Cyber Security and InfoSec remain critical concerns for brands and governments who need to safeguard their information against espionage attacks and criminal or negligent behaviour. Data breaches are becoming all too common, the recent leak from the Panamanian law firm Mossack Fonseca is one of the world’s largest data leaks to date (Over 11.5 Million Leaked Files including 2.6 Terabytes of Data) exposing an enormous web of offshore companies used to evade tax.
Any brand or agency who has a database of emails, telephone numbers, customer IDs, credit card numbers, birth dates, addresses and other sensitive information has a need to protect themselves from hackers. According to the latest annual TechTarget/Computer Weekly IT Spending Priorities survey, Data loss prevention (DLP) is going to be the top security initiative by UK firms in 2016. This demand has led to a wealth of experts who can help your brand test your information security, ascertain vulnerabilities and make recommendations to mitigate risks.
WHAT ARE THE EXPERTS SAYING?
We reached out to some of the top 20 influencers to ask them for their views on Cyber Security and InfoSec. We spoke to Daniel Miessler (#1), Khalil Sehnaoui (#2), Joseph Steinberg (#3), Lesley Carhart (#4), Ben Rothke (#14), Graham Penrose (#16) and Javvad Malik (#17). Be sure to follow them to stay up to date on the best content and resources on Cyber Security and InfoSec!
“The problem with most infosec programs is that they’re trying to add APT and threat intelligence components while nobody can produce a list of assets or describe their egress traffic. Corporate infosec suffers badly from jump, run, walk syndrome.”
“Information Security is one of the main challenges of the 21st Century; albeit more intensely for wealthy and developed countries, when it comes to privacy, safety of personal and professional data and infrastructure integrity. The IoT (Internet of Things) phenomenon is filling our homes and workplaces with inter-connected devices that lack proper security hardening. This is due to the ever-rising demand for more facility, coupled with manufacturers’ desire to stay competitive. This competitive landscape has led some manufacturers to cut corners before launching products, because adequate security testing is viewed as too lengthy and costly of an investment. Moreover, governments have yet to put in place suitable pre-deployment standards, and to top it all off – country based legislations ache to follow global production and distribution channels. We must double our efforts in raising awareness as well as finding and implementing appropriate solutions to meet this challenge head-on and ensure our privacy and security on, and off, the Internet.”
“As technology continues to increasingly permeate every aspect of our lives, information security has evolved from an esoteric concept into the greatest area of risk for many individuals, businesses, and even nations. Rapidly changing technologies and attack methods cause approaches and security countermeasures to quickly become outdated and ineffective; in order to stay safe, people and organizations must both remain constantly vigilant as well as leverage the wisdom of experts. Furthermore, changes in the ways that humans interact and communicate with one another have created extraordinary opportunities for criminals and other hackers; in order to succeed at delivering adequate protection, information security plans and the technologies utilized to implement them must incorporate mechanisms to addresses human weaknesses.”
“The only way to shake the pervasive negative stereotypes which surround our infosec community is to represent ourselves positively to those outside it. We have a responsibility to inclusively guide those who have an interest in the field and seek our help. I’ve attempted to focus my efforts on making the information security field accessible and interesting to all – security impacts everyone and everyone has the potential to impact security.”
“Perhaps one of the most devastating targeted attacks of recent months has been the attacks against medical centers in the United States. Just this week, the MedStar Health healthcare organization had to take a number of their systems offline. Critical systems went down such that patients could not book appointments and physicians could not look up messages or medical records. It’s not clear as of yet if this was a ransomware attack, in which a number of hospitals had to pay a ransom to recover their own data. But the message is clear, healthcare organizations are under attack. Hopefully they have a competent CISO to help them manage.”
“Advocates and lobbyists for the maintenance of the right to privacy of ordinary citizens, their data and their digital communications are faced with powerful counter arguments. Arguments put forth by entities that seek to undermine these basic democratic rights in favour – they allege – of the “common good”. The justification of the erosion or indeed removal of these hard won freedoms is being proposed – it is argued – in favour of the more pressing imperative of national and trans-national security in light of global terror and cyber warfare threats. The historical requirements on law enforcement agencies in terms of the methods associated with the acquisition and preservation of evidence are being diluted and even bypassed in the cyber security context. “Forced Decryption Laws” are being considered in many jurisdictions and where they fail to grant access to the data being sought then subsequent refusal to provide that access by an activist or advocate or whistleblower or accused is being seen as an admission of guilt (inferences). This despite long respected laws providing protections associated with self-incrimination and the right to silence. The development of more sophisticated and intrusive technologies and powers, in certain cases, for use by law enforcement to counter national security threats is not the only pressing issue. The most important backdrop to this entire debate is not to forget what we are trying to protect in the first instance – democracy, privacy, the rights of the individual, free speech and the preservation of civil liberties.”
“The Cyber security industry has grown at a rapid pace and plays an ever-increasing role in the world as we know it. Influencing the daily lives of individuals, or how how businesses and governments operate. As dependencies on technology increase as well as becoming more prevalent in everyday life with the internet of things, it is important Cyber Security figures out how to secure businesses, technologies and the underlying processes without getting in the way.”
MAPPING THE COMMUNITY
We were very interested in seeing which Cyber Security and InfoSec professionals and brands were leading the online discussion, so we analysed 817K+ tweets from November 30th 2015 to January 24th 2016 mentioning the keywords “Cyber Security” OR CyberSecurity OR Infosec OR “Information Security”. We then identified the top 100 most influential brands and individuals leading the discussion on Twitter. What we discovered was a very engaged community, with much discussion between individuals and brands. Below you can see a network map of the online conversation created with our Influencer Relationship Management software (IRM). Be sure to click on the map to enjoy the full size network diagram in greater detail.
Below you can see another network map created with our Influencer Relationship Management software (IRM) showing the number 1 brand Kaspersky Lab at the centre, and the conversations to and from the different influencers in its field. If you are interested in learning more about identifying, managing and engaging with influencers click here to get in touch!
Top 100 INDIVIDUALS
We looked at all the individuals engaging on Twitter to bring you a list of the top 100 most influential individuals in the Cyber Security and InfoSec industry. Be sure to hit the download now button below to download the full report.
|Rank||Twitter Handle||Name||Company||Influencer Score|
|2||@sehnaoui||Khalil (pilgrim)||Krypton Security||43.85|
|3||@JosephSteinberg||Joseph Steinberg||Secure My Social||39.54|
|4||@hacks4pancakes||Lesley Carhart||Motorola Solutions||37.48|
|6||@thegrugq||the grugq||Independent Researcher,||32.5|
|7||@gmillard||Gavin Millard||Tenable Network Security||30.63|
|8||@jeremiahg||Jeremiah Grossman||WhiteHat Security||25.59|
|11||@neirajones||Neira Jones||Independent Advisor||22.83|
|12||@mathewjschwartz||Mathew Schwartz||Information Security Media Group||22.67|
|13||@Cyb3rOps||Florian Roth||BSK Consulting||21.53|
|16||@GrahamPenrose2||Graham Penrose||TMG Corporate Services||20.33|
|18||@evanderburg||Eric Vanderburg||Security Thinking Cap||16.99|
|21||@veorq||JP Aumasson||Kudelski Security||15.48|
|23||@geminiimatt||matthew mitchell||Independent Researcher||14.48|
|24||@0xkitty||Christina Camilleri||Bishop Fox||13.99|
|26||@matthew_d_green||Matthew Green||Johns Hopkins University||13.91|
|28||@jleyden||John Leyden||The Register||13.1|
|30||@0xUID||Anis Muslic||Freelance Security Analyst||12.29|
|31||@jesperjurcenoks||Jesper Jurcenoks||Alert Logic||12.28|
|33||@deeks||Dennis Fratric||Independent Consultant||11.99|
|34||@Shirastweet||Shira Rubinoff||Secure My Social||11.94|
|35||@Karlfl||Karl Flinders||Computer Weekly||11.84|
|36||@juliusclark||Julius||Bank of America||11.83|
|40||@Viss||Dan Tentler||Phobos Group||11.41|
|44||@emm_david||David Emm||Kaspersky Lab||10.02|
|45||@kmburnham||Kristin Burnham||Independent Journalist||9.94|
|46||@MalwareJake||Jake Williams||Rendition Infosec||9.7|
|47||@J0hnnyXm4s||Johnny Xmas||RedLegg International||9.69|
|49||@harbend||Tracy Bender||The Security Awareness Company||9.53|
TOP 100 BRANDS
In the top 100 brands we can find a great selection of agencies, resources as well as industry heavyweights in Cyber Security and InfoSec. Be sure to hit the download now button below to download the full report.
|Rank||Twitter Handle||Name||Influencer Score|
|14||@TheHackersNews||The Hacker News||27.27|
|20||@Info_Sec_Buzz||Info Security Buzz||20.16|
|25||@IT_securitynews||IT Security News||19.56|
|33||@CircleCityCon||Circle City Con||16.74|
|38||@ptracesecurity||Ptrace Security GmbH||16.6|
|41||@bestvpns||Best VPN Provider||14.8|
|42||@SCmagazineUK||SC Magazine UK||14.77|
|44||@HOCupdate||Hackers Online Club||14.52|
At Onalytica we love building these lists and want to give back to our loyal readers as much as we can. If you’re interested in other topics (such as Machine to Machine, Wearable Tech, Internet of Things) be sure to have a gander on our blog or why not propose some topics to us on twitter? We also build some very cool software to manage all of these influencers. Get a free demo today by clicking the button below!
Disclaimer: As ever with these lists, it must be stressed that the ranking is by no means a definitive measurement of influence, as there is no such thing. The brands and individuals listed are undoubtedly influential when it comes to driving discussion in the Cyber Security and InfoSec debate.
The PageRank based methodology we use to extract influencers on a particular topic takes into account the number and quality of contextual references that a user receives. These calculations are independent of a user’s number of followers, but we do filter our lists based on how much a user is engaged in the conversation and the influence they drive through their networks.