Cybersecurity Ventures contributors. PHOTO: Cybercrime Magazine.

Contributors

CYBERSECURITY INDUSTRY THOUGHT LEADERS

Cybersecurity Ventures enjoys relationships with a global network of subject matter experts and thought leaders with deep domain experience in the cybersecurity industry. Our Contributors share insights and commentary, and participate at varying levels in our reports and media.

  • Scott Schober, Author of the book Hacked Again, is Chief Media Commentator for Cybersecurity Ventures, our Official Event Speaker, and our Video Host
  • Bob Ackerman, Fortune 100 Cybersecurity Executive, is co-author of “Why the Hub of U.S. Cybersecurity – the D.C. Beltway – Produces So Few Commercial Cyber Startups,” a special report
  • David Balaban, Editor at PC Privacy, has contributed several ransomware blogs for us over the past year
  • Joseph Carson, Chief Security Scientist at Thycotic, has co-written and contributed to reports on privileged access management (PAM) and password management
  • Brad Casey, Technology Journalist, has written numerous blogs for us on DDoS attacks, IoT crime, and other cybersecurity topics


  • Eric Cole, Director of Research; Architecture Director of Cyber Defense Curriculum at SANS Institute, is publishing a new blog featuring cybersecurity webcasts for organizations of all types and sizes
  • Anita D’Amico, Director at Secure Decisions and Former Founder and Head of the Information Warfare Team at Northrop Grumman, is the author of our 2018 Cyberwarfare report, and a frequent contributor of cybersecurity insights
  • John Dunn, Security Journalist, Former Co-Founder at Techworld and Computerworld UK, contributes periodic blogs and reports covering cybersecurity in the UK
  • Di Freeze, researcher, has contributed on a variety of our cybersecurity community directories and special projects
  • Mark Goodman, Chair for Policy, Law and Ethics at Silicon Valley’s Singularity University, frequently contributes insights and commentary for our reports on cybercrime and ransomware
  • Gary Hayslip, Co-Author of CISO Desk Reference: A Practical Guide for CISOs, has contributed a CISO Manifesto, with plans for future editions
  • Rob Hegedus, CEO at Sera-Brynn, researches and writes the quarterly Compliance Report for us
  • Robert Herjavec, Founder & CEO at Herjavec Group, and Shark on ABC’s Shark Tank, goes Q&A with us every month in the our new Cybersecurity CEO Blog
  • Mike Janke, Co-Founder at DataTribe and former Chairman at Silent Circle, is co-author of “Why the Hub of U.S. Cybersecurity – the D.C. Beltway – Produces So Few Commercial Cyber Startups,” a special report
  • Robert Johnson, III, President and CEO at Cimcor, Inc., is author of the “Data Security Blog,” a special feature from the Editors at Cybersecurity Ventures
  • Morag McGreevey, Freelance Writer, researches and writes our quarterly Venture Funding Deals report
  • John McAfee, Cybersecurity Luminary, has provided us with various exclusive content and is a frequent interview subject for our reports
  • John Mello, Technology and Cybersecurity Journalist, writes numerous blogs and reports for us including the Data Breach Diary and Mergers & Acquisitions report
  • Gary Miliefsky, Publisher at Cyber Defense Magazine, shares his insights and commentary in some of our special reports
  • Michael Peters, CEO at Continuum GRC, writes the Cybersecurity Outsourcing Report for us
  • Ken Prole, CTO at Code Dx, is a guest contributor for our annual report on application security
  • Stu Sjouwerman, CEO at KnowBe4, contributes insights and commentary on ransomware, phishing email scams, and security awareness training for several of our reports
  • Joseph Steinberg, Inc. Magazine Columnist, contributes his own blend of often unconventional opinion to some of our special cybersecurity reports
  • Tyler Cohen Wood, Director of Cyber Risk Management / Cybersecurity Solutions at AT&T, has been a voice on women in cybersecurity and the state of cybercrime in two of our reports
  • Frank Zinghini, Founder and CEO at Applied Visions, Inc. (AVI), lends his authoritative opinion and commentary on secure software development to some our reports and blogs


Send this to a friend