Top Chief Security Officers (CSOs) to Follow on Twitter
Since we published the list of top charity CEOs, advertising executives, influential chief executive officers (CEOs,) venture capitalists, chief marketing officers (CMOs,) and chief information officers (CIOs) the role of the Chief Security Officer (CSO) in developing and implementing security processes that minimize risk in an increasingly unpredictable digital environment has become even more vital. Here is the list of the Top 100 Most Social Chief Security Officers (CSOs). Feel free to follow each security executives individually.
For the alert security executive, catastrophe might be around every corner. Getting that useful information timely fashion can help identify and assess key risks. Senior risk managers who want to be one step ahead of disaster may want to look into this list.
So here you have it: a list of top chief security officers (CSOs), chief information security officers (CISOs), security executives, and experts to follow on Twitter.
Top Information Security Executives and Experts to Follow on Twitter
1. Eugene Kaspersky, Chairman and Chief Executive Officer of Kaspersky Lab. You can follow Eugene Kaspersky on Twitter @e_kaspersky.
2. Alex Stamos, the world-renowned cybersecurity expert and chief information security officer at Yahoo!, known for his authoritative expertise in cloud computing, web, mobile and network applications security. You can follow Alex Stamos on Twitter @alexstamos.
3. Andy Ellis, Chief Security Officer of Akamai Technologies, responsible for overseeing the security architecture and compliance of the company’s massive, globally distributed network. You can follow Andy Ellis on Twitter @csoandy.
4. Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike, leading Intelligence, Research and Engineering teams. A renowned computer security researcher, Alperovitch is a thought-leader on cybersecurity policies and state tradecraft. CrowdStrike is a global provider of security technologies and services focused on identifying advanced threats and targeted attacks. You can follow Dmitri Alperovitch on Twitter @DmitriCyber.
5. David Ulevitch, the Founder and Chief Executive Officer of OpenDNS. You can follow David Ulevitch on Twitter @davidu.
6. Shawn Henry, President, Services Division, and Chief Security Officer, lead an expert teams of responders to investigate breaches of computer networks, primarily those orchestrated through targeted attacks. You can follow Shawn Henry on Twitter @Shawn365Henry.
7. Katie Moussouris, Senior Security Strategist Lead at Microsoft. You can follow Katie Moussouris on Twitter @k8em0.
8. Brian Krebs, an independent technology reporter and cybersecurity blogger who writes at KrebsOnSecurity.com and a former reporter at The Washington Post. You can follow Brian Krebs on Twitter @briankrebs.
9. Rebecca Herold, has been providing information privacy, security and compliance services, tools and products to organizations in a wide range of industries for over two decades. Rebecca is a widely recognized and respected information security, privacy and compliance expert. You can follow Rebecca Herold on Twitter @PrivacyProf.
10. Eddie Schwartz, Vice President, Global Security Solutions, Verizon, he has over 25 Years of I/T and Security Technology Management Experience. You can follow Eddie Schwartz on Twitter @eddieschwartz.
11. Theresa Payton, founder of Fortalice. You can follow Theresa Payton on Twitter @FortaliceLLC.
12. Alex Hutton, Director of Operations Risk and Governance . Hutton was previously employed by Verizon where he worked on modeling risk and contributed to the Verizon Data Breach Investigations Report. With a background in finance and many years working in information security, he is a well-respected thought leader in regards to information security, risk management and security metrics. You can follow Alex Hutton on Twitter @alexhutton.
13. Jennifer Leggio, Senior Director, Security Strategy & Portfolio Marketing at Cisco. Oversee security go-to-market strategy, messaging and content development, thought leadership, planning and operations to support market awareness and business goals for Cisco’s Security Business Group You can follow Jennifer Leggio on Twitter @mediaphyter.
14. Joshua Corman, chief technology officer at security vendor Sonatype. Prior to Sonatype, Corman served as a security researcher and executive at Akamai Technologies, The 451 Group, and IBM Internet Security Systems, among other firms. A well-regarded innovator, he co-founded Rugged Software and IamTheCavalry to encourage the development of new cyber security solutions in response to the world’s increasing reliance on digital infrastructure. You can follow Joshua Corman on Twitter @joshcorman.
15. Richard Bejtlich, chief security strategist at FireEye. FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. You can follow Richard Bejtlich on Twitter @taosecurity.
16. Thomas Stamulis, Regional Director, East and Central US, Verizon Security Services, works collaboratively with C-Level executives to identify high-risk processes and develop appropriate mitigation controls in a timely and cost effective manner. You can follow Thomas Stamulis on Twitter @SecureTom.
17. Andrew Hay, the Research Lead & Evangelist at OpenDNS, the world’s largest Internet-wide security network used by more than 50 million people to connect to the Internet. You can follow Andrew Hay on Twitter @andrewsmhay.
18. Runa A. Sandvik, a privacy and security researcher, working at the intersection of technology, law and policy. She is a Staff Technologist at the Center for Democracy and Technology in Washington, D.C., a Forbes contributor, and a technical advisor to both the Freedom of the Press Foundation and the TrueCrypt Audit project. Prior to joining CDT, she worked with The Tor Project for four years You can follow Runa A. Sandvik on Twitter @runasand.
19. Brian Honan, an industry expert on information security providing consulting services to clients in various industry segments. His work also includes advising various Government security agencies and the European Commission on matters relating to information security. You can follow Brian Honan on Twitter @BrianHonan.
20. Jeremiah Grossman, the Founder and Interim Chief Executive Officer of WhiteHat Security, a well-known security expert and industry veteran. WhiteHat Security is the leading provider of website risk management solutions. You can follow Jeremiah Grossman on Twitter @jeremiahg.
21. Georgia Weidman, the Founder and CEO of Bulb Security, LLC, a security consulting and research firm. You can follow Georgia Weidman on Twitter @georgiaweidman.
22. Rich Mogull, Analyst & CEO at Securosis. He specializes in data security, application security, emerging security technologies, and security management. You can follow Rich Mogull on Twitter @rmogull.
23. Michael Dahn, Head of Data Security Relations at Square. Michael is an information security and organizational design strategist responsible for the management of data strategies, project engagements, and cost modeling. You can follow Michael Dahn on Twitter @MikD.
24. Mikko Hyppönen, the Chief Research Officer for F-Secure, computer security expert and columnist.F-Secure is the global leader in providing security as a service through operators. You can follow Mikko Hypponen on Twitter @mikko.
25. Adam Ely, the Founder and COO of Bluebox. Prior to this role, Adam was the CISO of the Heroku business unit at Salesforce where he was responsible for application security, security operations, compliance, and external security relations. You can follow Adam Ely on Twitter @adamely.
26. Nicolas Brulez, Principal Security Researcher, Global Research and Analysis Team at Kaspersky Lab. You can follow Nicolas Brulez on Twitter @nicolasbrulez.
27. Mike Murray, Director, Cyber Security Assessment and Consulting at GE Healthcare, responsible for cyber security and privacy assessment and architecture services for GE Healthcare’s global product portfolio.You can follow Mike Murray on Twitter @mmurray.
28. Alison Gianotto, a well known IT security researcher and privacy expert, former chief technology officer / corporate security officer of noise, a leading creative agency that invents new ways to engage the Millennial market. You can follow Alison Gianotto on Twitter @snipeyhead.
29. Andrew Jaquith, Chief Technology Officer and SVP, Cloud Strategy at SilverSky, the expert provider of cloud security solutions. The industry’s only advanced Security-as-a-Service platform from the cloud, dramatically simplifying how growth-minded companies secure their most important information. You can follow Andrew Jaquith on Twitter @arj.
30. Benjamin Tomhave, Research Director, Gartner, a recognized and respected leader in the security community. Benjamin is a published author and experienced public speaker with a broad background in information security, ranging from small to larger enterprises, and covering a variety of topics such as policy development and enforcement, risk assessment and management, compliance management and remediation, strategic security planning, and security program development and management. You can follow Benjamin Tomhave on Twitter @falconsview.
31. Bob Rudis, expert on Information Security & Risk Management. You can follow Bob Rudis on Twitter @hrbrmstr.
32. Chris Wysopal, co-founder and chief technology officer of Veracode, is responsible for the security analysis capabilities of Veracode technology. You can follow Chris Wysopal on Twitter @WeldPond.
33. Graham Cluley, independent computer security analyst. You can follow Graham Cluley on Twitter @gcluley.
34. Chris Hoff, Vice President of Strategic Planning in the Security Business Unit at Juniper Networks after serving as Chief Security Architect. You can follow Chris Hoff on Twitter @Beaker.
35. Martin McKeay, a well seasoned professional dedicated to spreading awareness about security and privacy and the security evangelist for Akamai. You can follow Martin McKeay on Twitter @mckeay.
36. Michael D. Peters, an independent information security consultant, executive, researcher, author, and catalyst with many years of information technology and business leadership experience. You can follow Michael D. Peters on Twitter @MichaelDPeters.
37. Eric Baize, Senior Director, Product Security Office, EMC Corporation. You can follow Eric Baize on Twitter @ericbaize.
38. E.J. Hilbert, the head of cyber investigations at Kroll EMEA, where he leads a team of cyber professionals dedicated to addressing clients’ cyber security and investigative needs. You can follow E.J. Hilbert on Twitter @ejhilbert.
39. Aaron Portnoy, Co-Founder and Vice President at Exodus Intelligence. You can follow Aaron Portnoy on Twitter @aaronportnoy.
40. Aleks Gostev, Chief Security Expert at Kaspersky Lab. You can follow Aleks Gostev on Twitter @codelancer.
41. Neira Jones, Independent Advisor, International Speaker, Chairman Global Advisory Board at CSCSS, Chairman Advisory Board at Ensygnia. You can follow Neira Jones on Twitter @neirajones.
42. Eleanor Dallaway, Editor of Infosecurity Magazine. You can follow Eleanor Dallaway on Twitter @InfosecEditor.
43. Jennifer J. Minella, an infrastructure security consultant with Carolina Advanced Digital, Inc. You can follow Jennifer on Twitter @jjx.
44. Lisa Hall, Information Security at Twilio, Inc. You can follow Lisa Hall on Twitter @Lisa_H_.
45. Gal Shpantzer, Information security and risk management advisor. You can follow Gal Shpantzer on Twitter @Shpantzer.
46. Nick Sullivan, Security architect and security engineering lead at cloud security innovator CloudFlare. He is a respected security expert, writer and popular speaker.You can follow Nick Sullivan on Twitter @grittygrease.
47. Josh Goldfarb, chief security officer of nPulse Technologies, an experienced cyber security analyst with over a decade of experience building, operating, and running Security Operations Centers (SOCs). You can follow Josh Goldfarb on Twitter @ananalytical.
48. David Mortman, Chief Security Architect for enStratus. Most recently, he was the Director of Security and Operations at C3, LLC. Previously, David was the CISO at Siebel Systems, Inc. and the Manager of Global Security at Network Associates. You can follow David Mortman on Twitter @mortman.
49. Phil Cracknell, Head of Security & Privacy Services at Company85, widely regarded as one of the top information security specialists in Europe. You can follow Phil Cracknell on Twitter @pcracknell.
50. Phil Agcaoili, Chief Information Security Officer (CISO) at Elavon, Inc. a U.S. Bank. Agcaoili is the former CISO of Cox Communications, VeriSign, and SecureIT, and has led security teams at Dell, Scientific-Atlanta, Cisco, Alcatel, and GE. He’s shaped US cybersecurity by influencing the NIST Cybersecurity Framework and the Communications ISAC, and as a committee co-chair of the Communications Sector Coordinating Council (CSCC) and FCC CSRIC. He is also a Distinguished Fellow and the Chairman of the Ponemon Institute Fellows. You can follow philA on Twitter @hacksec.
Who should be on this list that we didn’t even consider?
Latest posts by Dr. Amarendra Bhushan Dhiraj
- The World’s Biggest Oil Consuming Countries - November 13, 2018
- Top 30 Colleges That Produced The Most Fortune 500 CEOs - November 12, 2018
- World’s Top 10 Countries With The Most Ultra-High Net Worth Individuals, 2018 - November 9, 2018