Events

Events

Kevin von Keyserling – Keyfactor

Why Nominated: Since founding his company in 2004, Kevin von Keyserling has transformed Keyfactor (formerly Certified Security Solutions) from a security consultancy to a digital identity management solutions provider that manages more than 500 million digital certificates for companies around the world. Over the last year, he closed the Cleveland, Ohio-area company’s largest funding round to…

Lorelei Chernyshov – Merrick Bank

Why Nominated Driven by impending changes wrought by new regulations such as GDPR and the California Consumer Privacy Act (CCPA), Lorelei Chernyshov has focused on leading the integration of information assets with cybersecurity practices to better manage sensitive data location, accessibility and storage at Merrick Bank. Profile: Observing a cultural mind shift within organizations away…

Ben Seri – Armis Security

Why nomintated: Ben Seri’s work in the IoT space specifically around BlueBorne, the first airborne IoT vulnerabilities impacting more than five billion devices globally, and BLEEDINGBIT, chip- level vulnerabilities used in the fabric of internet infrastructure. Seri has fought against the fast-paced creation and adoption of IoT devices that are created and deployed with security…

Ben Herzberg – Imperva

Why Nominated: Under Ben Herzberg’s leadership, Imperva’s threat research team has uncovered key vulnerabilities in Facebook, Google Photos, Drupal and other online services and platforms. Profile: Herzberg and his Imperva research team are charged with identifying and evaluating software flaws that undermine application and data security. In November 2018, Imperva disclosed a significant Facebook vulnerability that…

Alejandro Hernandez – IOActive

Why Nominated: A top security consultant who has dedicated himself to improving security for over 15 years, Alejandro Hernández was responsible for uncovering major security flaws in stock trading technologies. Profile: Alejandro Hernández, who presented new, ground-breaking research regarding security flaws in stock trading technologies during the 2018 Black Hat conference, also discovered significant stock trading…

Erez Yalon – Checkmarx

Why nominated: Erez Yalon’s he has put his talents and tools he had previously developed as an independent security researcher to work at Checkmarx to help find vulnerabilities at wide range of websites. This includes Tinder where he found security flaws could have allowed an attacker to monitor a user’s interaction with the app and…

Elisa Costante – Forescout Technologies

Why Nominated: Elisa Costante conducts research on critical infrastructure and industrial systems and then applies her findings toward the development of important technology solutions. She recently developed a specialization in business automation systems, last year revealing five vulnerabilities in popular BAS devices. Profile: Costante’s nearly 20 years of career research has led to discoveries on how…

Ray Rothrock – RedSeal

Why Nominated: Having spent decades leading and advising both technology and information security companies, Rothrock knows that cybersecurity for any organization goes well beyond just deploying and managing strong technologies. It’s also about strategically thinking about security needs holistically top down. And, for him, this means that since every entity is a “cyber organization,” the…

Lisa Plaggemier – Infosec

Why nominated: Lisa Plaggemier entered the cybersecurity community after holding marketing roles at the likes of Ford Motor Company. Having started this path with CDK Global where she was the director of security culture, risk and client advocacy, she found that leveraging her years of global marketing and advertising effectively enabled her to convince employees,…

Ryan Kalember – Proofpoint

Why Nominated: Having started his career as a cybersecurity practitioner gaining experience in the U.S., Europe, the Middle East, Asia and Latin America, Kalember has first-hand global knowledge of what practitioners deal with day-in and day-out in terms of compliance, threat and other challenges. Now, in referencing some 20 years of experience that engages both…

Next post in Reboot Leadership Awards 2019