In an era of escalating cyber threats, access to top-tier Cyber Threat Intelligence (CTI) experts is crucial for robust digital defense strategies. Featured.com presents a curated directory of leading CTI professionals, each with a proven track record in identifying, analyzing, and mitigating complex cyber risks. These experts have been featured in prestigious tech publications, offering invaluable insights on threat landscapes, attack methodologies, and proactive security measures. For publishers and media outlets, our directory provides instant access to authoritative voices in cybersecurity, ensuring your content is backed by cutting-edge expertise. CTI specialists can leverage this platform to amplify their influence, sharing their knowledge with a broader audience and connecting with high-profile media opportunities. Discover our roster of Cyber Threat Intelligence experts and elevate your understanding of digital security or enhance your next cybersecurity-focused piece.
Connect directly with our network of vetted cyber threat intelligence experts for interviews, quotes, or in-depth analysis.
Many experts respond within hours to media requests
All experts undergo background and credential verification
No fees to connect with experts for legitimate media requests
Join our network of professionals and connect with journalists and publishers looking for your expertise.
Showing 20 of 839 experts
Chief Security Strategist (CSS) | Senior Cyber Threat Intelligence Analyst | APT Hunter | National Security & MENA Threat Expert | Author | CISSP, CISO | Nullc0d3 at IntelX360 Cybersecurity Solutions
Cyber Threat Intelligence Leader | Nation-State Actor Hunter | Strategic Defense Architect With over 20 years at the forefront of cybersecurity—including senior roles in national security and government defense—I specialize in threat hunting, APT campaign attribution, and intelligence-driven defense. My career spans proactive threat detection, incident response, and mentoring high-stakes SOC/CTI teams in classified environments. I’ve led national-level threat hunting operations, correlated complex TTPs using MITRE ATT&CK, and produced actionable intelligence for executive stakeholders. My expertise includes SIEM, SOAR, threat intelligence platforms, and secure infrastructure design, with a deep focus on the MENA region’s cyber threat landscape. As the author of “Inside the Hacker Hunter’s Mind” and “Inside the Hacker Hunter’s Toolkit”, I share real-world insights into state-level threat actors, OSINT, malware analysis, and digital forensics. I’m passionate about mentoring the next generation of cyber defenders and building resilient, intelligence-led security postures. Let’s connect to discuss cybersecurity challenges, threat intelligence, or how I can contribute to your mission. Key Skills: Cyber Threat Intelligence | APT Attribution | Incident Response | Threat Hunting | SIEM/SOAR | MITRE ATT&CK | OSINT | Malware Analysis | Secure Infrastructure | Executive Reporting | Python/C# Automation | MENA Threat Context
Featured In:
CISO at TrustNet
CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…
Featured In:
Chief Technology Officer and Author at The Cyber Threat
Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.
Featured In:
CISO at Charles Edda and Charles Bouley
Charles Edda & Charles Bouley, Inc. (CECB) is a Texas-based cybersecurity company founded in 1999. The company specializes in managed security risk assessments, including vulnerability scanning, penetration testing, and security awareness training. Its primary clients include small businesses, medical practices, and law firms. The company is currently owned and operated by Dr. Rachel Levitch, who has expanded its services to provide advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. CECB's services follow industry-recognized cybersecurity frameworks such as the National Institute of Standards and Technology (NIST), ISO 27001, and CIS Controls to help organizations establish robust cybersecurity practices and culture.
Featured In:
Cyber Security and AI Expert at Check Point Software Technologies
Amit Weigman is the Director of Solution Engineering at Cyberint, now part of Check Point Software Technologies, where he helps organizations strengthen their cyber resilience through advanced threat intelligence and proactive defense strategies. With over a decade of experience in cybersecurity, Amit’s career includes service in the Israel Defense Forces’ elite Unit 8200, where he honed his skills in cyber operations, intelligence analysis, and security innovation. Drawing on both deep technical expertise and a strategic understanding of the threat landscape, Amit has advised enterprises, government agencies, and critical infrastructure operators worldwide on mitigating emerging risks. His work bridges the gap between cutting-edge security technology and real-world operational needs, making him a sought-after voice on topics such as AI-driven threats, cybercrime ecosystems, and security architecture. Passionate about knowledge-sharing, Amit regularly engages with media, industry leaders, and conference audiences to demystify complex cyber challenges and offer practical, actionable solutions.
Featured In:
Co-founder, CPO at Nothreat
Lev Zabudko is co-founder and Chief Product Officer of Nothreat, an AI-native cybersecurity company launched in 2023. In just over a year, he has led the company from early-stage development to a valuation of £40 million (approximately $46.9 million), backed by investors and recognized for its ability to respond to the rapidly evolving cybersecurity landscape with real-time, adaptive solutions. Under Lev’s product leadership, Nothreat has secured strategic partnerships with global organizations, including Lenovo and Pafos FC, and contributed to cybersecurity infrastructure efforts for international events such as the COP29 conference and congress. With more than 15 years of experience in applied AI, product strategy, and critical systems architecture, Lev focuses on developing security technologies that are designed for the scale, speed, and complexity of modern digital threats.
Featured In:
CEO at Cyber Chief
You can ship your software with ZERO bugs and ZERO known security vulnerabilities. Every sprint. With my team, spread across 4 countries, we're on a mission to help software teams grow profits by shipping bug-free software that is free of security vulnerabilities too. If you want to ship products that wow your customers and grab an edge on your competition then reach out to me today. If you want to not only cut costs in your software delivery process but also increase your sales closing rate by proving that your apps are secure, let's talk today. The secret to success is not in what I do, but in how you can leverage my abilities to achieve your goals and find those painkillers for your pain-points. Most great things start with a phone call. My contact details are below, feel free to reach out.
Featured In:
Cybersecurity Lead Member of Technical Staff
Karthikeyan Ramdass a seasoned cybersecurity professional with over 18 years of experience securing mission-critical systems for leading Fortune 500 companies across industries including aviation, finance, automotive, and technology. I have played a pivotal role in protecting organizations such as Southwest Airlines, Wells Fargo, Morgan Stanley, Toyota Motors North America, AIG, Cognizant, Salesforce, and Deluxe Corporation. Specializing in application security, vulnerability management, secure architecture, and supply chain defense, led the design and implementation of enterprise-scale security frameworks, CI/CD pipelines, and advanced security testing solutions. Extensive experience in SAST, DAST, SCA, zero-day vulnerability management, and penetration testing, ensuring compliance with global standards such as NIST CSF, PCI DSS, and OWASP Top 10.
Featured In:
CTO & Co-Founder at OODA LLC
Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.
Founder/CTO at getcybr, inc.
Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.
Featured In:
CISO at fromCISO
CISO and advisor helping FinTechs turn DORA/NIS2/PSD2, PCI DSS, ISO 27001, and GDPR into practical resilience and business value. 20+ years across architecture, incident response, and program build-out. I prioritise KPIs, clear board communication, and continuous improvement, not checkbox compliance. Highlights: led DORA/NIS2 readiness for cross-border teams (faster audits; 30%+ lower regulatory risk), stood up vCISO/vDPO programs with cloud-native controls, vendor risk, and privacy automation. Community: OWASP Riga and Cloud Security Alliance Chapter Lead. Need to get regulator-ready? Let’s connect.
Featured In:
Chief Information Security Officer (CISO) and Founder at CyPro
Leading UK cyber security expert as featured on BBC News, The Times radio, Daily Mail, The Guardian and The Telegraph. Partner at CyPro where we are revolutionising cyber security for high-growth companies, at every stage of their journey.Experienced CISO (Chief Information Security Officer) with over 17 years experience within cyber security. From a consulting background from KPMG and Deloitte, having led Deloitte’s Security Assurance and Compliance service line in the UK for a number of years and have experience running large security and data privacy transformation programmes in global FTSE100 firms. Jonny maintains CISM, CISSP, CISA, CRISC, CIPM, CIPP/E, Prince2 and ISO27001 accreditations and have featured as a media commentator on cyber security topics for the likes of BBC News, The Times radio, Daily Mail, The Guardian and The Telegraph.Past Clients Include: MetroBank, JP Morgan, UBS, M&G Prudential, Royal Sun Alliance, Cigna, Euroclear, Prudential, Schroders, Royal London, British Gas, William Hill, Shell, Virgin Trains, AstraZeneca, Deloitte, PTS Consulting, Grant Thornton, Wessex Water, amongst others.---------------------------------------------------I have extensive experience across information security and cybersecurity as a CISO (Chief Information Security Officer), Interim-CISO and Head of Information Security, including both strategic and operational disciplines:1. Strategic - such as Security Strategy; Target Operating Model design; Cyber Maturity Assessment; Risk & Compliance for NIS, SWIFT, GDPR, HIPAA, PCI-DSS, ISO 27001; Data Privacy; Security Awareness Training; Business Continuity Planning and Disaster Recovery; Governance, Risk, and Compliance (GRC); Security Policy Development; and Security Audits)...and;2. Operational - such as setup and running of Security Operations Centers (SOC); Incident Response; Threat Intelligence; Vulnerability Management; Security Architecture; Identity and Access Management (IAM); Intrusion Detection/Prevention Systems (IDS/IPS); Cloud Security; Endpoint Protection; Network Security and Third Party / Vendor Risk Management.
Featured In:
Sr. Manager - Infrastructure Security & Automation
Results-oriented technology leader with over 9 years of experience in Infrastructure Security, Automation, Generative AI, and Software-Defined Operations. Demonstrated ability to lead high-performing teams, streamline enterprise support, and execute strategic initiatives that enhance organizational resilience and operational efficiency. A seasoned cybersecurity professional, experienced in vulnerability and patch management at scale, with a strong track record of driving measurable, data-driven impact through intelligent automation. Skilled in designing and implementing secure, scalable, and compliant infrastructure solutions that align with business and regulatory goals. Proven expertise in project and program management, particularly within Agile and Scrum frameworks, with a focus on cross-functional collaboration, risk mitigation, and continuous improvement. Recognized for combining technical depth with strategic vision to deliver transformative outcomes in complex enterprise environments.
Featured In:
CEO at Sekurno
As the Founder of Sekurno, a cybersecurity company focused on protecting fast-growing startups in tech-driven industries, I'm passionate about making technology accessible and worry-free. My personal motivation stems from a belief that technology can change society for the better, but only with the trust that comes from integrating security. At Sekurno, we help businesses build trust with their customers by securing their operations and making technology worry-free. With years of experience in the cybersecurity industry, I'm committed to staying up-to-date on the latest threats and innovations, ensuring that our clients are always protected. Let's connect and see how we can work together to build a more secure digital future.At Sekurno we provide the following services: * Penetration Testing * Data Protection (GDPR, CPPA) * Security Compliance (ISO/27001, SOC2) * SSDLC/DevSecOps * Security Training
COO at BreachLock
Himanshu is a seasoned leader in the Information Technology Consulting & System Integration space with 15 years of industry experience. He has worked in multiple roles across Strategy, Practice & New Offering Development, Delivery Transformation & Key Account Management, & Sales Support. On strategy and advisory, Hmanshu has experience in working closely with C-level client executives (CISO/CIO/ CTO) providing thought leadership, demonstrating value of a solution and helping them realize the same through successful delivery. Himanshu has proven experience in building new delivery organizations from start and successfully transforming them into mature global practices. Himanshu has worked across industry sectors including retail, healthcare, telecom, travel & transportation, financial and banking, among others. His international experience includes engagements across geographies such as North America, South East Asia, Latin America, and Europe. He has been a keynote speaker at multiple Security forums and Organizations including IBM THINK, Infosec foundation CISO summit, International Center for Information Systems Audit, & Amity University.
CISO and Founding Partner at Fortify Cyber
I've worked in the cybersecurity industry for the last 20 years consulting for the top financial and legal services firms in the country. I have demonstrated history in design, implementation, and management of security programs to address risks across the cyber kill chain. Skilled in Security Strategy, Awareness, Emerging Security Technologies, Risk Assessments, Red Team Exercises, Governance, and Education. Primary focused on the law and finance sectors but have applicable knowledge to all industries.
Founder at Stingrai.io
I specialize in helping organizations identify and remediate vulnerabilities through continuous penetration testing. With a focus on delivering real-world attack simulations, my team and I empower businesses to strengthen their defenses continuously unlike a once a year compliance driven testing.I am passionate about building innovative solutions that not only assess but also enhance the cybersecurity posture of organizations. Our proprietary PTaaS (Penetration Testing as a Service) platform streamlines the process with real-time vulnerability tracking, ticketing integration, and expert remediation support, providing clients with seamless collaboration and peace of mind.With a commitment to continuous learning and staying ahead of evolving threats, I am always seeking new ways to push the boundaries of offensive security and help businesses achieve lasting protection in an ever-changing digital landscape. Let's connect to explore how I can assist your organization in navigating today's cybersecurity challenges.
CEO at Cyber Guard Core Consulting
I am a cybersecurity specialist with extensive experience protecting individuals and small businesses from digital threats. My background spans digital asset security, fraud investigation, and identity-theft mitigation, with a strong focus on safeguarding online financial environments such as cryptocurrency wallets, online banking systems, and high-risk digital platforms. I've led and advised on numerous investigations involving online scams, financial fraud, and unauthorized asset transfers, helping clients recover lost funds and strengthen their long-term security posture. My work emphasizes practical, evidence-based defense strategies, digital forensics, and proactive risk management. I regularly consults on threat prevention, privacy protection, and emerging cyber risks, offering clear guidance that bridges technical depth with real-world application.
Director of Solutions Engineering EMEA
For over 20 years, I've been on the front lines of cybersecurity, working with global organisations to help them answer critical questions like: "How effective are our security measures against a cyber attack?" My passion is empowering companies to identify and fortify their attack surface. I help leadership teams evaluate their security stack's effectiveness and build actionable roadmaps. Some of the topics I cover are Enterprise cybersecurity and strategy, culture and how it impacts cyber resilience. Emerging attacks and attacker innovation in ransomware and increasingly AI security risks. This passion for sharing actionable knowledge is why I also started writing my blog. It's my way of sharing ideas and providing insights for enterprise security defenders and educate the wider community. In my day-to-day role at Pentera, I lead a team of talented security engineers. We partner with leading organisations who are ready to embrace change. As a speaker and mentor, I enjoy challenging the norms, introducing disruptive technologies, and sharing best practices to raise the bar.
Featured In:
COO + CTO at TruthScan
I am a proud generalist who unites the tribes: design, engineering, devops, sales, marketing, customer support, c-suite, legal, and more... I make products and organizations better by managing teams with focus on hard data and user needs to create delightful customer journeys that drive revenue growth.
Featured In:
Showing 20 of 839 experts
While traditional cybersecurity often focuses on reactive measures and known threats, Cyber Threat Intelligence takes a proactive approach. CTI involves collecting and analyzing data from various sources to identify potential threats before they materialize. This forward-looking strategy allows organizations to anticipate attacks, prioritize vulnerabilities, and allocate resources more effectively. CTI experts provide context to raw data, helping businesses understand not just what threats exist, but why they matter and how to address them.
Publishers can greatly enhance their cybersecurity-related content by featuring Cyber Threat Intelligence experts. These professionals provide cutting-edge insights on the latest cyber threats, attack methods, and defense strategies. By incorporating expert quotes and analysis, publishers can offer their readers authoritative, timely, and valuable information, increasing the credibility and relevance of their articles on cybersecurity topics.
Cyber Threat Intelligence (CTI) is the process of analyzing data to identify potential cyber threats and vulnerabilities. It's crucial for businesses as it helps predict, prevent, and respond to cyber attacks. CTI experts use advanced tools and techniques to gather information on emerging threats, allowing organizations to strengthen their cybersecurity posture and make informed decisions to protect their digital assets.
Cyber Threat Intelligence experts should possess a combination of technical and analytical skills. Key competencies include proficiency in threat modeling, malware analysis, and network forensics. They should also have strong data analysis skills, knowledge of various cybersecurity tools, and an understanding of current threat landscapes. Additionally, excellent communication skills are essential for translating complex technical information into actionable insights for both technical and non-technical audiences.