The data security market is estimated to be worth in excess of $202 Billion by 2021, growing at an annual rate of 9.8%. The number of seven-figure deals alone has grown by 40% year-on-year since 2010. With more data online now than ever before, the importance of securing and protecting your data from destructive forces and the unwanted actions of unauthorised users, has never been more important. Some common measures taken to secure data include scrambling, where data is rendered unreadable to unauthorised users and hackers, and locking computer systems with a password and installing a firewall system. Organisations can also consider imposing non-disclosure agreements for users of confidential data, and reminding them not sending personal or confidential data via email or other file transfer means without first encrypting them. As a last resort data can be destroyed when needed.

The data security field is also of growing importance due to the growth of smart devices, including smartphones, televisions as part of the Internet of Things. With these new technologies comes new risks and threats which have to be defended to protect sensitive information. Organisations are having to boost their security budgets and adopt new innovative technologies to respond the rising risks of cyber crime.

WHAT ARE THE INFLUENCERS SAYING?

We reached out to some of the top influencers on our list to ask them for their views on data security. We spoke to Fabienne Neymarck (#2), Dr. Carlo Piltz (#3), Bill Kleyman (#4), Giovanni Buttarelli (#7), Lisa Briercliffe (#8), Evan Kirstel (#11), Jonathan Armstrong (#14), Kirk Borne (#16) and Tripp Braden (#18). Be sure to follow them to stay up to date on the best content and resources on data security.


Onalytica Data Security Top 100 Influencers and Brands - Fabienne NeymarckFabienne Neymarck – Sales Administration at Ascendeo France

“Cyber attacks are in fast expansion and getting increasingly sophisticated  all over the world. Many companies do not have RSSI. There is an increase with new technologies (IoT), the smartphone accumulates a part of our activity on the Internet, stores our contacts, our SMS, our emails, in short, the smartphone has become a computer. Neither professionals, nor individuals are immune to online piracy. Digital and internet technologies are the backbone of our society. All the networks, current and future information systems, must be secured to preserve privacy and the proper operation of the online economy.”


Onalytica Data Security Top 100 Influencers and Brands - Dr. Carlo PiltzDr. Carlo Piltz – Lawyer at  and Co-Editor of Privacy in Germany at 

“Data Security and Data Privacy are already now important factors for the industry. On the one hand, companies are legally obliged to implement certain security standards and to process personal data only in accordance with certain principles. In this regard, Data Security and Data Privacy are a necessary compliance component. On the other hand, Data Security and Privacy play a key role in the creation of trust for digital services and for the fostering of new innovative products. This importance of Data Security and Data Privacy will especially increase in our digitized world. Data, may it be personal or not, will even more be considered as a valuable asset. The security of this asset as well as the adequate handling of the data in accordance with applicable laws will be one of the future challenges as well as chances for the industry.”


Onalytica Data Security Top 100 Influencers and Brands - Bill KleymanBill Kleyman – Vice President of Strategy and Innovation at MTM

“There was a great security study which pointed out that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. This is an increase of almost four times the estimated cost of breaches in 2015. Here’s the reality – attacks against critical data points will absolutely continue to grow and evolve. Why? Your data continues to become more important to the business – and a lot more valuable. As we examine the future IT and business landscape we see more interconnected devices, more users, more services being delivered, and – very importantly – we are experiencing the digital revolution. Organizations of all sizes across all verticals are using new digital tools to be productive and create competitive advantages. The digitization of our world helps create new kinds of opportunities; as well as new types of risks. Looking ahead, your security model must be end-to-end and incorporate all of your digital content and data points. Along the same lines, you need to remember one very important rule: When it comes to security, there is no silver bullet. Your traditional firewall architecture alone will not stop new kinds of advanced persistent threats (APTs) taking aim at services, applications, key systems, users, and your data. Organizations with IT locations on premise and in the cloud will have to adopt new kinds of security systems which support more data points, mobile users, and evolving business models. Bottom line: always look at the big security picture; and – learn to understand the real value of your data.”


Onalytica Data Security Top 100 Influencers and Brands - Giovanni ButtarelliGiovanni Buttarelli – European Data Protection Supervisor 

“Ensuring a high level of security for personal data, systems and networks is a legal requirement in Europe and in many other parts of the world. It is also recognised globally as furthering the interests of companies, organisations and public administration bodies, which rely on the use of information to carry out their daily business and attach great importance to the value and efficiency of their work. It is essential that these entities implement a new generation of modern measures, taking into account both the high standards required and the cost of implementation. The integrity of their systems is key for the rights, freedoms and legitimate interests of the individuals involved, as well as for the digital market.  We encourage data controllers and processors to engage in the development of dynamic security measures, appropriate to the increasing risks, and to use information security risk management processes to address their specific needs, including cybercrime prevention. Legal and technical measures alone cannot solve the issue of information security. We count on data processing accountability, a new approach to data protection which is increasingly used around the world. An organisation’s hierarchy should ultimately be responsible for the implementation of information security solutions and the IT infrastructure that support them. High level management has to facilitate the development of robust policies and to mobilise the internal and external, financial and human resources required to counter the information and data risks that an organisation faces.”


Onalytica M2M / Data Security Top 100 Influencers and Brands - Lisa Briercliffe

Lisa Briercliffe – Principal Consultant at Briercliffe Associates

“Data security is widely misunderstood and in some cases it is even ignored. It has impacts at every level of society from the man in the street through all levels of business to government both local, central and beyond. Getting it right starts with understanding it. International standards are really quite important though they are too often ignored. Those who make products in information technology are responsible for building security into what they offer and there is a way to go. The real problem here is that none of us only use the products of one supplier and therefore whatever a given supplier does, there is a need at the systems level above that for comprehensive management. Even more important is the existence of daily and periodic methods and routines on the part of the person and company to ensure that the biggest risk, which is the people, is being appropriately mitigated. I would suggest that the issues of data security will never go away with threats being created and discovered on an almost daily basis. We all have to become more proficient and recognise the risks and then take the appropriate action to remain as safe as is possible.”


Onalytica M2M / Data Security Top 100 Influencers and Brands - Evan KirstelEvan Kirstel – Social Media Business Strategist (Advisor) at UCStrategies.com

“The Internet of Things will become a more ripe attack target and Ransomware will expand into into devices like cars, wearables and medical devices. Most wearables for example, lack basic security features or endpoint protection. This will introduce new threats such as collision among connected cars (a brand new potential scandal rivalling the Toyota acceleration stories of the 90s); stolen personal information about users’ smart home info; and attackers locking medical devices until a ransom is paid. Welcome to the Internet of (insecure) things!”


Onalytica Data Security Top 100 Influencers and Brands - Jonathan ArmstrongJonathan Armstrong – Partner at Cordery

“Information security continues to be one of the biggest boardroom challenges.  Threats are increasing in sophistication with advanced financial scams, rogue employees and state sponsored attacks.  The consequences are greater too with new regulation like GDPR & greater impact on share price.  Doing nothing isn’t an option – companies need to shore up their defences and learn how to react to threats quickly.”


Onalytica - Big Data / IoT / AI / Data Security Top 100 Influencers and Brands Kirk D BorneKirk Borne – Principal Data Scientist at Booz Allen Hamilton

“The tension between security and privacy has never been as pronounced as it is now, in the world of data. Knowing as much as you can about users and customers in order to provide essential security by discovering potential risk areas (such as insider threats, adversaries, and bad actors) is at odds with the desire to protect the privacy of each individual’s personal information. Strong data policies around data governance, stewardship, security, and privacy are obviously fundamental. Moving beyond policy and into practice, do your people know the important differences and occasional similarities between private, secure, confidential, personal, proprietary, and open data? They should! This understanding begins with a culture of data — placing data squarely in the purview of all organizational discussions, decisions, and operations. Building a culture of data starts at the top, and at the bottom, and in the middle — everyone in the organization needs data governance, security, and privacy awareness training. Do it today. Don’t wait!”


Onalytica Data Security Top 100 Influencers and Brands - Tripp BradenTripp Braden – Managing Partner at Strategic Performance Partners

“Data security continues to be a high priority for our organizations. We invest significant resources to protect our customers’ and partners’ data. The question we must continue to ask ourselves is: How can we increase impact and influence on our organization’s success? As with many technology challenges of the past, we may miss the bigger picture of how data security can be used for competitive advantage in our markets. The next generation of data security will not only continue to protect our data, but provide insights as to what might be happening in our markets. It will enable our business strategy and success. Sharing this critical information allows data security leaders to provide actionable insights for our organizations to create higher levels of trust and collaboration with customers, partners, and clients. This means additional resources and funding allocated to data security. We can move from a corporate expense to a source of unique differentiation in our global markets. Understanding the many possibilities of data security should enable us to build more sustainable organizations and careers. Are we ready to take on this challenge?”


TOPIC ANALYSIS

We were interested in seeing which topics were most popular among the top data security influencers, so we analysed their tweets and blogs from 1st January –  9th August 2016 and counted mentions of various topics associated with data security, which we then used to create a topic share of voice chart.

 Onalytica Data Security Top 100 Influencers and Brands - Topic Share of Voice

It’s interesting to note that the most popular topic among the data security influencers was Big Data with a 25% share of voice, illustrating the fact that big data and its use within the data security sector is a key debate driver among the top influencers. Cyber Security was the 2nd most popular debate driver with 20%, followed by mentions of IoT with a 16% share of voice, illustrating the level of perceived threats within the IoT sector. Information Security received an 11% share of voice followed by Privacy with 8%. Other frequently mentioned topics among the top influencers included Hacking, Attack, Artificial Intelligence, Risk and Threat.


MAPPING THE DATA SECURITY COMMUNITY

We were very interested in seeing which Data Security influencers and brands were leading the online discussion, so we analysed  tweets over the last 6 months mentioning the keywords: “data privacy” OR dataprivacy OR “data security” OR datasecurity OR datasec OR “data protection” OR dataprotection. We then identified the top 100 most influential brands and individuals leading the discussion on Twitter. What we discovered was a very engaged community, with much discussion between individuals and brands. Below you can see a network map of the online conversation with the influencer Eric Vanderburg at the centre. This map was created with our Influencer Relationship Management software (IRM). Be sure to click on the map to enjoy the full size network diagram in greater detail.

Onalytica Data Security Top 100 Influencers and Brands Network Map Eric Vanderburg

Below you can see another network map created with our Influencer Relationship Management software (IRM) showing the number 1 brand Informatica at the centre and all the conversations to and from the influencers in their field. If you are interested in learning more about identifying, managing and engaging with influencers click here to get in touch!

 Onalytica Data Security Top 100 Influencers and Brands Network Map -  Informatica


TOP 100 INDIVIDUALS

We looked at all the individuals engaging on Twitter to bring you a list of the top influencers in Data Security. Below is the top 50, if you want to see who ranks from 50-100 be sure to download the full report by clicking the download button below.

Download The Full Report

content_top_icon

 

Rank Twitter Handle Name Company Influencer Score
1 @JanAlbrecht Jan Philipp Albrecht European Parliament 100
2 @ArkangelScrap Fabienne Neymarck Ascendeo 85.38
3 @CarloPiltz Dr. Carlo Piltz JBB Rechtsanwaelte 84.13
4 @QuadStack Bill Kleyman MTM Technologies 73.19
5 @MOhlhausenFTC Maureen Ohlhausen Federal Trade Comission 71.86
6 @roomeezon Imran Hafeez Panhwar Government of Pakistan 60.38
7 @Buttarelli_G Giovanni Buttarelli European Parliament 53.85
8 @lisabriercliffe Lisa B Briercliffe Associates 53.81
9 @PaulNemitz Paul Nemitz European Comission 51.78
10 @ClaudeMoraesMEP Claude Moraes MEP European Parliament 50.8
11 @evankirstel Evan Kirstel UCStrategies.com 48.72
12 @evanderburg Eric Vanderburg JurInnov Ltd. 48.16
13 @AlexHorovitz Alex Horovitz Symantec 44.4
14 @armstrongjp Jonathan Armstrong Cordery 40.03
15 @amit_walia Amit Walia Informatica 39.54
16 @KirkDBorne Kirk Borne Booz Allen Hamilton 39.02
17 @kingofpayments Christopher Danvers AAFCU 36.3
18 @TrippBraden Tripp Braden Strategic Performance Partners 34.76
19 @mikejulietbravo Mike Briercliffe Briercliffe Associates 34.48
20 @neirajones Neira Jones Global Cyber Alliance 34.29
21 @kdnuggets Gregory Piatetsky Kdnuggets 33.06
22 @RobRe62 Roberto Re HRD Training Group 32.88
23 @akwyz Antonio Santos Atos UK & IE 27.64
24 @daraghobrien Daragh O Brien Law Society of Ireland 26.53
25 @Jbuff Jason Buffington Enterprise Strategy Group 26.36
26 @thomascmurray Tom Murray Alliance for Excellent Education 25.86
27 @vishne0 Vishal Sharma Security-india 25.61
28 @AverageJoeVC Manolis Sfinarolakis Reality Crowd TV Media Corporation 25.45
29 @CraigMilroy Craig Milroy Sun Life Financial 25.01
30 @DrSanjayPSahoo Dr. Sanjay Prakash S Ssfglobal.com 24.39
31 @MWiFRC Mike Wright MWi Forensic Risk Consulting 24.08
32 @AureliePols Aurelie Pols IE Business School 23.93
33 @glynmoody Glyn Moody opendotdot 22.83
34 @YvesMulkers Yves Mulkers GSK 22.74
35 @SimonCocking Simon Cocking Irish Tech News 22.42
36 @BrianHonan BrianHonan BH Consulting 22.1
37 @LenniMontiel Lenni Montiel UNDESA United Nations 21.94
38 @bill_nizzle William Nizzle ICIT 21.8
39 @vGazza Rodrigo Gazzaneo EMC 19.91
40 @DBaker007 Duane Baker dba Duane Baker 19.79
41 @gmt71_01 Gianmarco Troia Det Norske Veritas 19.54
42 @cjiqbal Chaudhry Javed Iqbal British Council 19.37
43 @guychurchward Guy Churchward EMC 18.65
44 @e_desouza Evelyn de Souza Cisco 18.5
45 @smugnier Sébastien Mugnier No Web Agency 18.29
46 @Phil_Comtek Phil Bartlett Comtek 17.85
47 @scottdelandy scott delandy EMC 16.83
48 @imoyse Ian Moyse Axios Systems 15.53
49 @peterku Peter Ku Informatica 15.25
50 @OttLegalRebels Marc R Gagné MAPP PACC 15.2

 

TOP 100 BRANDS

We also looked at all the brands  engaging on Twitter to bring you a list of the top data security brands. Below is the top 50, if you want to see who ranks from 50-100 be sure to download the report to get the full top 100 list, and see who are most the influential brands in data security.

Download The Full Report

content_top_icon

 

Rank Twitter Handle Name Influencer Score
1 @Informatica Informatica 100
2 @EU_EDPS EDPS 95.23
3 @FTC FTC 84.75
4 @EMCProtectData EMC Data Protection 70.79
5 @CiscoSecurity Cisco Security 55.4
6 @hpe_voltage HPE Security – Data 52.38
7 @SecurityHIT HealthITSecurity.com 50.02
8 @biconnections BIconnections 47.65
9 @Treadstone71LLC Treadstone 71 42.7
10 @SCMagazine SCMagazine 36.35
11 @ValencyNetworks Valency Networks 30.2
12 @AtlanticCouncil AtlanticCouncil 29.4
13 @Insafenetwork Insafe 27.33
14 @Capgemini Capgemini 26.01
15 @SecurityWeek SecurityWeek 25.64
16 @DZone DZone 21.45
17 @HPE_GovSec HPE Gov Security 21.01
18 @FSecure F-Secure 20.6
19 @Europol Europol 20.54
20 @Galaxkey Galaxkey 20.5
21 @Vormetric Vormetric 19.99
22 @UK_SIC UK Safer Internet 18.95
23 @DailyDashboard IAPP Daily Dashboard 18.01
24 @ITBusinessEdge IT Business Edge 17.55
25 @HPE_Security HPE Security 17.55
26 @PrivacyCamp Privacy Camp 17.5
27 @Fortinet Fortinet 17.1
28 @SimpliVityCorp SimpliVity 16.8
29 @futureofprivacy Future of Privacy 16.33
30 @Forcepointsec Forcepoint LLC 15.96
31 @INTERPOL_HQ INTERPOL 15.86
32 @nutanix Nutanix Inc. 15.84
33 @DellDP Dell Data Protection 15.81
34 @cbronline CBROnline.com 15.38
35 @RSAConference RSA Conference 15.29
36 @ITGovernance IT Governance 14.91
37 @AccentureTech Accenture Technology 14.8
38 @unisyscorp Unisys Corporation 14.67
39 @HPE_Software HPE Software 14.35
40 @Intralinks Intralinks 14.21
41 @PwCAdvisory PwC Advisory 13.65
42 @UnisconGmbH Uniscon GmbH 13.3
43 @delphix Delphix 13.25
44 @IDGCN Technology Experts 13.12
45 @DellSecurity Dell Security 12.75
46 @Dataversity DATAVERSITY 12.7
47 @AscotBarclay Ascot Barclay Cyber 12.69
48 @StaySafeOnline NatlCyberSecAlliance 12.65
49 @Doorda Doorda 12.58
50 @ForgeRock ForgeRock 12.44

 

At Onalytica we love building these lists and want to give back to our loyal readers as much as we can. If you’re interested in other topics (such as Virtual Reality, Digital HealthDigital Marketing) be sure to have a gander on our blog or why not propose some topics to us on twitter? We also build some very cool software to manage all of these influencers. Get a free demo today by clicking the button below!

REQUEST A FREE DEMO
 

Are you influential in a certain topic area? Do you want to be more influential in new areas? We have launched a new global community of 100K+ social influencers and we’d love for you to join! Community is aimed at those who want to grow their influence and raise their profile among the people that matter.

What are the key benefits of joining community?

  • Increased visibility with relevant brands
  • Insights into your social profile
  • Suggested key influencers to connect with
  • Opportunity to grow your influence

If this sounds like something you would be interested in, then why not spare 2 minutes to join Community for free?

JOIN NOW!

Disclaimer: As ever with these lists, it must be stressed that the ranking is by no means a definitive measurement of influence, as there is no such thing. The brands and individuals listed are undoubtedly influential when it comes to driving discussion around M2M.

The PageRank based methodology we use to extract influencers on a particular topic takes into account the number and quality of contextual references that a user receives. These calculations also take into account a user’s relevance (number of tweets on topic), reach (number of followers) and reference (how often they appear in Twitter lists). If you want to learn more, please read our article that outlines influencer identification.

Related Posts

Infographic: Influencer Marketing Survey This October 2015 survey highlights findings from Onalytica’s focus groups and consultations with 100 Marketing Directors, Heads of Social Media, Comm...
Top 200 Most Influential Economics Blogs Some time ago we listed the TOP 100 economics blogs, ordered according to their Onalytica Influence Index. Similarly to how academic journals compute...
Influence. Does it Really Matter? Most businesses understand that engaging with influential people is a good way in which to amplify their messaging across a wider network, drive earne...
CES 2016: Top 100 Influencers and Brands CES 2016, the annual Consumer Electronics Show in Las Vegas, took place from the 6th-9th January. All the big tech brands, and a lot of new tech start...