• Q&A
  • Login
  • Sign Up
Loading

7014 E Camelback Rd,
Suite B100A,
Scottsdale, AZ 85251
community@featured.com

Follow us

AboutReview ProcessBlogAPIAI LabsFAQContact UsPrivacy PolicyTerms

© 2026 Featured. All rights reserved

  1. Home
  2. Technology
  3. Cyber Threat Intelligence

Featured Cyber Threat Intelligence Experts

In an era of escalating cyber threats, access to top-tier Cyber Threat Intelligence (CTI) experts is crucial for robust digital defense strategies. Featured.com presents a curated directory of leading CTI professionals, each with a proven track record in identifying, analyzing, and mitigating complex cyber risks. These experts have been featured in prestigious tech publications, offering invaluable insights on threat landscapes, attack methodologies, and proactive security measures. For publishers and media outlets, our directory provides instant access to authoritative voices in cybersecurity, ensuring your content is backed by cutting-edge expertise. CTI specialists can leverage this platform to amplify their influence, sharing their knowledge with a broader audience and connecting with high-profile media opportunities. Discover our roster of Cyber Threat Intelligence experts and elevate your understanding of digital security or enhance your next cybersecurity-focused piece.

Connect with Cyber Threat Intelligence Experts

More Cyber Threat Intelligence Topics

Need a Cyber Threat Intelligence Expert for Your Story?

Connect directly with our network of vetted cyber threat intelligence experts for interviews, quotes, or in-depth analysis.

Quick Response Times

Many experts respond within hours to media requests

Verified Credentials

All experts undergo background and credential verification

Coming Soon

Free to Connect

No fees to connect with experts for legitimate media requests

Submit Media Request

Frequently Asked Questions About Cyber Threat Intelligence Experts

Are You a Cyber Threat Intelligence Expert?

Join our network of professionals and connect with journalists and publishers looking for your expertise.

Apply to Join

Showing 20 of 1,075 experts

Filters

Loading...
AA

Ahmed Awad Ahmed Awad

Chief Security Strategist (CSS) | Senior Cyber Threat Intelligence Analyst | APT Hunter | National Security & MENA Threat Expert | Author | CISSP, CISO | Nullc0d3 at IntelX360 Cybersecurity Solutions

Business Strategy
Cybersecurity
Digital Transformation
+1 more

Cyber Threat Intelligence Leader | Nation-State Actor Hunter | Strategic Defense Architect With over 20 years at the forefront of cybersecurity—including senior roles in national security and government defense—I specialize in threat hunting, APT campaign attribution, and intelligence-driven defense. My career spans proactive threat detection, incident response, and mentoring high-stakes SOC/CTI teams in classified environments. I’ve led national-level threat hunting operations, correlated complex TTPs using MITRE ATT&CK, and produced actionable intelligence for executive stakeholders. My expertise includes SIEM, SOAR, threat intelligence platforms, and secure infrastructure design, with a deep focus on the MENA region’s cyber threat landscape. As the author of “Inside the Hacker Hunter’s Mind” and “Inside the Hacker Hunter’s Toolkit”, I share real-world insights into state-level threat actors, OSINT, malware analysis, and digital forensics. I’m passionate about mentoring the next generation of cyber defenders and building resilient, intelligence-led security postures. Let’s connect to discuss cybersecurity challenges, threat intelligence, or how I can contribute to your mission. Key Skills: Cyber Threat Intelligence | APT Attribution | Incident Response | Threat Hunting | SIEM/SOAR | MITRE ATT&CK | OSINT | Malware Analysis | Secure Infrastructure | Executive Reporting | Python/C# Automation | MENA Threat Context

Featured In:

C
M
A
+1
View Profile
TS

Travis Simcox

Lead Cyber Threat Hunter at The Baldwin Group

Cybersecurity
Data Science

I lead a threat hunting team at a risk management firm. I use evidence-based research methods to discover attack patterns and new adversary tools before they're documented, and turn those insights into actionable detections. Every day I see new phishing kits, new malware variations, and discussions between threat actors on evolving techniques.

Featured In:

D
View Profile
JM

Javier Medina

Cybersecurity Director at ITRES

Spain
Cybersecurity

Co-Founder of SG6, ITRES and DEV6. Cybersecurity consultant with a deep technical background. More than 20 years of experience in the fields of IT Security, Cybersecurity, Security Research and IT Best Practices. Dozens of acredited CVE vulnerabilities since Y2K. I publish practical offensive/defensive research: vulnerability analysis, exploitation notes, reverse engineering, and hardening/detection takeaways.

Featured In:

L
L
L
+6
View Profile
TH

Trevor Horwitz

CISO at TrustNet

Cloud Computing
Compliance
Computer Forensics
+2 more

CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…

Featured In:

F
G
S
+6
View Profile
DW

Don Warden II

President at Cyber Pros LLC

Franklin, TN, USA
AI
Business Resilience
Cybersecurity
+2 more

Don Warden is a seasoned cybersecurity executive and author with over 30 years of experience securing complex environments across diverse industries. His expertise spans digital forensics, cyber threat intelligence, and incident response, where he has led high-stakes investigations into ransomware attacks, insider threats, and cyber extortion. As a trusted advisor, Don has guided organizations and high-profile individuals through threat mitigation, resilience planning, and post-incident recovery. Holding advanced certifications, including Certified Ethical Hacker (CEH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don combines technical depth with strategic vision. His passion for ethical hacking and proactive defense drives his approach to strengthening security postures in an evolving digital landscape. Beyond cybersecurity, Don enjoys traveling with his family to remote destinations and is deeply committed to philanthropic efforts that make a meaningful impact on people’s lives.

Featured In:

H
H
H
+2
View Profile
BG

Bob Gourley

Chief Technology Officer and Author at The Cyber Threat

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

Featured In:

G
F
View Profile
DM

Demyd Maiornykov

CEO at Sekurno

Bash Scripting
Conduction Of Trainings
Cyber Security
+2 more

As the Founder of Sekurno, a cybersecurity company focused on protecting fast-growing startups in tech-driven industries, I'm passionate about making technology accessible and worry-free. My personal motivation stems from a belief that technology can change society for the better, but only with the trust that comes from integrating security. At Sekurno, we help businesses build trust with their customers by securing their operations and making technology worry-free. With years of experience in the cybersecurity industry, I'm committed to staying up-to-date on the latest threats and innovations, ensuring that our clients are always protected. Let's connect and see how we can work together to build a more secure digital future.At Sekurno we provide the following services: * Penetration Testing * Data Protection (GDPR, CPPA) * Security Compliance (ISO/27001, SOC2) * SSDLC/DevSecOps * Security Training

Featured In:

H
B
N
View Profile
FV

Francisco Velasquez

CEO & Cyber Security Consultant at HostBreach

Philadelphia, PA, USA
CMMC
Cybersecurity

Franco Velasquez is the CEO and founder of HostBreach, a cybersecurity advisory firm specializing in external cyber intelligence, attack surface analysis, and intelligence-driven advisory for defense contractors and regulated organizations. His work focuses on understanding how attackers identify, prioritize, and compromise targets using publicly available intelligence, often before traditional security controls detect activity. Franco advises organizations on CMMC readiness, CUI exposure, ransomware risk, and pre-incident threat visibility, helping leaders understand real-world risk beyond checklist compliance. He has experience working with OSINT-based reconnaissance, threat actor behavior analysis, and tabletop attack simulations aligned to observed intrusion patterns. He is frequently consulted on topics including ransomware trends, external exposure management, supply chain risk, and how attackers exploit misconfigurations and unpatched systems. Franco emphasizes practical, intelligence-led decision-making that helps organizations reduce risk before incidents occur.

Featured In:

A
View Profile
PJ

Mr Parthiban J OSCP, OSCE, GWAPT, GCIH, CCNA, RHCE

Managing Director at Peneto Labs

Chennai, Tamil Nadu, India
Application Penetration Testing
CERT-In Empanelled Pentest & Security Audit
Cisco Certified Network Associate (CCNA)
+7 more

I am a cybersecurity professional with over 18 years of experience in offensive security, penetration testing, and cyber defense. I focus on deeply understanding complex security challenges and developing practical, real-world solutions that strengthen organizations against evolving threats. I enjoy working across various security domains and approaching problems with a hands-on, analytical mindset. My colleagues and clients describe me as a hardworking, disciplined professional who remains calm and solution-oriented when handling high-risk incidents and challenging environments. My areas of expertise include vulnerability assessment, exploit development, incident response, network security architecture, and enterprise systems administration. I hold industry-recognized certifications such as OSCP, OSCE, GWAPT, GCIH, CCNA, and RHCE, which demonstrate my commitment to continuous learning and technical excellence.

Featured In:

S
C
View Profile
ML

Matt Lindley

Chief Innovation & Security Officer at NINJIO

Los Angeles, CA, USA
AI strategy and transformation
Behavioral psychology
Compliance
+7 more

Matt Lindley is the Chief Innovation & Information Security Officer at NINJIO, a leading cybersecurity awareness training and human risk management platform. Matt leads NINJIO’s cybersecurity team and AI innovation projects. Previously, he was the CEO and Principal Consultant at REIN Cybersecurity, which focused on governance, risk management, and compliance (GRC). He has also served as the Director of Security Services at Cal Net Technology Group and the virtual CIO at Convergence Networks. Matt is an authority on IT, cybersecurity, GRC, and operational maturity whose expert insights have been published in media outlets spanning cybersecurity and many other relevant verticals. His byline has appeared in a wide range of cybersecurity and tech publications, including Dark Reading, Cyber Defense Magazine, Innovation & Tech Today, Spiceworks, Security Magazine, Cybersecurity Insiders, Security Boulevard, U.S. Cybersecurity Magazine, Information Week, and Cyber Protection Magazine. Matt has also published extensively in outlets serving specific industry verticals, such as InsuranceNewsNet, Business Traveler, Manufacturing.net, and Carrier Management. He is considered a leading security analyst whose research and expertise cover AI strategy and transformation, emerging cyberthreats, behavioral psychology, social engineering, and organizational resilience. Matt has over a decade and a half of experience as both a practitioner and a thought leader in cybersecurity, and he is particularly focused on human risk management—a core pillar of cybersecurity at a time when the human element is implicated in the majority of breaches.

Featured In:

U
C
C
+6
View Profile
RL

Rachel Levitch

CISO at Charles Edda and Charles Bouley

Dallas, TX, USA
Business & Finance
Continuity
Evaluation and Measurement Tools
+4 more

Charles Edda & Charles Bouley, Inc. (CECB) is a Texas-based cybersecurity company founded in 1999. The company specializes in managed security risk assessments, including vulnerability scanning, penetration testing, and security awareness training. Its primary clients include small businesses, medical practices, and law firms. The company is currently owned and operated by Dr. Rachel Levitch, who has expanded its services to provide advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. CECB's services follow industry-recognized cybersecurity frameworks such as the National Institute of Standards and Technology (NIST), ISO 27001, and CIS Controls to help organizations establish robust cybersecurity practices and culture.

Featured In:

W
M
P
+4
View Profile
JR

Jon Rose

Founder & CISO at IOmergent

Washington D.C., DC, USA
ai
cloud security
cybersecurity
+4 more

My path to security leadership came through offensive security testing, software engineering, and product management. I've written code, designed and built security products, created and sold managed security services, and served as both GM and CISO for organizations ranging from early-stage startups to multi-billion-dollar enterprises. That background shapes how I approach security: I understand the trade-offs engineering teams face, I know what's actually feasible to implement and operate, and I prioritize controls that reduce real risk over ones that just satisfy auditors. I stay hands-on with cloud architecture, application security, AI, and emerging threats. At IOmergent, my co-founder Brett Wilson and I work with growing companies that need real security leadership but aren't ready for a full-time CISO. We provide fractional CISO (vCISO) services, managed cloud security, and practical assessments that tell you where you actually stand. Our focus is on building security into engineering culture and operations, as well as with executive teams. We work extensively with SaaS companies, healthcare and fintech organizations, and AI startups navigating their first enterprise customers, dealing with incidents or near misses, or trying to figure out what "good enough" security actually looks like for their stage. If you're a founder or technical leader looking to mature your security posture, preparing for your first compliance audit, or navigating an incident and need experienced support, I'm always happy to connect. And if you just want to talk through a security challenge with someone who's been there, reach out.

Featured In:

S
View Profile
AW

Amit Weigman

Cyber Security and AI Expert at Check Point Software Technologies

Amit Weigman is the Director of Solution Engineering at Cyberint, now part of Check Point Software Technologies, where he helps organizations strengthen their cyber resilience through advanced threat intelligence and proactive defense strategies. With over a decade of experience in cybersecurity, Amit’s career includes service in the Israel Defense Forces’ elite Unit 8200, where he honed his skills in cyber operations, intelligence analysis, and security innovation. Drawing on both deep technical expertise and a strategic understanding of the threat landscape, Amit has advised enterprises, government agencies, and critical infrastructure operators worldwide on mitigating emerging risks. His work bridges the gap between cutting-edge security technology and real-world operational needs, making him a sought-after voice on topics such as AI-driven threats, cybercrime ecosystems, and security architecture. Passionate about knowledge-sharing, Amit regularly engages with media, industry leaders, and conference audiences to demystify complex cyber challenges and offer practical, actionable solutions.

Featured In:

M
B
B
+5
View Profile
LZ

Lev Zabudko

Co-founder, CPO at Nothreat

Agentic AI
AI Cyber Defense
AIoT
+6 more

Lev Zabudko is co-founder and Chief Product Officer of Nothreat, an AI-native cybersecurity company launched in 2023. In just over a year, he has led the company from early-stage development to a valuation of £40 million (approximately $46.9 million), backed by investors and recognized for its ability to respond to the rapidly evolving cybersecurity landscape with real-time, adaptive solutions. Under Lev’s product leadership, Nothreat has secured strategic partnerships with global organizations, including Lenovo and Pafos FC, and contributed to cybersecurity infrastructure efforts for international events such as the COP29 conference and congress. With more than 15 years of experience in applied AI, product strategy, and critical systems architecture, Lev focuses on developing security technologies that are designed for the scale, speed, and complexity of modern digital threats.

Featured In:

I
D
View Profile
SM

Mr Soumya Mondal

Principal Consultant at Infosys Limited

Calgary, AB, Canada
Cybersecurity
Human Pattern Analysis
Leadership

As a Cybersecurity Auditor operating at the intersection of complex digital infrastructures and human systems, my mission is to build resilience in an increasingly volatile world. With over 20 years of experience in Global MNCs, I’ve realized that protecting a network is only half the battle; the ultimate firewall is the clarity and alignment of the professional mind. ​I am a published author of three works that explore the architecture of security and the science of patterns: ​'The Interview': A deep dive into the technical and psychological nuances of Cybersecurity. ​'Cosmic Catalyst' & 'Beyond Constellations': Research into systemic cycles, predictive analytics, and ancient pattern-recognition frameworks. ​ My methodology is unique. By day, I audit global cybersecurity frameworks for US-based clients. Beyond the code, I am a dedicated researcher of Bio-Energetic Systems and Chronobiological Trends. I have successfully applied these 'multidimensional' patterns to predict global events and organizational shifts with high accuracy—bridging the gap between the measurable and the metaphysical. Through my research I offer high-performance philosophy to fellow cybersecurity professionals. My goal is to help leaders navigate 'zero-day' life challenges with the same precision they apply to their digitalecosystem. ​ I believe the future of leadership belongs to those who can traverse both the logical and the intuitive. I am here to help you audit your path to sovereign success.

Featured In:

A
View Profile
AT

Ayush Trivedi

CEO at Cyber Chief

Analysis
Analytics
Business Analysis
+2 more

You can ship your software with ZERO bugs and ZERO known security vulnerabilities. Every sprint. With my team, spread across 4 countries, we're on a mission to help software teams grow profits by shipping bug-free software that is free of security vulnerabilities too. If you want to ship products that wow your customers and grab an edge on your competition then reach out to me today. If you want to not only cut costs in your software delivery process but also increase your sales closing rate by proving that your apps are secure, let's talk today. The secret to success is not in what I do, but in how you can leverage my abilities to achieve your goals and find those painkillers for your pain-points. Most great things start with a phone call. My contact details are below, feel free to reach out.

Featured In:

H
A
T
+6
View Profile
KR

Karthikeyan Ramdass

Cybersecurity Lead Member of Technical Staff

Atlanta, GA, USA
AI Security
Application Security
Cybersecurity
+8 more

Karthikeyan Ramdass a seasoned cybersecurity professional with over 18 years of experience securing mission-critical systems for leading Fortune 500 companies across industries including aviation, finance, automotive, and technology. I have played a pivotal role in protecting organizations such as Southwest Airlines, Wells Fargo, Morgan Stanley, Toyota Motors North America, AIG, Cognizant, Salesforce, and Deluxe Corporation. Specializing in application security, vulnerability management, secure architecture, and supply chain defense, led the design and implementation of enterprise-scale security frameworks, CI/CD pipelines, and advanced security testing solutions. Extensive experience in SAST, DAST, SCA, zero-day vulnerability management, and penetration testing, ensuring compliance with global standards such as NIST CSF, PCI DSS, and OWASP Top 10.

Featured In:

E
B
S
+2
View Profile
KO

Kerem Ozturk

Cybersecurity Consultant at New Paradigm Security

Amsterdam, Netherlands
Cybersecurity
Governance, Risk And Compliance
IT Compliance
+1 more

Kerem Ozturk is the founder of New Paradigm Security, an Amsterdam-based cybersecurity consultancy focused on helping European organizations protect themselves against cyber risks and achieve regulatory compliance(e.g. NIS2 and DORA). His 20+ year career spans enterprise security roles at major international companies including financial institutions and global technology consultancies like Renault, Coca-Cola, ING, DXC Technology and Cognizant where he led Cybersecurity departments, Security Operation Centers and technical projects like SIEM deployments, vulnerability management programs, and cloud security implementations. He specializes in translating complex EU cybersecurity regulations into practical governance frameworks, with particular expertise in Microsoft Security services, Virtual CISO services, and board-level risk communication.

View Profile
BG

Bob Gourley

CTO & Co-Founder at OODA LLC

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

View Profile
OL

Oussama Louhaidia

Founder/CTO at getcybr, inc.

London, UK
cyber
cybersecurity
IT security
+2 more

Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.

Featured In:

G
G
G
+3
View Profile

Showing 20 of 1075 experts

How does Cyber Threat Intelligence differ from traditional cybersecurity practices?

While traditional cybersecurity often focuses on reactive measures and known threats, Cyber Threat Intelligence takes a proactive approach. CTI involves collecting and analyzing data from various sources to identify potential threats before they materialize. This forward-looking strategy allows organizations to anticipate attacks, prioritize vulnerabilities, and allocate resources more effectively. CTI experts provide context to raw data, helping businesses understand not just what threats exist, but why they matter and how to address them.

How can publishers benefit from featuring Cyber Threat Intelligence experts in their content?

Publishers can greatly enhance their cybersecurity-related content by featuring Cyber Threat Intelligence experts. These professionals provide cutting-edge insights on the latest cyber threats, attack methods, and defense strategies. By incorporating expert quotes and analysis, publishers can offer their readers authoritative, timely, and valuable information, increasing the credibility and relevance of their articles on cybersecurity topics.

What is Cyber Threat Intelligence and why is it important for businesses?

Cyber Threat Intelligence (CTI) is the process of analyzing data to identify potential cyber threats and vulnerabilities. It's crucial for businesses as it helps predict, prevent, and respond to cyber attacks. CTI experts use advanced tools and techniques to gather information on emerging threats, allowing organizations to strengthen their cybersecurity posture and make informed decisions to protect their digital assets.

What key skills should Cyber Threat Intelligence experts possess?

Cyber Threat Intelligence experts should possess a combination of technical and analytical skills. Key competencies include proficiency in threat modeling, malware analysis, and network forensics. They should also have strong data analysis skills, knowledge of various cybersecurity tools, and an understanding of current threat landscapes. Additionally, excellent communication skills are essential for translating complex technical information into actionable insights for both technical and non-technical audiences.

No options available

No options available

No options available

No options available

No options available

No options available

No options available
Software Development
Enterprise Mobility
Agile Development
Web Development
Internet of Things (IoT)
Virtual Reality
Data Visualization
Business Intelligence
IT Vendor Management
IT Infrastructure