“The Value is the Cybersecurity Blindspot” is one of my favorite keynotes that I delivered at the WithSecure Sphere 2022 conference on a circular stage with a tremendous audience!The near impossible challenge of measuring cybersecurity value will…
Welcome to the Tech Education Series, where current students and life-long learners ask questions to industry professionals in search of meaningful insights.Check out all the questions and answers on the Cybersecurity Insights channel…
The SEC case against SolarWinds and their CISO has opened a hornet’s nest and half of the cybersecurity community is up in arms, claiming that the SEC is unfairly making CISOs the scapegoats, when they are only trying to do their difficult job.…
I am happy to report I have joined the ranks of the London Speaker Bureau!The London Speaker Bureau is a global resource for corporations and governments, providing keynote speakers for corporate and professional events.Popular Keynote…
The SEC case against SolarWinds and its CISO has been one of the most passionate topics all, spawning heated discussions in the hallways of CISOs across the country and globe, often bifurcating cybersecurity professionals into two opposing camps.…
First published by HelpNetSecurity — Matthew RosenquistCybersecurity insurance is a rapidly growing market, swelling from approximately $13B in 2022 to an estimated $84B in 2030 (26% CAGR), but insurers are struggling with quantifying the potential…
I am honored to be recognized in Thinkers360’s Top 50 Global Thought Leaders and Influencers on Cybersecurity for 2023! Protecting the people, data, and systems of our globally connected digital ecosystem is a difficult task that requires…
I am releasing a new Tech Education series, where current technology students, future developers, and life-long learners ask questions to help establish and advance their careers!This is where professionals can add to the conversation, share…
In the complex and ambiguous realm of cybersecurity, the power of visualization tools cannot be overstated. When employed judiciously, they serve as invaluable assets, offering crucial data in a readily comprehensible manner. Conversely, when…
How in the heck did this happen? In what crazy world am I on a list with such cybersecurity powerhouses as Jen Easterly, Chuck Brooks, Kirsten Davies, Keren Elazari, Phil Venables, Rinki Sethi, Jane Franklin, G. Mark Hardy, Shamane Tan, and so many…
A forward-thinking college student decides to reach out to local business professionals to organize an in-person Q&A panel for fellow students and entrepreneurs. Aili Vaananen called several successful businesspeople and assembled a great panel who…
Cybersecurity has a growing problem that will force an evolution in the industry — it must deliver more recognizable value!Cybersecurity must re-envision itself to both protect and become an active contributor to the overarching business goals.…