{"id":88565,"date":"2023-04-27T02:24:57","date_gmt":"2023-04-27T07:54:57","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=88565"},"modified":"2024-05-17T12:35:31","modified_gmt":"2024-05-17T07:05:31","slug":"top-cybersecurity-influencers","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/","title":{"rendered":"Top Cyber Security Experts &#038; Influencers to follow in 2024"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it&#8217;s more important to stay up-to-date on the latest trends and insights in the industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To help you stay ahead of the curve, we&#8217;ve picked some top cybersecurity influencers in no particular order to follow in 2024. From industry experts to ethical hackers, these thought leaders can pave the way for a safer digital future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s dive in!<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Top_20_Cybersecurity_Influencers_to_Follow_in_2024\" >Top 20 Cybersecurity Influencers to Follow in 2024<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Jane_Frankland\" >Jane Frankland<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#John_Strand\" >John Strand<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Chuck_Brooks\" >Chuck Brooks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Alexandre_Blanc\" >Alexandre Blanc<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Naomi_Buckwalter\" >Naomi Buckwalter<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Mark_Lynd\" >Mark Lynd<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Richard_Stiennon\" >Richard Stiennon<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Matthew_Rosenquist\" >Matthew Rosenquist<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Bob_Fabien\" >Bob Fabien<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Chase_Cunningham\" >Chase Cunningham<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Mansur_Hasib\" >Mansur Hasib<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Shira_Rubinoff\" >Shira Rubinoff<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Graham_Cluley\" >Graham Cluley\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Robert_Herjavec\" >Robert Herjavec<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Nitin_Pandey\" >Nitin Pandey<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Magda_Chelly\" >Magda Chelly<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Tyler_Cohen_Wood\" >Tyler Cohen Wood\u00a0\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Dean_Sysman\" >Dean Sysman<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Keren_Elazari\" >Keren Elazari<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Amit_Bareket\" >Amit Bareket<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.whizlabs.com\/blog\/top-cybersecurity-influencers\/#Summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Top_20_Cybersecurity_Influencers_to_Follow_in_2024\"><\/span><span style=\"font-weight: 400;\">Top 20 Cybersecurity Influencers to Follow in 2024<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Here\u2019s list of top Cybersecurity Influencers who have impacted more in cybersecurity field:<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Jane_Frankland\"><\/span><span style=\"font-weight: 400;\">Jane Frankland<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88568\" style=\"font-weight: inherit;\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-150x150.webp\" alt=\"Jane Frankland\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Jane-Frankland.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Jane F<\/span><span style=\"font-size: 16px; font-weight: 400;\">rankland has over <strong>20+ years of experience<\/strong> i<\/span><span style=\"font-size: 16px; font-weight: 400;\">n cybersecurity and was forced to become reckoned in this industry. Jane holds various positions as a respected author, speaker, and entrepreneur, she has dedicated her career to promoting diversity and inclusion in the cybersecurity field.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0She has been recognized for her excellence by Wikipedia and LinkedIn and featured as a top global influencer. As a popular keynote speaker, she delivers inspiring, innovative presentations across the world, at corporate events.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Known for her ability to inspire and educate, her audience includes those in and outside of cybersecurity, and range from senior executives just starting their careers in cybersecurity. For her outstanding effort, she definitely deserves a unique place in top cybersecurity influencers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Jane Frankland on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/janefrankland\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/JaneFrankland\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"John_Strand\"><\/span><span style=\"font-weight: 400;\">John Strand<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88569\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand-150x150.webp\" alt=\"John Strand\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/John-Strand.webp 334w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">John Strand is tech-savvy in the cybersecurity field and shares his knowledge to their audience by educating others. John becomes Owner of Black Hills Information Security (BHIS) and leads the Hunt Teaming, Command &amp; Control (C2) and Pivot testing development. He has <\/span><span style=\"font-weight: 400;\">consulted <strong>100+ organizations<\/strong> in the specified areas of security, regulatory compliance, and penetration testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the achievements and contributions has been listed below:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Co-author of Offensive Countermeasures: The Art of Active Defense (2013)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contributor to the Penetration Testing Execution Standard (PTES)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Author of Black Hat\u2019s &#8220;Active Defense, Offensive Countermeasures, and Hacking Back&#8221; course<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Author of SANS Institute\u2019s &#8220;Hacker Tools, Techniques, Exploits and Incident Handling&#8221; course<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Former Information Assurance lead at Northrop Grumman and Accenture Certifications &amp; Credentials<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">No matter whether you follow many cybersecurity influencers, the list cannot be fulfilled if you reject outstanding cybersecurity figures like John strand.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow John Strand on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/john-strand-a1b4b62\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/strandjs\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Chuck_Brooks\"><\/span><span style=\"font-weight: 400;\">Chuck Brooks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88570\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks-150x150.webp\" alt=\"Chuck Brooks\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Chuck-Brooks.webp 350w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Whenever you hear the name cybersecurity, then you definitely come up with the name Chuck Brooks. His achievement in the cybersecurity career speaks of his excellence.He serves as a President of Brooks Consulting International and globally recognized thought leader as well as subject matter expert in Cybersecurity and Emerging Technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Top-notch achievements made by Chuck Brooks such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">LinkedIn recognized Chuck as one of \u201c<strong>The Top 5 Tech People to Follow on LinkedIn<\/strong>\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Listed as Top 50 Global Influencer in Risk, Compliance by Thompson Reuters<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Voted as &#8220;<strong>Cybersecurity Person of the Year<\/strong>&#8221; in LinkedIn<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ranked as #2 Global Cybersecurity Influencer in 2018 by IFSEC\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Serves as Cybersecurity Expert for \u201cThe Network\u201d at the Washington Post<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Serves as a contributor to FORBES<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Chuck has written over 300+ articles and keynoted dozens of conferences worldwide. He has over <strong>1 lakh followers on LinkedIn<\/strong> and almost 19k followers on Twitter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Including Chuck Brooks in the top cybersecurity influencers will be definitely worth it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Chuck Brooks on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/chuckbrooks\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/ChuckDBrooks\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Alexandre_Blanc\"><\/span><span style=\"font-weight: 400;\">Alexandre Blanc<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone wp-image-95960 size-thumbnail\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/alexandre_blanc-150x150.webp\" alt=\"Alexandre BLANC\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/alexandre_blanc-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/alexandre_blanc-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/alexandre_blanc-96x96.webp 96w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Alexandre Blanc offers his experience as a cybersecurity specialist in all areas, from local infrastructure to the development of online threats, to help businesses identify dangers and take precautions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He has a comprehensive understanding of all the information-sharing risk analysis factors that need to be assessed at all levels and his actual experience in safeguarding critical infrastructures and analyzing daily threat patterns. He adds value to the tactical and strategic facets of an organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alexandre Blanc is one of the t<strong>op 20 global knowledge providers for 2019 and 2020<\/strong> by the European Risk Policy Institute. He participant atcively in the cybersecurity community, where he share his thoughts and ideas and deliver advice and made meaningful discussions and exchanges with his peers and organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Alexandre Blanc on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/alexandre-blanc-cyber-security-88569022\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/tresronours\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Naomi_Buckwalter\"><\/span><span style=\"font-weight: 400;\">Naomi Buckwalter<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88572\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-150x150.webp\" alt=\"Naomi Buckwalter\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-150x151.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-298x300.webp 298w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-1017x1024.webp 1017w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-768x773.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Naomi-Buckwalter.webp 1168w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Naomi Buckwalter has over 20 years of experience in the IT and Security and actively engaged in various roles such as <strong>Software Engineering, Security Engineering, Security Architecture, and Security Executive Leadership.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">She also acts as a<\/span><span style=\"font-weight: 400;\"> cybersecurity career adviser and mentor for individuals around the world, and her passion includes helping people, particularly women, who want to get into cybersecurity. Naomi has completed two Master&#8217;s degrees from Villanova University and a Bachelor of Engineering from the Stevens Institute of Technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Naomi presented at over 100+ conferences, events, school groups, webinars, podcasts, and organizations in addition to RSA, SANS, OWASP, ISACA, ISC2, 7CTOs, Secure World, Cyber Futures Foundation, and WiCyS. She is the author of the LinkedIn Learning course named &#8220;Building the Next Generation of Cybersecurity Professionals&#8221;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0When you need cybersecurity influencers, Naomi Buckwalter is a great person to add to your list.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Naomi Buckwalter on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/naomi-buckwalter\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn\u00a0<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Mark_Lynd\"><\/span><span style=\"font-weight: 400;\">Mark Lynd<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88573\" style=\"font-weight: inherit;\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd-150x150.webp\" alt=\"Mark Lynd\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Mark-Lynd.webp 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Ma<\/span><span style=\"font-weight: 400;\">rk<\/span><span style=\"font-weight: 400;\">\u00a0Lynk is an acknowledg<\/span><span style=\"font-weight: 400;\">ed global thought leader, speaker, and\u00a0practitioner for cybersecurity, AI, IoT, and data centers. Over the past 20 years, Mark has worked for a number of multinational corporations as a CIO, CTO, CISO, and\/or board member. Mark was a finalist for Ernst &amp; Young&#8217;s &#8220;<\/span><b style=\"font-style: inherit;\">Entrepreneur of Year &#8211; Southwest Region<\/b><span style=\"font-weight: 400;\">&#8221; award and gave the Doak Walker Award in front of a large television audience on ESPN&#8217;s Awards Show.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He runs his own website <\/span><a href=\"https:\/\/www.marklynd.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">marklynd.com<\/span><\/a><span style=\"font-weight: 400;\"> and shares his knowledge on cybersecurity, AI and incident response. He has served as a keynote or featured speaker at various events for Oracle, IBM Watson, Cisco, Cohesity, Intel, and so on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Mark Lynd on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/marklynd\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/mclynd\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Richard_Stiennon\"><\/span><span style=\"font-weight: 400;\">Richard Stiennon<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88574\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Richard-Stiennon-150x150.webp\" alt=\"Richard Stiennon\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Richard-Stiennon-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Richard-Stiennon-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Richard-Stiennon-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Richard-Stiennon.webp 298w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Since 1995, Richard Stiennon has written and talked about cybersecurity as an industry analyst. He founded IT-Harvest, the first platform for investigating the whole cybersecurity sector, and serves as its Chief Research Analyst.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stiennon is the author of ten volumes, the most recent of which is <\/span><a href=\"https:\/\/it-harvest.com\/shop\/security-yearbook-2022\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Security Yearbook 2022<\/span><\/a><span style=\"font-weight: 400;\">, and it offers a thorough overview and directory of the cybersecurity sector. In addition, Stiennon serves as a strategic advisor and board member for a variety of companies, including s.f.ai, Anitian, and Phosphorus Cybersecurity Inc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Throughout his excellence, Richard holds a unique place in Top cybersecurity influencers list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Richard Stiennon on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/stiennon\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/stiennon\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Matthew_Rosenquist\"><\/span><span style=\"font-weight: 400;\">Matthew Rosenquist<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88575\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist-150x150.webp\" alt=\"Matthew Rosenquist\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Matthew-Rosenquist.webp 408w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0With 30 years of experience, Matthew Rosenquist is a CISO and strategic security specialist who is well-known in the business for being pragmatist, enthusiastic, and imaginative. He is also a<\/span><a href=\"https:\/\/www.youtube.com\/@CybersecurityInsights\/videos\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\"> Youtube influencer<\/span><\/a><span style=\"font-weight: 400;\"> and his channel name is Cybersecurity Insights.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the face of constantly evolving threats and demanding cybersecurity situations, he flourishes. Matthew provides capabilities for long-lasting security postures as a pioneer in opportunity identification, driving market change, and establishing mature security organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He has expertise in safeguarding multibillion-dollar corporate assets, providing industry-wide consulting services, comprehending present and future threats, articulating opportunities, fostering international cooperation and executive buy-in, and creating workable plans. He has over 190k professional connections on LinkedIn.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow\u00a0 Matthew Rosenquist on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/matthewrosenquist\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/Matt_Rosenquist\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Bob_Fabien\"><\/span><span style=\"font-weight: 400;\">Bob Fabien<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88576\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-150x150.webp\" alt=\"Bob Fabien\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Bob-Fabien.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Bob Fabien \u201cBZ\u201d Zinga workinh as a Chief Information Security Officer (CISO) at the Santa Clara University and an IT Warfare Commander (CDR) in U.S. Navy Reserve. Now serving as the Commanding Officer of a 72 member unit supporting the dual-hatted Commander of Naval Network Warfare Command (NETWARCOM) and Commander Task Force (CTF) 1010.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He has over 26 years of experience in certified Information Technology experience and leadership roles in securing enterprise information technology business operations, and corporate governance in several industries such as Higher Education, Defense Industrial Complex,Federal Government, Tech, and Consulting.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He has own website <\/span><a href=\"https:\/\/bobfabienzinga.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">bobfabienzinga.com<\/span><\/a><span style=\"font-weight: 400;\"> and shares his insights on cybersecurity through his writings.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Achievements made by Bob Fabien such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Listed as <strong>30 Global Security Experts to Follow in 2024<\/strong>\u00a0by Media Sonar Technologies<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ranked among <strong>Top 25 Thought Leader &amp; Influencer 2022: Cybersecurity<\/strong> in Thinkers360<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Listed in <strong>Who\u2019s Who in Cybersecurity 2021<\/strong> by Top Cyber News Magazine<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Any list of undeniable cybersecurity thought leaders you might wish to follow should undoubtedly include Bob Fabien&#8217;s name.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Bob Fabien on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/bobfabienzinga\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/bobfabienzinga\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Chase_Cunningham\"><\/span><span style=\"font-weight: 400;\">Chase Cunningham<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88577\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Chase-Cunningham-150x150.webp\" alt=\"Dr.Chase-Cunningham\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Chase-Cunningham-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Chase-Cunningham-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Chase-Cunningham-96x96.webp 96w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Chase Cunningham, is a former Navy Chief Cryptologist, having 20+ years of experience in forensic and analytical operations, and he is a <\/span><a href=\"https:\/\/www.youtube.com\/c\/chasecunningham\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Youtube influencer<\/span><\/a><span style=\"font-weight: 400;\">, who provides in-depth technical knowledge, extensive education, a variety of certifications, and operational experience in this area.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Chase possesses sophisticated skills that they have acquired via firsthand experience in forensic investigation and cyber operations. He acquired operational experience by working in highly technical and operationally demanding work centers at the NSA, CIA, FBI, and other government organizations while &#8220;on pos&#8221; and performing cyber forensics, analytics, and offensive and defensive cyber operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Chase Cunningham on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/dr-chase-cunningham\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/CynjaChaseC\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Mansur_Hasib\"><\/span><span style=\"font-weight: 400;\">Mansur Hasib<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88578\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Mansur-Hasib-150x150.webp\" alt=\"Dr. Mansur Hasib\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Mansur-Hasib-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Mansur-Hasib-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr.-Mansur-Hasib.webp 213w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Mansur Hasib is a <\/span><a href=\"https:\/\/www.youtube.com\/@DrMansurHasib\/about\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Youtube influencer <\/span><\/a><span style=\"font-weight: 400;\">and speaks more on <\/span><span style=\"font-weight: 400;\">cybersecurity leadership, cybersecurity journalism, organizational culture, innovation, building and leading teams etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Mansur Hasib holds the prestigious CISSP, PMP, and CPHIMS certifications in addition to being the only cybersecurity and healthcare leader, author, lecturer, and media commentator in the world with 12 years of experience as a Chief Information Officer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Hasib has thirty years of expertise directing organizational reforms in the fields of healthcare, biotechnology, education, and energy through digital leadership and cybersecurity strategy. He has received Global Award Winning Cybersecurity and Healthcare Leader, Author, and Media Commentator and also received <\/span><a href=\"https:\/\/www.hstoday.us\/channels\/global\/umucs-mansur-hasib-wins-2017-maryland-cybersecurity-people-s-choice-award\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">2017 Cybersecurity People\u2019s Choice Award<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"http:\/\/infogovcon.com\/awards\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">2017 Information Governance Expert of the Year Award<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Mansur Hasib on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/mansurhasib\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/mhasib\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Shira_Rubinoff\"><\/span><span style=\"font-weight: 400;\">Shira Rubinoff<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88579\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-150x150.webp\" alt=\"Shira Rubinoff\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Shira-Rubinoff.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Shira Rubinoff is a well-known cybersecurity executive and<\/span><a href=\"https:\/\/www.youtube.com\/ShiraRubinoffTV\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\"> Youtube influencer<\/span><\/a><span style=\"font-weight: 400;\">. She founded two cybersecurity product firms and oversaw numerous initiatives for women in technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">She released various patents and pending patents in areas are completely interlinked to the application of psychology to enhance information technology as well as cybersecurity. She has published numerous articles and given presentations on subjects relevant to the human dimensions of cybersecurity, blockchain, AI, and related issues.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recognized as one of the top 50 businesswomen in New Jersey,\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ms. Rubinoff was also recognized as a Woman of Influence by CSO Magazine,\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Given the &#8220;One to Watch&#8221; award by the EWF and CSO, and\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recognized as 2017 &#8220;Outstanding Woman in Infosec&#8221; by the CyberHub Summit.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Analysts have also determined that she is the leading female influencer in cybersecurity on social media worldwide. The most renowned cybersecurity and technology organizations were included in a series of interviews conducted by Ms. Rubinoff, who also produced various video series. She is the author of the book <\/span><span style=\"font-weight: 400;\">Cyber Minds published by Packt Publishing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Shira <\/span><span style=\"font-weight: 400;\">Rubinoff on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/shirarubinoff\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/Shirastweet\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Graham_Cluley\"><\/span><span style=\"font-weight: 400;\">Graham Cluley\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88580\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley-150x150.webp\" alt=\"Graham Cluley\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Graham-Cluley.webp 533w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Graham has over 20 years of expertise in the field of computer security and has worked his way up to where he is now. Graham first worked as a programmer and then transitioned into strategic positions abroad after creating the first Dr. Solomon&#8217;s Antivirus Toolkit for Windows. He also had a brief stint working for the well-known computer security company McAfee before joining Sophos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Graham has developed into an independent consultant, blogger, podcaster, and lecturer on technology and cybersecurity in more recent years. For his outstanding efforts in the field of computer security, he was later admitted into the Infosecurity Europe Hall of Fame.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Grahan Cluley on <a href=\"https:\/\/www.linkedin.com\/in\/grahamcluley?originalSubdomain=uk\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> <\/span><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/gcluley\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Robert_Herjavec\"><\/span><span style=\"font-weight: 400;\">Robert Herjavec<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88581\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-150x150.webp\" alt=\"Robert Herjavec\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Robert-Herjavec.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Robert Herjavec, dynamic entrepreneur as well as leading Shark on ABC\u2019s Shark Tank. Herjavec Group and Fishtech Group, an award-winning cybersecurity firm, united at the end of 2021 to form Cyderes, a new cybersecurity giant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyderes is regarded as a leader in cybersecurity operations on a global scale. In contexts with several technologies, the company excels by the guidance of Robert Herjavec.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Robert Herjavec on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/robertherjavec\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/robertherjavec\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Nitin_Pandey\"><\/span><span style=\"font-weight: 400;\">Nitin Pandey<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88582\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey-150x150.webp\" alt=\"Nitin Pandey\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Nitin-Pandey.webp 709w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Nitin Pandey is a recognized national expert in cyber security as well as a <strong>researcher, pen tester, international speaker, author, trainer, and blogger<\/strong> with more than 13 years of expertise in the industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He is well known both in India and abroad for his expertise in ethical hacking, information security and compliance, the dark web, counter- and cyberterrorism, cybercrime investigations,\u00a0 cyber safety, cyber threat intelligence, social engineering techniques, financial frauds, cyberpsychology, and the most recent cyberthreats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through workshops and sessions, he has trained more than 20,000 students, business professionals, police, cybercops, and government officials. Additionally, he has received recognition and inclusion in the Hall of Fame from tech behemoths like Microsoft, Google, Dell, Intel, Belkin, Avast Antivirus, Adaware, and others for discovering security flaws\/bugs in their websites and databases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Nitin Pandey on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/initinpandey1\/?originalSubdomain=in\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/initinpandey\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Magda_Chelly\"><\/span><span style=\"font-weight: 400;\">Magda Chelly<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88583\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly-150x150.webp\" alt=\"Dr Magda Chelly\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dr-Magda-Chelly.webp 641w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Magda Lilia Chelly, a well-known leader in cybersecurity around the world. ISFEC Global has listed her as one of the top 20 cybersecurity people to watch in 2017 and 2021.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Magda has written two books, and a third is now being written with a 2022 release date anticipated. The title of the first book is &#8220;Being Brave; Vera&#8217;s Cyber Adventures.&#8221; To increase public awareness of cybersecurity, the book combines science fiction, romance, and cybersecurity. The two additional books discuss c-executive recommendations and cybersecurity challenges.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Magda has gained recognition as the media&#8217;s go-to expert on problems requiring precise yet uncomplicated views on cybersecurity topics as a result of her many appearances addressing cybersecurity on national and international TV, Radio, and News Magazines.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And thus consistent effort in cybersecurity helps to hold a unique place in the top cybersecurity influencers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Magda Lilia Chelly on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/m49d4ch3lly\/?originalSubdomain=sg\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/m49D4ch3lly\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Tyler_Cohen_Wood\"><\/span><span style=\"font-weight: 400;\">Tyler Cohen Wood\u00a0\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88584\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-150x150.webp\" alt=\"Tyler Cohen Wood CISSP\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Tyler-Cohen-Wood-CISSP.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Tyler serves as cyber-authority with 20 years of highly technical experience. For her excellence, She was listed as one of the &#8220;<strong>Top 25 Cybersecurity Experts to Follow on Social Media In 2019<\/strong>&#8221; by Cybersecurity Ventures in January 2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prior to working as a private consultant, Tyler held positions in the private sector as an Executive Director for CyberVista and a Director of the Cyber Risk Management division at AT&amp;T. She used her cybersecurity expertise and thought leadership to create fresh and creative solutions to protect clients from hackers and the constantly evolving cyber threat landscape.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Tyler Cohen Wood on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/tylercohen78\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Dean_Sysman\"><\/span><span style=\"font-weight: 400;\">Dean Sysman<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88585\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--150x150.webp\" alt=\"Dean Sysman\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman--96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Dean-Sysman-.webp 1000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Dean Sysman has been recognized as a well-known businessman and cybersecurity specialist. In addition to winning the EY Entrepreneur of the Year Award in New York, he was recognized with a spot on the Forbes Under30 Israel list.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dean becomes the CEO and Co-Founder of Axonius, which has grown to a $1.2B valuation in less than 4 years from its start and represents the market leader in enabling organizations to monitor and secure their infrastructure. Dean helped establish Cymmetria, a YC-backed cyber deception business with Fortune 500 clients, before creating Axonius, which was later purchased by private equity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Dean Sysman on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/deansysman\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn <\/span><\/a><span style=\"font-weight: 400;\">&amp; <\/span><a href=\"https:\/\/twitter.com\/DeanSysman\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Twitter<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Keren_Elazari\"><\/span><span style=\"font-weight: 400;\">Keren Elazari<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88586\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari-150x150.webp\" alt=\"Keren Elazari\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Keren-Elazari.webp 737w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Keren Elazari is a well-known security researcher, analyst, author, and <\/span><a href=\"https:\/\/www.youtube.com\/@kerenelazari5473\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Youtube influencer<\/span><\/a><span style=\"font-weight: 400;\"> who consults with Fortune 500 corporations, governmental agencies, and top security firms worldwide. She is the very first Israeli woman to deliver a TED lecture at the official TED Conference as a solo speaker on cyber security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most viewed speeches on TED.com on the subject of cyber security is Keren&#8217;s TED talk about hackers, which has been viewed millions of times and translated into 30 languages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Leading Cyber Ladies network for Women in Cyber Security was founded by Keren, who also founded BSidesTLV, Israel&#8217;s largest security community event.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Keren Elazari on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/kerene\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Amit_Bareket\"><\/span><span style=\"font-weight: 400;\">Amit Bareket<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-88587\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-150x150.webp\" alt=\"Amit Bareket\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-150x150.webp 150w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-300x300.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-768x768.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-250x250.webp 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket-96x96.webp 96w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Amit-Bareket.webp 800w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Amit Bareket works as a system architect and software developer with a strong background in cybersecurity. He has eight patents covering UI, mobile apps, and storage. While working as a software engineer for the companies such as IBM XIV Storage and BigBand Networks, Amit take a decision to launch SaferVPN along with the co-founder Sagi Gidali, a consumer based VPN service.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Amit is in charge of all IT, infrastructure, and commercial partnerships at Perimeter 81, which was founded after the company was sold to J2 Global. He obtained a B.Sc. in Computer Science and Economics from Tel Aviv University before joining the IDF&#8217;s elite Unit 81 cyber intelligence unit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow Amit Bareket on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/amit-bareket-638a8b18\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">LinkedIn<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Summary\"><\/span><span style=\"font-weight: 400;\">Summary<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hope this blog provides data on notable figures who have a significant impact on the cybersecurity community and whose insights and perspectives can be valuable for staying up-to-date with the latest trends and best practices in this area. The given list does not follow any particular order and just mentioned the people who have taken a big effort to bring great impact in the cybersecurity world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By following these experts, individuals can stay informed and prepared to address the ever-evolving cybersecurity landscape in 2024 and beyond.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have any questions on this blog, feel free to comment us!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it&#8217;s more important to stay up-to-date on the latest trends and insights in the industry.\u00a0 To help you stay ahead of the curve, we&#8217;ve picked some top cybersecurity influencers in no particular order to follow in 2024. From industry experts to ethical hackers, these thought leaders can pave the way for a safer digital future. Let\u2019s dive in! Top 20 Cybersecurity Influencers to Follow in 2024 Here\u2019s list of top Cybersecurity Influencers who [&hellip;]<\/p>\n","protected":false},"author":382,"featured_media":88591,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3343],"tags":[],"class_list":["post-88565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",1120,630,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",1120,630,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",1120,630,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-640x630.webp",640,630,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/04\/Top-Cyber-Security-Influencers-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Vidhya Boopathi","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/vidhya\/"},"uagb_comment_info":280,"uagb_excerpt":"As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it&#8217;s more important to stay up-to-date on the latest trends and insights in the industry.\u00a0 To help you stay ahead of the curve, we&#8217;ve picked some top cybersecurity&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/88565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/382"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=88565"}],"version-history":[{"count":19,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/88565\/revisions"}],"predecessor-version":[{"id":95961,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/88565\/revisions\/95961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/88591"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=88565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=88565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=88565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}