After consultation with a panel of highly respected judges, we’re delighted to reveal the IFSEC Global influencers 2018 – cybersecurity category.
The roll call of influencers across the security and fire industries is broken down into seven categories – which you can click on below to reveal the final rankings. We defined ‘influence’ in the following ways:
- Someone who has played a key role in driving technological innovation
- Someone who has been a driving force in changing regulation, standards/guidance or best practice
- Someone whose insights/opinions are widely respected and which are influential in shaping debate around industry issues
- Someone who has been instrumental in the success of the organisation or business they lead or are employed by
- Someone who has helped to raise the industry’s profile or been an influential voice in the national media
We’d like to thank Grant Lecky, co-founder of the Security Partners Forum, for his tireless efforts as lead judge. Lecky, who himself featured in IFSEC Global’s list of top influencers in 2014 and 2017, appointed the panel of judges (which you can also view below) and coordinated the nominations and judging process. Thanks also to Bonnie Butlin, also co-founder of the Security Partners Forum and number one in last year’s international thought leader rankings, for helping to coordinate the process.
20. Rob Labbe, Director, Information Security, Teck Resources Ltd and Chairman, MM ISAC
In his own words: Driven and motivated security leadership professional with a background in application security. Focused on proactive security policy, processes and tools to help end the cycle of “security whack-a-mole” that exists in the industry today. I’m a big believer that the key to designing effective security programs starts and ends with understanding the business objectives, challenges, risks and constraints of the business – then working to design a lightweight security program that is not only aligned with the business, but builds and supports the business in achieving operational objectives. In addition to designing and building effective security programs, my other passion is building security teams and professionals. Guiding, mentoring and building technical and personal skills is key to the success of any security program – and something that no amount of money spent on tools and products can make up for
19. Colin Lobley, CEO, Cyber Security Challenge UK
A proven and respected business leader and executive advisor in the defence, security and IT sectors, with a reputation for delivering tangible financial and operational improvements. Strong leadership experience in both SMEs and in managing substantial P&Ls, programme budgets, and large global teams. Expertise in strategy and transformation: formulating and executing optimal go-to-market strategy and operating models at corporate, business unit and product/service level. Experience across multiple sectors, including: Government organisations, Blue-Light Services, defence and security suppliers, IT suppliers, professional services, financial services and other critical infrastructure sectors. Focused for the past 10 years on information management and cyber security, developing and executing market entry and growth strategies for suppliers, as well as internally-facing information management, risk and security frameworks and functional target operating models. A regular contributor and author of blogs and articles in leading publications on the subjects of strategy execution, risk management, and information / cybersecurity.
18. Kavya Pearlman, Information Security Director, Linden Lab
Kavya Pearlman is the Information Security Director at Linden Lab; protector of two virtual world economies, Second Life and the latest social VR platform called Sansar. Prior to Linden Lab, Kavya advised Facebook Information Security Team on mitigating Third Party Security Risks. Kavya graduated from DePaul University, Chicago with a Masters in Network Security and holds a CISM (Certified Information Security Manager) certificate from ISACA. Kavya is also certified PCI-DSS ISA (Internal Security Assessor). Kavya Grew up in India and came to the United States in 2007. She proudly uses the freedom this country offers, being a Hindu born Jewish woman who converted to Islam. Besides Security Kavya’s other passions are VR (Virtual Reality) and learning about virtual economies including cryptocurrencies.
‘Kavya is a representative of what a woman can do in spite of adversity, especially if she puts her mind to it. Until 2011, Kavya was a cosmetologist and cutting hair for $10 and hour. It was then she read Cyberwar by Richard Clark and saw a window into the future . She could foresee what is happeneing in today”s landscape. In her research she calls it “Cyber Political Engineering” Kavya is the Information Security director or up and coming virtual reality firm called Linden Lab. She is the protector of two virtual world economies- second life and sansar. Just her presence as a covered Muslim woman speaks volume and inspires woman around the world. Kavya did not have any support when she started to pursue cyber security- al she had was passion and dedication. Yet she has now worked for organizations like Facebook and is a prominent speaker and advocate for women in security.”
17. Jane Frankland, MD, Cyber Security Capital
Jane Frankland is an author, speaker and entrepreneur. In 2017, she was named as the 3rd most influential person in cybersecurity in the UK, and the Diversity Champion winner at Cyber Security Awards. As the Founder of Cyber Security Capital, a coaching, training and membership firm, she specialises in high performance for leaders and entrepreneurs in security, at all levels. Jane has over twenty years worth of experience in cybersecurity, has built and sold her own global, multi-million dollar hacking firm and held executive positions at renowned consultancies. Over the years she has launched, created and been actively involved in numerous leading accreditation organisations, forums and schemes including OWASP, CREST and Cyber Essentials. She currently serves as an awards judge for several organisations in Europe and the USA, and as a Board Advisor for C-levels. She authors many articles, is featured in industry and iconic British media, and is sought after as an international keynote speaker. Jane is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world. Believing passionately in freedom, empowerment and entrepreneurism her vision is to build a safer, more secure world by growing and enabling diverse, relevant talents in cybersecurity. It’s why she authored her best-selling book, IN Security: Why a failure to attract and retain women in cybersecurity is making us all less safe, and created the IN Security Movement and Members Club.
16. Sarb Sembhi, CTO, CISO & DPO, Virtually Informed
Based on his extensive knowledge of Enterprise and Information Security he has worked as a volunteer in many senior roles for ISACA and been actively involved at Govt level. He is a CTO & CISO and is well known for speaking, writing and contributing to many events and publications. He speaks and Chairs many security events which have included IFSEC since 2009 with James Willison, ASIS International, on Converged Security Management, the Noord CISO Dialogue (17 times), ID Management, ESRM. He also regularly chairs executive dinners for event companies as a knowledgeable independent chair. Sarb has sat on the following Judging Panels (SC Awards three times; IFSEC Awards four times; FSTech Awards once; Trailblazer Awards six times). He has contributed to several security standards including the ANSI ASIS Physical Asset Protection Standard 2012, and publications in Information Security Magazine and Risk UK. He was an active member of the IET Intelligent / Smart Buildings Resilience project and brought his expertise to this pioneering group. He is now leading a whole new approach to IFSEC 2018 with Gerry Dunphy and James Willison. Together they will bring the first Converged Security Centre to an International Security event to showcase cyber physical attacks on organisations in a real time environment. Sarb’s membership / roles / affiliations are: Past Chair of the ISACA London Security Advisory Group; Past-President of the London ISACA Chapter; Chair of ISACA International Government & Regulatory Advocacy Committee; ISACA Relations Board; ISACA Cloud Computing Task Force; Secure Software Development Partnership; Editorial Board member of InfoSecurity Magazine; Individual member of PITCom (Parliamentary IT Committee). Sarb’s specialties: Networked CCTV System Vulnerabilities, Converged Security Risk Management, Secure Software Development (Secure by Design), Software Development Standards, Data Integrity Attacks, Protecting the people responsible for Critical Business Assets.
“Sarb continues to demonstrate his commitment to bringing all security professionals to a deeper understanding of the complex risks they face and through helping them see the diversity of these threats he also helps them understand the best response.Sarb Sembhi is a passionate and dedicated security professional who is committed to protecting people and organisations from cyber physical harm and has given significant time to helping others understand the implications of cyber physical security risk.”
15. Tammy Moskites, Managing Director/Senior Security Executive of Security products, Accenture
Tammy has 30 years of experience and is noted by her peers to be a results-driven and passionate executive leader with expertise envisioning and leading Information Security, Cyber Security and Technology focused organizations. She is a career CISO and a well-known member of the CISO community. Tammy is currently working for Accenture as Managing Director/Senior Security Executive of Security products where she is leading, building and scaling some of the most powerful security offerings ensuring High Performance – Delivered. She previously was the CIO & CISO for Venafi and lead their Executive advisory board. She has also served as the CISO at Time Warner Cable and The Home Depot. Over the last several years Tammy has dedicated her career to guide fellow CISO’s worldwide to help them defend their organizations from cyber threats and attacks. Tammy has driven and moderated numerous CISO dinners and speaking engagements around the world to generate and encourage information sharing within the CISO community. Amongst the many areas she is involved in, she is Distinguished Fellow with the Ponemon Institute and volunteers her time with many organizations she is passionate about, including advisors to ISACA, ISSA and MIS|TI.
Her passion on security and leadership expertise has been in quoted, interviewed and written about in articles, newspapers, magazines and on radio around the world, including FORBES “Meet the Woman Powering the Fight Against Cybercrime” and the cover of CSO Magazine. Tammy is also currently an editorial advisor to EC-Council’s – CISO Magazine. She has a blog on CSO-online “Queen of Candor” which is also her twitter handle. Tammy is certainly a sought after global speaker, not only on security, technology and governance, but also about career building, women in technology and leadership mentoring. She is enthusiastically involved with SheLeadsTech™ focused on getting more women in technology leadership roles and the technology workforce.
She volunteers her time whenever she can to educate those on security – and speaking at schools to let them know “Security is Cool”. She also gives back by providing an annual scholarship at the high school she graduated from toward their education in Cyber Security. Tammy continues to provide strategic guidance to other industry leading security vendors where she is currently a company board advisor to Attivo Networks and Venafi and was previously an advisory member of Box and Qualys.
Tammy has had numerous accolades/awards in her career and continues to drive excellence in everything that she gets involved in. She is the Kevin Bacon of Security – “The Six Degrees of Tammy Moskites”. Most everyone knows her, heard her speak or has been fortunate enough to work with or for her will tell you, you can hear her passion, she truly loves what she does – every day!”
14. Professor Bill Buchanan OBE, Professor in the School of Computing, Napier University
He was appointed an Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security. In 2018 he received an “Outstanding Contribution to Knowledge Exchange” at the Scottish Knowledge Exchange Awards. One of his most recent achievements is the creation of a Blockchain Identify Lab and which is one of the first of its type in the world, and has significant industry funding. He leads the Centre for Distributed Computing, Networks, and Security at Edinburgh Napier University and The Cyber Academy (http://thecyberacademy.org). His main research focus is around information sharing, IoT, e-Health, threat analysis, cryptography, and triage within digital forensics. This has led to several World-wide patents, and in three highly successful spin-out companies: Zonefox (zonefox.com); Symphonic Software (www.symphonicsoft.com/); and Cyan Forensics (cyanforensics.com).
Bill regularly appears on TV and radio related to computer security, and has given expert evidence to both the Scottish and UK Parliaments. He has been named as one of the Top 100 people for Technology in Scotland for in every year from 2012 onwards. Bill was also included in the FutureScot “Top 50 Scottish Tech People Who Are Changing The World”. Recently his work on Secret Shares received “Innovation of the Year” at the Scottish Knowledge Exchange Awards, for a research project which involves splitting data into secret shares, and can then be distributed across a public Cloud-based infrastructure. He was included in the JISC Top 50 Higher Education Social Media Influencers. His current work focuses on the secret share methods, and especially in how documents can be stored securely in public cloud based systems. The current cryptography work around secret shares has won several awards, and is the basis for new funded work. This is further enhanced with work around sticky policies and identity based encryption, and which aims to integrate access rights on document within public cloud systems. This includes the storage of high risk documents, such as health care records and financial information. Along with this he has new research work which integrates machine learning into insider threat detection, and within side channel analysis on embedded system.
Bill Buchanan is a soft-spoken advocate of good advice in cybersecurity. His guidance is academically sound and and pragmatic for the implementers. The material he produces is prolific and never fails to be useful and understandable. His methods of outreach through his teaching – lectures, seminars, laboratories – a benchmark for others who aspire to fill the cyber security skills gap.