Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Matthew Rosenquist
Chief Information Security Officer & Cybersecurity Strategist at Mercury Risk and Compliance
Folsom, United States
CISO and cybersecurity strategist that actively works with the industry to identify emerging risks and opportunities. Currently the CISO for Eclipz and formerly the Cybersecurity Strategist for Intel Corp. with 30 years in the security field. An active keynote speaker at industry events, member on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry across business, academia, and governments sectors. Publishes blogs, whitepapers, and develops industry methodologies. Was named as a Top 10 Technology Voice in 2018 by LinkedIn and has a very active following of over 180k professionals.
Matthew is experienced in building world class teams and capabilities, managing security operations, and evangelizing best-practices to the market. He advises boards, executives, industry groups, tech companies, consumer audiences, and the media on the risks and relevance of cybersecurity issues and how to achieve an optimal level of security.
Available For: Advising, Influencing, Speaking Travels From: Sacramento CA Speaking Topics: cybersecurity, information security, cyber security, cryptocurrency, privacy
Matthew Rosenquist
Points
Academic
0
Author
352
Influencer
1994
Speaker
110
Entrepreneur
245
Total
2701
Points based upon Thinkers360 patent-pending algorithm.
Thought Leader Profile
Portfolio Mix
Company Information
Mercury Risk and Compliance
Chief Information Security Officer & Cybersecurity Strategist
United Cybersecurity Alliance
United Cybersecurity Alliance
July 02, 2021
I am honored to join the United Cybersecurity Alliance advisory board. This organization is focused to improve the cybersecurity industry by driving and celebrating equity, inclusion, and equality for a diverse workforce that possesses the skills to protect organizations and communities from cyber-attacks.
Cyber Security Initiative Strategic Council
Private Directors Association
December 22, 2020
I am very excited to join with esteemed cybersecurity colleagues on Private Directions Association’s (PDA) Cyber Security Initiative Strategic Council. Our charter is to drive timely and relevant communications to the board member community.
EC-Council International Advisory Board for CISOs
LinkedIn
May 20, 2020
I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals. The advisory board collaborates to share best practices, emerging challenges, and opportunities for CISOs to better protect their organizations in alignment with overall business goals.
Helping Academia Succeed So Cybersecurity Can Thrive
LinkedIn
April 10, 2020
Thrilled to announce that I am joining the Advisory Board for the University of Phoenix, College of Business and Information Technology! Academia plays a crucial role in fulfilling the staffing needs for the growing cybersecurity industry! We must all play a role to help prepare the next generation of professionals.
Matthew Rosenquist Joins the Eclipz Advisory Board to make the World of Connected Data More Secure
LinkedIn
September 04, 2019
It is my honor to join the Advisory Board of Eclipz; a cybersecurity innovator focused on securing data in transit, even on untrusted endpoints. Hardening digital communications from hackers and eavesdropping are crucial for security, privacy, and trust.
https://www.eclipz.io/
Matthew Rosenquist Joins the Advisory Board for the Techno Security & Digital Forensics Conference
LinkedIn
August 15, 2019
I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries. I strongly believe professionals should contribute to the growth of the field by influencing, sharing knowledge, connecting others and pursuing beneficial ideas for greater impacts.
https://www.technosecurity.us/ca/about-us/2020-advisory-board
Tags: Business Strategy, Cybersecurity, Leadership
Contributing to the SIA Education @ ISC Advisory Board
LinkedIn
May 30, 2018
I was just asked to extend my role as an Advisory Board member on the SIA Education @ ISC Advisory Board for an additional year.
SIA Education program at the ISC West security conference has grown into a respected resource for education in the industry, attracting over 1100 participants at ISC West 2018. I have enjoyed being part of this group for several years and thoroughly enjoyed presenting keynotes for the converged security event in 2016 and 2017.
Joint Task Force on Cybersecurity Education
NIST
December 31, 2017
The Joint Task Force on Cybersecurity Education (JTF) was launched in September 2015 with the purpose of developing comprehensive curricular guidance in cybersecurity education that will support future program development and associated educational efforts. The Curriculum Guidelines for Post-Secondary
Degree Programs in Cybersecurity was published in 2017.
Honored to Join the HMG CISO Advisory Board!
LinkedIn
September 12, 2016
I am excited to join the HMG CISO Advisory Board. I am humbled to be a part of this outstanding group of information security leaders. The HMG Strategy network provides c-suite executives the opportunity to experience global thought-leadership, a social community of face-to-face networking, access to a Research and Resource Center, and a number of summits around the country to bring together champions to secure the future of enterprises.
Tags: Business Strategy, Cybersecurity, Leadership
Brandeis University Graduate Professional Studies Advisory Board Member
Brandeis University
June 01, 2015
Matthew Rosenquist joined the Brandeis University Graduate Professional Studies (GPS) Advisory Board for Information Security Leadership, Committee for the Master of Science in Information Security, in 2015. Matthew has remained an active member of the board and will continue serving this important role through 2020 to help advise Brandeis in maintaining the very best graduate program to produce elite cybersecurity leaders.
Tags: Business Strategy, Cybersecurity, Leadership
115 Article/Blogs
Researchers Give Birth to the First GenAI Worm
Medium
March 04, 2024
Ben Nassi from Cornell Tech, Stav Cohen from the Israel Institute of Technology, and Ron Bitton from Intuit created the self-replicating worm and bestowed the name ‘Morris II’ after the notorious worm that infected systems in the 1980’s.
Biggest Challenge in Cybersecurity
Medium
June 28, 2022
Conveying the meaningful value of cybersecurity investments In the next few years, the biggest challenge in cybersecurity won’t be dealing with a specific threat, but rather conveying a meaningful value proposition..
Amazon Alexa to Mimic the Voice of Anyone
Medium
June 25, 2022
Ethical and Privacy issues abound. If a malicious actor combines an impersonated voice and deepfake video of a target, they can make others believe anything or harass them in unthinkable ways. We already have a..
US Sanctions Blender.io for Supporting Terror
Medium
May 10, 2022
US Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that obfuscates the origins of
How Cybersecurity Risks Must Be Fixed to Build Trust in Technology Innovation
Medium
April 28, 2022
Thanks to DynamicCISO for a great discussion about the changing landscape of cybersecurity and how we must all adapt to drive trust into the global digital ecosystem. The key to our success is to think ahead and show leadership in managing innovation for our benefit.
The Ugly Path to Avoid a War in Ukraine
Medium
February 03, 2022
Russian tanks may invade Ukraine before the ink is dry on this article, as part of maneuvers to undermine the independence of Ukraine. International negotiations are underway but nobody believes they will be effective. Everyone is fearful that a shooting war in Ukraine may escalate to war between nuclear superpowers. As an armchair strategist, I only see one narrow and rocky path that could avoid the unnecessary bloodshed and suffering while preserving the ability of Ukraine to determine its own future and prosperity.
Taxonomy of Cybersecurity Roles and Responsibilities
Medium
January 27, 2022
Dive into the ever-changing roles and responsibilities of the cybersecurity space with seasoned leader Deidre Diamond on this new episode of The Cybersecurity Vault. Learn about some of the industry’s recent and longstanding challenges and how to confidently manage the chaos.
Vlog — Why is Norton adding a cryptocurrency miner to their product and should we be worried?
Medium
January 19, 2022
Norton recently announced its Anti-Virus product will have a new feature that enables mining of Ethereum cryptocurrency for their customers, if they choose to participate. Is this a nice benefit for users or a reckless move to that increases overall cyber risks? …
Criminalizing Ransomware Payments
Medium
January 05, 2022
Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins on criminalizing ransomware payments and different approaches to undermine Ransomware attacks!
10 Cybersecurity Predictions for 2022
LinkedIn
December 30, 2021
Cybersecurity will continue to rapidly gain in both relevance and importance in 2022 as the world relies more upon digital technologies and unknowingly embraces the increasing accompanying risks of innovation. 2022 will see the rise of government orchestrated cyber-offensive activities, the growth of cybercriminal impacts at a national level, and the maturity of new technology used as powerful tools by both attackers and defenders.
Deficient Forethought for Digital Technology Risks
LinkedIn
December 30, 2021
Technology can be mesmerizing. We are all lured by the seemingly endlessly tantalizing stream of emerging technologies that promise to connect and enrich our lives. But there is a potential dark side. For every great innovative benefit, there are accompanying risks.
Privacy Concerns for Dual-Use AI Image Clarity Tools
Medium
December 15, 2021
AI tech is a powerful tool. The original photo (left) was cleaned-up with an AI deep learning algorithm (Image source: from Murilo Gustineli) and restoring tremendous clarity.
The problem of banning offensive technology sales
Medium
November 27, 2021
I like the concept of ‘banning’ the sale of offensive cyber weapons to potential adversaries, but what defines technology as offensive versus defensive?
New Ransomware Bill Shows Promise But is Undermined by a Limited Scope
Medium
November 16, 2021
A new bill has been proposed to address Ransomware. Congressman Patrick McHenry recently introduced the Ransomware and Financial Stability Act of 2021.
Video — Cybersecurity Value and Metrics with Gavin Gro
Medium
October 27, 2021
Measuring the true value of cybersecurity with Gavin Grounds, Executive Director of Information Risk Management and Cybersecurity Strategy at Verizon. Listen as we explore the benefit of security metrics that effectively quantify risk and how to best manage them.
Are Cybersecurity Labels on IoT Devices a Wasted Effort
Medium
October 05, 2021
The U.S. is exploring the idea to establish cybersecurity labels on IoT devices and software, in hopes it will both inform consumers of risks and motivate manufacturers to improve the security for the flood of new products entering the market.
4 Phases of Cybersecurity Maturity
Medium
September 16, 2021
Please click the Like button if you found this insightful and subscribe to the Cybersecurity Insights channel for more best-practices, rants, and strategic viewpoints. https://www.youtube.com/c/CybersecurityInsights
Disruption Looms as Workers Return to the Office
Medium
September 03, 2021
As the global disaster of our generation wanes and people begin to emerge from isolation, misaligned expectations about the future of remote work models start to appear. Surveys show that much of the workforce has enjoyed the benefits of working from home. Conversely, many employers are anxious to get employees back in the office and return to the traditional ways of engagement. Organizations are already experiencing the friction. Leadership must prevail to avoid serious business disruption. This may be the moment when Hybrid Working rises to become an accepted practice in the corporate world.
600 Million Differences Between Hackers and Cybercriminals
Medium
August 16, 2021
There are 600 Million Differences Between Hackers and Cybercriminals…
An amazing story is emerging from a massive cryptocurrency exploitation that exemplifies the difference between a ‘hacker’ and a ‘cybercriminal’.
Interested in more cybersecurity insights, rants, and strategic viewpoints?
The single most important tip for aspiring managers is to learn to be a good leader.
A manager is a functional role that ascribes responsibility for a team and an outcome. It is an organizational assignment that may or may not be based upon skills or a desire for responsibility. Managers often prioritize the pursuit of short-term goals and are willing to sacrifice team growth that is necessary for long-term success. A leader is someone who is well suited to support the individual team members and organize them for maximum benefit of achieving the goals. Leaders help individuals work together in optimal ways for the common objective and are often recognized by their outstanding sustainable results.
Received a 2021 Global Leadership Award
Medium.com
May 20, 2021
It is as beautiful as is it meaningful. My sincerest thanks to those who nominated and bestowed this award. It shows how thought-leaders and top executives are elevating their respect for the importance of cybersecurity within their organization and across the global digital landscape. I am proud to represent cybersecurity and accept.
Top Writer in Privacy by Medium
Medium
December 09, 2019
Honored to be named by Medium as one of the Top Writers in Privacy! Congrats to the entire list; a community that recognizes the importance and is actively championing the rights of privacy for all.
2019 ADA award for Outstanding Leadership in Protecting People’s Information
Adaptable Security
October 05, 2019
I am truly grateful for being recognized with a 2019 ADA award for Outstanding Leadership in Protecting People’s Information. Bestowed during the Cybersecurity Symposium for Smart Cities 2019, where a tremendous community came together to discuss the challenges, risks, and opportunities facing smart cities.
Why Trust in Digital Tech is the Key to Future Innovation - Hexcon21 Session by Matthew Rosenquist
YouTube
September 27, 2021
I was honored to speak at the Hexcon21 cybersecurity virtual conference this year and wanted to repost my presentation for all who did not get a chance to watch the life event.
I discussed why trust in digital technology is the key to sustain a future where digital innovation and adoption continue to thrive.
This year’s Hexcon21 Conference, attended by thousands, delivered insights, perspectives, and training for cybersecurity audiences.
Matthew Rosenquist speaking at the Intel Cybersecurity Education Workshop
YouTube
September 12, 2019
Intel's cybersecurity strategist Matthew Rosenquist speaks at the educators' workshop on the industry challenges and academic needs for the next generation of cybersecurity professionals. Cybersecurity is challenging and graduating students must possess an increasing set of skills and perspectives in order to be successful. Matthew Rosenquist covers the growing risks, changes, and aspects of the digital security industry and provides a plan on how it must evolve with the help of educators.
Tags: Cybersecurity, Future of Work, Risk Management
Make America Secure Again - Pitch Event
Inteligenca
May 23, 2019
Cybersecurity innovation at its finest! It was my pleasure to moderate and be a panelist at the Make America Secure Again event in Sacramento, where innovators pitched ideas to strengthen the security of America's digital voting systems.
Protecting our election infrastructure is crucial, yet security is lacking. Meaningful change starts with the spark of a great idea. California again shows how it can reach out to the pool of great innovators to seek a variety of solutions for cybersecurity challenges. We must all work together to find ways of managing cyber risks. Outreach and innovation is key.
The Verification of Truth: The Future of Digital Forensics and its Role in Cybersecurity
2019 Techno Security and Digital Forensics Conference
March 11, 2019
As the world embraces digital services and automation of critical systems, understanding risk, attributing actions, and deciphering attack methods will be crucial to the proliferation of connected technology. Trust is key, but transparency is greatly obscured. Forensics will grow to become the verification of truth and will play an ever-increasing role in understanding responsibility and controlling the dissemination of Fear, Uncertainty, and Doubt through actuarial data. Let’s explore the new areas, challenges, and opportunities for the bright future of digital forensics
Cybersecurity Risks and Recommendations – Where Your Focus Needs to Be
http://www.securitysystemsnews.com/blog/psa-tec-wrap
May 10, 2017
Technology convergence across cyber and physical security is driving change. Protection will evolve to include digital security, physical safety, and personal privacy.
How Cyber-Attacks are Changing the Expectations of Security, Privacy, and Safety
2017 ISC West conference
April 06, 2016
Cyber-attacks are an ever increasing problem that reaches out from the digital domain and into the physical world to impact the security, privacy and safety of people, businesses, and governments. The rapid growth of technology adoption and connectivity are driving new opportunities for attackers at an accelerating rate. The result is a radical shift in expectations by consumers and organizations for more comprehensive solutions, streamlined oversight, and clear accountability.
Diversity in Cybersecurity Education
2016 ICT Educator Conference
January 07, 2016
The cybersecurity industry needs more people with greater diversity to fill the growing number of open positions. Intel is very active with internal corporate diversity efforts, establishing strong pipelines, and investing in diverse partners. Additionally, Intel is contributing to the formalization of cyber science degree standards to align educational programs to market demands.
Future of Offensive Attack Simulation: Strategies, Tools, and Techniques
CISO Platform
November 24, 2020
In our recent Fireside chat episode in association with FireCompass, between Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, we discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds.
2020 Cyber Innovators Summit: Future Threat Panel
The Cyber Institute YouTube Channel
October 31, 2020
Future Cybersecurity Threats In 2021 & Beyond. Matthew Rosenquist, the Chief Information Security Officer (CISO) for Eclipz.io, a Cybersecurity Strategist, and an industry advisor speaks at the 2020 Cyber Innovators Summit's Future Threat panel.
The Role of Cyber Culture in a Cyber Strategy
RightHand Cybersecurity
October 29, 2020
Watch the recorded webinar "The Role of Cyber Culture in a Cyber Strategy". John (Jack) Roehrig, CISO at Turnitin, and Matthew Rosenquist, CISO and Cybersecurity Strategist at Eclipz.io, share insights on how to incorporate Cyber Culture as part of an organization's Cyber Strategy.
Podcast: From Reactive To Proactive — The Evolution Of Security And Of The CISO Role | With Matthew Rosenquist
ITSP Magazine
September 16, 2020
EPISODE SUMMARY
Once upon a time —not that long ago—the Information Security field had no rules, definitions, tools, or framework, and it was a new frontier to be discovered and conquered. Now, looking back, we sure have come a long way.
The Only 2 Kinds of Cybersecurity Victims
Innovation Nation Podcast
August 11, 2020
We’re all working from home not thinking about cybercriminals at all.
They’re thinking about us, though.
In this very first episode of Innovation Nation, I interview Matthew Rosenquist, CISO at Eclipz.io, about cybercrime in the time of COVID-19.
What we talked about:
Hardware vs. software vs. wetware (people)
We’re vulnerable during quarantine not because technology but our behaviors
Cybersecurity issues that SMBs need to consider with IOT
Security fears that we have & education that we need
What's next in Cybersecurity - and how SMEs can protect themselves - Episode #20
TÜV SÜD Safety First podcast
July 31, 2020
In this episode, Matthew Rosenquist, an internationally renowned US-American cybersecurity expert, shares his views on the new normal in cyber security with a special look at SMEs. All too often they are still an easy target for attackers. But with a few basic measures they can protect themselves more effectively. And this is not primarily a question of expensive IT technology.
Crucial Tech, by Lou Covey - Matthew Rosenquist talks ethics, facial recognition and the potential benefits of AI
Crucial Tech
July 06, 2020
Matthew Rosenquist talks ethics, facial recognition and the potential benefits of AI. He provides an optimistic view of AI ethics and facial recognition, but we are still further than some might think from a successful deployment in the west.
'Cyber Risk Leaders' Tell All @ The Global Virtual Book Club EP 2
YouTube
May 29, 2020
Join Carmen Marsh, CEO of Inteligenca, and 'Cyber Risk Leaders' Author, Shamane Tan as they sit down with featured Cyber Risk Leaders from the book to discuss current cyber security challenges and share from their industry experiences.
In this episode, we meet with Matthew Rosenquist, CISO at Eclipz.io Inc in California who will be talking about the Artificial Intelligence's impact on Cyber Security Strategy.
AI is a tremendously powerful tool that is evolving at a ridiculous rate and being leveraged by both cyber attackers and defenders. It will radically change the cybersecurity strategies that protect our digital world.
Cybersecurity Issues and Trends - Interview with CybxSecurity
CybxSecurity.com
March 24, 2020
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybersecurity.
The Entanglement of AI and Cybersecurity Podcast
linkedin
March 10, 2020
The boundaries of cybersecurity will be manipulated by the advances in Artificial Intelligence, the evolution of digital threats, and on ever-adapting leadership.
I had a great time being interviewed by Vaishali Lambe [Lisha] in her podcast SoLeadSaturday because we talked about how cybersecurity and AI are intertwined, how leadership is crucial, and the fact that technology tools are being used for both good and malicious purposes. The growing demands for a security-savvy workforce led us to explore the vast opportunities in the field. Emerging factors magnify the interesting swirls of competing challenges. To cap the discussion, we visualized the future of the industry and discussed the risks.
Past and Future Challenges for Security: ThinkTech Interviews Cybersecurity Strategist Matthew Rosenquist
ThinkTech: Hawaii
December 10, 2019
A look back at some of the missteps in 2019 across the convergence of cyber and physical security, with discussions on what challenges are ahead for the next year.
Thanks to Andrew Lanning for hosting me as a guest on the ThinkTech livestream show! Great questions and unscripted dialog about the evolving risks and opportunities of Artificial Intelligence, privacy, cybercrime, automation, and connected devices. Security matters!
Thinkers360 Predictions Series – 2020 Predictions for Cybersecurity
Thinkers360
November 25, 2019
Having recently published our Top 50 Global Thought Leaders and Influencers on Cybersecurity, we asked a selection of our Thinkers360 global influencers about their predictions for Cybersecurity in 2020. Here’s what they told us…
Tags: Cybersecurity, Digital Transformation, Predictive Analytics
Humans, complacency, ignorance delay AV deployment
EEWeb
November 05, 2019
We have a long way to go before we see autonomous vehicles on the roads in any number
Is the autonomous vehicle (AV) going to be widely distributed in our lifetimes? Sure, just as soon as you eliminate human involvement, complacency and ignorance (was that repetitive?) from development. Until then, AVs are just going to be a rarity on the roads.
Winning the security fight: Tips for organizations and CISOs
HelpNetSecurity
October 09, 2019
For large organizations looking to build a robust cybersecurity strategy, failure to get the fundamentals in place practically guarantees a disaster. If you ask Matthew Rosenquist, a former Cybersecurity Strategist for Intel (now independent), overcoming denial of risk, employing the right cybersecurity leader, and defining clear goals are the three most critical objectives for avoiding a negative outcome.
In this episode of the SuperDataScience Podcast, I chat with Matthew Rosenquist, one of the top leading world experts in the space of cybersecurity. You will learn what balance in cybersecurity means and what the dark web is. You will hear how Matthew's career developed and how he thinks about the strategy of cybersecurity. You will also learn about the valuable role of data science in cybersecurity and the steps you can take to get into this space.
If you enjoyed this episode, check out show notes, resources, and more at www.superdatascience.com/273
Evolving Risks of Cybercrime with Matthew Rosenquist
podcasts.apple.com
June 07, 2019
The Innovators Behind DISRUPTION - Episode 27 by Evolve ETFs
Evolving Risks of Cybercrime with Matthew Rosenquist
- Growing systemic challenges in cybersecurity
- How the public sector can protect itself from cybercrime
- The NSA and its role in the recent Baltimore ransomware attack
- Opinions on Baltimore’s decision not to pay their cyber attackers
- CEOs recognizing cybersecurity as a major business risk
- Cybersecurity demand and spend
- Government concerns about cyber threats
- Advice on how to protect yourself from cyber attacks
Don't trust a company to keep you safe
Podcasts.apple.com
March 12, 2019
Interview of Matthew Rosenquist, Cybersecurity Strategist. Podcast by Lou Covey
A range of topics, including nation state attacks, data breaches, ransomware, Artificial Intelligence, dark web, and the perception of perfect security
Impact of Cyber Threats to the Global Entrepreneurship Ecosystem
Medium
March 14, 2023
It was my honor to contribute to a truly great panel discussing how cybersecurity impacts entrepreneurs and innovation around the globe. It is a must-watch for those building or growing businesses!
Video Replay — Closing the Cyber Skills Gap Panel Discussion
Medium
November 05, 2021
The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. …
2021 HMG Strategy Silicon Valley CISO Executive Leadership Summit
HMG Strategy
March 18, 2021
This panel will be discussing the #solarwinds breach, specifically the residual after-effects. Our #cybersecurity industry is going to shift again! Don't miss it.
March 18th 10am-1pm Pacific time
Executives only, attendance is free
Register here: https://lnkd.in/gjszR-p
The Role of Cyber Culture in a Cyber Strategy
RightHand Cybersecurity
October 26, 2020
In an effort to evangelize October's Cybersecurity Awareness Month, join us on Wednesday, 28 October at 10AM PST to hear from Cybersecurity leaders on the importance of incorporating Cyber Culture as part of your organization's Cyber Strategy, and best practices to effectively do so.
Cybersecurity & IoT Showcase 2020 Panel Discussion: Why Sacramento is Ripe to be a Cybersecurity Hub
StartupSac
October 20, 2020
The panel discussion, Why Sacramento is Ripe to be a Cybersecurity Hub, was a lively and engaging discussion. Moderated by Carmen Marsh and featuring Malcolm Harkins, Matthew Rosenquist, and George Usi, the panel discussed a broad range of topics including:
Why would someone pick Sacramento to start a cybersecurity product or services company?
What advice would you give an aspiring entrepreneur looking for innovative ideas? Suggestions about the roadmap for innovators
Where should cyber startups look for business opportunities/ projects?
Where can people find resources to get started or to find support for their ideas?
Where can they find mentors?
Where to look and find a skilled workforce?
HMG Live! Silicon Valley CISO Executive Leadership Summit
Uptrennd
September 29, 2020
The CISO summit was a great virtual conference with insightful speakers. I had the pleasure of moderating the "Securing the Future of Work" panel, which begins at 1:43:34, with Rahul Kashyap CEO Awake Security, Lamont Orange CISO Netskope, and Laura Whitt-Winyard, CISO DLL Group.
The panel of experts shared their advice on how CISOs can drive success in securing the future of work. We discussed the challenges, valuable steps forward, and the greatest opportunity CISO should pursue.
Expert Panel Discusses Cybersecurity in the New Normal
CISO Platform
June 10, 2020
Watch panelists Chris Roberts, G. Mark Hardy, and Matthew Rosenquist at VShield 2020
I had the honor to be on a distinguished panel with the incredibly knowledgeable G. Mark Hardy and the infamous white-hat hacker Chris Roberts. We discussed the evolution of cyber resilience, agility, and innovation in these troubling times.
Watch the panel as we discuss the following topics:
- Is Covid-19 a turning point for cybersecurity?
- Are Insider Threats increasing with the shift to remote workforces?
- Are trusted employees still the greatest threat? How can security help improve employee behaviors?
- Privacy: is it a government, business, or societal problem? What is the responsible approach? Should tech companies be compelled to unlock user devices, build-in backdoors, or use weak encryption algorithms?
- Are Bug Bounty programs good or evil for technology?
- How important is IoT security? Are the emerging risks being addressed or ignored across transportation, critical infrastructure, and government agencies?
- Nation States – will the cold war intensify?
- How will hardware and firmware insecurity for critical infrastructure play out? Where are the risks?
- What are the most important emerging topics in cybersecurity!
VShield 2020 Cybersecurity Conference
Medium
May 20, 2020
I have the honor of being on the Cyber Resilience, Agility and Innovation in the New Normal panel with the distinguished and infamous G.Mark Hardy and Chris Roberts. We will be discussing a wide range of cybersecurity topics that impact every digital citizen on the planet!
Modern Successful SOC & Artificial Intelligence round-table
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
It was my honor to lead a round-table of superstars at the Cybersecurity Symposium for Smart Cities 2019. Talking about how cryptocurrency has become the economic vehicle of choice by cybercriminals and how the emerging AI revolution can both aid Security Operations, but also enhance the threats.
The digital revolution is an arms race where we must all work together to keep pace with the evolving attackers. A truly outstanding discussion with this group of luminaries and terrific audience participation!
Thanks to Sabrina Yuan Co-Founder & COO of SecuritAI, Joanna Hu Data Science Manager at Exabeam, and Dr. Victor Fang Founder and CEO of AnChain.ai
Shared Pain Points & Opportunities for Secure Smart Cities
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
Had a great time moderating a smashing panel at the Cybersecurity Symposium for Smart Cities 2019. Great insights from our CIO’s, standards, and best practices experts in identifying critical aspects for cities! Much thanks to Linda Gerull, Liza Massey, Olaf Gerd Gemin, and Jerry Cox
Tags: Cybersecurity, Digital Transformation, Smart Cities
Ransomware: The Not-So Good, Really Bad, and Truly Ugly!
SecureWorld
August 18, 2018
RECORDED LIVE ON AUGUST 28, 2018 — WATCH ON-DEMAND
Ransomware is spreading at an alarming pace and infecting networks across all industries and company sizes, primarily through phishing attacks. The cyber criminals behind the attacks are furiously innovating and keeping ahead of defenses. In this web conference, we will have an interactive discussion on the latest in ransomware threats and how to best protect your organization and yourself against this growing threat.
This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also cover recent attacks and how the victim organizations could have better protected themselves.
The session will examine:
• Current phishing trends
• Ransomware and how it is infecting networks
• Effective mitigation strategies
• Recovering from an attack
Harnessing Cyber-Physical Security Technologies
Cyber: Secured Forum (cybersecuredforum.com)
June 05, 2018
A great panel discussion, led by Ray Coulombe of Security Specifiers, with Donal Keating from Microsoft and Jeff Crume of IBM. As the audience is a strong mix of both physical and cyber security professionals, we will discuss how the convergence of technology across both domains will rapidly change to open up new opportunities and risks. Expect topics around Internet-of-Things (IoT), Artificial Intelligence (AI), and blockchain to be discussed by the panel and open questions from the audience.
Hardware-generated dynamic identifier
US Patent Office
June 29, 2017
In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.
The Silent War on Digital Privacy with Andy Brown
Medium
September 02, 2021
The Cybersecurity Vault, Episode 1 — With the growing influx of sharable personal data and the power it holds in the lives of consumers and companies alike, is it possible to create a digital space that exchanges and protects data while still holding true to values of equity, privacy and accountability? Andy Brown, CEO at Sand Hill East, joins us this week in our quest to answer this question and unpack the potential for good that powerful new digital tools pose along with the dangers of their misuse.
Good Data Morning Show — LIVE!
Medium
March 02, 2021
Looking forward to discussing emerging cybersecurity challenges on the Good Data Morning Show, LIVE on LinkedIn and YouTube! April 2nd 11am ET (8am Pacific)
How safe are we in the digital world as an individual and as a company?
Can Google’s New AI Ethics Service Be Of Any Help?
Analytics India Magazine
September 03, 2020
With biases in algorithms becoming a prime concern for companies, Google’s cloud division has come out with their new AI Ethics Services for helping in AI solutions. Planning to launch it by the end of this year, the tech giant, according to the news, will be offering its AI ethics services to companies who are working on AI projects.
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Apress Open
January 01, 2020
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
Authors quote Matthew Rosenquist which reference the cybersecurity goals of organizations are to find a balance between risks, costs, and user experience.
Wireless Health: Remaking of Medicine by Pervasive Technologies
AuthorHouse
November 01, 2014
This book teaches the fundamental and practical knowledge necessary to advance wireless health technology and applications.
Author cites a paper of combined work from David Houlding, Tim Casey and Matthew Rosenquist "Improving healthcare Risk Assessments to maximize Security Budgets" Feb 2012
Cyber Security Sauna podcast — Matthew Rosenquist on why value is the cybersecurity blind spot
Medium
September 13, 2022
I had a great time talking with Janne Kauhanen in the Cyber Security Sauna podcast, talking about why Value is the blind spot of cybersecurity and how we should maximize it!
HMG Live! CISO Virtual Summit
Medium
August 20, 2020
Mark your calendars. The HMG Live! Silicon Valley CISO Virtual Summit, on Aug 25th 10am Pacific, is a conference for #cybersecurity professionals interested in the latest perspectives on the shifting risks and opportunities of future business
Evolving Risks of Cybercrime with Matthew Rosenquist podcast
https://evolveetfs.com/podcasts/
June 07, 2019
Interviewed by Raj Lala, the CEO at Evolve ETFs in his podcast The Innovators Behind Disruption. In the
"Evolving Risks of Cybercrime with Matthew Rosenquist" episode, we covered a number of interesting topics, including the growing challenges in cybersecurity, rise in cybercrime, challenges of ransomware, what governments are worried about, and how to protect yourself.
The True Cost of Data Breaches - Not Just a Dollar per Record
CyberEd.io
March 22, 2016
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party forensic services, changes to business processes, as well as a loss of reputation and customer goodwill.
There is a complex set of chain reactions which occur after every significant data breach, each adding its own contribution to the overall cost and business impact.
In this session we'll discuss some real-world experiences regarding data breaches, how the costs exceed the typical dollar-per-record measure, and how organizations are adapting to learn from their experiences. We will also examine what the future holds, as attackers adapt and shift towards new data manipulation methods.
Upgrading to an APT-Capable Defense: Where To Start, How To Get Funding And See Immediate Reduction In Risk
Cybered.io
February 26, 2016
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In this session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real-world deployments and learn how to gain executive sponsorship of the program as a whole, to build momentum and help guarantee success.
Cyber Attacks Are Increasing Against Critical Infrastructure
Medium
December 26, 2022
The Critical Infrastructure sectors, 16 in total that are the foundation of a country and economy to operate, are coming under more pressure from cyber-attacks. The trend will not subside because of who is behind these sinister attacks!
Is Russia Testing the Waters in Cyberattacks Against the US
Medium
October 12, 2022
Russian cyberattacks are targeting government and now airlines websites. These are part of the US Critical Infrastructure. The cybersecurity attacks are weak at the moment, but may quickly escalate.
Russian Failures in Ukraine Raise the Global Cyber Risks
Medium
September 28, 2022
As Putin’s war on Ukraine reveals stunning failures of Russian forces, the embarrassed leader becomes more desperate. This has ramifications on the overall global security of digitally connected systems, potentially affecting all of us.
Ukraine Counteroffensive Success Will Spur More Cyberattacks From Russia
Medium
September 14, 2022
As Ukraine makes significant gains over Russia as part of their counteroffensive, we must expect Putin to respond to the embarrassment in many petty ways, including leveraging cyberattacks against countries that have been supplying and supporting Ukraine.
Albania Expels Iranian Diplomats Over Cyber Attack
Medium
September 12, 2022
Albania has expelled Iranian diplomats and severed diplomatic relations with Iran because of cyberattacks from the Iranian Intelligence Agency that targeted government services and websites. Such an icy diplomatic response has never happened before and it may open the door as a precedent for how many countries will respond to future nation state attacks.
HexCon22 — Two Cybersecurity Value Aspects You Are Missing
Medium
September 02, 2022
I am excited to be speaking at HexCon22 about how CISO’s must improve their ability to showcase relevant outcomes and quantify cybersecurity value in ways that align to the overall business goals of the organization!
Lloyd’s New Cyber Insurance Exclusions Aim to Avoid Payouts from Nation State Hacks
Medium
August 22, 2022
The recent announcement by the insurance giant Lloyds of London, may be the biggest cybersecurity news of the year. It might not seem all that relevant, but strategically, this will likely shift the entire industry and politics of cybersecurity.
3 Tips to Maximize Cybersecurity Value
Medium
July 11, 2022
Delivering maximum value is a momentous challenge for cybersecurity organizations. It takes a decisive effort to organize and prioritize the proper goals that are meaningful to the business, and establish operational excellence to deliver effectiveness and efficiency. But running a good risk program that manages the defensive posture by addressing internal vulnerabilities is not enough. There are external factors that have a profound impact on the likelihood of attack and business factors that matter to the executive suite which could represent a competitive advantage to the corporate bottom line.
Value is the Cybersecurity Blind Spot
Medium
May 16, 2022
The industry currently suffers from a weakness to understand, align, and showcase its maximum potential value, which extends beyond managing digital risks and often includes non-traditional competitive advantages which contribute to the overall business goals.
Announcing 2022 Cybersecurity Predictions
Medium
January 16, 2022
2022 will be a very tumultuous year for cybersecurity professionals. The underlying fundamentals that drive major shifts of the cybersecurity industry — technologies, threats, and economic factors, will introduce new risks and combine to significantly increase the relevance and challenges of protecting digital assets and capabilities.
Growing Cyber Risks of Firmware with Scott Scheferman
Medium
December 22, 2021
Firmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers. In today’s Cybersecurity Insights podcast, I am talking with Scott Scheferman about the growing cybersecurity risks of firmware that could undermine most of the security controls in computer systems.
International Coalition Fails to Address Ransomware
Medium
October 20, 2021
U.S. leadership organized a meeting with over 30 nations to figure out how to address the growing problem of ransomware. The results were unimpressive, lacking the bold innovation needed to stem the meteoric rise of ransomware that is targeting businesses and the critical infrastructure that citizens depend upon for security, health, services, and prosperity.
The Next Big Data Breach You Need to Know About
Medium
October 13, 2021
The Syniverse hack may be the most important data breach of the year!
Hackers had access for 5 years and potentially compromised hundreds of billions of SMS text messages, likely including 2nd Factor Authentication codes that protect logins and are used to reset passwords.
Why Trust in Digital Tech is the Key to Future Innovation
Medium
September 29, 2021
I was honored to speak at the Hexcon21 cybersecurity virtual conference this year and wanted to repost my presentation for all who did not get a chance to watch the live event.
I discussed why trust in digital technology is the key to sustaining a future where digital innovation and adoption continue to thrive.
Cybersecurity Progresses from Mitigating Risks to Deliver Profit Opportunities
Medium
September 08, 2021
Cybersecurity is breaking out from just preventing risk of loss! Forward thinking companies are showing leadership by leveraging cybersecurity capabilities to contribute to market position and profitability opportunities. In today’s video I cover some of the ways cybersecurity is being leveraged for the bottom line.
Rohit Parchuri on the Challenges of Securing Future Healthcare
Medium
September 03, 2021
The Cybersecurity Vault — Episode 2 — The risks and opportunities of securing data are shifting rapidly for the healthcare industry. Rohit Parchuri who serves as the CISO for Collective Health Security, discuses the rapidly changing challenges in healthcare that will affect every American.
Anti-Money Laundering Detection Tool on the Dark Web
Medium
August 24, 2021
A new tool is gaining popularity on the dark web which provides insights to users if their cryptocurrency activity might be flagged by authorities as potentially illicit. Such a tool can provide cybercriminals the intelligence necessary to stay under-the-radar of law enforcement. Conversely, the tool may help law enforcement understand how to shift their threshold to catch those who are looking to evade detection!
Arguments Against Criminalizing Ransomware Payments
Medium
August 11, 2021
The goal is to effectively end ransomware as a significant cybersecurity risk for everyone. In exploring the different strategic options, one path has emerged superior, in which the flow of money to the ransomware attackers is essentially stopped. The only way to make that happen consistently is to compel the victims to not pay by making it a criminal act. However, not everyone agrees.
Why REvil Ransomware Group Suddenly Disappeared
Medium
July 20, 2021
The notorious REvil ransomware cybercriminal group suddenly disappeared without explanation, spurring lots of speculation in the cybersecurity community. In this week’s video, we go over the results of a recent poll among security professionals that revealed what they believed was behind the REvil’s disappearance and if they will be back.
Ransomware Explained — Ending Ransomware
Medium
July 16, 2021
Stopping ransomware from being an impactful menace is the grand goal, but what are the specific criteria for success we should be striving for? Without clear objectives, we are often consumed with trivial aspects and never attain the desired end-state.
Ransomware Explained — 3 Fundamental Ways to Stop Cyberattacks
Medium
July 07, 2021
There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part series on Ransomware. The series is free on the Cybersecurity Insights YouTube Channel.
Ransomware Explained Video Series
Medium
June 09, 2021
Ransomware is a rising threat to every organization, device, and person connected to the Internet. All the products, services, and critical infrastructures are at risk of being victimized. We are all being impacted by this type of cybercrime and it is only the beginning.
Future of Offensive Attack Simulation: Strategies, Tools & Techniques
Medium
November 18, 2020
A hack is executed every 39 seconds and impacts one in three Americans every year.
Join us in the discussion on Future of Offensive Attack Simulation: Strategies, Tools & Techniques with Bikash Barai and Matthew Rosenquist
Firmware: How Risk Executives Are Managing New Threats to the Foundation of Computing
SINET
October 26, 2021
Gartner advises there are 15-20 firmware components in every endpoint, 20-30 components in every server, and is present as the “digital DNA” in every networked and connected device. Is there an emerging trend where Cybersecurity Risk Executives and threat teams are moving from traditional views of firmware as a ”black box”, specified and constructed by vendors in a vacuum and beyond scope of their assessments and mitigation techniques? Are attackers turning to firmware-based exploits and if so why? Off-the-shelf boot-level attack kits are readily available and UEFI-level tactics are being shared in dark web forums that can go unnoticed by traditional vulnerability, risk and end endpoint security programs. During this session we will discuss the apparent collision between new firmware-oriented attack vectors and traditional Cybersecurity tools, roles and boundaries.
The Next Disruption: Hybrid Working
HMG Strategy
June 10, 2021
When the pandemic hit, many of our lives were turned upside down, including how we work and how we live. Almost all face-to-face encounters are now being substituted by virtual communication with many of us doing our work at our kitchen table. We went through this dramatic shift in all areas of our lives at once – everything pivoted to a remote-first environment and for many of us this was a sudden and dramatic change. Zoom is looking at this stage as Building Forward with Confidence and we are working with clients to take what we knew worked pre-pandemic combined with what we learned during the pandemic and hopefully use that as a model building forward. Now we are looking at a second disruption: A reorganization of how we work, where we work from and when we work. What is that going to look like? How are the changes we created to continue our lives during the pandemic going to evolve? Please join us for a panel discussion with Gary Sorrentino, Zoom Global Deputy CIO and other C-level technology leaders on how we can all prepare for this next shift how we work.
Tags: Digital Disruption, Leadership, Future of Work
Webinar: The Role of Cyber Culture in a Cyber Strategy
YouTube
October 29, 2020
Watch the recorded version of the webinar "The Role of Cyber Culture in a Cyber Strategy". Our guest speakers Jack Roehrig, CISO at Turnitin, and Matthew Rosenquist, CISO at Eclipz, shared great insights on how to incorporate Cyber Culture as part of your organization's Cyber Strategy, and best practices to effectively do so.
Tags: Cybersecurity, Management, Business Strategy
3 Whitepapers
McAfee Labs 2017 Threats Predictions
McAfee
November 30, 2016
McAfee Labs explores top threats expected in the coming year.
Welcome to the McAfee Labs 2017 Threats Predictions
report. We have split this year’s report into two sections.
The first section digs into three very important topics,
looking at each through a long lens.
The second section makes specific predictions about
threats activity in 2017. Our predictions for next year
cover a wide range of threats, including ransomware,
vulnerabilities of all kinds, the use of threat intelligence
to improve defenses, and attacks on mobile devices.