Build your strategy in 5 minutes!Get Started

Cyber Security and InfoSec: Top 100 Influencers and Brands

by | Apr 6, 2016 | Influencer Lists,

Cyber Security and InfoSec remain critical concerns for brands and governments who need to safeguard their information against espionage attacks and criminal or negligent behaviour. Data breaches are becoming all too common, the recent leak from the Panamanian law firm Mossack Fonseca is one of the world’s largest data leaks to date (Over 11.5 Million Leaked Files including 2.6 Terabytes of Data) exposing an enormous web of offshore companies used to evade tax.

Any brand or agency who has a database of emails, telephone numbers, customer IDs, credit card numbers, birth dates, addresses and other sensitive information has a need to protect themselves from hackers. According to the latest annual TechTarget/Computer Weekly IT Spending Priorities survey, Data loss prevention (DLP) is going to be the top security initiative by UK firms in 2016. This demand has led to a wealth of experts who can help your brand test your information security, ascertain vulnerabilities and make recommendations to mitigate risks.

WHAT ARE THE EXPERTS SAYING?

We reached out to some of the top 20 influencers to ask them for their views on Cyber Security and InfoSec. We spoke to Daniel Miessler (#1), Khalil Sehnaoui (#2), Joseph Steinberg (#3), Lesley Carhart (#4), Ben Rothke (#14),  Graham Penrose (#16) and Javvad Malik (#17). Be sure to follow them to stay up to date on the best content and resources on Cyber Security and InfoSec!


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands Daniel Miessler

Daniel Miessler – Director of Client Advisory Services at IOActive

“The problem with most infosec programs is that they’re trying to add APT and threat intelligence components while nobody can produce a list of assets or describe their egress traffic. Corporate infosec suffers badly from jump, run, walk syndrome.”


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands Khalil SehnaouiKhalil Sehnaoui – Founder & Managing Partner at Krypton Security
“Information Security is one of the main challenges of the 21st Century; albeit more intensely for wealthy and developed countries, when it comes to privacy, safety of personal and professional data and infrastructure integrity. The IoT (Internet of Things) phenomenon is filling our homes and workplaces with inter-connected devices that lack proper security hardening. This is due to the ever-rising demand for more facility, coupled with manufacturers’ desire to stay competitive. This competitive landscape has led some manufacturers to cut corners before launching products, because adequate security testing is viewed as too lengthy and costly of an investment. Moreover, governments have yet to put in place suitable pre-deployment standards, and to top it all off – country based legislations ache to follow global production and distribution channels. We must double our efforts in raising awareness as well as finding and implementing appropriate solutions to meet this challenge head-on and ensure our privacy and security on, and off, the Internet.”


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands - Joseph Steinberg

Joseph Steinberg – Founder and CEO of Secure My Social
“As technology continues to increasingly permeate every aspect of our lives, information security has evolved from an esoteric concept into the greatest area of risk for many individuals, businesses, and even nations. Rapidly changing technologies and attack methods cause approaches and security countermeasures to quickly become outdated and ineffective; in order to stay safe, people and organizations must both remain constantly vigilant as well as leverage the wisdom of experts. Furthermore, changes in the ways that humans interact and communicate with one another have created extraordinary opportunities for criminals and other hackers; in order to succeed at delivering adequate protection, information security plans and the technologies utilized to implement them must incorporate mechanisms to addresses human weaknesses.”


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands Lesley CarhartLesley Carhart – Security Incident Response Lead at Motorola Solutions

“The only way to shake the pervasive negative stereotypes which surround our infosec community is to represent ourselves positively to those outside it. We have a responsibility to inclusively guide those who have an interest in the field and seek our help. I’ve attempted to focus my efforts on making the information security field accessible and interesting to all – security impacts everyone and everyone has the potential to impact security.”


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands Ben RothkeBen Rothke – Senior eGRC Consultant with Nettitude
“Perhaps one of the most devastating targeted attacks of recent months has been the attacks against medical centers in the United States. Just this week, the MedStar Health healthcare organization had to take a number of their systems offline.  Critical systems went down such that patients could not book appointments and physicians could not look up messages or medical records. It’s not clear as of yet if this was a ransomware attack, in which a number of hospitals had to pay a ransom to recover their own data. But the message is clear, healthcare organizations are under attack. Hopefully they have a competent CISO to help them manage.”


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands - Graham PenroseGraham Penrose – Blogger at Unamused Observer; AirGap Anonymity Collective; Anonymous Chronic

“Advocates and lobbyists for the maintenance of the right to privacy of ordinary citizens, their data and their digital communications are faced with powerful counter arguments. Arguments put forth by entities that seek to undermine these basic democratic rights in favour – they allege – of the “common good”. The justification of the erosion or indeed removal of these hard won freedoms is being proposed – it is argued – in favour of the more pressing imperative of national and trans-national security in light of global terror and cyber warfare threats. The historical requirements on law enforcement agencies in terms of the methods associated with the acquisition and preservation of evidence are being diluted and even bypassed in the cyber security context. “Forced Decryption Laws” are being considered in many jurisdictions and where they fail to grant access to the data being sought then subsequent refusal to provide that access by an activist or advocate or whistleblower or accused is being seen as an admission of guilt (inferences). This despite long respected laws providing protections associated with self-incrimination and the right to silence. The development of more sophisticated and intrusive technologies and powers, in certain cases, for use by law enforcement to counter national security threats is not the only pressing issue. The most important backdrop to this entire debate is not to forget what we are trying to protect in the first instance – democracy, privacy, the rights of the individual, free speech and the preservation of civil liberties.”    


Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands - Javvad MallikJavvad Malik – Security Advocate at AlienVault

“The Cyber security industry has grown at a rapid pace and plays an ever-increasing role in the world as we know it. Influencing the daily lives of individuals, or how how businesses and governments operate. As dependencies on technology increase as well as becoming more prevalent in everyday life with the internet of things, it is important Cyber Security figures out how to secure businesses, technologies and the underlying processes without getting in the way.”


MAPPING THE COMMUNITY

We were very interested in seeing which Cyber Security and InfoSec professionals and brands were leading the online discussion, so we analysed  817K+  tweets from November 30th 2015 to January 24th 2016 mentioning the keywords “Cyber Security” OR CyberSecurity OR Infosec OR “Information Security”. We then identified the top 100 most influential brands and individuals leading the discussion on Twitter. What we discovered was a very engaged community, with much discussion between individuals and brands. Below you can see a network map of the online conversation created with our Influencer Relationship Management software (IRM). Be sure to click on the map to enjoy the full size network diagram in greater detail.

Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands - Network Map

Below you can see another network map created with our Influencer Relationship Management software (IRM) showing the number 1 brand Kaspersky Lab at the centre, and the conversations to and from the different influencers in its field. If you are interested in learning more about identifying, managing and engaging with influencers click here to get in touch!

Onalytica Cyber Security and InfoSec - Top 100 Influencers and Brands - Network Map

Top 100 INDIVIDUALS

We looked at all the individuals engaging on Twitter to bring you a list of the top 100 most influential individuals in the Cyber Security and InfoSec industry. Be sure to hit the download now button below to download the full report.

Download Icon

DOWNLOAD THE FULL REPORT

RankTwitter HandleNameCompanyInfluencer Score
1@DanielMiesslerDaniel MiesslerIOActive64.1
2@sehnaouiKhalil (pilgrim)Krypton Security43.85
3@JosephSteinbergJoseph SteinbergSecure My Social39.54
4@hacks4pancakesLesley CarhartMotorola Solutions37.48
5@Laughing_MantisGreg LinaresVectra34.09
6@thegrugqthe grugqIndependent Researcher,32.5
7@gmillardGavin MillardTenable Network Security30.63
8@jeremiahgJeremiah GrossmanWhiteHat Security25.59
9@chrisengChris EngVeracode24.1
10@JhaddixJason Haddixbugcrowd23.03
11@neirajonesNeira JonesIndependent Advisor22.83
12@mathewjschwartzMathew SchwartzInformation Security Media Group22.67
13@Cyb3rOpsFlorian RothBSK Consulting21.53
14@benrothkeBen RothkeNettitude21.12
15@todbTod BeardsleyRapid720.77
16@GrahamPenrose2Graham PenroseTMG Corporate Services20.33
17@J4vv4DJavvad MalikAlienVault17.06
18@evanderburgEric VanderburgSecurity Thinking Cap16.99
19@DilTownDillonTrustwave16.7
20@DMBissonDavid BissonTripwire16.33
21@veorqJP AumassonKudelski Security15.48
22@infosec_aushubsBishop Fox14.66
23@geminiimattmatthew mitchellIndependent Researcher14.48
24@0xkittyChristina CamilleriBishop Fox13.99
25@attrcAndrew CaseVolexity13.98
26@matthew_d_greenMatthew GreenJohns Hopkins University13.91
27@KSZ714KSZIndependent Consultant13.3
28@jleydenJohn LeydenThe Register13.1
29@Infosec_TouristRob LewisTrustifier12.61
30@0xUIDAnis MuslicFreelance Security Analyst12.29
31@jesperjurcenoksJesper JurcenoksAlert Logic12.28
32@da_667DA_667Cisco12.01
33@deeksDennis FratricIndependent Consultant11.99
34@ShirastweetShira RubinoffSecure My Social11.94
35@KarlflKarl FlindersComputer Weekly11.84
36@juliusclarkJuliusBank of America11.83
37@Kym_PossibleKymPossiblebugcrowd11.82
38@daviottenheimerdavi (德海)flyingpenguin11.78
39@staatsgeheimMaarten BooneFox-IT11.5
40@VissDan TentlerPhobos Group11.41
41@liamosaurLiamConsultant11.22
42@secvalveCatherine PearceCisco11.07
43@Scott_HelmeScottPentest10.92
44@emm_davidDavid EmmKaspersky Lab10.02
45@kmburnhamKristin BurnhamIndependent Journalist9.94
46@MalwareJakeJake WilliamsRendition Infosec9.7
47@J0hnnyXm4sJohnny XmasRedLegg International9.69
48@CaseyFaheyCasey FaheyNetGoalie9.66
49@harbendTracy BenderThe Security Awareness Company9.53
50@daveaiteldaveaitelImmunity9.01

 

TOP 100 BRANDS

In the top 100 brands we can find a great selection of agencies, resources as well as industry heavyweights in Cyber Security and InfoSec. Be sure to hit the download now button below to download the full report.

Download Icon

DOWNLOAD THE FULL REPORT

RankTwitter HandleNameInfluencer Score
1@kasperskyKaspersky Lab100
2@CyberExaminerDigital Forensics60.67
3@TripwireIncTripwire, Inc.59.28
4@BitdefenderBitdefender57.57
5@nixcraftnixCraft55.14
6@alertlogicAlert Logic41.94
7@CSOonlineCSOonline39.29
8@FireEyeFireEye38.42
9@DarkReadingDarkReading35.35
10@InfosecurityMagInfosecurity33.01
11@TheRegisterThe Register30.67
12@IBMSecurityIBM Security29.59
13@ComputerWeeklyComputerWeekly27.78
14@TheHackersNewsThe Hacker News27.27
15@torprojecttorproject25.55
16@KasperskyLabB2BKaspersky Business23.48
17@SANSInstituteSANS Institute23.45
18@SCMagazineSCMagazine22.6
19@RSAConferenceRSA Conference21.43
20@Info_Sec_BuzzInfo Security Buzz20.16
21@teamcymruTeam Cymru19.98
22@InfoSec_BTTEISS19.81
23@sucurisecuritySucuri19.67
24@InformaticaCorpInformatica Corp.19.57
25@IT_securitynewsIT Security News19.56
26@CyberDomainCyberWarrior18.65
27@DellDell18.5
28@IOActiveIOActive, Inc18.41
29@CIOonlineCIO.com18.11
30@SoldierUKSoldierUK17.95
31@DellSecurityDell Security17.8
32@ISACANewsISACA International17.23
33@CircleCityConCircle City Con16.74
34@ProofpointProofpoint16.69
35@NorseCorpNorse16.68
36@KPMGKPMG16.66
37@CyberHitchhikerCx2H16.61
38@ptracesecurityPtrace Security GmbH16.6
39@cybraryITCybrary15.94
40@enisa_euENISA15.3
41@bestvpnsBest VPN Provider14.8
42@SCmagazineUKSC Magazine UK14.77
43@SANSNetWarsSANS NetWars14.53
44@HOCupdateHackers Online Club14.52
45@volatilityvolatility14.32
46@HeimdalSecurityHeimdal Security13.54
47@shodanhqShodan13.33
48@info_CCICCI13.13
49@PeerlystPeerlyst12.75
50@SecurityWeekSecurityWeek12.24

 

At Onalytica we love building these lists and want to give back to our loyal readers as much as we can. If you’re interested in other topics (such as Machine to Machine, Wearable TechInternet of Things) be sure to have a gander on our blog or why not propose some topics to us on twitter? We also build some very cool software to manage all of these influencers. Get a free demo today by clicking the button below!

REQUEST A DEMO

Disclaimer: As ever with these lists, it must be stressed that the ranking is by no means a definitive measurement of influence, as there is no such thing. The brands and individuals listed are undoubtedly influential when it comes to driving discussion in the Cyber Security and InfoSec debate.

The PageRank based methodology we use to extract influencers on a particular topic takes into account the number and quality of contextual references that a user receives. These calculations are independent of a user’s number of followers, but we do filter our lists based on how much a user is engaged in the conversation and the influence they drive through their networks.


TAGS

X

CYBER SECURITY AND INFOSEC:

TOP 100 INFLUENCERS AND BRANDS

Download this free report which reveals the top 100 cyber security and infoSec influencers and brands