Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Matthew Rosenquist

Founder, Chief Information Security Officer & Cybersecurity Strategist at Cybersecurity Insights

Folsom, United States

CISO and cybersecurity strategist that actively works with the industry to identify emerging risks and opportunities.  Currently the CISO for Eclipz and formerly the Cybersecurity Strategist for Intel Corp. with 30 years in the security field. An active keynote speaker at industry events, member on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry across business, academia, and governments sectors.  Publishes blogs, whitepapers, and develops industry methodologies.  Was named as a Top 10 Technology Voice in 2018 by LinkedIn and has a very active following of over 180k professionals.   

Matthew is experienced in building world class teams and capabilities, managing security operations, and evangelizing best-practices to the market.  He advises boards, executives, industry groups, tech companies, consumer audiences, and the media on the risks and relevance of cybersecurity issues and how to achieve an optimal level of security.

Available For: Advising, Influencing, Speaking
Travels From: Sacramento CA
Speaking Topics: cybersecurity, information security, cyber security, privacy

Matthew Rosenquist Points
Academic 0
Author 397
Influencer 1994
Speaker 110
Entrepreneur 245
Total 2746

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Technology
Theatre: Global
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: N/A
Company Founded Date: Undisclosed
Media Experience: 25 Years
Last Media Interview: 08/21/2025

Areas of Expertise

AI 30.52
AI Ethics
Analytics 30.27
Autonomous Vehicles 30.97
Big Data 30.14
Blockchain 30.10
Business Strategy 33.57
Cryptocurrency 33.66
Culture 30.15
Customer Experience 30.06
Cybersecurity 51.49
DevOps 31.72
Digital Disruption 30.14
Digital Transformation 30.18
Diversity and Inclusion 30.84
EdTech 31.70
Emerging Technology 30.18
Entrepreneurship 30.06
FinTech 30.18
Future of Work 30.29
GovTech 30.49
GRC 30.19
HealthTech 30.06
HR 30.40
Innovation 32.01
IoT 30.19
Leadership 33.28
Management 30.64
Mergers and Acquisitions
National Security 31.04
Predictive Analytics 30.04
Privacy 48.45
Risk Management 36.61
Security 32.82
Smart Cities 32.19
Social 31.11
Startups 31.60
Supply Chain 30.25

Industry Experience

Consumer Products
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Manufacturing
Media
Other
Professional Services
Retail
Telecommunications

Publications & Experience

10 Advisory Board Memberships
United Cybersecurity Alliance
United Cybersecurity Alliance
July 02, 2021
I am honored to join the United Cybersecurity Alliance advisory board. This organization is focused to improve the cybersecurity industry by driving and celebrating equity, inclusion, and equality for a diverse workforce that possesses the skills to protect organizations and communities from cyber-attacks.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Cyber Security Initiative Strategic Council
Private Directors Association
December 22, 2020
I am very excited to join with esteemed cybersecurity colleagues on Private Directions Association’s (PDA) Cyber Security Initiative Strategic Council. Our charter is to drive timely and relevant communications to the board member community.

See publication

Tags: Cybersecurity, Security

EC-Council International Advisory Board for CISOs
LinkedIn
May 20, 2020
I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals. The advisory board collaborates to share best practices, emerging challenges, and opportunities for CISOs to better protect their organizations in alignment with overall business goals.

See publication

Tags: Cybersecurity, Leadership

Helping Academia Succeed So Cybersecurity Can Thrive
LinkedIn
April 10, 2020
Thrilled to announce that I am joining the Advisory Board for the University of Phoenix, College of Business and Information Technology! Academia plays a crucial role in fulfilling the staffing needs for the growing cybersecurity industry! We must all play a role to help prepare the next generation of professionals.

See publication

Tags: Cybersecurity

Matthew Rosenquist Joins the Eclipz Advisory Board to make the World of Connected Data More Secure
LinkedIn
September 04, 2019
It is my honor to join the Advisory Board of Eclipz; a cybersecurity innovator focused on securing data in transit, even on untrusted endpoints. Hardening digital communications from hackers and eavesdropping are crucial for security, privacy, and trust.
https://www.eclipz.io/

See publication

Tags: Business Strategy, Cybersecurity, Startups

Matthew Rosenquist Joins the Advisory Board for the Techno Security & Digital Forensics Conference
LinkedIn
August 15, 2019
I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries. I strongly believe professionals should contribute to the growth of the field by influencing, sharing knowledge, connecting others and pursuing beneficial ideas for greater impacts.
https://www.technosecurity.us/ca/about-us/2020-advisory-board

See publication

Tags: Business Strategy, Cybersecurity, Leadership

Contributing to the SIA Education @ ISC Advisory Board
LinkedIn
May 30, 2018
I was just asked to extend my role as an Advisory Board member on the SIA Education @ ISC Advisory Board for an additional year.

SIA Education program at the ISC West security conference has grown into a respected resource for education in the industry, attracting over 1100 participants at ISC West 2018. I have enjoyed being part of this group for several years and thoroughly enjoyed presenting keynotes for the converged security event in 2016 and 2017.

See publication

Tags: Business Strategy, Cybersecurity, EdTech

Joint Task Force on Cybersecurity Education
NIST
December 31, 2017
The Joint Task Force on Cybersecurity Education (JTF) was launched in September 2015 with the purpose of developing comprehensive curricular guidance in cybersecurity education that will support future program development and associated educational efforts. The Curriculum Guidelines for Post-Secondary
Degree Programs in Cybersecurity was published in 2017.

See publication

Tags: Cybersecurity, Leadership, Education

Honored to Join the HMG CISO Advisory Board!
LinkedIn
September 12, 2016
I am excited to join the HMG CISO Advisory Board. I am humbled to be a part of this outstanding group of information security leaders. The HMG Strategy network provides c-suite executives the opportunity to experience global thought-leadership, a social community of face-to-face networking, access to a Research and Resource Center, and a number of summits around the country to bring together champions to secure the future of enterprises.

See publication

Tags: Business Strategy, Cybersecurity, Leadership

Brandeis University Graduate Professional Studies Advisory Board Member
Brandeis University
June 01, 2015
Matthew Rosenquist joined the Brandeis University Graduate Professional Studies (GPS) Advisory Board for Information Security Leadership, Committee for the Master of Science in Information Security, in 2015. Matthew has remained an active member of the board and will continue serving this important role through 2020 to help advise Brandeis in maintaining the very best graduate program to produce elite cybersecurity leaders.

See publication

Tags: Business Strategy, Cybersecurity, Leadership

148 Article/Blogs
Top Trustworthy Cybersecurity Partners and Service Providers
Medium
February 05, 2026
Finding trustworthy cybersecurity partners and services is challenging! That is why I am partnering with Clutch and its community to curate a list of providers that have built authentic reputations supported by verified customer ratings and comments!

See publication

Tags: Cybersecurity, Leadership, Privacy

What it Looks like When Cybersecurity Leadership Fails
Medium
January 30, 2026
A great example of how uninformed leaders (in this case of cybersecurity) who does not understand the assignment and leaks sensitive data via an AI chat tool.

See publication

Tags: Cybersecurity, Leadership, Privacy

Data Privacy Week 2026
Medium
January 30, 2026
In 2026, your data is either your greatest asset or your biggest legal debt. There is no middle ground.

Technology is moving faster than ever, the old rules for protecting data simply don’t work anymore.

See publication

Tags: Cybersecurity, Leadership, Privacy

When Should Cybersecurity be Engaged for Innovation?
Medium
January 23, 2026
Does this process flow look familiar? It is the compounding failure due to an absence of cybersecurity fundamentals.

When innovation plows forward without the benefit of cybersecurity, there will eventually be tears, finger pointing, denial, and loss.

See publication

Tags: Cybersecurity, Leadership, Privacy

CISO Red-Teams the AI Tools to Protect the Company
Medium
January 13, 2026
This is smart: a financial sector CISO recognizes the inherent risks of MCPs, that are used by agentic AIs, and role-plays the attackers to find vulnerabilities to protect the overall environment! Focusing red and purple team investments to areas that are likely to be leveraged by malicious adversaries is a great way to prioritize resources for maximum proactive benefit.

See publication

Tags: Cybersecurity, Leadership, Privacy

Cybersecurity Prediction 4: Threat Actor Lineup Shifts
Medium
January 12, 2026
In 2026 two classes of threat actors will rise in the overall impact rankings: Data Harvester and Vulnerability Researcher. AI tools will benefit them greatly in their pursuits, which will have a cascading impact on the types of attacks and damage caused.

See publication

Tags: Cybersecurity, Leadership, Privacy

Former Cybersecurity Expert Turns Criminal
Linkedln
January 07, 2026
Former cybersecurity ransomware negotiator turns to the dark side and into a ransomware cybercriminal.

See publication

Tags: Cybersecurity, Leadership, Privacy

2026 Cybersecurity Prediction #2 — AI Accelerates Vulnerability Exploitation
Linkedln
January 06, 2026
Automated discovery and exploit generation at machine speed shrinks time-to-patch windows dramatically. This will cause havoc with patch cycles, SecOps response times, and crisis management containment processes!

See publication

Tags: Cybersecurity, Leadership, Privacy

Top 10 Cybersecurity Predictions for 2026
Medium
January 01, 2026
This is the full Top 10 Cybersecurity Predictions video. By the end, you will see how the maneuvering of the threat agents will win by exploiting the capabilities and momentum of AI technology adoptions, how security teams will need to rapidly adapt through the embrace of their own AI, and sitting at the top of the accountability will be a CISO transformation that must make the magic happen.

See publication

Tags: Cybersecurity, Leadership, Privacy

The year AI changes cybersecurity forever
Medium
December 31, 2025
Cybersecurity predictions are an opportunity to look forward instead of back, to be proactive instead of reactive, and to consider how changes in attackers, technology, and the security industry will impact the sustainability of managing cyber risks.

See publication

Tags: Cybersecurity, Leadership, Privacy

Invisible Success of Healthcare Cybersecurity
Medium
December 12, 2025
Success of cybersecurity is often hidden and ROI in healthcare is challenging to address! Jason Elrod, the CISO of MultiCare Health Systems, ties the investment in security to the core healthcare mission and showcases how resilience is key.

See publication

Tags: Cybersecurity, Leadership, Privacy

LastPass Fined 2 Million by UK Regulators for Data Breaches
Medium
December 12, 2025
Security architecture and practices are important to every vendor, but the expectations and consequences are especially high for Cybersecurity products. When a password or credential vendor has multiple breaches, not only do customers abandon them but regulators take notice.

See publication

Tags: Cybersecurity, Leadership, Privacy

LastPass Fined 2 Million by UK Regulators for Data Breaches
Medium
December 12, 2025
Security architecture and practices are important to every vendor, but the expectations and consequences are especially high for Cybersecurity products. When a password or credential vendor has multiple breaches, not only do customers abandon them but regulators take notice.

See publication

Tags: Cybersecurity, Leadership, Privacy

Invisible Success of Healthcare Cybersecurity
Medium
December 11, 2025
Success of cybersecurity is often hidden and ROI in healthcare is challenging to address! Jason Elrod, the CISO of MultiCare Health Systems, ties the investment in security to the core healthcare mission and showcases how resilience is key.

See publication

Tags: Cybersecurity, Leadership, Privacy

94 Percent of LLMs Shown to Be Vulnerable to Attack
Medium
December 04, 2025
The unfortunate truth is that poorly designed and improperly secured Artificial Intelligence integrations can be misused or exploited by adversaries, to the detriment of companies and users. Some of the compromises will bypass the traditional cybersecurity and privacy controls, leaving victims very exposed.

See publication

Tags: Cybersecurity, Leadership, Privacy

Holiday Cybercrime Surge — Top Tips to Avoid Being a Victim
Medium
November 27, 2025
As the holiday shopping frenzy kicks off with Black Friday and Cyber Monday, remember that consumers aren’t the only ones hunting for opportunities. This is the prime hunting season for cybercriminals to conduct scams, fraud, impersonation, and theft at massive scale.

See publication

Tags: Cybersecurity, Leadership, Privacy

International Conference on Cyberlaw, Cybercrime & Cybersecurity Conference 2025
Medium
November 20, 2025
The conference strives to examine and analyze the emerging Cyberlaw, Cybercrime and Cybersecurity trends of today’s times. It is an authoritative global event exclusively dedicated to cyberlaw, cybercrime, and cybersecurity which brings together an extraordinary assembly of jurists, senior judges, legislators, policymakers, law enforcement leaders, cybersecurity practitioners, corporate counsel, technology developers, digital-rights advocates, and academics representing more than 100 countries.

See publication

Tags: Cybersecurity, Leadership, Privacy

Crypto Exchanges Hacked Again — for Over $100 Million
Medium
November 13, 2025
Cybercriminals continue to target the cryptocurrency industry, this time with an exploit that affected the Balancer decentralized finance platform, with total losses exceeding $100 million and involving several exchanges that use the software across multiple chains. Some of the money was recovered, but over $90 million has been converted to Ethereum by the criminals, likely as part of their laundering process.

See publication

Tags: Cybersecurity, Leadership, Privacy

How Inclusion Is Powering the Future of Cybersecurity
Medium
November 03, 2025
Great conferences not only bring together innovation, expert views, but it is an opportunity to meet amazing leaders, innovators, and rising stars who will drive our industry forward.

See publication

Tags: Cybersecurity, Leadership, Privacy

AI Takeover for Social Engagement Undermines Collaboration
Medium
October 31, 2025
I recently noticed how many posts and comments are created using AI. Unfortunately, I see this ingenuine content on LinkedIn where I am most active in communicating and collaborating with peers and professionals. Sadly, it is undermining how the cybersecurity community can work together.

See publication

Tags: Cybersecurity, Leadership, Privacy

The Rise of AI-Powered Phishing
Linkedln
October 09, 2025
In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to know to protect yourself.

See publication

Tags: Cybersecurity, Leadership, Privacy

The First Malicious MCP Server is a Warning Shot for AI Cybersecurity
Medium
October 08, 2025
The first malicious Model Context Protocol (MCP) server has been discovered and we should all be worried how this is foreshadowing AI cybersecurity risks!

See publication

Tags: Cybersecurity, Leadership, Privacy

Cybersecurity Concerns as Blockchain Lands in Global Finance
Medium
October 03, 2025
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) and over 30 banks servicing 200 countries, have announced they will develop a blockchain global shared digital ledger to support global payments. SWIFT will integrate the blockchain with legacy systems and continue innovating to deliver more capable financial services.

See publication

Tags: Cybersecurity, Leadership, Privacy

China Prepares for Cyberattacks
Medium
September 27, 2025
China has implemented regulations for 1-hour reporting of severe cybersecurity incidents. This would include disruptions that impact over 50% of the people in a province or 10 million people, such as critical infrastructure attacks.

See publication

Tags: Cybersecurity, Leadership, Privacy

When is the Right Time to Hire a CISO?
Medium
September 10, 2025
Knowing when to hire a CISO is a challenging proposition — one which most organizations will eventually need to answer.

See publication

Tags: Cybersecurity, Leadership, Privacy

1 Industry Award
2021 HMG Strategy Global Leadership Institute Award.
HMG Strategy
May 20, 2021
I am honored to be recognized with a regional 2021 HMG Strategy Global Leadership Institute Award.

See publication

Tags: Cybersecurity, Leadership, Privacy

4 Influencer Awards
Received a 2021 Global Leadership Award
Medium.com
May 20, 2021
It is as beautiful as is it meaningful. My sincerest thanks to those who nominated and bestowed this award. It shows how thought-leaders and top executives are elevating their respect for the importance of cybersecurity within their organization and across the global digital landscape. I am proud to represent cybersecurity and accept.

See publication

Tags: Cybersecurity, Leadership, Privacy

Top Writer in Privacy by Medium
Medium
December 09, 2019
Honored to be named by Medium as one of the Top Writers in Privacy! Congrats to the entire list; a community that recognizes the importance and is actively championing the rights of privacy for all.

There can be no liberty without privacy!

https://medium.com/tag/privacy/top-writers

See publication

Tags: Cybersecurity, Privacy

2019 ADA award for Outstanding Leadership in Protecting People’s Information
Adaptable Security
October 05, 2019
I am truly grateful for being recognized with a 2019 ADA award for Outstanding Leadership in Protecting People’s Information. Bestowed during the Cybersecurity Symposium for Smart Cities 2019, where a tremendous community came together to discuss the challenges, risks, and opportunities facing smart cities.

See publication

Tags: Cybersecurity, Leadership, Smart Cities

LinkedIn Top Voices 2018: Technology
LinkedIn
November 13, 2018
These are the 10 must-know writers and creators explaining everything from artificial intelligence to battling cyber threats.

See publication

Tags: Cybersecurity, Leadership, AI

7 Keynotes
Why Trust in Digital Tech is the Key to Future Innovation - Hexcon21 Session by Matthew Rosenquist
YouTube
September 27, 2021
I was honored to speak at the Hexcon21 cybersecurity virtual conference this year and wanted to repost my presentation for all who did not get a chance to watch the life event.

I discussed why trust in digital technology is the key to sustain a future where digital innovation and adoption continue to thrive.

This year’s Hexcon21 Conference, attended by thousands, delivered insights, perspectives, and training for cybersecurity audiences.

See publication

Tags: Cybersecurity, Innovation, Leadership

Matthew Rosenquist speaking at the Intel Cybersecurity Education Workshop
YouTube
September 12, 2019
Intel's cybersecurity strategist Matthew Rosenquist speaks at the educators' workshop on the industry challenges and academic needs for the next generation of cybersecurity professionals. Cybersecurity is challenging and graduating students must possess an increasing set of skills and perspectives in order to be successful. Matthew Rosenquist covers the growing risks, changes, and aspects of the digital security industry and provides a plan on how it must evolve with the help of educators.

See publication

Tags: Cybersecurity, Future of Work, Risk Management

Make America Secure Again - Pitch Event
Inteligenca
May 23, 2019
Cybersecurity innovation at its finest! It was my pleasure to moderate and be a panelist at the Make America Secure Again event in Sacramento, where innovators pitched ideas to strengthen the security of America's digital voting systems.

Protecting our election infrastructure is crucial, yet security is lacking. Meaningful change starts with the spark of a great idea. California again shows how it can reach out to the pool of great innovators to seek a variety of solutions for cybersecurity challenges. We must all work together to find ways of managing cyber risks. Outreach and innovation is key.

See publication

Tags: Cybersecurity, IoT, Leadership

The Verification of Truth: The Future of Digital Forensics and its Role in Cybersecurity
2019 Techno Security and Digital Forensics Conference
March 11, 2019
As the world embraces digital services and automation of critical systems, understanding risk, attributing actions, and deciphering attack methods will be crucial to the proliferation of connected technology. Trust is key, but transparency is greatly obscured. Forensics will grow to become the verification of truth and will play an ever-increasing role in understanding responsibility and controlling the dissemination of Fear, Uncertainty, and Doubt through actuarial data. Let’s explore the new areas, challenges, and opportunities for the bright future of digital forensics

See publication

Tags: Cybersecurity

Cybersecurity Risks and Recommendations – Where Your Focus Needs to Be
http://www.securitysystemsnews.com/blog/psa-tec-wrap
May 10, 2017
Technology convergence across cyber and physical security is driving change. Protection will evolve to include digital security, physical safety, and personal privacy.

See publication

Tags: Cybersecurity, Privacy

How Cyber-Attacks are Changing the Expectations of Security, Privacy, and Safety
2017 ISC West conference
April 06, 2016
Cyber-attacks are an ever increasing problem that reaches out from the digital domain and into the physical world to impact the security, privacy and safety of people, businesses, and governments. The rapid growth of technology adoption and connectivity are driving new opportunities for attackers at an accelerating rate. The result is a radical shift in expectations by consumers and organizations for more comprehensive solutions, streamlined oversight, and clear accountability.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Diversity in Cybersecurity Education
2016 ICT Educator Conference
January 07, 2016
The cybersecurity industry needs more people with greater diversity to fill the growing number of open positions. Intel is very active with internal corporate diversity efforts, establishing strong pipelines, and investing in diverse partners. Additionally, Intel is contributing to the formalization of cyber science degree standards to align educational programs to market demands.

See publication

Tags: Cybersecurity, HR, Diversity and Inclusion

18 Media Interviews
Future of Offensive Attack Simulation: Strategies, Tools, and Techniques
CISO Platform
November 24, 2020
In our recent Fireside chat episode in association with FireCompass, between Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, we discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds.

See publication

Tags: Cybersecurity

How DevOps and Security Can Work Together
Endpoint.tanium.com
November 18, 2020
Software developers and security pros need to overcome their differences. It’s harder than it sounds, but best practices are emerging.

See publication

Tags: Cybersecurity, DevOps

2020 Cyber Innovators Summit: Future Threat Panel
The Cyber Institute YouTube Channel
October 31, 2020
Future Cybersecurity Threats In 2021 & Beyond. Matthew Rosenquist, the Chief Information Security Officer (CISO) for Eclipz.io, a Cybersecurity Strategist, and an industry advisor speaks at the 2020 Cyber Innovators Summit's Future Threat panel.

See publication

Tags: Cybersecurity

The Role of Cyber Culture in a Cyber Strategy
RightHand Cybersecurity
October 29, 2020
Watch the recorded webinar "The Role of Cyber Culture in a Cyber Strategy". John (Jack) Roehrig, CISO at Turnitin, and Matthew Rosenquist, CISO and Cybersecurity Strategist at Eclipz.io, share insights on how to incorporate Cyber Culture as part of an organization's Cyber Strategy.

See publication

Tags: Cybersecurity, Culture

Podcast: From Reactive To Proactive — The Evolution Of Security And Of The CISO Role | With Matthew Rosenquist
ITSP Magazine
September 16, 2020
EPISODE SUMMARY
Once upon a time —not that long ago—the Information Security field had no rules, definitions, tools, or framework, and it was a new frontier to be discovered and conquered. Now, looking back, we sure have come a long way.

See publication

Tags: Cybersecurity, Leadership, Risk Management

The Only 2 Kinds of Cybersecurity Victims
Innovation Nation Podcast
August 11, 2020
We’re all working from home not thinking about cybercriminals at all.

They’re thinking about us, though.

In this very first episode of Innovation Nation, I interview Matthew Rosenquist, CISO at Eclipz.io, about cybercrime in the time of COVID-19.

What we talked about:

Hardware vs. software vs. wetware (people)
We’re vulnerable during quarantine not because technology but our behaviors
Cybersecurity issues that SMBs need to consider with IOT
Security fears that we have & education that we need

See publication

Tags: Cybersecurity, Privacy, Startups

What's next in Cybersecurity - and how SMEs can protect themselves - Episode #20
TÜV SÜD Safety First podcast
July 31, 2020
In this episode, Matthew Rosenquist, an internationally renowned US-American cybersecurity expert, shares his views on the new normal in cyber security with a special look at SMEs. All too often they are still an easy target for attackers. But with a few basic measures they can protect themselves more effectively. And this is not primarily a question of expensive IT technology.

See publication

Tags: Cybersecurity, Management, Risk Management

Crucial Tech, by Lou Covey - Matthew Rosenquist talks ethics, facial recognition and the potential benefits of AI
Crucial Tech
July 06, 2020
Matthew Rosenquist talks ethics, facial recognition and the potential benefits of AI. He provides an optimistic view of AI ethics and facial recognition, but we are still further than some might think from a successful deployment in the west.

See publication

Tags: AI, Cybersecurity, Privacy

'Cyber Risk Leaders' Tell All @ The Global Virtual Book Club EP 2
YouTube
May 29, 2020
Join Carmen Marsh, CEO of Inteligenca, and 'Cyber Risk Leaders' Author, Shamane Tan as they sit down with featured Cyber Risk Leaders from the book to discuss current cyber security challenges and share from their industry experiences.

In this episode, we meet with Matthew Rosenquist, CISO at Eclipz.io Inc in California who will be talking about the Artificial Intelligence's impact on Cyber Security Strategy.

AI is a tremendously powerful tool that is evolving at a ridiculous rate and being leveraged by both cyber attackers and defenders. It will radically change the cybersecurity strategies that protect our digital world.

See publication

Tags: AI, Cybersecurity

Cybersecurity Issues and Trends - Interview with CybxSecurity
CybxSecurity.com
March 24, 2020
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybersecurity.

See publication

Tags: Cybersecurity, Risk Management, COVID19

The Entanglement of AI and Cybersecurity Podcast
linkedin
March 10, 2020
The boundaries of cybersecurity will be manipulated by the advances in Artificial Intelligence, the evolution of digital threats, and on ever-adapting leadership.

I had a great time being interviewed by Vaishali Lambe [Lisha] in her podcast SoLeadSaturday because we talked about how cybersecurity and AI are intertwined, how leadership is crucial, and the fact that technology tools are being used for both good and malicious purposes. The growing demands for a security-savvy workforce led us to explore the vast opportunities in the field. Emerging factors magnify the interesting swirls of competing challenges. To cap the discussion, we visualized the future of the industry and discussed the risks.

See publication

Tags: AI, Cybersecurity, Leadership

Past and Future Challenges for Security: ThinkTech Interviews Cybersecurity Strategist Matthew Rosenquist
ThinkTech: Hawaii
December 10, 2019
A look back at some of the missteps in 2019 across the convergence of cyber and physical security, with discussions on what challenges are ahead for the next year.

Thanks to Andrew Lanning for hosting me as a guest on the ThinkTech livestream show! Great questions and unscripted dialog about the evolving risks and opportunities of Artificial Intelligence, privacy, cybercrime, automation, and connected devices. Security matters!

Watch on YouTube: https://youtu.be/KQjuHVc3lbM

See publication

Tags: AI, Cybersecurity, Privacy

Thinkers360 Predictions Series – 2020 Predictions for Cybersecurity
Thinkers360
November 25, 2019
Having recently published our Top 50 Global Thought Leaders and Influencers on Cybersecurity, we asked a selection of our Thinkers360 global influencers about their predictions for Cybersecurity in 2020. Here’s what they told us…

See publication

Tags: Cybersecurity, Digital Transformation, Predictive Analytics

Humans, complacency, ignorance delay AV deployment
EEWeb
November 05, 2019
We have a long way to go before we see autonomous vehicles on the roads in any number

Is the autonomous vehicle (AV) going to be widely distributed in our lifetimes? Sure, just as soon as you eliminate human involvement, complacency and ignorance (was that repetitive?) from development. Until then, AVs are just going to be a rarity on the roads.

See publication

Tags: AI, Cybersecurity, Autonomous Vehicles

Winning the security fight: Tips for organizations and CISOs
HelpNetSecurity
October 09, 2019
For large organizations looking to build a robust cybersecurity strategy, failure to get the fundamentals in place practically guarantees a disaster. If you ask Matthew Rosenquist, a former Cybersecurity Strategist for Intel (now independent), overcoming denial of risk, employing the right cybersecurity leader, and defining clear goals are the three most critical objectives for avoiding a negative outcome.

See publication

Tags: Cybersecurity, Leadership, Risk Management

SuperDataScience Podcast - SDS 273: Predict, Prevent, Detect: Cyber Security
SuperDataScience.com
June 26, 2019
In this episode of the SuperDataScience Podcast, I chat with Matthew Rosenquist, one of the top leading world experts in the space of cybersecurity. You will learn what balance in cybersecurity means and what the dark web is. You will hear how Matthew's career developed and how he thinks about the strategy of cybersecurity. You will also learn about the valuable role of data science in cybersecurity and the steps you can take to get into this space.

If you enjoyed this episode, check out show notes, resources, and more at www.superdatascience.com/273

See publication

Tags: Analytics, AI, Cybersecurity

Evolving Risks of Cybercrime with Matthew Rosenquist
podcasts.apple.com
June 07, 2019
The Innovators Behind DISRUPTION - Episode 27 by Evolve ETFs
Evolving Risks of Cybercrime with Matthew Rosenquist
- Growing systemic challenges in cybersecurity
- How the public sector can protect itself from cybercrime
- The NSA and its role in the recent Baltimore ransomware attack
- Opinions on Baltimore’s decision not to pay their cyber attackers
- CEOs recognizing cybersecurity as a major business risk
- Cybersecurity demand and spend
- Government concerns about cyber threats
- Advice on how to protect yourself from cyber attacks

See publication

Tags: Cybersecurity, Risk Management

Don't trust a company to keep you safe
Podcasts.apple.com
March 12, 2019
Interview of Matthew Rosenquist, Cybersecurity Strategist. Podcast by Lou Covey
A range of topics, including nation state attacks, data breaches, ransomware, Artificial Intelligence, dark web, and the perception of perfect security

See publication

Tags: AI, Cybersecurity, Privacy

13 Panels
Impact of Cyber Threats to the Global Entrepreneurship Ecosystem
Medium
March 14, 2023
It was my honor to contribute to a truly great panel discussing how cybersecurity impacts entrepreneurs and innovation around the globe. It is a must-watch for those building or growing businesses!

See publication

Tags: Cybersecurity, Risk Management, Entrepreneurship

Video Replay — Closing the Cyber Skills Gap Panel Discussion
Medium
November 05, 2021
The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. …

See publication

Tags: Cybersecurity, Privacy, Risk Management

2021 HMG Strategy Silicon Valley CISO Executive Leadership Summit
HMG Strategy
March 18, 2021
This panel will be discussing the #solarwinds breach, specifically the residual after-effects. Our #cybersecurity industry is going to shift again! Don't miss it.
March 18th 10am-1pm Pacific time
Executives only, attendance is free
Register here: https://lnkd.in/gjszR-p

See publication

Tags: Cybersecurity, Leadership, Business Strategy

Speaking at the HMG Atlanta Virtual CIO Summit
Medium.com
February 28, 2021
Leaders in the industry deliver world class insights and best practices for management, technology, and career development.

See publication

Tags: Cybersecurity, Leadership, Privacy

The Role of Cyber Culture in a Cyber Strategy
RightHand Cybersecurity
October 26, 2020
In an effort to evangelize October's Cybersecurity Awareness Month, join us on Wednesday, 28 October at 10AM PST to hear from Cybersecurity leaders on the importance of incorporating Cyber Culture as part of your organization's Cyber Strategy, and best practices to effectively do so.

See publication

Tags: Culture, Cybersecurity, Leadership

Cybersecurity & IoT Showcase 2020 Panel Discussion: Why Sacramento is Ripe to be a Cybersecurity Hub
StartupSac
October 20, 2020
The panel discussion, Why Sacramento is Ripe to be a Cybersecurity Hub, was a lively and engaging discussion. Moderated by Carmen Marsh and featuring Malcolm Harkins, Matthew Rosenquist, and George Usi, the panel discussed a broad range of topics including:

Why would someone pick Sacramento to start a cybersecurity product or services company?
What advice would you give an aspiring entrepreneur looking for innovative ideas? Suggestions about the roadmap for innovators
Where should cyber startups look for business opportunities/ projects?
Where can people find resources to get started or to find support for their ideas?
Where can they find mentors?
Where to look and find a skilled workforce?

See publication

Tags: Cybersecurity, Startups, IoT

HMG Live! Silicon Valley CISO Executive Leadership Summit
Uptrennd
September 29, 2020
The CISO summit was a great virtual conference with insightful speakers. I had the pleasure of moderating the "Securing the Future of Work" panel, which begins at 1:43:34, with Rahul Kashyap CEO Awake Security, Lamont Orange CISO Netskope, and Laura Whitt-Winyard, CISO DLL Group.

The panel of experts shared their advice on how CISOs can drive success in securing the future of work. We discussed the challenges, valuable steps forward, and the greatest opportunity CISO should pursue.

See publication

Tags: Cybersecurity, Leadership, Future of Work

Expert Panel Discusses Cybersecurity in the New Normal
CISO Platform
June 10, 2020
Watch panelists Chris Roberts, G. Mark Hardy, and Matthew Rosenquist at VShield 2020

I had the honor to be on a distinguished panel with the incredibly knowledgeable G. Mark Hardy and the infamous white-hat hacker Chris Roberts. We discussed the evolution of cyber resilience, agility, and innovation in these troubling times.

Watch the panel as we discuss the following topics:
- Is Covid-19 a turning point for cybersecurity?
- Are Insider Threats increasing with the shift to remote workforces?
- Are trusted employees still the greatest threat? How can security help improve employee behaviors?
- Privacy: is it a government, business, or societal problem? What is the responsible approach? Should tech companies be compelled to unlock user devices, build-in backdoors, or use weak encryption algorithms?
- Are Bug Bounty programs good or evil for technology?
- How important is IoT security? Are the emerging risks being addressed or ignored across transportation, critical infrastructure, and government agencies?
- Nation States – will the cold war intensify?
- How will hardware and firmware insecurity for critical infrastructure play out? Where are the risks?
- What are the most important emerging topics in cybersecurity!

See publication

Tags: Cybersecurity, Privacy, COVID19

VShield 2020 Cybersecurity Conference
Medium
May 20, 2020
I have the honor of being on the Cyber Resilience, Agility and Innovation in the New Normal panel with the distinguished and infamous G.Mark Hardy and Chris Roberts. We will be discussing a wide range of cybersecurity topics that impact every digital citizen on the planet!

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Modern Successful SOC & Artificial Intelligence round-table
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
It was my honor to lead a round-table of superstars at the Cybersecurity Symposium for Smart Cities 2019. Talking about how cryptocurrency has become the economic vehicle of choice by cybercriminals and how the emerging AI revolution can both aid Security Operations, but also enhance the threats.

The digital revolution is an arms race where we must all work together to keep pace with the evolving attackers. A truly outstanding discussion with this group of luminaries and terrific audience participation!

Thanks to Sabrina Yuan Co-Founder & COO of SecuritAI, Joanna Hu Data Science Manager at Exabeam, and Dr. Victor Fang Founder and CEO of AnChain.ai

See publication

Tags: AI, Cybersecurity, Smart Cities

Shared Pain Points & Opportunities for Secure Smart Cities
Cybersecurity Symposium for Smart Cities 2019
October 05, 2019
Had a great time moderating a smashing panel at the Cybersecurity Symposium for Smart Cities 2019. Great insights from our CIO’s, standards, and best practices experts in identifying critical aspects for cities! Much thanks to Linda Gerull, Liza Massey, Olaf Gerd Gemin, and Jerry Cox

See publication

Tags: Cybersecurity, Digital Transformation, Smart Cities

Ransomware: The Not-So Good, Really Bad, and Truly Ugly!
SecureWorld
August 18, 2018
RECORDED LIVE ON AUGUST 28, 2018 — WATCH ON-DEMAND
Ransomware is spreading at an alarming pace and infecting networks across all industries and company sizes, primarily through phishing attacks. The cyber criminals behind the attacks are furiously innovating and keeping ahead of defenses. In this web conference, we will have an interactive discussion on the latest in ransomware threats and how to best protect your organization and yourself against this growing threat.

This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also cover recent attacks and how the victim organizations could have better protected themselves.

The session will examine:
• Current phishing trends
• Ransomware and how it is infecting networks
• Effective mitigation strategies
• Recovering from an attack

See publication

Tags: Cybersecurity

Harnessing Cyber-Physical Security Technologies
Cyber: Secured Forum (cybersecuredforum.com)
June 05, 2018
A great panel discussion, led by Ray Coulombe of Security Specifiers, with Donal Keating from Microsoft and Jeff Crume of IBM. As the audience is a strong mix of both physical and cyber security professionals, we will discuss how the convergence of technology across both domains will rapidly change to open up new opportunities and risks. Expect topics around Internet-of-Things (IoT), Artificial Intelligence (AI), and blockchain to be discussed by the panel and open questions from the audience.

See publication

Tags: AI, Cybersecurity, Security

1 Patent
Hardware-generated dynamic identifier
US Patent Office
June 29, 2017
In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.

See publication

Tags: Cybersecurity, Innovation

7 Podcasts
AI Complicates Healthcare Security
Youtube
December 04, 2025
Check out the full podcast, where Jason discusses the impact of cyber threats on patient safety, the role of AI in healthcare, and the importance of resilience. His insights and humor are unmatched as he explores the challenges, progress, and mindset of healthcare cybersecurity!

See publication

Tags: Cybersecurity, Leadership, Privacy

Challenges for Healthcare Cybersecurity
Youtube
December 02, 2025
Discover how cyber threats impact patient safety, the evolving role of AI, and the critical importance of resilience in healthcare. Gain insights into the balance between security investments and patient care, and learn how the industry can move forward amidst complex threats. Don't miss this engaging discussion on the future of cybersecurity in healthcare. Subscribe for more episodes of Cybersecurity Vault!

See publication

Tags: Cybersecurity, Leadership, Privacy

AI powered phishing and fraud are evolving rapidly
Youtube
October 08, 2025
In today's digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here's what you need to know to protect yourself.

See publication

Tags: Cybersecurity, Leadership, Privacy

Learn How to Spot New AI-Powered Phishing
Youtube
October 08, 2025
Today, I encountered a sophisticated phishing attempt that highlights the growing capabilities of cybercriminals. From AI-generated emails to fake company profiles, these scams are becoming more convincing and harder to detect. It's crucial for individuals and businesses to enhance their cybersecurity measures and stay vigilant.

See publication

Tags: Cybersecurity, Leadership, Privacy

The Silent War on Digital Privacy with Andy Brown
Medium
September 02, 2021
The Cybersecurity Vault, Episode 1 — With the growing influx of sharable personal data and the power it holds in the lives of consumers and companies alike, is it possible to create a digital space that exchanges and protects data while still holding true to values of equity, privacy and accountability? Andy Brown, CEO at Sand Hill East, joins us this week in our quest to answer this question and unpack the potential for good that powerful new digital tools pose along with the dangers of their misuse.

See publication

Tags: Big Data, Cybersecurity, Privacy

Good Data Morning Show — LIVE!
Medium
March 02, 2021
Looking forward to discussing emerging cybersecurity challenges on the Good Data Morning Show, LIVE on LinkedIn and YouTube! April 2nd 11am ET (8am Pacific)
How safe are we in the digital world as an individual and as a company?

See publication

Tags: Cybersecurity

Focus of Cybersecurity is to Manage Digital Risk
Medium.com
February 24, 2021
I had such a great time talking about the challenges, chaos, and importance of cybersecurity to preserve trust in digital technology.

See publication

Tags: Cybersecurity, Risk Management

4 Quotes
Can Google’s New AI Ethics Service Be Of Any Help?
Analytics India Magazine
September 03, 2020
With biases in algorithms becoming a prime concern for companies, Google’s cloud division has come out with their new AI Ethics Services for helping in AI solutions. Planning to launch it by the end of this year, the tech giant, according to the news, will be offering its AI ethics services to companies who are working on AI projects.

See publication

Tags: AI, Cybersecurity, Privacy

Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Apress Open
January 01, 2020
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

Authors quote Matthew Rosenquist which reference the cybersecurity goals of organizations are to find a balance between risks, costs, and user experience.

ISBN-13: 978-1484228951
ISBN-10: 1484228952

See publication

Tags: Cybersecurity, IoT

Confident Data Skills: How to Work with Data and Futureproof Your Career
Kogan Page Limited
January 01, 2020
Data has dramatically changed how our world works. Understanding and using data is now one of the most transferable and desirable skills.

Author quotes Matthew Rosenquist regarding his position on the aggregation of data across platforms is very dangerous.


ISBN-13: 978-1789664386
ISBN-10: 1789664381

See publication

Tags: Big Data

Wireless Health: Remaking of Medicine by Pervasive Technologies
AuthorHouse
November 01, 2014
This book teaches the fundamental and practical knowledge necessary to advance wireless health technology and applications.

Author cites a paper of combined work from David Houlding, Tim Casey and Matthew Rosenquist "Improving healthcare Risk Assessments to maximize Security Budgets" Feb 2012

ISBN: 978-1-4969-3414-7

See publication

Tags: HealthTech, Healthcare

6 Speaking Engagements
Cyber Security Sauna podcast — Matthew Rosenquist on why value is the cybersecurity blind spot
Medium
September 13, 2022
I had a great time talking with Janne Kauhanen in the Cyber Security Sauna podcast, talking about why Value is the blind spot of cybersecurity and how we should maximize it!

See publication

Tags: Cybersecurity

HMG Live! CISO Virtual Summit
Medium
August 20, 2020
Mark your calendars. The HMG Live! Silicon Valley CISO Virtual Summit, on Aug 25th 10am Pacific, is a conference for #cybersecurity professionals interested in the latest perspectives on the shifting risks and opportunities of future business

See publication

Tags: Cybersecurity, Future of Work

Evolving Risks of Cybercrime with Matthew Rosenquist podcast
https://evolveetfs.com/podcasts/
June 07, 2019
Interviewed by Raj Lala, the CEO at Evolve ETFs in his podcast The Innovators Behind Disruption. In the
"Evolving Risks of Cybercrime with Matthew Rosenquist" episode, we covered a number of interesting topics, including the growing challenges in cybersecurity, rise in cybercrime, challenges of ransomware, what governments are worried about, and how to protect yourself.

See publication

Tags: Cybersecurity, FinTech, Risk Management

Cyber/Physical Convergence
2017 InfraGard Atlanta conference
January 18, 2017
Matthew Rosenquist's presentation at the 2017 InfraGard Atlanta conference, discussing the convergence between cyber and physical security.

See publication

Tags: Cybersecurity, Risk Management

The True Cost of Data Breaches - Not Just a Dollar per Record
CyberEd.io
March 22, 2016
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party forensic services, changes to business processes, as well as a loss of reputation and customer goodwill.

There is a complex set of chain reactions which occur after every significant data breach, each adding its own contribution to the overall cost and business impact.

In this session we'll discuss some real-world experiences regarding data breaches, how the costs exceed the typical dollar-per-record measure, and how organizations are adapting to learn from their experiences. We will also examine what the future holds, as attackers adapt and shift towards new data manipulation methods.

See publication

Tags: Cybersecurity, Risk Management

Upgrading to an APT-Capable Defense: Where To Start, How To Get Funding And See Immediate Reduction In Risk
Cybered.io
February 26, 2016
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In this session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real-world deployments and learn how to gain executive sponsorship of the program as a whole, to build momentum and help guarantee success.

See publication

Tags: Cybersecurity

72 Videos
Cyber Attacks Are Increasing Against Critical Infrastructure
Medium
December 26, 2022
The Critical Infrastructure sectors, 16 in total that are the foundation of a country and economy to operate, are coming under more pressure from cyber-attacks. The trend will not subside because of who is behind these sinister attacks!

See publication

Tags: Cybersecurity, Privacy, Risk Management

Is Russia Testing the Waters in Cyberattacks Against the US
Medium
October 12, 2022
Russian cyberattacks are targeting government and now airlines websites. These are part of the US Critical Infrastructure. The cybersecurity attacks are weak at the moment, but may quickly escalate.

See publication

Tags: Cybersecurity, Risk Management, Security

Russian Failures in Ukraine Raise the Global Cyber Risks
Medium
September 28, 2022
As Putin’s war on Ukraine reveals stunning failures of Russian forces, the embarrassed leader becomes more desperate. This has ramifications on the overall global security of digitally connected systems, potentially affecting all of us.

See publication

Tags: Cybersecurity, Risk Management, Security

Ukraine Counteroffensive Success Will Spur More Cyberattacks From Russia
Medium
September 14, 2022
As Ukraine makes significant gains over Russia as part of their counteroffensive, we must expect Putin to respond to the embarrassment in many petty ways, including leveraging cyberattacks against countries that have been supplying and supporting Ukraine.

See publication

Tags: Cybersecurity, Security

Albania Expels Iranian Diplomats Over Cyber Attack
Medium
September 12, 2022
Albania has expelled Iranian diplomats and severed diplomatic relations with Iran because of cyberattacks from the Iranian Intelligence Agency that targeted government services and websites. Such an icy diplomatic response has never happened before and it may open the door as a precedent for how many countries will respond to future nation state attacks.

See publication

Tags: Cybersecurity, Risk Management

HexCon22 — Two Cybersecurity Value Aspects You Are Missing
Medium
September 02, 2022
I am excited to be speaking at HexCon22 about how CISO’s must improve their ability to showcase relevant outcomes and quantify cybersecurity value in ways that align to the overall business goals of the organization!

See publication

Tags: Cybersecurity, Risk Management

Lloyd’s New Cyber Insurance Exclusions Aim to Avoid Payouts from Nation State Hacks
Medium
August 22, 2022
The recent announcement by the insurance giant Lloyds of London, may be the biggest cybersecurity news of the year. It might not seem all that relevant, but strategically, this will likely shift the entire industry and politics of cybersecurity.

See publication

Tags: Cybersecurity, Risk Management, Security

3 Tips to Maximize Cybersecurity Value
Medium
July 11, 2022
Delivering maximum value is a momentous challenge for cybersecurity organizations. It takes a decisive effort to organize and prioritize the proper goals that are meaningful to the business, and establish operational excellence to deliver effectiveness and efficiency. But running a good risk program that manages the defensive posture by addressing internal vulnerabilities is not enough. There are external factors that have a profound impact on the likelihood of attack and business factors that matter to the executive suite which could represent a competitive advantage to the corporate bottom line.

See publication

Tags: Cybersecurity, Security

Value is the Cybersecurity Blind Spot
Medium
May 16, 2022
The industry currently suffers from a weakness to understand, align, and showcase its maximum potential value, which extends beyond managing digital risks and often includes non-traditional competitive advantages which contribute to the overall business goals.

See publication

Tags: Cybersecurity, Risk Management, Security

Announcing 2022 Cybersecurity Predictions
Medium
January 16, 2022
2022 will be a very tumultuous year for cybersecurity professionals. The underlying fundamentals that drive major shifts of the cybersecurity industry — technologies, threats, and economic factors, will introduce new risks and combine to significantly increase the relevance and challenges of protecting digital assets and capabilities.

See publication

Tags: Cybersecurity, Privacy, Security

Growing Cyber Risks of Firmware with Scott Scheferman
Medium
December 22, 2021
Firmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers. In today’s Cybersecurity Insights podcast, I am talking with Scott Scheferman about the growing cybersecurity risks of firmware that could undermine most of the security controls in computer systems.

See publication

Tags: Cybersecurity

International Coalition Fails to Address Ransomware
Medium
October 20, 2021
U.S. leadership organized a meeting with over 30 nations to figure out how to address the growing problem of ransomware. The results were unimpressive, lacking the bold innovation needed to stem the meteoric rise of ransomware that is targeting businesses and the critical infrastructure that citizens depend upon for security, health, services, and prosperity.

See publication

Tags: Cybersecurity, Privacy

The Next Big Data Breach You Need to Know About
Medium
October 13, 2021
The Syniverse hack may be the most important data breach of the year!
Hackers had access for 5 years and potentially compromised hundreds of billions of SMS text messages, likely including 2nd Factor Authentication codes that protect logins and are used to reset passwords.

See publication

Tags: Big Data, Cybersecurity

Why Trust in Digital Tech is the Key to Future Innovation
Medium
September 29, 2021
I was honored to speak at the Hexcon21 cybersecurity virtual conference this year and wanted to repost my presentation for all who did not get a chance to watch the live event.
I discussed why trust in digital technology is the key to sustaining a future where digital innovation and adoption continue to thrive.

See publication

Tags: Cybersecurity, Innovation, Privacy, Risk Management

Cybersecurity Progresses from Mitigating Risks to Deliver Profit Opportunities
Medium
September 08, 2021
Cybersecurity is breaking out from just preventing risk of loss! Forward thinking companies are showing leadership by leveraging cybersecurity capabilities to contribute to market position and profitability opportunities. In today’s video I cover some of the ways cybersecurity is being leveraged for the bottom line.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Rohit Parchuri on the Challenges of Securing Future Healthcare
Medium
September 03, 2021
The Cybersecurity Vault — Episode 2 — The risks and opportunities of securing data are shifting rapidly for the healthcare industry. Rohit Parchuri who serves as the CISO for Collective Health Security, discuses the rapidly changing challenges in healthcare that will affect every American.

See publication

Tags: Cybersecurity, HealthTech, Risk Management

Anti-Money Laundering Detection Tool on the Dark Web
Medium
August 24, 2021
A new tool is gaining popularity on the dark web which provides insights to users if their cryptocurrency activity might be flagged by authorities as potentially illicit. Such a tool can provide cybercriminals the intelligence necessary to stay under-the-radar of law enforcement. Conversely, the tool may help law enforcement understand how to shift their threshold to catch those who are looking to evade detection!

See publication

Tags: Cryptocurrency, Cybersecurity

Arguments Against Criminalizing Ransomware Payments
Medium
August 11, 2021
The goal is to effectively end ransomware as a significant cybersecurity risk for everyone. In exploring the different strategic options, one path has emerged superior, in which the flow of money to the ransomware attackers is essentially stopped. The only way to make that happen consistently is to compel the victims to not pay by making it a criminal act. However, not everyone agrees.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Why REvil Ransomware Group Suddenly Disappeared
Medium
July 20, 2021
The notorious REvil ransomware cybercriminal group suddenly disappeared without explanation, spurring lots of speculation in the cybersecurity community. In this week’s video, we go over the results of a recent poll among security professionals that revealed what they believed was behind the REvil’s disappearance and if they will be back.

See publication

Tags: Cybersecurity

Ransomware Explained — Ending Ransomware
Medium
July 16, 2021
Stopping ransomware from being an impactful menace is the grand goal, but what are the specific criteria for success we should be striving for? Without clear objectives, we are often consumed with trivial aspects and never attain the desired end-state.

See publication

Tags: Cybersecurity

Ransomware Explained — 3 Fundamental Ways to Stop Cyberattacks
Medium
July 07, 2021
There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part series on Ransomware. The series is free on the Cybersecurity Insights YouTube Channel.

See publication

Tags: Cybersecurity

Ransomware Cybersecurity Fireside Chat
Medium
June 29, 2021

See publication

Tags: Cybersecurity, Privacy, Risk Management

Ransomware Explained — Understanding the Attackers
Medium
June 24, 2021
Understanding the attackers is the first step in identifying an effective, efficient, and sustainable paths to mitigating the risks of ransomware.

See publication

Tags: Cybersecurity, Privacy

Ransomware Explained Video Series
Medium
June 09, 2021
Ransomware is a rising threat to every organization, device, and person connected to the Internet. All the products, services, and critical infrastructures are at risk of being victimized. We are all being impacted by this type of cybercrime and it is only the beginning.

See publication

Tags: Cybersecurity, Risk Management

2 Biggest Factors Driving the Future of Cybersecurity
YouTube
June 03, 2021
Cybersecurity can appear random and chaotic, but there are basic fundamentals that drive the course of cyberattacks.

In today’s video, I dive into the two biggest factors that shape cybersecurity risks, attacks, and what drives the direction of the security industry.

See publication

Tags: Cybersecurity, Social, Business Strategy

1 Webinar
Future of Offensive Attack Simulation: Strategies, Tools & Techniques
Medium
November 18, 2020
A hack is executed every 39 seconds and impacts one in three Americans every year.
Join us in the discussion on Future of Offensive Attack Simulation: Strategies, Tools & Techniques with Bikash Barai and Matthew Rosenquist

See publication

Tags: Cybersecurity

3 Webinars
Firmware: How Risk Executives Are Managing New Threats to the Foundation of Computing
SINET
October 26, 2021
Gartner advises there are 15-20 firmware components in every endpoint, 20-30 components in every server, and is present as the “digital DNA” in every networked and connected device. Is there an emerging trend where Cybersecurity Risk Executives and threat teams are moving from traditional views of firmware as a ”black box”, specified and constructed by vendors in a vacuum and beyond scope of their assessments and mitigation techniques? Are attackers turning to firmware-based exploits and if so why? Off-the-shelf boot-level attack kits are readily available and UEFI-level tactics are being shared in dark web forums that can go unnoticed by traditional vulnerability, risk and end endpoint security programs. During this session we will discuss the apparent collision between new firmware-oriented attack vectors and traditional Cybersecurity tools, roles and boundaries.

See publication

Tags: Cybersecurity, Innovation, Risk Management

The Next Disruption: Hybrid Working
HMG Strategy
June 10, 2021
When the pandemic hit, many of our lives were turned upside down, including how we work and how we live. Almost all face-to-face encounters are now being substituted by virtual communication with many of us doing our work at our kitchen table. We went through this dramatic shift in all areas of our lives at once – everything pivoted to a remote-first environment and for many of us this was a sudden and dramatic change. Zoom is looking at this stage as Building Forward with Confidence and we are working with clients to take what we knew worked pre-pandemic combined with what we learned during the pandemic and hopefully use that as a model building forward. Now we are looking at a second disruption: A reorganization of how we work, where we work from and when we work. What is that going to look like? How are the changes we created to continue our lives during the pandemic going to evolve? Please join us for a panel discussion with Gary Sorrentino, Zoom Global Deputy CIO and other C-level technology leaders on how we can all prepare for this next shift how we work.

See publication

Tags: Digital Disruption, Leadership, Future of Work

Webinar: The Role of Cyber Culture in a Cyber Strategy
YouTube
October 29, 2020
Watch the recorded version of the webinar "The Role of Cyber Culture in a Cyber Strategy". Our guest speakers Jack Roehrig, CISO at Turnitin, and Matthew Rosenquist, CISO at Eclipz, shared great insights on how to incorporate Cyber Culture as part of your organization's Cyber Strategy, and best practices to effectively do so.

See publication

Tags: Cybersecurity, Management, Business Strategy

3 Whitepapers
McAfee Labs 2017 Threats Predictions
McAfee
November 30, 2016
McAfee Labs explores top threats expected in the coming year.

Welcome to the McAfee Labs 2017 Threats Predictions
report. We have split this year’s report into two sections.
The first section digs into three very important topics,
looking at each through a long lens.

The second section makes specific predictions about
threats activity in 2017. Our predictions for next year
cover a wide range of threats, including ransomware,
vulnerabilities of all kinds, the use of threat intelligence
to improve defenses, and attacks on mobile devices.

See publication

Tags: Cybersecurity, Risk Management

Prioritizing Information Security Risks with Threat Agent Risk Assessment
Intel Corp
January 05, 2010
Matthew Rosenquist, while at Intel Corp developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.

It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to prioritize specific areas of concern, we can both proactively target the most critical exposures and efficiently apply our resources for maximum results. The TARA methodology identifies which threat agents pose the greatest risk, what they want to accomplish, and the likely methods they will employ. These methods are cross-referenced with existing vulnerabilities and controls to pinpoint the areas that are most exposed. Our security strategy then focuses on these areas to minimize efforts while maximizing effect.

See publication

Tags: Analytics, Cybersecurity, Risk Management

Defense In Depth Strategy Optimizes Security
Intel Corp
September 30, 2008
Matthew Rosenquist of Intel IT has developed a Defense-in-Depth strategy that optimizes security using interlocking predictions, prevention, detection, and response capabilities. We recognize that attackers are human opponents who constantly evolve new tactics and that it would be prohibitively expensive and near impossible to protect against every vulnerability. Our strategy uses prediction to gain insights into the most likely threats, attack methods, and targets. This allows a proactive and efficient focus of resources.

See publication

Tags: Cybersecurity, Innovation, Risk Management

Thinkers360 Credentials

17 Badges

Radar

2 Trends
Cybersecurity

Date : July 29, 2020

Digital technology connects and enriches the lives of everyone, but there are risks. Cybersecurity protects against the undesired risks of misuse for connected technology, specifically the undermining of confidentiality, integrity, and availability of computer based digital systems. The growth, adoption, and reliance on tech also elevates the risks.

See Radar

Digital Privacy

Date : July 29, 2020

As more data is collected, analyzed, correlated and share about individuals, the greater the risks that people will be victimized or their rights will be violated.

See Radar

1 Industry Scenario
Ransomware increase in Q2

Date : July 29, 2020

The industry report highlights the latest maneuvers from the Ransomware threats. Cyber criminals are showing bold moves and a growing sense of business negotiation savvy. They are becoming more professional.

See Radar

5 Predictions
Entering into the heyday era for cybercriminals and AI powered social engineering

Date : October 22, 2025

Cybercriminals will successfully leverage Artificial Intelligence tools to greatly increase the quantity of social engineering attacks and the effectiveness of the victimization. AI will automate the distribution of vastly more compelling fraudulent communications that are interactive, customized for specific individuals, and superbly take advantage of cognitive vulnerabilities. AI powered social engineering cyberattacks will be much more difficult to detect and avoid, creating a global spike in data loss, fraud, and the harvesting of credentials.

See Radar

2024 Predictions for Cybersecurity

Date : November 22, 2023

Aggressive nation-states will significantly increase cyberattacks against national critical infrastructures in 2024. Their capability to massively fund the discovery and exploitation of serious vulnerabilities, coupled with their advanced tools and tactics, will force cybersecurity organizations to rethink how they can rapidly adapt to maintain effectiveness and show sustaining value.

See Radar

2022 Cybersecurity Predictions

Date : November 29, 2021

Cybersecurity will continue to rapidly gain in relevance and importance in 2022 as the world continues to rely upon digital technologies and embrace the accompanying risks of innovation. 2022 will see the rise of Nation-State cyber-offensive activities and the growth of cybercriminals. These threat actors will focus attacks against technology supply-chains and all manner of national critical infrastructures, such as banking, healthcare, government services, logistics, communications, and transportation. Most visibly, ransomware attacks will capture the bulk of media headlines, but more sophisticated attacks will occur in stealth. The cybersecurity industry will struggle with resources and agility in responding to new attacks, but consumers will begin to demand that products and services are trustworthy, fueling greater support by executives for cybersecurity programs that manage security, privacy, and safety.

See Radar

2021 Predictions for Cybersecurity

Date : October 22, 2020

Cybercriminals focus on targeting the growing online digital economy causing considerable disruption and financial losses

As the usage, control, and flow of money transitions to digital financial services, online shopping, decentralized finance, and digital currencies, cybercriminals will greatly increase their attacks on these aspects of the digital economy to target financial assets.

Highly customized phishing, more creative impersonation attacks, DDoS extortion, digital exchange hacks, cryptocurrency fraud, and online credential theft will ramp to epidemic levels, forcing the development of new cybersecurity capabilities.

Governments will be spurred to explore new regulatory frameworks and to directly act in ways to protect citizens assets and activities. This will create more tension with the rise of privacy relevance and fears of government oversight.

- Matthew Rosenquist, CISO and Industry Cybersecurity Strategist, Eclipz.io

See Radar

2020 Predictions for Cybersecurity

Date : September 25, 2020

2020 Year of Enlightenment for Cybersecurity – It will become evident to the public that the worst impacts are not data breaches, but rather the trust in critical systems that underpin the activities of daily life. Outages against government services, public utility systems, financial services, retail and manufacturing industries, healthcare, communications, social and news media, and systems of democracy will be more severe and impactful to people. The attackers will be a mix of cybercriminals seeking financial gain, nation-states projecting policy, and radical groups pushing their agenda. Failures will be scattered across the globe. The scope and severity of attacks we will see in 2020 will drive the realization that we have reached a point where our everyday lives, now heavily reliant on the digital world, are tremendously vulnerable to cyber-attacks that can impact every person in so many new ways. Trust in technology will begin to be questioned by the public.

See Radar

Blog

Opportunities

1 Business Advisory
Cybersecurity Strategy Advisement and Event Speaker

Location: Virtual    Fees: Negotiable

Service Type: Service Offered

Insights and recommendations on emerging cybersecurity threats, business opportunities, and best practices.

30 years of experience and industry advising to academia, businesses, governments, and audiences across the globe.

Respond to this opportunity

Events

1 Physical Event
Firmware: How Risk Executives Are Managing New Threats to the Foundation of Computing

Location: Virtual    Date : November 09, 2021 - November 09, 2021     Organizer: SINET

Gartner advises there are 15-20 firmware components in every endpoint, 20-30 components in every server, and is present as the “digital DNA” in every networked and connected device. Is there an emerging trend where Cybersecurity Risk Executives and threat teams are moving from traditional views of firmware as a ”black box”, specified and constructed by vendors in a vacuum and beyond scope of their assessments and mitigation techniques? Are attackers turning to firmware-based exploits and if so why? Off-the-shelf boot-level attack kits are readily available and UEFI-level tactics are being shared in dark web forums that can go unnoticed by traditional vulnerability, risk and end endpoint security programs. During this session we will discuss the apparent collision between new firmware-oriented attack vectors and traditional Cybersecurity tools, roles and boundaries.

See Event

4 Online Events
HexCon21 by Hexnode

Location: Virtual    Date : September 21, 2021 - September 23, 2021     Organizer: Hexnode

Latest in the industry right from the best in the industry. Be the first ones to hear about our latest announcements and forecasts.

Training sessions straight from the people who brought you Hexnode. Better yet, you get certified as the go-to person for everything Hexnode.

See Event

The Next Disruption: Hybrid Working - Webinar

Location: Virtual    Date : June 10, 2021 - June 10, 2021     Organizer: HMG Strategy

When the pandemic hit, many of our lives were turned upside down, including how we work and how we live. Almost all face-to-face encounters are now being substituted by virtual communication with many of us doing our work at our kitchen table. We went through this dramatic shift in all areas of our lives at once – everything pivoted to a remote-first environment and for many of us this was a sudden and dramatic change. Zoom is looking at this stage as Building Forward with Confidence and we are working with clients to take what we knew worked pre-pandemic combined with what we learned during the pandemic and hopefully use that as a model building forward. Now we are looking at a second disruption: A reorganization of how we work, where we work from and when we work. What is that going to look like? How are the changes we created to continue our lives during the pandemic going to evolve? Please join us for a panel discussion with Gary Sorrentino, Zoom Global Deputy CIO and other C-level technology leaders on how we can all prepare for this next shift how we work.

See Event

2021 HMG Strategy Silicon Valley CISO Executive Leadership Summit

Location: Virtual    Date : March 18, 2021 - March 18, 2021     Organizer: HMG Strategy

This panel will be discussing the #solarwinds breach, specifically the residual after-effects. Our #cybersecurity industry is going to shift again! Don't miss it.
March 18th 10am-1pm Pacific time
Executives only, attendance is free
Register here: https://lnkd.in/gjszR-p

See Event

Free Webinar: The Role of Cyber Culture in a Cyber Strategy

Location: Virtual    Date : October 28, 2020 - October 28, 2020     Organizer: Right-Hand Cybersecurity

In an effort to evangelize October's Cybersecurity Awareness Month, join us on Wednesday, 28 October at 10AM PST to hear from Cybersecurity leaders on the importance of incorporating Cyber Culture as part of your organization's Cyber Strategy, and best practices to effectively do so.

See Event

Contact Matthew Rosenquist

Book Matthew Rosenquist for Speaking

Book a Video Meeting

Media Kit

Share Profile

Contact Info

  Profile

Matthew Rosenquist


Latest Activity

Latest Opportunities

Search
How do I climb the Thinkers360 thought leadership leaderboards?
What enterprise services are offered by Thinkers360?
How can I run a B2B Influencer Marketing campaign on Thinkers360?