top of page

Let us find a cybersecurity influencer for your next on-line or in person event! 

Our Cybersecurity Influencers

Our network of influencers includes hundreds of respected professional cybersecurity practitioners who are active on social media with strong, engaged, and, most importantly, relevant followings. 

alexandre_blanc_edited.png

Awarded one of the 20 outstanding contributors to global knowledge sharing for 2019 and 2020 by the European Risk Policy institute, he's proud of bringing value to the daily cyber security data flow, sharing insight and advices. He is recognized as a Linkedin Top Voice 2020 in Technology and recipient of Cyber Sentinel Award 2020 Global. He became a cyber risk subject matter expert, from local infrastructures to global threat landscape analysis who aims to correlate information from OSINT. His hands on experience on protecting sensitive infrastructures, combined with daily threats trend analysis and awareness raising, provides him an essential position in regard to risk analysis overview, information sharing, from low to high level perspectives

Alexandre Blanc

  • LinkedIn

Cyber Security advisor and consultant, speaker

Dr_edited_edited.png

Dr. Joseph J. Burt-Miller Jr.  excels in government project management while utilizing an approach grounded in clear communication and mutual respect from all parties. Dr. Burt-Miller is a United States Air Force Veteran with a myriad of experience in IT, Cybersecurity, Project Management, and cloud-based applications within the United States government spanning at least 15 years, including agencies such as the DoD Cyber Crime Center (DC3), Department of Homeland Security (DHS), and currently serves within the National Security Agency (NSA).

Dr. Joseph Burt-Miller Jr.

  • LinkedIn

CISO, Critical Infrastructure, Cybercrime, CSA

Florian_edited_edited.png

Florian Jörgens initially developed his professional interest in information technology in 2002, earning his BSc. in Business Information Systems.   Gaining further experience in IT auditing at PricewaterhouseCoopers and completing a MSc. in IT Management. Today, Florian Jörgens is Chief Information Security Officer of the Vorwerk Group. Additionally, he is active as a keynote speaker, lecturer, author and research assistant at various universities. Furthermore, he gives expert lectures on the topics of information security, awareness and cyber security.   Florian Jörgens was awarded the Digital Leader Award in the category "Cyber-Security" by CIO magazine.  He is the author of the awareness guide "The Human Firewall: How to Create a Culture of Cyber Security".

Florian Jörgens

  • LinkedIn

CISO - Speaker - Author - Digital Leader Award Winner

Untitled design (6).png

Helen Yu is the Founder and CEO of Tigon Advisory Corp, a Wall Street Journal best-selling author, and the Host of CXO Spice. With expertise in technology leadership, cybersecurity, and go-to-market strategy, she serves as a board director for AI SaaS companies and startup ventures, and as Vice Chair for the Global Cybersecurity Association. Recognized as a Top 50 Women in Tech and Top 30 Thought Leader in AI, Cybersecurity and Financial Services, Helen is a sought-after speaker at prestigious events such as SXSW, TiECon, DMS, Money20/20, FinTech Summit and NAMIC.  Her book 'Ascend Your Startup' has received three awards.

Helen Yu

  • LinkedIn

Founder & CEO - Host of CXO Spice - Board Director -AI, Cybersecurity, FinTech

Jordan Plotnek_edited.png

Dr Jordan Plotnek received a PhD in space system security and resilience from the University of South Australia and a Bachelor of Engineering with first class Honours in telecommunications from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has served in senior cyber security positions for aerospace, defence, utilities, transportation, and mining organisations in Australasia, Canada, and the Middle East. Jordan is currently a Senior Lecturer in security architecture and operational technology security at the University of South Australia, the Lead Partner for critical infrastructure protection at Anchoram Consulting, and the Space Sector Technical Lead at Critical Infrastructure ISAC. Jordan’s research and professional interests are centred around space security, critical infrastructure resilience, cyber-physical threats, and socio-technical systems.

Jordan Plotnek

  • LinkedIn

Cybersecurity Researcher, Lecturer with specialisation in space industry, information warfare, and criticalinfrastructure

ken-final_edited.png

Ken Huang is a prolific author and frequent speaker on topics related to AI and blockchain technology. He has authored or co-authored eight books on generative AI and Web3 published by esteemed international publishers. As an acclaimed speaker, Ken has delivered keynotes and presentations at institutions such as UC Berkeley, Stanford University, Peking University, and the World Bank. He's also as Cloud Security Alliance AI Safety Working Groups Co-Chair and OWASP Top 10 for LLM Applications Co-Author.

Ken Huang

  • LinkedIn

Generative AI Security, CISSP, EC-Council GenAI Security Instructor, API Security

Matthew R.jfif

Matthew Rosenquist is an industry-recognized pragmatic, passionate, and innovative CISO and strategic security expert with 30 years of experience. He thrives in challenging cybersecurity environments and in the face of ever shifting threats. A leader in identifying opportunities, driving industry change, and building mature security organizations, Matthew delivers capabilities for sustainable security postures. He has experience in protecting billions of dollars of corporate assets, consulting across industry verticals, understanding current and emerging risks, communicating opportunities, forging internal cooperation and executive buy-in, and developing practical strategies.

Matthew Rosenquist

  • LinkedIn

CISO, Strategist, Board Advisor, Keynote Speaker

Capture_d_ecran_2022_03_14_152840_092bec1fdd_edited.png

Stiepan A. Kovac, MSc ICT Security, is the group CEO of ITK.Swiss, a cryptography-focused group offering unique, symmetric post-quantum crypto, for encrypted and integrity-protected IPTV, 5G, safe electronic payments & beyond. Aside from his main professional activities, Mr. Kovac is an invited lecturer in the University of Geneva for quantum informatics and post-quantum cryptography.

Stiepan Kovac

  • LinkedIn

Cryptography, Data Protection, NIS Expert, GDPR

Brad Laporte_edited.png

Brad A. LaPorte is a cybersecurity and IT consultant with over 18 years of experience, currently serving as a founder of High Tide Advisors. Previously, he was a top Gartner Research Analyst, specializing in various cybersecurity domains and contributing to multiple significant publications and frameworks. LaPorte has held leadership roles at Dell Secureworks, IBM, Acquia, and Kasada, and is a veteran officer of the U.S. Army. He has pioneered numerous cybersecurity solutions and advised on marketing strategies, vendor selection, and market analysis.

Brad LaPorte

  • LinkedIn

Cybersecurity expert witness and analyst - Ransomware - Insurance - Incident Response

Eddy Willems 2013 1_edited.png

Eddy Willems is a worldwide known independent cyber security expert from Belgium and founder of his own company WAVCi. He is a board member of 3 security industry organizations, EICAR, AVAR and LSEC. He has been Security Evangelist and Global Security Officer at G DATA Cyberdefense for the past 15 years. Several CERTs, press agencies, print and online publications and broadcasting media, for example CNN, use his advice regularly. Eddy is a known inspiring speaker and is giving lectures and presentations (including TEDx) worldwide for a very diverse audience from children to experts.

Eddy Willems

  • LinkedIn

Security Evangelist - Expert in malware & ransomware, International Speaker - Author

greg schaffer_edited.png

With over 33 years experience, Greg is a seasoned security executive proficient in information security program, information security risk assessment and mitigation, vendor risk management, policy and standards creation and implementation, and disaster recovery and business continuity. He is the founder of vCISO Services, LLC, an information security consulting firm providing small and midsized businesses with  information security expertise. He hosts The Virtual CISO Moment podcast showcasing weekly discussions with information security professionals, and is the author of the book Information Security for Small and Midsized Businesses. He holds a Master's degree in Information Systems Project Management and is a USAF veteran of Operation Desert Storm.

Greg Schaffer

  • LinkedIn

vCISO - CISO - vCAIO - Entrepreneur - Author -Podcast Host

Jessica Nemmers_edited.png

Jessica Nemmers is a Field Chief Information Security Officer (CISO). In her role, Jessica acts as an advisor to organizations providing guidance on all aspects of cybersecurity, from developing strategies for protection and resiliency to implementing controls to meet compliance requirements. Jessica’s passion for security began while working in datacenter operations at Perot Systems (now NTT Data). She later became the first CISO at Commercial Metals Company (CMC) where she built a cybersecurity program from the ground up. She went on to become a Chief Security Officer in the financial industry at Elevate Credit.  

Jessica Nemmers

  • LinkedIn

Chief Information Security Officer (CISO), Author, Speaker, Board Member, and Cybersecurity Risk Management Expert

Josh Copeland_edited.png

Joshua Copeland is a battle-tested cybersecurity expert with a wealth of experience in the field. Currently serving as the Cybersecurity Director at AT&T, he plays a pivotal role in guiding security solutions for SLTT (State, Local, Tribal, and Territorial) organizations. Prior to his tenure at AT&T, Joshua worked at GDIT, focusing on cloud platform and cloud platform security within the federal space. With an impressive 20-year career in the United States Air Force, he retired with distinction and pride, having honed his leadership skills and amassed extensive experience in team management and compliance/security.

Joshua Copeland

  • LinkedIn

CISO, Advisor, Risk Management, Compliance

Ken Underhill_edited_edited.png

Ken is an award winning cyber security executive, the Founder of the Cyber Life School, which offers low cost and free cybersecurity education, and the Executive Producer & Host of the syndicated Cyber Life® television show.

He sits on the advisory boards of Breaking Barriers Women in Cybersecurity (BBWIC) and the Whole Cyber Human Initiative.

Ken has been featured in Forbes, Reader's Digest, Fox, NBC, Dark Reading, and MSN Money. He educates millions of people each year through the Cyber Life School.

Kenneth Underhill

  • LinkedIn

CCSK, CEH, CHFI, Advisor, Author, Speaker, Mentor

Mike B_edited.png

Mike Bursell is the Executive Director of the Confidential Computing Consortium. He is one of the co-founders of the Enarx project (https://enarx.dev), and was CEO and co-founder of Profian, a start-up based on Enarx.  He has previously served on the Governing Boards of the CCC and the Bytecode Alliance.  Previous companies include Red Hat, Intel and Citrix, with roles in security, virtualisation and networking. Professional interests include: Confidential Computing, WebAssembly, Linux, trust, open source software, security, distributed systems, blockchain, virtualisation.  Mike has an MA from the University of Cambridge and is author of "Trust in Computer Systems and the Cloud", published by Wiley.  He holds over 100 patents and previously served on the Red Hat patent review committee.

Mike Bursell

  • LinkedIn

C Level Security Architect, Risk Management and Mitigation, Board Advisor, Author and Speaker

Tom Scott_edited.png

With over 35 years of experience, Tom has developed a wealth of knowledge and experience in protecting critical infrastructure and cyber assets. He currently holds certifications in information security, information auditing, security leadership, critical infrastructure protection, and project management – he is also recognized a FEMA Continuity of Operations Planning (COOP) Practitioner. Tom is a member of the FBI’s InfraGard program and currently serves the academic community through board service to the Industry Advisory Board for the USC Integrated IT program.

Tom Scott

  • LinkedIn

CISO - Founder - Consultant

chris r_edited.png

With decades of experience in government and private sector cybersecurity, Chris Roberts serves as an influential voice for IT leaders seeking to manage risk and drive real change. His unique perspective stems from time in the military combined with high-impact work as an offensive security expert.

Chris Roberts

  • LinkedIn

CISO, Hacker, InfoSec, Safety, CyberStuff Researcher, Advisor

Evgeniy Kharam_edited.png

Evgeniy is a cybersecurity professional who has had the opportunity to spend more than 40,000 hours as an architect and principal consultant in various technologies. He is very passionate about cybersecurity technology, vendor relationships, and architecture. He brings much knowledge about VAR, MSSP, and technical pre-sales. And as a result, Evgeniy has become proficient in speaking on most cyber security technical domains, including; Endpoint, Security, Network Security, SIEM/SOC/SOAR, SASE/SEE, VMS, and Cloud Security, to name a few.

Evgeniy Kharam

  • LinkedIn

CISO, Cyber Architect - Evangelist - Consultant - Podcaster

harman singh_edited.png

Harman Singh is a security professional with more than 10 years of consulting experience across private and public sector organisations. His day job involves serving his consulting business customers at Cyphere (https://www.thecyphere.com) to reduce their security concerns. Cyphere's primary expertise lies in technical risk assessments across traditional networks and cloud computing threat landscapes. Besides delivering pen testing, he has also delivered talks and trainings at Black Hat and regional conferences. His favourite security topics are Active Directory, Azure & Networks.

Harman Singh

  • LinkedIn

Cybersecurity Consultant, Auditor, Expert in Pentesting and information security

John Bambenek_edited_edited.png

John Bambenek is President of Bambenek Consulting and an incident handler at the SANS Internet Storm Center. He has been researching security threats and criminal organizations for over 20 years and has been coordinating with US and foreign law enforcement entities to help bring criminal actors to justice. He is a published author of several articles, book chapters, and one book.  He speaks at conferences around the world and runs several private intelligence groups focusing on takedowns and disruption of criminal entities. He specializes in data mining threat intelligence data and performing online surveillance of criminal infrastructure to provide near-time and real-time intelligence products to protect customers and aid in criminal investigations.

John Bambenek

  • LinkedIn

Threat Researcher - PhD Research in AI/ML Cybersecurity and Security of AI/ML - Expert Witness in Cybersecurity

Juan_edited.jpg

Juan is an innovator in cybersecurity and artificial intelligence, recognized as a Top Voice in these areas on LinkedIn. As a Certified Chief Information Security Officer (C|CISO) by EC-Council, he has been highlighted as the number one in Technology and Innovation in Spain by Favikon on LinkedIn. His constant commitment to learning and intellectual evolution allows him to adapt to new trends and challenges in the sector. His holistic approach integrates advanced technology, robust processes, and human capital, with a commitment to taking his clients' cybersecurity strategies to new heights.

Juan Maria Perals

  • LinkedIn

Cybersecurity Educator and Advisor. Digital Transformation
 

Untitled design (5).png

Lester Chng is a cybersecurity and crisis management practitioner and he has extensive experience in conducting exercises and establishing large-scale exercise programs. He has also participated in multinational security exercises and orchestrated enterprise-wide live exercises.  Lester is a former Naval Surface Warfare Officer of the Republic of Singapore Navy where he ran the Naval Wargaming & Simulation Centre. He has leveraged his experience in military wargaming and exercises to execute exercise programs in his current role. Lester holds CISSP and PMP certifications and is an active contributor to the cybersecurity communities on LinkedIn.

Lester Chng

  • LinkedIn

CISSP, Advisor, Cybersecurity and crisis management exercises

pw.png

A New York Times Bestselling author, described in the Wall Street Journal as “the premier futurist in the national-security environment” and “all-around smart guy” in the Washington Post, he has been named by the Smithsonian as one of the nation’s 100 leading innovators, by Defense News as one of the 100 most influential people in defense issues, by Foreign Policy to their Top 100 Global Thinkers List, and as an official “Mad Scientist” for the U.S. Army’s Training and Doctrine Command.

P.W. Singer

  • LinkedIn

Cybersecurity, AI, Futurist, Global Security, Author and Speaker

yohan.jfif

Recently, Yohann started a new mission as Chief Security Officer in a NewSpace startup. Previously, he held the position of Group Chief Information Security Officer in an Airbus subsidiary from 2017 to 2022.
Very active and always with a spirit of sharing within the cyber community, Yohann will be delighted to exchange with you. His motto: « Security grows when it is shared ! »

Yohann Bauzil

  • LinkedIn

CSO, Speaker and Lecturer, Defense

CYFLUENCER (LinkedIn Banner) (6)_edited_edited_edited.jpg

Fill out or simple form to help us find the right influencer for your next event

OR

Let's chat to learn more about using influencers for your events

Contact Us to learn more

Satisfied Clients Include: 

cyolo
WhatsApp-Image-2022-01-13-at-11_edited.p
Flare-Systems-Logo
bottom of page