• Q&A
  • Login
  • Sign Up
Loading

7014 E Camelback Rd,
Suite B100A,
Scottsdale, AZ 85251
community@featured.com

Follow us

AboutReview ProcessBlogAPIFAQContact UsPrivacy PolicyTerms

© 2025 Featured. All rights reserved

  1. Home
  2. Technology
  3. Cyber Threat Intelligence

Featured Cyber Threat Intelligence Experts

In an era of escalating cyber threats, access to top-tier Cyber Threat Intelligence (CTI) experts is crucial for robust digital defense strategies. Featured.com presents a curated directory of leading CTI professionals, each with a proven track record in identifying, analyzing, and mitigating complex cyber risks. These experts have been featured in prestigious tech publications, offering invaluable insights on threat landscapes, attack methodologies, and proactive security measures. For publishers and media outlets, our directory provides instant access to authoritative voices in cybersecurity, ensuring your content is backed by cutting-edge expertise. CTI specialists can leverage this platform to amplify their influence, sharing their knowledge with a broader audience and connecting with high-profile media opportunities. Discover our roster of Cyber Threat Intelligence experts and elevate your understanding of digital security or enhance your next cybersecurity-focused piece.

Connect with Cyber Threat Intelligence Experts

More Cyber Threat Intelligence Topics

Need a Cyber Threat Intelligence Expert for Your Story?

Connect directly with our network of vetted cyber threat intelligence experts for interviews, quotes, or in-depth analysis.

Quick Response Times

Many experts respond within hours to media requests

Verified Credentials

All experts undergo background and credential verification

Coming Soon

Free to Connect

No fees to connect with experts for legitimate media requests

Submit Media Request

Frequently Asked Questions About Cyber Threat Intelligence Experts

Are You a Cyber Threat Intelligence Expert?

Join our network of professionals and connect with journalists and publishers looking for your expertise.

Apply to Join

Showing 20 of 713 experts

Filters

Loading...
BG

Bob Gourley

CTO & Co-founder, Author at The Cyber Threat

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

View Profile
BG

Bob Gourley

Chief Technology Officer and Author at The Cyber Threat

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

Featured In:

G
F
E
View Profile
TH

Trevor Horwitz

CISO at TrustNet

Cloud Computing
Compliance
Computer Forensics
+2 more

CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…

Featured In:

F
G
S
+5
View Profile
BG

Bob Gourley

CTO & Co-Founder at OODA LLC

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

View Profile
JW

John Wilson

Senior Fellow, Threat Research at Fortra

Abap
Agile Methodologies
Analysis
+2 more

Experienced cyber security professional with a deep focus in social engineering and email fraud.

View Profile
LZ

Lev Zabudko

Co-founder, CPO at Nothreat

Agentic AI
AI Cyber Defense
AIoT
+6 more

Lev Zabudko is co-founder and Chief Product Officer of Nothreat, an AI-native cybersecurity company launched in 2023. In just over a year, he has led the company from early-stage development to a valuation of £40 million (approximately $46.9 million), backed by investors and recognized for its ability to respond to the rapidly evolving cybersecurity landscape with real-time, adaptive solutions. Under Lev’s product leadership, Nothreat has secured strategic partnerships with global organizations, including Lenovo and Pafos FC, and contributed to cybersecurity infrastructure efforts for international events such as the COP29 conference and congress. With more than 15 years of experience in applied AI, product strategy, and critical systems architecture, Lev focuses on developing security technologies that are designed for the scale, speed, and complexity of modern digital threats.

Featured In:

I
D
View Profile
AT

Ayush Trivedi

CEO at Cyber Chief

Analysis
Analytics
Business Analysis
+2 more

You can ship your software with ZERO bugs and ZERO known security vulnerabilities. Every sprint. With my team, spread across 4 countries, we're on a mission to help software teams grow profits by shipping bug-free software that is free of security vulnerabilities too. If you want to ship products that wow your customers and grab an edge on your competition then reach out to me today. If you want to not only cut costs in your software delivery process but also increase your sales closing rate by proving that your apps are secure, let's talk today. The secret to success is not in what I do, but in how you can leverage my abilities to achieve your goals and find those painkillers for your pain-points. Most great things start with a phone call. My contact details are below, feel free to reach out.

Featured In:

H
A
T
+6
View Profile
OL

Oussama Louhaidia

Founder/CTO at getcybr, inc.

London, UK
cyber
cybersecurity
IT security
+2 more

Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.

Featured In:

G
G
G
+3
View Profile
DA

Dharmesh Acharya

Co-Founder at ZeroThreat

Account Management
Analysis
Analytics
+2 more

Responsible to over see India Operations & Global Sales Channel. At Radix we engage into various Offshore I.T. projects for design, development and consulting. We maintain fair client practice and engagements which brings business and establish partnership thus building long term values. Managing technology & development company definitely demands attention to Human Resource, we value talent and skills of every team member. Being top executive focused on balanced growth of every aspect business including but not limited to Sales, Operations, Management. Thanks to techno commercial background helps to understand various projects aspects presales, contract negotiation, SLS, scope definition and delivery. Focused on delivery technology & solution that that works effectively. Specialties: People Management, Techno commercial skills.

View Profile
JP

Jonny Pelter

Chief Information Security Officer (CISO) and Founder at CyPro

Application Security
Auditing
Certified Information Security Manager
+2 more

Leading UK cyber security expert as featured on BBC News, The Times radio, Daily Mail, The Guardian and The Telegraph. Partner at CyPro where we are revolutionising cyber security for high-growth companies, at every stage of their journey.Experienced CISO (Chief Information Security Officer) with over 17 years experience within cyber security. From a consulting background from KPMG and Deloitte, having led Deloitte’s Security Assurance and Compliance service line in the UK for a number of years and have experience running large security and data privacy transformation programmes in global FTSE100 firms. Jonny maintains CISM, CISSP, CISA, CRISC, CIPM, CIPP/E, Prince2 and ISO27001 accreditations and have featured as a media commentator on cyber security topics for the likes of BBC News, The Times radio, Daily Mail, The Guardian and The Telegraph.Past Clients Include: MetroBank, JP Morgan, UBS, M&G Prudential, Royal Sun Alliance, Cigna, Euroclear, Prudential, Schroders, Royal London, British Gas, William Hill, Shell, Virgin Trains, AstraZeneca, Deloitte, PTS Consulting, Grant Thornton, Wessex Water, amongst others.---------------------------------------------------I have extensive experience across information security and cybersecurity as a CISO (Chief Information Security Officer), Interim-CISO and Head of Information Security, including both strategic and operational disciplines:1. Strategic - such as Security Strategy; Target Operating Model design; Cyber Maturity Assessment; Risk & Compliance for NIS, SWIFT, GDPR, HIPAA, PCI-DSS, ISO 27001; Data Privacy; Security Awareness Training; Business Continuity Planning and Disaster Recovery; Governance, Risk, and Compliance (GRC); Security Policy Development; and Security Audits)...and;2. Operational - such as setup and running of Security Operations Centers (SOC); Incident Response; Threat Intelligence; Vulnerability Management; Security Architecture; Identity and Access Management (IAM); Intrusion Detection/Prevention Systems (IDS/IPS); Cloud Security; Endpoint Protection; Network Security and Third Party / Vendor Risk Management.

Featured In:

S
N
U
+6
View Profile
DM

Demyd Maiornykov

CEO at Sekurno

Bash Scripting
Conduction Of Trainings
Cyber Security
+2 more

As the Founder of Sekurno, a cybersecurity company focused on protecting fast-growing startups in tech-driven industries, I'm passionate about making technology accessible and worry-free. My personal motivation stems from a belief that technology can change society for the better, but only with the trust that comes from integrating security. At Sekurno, we help businesses build trust with their customers by securing their operations and making technology worry-free. With years of experience in the cybersecurity industry, I'm committed to staying up-to-date on the latest threats and innovations, ensuring that our clients are always protected. Let's connect and see how we can work together to build a more secure digital future.At Sekurno we provide the following services: * Penetration Testing * Data Protection (GDPR, CPPA) * Security Compliance (ISO/27001, SOC2) * SSDLC/DevSecOps * Security Training

View Profile
HB

Heather Benwell

Chief Marketing Officer at ChallengeWord

Advertising
Automotive
Brand Management
+2 more

Highly skilled marketing and coaching professional with a passion for helping people.

Featured In:

E
F
E
+4
View Profile
RA

Ronen Ahdut

Head of Managed Detection and Response (MDR) and Security Operations at Cynet

Aviation Security
Customer Service
Employee Training
+2 more

Featured In:

D
H
View Profile
PB

Paul Baka

Director at SSLTrust

Sydney NSW, Australia
AI Security
Cyber Security
Email Security
+3 more

Paul is a leading Cyber Security Expert and an integral part of the SSLTrust team. He is world-renowned for his knowledge of SSL/TLS Certificates and PKI Solutions, and enterprise companies and small business clients frequently seek his expert opinion on website security.

Featured In:

S
S
S
+6
View Profile
AA

Arafat Afzalzada

Founder at Stingrai.io

Active Directory
Agile Methodologies
Android
+2 more

I specialize in helping organizations identify and remediate vulnerabilities through continuous penetration testing. With a focus on delivering real-world attack simulations, my team and I empower businesses to strengthen their defenses continuously unlike a once a year compliance driven testing.I am passionate about building innovative solutions that not only assess but also enhance the cybersecurity posture of organizations. Our proprietary PTaaS (Penetration Testing as a Service) platform streamlines the process with real-time vulnerability tracking, ticketing integration, and expert remediation support, providing clients with seamless collaboration and peace of mind.With a commitment to continuous learning and staying ahead of evolving threats, I am always seeking new ways to push the boundaries of offensive security and help businesses achieve lasting protection in an ever-changing digital landscape. Let's connect to explore how I can assist your organization in navigating today's cybersecurity challenges.

View Profile
SD

Sarthak Dubey

Co-Founder at Mitigata: Smart Cyber Insurance

Adobe Illustrator
Adobe Photoshop
After Effects
+2 more

Co-Founder, Mitigata Insurance, Tao.liveBuilt Products for Delhivery, Lenskart, Novopay earlierB.Tech. MIT Manipalhttps://twitter.com/Sarthakdubey

Featured In:

I
I
View Profile
AB

Adam Burns

Director of Cybersecurity at Fortra

Advocacy
Analytical Skills
Application Virtualization
+2 more

As the Director of Cybersecurity at Fortra, I lead a distinguished team of cybersecurity experts in delivering Managed Security Programs to global clients. With over a decade of experience in the field, I bring a wealth of expertise in data protection, threat hunting, incident response, cybersecurity policy, IT solutions, and security systems.My mission is to empower organizations to safeguard their most sensitive data and assets against cyber threats while aligning with business objectives and regulatory standards. I thrive on sharing insights and knowledge through publications on diverse cybersecurity topics, ranging from the role of cyber executives to best practices in data security. As a strong advocate for AI and ML technology, I believe in the imperative need for organizations to mature and embrace these innovations. I actively collaborate with professionals and stakeholders to drive innovation and enhance industry standards.

Featured In:

M
View Profile
AW

Amit Weigman

Cyber Security and AI Expert at Check Point Software Technologies

Amit Weigman is the Director of Solution Engineering at Cyberint, now part of Check Point Software Technologies, where he helps organizations strengthen their cyber resilience through advanced threat intelligence and proactive defense strategies. With over a decade of experience in cybersecurity, Amit’s career includes service in the Israel Defense Forces’ elite Unit 8200, where he honed his skills in cyber operations, intelligence analysis, and security innovation. Drawing on both deep technical expertise and a strategic understanding of the threat landscape, Amit has advised enterprises, government agencies, and critical infrastructure operators worldwide on mitigating emerging risks. His work bridges the gap between cutting-edge security technology and real-world operational needs, making him a sought-after voice on topics such as AI-driven threats, cybercrime ecosystems, and security architecture. Passionate about knowledge-sharing, Amit regularly engages with media, industry leaders, and conference audiences to demystify complex cyber challenges and offer practical, actionable solutions.

Featured In:

M
B
B
+5
View Profile
TM

Tim Matthews

Chief Marketing Officer at CyCognito

Brand Awareness
Channel Marketing
Cloud Computing
+2 more

Public and private company VP/CMO. Marketing leader at several growth-stage companies that scaled to over $100M in revenue. Experience with demand gen, PLG, enterprise selling, and channels. Product marketing background specializing in analyst relations and product positioning. Deep experience in cybersecurity, cloud tech, and DevOps.My marketing blog is www.matthewsonmarketing.com. My book, The Professional Marketer, is available on Amazon https://a.co/d/jkaR0ErSpecialties: Market awareness, growth strategy, demand generation, company and product positioning, developer marketing/community, channel marketing, unconventional thinking, geek t-shirt design, dry humor, surviving the "AI winter."

View Profile
NG

Neha Garg

CEO at Arambh Labs

AI agents
AI/ML
Business Strategy
+6 more

Hi, I have over 15 years of experience in product management, consulting. Most recently I was a product lead at Google Gemini, one of the early members of the Google Gemini team where I helped build some of the capabilities in Gemini. Now I have started my own company building Agentic AI platform for security operations. My co-founder has over 15 years of experience in security and multiple patents on security operations. He was a founding member of Cybersponse, which got acquired by Fortinet.

View Profile

Showing 20 of 713 experts

Software Performance
Technology Integration
Virtualization
Software as a Service (SaaS)
IT Support
Application Security
Software Architecture
Cloud Migration
Network Architecture
Information Systems

How does Cyber Threat Intelligence differ from traditional cybersecurity practices?

While traditional cybersecurity often focuses on reactive measures and known threats, Cyber Threat Intelligence takes a proactive approach. CTI involves collecting and analyzing data from various sources to identify potential threats before they materialize. This forward-looking strategy allows organizations to anticipate attacks, prioritize vulnerabilities, and allocate resources more effectively. CTI experts provide context to raw data, helping businesses understand not just what threats exist, but why they matter and how to address them.

How can publishers benefit from featuring Cyber Threat Intelligence experts in their content?

Publishers can greatly enhance their cybersecurity-related content by featuring Cyber Threat Intelligence experts. These professionals provide cutting-edge insights on the latest cyber threats, attack methods, and defense strategies. By incorporating expert quotes and analysis, publishers can offer their readers authoritative, timely, and valuable information, increasing the credibility and relevance of their articles on cybersecurity topics.

What is Cyber Threat Intelligence and why is it important for businesses?

Cyber Threat Intelligence (CTI) is the process of analyzing data to identify potential cyber threats and vulnerabilities. It's crucial for businesses as it helps predict, prevent, and respond to cyber attacks. CTI experts use advanced tools and techniques to gather information on emerging threats, allowing organizations to strengthen their cybersecurity posture and make informed decisions to protect their digital assets.

What key skills should Cyber Threat Intelligence experts possess?

Cyber Threat Intelligence experts should possess a combination of technical and analytical skills. Key competencies include proficiency in threat modeling, malware analysis, and network forensics. They should also have strong data analysis skills, knowledge of various cybersecurity tools, and an understanding of current threat landscapes. Additionally, excellent communication skills are essential for translating complex technical information into actionable insights for both technical and non-technical audiences.

No options available

No options available

No options available

No options available

No options available

No options available

No options available