Top 5 Information security professionals to follow on Linkedin

Top 5 Information security professionals to follow on Linkedin

According to reports, Cyber security is currently one of the hottest trends in the IT world- CyberSecurity Venture Report predicted that by the year 2021 the world’s total cyber crime damage will amount to a total of $6 trillion while spending on cybersecurity will exceed $1 trillion. Wow! $1 trillion to save $6 trillion. That is a lot of money at stake if cyber security is not taken seriously by businesses around the world, which is why I have decided to write, in no particular order, a list of top information security professionals that you should follow on LinkedIn.

 

  1. Bill Brenner, Infosec Scribe at Sophos

 

“ never stop seeking the truth”, while  talking about his progress in the cybersecurity world. Bill makes sure to give current updates about the happenings in CyberSecurity, following Bill ensure that you are updated.

  1. Steve Morgan, Founder & Editor-In-Chief, Cybersecurity Ventures:

 Steve has  written dozens of reports on cybercrime, cybersecurity products and services. Steve’s posts on Linkedin include step by step guides on how to go about cybersecurity and actionable insights about cybersecurity. He wants to ensure you don’t just know what it is about, he wants to ensure that you know how to do it.

  1. Yotam Gutman, VP Marketing at CyberDB: 

Asides sharing Cybersecurity trends on his profile, Yotam doesn’t shy from sharings funny stories with his followers. He also ensures to give details and share information about cybersecurity events that he attends. He is a great conversationalist. Yotam has a way of making his followers feel involved with his posts, if you follow him be assured that you have joined a tech family.

  1. Stephen Asamoah, Senior Manager, Offensive Cybersecurity Operations

Atlanta Metropolitan Area 

Designing, building and maturing the enterprise Offensive Cybersecurity program, comprising of Threat and Vulnerability Assessments, Attack and Penetration Tests, Assume Breach Simulations, Red Team Operations, Purple Team Operations and Threat Detection Attack Simulations.Developing Policies, Procedures and Methodologies for strategically driving and maturing the People, Process and Technology controls of the enterprise.Building and managing a team of Offensive Operators.Serving as a Cybersecurity Thought leader within the enterprise.

  1. Harrison Nnaji, Chief Information Security Officer (CISO) at FirstBank

Accomplished Data and Information Security Strategist & Practitioner with 13+ years of solid experience in the conception, engineering, design, delivery, operation and optimization of cyber, data & information security, risk management, networking, IT operations & project management.Repeated successes leading Cyber & information security strategy / secure computing practices with emerging and established technologies / processes to surpass maximum operational impacts with minimum resource expenditures across diverse industries including Banking, Telecommunications, Distribution, Original Equipment Manufacturers (OEMs) and Service Integration industries.

Conclusion

 Technical knowledge or information  goes a long way. It might take some  time and a lot of research to have a full understanding of the complex security structures, areas and topics  that your customers care about. It is always worth the stress in the end.

Leave A Comment