With the UK increasingly in need of people in information security jobs to tackle cyber crime, certain actions are being taken at corporate and government levels. In the academic field too, universities across the country are recognising the need to offer degree courses specially designed to develop and strengthen the cyber skill base throughout the country.
This growing recognition of the threats – and the steps that can be taken by businesses and public sector agencies to counter them – is being further supported by current experts in the field via the use of social media.
Free eBook: Modern Retail Security Risk – Get your copy now.
Here are four cyber security experts who are getting their messages out there. Adding these people to your news feeds is just one way to stay in touch with current trends.
1. Wendy Nather – @451wendy
Heading up the division focusing on enterprise security for 451 Research, Wendy Nather’s Twitter feed has become a go-to for many working in information security. IT security professionals would do well to consider her latest posts too, with her firm providing detailed analysis of the latest innovations for IT in business.
Wendy can be followed through her Twitter account @451wendy, where she has over 6,500 followers.
2. Ken Westin – @kwestin
Ken is a security researcher with 14 years experience building and breaking things through the use/misuse of technology.
His technology exploits and endeavors have been featured in Forbes, Good Morning America, Dateline, New York Times, The Economist and has won awards from MIT, CTIA, Oregon Technology Awards, SXSW, Entrepreneur and named in Portland Business Journal’s 2013 “40 Under 40”.
You can follow Ken at his Twitter account @kwestin and join his other 12,000+ followers.
3. Graham Cluley – @gcluley
A researcher, blogger and public speaker with a number of awards in his belt, Graham has been involved in the industry since the early ‘90s.
With an employment history that encompasses big names in the field like Dr. Solomon’s, Sophos and McAfee, he is knowledgeable when it comes to cyber security and has worked alongside various law enforcement agencies around the world. Graham also led a discussion at the London-based RANT Conference in 2014. You can follow his Twitter account @gcluley.
4. Brian Krebs – @briankrebs
Brian Krebs worked for around 15 years as the cyber crime correspondent for the Washington Post. Building up a respected network of professionals in the field, he then went on to create his own advisory website.
His Twitter account is used almost exclusively to discuss the threat from cyber crime and other issues relating to it. With more than 77,000 followers, tapping into his Twitter account (@briankrebs) is highly recommended.
5. George V. Hulme – @georgevhulme
A professional writer, George Hulme has also become an accomplished expert in IT security. We find that he explains relatively complex issues in an easily understood way. With around 20 years of experience in his specialist field, he is has a number of connections with whom he stays in touch on Twitter.
Discussing cloud computing too, he delivers posts relevant to the majority of his near 12,000 followers on his Twitter account @georgevhulme.
These are five of the most respected experts in cyber security today, as indicated by the positions they command and their work in the field. With the landscape changing all the time, keeping your follow list updated as regularly as possible is essential.
About Acumin
Acumin is an international Information Security and Information Risk Management recruitment specialist. The company works with a variety of markets comprising of End Users, IT Security Vendors, Systems Integrators and Consultancies.
Acumin provides a range of specialist services which include contingency Permanent Recruitment, Contract Recruitment and retained Executive Search. For SMB and Enterprise End User clients, Acumin facilitates the development of internal Information Security and Risk Management teams across the UK, Europe and United States.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.