with around 150.9k followers on Twitter due to his engagement with trolling on the internet. Additionally, he writes articles for</span><a href="https://medium.com/@networksecurity" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">Medium</span></a><span style="font-weight: 400;"> where he informs about cybercrime issues such as Microsoft Windows vulnerability. </span>
<h3>9. Lesley Carhart- <a href="https://en.wikipedia.org/wiki/Lesley_Carhart" target="_blank" rel="nofollow noopener">hacks4pancakes</a></h3>
[caption id="attachment_68527" align="alignnone" width="541"]<img class="wp-image-68527 size-full" src="https://thecyberexpress.com/wp-content/uploads/Lesley-Carhart-hacks4pancakes-1.webp" alt="Lesley Carhart- hacks4pancakes" width="541" height="377" /> Source: hacks4pancakes[/caption]
<span style="font-weight: 400;">Lesley Carhart is currently a threat analyst and principal responder at Dragos, a company which works to protect industrial control systems from cyber threats, and has experience as a security analyst, incident responder and threat hunter. </span>
<span style="font-weight: 400;">Her work in both the public and private sectors allowed her to gain valuable insights into cybersecurity issues across different industries. </span><span style="font-weight: 400;">Her following of 168k comes from her works such as blogger and speaker who offers career advice in the field of cybersecurity. She also speaks about topics such as industrial control, <a href="https://thecyberexpress.com/20-of-hive-victims-in-the-us-reported-attacks/" target="_blank" rel="noopener">ransomware attacks</a> and more. </span>
<h3>8. Bruce Schneier- <a href="https://www.schneier.com/" target="_blank" rel="nofollow noopener">Schneier on Security</a></h3>
[caption id="attachment_68528" align="alignnone" width="541"]<img class="wp-image-68528 size-full" src="https://thecyberexpress.com/wp-content/uploads/Bruce-Schneier-Schneier-on-Security.webp" alt="Bruce Schneier- Schneier on Security" width="541" height="377" /> Source: Wikipedia[/caption]
<span style="font-weight: 400;">Schneier is a specialist in computer security and privacy along with being a cryptographer. Schneier is regarded as one of the most influential people in his field of cryptography and has written numerous books on cybersecurity, some of which are considered seminal works in the field. </span>
<span style="font-weight: 400;">He has also written articles about security and privacy for magazines such as Wired. Schneier’s following of 147.1k comes from being acknowledged as impactful in his field but also due to his blog where he addresses the prevalence of hacking and other cyber dangers intersecting with our everyday lives. </span>
<h3>7. Eugene Kaspersky- <a href="https://www.kaspersky.com/about/team/eugene-kaspersky" target="_blank" rel="nofollow noopener">CEO of Kaspersky Lab</a></h3>
[caption id="attachment_68530" align="alignnone" width="541"]<img class="wp-image-68530 size-full" src="https://thecyberexpress.com/wp-content/uploads/Eugene-Kaspersky-CEO-of-Kaspersky-Lab-1.webp" alt="Eugene Kaspersky- CEO of Kaspersky Lab" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Eugene Kaspersky is an individual most impactful in the cybersecurity, best known as the CEO of Kaspersky Lab, a company he co-founded in 1997 which identified government-sponsored cyberwarfare. Kaspersky’s following of 187.5k comes from how Kaspersky Lab has grown into a global cybersecurity powerhouse, offering a wide range of products and services, along with his advocacy for <a href="https://thecyberexpress.com/enhanced-cybersecurity-education/" target="_blank" rel="noopener">cybersecurity education</a>. </span>
<span style="font-weight: 400;">Kaspersky is also a keynote speaker on emerging threats, and the importance of cybersecurity awareness at industry conferences and events. Furthermore, he writes a </span><span style="font-weight: 400;">blog</span><span style="font-weight: 400;"> where he regularly posts updates about his life in the industry. </span>
<h3>6. Eric Geller -<a href="https://www.linkedin.com/in/ericjgeller/" target="_blank" rel="nofollow noopener"> Cybersecurity Journalist</a></h3>
[caption id="attachment_68532" align="alignnone" width="541"]<img class="wp-image-68532 size-full" src="https://thecyberexpress.com/wp-content/uploads/Eric-Geller-Cybersecurity-Journalist-1.webp" alt="Eric Geller - Cybersecurity Journalist" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Eric Geller is a freelance cybersecurity journalist recognised for his insightful coverage of digital security. With a comprehensive portfolio including esteemed publications like WIRED, Politico, and The Daily Dot, Geller offers in-depth analysis on cyber policy, encryption, and <a href="https://thecyberexpress.com/top-10-data-breaches-in-india-cybercrime/" target="_blank" rel="noopener">data breaches</a>. </span>
<span style="font-weight: 400;">His investigative reporting touches the intricate intersections of cybersecurity and everyday life, from election security to critical infrastructure protection. Geller's expertise extends to interviews with top officials and breaking news on government initiatives. With a Bachelor of Arts in Political Science from Kenyon College, Geller's accolades include induction into the Pi Sigma Alpha national political science Honors society. </span>
<h3>5. Shira Rubinoff- <a href="https://futurumgroup.com/leadership-team/shira-rubinoff/" target="_blank" rel="nofollow noopener">The Futurum Group </a></h3>
[caption id="attachment_68533" align="alignnone" width="541"]<img class="wp-image-68533 size-full" src="https://thecyberexpress.com/wp-content/uploads/Shira-Rubinoff-cybersecurity-influencer-1.webp" alt="Shira Rubinoff- The Futurum Group " width="541" height="377" /> Source: The Futurum Group[/caption]
<span style="font-weight: 400;">Shira Rubinoff is a cybersecurity and blockchain advisor as well as being a popular keynote speaker and author. She is the President of SecureMySocial, a cybersecurity company that focuses on protecting organizations from social media <a class="wpil_keyword_link" title="risks" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3983">risks</a> such as data leakage, reputational damage, and insider threats. Her videos are many and impactful, consisting of interviews and conversations with other professionals. </span>
<span style="font-weight: 400;">She is known to be one of the top businesswomen in the field and currently runs a cybersecurity consulting firm and serves as the Chair of the Women in Cybersecurity Council (WCI), aiming to influence more women to join the field. Her follower count of 190.4k isn’t only due to her experience as a businesswoman, but also her constant interaction on social media as she posts talks, videos, podcasts, written work and more about many topics in cybersecurity. </span>
<h3>4. Mikko Hyppönen- <a href="https://www.withsecure.com/en/expertise/people/mikko-hypponen" target="_blank" rel="nofollow noopener">Chief Research Officer at WithSecure </a></h3>
[caption id="attachment_68535" align="alignnone" width="541"]<img class="wp-image-68535 size-full" src="https://thecyberexpress.com/wp-content/uploads/Mikko-HyppΓC¥nen-Chief-Research-Officer-at-WithSecure╦O.webp" alt="Mikko Hyppönen- Chief Research Officer at WithSecure " width="541" height="377" /> Source: WithSecure[/caption]
<span style="font-weight: 400;">Miko Hyppönen has been in the world of cybersecurity since the late 1980s. Since then he has led researchers in identifying and eliminating emerging cyber threats, while providing insights and solutions to protect individuals, businesses, and governments from cybercrime. </span>
<span style="font-weight: 400;">Hyppönen has written for many famous newspapers like the New York Times and has also appeared on international TV and lectured at universities like Oxford and Cambridge. His 230.5k followers is due to his engaging and informative presentations, which help raise awareness about cybersecurity threats. </span>
<span style="font-weight: 400;">He also has a following for his blog posts and research papers detailing his expertise. </span>
<h3>3. Kim Zetter - <a href="https://en.wikipedia.org/wiki/Kim_Zetter" target="_blank" rel="nofollow noopener">Investigative Journalist and Book Author</a></h3>
[caption id="attachment_68536" align="alignnone" width="541"]<img class="wp-image-68536 size-full" src="https://thecyberexpress.com/wp-content/uploads/Kim-Zetter-Investigative-Journalist-and-Book-Author-1.webp" alt="Kim Zetter - Investigative Journalist and Book Author" width="541" height="377" /> Source: IMDb[/caption]
<span style="font-weight: 400;">Kim Zetter is an award-winning investigative journalist renowned for her expertise in cybersecurity and national security. With a distinguished career spanning publications like WIRED, Politico, and The New York Times Magazine, Zetter is a respected authority on topics ranging from election security to cyber warfare. </span>
<span style="font-weight: 400;">Her book, "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon," offers a gripping narrative of covert cyber operations. As a sought-after speaker and <a href="https://thecyberexpress.com/scalper-bots-users-are-buying-via-social-media/" target="_blank" rel="noopener">social media</a> personality with over 7K followers on LinkedIn, she shares insights at conferences worldwide. Zetter's relentless pursuit of truth has earned her acclaim and established her as a leading voice in the cybersecurity journalism. </span>
<h3>2. Brian Krebs-<a href="https://krebsonsecurity.com/"> Krebs on Security</a></h3>
[caption id="attachment_68537" align="alignnone" width="541"]<img class="wp-image-68537 size-full" src="https://thecyberexpress.com/wp-content/uploads/Brian-Krebs-Krebs-on-Security-1.webp" alt="Brian Krebs- Krebs on Security" width="541" height="377" /> Source: Keppler Speakers[/caption]
<span style="font-weight: 400;">Brian Krebs is an investigative journalist who wrote for The Washington post from 1995 to 2009 for the security fix blog. He now runs his own blog, Krebs on Security. In it, he provides in-depth analysis and reports, along with promptly posted breaking news on cybercrime, hacking, data breaches, etc. </span>
<span style="font-weight: 400;">Krebs has received many awards for his investigative journalism, including the Pulitzer Prize finalist for his coverage of cybersecurity problems. Krebs’ 347.9k are due to the reputation his blog widely holds for being a first choice when looking for accurate, fast information, as well as the truth as he’s known to hold individuals and organisations accountable for in his work. </span>
<h3>1. Robert Herjavec-<a href="https://robertherjavec.com/"> CEO of Global Cybersecurity Firm - Cyderes</a></h3>
[caption id="attachment_68538" align="alignnone" width="541"]<img class="wp-image-68538 size-full" src="https://thecyberexpress.com/wp-content/uploads/Robert-Herjavec-CEO-of-Global-Cybersecurity-Firm-Cyderes-1.webp" alt="Robert Herjavec- CEO of Global Cybersecurity Firm - Cyderes" width="541" height="377" /> Source: Cyderes[/caption]
<span style="font-weight: 400;">Herjavec is the CEO of the Herjavec Group and the Global Cybersecurity Firm, Cyderes, which leads cybersecurity options and supports many security services including threat detection and response, identity and access management, and compliance solutions. Along with that, he features on BBC’s Shark Tank and also provides motivational business advice through his books and videos. </span>
<span style="font-weight: 400;">His following of 2.2 million may be due to his appearance on the show, but he continues to actively post insights and gives commentary on cybersecurity trends and ever-changing threats. Most of his followers are there to witness what he shares on business and entrepreneurship. Herjavec frequently shares cybersecurity related articles and updates. </span>
<em><span style="color: #ff0000;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></em>
https://thecyberexpress.com/top-cybersec...fluencers/
<p><img width="960" height="557" src="https://thecyberexpress.com/wp-content/uploads/Cybersecurity-Influencers.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="cybersecurity influencer" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Cybersecurity-Influencers.jpg 960w, https://thecyberexpress.com/wp-content/u...00x174.jpg 300w, https://thecyberexpress.com/wp-content/u...68x446.jpg 768w, https://thecyberexpress.com/wp-content/u...00x348.jpg 600w, https://thecyberexpress.com/wp-content/u...150x87.jpg 150w, https://thecyberexpress.com/wp-content/u...50x435.jpg 750w" sizes="(max-width: 960px) 100vw, 960px" /></p><span style="font-weight: 400;">The ever-evolving landscape of cybersecurity is shaped by a dedicated group of individuals. These pioneers, through their research, entrepreneurship, and tireless efforts, have left a significant mark on the industry. </span>
<span style="font-weight: 400;">From seasoned security leaders steering the helm of major companies, to passionate bloggers, journalists, podcasters, and authors, this diverse group offers a wealth of perspectives on the ever-present fight against cybercrime. </span>
<span style="font-weight: 400;">Veterans with decades of experience share the stage with innovative minds constantly pushing boundaries. Whether it's investigative journalists uncovering cybercrime rings, ethical hackers forging new defensive strategies, or company founders shaping the future of online safety, these influencers are united in a common cause. </span>
<span style="font-weight: 400;">They leverage social media to not only stay updated on the latest threats but also advocate for increased awareness and education. This list compiles the top 30 most influential <a href="https://thecyberexpress.com/social-media-awareness-day-cybersecurity/" target="_blank" rel="noopener">cybersecurity influencers</a> who actively share their expertise online. If you're interested in cybersecurity, following and engaging with these influential figures is a surefire way to stay informed and inspired.</span>
<h2><span style="font-weight: 400;">Top 30 Cybersecurity Influencers of 2024</span></h2>
<h3>30. Alexandre Blanc -<a href="https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/" target="_blank" rel="nofollow noopener"> President and Owner at Alexandre Blanc Cyber</a></h3>
<img class="alignnone wp-image-68501 size-full" src="https://thecyberexpress.com/wp-content/uploads/alexandre-blanc-Cybersecurity-Influencers-of-2024.webp" alt="alexandre blanc cybersecurity influencer " width="541" height="377" />
<span style="font-weight: 400;">Alexandre Blanc is a renowned Cybersecurity dvisor, ISO/IEC 27001 and 27701 Lead Implementer, and a recognised security expert. With a track record of holding successful cybersecurity <a class="wpil_keyword_link" title="events" href="https://thecyberexpress.com/cyber-security-events/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3986">events</a>, Blanc serves as an Independent Strategic and Security Advisor, providing invaluable counsel to various organisations. His expertise spans incident response management, digital transformations, and <a class="wpil_keyword_link" title="dark web" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3984">dark web</a> investigations. </span>
<span style="font-weight: 400;">Recognised as a LinkedIn Top Voice in Technology and named among the top security experts with over 75k followers on LinkedIn, Blanc's insights are highly sought-after in the <a href="https://thecyberexpress.com/cybersecurity-for-civil-society/" target="_blank" rel="noopener">cybersecurity community</a>. Through publications, speaking engagements, and advisory roles, he continues uplift the IT and security industry. </span>
<h3>29. Alissa Abdullah - <a href="https://www.ischool.berkeley.edu/people/alissa-dr-j-abdullah" target="_blank" rel="nofollow noopener">Deputy CSO at Mastercard</a></h3>
<img class="alignnone wp-image-68502 size-full" src="https://thecyberexpress.com/wp-content/uploads/Alissa-Abdullah-Deputy-CSO-at-Mastercard-1.webp" alt="Alissa Abdullah - Deputy CSO at Mastercard Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Alissa Abdullah, PhD, is a distinguished senior information technology and cybersecurity executive with a rich background spanning Fortune 100 companies, the White House, and the government intelligence community. Currently serving as Deputy Chief Security Officer for Mastercard, she brings over 20 years of experience in IT strategy, fiscal management, and leading large government programmes. </span>
<span style="font-weight: 400;">Abdullah's strategic leadership extends beyond her corporate role; she serves as a board member for organisations like Girls in Tech, Inc. and Smartsheet, while also lecturing at the University of California, Berkeley. With a PhD in Information Technology Management, and over 17k followers on LinkedIn, she is a recognised authority in <a href="https://thecyberexpress.com/cybersecurity-concerns-for-openais-gpt-4o/" target="_blank" rel="noopener">cybersecurity</a> and IT leadership. </span>
<h3>29. Jane Frankland -<a href="https://www.legalsecurityforum.com/speakers/jane-frankland/" target="_blank" rel="nofollow noopener"> CEO at KnewStart</a></h3>
<img class="alignnone wp-image-68503 size-full" src="https://thecyberexpress.com/wp-content/uploads/Jane-Frankland-CEO-at-KnewStart-1.webp" alt="Jane Frankland - CEO at KnewStart Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Jane Frankland is a prominent figure in cybersecurity with a career spanning over two decades of experience in the field. As a cybersecurity influencer and LinkedIn Top Voice, she has established herself as an award-winning leader, coach, board advisor, author, and speaker. </span>
<span style="font-weight: 400;">Frankland's expertise lies in bridging the gap between business strategy and technical cybersecurity needs, enabling smoother and more effective engagements. With a portfolio career, she works with major brands as an influencer, leadership coach, and board advisor. Additionally, Frankland is deeply involved in initiatives promoting diversity and inclusion in cybersecurity, aligning her work with the UN Sustainable Development Goals. </span>
<h3>27. Mark Lynd -<a href="https://www.netsync.com/bio/mark-lynd/" target="_blank" rel="nofollow noopener"> Head of Executive Advisory & Corporate Strategy at NETSYNC</a></h3>
<img class="alignnone wp-image-68504 size-full" src="https://thecyberexpress.com/wp-content/uploads/Mark-Lynd-Head-of-Executive-Advisory-Corporate-Strategy-at-NETSYNC-1.webp" alt="Mark Lynd - Head of Executive Advisory & Corporate Strategy at NETSYNC Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Mark Lynd is a globally recognised cybersecurity strategist, and keynote speaker in cybersecurity and AI. With over 25 years of experience, including four stints as a CIO & CISO for global companies, he excels in technology, cybersecurity, and AI. </span>
<span style="font-weight: 400;">Currently, he serves as the Head of Executive Advisory & Corporate Strategy at Netsync, a global technology reseller, where he concentrates on cybersecurity, AI, <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3979">data</a> center, IoT, and digital transformation. Lynd's accolades include being ranked globally for security and AI thought leadership, and he's authored acclaimed books and eBooks. </span>
<span style="font-weight: 400;">He holds a Bachelor of Science from the University of Tulsa and is a proud military veteran. </span>
<h3>26. Naomi Buckwalter -<a href="https://www.sans.org/profiles/naomi-buckwalter/" target="_blank" rel="nofollow noopener"> Director of Product Security at Contrast Security</a></h3>
<img class="alignnone wp-image-68505 size-full" src="https://thecyberexpress.com/wp-content/uploads/Naomi-Buckwalter-Director-of-Product-Security-at-Contrast-Security-1.webp" alt="Naomi Buckwalter - Director of Product Security at Contrast Cybersecurity Influencer" width="541" height="377" />
<span style="font-weight: 400;">Naomi Buckwalter is an accomplished Information Security Leader, Nonprofit Director, Keynote Speaker, and LinkedIn Learning Instructor. </span><span style="font-weight: 400;">With extensive experience in directing information security programmes, she has notably served as Director of Product Security at Contrast Security and Director of Information Security & IT at Beam Dental. Buckwalter's expertise encompasses compliance, <a class="wpil_keyword_link" title="risk management" href="https://thecyberexpress.com/what-is-risk-management/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3987">risk management</a>, and security operations. </span>
<span style="font-weight: 400;">She is also the Founder & Executive Director of the Cybersecurity Gatebreakers Foundation, aiming to revolutionise cybersecurity hiring practices. </span><span style="font-weight: 400;">With a background in computer science and over 99K followers on LinkedIn, she is recognised for her contributions as a cybersecurity thought leader and advocate for diversity in tech. </span>
<h3>25. Raj Samani-<a href="https://globalinitiative.net/profile/raj-samani/" target="_blank" rel="nofollow noopener"> Chief Scientist for Cybersecurity</a></h3>
[caption id="attachment_68506" align="alignnone" width="541"]<img class="wp-image-68506 size-full" src="https://thecyberexpress.com/wp-content/uploads/Raj-Samani-Chief-Scientist-for-Cybersecurity-1.webp" alt="Raj Samani- Chief Scientist for Cybersecurity" width="541" height="377" /> Source: Australian <a class="wpil_keyword_link" title="Cyber" href="https://thecyberexpress.com/cyber-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3989">Cyber</a> Conference 2024[/caption]
<span style="font-weight: 400;">Raj Samani is currently a Chief Scientist at Rapid7 and has experience in this industry spanning 20 years. He has worked with law enforcement and is also advisor to the European Cybercrime Centre. Samani is a sought-after speaker at industry conferences, a published author, and continues to make appearances in podcasts where he discusses his expertise surrounding threat intelligence, cyber defence strategies, and emerging threats. </span>
<span style="font-weight: 400;">With his following of over 15.2k followers on LinkedIn and 14.4k on Twitter, Samani is influential to his followers due to the cybersecurity related articles, updates and insights he shares, often engaging not only cybersecurity enthusiasts but also professionals. </span>
<h3>24. Tyler Cohen Wood-<a href="https://www.darkcryptonite.com/tyler" target="_blank" rel="nofollow noopener"> Co- Founder of Dark Cryptonite</a></h3>
[caption id="attachment_68507" align="alignnone" width="541"]<img class="wp-image-68507 size-full" src="https://thecyberexpress.com/wp-content/uploads/Tyler-Cohen-Wood-cybersecurity-influencer.webp" alt="Tyler Cohen Wood- Co- Founder of Dark Cryptonite" width="541" height="377" /> Source: BankInfoSecurity[/caption]
<span style="font-weight: 400;">Tyler Cohen Wood is a prominent and respected figure in the cybersecurity field. Currently the co-founder of Dark Cryptonite, a Special Comms method of cybersecurity, Woods has over 20 years of experience in the intelligence community. Woods previously served as Senior Intelligence Officer at the Defence Intelligence Agency (DIA) and Cyber Branch Chief at the DIA's Science and Technology Directorate. </span>
<span style="font-weight: 400;">Woods is also a keynote speaker and provides insight into global cyber threats and national security due to her knowledge on digital <a class="wpil_keyword_link" title="privacy" href="https://thecyberexpress.com/what-is-privacy/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3982">privacy</a> and national security. Woods has a following of over 27k on LinkedIn, attention she’s garnered due to her ability to share insightful commentary on <a href="https://thecyberexpress.com/nsa-releases-guidance-ai-security/" target="_blank" rel="noopener">cybersecurity issues</a> which explains complex technical concepts easily for all types of audiences. </span>
<h3>23. Theresa Payton-<a href="https://www.fortalicesolutions.com/authors/trackerpayton" target="_blank" rel="nofollow noopener"> CEO of Fortalice Solutions</a></h3>
[caption id="attachment_68509" align="alignnone" width="541"]<img class="wp-image-68509 size-full" src="https://thecyberexpress.com/wp-content/uploads/Theresa-Payton-CEO-of-Fortalice-Solutions-1.webp" alt="Theresa Payton- CEO of Fortalice Solutions" width="541" height="377" /> Source: Experience McIntire[/caption]
<span style="font-weight: 400;">Theresa Payton was the first ever female Chief Information Officer for the White House from 2006-2008, serving under George W. Bush, and is now the CEO of her company Fortalice Solutions which she founded in 2008.</span>
<span style="font-weight: 400;"> Payton is best known for consulting as that is the purpose of her company, providing services like risk assessments, incident response, and digital forensics to government agencies and different industries and businesses about cybersecurity strategy and best IT practices. </span>
<span style="font-weight: 400;">Payton has over 25k followers on LinkedIn and this is due to her continuous and avid blogging exposing cybercrimes and tackling cybersecurity on her</span><a href="https://www.fortalicesolutions.com/authors/trackerpayton"> <span style="font-weight: 400;">companies page.</span></a>
<h3>22. Bill Brenner-<a href="https://muckrack.com/billbrenner70" target="_blank" rel="nofollow noopener">Vice President, Custom and Research Content Strategy, CyberRisk Alliance </a></h3>
[caption id="attachment_68510" align="alignnone" width="541"]<img class="wp-image-68510 size-full" src="https://thecyberexpress.com/wp-content/uploads/Bill-Brenner-cybersecurity-influencer-1.webp" alt="Bill Brenner-Vice President, Custom and Research Content Strategy, CyberRisk Alliance" width="541" height="377" /> Source: SC Magazine[/caption]
<span style="font-weight: 400;">Bill Brenner is an experienced professional in the cybersecurity field and has ventured into many areas including journalist, editor, and community manager. His work has focused on cybersecurity education and awareness.</span>
<span style="font-weight: 400;"> Brenner is currently the Vice President of Custom and Research Content Strategy at CyberRisk Alliance. Brenners 15.7k followers on Twitter come from his influence surrounding articles posted on CS Media and Techtarget which are informative and relevant to cybersecurity professionals. </span>
<h3>21. Brian Honan-<a href="https://bhconsulting.ie/our-team/#1086b5099958f07b2" target="_blank" rel="nofollow noopener"> CEO of BH Consulting</a></h3>
[caption id="attachment_68511" align="alignnone" width="541"]<img class="wp-image-68511 size-full" src="https://thecyberexpress.com/wp-content/uploads/Brian-Honan-CEO-of-BH-Consulting-1.webp" alt="Brian Honan- CEO of BH Consulting" width="541" height="377" /> Source: BH Consulting[/caption]
<span style="font-weight: 400;">Brian Honan is the CEO of BH Consulting and has over 30 years of experience in cybersecurity. He was formerly a special advisor on <a class="wpil_keyword_link" title="cyber security" href="https://thecyberexpress.com/what-is-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3990">cyber security</a> to Europol’s Cyber Crime Centre, along with being an advisor to the European Union Agency for Network and Information Security. </span>
<span style="font-weight: 400;">Honan’s work in consultancy is not just aimed at government agencies but also multinational corporations, and small businesses. Honan advocates highly for education in the field and is a founding member of the Irish Reporting and Information Security Service (IRISS-CERT). </span>
<span style="font-weight: 400;">His following of 36.2k on Twitter can be attested to the articles and blogs he’s written and posted along with presentations at industry conferences worldwide. </span>
<h3>20. Magda Chelly-<a href="https://www.magda-on-cyber.com/" target="_blank" rel="nofollow noopener"> Senior Cybersecurity Expert</a></h3>
[caption id="attachment_68513" align="alignnone" width="541"]<img class="wp-image-68513 size-full" src="https://thecyberexpress.com/wp-content/uploads/Magda-Chelly-Senior-Cybersecurity-Expert-1.webp" alt="Magda Chelly- Senior Cybersecurity Expert" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Magda Chelly is the first Tunisian woman to be on the advisory board of Blackhat. She has over 10 years of experience in security architecture, risk management, and incident response. Chelly is also a published author and is also known to be a keynote speaker who can deliver her talks in five different languages. </span>
<span style="font-weight: 400;">She is currently the Managing Director at Responsible Cyber where she helps organisations implement effective cybersecurity strategies, while also being the founder of Women of Security (WoSEC) Singapore which aims to encourage women to join the field of cybersecurity. </span>
<span style="font-weight: 400;">Chelly has over 57k followers on LinkedIn due to her posts on cybersecurity, but also her diversity initiatives which make her an advocate in the field. </span>
<h3>19. Marcus J. Carey- <a href="https://theorg.com/org/reliaquest/org-chart/marcus-j-carey" target="_blank" rel="nofollow noopener">Principal Research Scientist at ReliaQuest, CEO of ThreatCare</a></h3>
[caption id="attachment_68514" align="alignnone" width="541"]<img class="wp-image-68514 size-full" src="https://thecyberexpress.com/wp-content/uploads/Marcus-J.-Carey-Principal-Research-Scientist-at-ReliaQuest-CEO-of-ThreatCare-1.webp" alt="Marcus J. Carey- Principal Research Scientist at ReliaQuest, CEO of ThreatCare" width="541" height="377" /> Source: Facebook[/caption]
<span style="font-weight: 400;">Marcus J Carey is a former Navy Cryptologist who is now in cybersecurity innovation. He has worked many roles including penetration tester, security researcher, and security <a class="wpil_keyword_link" title="engineer" href="https://thecyberexpress.com/how-to-become-a-cyber-security-engineer/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3981">engineer</a>, all of which helped to gain new and revolutionary insights into offensive and defensive cybersecurity techniques. </span>
<span style="font-weight: 400;">Carey is famous for the books he has written surrounding <a href="https://thecyberexpress.com/tce-cyberwatch-weekly-round-up-3/" target="_blank" rel="noopener">hackers and cybersecurity</a> and is an established CEO of Threatcare, a cybersecurity company focused on providing proactive threat detection and risk assessment solutions. </span>
<span style="font-weight: 400;">His 52.4k Twitter followers stem from the expertise he shares on social media and his importance in educating future professionals in the field. He is also sought after for speaking in industry conferences. </span>
<h3>18. Andy Greenberg- <a href="https://www.wired.com/author/andy-greenberg/" target="_blank" rel="nofollow noopener">Senior Writer at </a><a href="https://www.wired.com/author/andy-greenberg/">WIRED</a></h3>
[caption id="attachment_68515" align="alignnone" width="541"]<img class="wp-image-68515 size-full" src="https://thecyberexpress.com/wp-content/uploads/Andy-Greenberg-Senior-Writer-at-WIRED-1.webp" alt="Andy Greenberg- Senior Writer at WIRED" width="541" height="377" /> Source: Penguin Random House[/caption]
<span style="font-weight: 400;">Andy Greenberg is currently a senior writer at Wired magazine, and has written many articles investigating high-profile cyber incidents, <a class="wpil_keyword_link" title="hacking" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3985">hacking</a> groups, and emerging cybersecurity threats. </span>
<span style="font-weight: 400;">Greenberg's reports often focus on the details of cyberattacks and looks at the broader implications for people, the government, and the industry as a whole. </span>
<span style="font-weight: 400;">His 70.4k followers on </span><span style="font-weight: 400;">Twitter</span><span style="font-weight: 400;"> are influenced by his updates and in-depth articles exploring the world of cybersecurity, not only informing the general public but also professionals about the hazards. </span>
<h3>17. Paul Asadoorian<a href="https://securitypodcaster.com/" target="_blank" rel="nofollow noopener">- IT Security Engineer</a></h3>
[caption id="attachment_68516" align="alignnone" width="541"]<img class="wp-image-68516 size-full" src="https://thecyberexpress.com/wp-content/uploads/Paul-Asadoorian-IT-Security-Engineer-1.webp" alt="Paul Asadoorian- IT Security Engineer" width="541" height="377" /> Source: SC Magazine[/caption]
<span style="font-weight: 400;">Paul Asadoorian is a professional in the cybersecurity field for over 20 years, but his following comes from his blogs and podcasts. He’s best known as the founder and host of Security Weekly where Asadoorian brings together experts and practitioners from the cybersecurity field to discuss latest news and research in the field such as <a class="wpil_keyword_link" title="network security" href="https://thecyberexpress.com/what-is-network-security/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3991">network security</a>, application security, incident response, etc. </span>
<span style="font-weight: 400;">Additionally, he is also the founder and CEO of Offensive Countermeasures, a company that helps cybersecurity professionals enhance their skills and stay ahead of evolving threats. </span><span style="font-weight: 400;">His 77.3k followers on Twitter are mostly due to his large social media presence as a podcaster and his posts surrounding resources , opinions, and promotion of Security Weekly. </span>
<h3>16. Nicole Perlroth- <a href="https://www.nytimes.com/by/nicole-perlroth" target="_blank" rel="nofollow noopener">New York Times</a></h3>
[caption id="attachment_68518" align="alignnone" width="541"]<img class="wp-image-68518 size-full" src="https://thecyberexpress.com/wp-content/uploads/Nicole-Perlroth-New-York-Times-1.webp" alt="Nicole Perlroth- New York Times" width="541" height="377" /> Source:[/caption]
<span style="font-weight: 400;">Nicole Perlroth is a Pulitzer Prize-winning journalist who covers cybersecurity and digital espionage for The New York Times. She is regarded for her intensive reporting on cyber threats, hacking incidents, and the intersection of technology and national security. </span>
<span style="font-weight: 400;">Perlroth has also written a </span><span style="font-weight: 400;">book</span><span style="font-weight: 400;"> on the cyberweapons arms race. With 91.5k followers on Twitter, Perlroth shares her own articles, as well as insights and updates related to cybersecurity and technology which creates engagement for her from both cybersecurity professionals and general readers interested in security. </span>
<h3>15. Graham Cluley-<a href="https://www.smashingsecurity.com/" target="_blank" rel="nofollow noopener"> Smashing Security</a></h3>
[caption id="attachment_67630" align="alignnone" width="523"]<img class="wp-image-67630" src="https://thecyberexpress.com/wp-content/uploads/Graham-Cluley-Smashing-Security.webp" alt="Graham Cluley- Smashing Security" width="523" height="523" /> Source: Smashing Security[/caption]
<span style="font-weight: 400;">Graham Cluley is an author and blogger who has written books on cybersecurity and continues to be avid in sharing news and stories on cybersecurity through the written word and speech. Currently, Graham Cluley is an independent cybersecurity analyst, writer, and public speaker. </span>
<span style="font-weight: 400;">He also runs a</span><a href="https://www.smashingsecurity.com/" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">podcast</span></a><span style="font-weight: 400;"> where he discusses internet threats and safety in an entertaining, engaging and informative way. Cluley’s 112.9k Twitter followers are updated with his podcast, tweets and YouTube videos which explain cybersecurity topics and how to tackle them in a way patented to the general users of the internet. </span>
<h3><span style="font-weight: 400;">14. Rachel Tobac-</span><a href="https://www.socialproofsecurity.com/" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">Hacker and CEO of SocialProof Security</span></a><span style="font-weight: 400;"> </span></h3>
[caption id="attachment_68522" align="alignnone" width="541"]<img class="wp-image-68522 size-full" src="https://thecyberexpress.com/wp-content/uploads/Rachel-Tobac-Hacker-and-CEO-of-SocialProof-Security╤A.webp" alt="Rachel Tobac- Hacker and CEO of SocialProof Security " width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Rachel Tobac is an ethical <a class="wpil_keyword_link" title="hacker" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3980">hacker</a> who helps companies keep safe through her work as CEO of SocialProof Security, which she co-founded. The company focuses on educating employees to recognize and deal with cyberattacks. She has a background in behavioural psychology and uses it to improve <a href="https://thecyberexpress.com/embracing-cybersecurity-awareness-month/" target="_blank" rel="noopener">cybersecurity awareness</a> and defences in the general public. </span>
<span style="font-weight: 400;">Tobac also works with the non-profit Women in Security and Privacy (WISP) where she helps women advance in the security field and often speaks for underrepresented groups to pursue a career in cybersecurity. Tobac’s 106k strong following on Twitter is due to her activism and due to the tips and updates she shares related to the industry, with some posts being popular for starting debates amongst professionals. </span>
<h3>13. Katie Moussouris- <a href="https://www.forbes.com/profile/katie-moussouris/" target="_blank" rel="nofollow noopener">Founder of Luta Security</a></h3>
[caption id="attachment_68523" align="alignnone" width="541"]<img class="wp-image-68523 size-full" src="https://thecyberexpress.com/wp-content/uploads/Katie-Moussouris-Founder-of-Luta-Security-1.webp" alt="Katie Moussouris- Founder of Luta Security" width="541" height="377" /> Source: SANS Cyber Security Certifications & Research[/caption]
<span style="font-weight: 400;">Katie Moussouris is the Founder of Luta Security which encompasses her aims surrounding vulnerability disclosure and safer and responsible research in security. She is a leading figure in both the aspects and has 20 years of experience on the field. Some of Moussouris’s leading work is the Microsoft's bug bounty programme, which she developed and was one of the first-of-its-kind in the industry. </span>
<span style="font-weight: 400;">She also advocates for vulnerability disclosure, which merits more transparency between security researchers and organisations. Moussouris’s 115.5k followers come from her revolutionary developments. She is a frequent speaker at cybersecurity conferences and events. She often posts and talks about her advocacy for <a class="wpil_keyword_link" title="ethical hacking" href="https://thecyberexpress.com/what-is-ethical-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3988">ethical hacking</a> and responsible security practices along with her expertise on vulnerability disclosure and bug bounty programmes. </span>
<h3>12. Chuck Brooks- <a href="https://www.brooksci.com/aboutus" target="_blank" rel="nofollow noopener">President of Brooks Consulting International </a></h3>
[caption id="attachment_68524" align="alignnone" width="541"]<img class="wp-image-68524 size-full" src="https://thecyberexpress.com/wp-content/uploads/Chuck-Brooks-President-of-Brooks-Consulting-International╤A.webp" alt="Chuck Brooks- President of Brooks Consulting International " width="541" height="377" /> Source: The Official Cybersecurity Summit[/caption]
<span style="font-weight: 400;">Brooks is the president of his consulting company where he advises clients on cybersecurity strategy, risk assessment, and business development. Along with that, he is a featured author in many technology and cybersecurity blogs.</span>
<span style="font-weight: 400;"> Brooks has previously worked in advisory roles with corporations and also at government agencies, including the Department of Homeland Security and the Defence Intelligence Agency. </span>
<span style="font-weight: 400;">Brooks’ 116k LinkedIn followers are due to his regular contributions to industry research and news, media articles. Along with that, he is a popular keynote speaker who shares his expertise on a wide range of cybersecurity topics. </span>
<h3>11. Daniel Miessler- <a href="https://github.com/danielmiessler" target="_blank" rel="nofollow noopener">Founder of Unsupervised Learning</a></h3>
[caption id="attachment_68525" align="alignnone" width="541"]<img class="wp-image-68525 size-full" src="https://thecyberexpress.com/wp-content/uploads/Daniel-Miessler-Founder-of-Unsupervised-Learning-1.webp" alt="Daniel Miessler- Founder of Unsupervised Learning" width="541" height="377" /> Source: The Official Cybersecurity Summit[/caption]
<span style="font-weight: 400;">Miessler is the founder and CEO of Unsupervised Learning where he writes informative articles and tackles relevant issues surrounding cybersecurity and what the world after AI means for human beings. </span>
<span style="font-weight: 400;">Miesslers following of 139.4k on Twitter comes from professionals in the field and novice enthusiasts engaging with his content and discussions due to his experience in the field. He also avidly shares articles, podcasts, bringing his audience up to speed with cybersecurity. </span>
<h3>10. Kevin Beaumont-<a href="https://doublepulsar.com/" target="_blank" rel="nofollow noopener"> Internet Cyber Personality</a></h3>
[caption id="attachment_68526" align="alignnone" width="541"]<img class="wp-image-68526 size-full" src="https://thecyberexpress.com/wp-content/uploads/Kevin-Beaumont-Internet-Cyber-Personality.webp" alt="Kevin Beaumont- Internet Cyber Personality" width="541" height="377" /> Source: iTWire[/caption]
<span style="font-weight: 400;">Kevin Beaumont is an experienced professional who has worked in various cybersecurity roles, including security engineer and consultant. He also specialises in threat detection and incident response. Kevin is now the Head of Cybersecurity Operations at Arcadia Ltd. along with being a cybersecurity researcher who runs his own platform where he discusses cybersecurity. </span>
<span style="font-weight: 400;">Beaumont appeals to newer, younger cybersecurity enthusiasts with around 150.9k followers on Twitter due to his engagement with trolling on the internet. Additionally, he writes articles for</span><a href="https://medium.com/@networksecurity" target="_blank" rel="nofollow noopener"> <span style="font-weight: 400;">Medium</span></a><span style="font-weight: 400;"> where he informs about cybercrime issues such as Microsoft Windows vulnerability. </span>
<h3>9. Lesley Carhart- <a href="https://en.wikipedia.org/wiki/Lesley_Carhart" target="_blank" rel="nofollow noopener">hacks4pancakes</a></h3>
[caption id="attachment_68527" align="alignnone" width="541"]<img class="wp-image-68527 size-full" src="https://thecyberexpress.com/wp-content/uploads/Lesley-Carhart-hacks4pancakes-1.webp" alt="Lesley Carhart- hacks4pancakes" width="541" height="377" /> Source: hacks4pancakes[/caption]
<span style="font-weight: 400;">Lesley Carhart is currently a threat analyst and principal responder at Dragos, a company which works to protect industrial control systems from cyber threats, and has experience as a security analyst, incident responder and threat hunter. </span>
<span style="font-weight: 400;">Her work in both the public and private sectors allowed her to gain valuable insights into cybersecurity issues across different industries. </span><span style="font-weight: 400;">Her following of 168k comes from her works such as blogger and speaker who offers career advice in the field of cybersecurity. She also speaks about topics such as industrial control, <a href="https://thecyberexpress.com/20-of-hive-victims-in-the-us-reported-attacks/" target="_blank" rel="noopener">ransomware attacks</a> and more. </span>
<h3>8. Bruce Schneier- <a href="https://www.schneier.com/" target="_blank" rel="nofollow noopener">Schneier on Security</a></h3>
[caption id="attachment_68528" align="alignnone" width="541"]<img class="wp-image-68528 size-full" src="https://thecyberexpress.com/wp-content/uploads/Bruce-Schneier-Schneier-on-Security.webp" alt="Bruce Schneier- Schneier on Security" width="541" height="377" /> Source: Wikipedia[/caption]
<span style="font-weight: 400;">Schneier is a specialist in computer security and privacy along with being a cryptographer. Schneier is regarded as one of the most influential people in his field of cryptography and has written numerous books on cybersecurity, some of which are considered seminal works in the field. </span>
<span style="font-weight: 400;">He has also written articles about security and privacy for magazines such as Wired. Schneier’s following of 147.1k comes from being acknowledged as impactful in his field but also due to his blog where he addresses the prevalence of hacking and other cyber dangers intersecting with our everyday lives. </span>
<h3>7. Eugene Kaspersky- <a href="https://www.kaspersky.com/about/team/eugene-kaspersky" target="_blank" rel="nofollow noopener">CEO of Kaspersky Lab</a></h3>
[caption id="attachment_68530" align="alignnone" width="541"]<img class="wp-image-68530 size-full" src="https://thecyberexpress.com/wp-content/uploads/Eugene-Kaspersky-CEO-of-Kaspersky-Lab-1.webp" alt="Eugene Kaspersky- CEO of Kaspersky Lab" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Eugene Kaspersky is an individual most impactful in the cybersecurity, best known as the CEO of Kaspersky Lab, a company he co-founded in 1997 which identified government-sponsored cyberwarfare. Kaspersky’s following of 187.5k comes from how Kaspersky Lab has grown into a global cybersecurity powerhouse, offering a wide range of products and services, along with his advocacy for <a href="https://thecyberexpress.com/enhanced-cybersecurity-education/" target="_blank" rel="noopener">cybersecurity education</a>. </span>
<span style="font-weight: 400;">Kaspersky is also a keynote speaker on emerging threats, and the importance of cybersecurity awareness at industry conferences and events. Furthermore, he writes a </span><span style="font-weight: 400;">blog</span><span style="font-weight: 400;"> where he regularly posts updates about his life in the industry. </span>
<h3>6. Eric Geller -<a href="https://www.linkedin.com/in/ericjgeller/" target="_blank" rel="nofollow noopener"> Cybersecurity Journalist</a></h3>
[caption id="attachment_68532" align="alignnone" width="541"]<img class="wp-image-68532 size-full" src="https://thecyberexpress.com/wp-content/uploads/Eric-Geller-Cybersecurity-Journalist-1.webp" alt="Eric Geller - Cybersecurity Journalist" width="541" height="377" /> Source: LinkedIn[/caption]
<span style="font-weight: 400;">Eric Geller is a freelance cybersecurity journalist recognised for his insightful coverage of digital security. With a comprehensive portfolio including esteemed publications like WIRED, Politico, and The Daily Dot, Geller offers in-depth analysis on cyber policy, encryption, and <a href="https://thecyberexpress.com/top-10-data-breaches-in-india-cybercrime/" target="_blank" rel="noopener">data breaches</a>. </span>
<span style="font-weight: 400;">His investigative reporting touches the intricate intersections of cybersecurity and everyday life, from election security to critical infrastructure protection. Geller's expertise extends to interviews with top officials and breaking news on government initiatives. With a Bachelor of Arts in Political Science from Kenyon College, Geller's accolades include induction into the Pi Sigma Alpha national political science Honors society. </span>
<h3>5. Shira Rubinoff- <a href="https://futurumgroup.com/leadership-team/shira-rubinoff/" target="_blank" rel="nofollow noopener">The Futurum Group </a></h3>
[caption id="attachment_68533" align="alignnone" width="541"]<img class="wp-image-68533 size-full" src="https://thecyberexpress.com/wp-content/uploads/Shira-Rubinoff-cybersecurity-influencer-1.webp" alt="Shira Rubinoff- The Futurum Group " width="541" height="377" /> Source: The Futurum Group[/caption]
<span style="font-weight: 400;">Shira Rubinoff is a cybersecurity and blockchain advisor as well as being a popular keynote speaker and author. She is the President of SecureMySocial, a cybersecurity company that focuses on protecting organizations from social media <a class="wpil_keyword_link" title="risks" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3983">risks</a> such as data leakage, reputational damage, and insider threats. Her videos are many and impactful, consisting of interviews and conversations with other professionals. </span>
<span style="font-weight: 400;">She is known to be one of the top businesswomen in the field and currently runs a cybersecurity consulting firm and serves as the Chair of the Women in Cybersecurity Council (WCI), aiming to influence more women to join the field. Her follower count of 190.4k isn’t only due to her experience as a businesswoman, but also her constant interaction on social media as she posts talks, videos, podcasts, written work and more about many topics in cybersecurity. </span>
<h3>4. Mikko Hyppönen- <a href="https://www.withsecure.com/en/expertise/people/mikko-hypponen" target="_blank" rel="nofollow noopener">Chief Research Officer at WithSecure </a></h3>
[caption id="attachment_68535" align="alignnone" width="541"]<img class="wp-image-68535 size-full" src="https://thecyberexpress.com/wp-content/uploads/Mikko-HyppΓC¥nen-Chief-Research-Officer-at-WithSecure╦O.webp" alt="Mikko Hyppönen- Chief Research Officer at WithSecure " width="541" height="377" /> Source: WithSecure[/caption]
<span style="font-weight: 400;">Miko Hyppönen has been in the world of cybersecurity since the late 1980s. Since then he has led researchers in identifying and eliminating emerging cyber threats, while providing insights and solutions to protect individuals, businesses, and governments from cybercrime. </span>
<span style="font-weight: 400;">Hyppönen has written for many famous newspapers like the New York Times and has also appeared on international TV and lectured at universities like Oxford and Cambridge. His 230.5k followers is due to his engaging and informative presentations, which help raise awareness about cybersecurity threats. </span>
<span style="font-weight: 400;">He also has a following for his blog posts and research papers detailing his expertise. </span>
<h3>3. Kim Zetter - <a href="https://en.wikipedia.org/wiki/Kim_Zetter" target="_blank" rel="nofollow noopener">Investigative Journalist and Book Author</a></h3>
[caption id="attachment_68536" align="alignnone" width="541"]<img class="wp-image-68536 size-full" src="https://thecyberexpress.com/wp-content/uploads/Kim-Zetter-Investigative-Journalist-and-Book-Author-1.webp" alt="Kim Zetter - Investigative Journalist and Book Author" width="541" height="377" /> Source: IMDb[/caption]
<span style="font-weight: 400;">Kim Zetter is an award-winning investigative journalist renowned for her expertise in cybersecurity and national security. With a distinguished career spanning publications like WIRED, Politico, and The New York Times Magazine, Zetter is a respected authority on topics ranging from election security to cyber warfare. </span>
<span style="font-weight: 400;">Her book, "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon," offers a gripping narrative of covert cyber operations. As a sought-after speaker and <a href="https://thecyberexpress.com/scalper-bots-users-are-buying-via-social-media/" target="_blank" rel="noopener">social media</a> personality with over 7K followers on LinkedIn, she shares insights at conferences worldwide. Zetter's relentless pursuit of truth has earned her acclaim and established her as a leading voice in the cybersecurity journalism. </span>
<h3>2. Brian Krebs-<a href="https://krebsonsecurity.com/"> Krebs on Security</a></h3>
[caption id="attachment_68537" align="alignnone" width="541"]<img class="wp-image-68537 size-full" src="https://thecyberexpress.com/wp-content/uploads/Brian-Krebs-Krebs-on-Security-1.webp" alt="Brian Krebs- Krebs on Security" width="541" height="377" /> Source: Keppler Speakers[/caption]
<span style="font-weight: 400;">Brian Krebs is an investigative journalist who wrote for The Washington post from 1995 to 2009 for the security fix blog. He now runs his own blog, Krebs on Security. In it, he provides in-depth analysis and reports, along with promptly posted breaking news on cybercrime, hacking, data breaches, etc. </span>
<span style="font-weight: 400;">Krebs has received many awards for his investigative journalism, including the Pulitzer Prize finalist for his coverage of cybersecurity problems. Krebs’ 347.9k are due to the reputation his blog widely holds for being a first choice when looking for accurate, fast information, as well as the truth as he’s known to hold individuals and organisations accountable for in his work. </span>
<h3>1. Robert Herjavec-<a href="https://robertherjavec.com/"> CEO of Global Cybersecurity Firm - Cyderes</a></h3>
[caption id="attachment_68538" align="alignnone" width="541"]<img class="wp-image-68538 size-full" src="https://thecyberexpress.com/wp-content/uploads/Robert-Herjavec-CEO-of-Global-Cybersecurity-Firm-Cyderes-1.webp" alt="Robert Herjavec- CEO of Global Cybersecurity Firm - Cyderes" width="541" height="377" /> Source: Cyderes[/caption]
<span style="font-weight: 400;">Herjavec is the CEO of the Herjavec Group and the Global Cybersecurity Firm, Cyderes, which leads cybersecurity options and supports many security services including threat detection and response, identity and access management, and compliance solutions. Along with that, he features on BBC’s Shark Tank and also provides motivational business advice through his books and videos. </span>
<span style="font-weight: 400;">His following of 2.2 million may be due to his appearance on the show, but he continues to actively post insights and gives commentary on cybersecurity trends and ever-changing threats. Most of his followers are there to witness what he shares on business and entrepreneurship. Herjavec frequently shares cybersecurity related articles and updates. </span>
<em><span style="color: #ff0000;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></em>
https://thecyberexpress.com/top-cybersec...fluencers/