Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Matthew Rosenquist

Cybersecurity Strategist at Intel Corp

Folsom, United States

995 Followers

Cybersecurity strategist that actively works with the industry to identify emerging risks and opportunities.  Formerly the Cybersecurity Strategist for Intel Corp. with 28 years in the security field. An active keynote speaker at industry events, member on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry across business, academia, and governments sectors.  Publishes blogs, whitepapers, and develops industry methodologies.  Was named as a Top 10 Technology Voice in 2018 by LinkedIn and has a very active following of over 180k professionals.   

Matthew is experienced in building world class teams and capabilities, managing security operations, and evangelizing best-practices to the market.  He advises boards, executives, industry groups, tech companies, consumer audiences, and the media on the risks and relevance of cybersecurity issues and how to achieve an optimal level of security.

Available For: Consulting, Influencing, Speaking
Travels From: Sacramento CA
Speaking Topics: cybersecurity, information security, cyber security

Matthew RosenquistPoints
Academic0
Author46
Influencer36
Speaker46
Entrepreneur140
Total268

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Business Unit: Technology
Media Experience: 10 Years

Areas of Expertise

AI 32.14
Analytics 32.90
Big Data 30.23
Cryptocurrency 34.67
Customer Experience 30.17
Cybersecurity 67.24
Digital Transformation 30.30
Emerging Technology 30.79
Fintech 30.85
HR 30.50
Innovation 35.51
IoT 32.30
Leadership 39.57
Privacy 34.15
Risk Management 35.90
Govtech 33.44
Startups 35.27
Future of Work 30.57
Social 30.10
Business Strategy 40.43
Edtech 41.67

Industry Experience

Consumer Products
High Tech & Electronics
Higher Education & Research
Professional Services
Retail

Publications

5 Advisory Board Memberships
Matthew Rosenquist Joins the Eclipz Advisory Board to make the World of Connected Data More Secure
LinkedIn
September 04, 2019
It is my honor to join the Advisory Board of Eclipz; a cybersecurity innovator focused on securing data in transit, even on untrusted endpoints. Hardening digital communications from hackers and eavesdropping are crucial for security, privacy, and trust.
https://www.eclipz.io/

See publication

Tags: Business Strategy, Cybersecurity, Startups

Matthew Rosenquist Joins the Advisory Board for the Techno Security & Digital Forensics Conference
LinkedIn
August 15, 2019
I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries. I strongly believe professionals should contribute to the growth of the field by influencing, sharing knowledge, connecting others and pursuing beneficial ideas for greater impacts.
https://www.technosecurity.us/ca/about-us/2020-advisory-board

See publication

Tags: Business Strategy, Cybersecurity, Leadership

Contributing to the SIA Education @ ISC Advisory Board
LinkedIn
May 30, 2018
I was just asked to extend my role as an Advisory Board member on the SIA Education @ ISC Advisory Board for an additional year.

SIA Education program at the ISC West security conference has grown into a respected resource for education in the industry, attracting over 1100 participants at ISC West 2018. I have enjoyed being part of this group for several years and thoroughly enjoyed presenting keynotes for the converged security event in 2016 and 2017.

See publication

Tags: Business Strategy, Cybersecurity, Edtech

Joint Task Force on Cybersecurity Education
NIST
December 31, 2017
The Joint Task Force on Cybersecurity Education (JTF) was launched in September 2015 with the purpose of developing comprehensive curricular guidance in cybersecurity education that will support future program development and associated educational efforts. The Curriculum Guidelines for Post-Secondary
Degree Programs in Cybersecurity was published in 2017.

See publication

Tags: Cybersecurity, Leadership

Honored to Join the HMG CISO Advisory Board!
LinkedIn
September 12, 2016
I am excited to join the HMG CISO Advisory Board. I am humbled to be a part of this outstanding group of information security leaders. The HMG Strategy network provides c-suite executives the opportunity to experience global thought-leadership, a social community of face-to-face networking, access to a Research and Resource Center, and a number of summits around the country to bring together champions to secure the future of enterprises.

See publication

Tags: Business Strategy, Cybersecurity, Leadership

28 Article/Blogs
AI Based Defensive Systems Impact on Cybercriminal Strategy
PenTest Magazine
November 08, 2019
Good guys are working at a fever pitch to create pre-emptive adversarial attack models to find AI vulnerabilities. But threat actors are working just as fast to develop threats and have the resources (aka money) to build powerful cyber weapons. Who will win this race against time?

Some of California’s top security minds came together during National Cybersecurity Awareness Month to discuss the role of Artificial Intelligence (AI) in cybersecurity. Leading experts from both the private and public sectors joined our Inteligenca Cyber Salon to discuss both the promise and concern about AI. No doubt we heard during this talk that AI is controversial.

See publication

Tags: AI, Cybersecurity, Risk Management

Hacking Phones: How law Enforcement is Saving Privacy
DarkReading
October 30, 2019
In the battle between privacy and security, technology can bridge the gap allowing a healthy balance. We must not fear technology, but rather purposefully wield it in better ways with clear goals of benefits and limitations for abuse.

Here is my latest article, posted on Dark Reading, discussing one such path that may raise concerns with privacy advocates at first glance, but could result in a strategic win for everyone's privacy and security, except criminals.

See publication

Tags: Cybersecurity, Govtech, Privacy

Major Drone Attack Against Global Oil Production Showcases Weak Cybersecurity Thinking
LinkedIn
September 16, 2019
We are entering a new era for conflict that brings with it a synthesis of cyber and physical security that increases global safety risks. Attacks with connected technology, Internet-of-Things (IoT) devices, and Industrial IoT components are ramping up, now attaining levels with serious consequences. The cybersecurity industry is not prepared. It is time we revisit the deeper discussion of converged cybersecurity!

See publication

Tags: Cybersecurity, Digital Transformation, IoT

Criminals Luring in Bitcoin Sellers to Launder Money
LinkedIn
September 13, 2019
With the lure of big cash rewards, cybercriminals are luring-in the bitcoin community to become money laundering mules. This does not end well for anyone except the criminals.

See publication

Tags: Cryptocurrency, Cybersecurity, Social

Matthew Rosenquist Joins the Eclipz Advisory Board to make the World of Connected Data More Secure
LinkedIn
September 04, 2019
I am excited to announce that I am joining the Advisory Board of Eclipz! Such a great team working to make the connected world of data more secure across devices, services and even between untrusted endpoints.

See publication

Tags: Cybersecurity, Emerging Technology, Startups

NATO’s Collective Defense for Cyber Attack Remains Fragile
LinkedIn
September 03, 2019
NATO is far from implementing "collective defense"​ for cyber-attacks. Much work is still to be done before Article 5 is an effective deterrent.

See publication

Tags: Cybersecurity, Govtech, Leadership

Cryptocurrencies Should be Enabled to Blacklist Criminal Holdings
LinkedIn
August 28, 2019
Cryptocurrencies like Bitcoin are heavily targeted and exploited by cybercriminals. There may be something that can be done to assist law enforcement in revocating illicit assets, aid victims, and still preserve the fierce independence autonomy of public blockchain cryptocurrencies.

See publication

Tags: Cryptocurrency, Cybersecurity, Innovation

Do Not Pay Ransomware – A Lesson for Municipalities
Medium
August 19, 2019
Ransomware is getting worse, in part because victims are paying. Poor decisions of certain municipalities is having an impact on their peers. Stop paying criminals! They will be back, stronger than before.

See publication

Tags: Cybersecurity, Govtech

Joining the Advisory Board for the Techno Security & Digital Forensics Conference
LinkedIn
August 15, 2019
I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries.

See publication

Tags: Cryptocurrency, Cybersecurity, Digital Transformation

Binance Cryptocurrency Exchange Refuses to Pay Blackmailers Over a Possible Data Breach
LinkedIn
August 08, 2019
A blackmailer attempted to extort $3.5 million from the Binance cryptocurrency exchange, stating they would release confidential KYC (Know Your Customer) data. Binance has refused to pay the demands and is working with law enforcement to track down the cyber criminals.

See publication

Tags: Cryptocurrency, Cybersecurity, Privacy

Insider Threats in the Digital World are Sinister
LinkedIn
August 07, 2019
The compromise of AT&T is another example of the serious risks posed by insider threats. In this case an external attacker leverages the access and authority of internal people through bribes. Especially in digital environments, trusted insiders have incredible potential to do harm, cause disruption, and undermine trust. They are the submerged part of the cyber risk iceberg that we all must deal with.

See publication

Tags: Cybersecurity, Risk Management

Does Home Depot Respect Customer Privacy?
LinkedIn
July 29, 2019
Raising an issue with the privacy practices at HomeDepot. Why are they unnecessarily gathering personal information of its customers? A privacy savvy community should raise and amplify such issues to drive change.

See publication

Tags: Customer Experience, Cybersecurity, Privacy

Cryptocurrency Exchanges are Cyber Hackers Next Targets
LinkedIn
July 22, 2019
Where will online criminal hackers look next? Cryptocurrency. There are already hacks going on, but this will ramp up significantly as some of the more highly competent criminals are targeting cryptocurrency exchanges.

See publication

Tags: Cryptocurrency, Cybersecurity, Risk Management

Top 10 Things You Should Be Doing to Protect from Cyberattacks
LinkedIn
July 15, 2019
I get asked all the time for a quick answer to the question “How can I protect myself from getting attacked online?”. The simplified answer is to follow these Top 10 best practices.

See publication

Tags: Cybersecurity

Fight for Digital Privacy Rights Continue in Tech-Focused California
LinkedIn
June 27, 2019
The tech heartland of California is the latest battleground for privacy rights. Big tech companies are fighting to dilute upcoming legislation that will require more privacy protections. But is it enough? No! We need even better protections, accountability, and transparency of how our personal data is handled. This is the moment when ethical tech giants can either stand-up to do the right thing by leading the charge for the betterment of their users or lawyer-up to allow hidden practices, abuses, obfuscation, and deniability to continue for their financial gain.

See publication

Tags: Big Data, Cybersecurity, Privacy

Should Exploit Code be Published When Vulnerabilities are Made Public?
linkedin
April 18, 2019
On the heels of a recent report from Kaspersky Labs, discussions among security professionals have been stirred-up regarding the risks of publishing proof-of-concept code that may be helping hackers more than benefiting security. The topic has history and continues to be vigorously debated.

See publication

Tags: Cybersecurity, Privacy

Invitation to Innovators for Voting Technology Security
linkedin
April 15, 2019
Protecting our election infrastructure is crucial, yet security is lacking. Meaningful change starts with the spark of a great idea. I am looking forward to listening to all the excellent concepts for election security at the upcoming event in Sacramento CA. As India is now in the midst of having 900+ million people vote, we too need to figure a way to leverage digital tools for our democracy in a secure, private, trustworthy, and attestable way.

See publication

Tags: Cybersecurity

Role of the CISO: Top 3 Questions
linkedin
February 15, 2019
The role of Chief Information Security Officers (CISO) is evolving and requires a complex skill set. Long perceived as cost center that constrains the business in order to reduce losses from cyberattacks and to meet regulatory compliance, cybersecurity is now transforming into a critical function that must contribute to overall competitiveness.

See publication

Tags: Cybersecurity

Open Letter to the FTC – Bureau of Consumer Protection
linkedin
January 29, 2019
In December 2018 the FTC held hearings on Competition and consumer Protection in the 21st Century. A number of people spoke at the event and the FTC has graciously opened the discussion to public comments. The Federal Trade Commission has interest, certain responsibilities, and can affect changes to how data security evolves. This is our opportunity for the public to share its thoughts and concerns. I urge everyone to comment and provide your viewpoints and expertise to the FTC committee. Comments can be submitted electronically no later than March 13, 2019.

See publication

Tags: Cybersecurity, Privacy

When the Wrong Person Leads Cybersecurity
linkedin
November 19, 2018
Succeeding at managing cybersecurity risks is tremendously difficult even for seasoned professionals. To make situations worse, poorly suited people are often chosen to lead security organizations, bringing about disastrous results. This has contributed to weaker risk postures for organizations and the rapid turnover in cybersecurity leadership.

See publication

Tags: Cybersecurity, Privacy

Technology Transformation for 2019
linkedin
November 15, 2018
Digital technology continues to connect and enrich the lives of people all over the globe and is transforming the tools of everyday life, but there are risks accompanying the tremendous benefits. Entire markets are committed and reliant on digital tools. The entertainment, communications, socialization, and many others sectors are heavily intertwined with digital services and devices that society is readily consuming and embracing. More importantly, the normal downstream model for information has transformed into a bi-directional channel as individuals now represent a vast source of data, both in content as well as telemetry. These and many other factors align to accelerate our adoption and mold our expectations of how technology can make a better world.

See publication

Tags: Cybersecurity, Privacy

Should Companies be Allowed to ‘Hack Back’ after a Cyberattack
linkedin
September 30, 2018
Government officials and experts are weighing in on the concept of ‘hacking back’, the practice of potentially allowing U.S. companies to track down cyber attackers and retaliate.

See publication

Tags: Cybersecurity, Privacy

Beware Friendly Botnets
linkedin
September 18, 2018
The recently discovered Fbot, which finds systems infected with crypto-coin mining malware and scrubs them clean, may seem like a champion of good, but remember it is entering your system without your permission and modifying code and deleting files. We have seen other such ‘cleaner’ worms in the past, and the best advice is to be wary.

See publication

Tags: Cybersecurity, Privacy

“Unhackable” Product Claims are a Fiasco Waiting to Happen
linkedin
August 17, 2018
Those who think that that technology can be made ‘unhackable’, don't comprehend the overall challenges and likely don't understand what 'hacked' means.

See publication

Tags: Cybersecurity, Privacy

Slowing Innovation Should be a Cybersecurity Violation
linkedin
August 04, 2018
Risks come in many forms. Going too fast, being reckless, taking chances, etc. are easy to recognize warning signs. But what about the other end of the spectrum? Is going too slow ever bad? I say yes, especially when it unnecessarily impedes productivity, innovation, operational logistics and intentionally creates frustration of users.

See publication

Tags: Cybersecurity, Privacy

Cybersecurity Fails without Strategy
LinkedIn
July 17, 2018
Building and running a cybersecurity organization is a daunting task and most aren’t doing very well. The brutal reality is that the industry is struggling. Even as gains are made in the professional community, losses are skyrocketing in the face of security spending that is increasing to astronomical levels. Some estimates place losses to cybercrime alone at $6 trillion by 2021, doubling from $3 trillion in 2015, while security spending will top $1 trillion with expected double digit annual growth. These losses exceed the global illegal drug market and the security investment burden increases at an unsustainable rate. Even with massive investments over the years, the world continues to hemorrhage losses due to cyber-attacks. These damages are derived from individual organizations that have failed to erect and maintain viable defenses.

Companies in regulated industries and larger businesses will typically invest in an internal team to actively manage the cyber risks with a Chief Information Security Officer (CISO) at the helm. The current incarnation of the CISO position has not really been in widespread use for very long and the role has radically changed over the years. Where they report within the organization, what background and skills they possess, their overall responsibilities, and the desired experience for which they are hired varies wildly from one CISO to the next. The traditional CISO role focuses on protecting company assets, including preserving reputation, preventing downtime, securing data and financial assets, and ensuring regulatory compliance. But some companies are also using the CISO role as an external marketing ambassador to fuel visibility and drum up customers. So, in today’s world it is a mixed bag. Consequently, security teams are managed very differently and there is a major performance gap that needs to be addressed.

See publication

Tags: Cybersecurity, Leadership, Risk Management

Mylobot Showcases the Evolution of Modern Malware
linkedin
June 21, 2018
The recently discovered Mylobot aggregates 9 sophisticated features, highlighting how advanced malware is evolving. Stealth capabilities make it difficult for security tools to detect and protection aspects preserve its functionality over time.

See publication

Tags: Cybersecurity, Privacy

Cybersecurity Fails without Strategy
linkedin
June 17, 2018
Building and running a cybersecurity organization is a daunting task and most aren’t doing very well. The brutal reality is that the industry is struggling. Even as gains are made in the professional community, losses are skyrocketing in the face of security spending that is increasing to astronomical levels. Some estimates place losses to cybercrime alone at $6 trillion by 2021, doubling from $3 trillion in 2015, while security spending will top $1 trillion with expected double digit annual growth. These losses exceed the global illegal drug market and the security investment burden increases at an unsustainable rate. Even with massive investments over the years, the world continues to hemorrhage losses due to cyber-attacks. These damages are derived from individual organizations that have failed to erect and maintain viable defenses.

See publication

Tags: Cybersecurity, Privacy

2 Influencer Awards
2019 ADA award for Outstanding Leadership in Protecting People’s Information
Adaptable Security
October 05, 2019
I am truly grateful for being recognized with a 2019 ADA award for Outstanding Leadership in Protecting People’s Information. Bestowed during the Cybersecurity Symposium for Smart Cities 2019, where a tremendous community came together to discuss the challenges, risks, and opportunities facing smart cities.

See publication

Tags: Cybersecurity, Leadership, Risk Management

LinkedIn Top Voices 2018: Technology
LinkedIn
November 13, 2018
These are the 10 must-know writers and creators explaining everything from artificial intelligence to battling cyber threats.

See publication

Tags: Cybersecurity, Leadership

6 Keynotes
Matthew Rosenquist speaking at the Intel Cybersecurity Education Workshop
YouTube
September 12, 2019
Intel's cybersecurity strategist Matthew Rosenquist speaks at the educators' workshop on the industry challenges and academic needs for the next generation of cybersecurity professionals. Cybersecurity is challenging and graduating students must possess an increasing set of skills and perspectives in order to be successful. Matthew Rosenquist covers the growing risks, changes, and aspects of the digital security industry and provides a plan on how it must evolve with the help of educators.

See publication

Tags: Cybersecurity, Future of Work, Risk Management

Make America Secure Again - Pitch Event
Inteligenca
May 23, 2019
Cybersecurity innovation at its finest! It was my pleasure to moderate and be a panelist at the Make America Secure Again event in Sacramento, where innovators pitched ideas to strengthen the security of America's digital voting systems.

Protecting our election infrastructure is crucial, yet security is lacking. Meaningful change starts with the spark of a great idea. California again shows how it can reach out to the pool of great innovators to seek a variety of solutions for cybersecurity challenges. We must all work together to find ways of managing cyber risks. Outreach and innovation is key.

See publication

Tags: Cybersecurity, IoT, Leadership

The Verification of Truth: The Future of Digital Forensics and its Role in Cybersecurity
2019 Techno Security and Digital Forensics Conference
March 11, 2019
As the world embraces digital services and automation of critical systems, understanding risk, attributing actions, and deciphering attack methods will be crucial to the proliferation of connected technology. Trust is key, but transparency is greatly obscured. Forensics will grow to become the verification of truth and will play an ever-increasing role in understanding responsibility and controlling the dissemination of Fear, Uncertainty, and Doubt through actuarial data. Let’s explore the new areas, challenges, and opportunities for the bright future of digital forensics

See publication

Tags: Cybersecurity

Cybersecurity Risks and Recommendations – Where Your Focus Needs to Be
http://www.securitysystemsnews.com/blog/psa-tec-wrap
May 10, 2017
Technology convergence across cyber and physical security is driving change. Protection will evolve to include digital security, physical safety, and personal privacy.

See publication

Tags: Cybersecurity

How Cyber-Attacks are Changing the Expectations of Security, Privacy, and Safety
2017 ISC West conference
April 06, 2016
Cyber-attacks are an ever increasing problem that reaches out from the digital domain and into the physical world to impact the security, privacy and safety of people, businesses, and governments. The rapid growth of technology adoption and connectivity are driving new opportunities for attackers at an accelerating rate. The result is a radical shift in expectations by consumers and organizations for more comprehensive solutions, streamlined oversight, and clear accountability.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Diversity in Cybersecurity Education
2016 ICT Educator Conference
January 07, 2016
The cybersecurity industry needs more people with greater diversity to fill the growing number of open positions. Intel is very active with internal corporate diversity efforts, establishing strong pipelines, and investing in diverse partners. Additionally, Intel is contributing to the formalization of cyber science degree standards to align educational programs to market demands.

See publication

Tags: Cybersecurity, HR

2 Media Interviews
Humans, complacency, ignorance delay AV deployment
EEWeb
November 05, 2019
We have a long way to go before we see autonomous vehicles on the roads in any number

Is the autonomous vehicle (AV) going to be widely distributed in our lifetimes? Sure, just as soon as you eliminate human involvement, complacency and ignorance (was that repetitive?) from development. Until then, AVs are just going to be a rarity on the roads.

See publication

Tags: AI, Cybersecurity, Emerging Technology

Winning the security fight: Tips for organizations and CISOs
HelpNetSecurity
October 09, 2019
For large organizations looking to build a robust cybersecurity strategy, failure to get the fundamentals in place practically guarantees a disaster. If you ask Matthew Rosenquist, a former Cybersecurity Strategist for Intel (now independent), overcoming denial of risk, employing the right cybersecurity leader, and defining clear goals are the three most critical objectives for avoiding a negative outcome.

See publication

Tags: Cybersecurity, Leadership, Risk Management

4 Panels
Modern Successful SOC & Artificial Intelligence round-table
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
It was my honor to lead a round-table of superstars at the Cybersecurity Symposium for Smart Cities 2019. Talking about how cryptocurrency has become the economic vehicle of choice by cybercriminals and how the emerging AI revolution can both aid Security Operations, but also enhance the threats.

The digital revolution is an arms race where we must all work together to keep pace with the evolving attackers. A truly outstanding discussion with this group of luminaries and terrific audience participation!

Thanks to Sabrina Yuan Co-Founder & COO of SecuritAI, Joanna Hu Data Science Manager at Exabeam, and Dr. Victor Fang Founder and CEO of AnChain.ai

See publication

Tags: AI, Cryptocurrency, Cybersecurity

Shared Pain Points & Opportunities for Secure Smart Cities
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
Had a great time moderating a smashing panel at the Cybersecurity Symposium for Smart Cities 2019. Great insights from our CIO’s, standards, and best practices experts in identifying critical aspects for cities! Much thanks to Linda Gerull, Liza Massey, Olaf Gerd Gemin, and Jerry Cox

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Ransomware: The Not-So Good, Really Bad, and Truly Ugly!
SecureWorld
August 18, 2018
RECORDED LIVE ON AUGUST 28, 2018 — WATCH ON-DEMAND
Ransomware is spreading at an alarming pace and infecting networks across all industries and company sizes, primarily through phishing attacks. The cyber criminals behind the attacks are furiously innovating and keeping ahead of defenses. In this web conference, we will have an interactive discussion on the latest in ransomware threats and how to best protect your organization and yourself against this growing threat.

This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also cover recent attacks and how the victim organizations could have better protected themselves.

The session will examine:
• Current phishing trends
• Ransomware and how it is infecting networks
• Effective mitigation strategies
• Recovering from an attack

See publication

Tags: Cybersecurity

Harnessing Cyber-Physical Security Technologies
Cyber: Secured Forum (cybersecuredforum.com)
June 05, 2018
A great panel discussion, led by Ray Coulombe of Security Specifiers, with Donal Keating from Microsoft and Jeff Crume of IBM. As the audience is a strong mix of both physical and cyber security professionals, we will discuss how the convergence of technology across both domains will rapidly change to open up new opportunities and risks. Expect topics around Internet-of-Things (IoT), Artificial Intelligence (AI), and blockchain to be discussed by the panel and open questions from the audience.

See publication

Tags: AI, Cybersecurity, IoT

1 Patent
Hardware-generated dynamic identifier
US Patent Office
June 29, 2017
In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.

See publication

Tags: Cybersecurity, Innovation

3 Podcasts
SuperDataScience Podcast - SDS 273: Predict, Prevent, Detect: Cyber Security
SuperDataScience.com
June 26, 2019
In this episode of the SuperDataScience Podcast, I chat with Matthew Rosenquist, one of the top leading world experts in the space of cybersecurity. You will learn what balance in cybersecurity means and what the dark web is. You will hear how Matthew's career developed and how he thinks about the strategy of cybersecurity. You will also learn about the valuable role of data science in cybersecurity and the steps you can take to get into this space.

If you enjoyed this episode, check out show notes, resources, and more at www.superdatascience.com/273

See publication

Tags: AI, Analytics, Cybersecurity

Evolving Risks of Cybercrime with Matthew Rosenquist
podcasts.apple.com
June 07, 2019
The Innovators Behind DISRUPTION - Episode 27 by Evolve ETFs
Evolving Risks of Cybercrime with Matthew Rosenquist
- Growing systemic challenges in cybersecurity
- How the public sector can protect itself from cybercrime
- The NSA and its role in the recent Baltimore ransomware attack
- Opinions on Baltimore’s decision not to pay their cyber attackers
- CEOs recognizing cybersecurity as a major business risk
- Cybersecurity demand and spend
- Government concerns about cyber threats
- Advice on how to protect yourself from cyber attacks

See publication

Tags: Cybersecurity, Risk Management

Don't trust a company to keep you safe
Podcasts.apple.com
March 12, 2019
Interview of Matthew Rosenquist, Cybersecurity Strategist. Podcast by Lou Covey
A range of topics, including nation state attacks, data breaches, ransomware, Artificial Intelligence, dark web, and the perception of perfect security

See publication

Tags: AI, Cybersecurity, Privacy

4 Speaking Engagements
Evolving Risks of Cybercrime with Matthew Rosenquist podcast
https://evolveetfs.com/podcasts/
June 07, 2019
Interviewed by Raj Lala, the CEO at Evolve ETFs in his podcast The Innovators Behind Disruption. In the
"Evolving Risks of Cybercrime with Matthew Rosenquist" episode, we covered a number of interesting topics, including the growing challenges in cybersecurity, rise in cybercrime, challenges of ransomware, what governments are worried about, and how to protect yourself.

See publication

Tags: Cybersecurity, Fintech, Risk Management

Cyber/Physical Convergence
2017 InfraGard Atlanta conference
January 18, 2017
Matthew Rosenquist's presentation at the 2017 InfraGard Atlanta conference, discussing the convergence between cyber and physical security.

See publication

Tags: Cybersecurity, Risk Management

The True Cost of Data Breaches - Not Just a Dollar per Record
CyberEd.io
March 22, 2016
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party forensic services, changes to business processes, as well as a loss of reputation and customer goodwill.

There is a complex set of chain reactions which occur after every significant data breach, each adding its own contribution to the overall cost and business impact.

In this session we'll discuss some real-world experiences regarding data breaches, how the costs exceed the typical dollar-per-record measure, and how organizations are adapting to learn from their experiences. We will also examine what the future holds, as attackers adapt and shift towards new data manipulation methods.

See publication

Tags: Cybersecurity, Risk Management

Upgrading to an APT-Capable Defense: Where To Start, How To Get Funding And See Immediate Reduction In Risk
Cybered.io
February 26, 2016
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In this session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real-world deployments and learn how to gain executive sponsorship of the program as a whole, to build momentum and help guarantee success.

See publication

Tags: Cybersecurity

3 Whitepapers
McAfee Labs 2017 Threats Predictions
McAfee
November 30, 2016
McAfee Labs explores top threats expected in the coming year.

Welcome to the McAfee Labs 2017 Threats Predictions
report. We have split this year’s report into two sections.
The first section digs into three very important topics,
looking at each through a long lens.

The second section makes specific predictions about
threats activity in 2017. Our predictions for next year
cover a wide range of threats, including ransomware,
vulnerabilities of all kinds, the use of threat intelligence
to improve defenses, and attacks on mobile devices.

See publication

Tags: Cybersecurity, Risk Management

Prioritizing Information Security Risks with Threat Agent Risk Assessment
Intel Corp
January 05, 2010
Matthew Rosenquist, while at Intel Corp developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.

It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to prioritize specific areas of concern, we can both proactively target the most critical exposures and efficiently apply our resources for maximum results. The TARA methodology identifies which threat agents pose the greatest risk, what they want to accomplish, and the likely methods they will employ. These methods are cross-referenced with existing vulnerabilities and controls to pinpoint the areas that are most exposed. Our security strategy then focuses on these areas to minimize efforts while maximizing effect.

See publication

Tags: Analytics, Cybersecurity, Risk Management

Defense In Depth Strategy Optimizes Security
Intel Corp
September 30, 2008
Matthew Rosenquist of Intel IT has developed a Defense-in-Depth strategy that optimizes security using interlocking predictions, prevention, detection, and response capabilities. We recognize that attackers are human opponents who constantly evolve new tactics and that it would be prohibitively expensive and near impossible to protect against every vulnerability. Our strategy uses prediction to gain insights into the most likely threats, attack methods, and targets. This allows a proactive and efficient focus of resources.

See publication

Tags: Cybersecurity, Innovation, Risk Management

Blog

Opportunities

Contact Matthew Rosenquist

Media Kit

Share Profile

Contact Info

  Profile

Matthew Rosenquist