• Q&A
  • Login
  • Sign Up
Loading

7014 E Camelback Rd,
Suite B100A,
Scottsdale, AZ 85251
community@featured.com

Follow us

AboutReview ProcessBlogAPIFAQContact UsPrivacy PolicyTerms

© 2025 Featured. All rights reserved

  1. Home
  2. Healthcare & Biotech
  3. Healthcare Cybersecurity

Recognized Healthcare Cybersecurity Leaders 2025

In today's digital healthcare landscape, cybersecurity has become paramount for protecting sensitive patient data and maintaining HIPAA compliance. Featured.com's Healthcare Cybersecurity expert directory connects you with leading professionals who are at the forefront of safeguarding medical information systems. Our curated network of specialists offers invaluable insights on data protection strategies, security protocols, and emerging threats in the healthcare sector. These experts have been featured in prestigious publications, sharing their knowledge on everything from ransomware prevention to secure telehealth implementations. For publishers and journalists, our directory provides quick access to authoritative sources for timely articles and in-depth reports. For cybersecurity professionals, it's an opportunity to showcase expertise and contribute to critical discussions in the field. Explore our directory to find the perfect healthcare cybersecurity expert for your next story or project.

Connect with Healthcare Cybersecurity Experts

More Healthcare Cybersecurity Topics

Need a Healthcare Cybersecurity Expert for Your Story?

Connect directly with our network of vetted healthcare cybersecurity experts for interviews, quotes, or in-depth analysis.

Quick Response Times

Many experts respond within hours to media requests

Verified Credentials

All experts undergo background and credential verification

Coming Soon

Free to Connect

No fees to connect with experts for legitimate media requests

Submit Media Request

Frequently Asked Questions About Healthcare Cybersecurity Experts

Are You a Healthcare Cybersecurity Expert?

Join our network of professionals and connect with journalists and publishers looking for your expertise.

Apply to Join

Showing 20 of 960 experts

Filters

Loading...
AG

Andrey Gubarev

CISO at fromCISO

EU
CyberSecurity
Privacy

CISO and advisor helping FinTechs turn DORA/NIS2/PSD2, PCI DSS, ISO 27001, and GDPR into practical resilience and business value. 20+ years across architecture, incident response, and program build-out. I prioritise KPIs, clear board communication, and continuous improvement, not checkbox compliance. Highlights: led DORA/NIS2 readiness for cross-border teams (faster audits; 30%+ lower regulatory risk), stood up vCISO/vDPO programs with cloud-native controls, vendor risk, and privacy automation. Community: OWASP Riga and Cloud Security Alliance Chapter Lead. Need to get regulator-ready? Let’s connect.

Featured In:

F
F
F
+2
View Profile
RD

Rishabh Das

Assistant Professor, Cybersecurity Researcher at Ohio University

Athens, OH, USA
Artificial Intelligence
Critical Infrastructure Security
Cybersecurity
+2 more

Dr. Rishabh Das is an Assistant Professor at the Scripps College of Communication, Ohio University. With over a decade of hands-on experience in operating, troubleshooting, and supervising control systems in the oil and gas industry, Dr. Das has become a recognized leader in the field of cybersecurity. His award-winning work in developing security architectures and detection algorithms has significantly advanced the protection of legacy industrial controllers against cyber threats. Dr. Das's research portfolio is extensive, encompassing the virtualization of Industrial Control Systems (ICS), threat modeling, penetration testing in ICS, active network monitoring, and the application of Machine Learning (ML) in cybersecurity. His expertise has been sought after by military associations and commercial entities alike, guiding them in meeting their cybersecurity requirements for critical infrastructure.

Featured In:

S
1
T
+3
View Profile
SA

Shakel Ahmed

Director of Solutions Engineering EMEA

Oxford, UK
AI Risk
Cloud Security
Cyber Resilience and Culture
+2 more

For over 20 years, I've been on the front lines of cybersecurity, working with global organisations to help them answer critical questions like: "How effective are our security measures against a cyber attack?" My passion is empowering companies to identify and fortify their attack surface. I help leadership teams evaluate their security stack's effectiveness and build actionable roadmaps. Some of the topics I cover are Enterprise cybersecurity and strategy, culture and how it impacts cyber resilience. Emerging attacks and attacker innovation in ransomware and increasingly AI security risks. This passion for sharing actionable knowledge is why I also started writing my blog. It's my way of sharing ideas and providing insights for enterprise security defenders and educate the wider community. In my day-to-day role at Pentera, I lead a team of talented security engineers. We partner with leading organisations who are ready to embrace change. As a speaker and mentor, I enjoy challenging the norms, introducing disruptive technologies, and sharing best practices to raise the bar.

Featured In:

S
P
C
+5
View Profile
AA

Ahmed Awad Ahmed Awad

Chief Security Strategist (CSS) | Senior Cyber Threat Intelligence Analyst | APT Hunter | National Security & MENA Threat Expert | Author | CISSP, CISO | Nullc0d3 at IntelX360 Cybersecurity Solutions

Business Strategy
Cybersecurity
Digital Transformation
+1 more

Cyber Threat Intelligence Leader | Nation-State Actor Hunter | Strategic Defense Architect With over 20 years at the forefront of cybersecurity—including senior roles in national security and government defense—I specialize in threat hunting, APT campaign attribution, and intelligence-driven defense. My career spans proactive threat detection, incident response, and mentoring high-stakes SOC/CTI teams in classified environments. I’ve led national-level threat hunting operations, correlated complex TTPs using MITRE ATT&CK, and produced actionable intelligence for executive stakeholders. My expertise includes SIEM, SOAR, threat intelligence platforms, and secure infrastructure design, with a deep focus on the MENA region’s cyber threat landscape. As the author of “Inside the Hacker Hunter’s Mind” and “Inside the Hacker Hunter’s Toolkit”, I share real-world insights into state-level threat actors, OSINT, malware analysis, and digital forensics. I’m passionate about mentoring the next generation of cyber defenders and building resilient, intelligence-led security postures. Let’s connect to discuss cybersecurity challenges, threat intelligence, or how I can contribute to your mission. Key Skills: Cyber Threat Intelligence | APT Attribution | Incident Response | Threat Hunting | SIEM/SOAR | MITRE ATT&CK | OSINT | Malware Analysis | Secure Infrastructure | Executive Reporting | Python/C# Automation | MENA Threat Context

Featured In:

C
M
A
+2
View Profile
RL

Rachel Levitch

CISO at Charles Edda and Charles Bouley

Dallas, TX, USA
Business & Finance
Continuity
Evaluation and Measurement Tools
+4 more

Charles Edda & Charles Bouley, Inc. (CECB) is a Texas-based cybersecurity company founded in 1999. The company specializes in managed security risk assessments, including vulnerability scanning, penetration testing, and security awareness training. Its primary clients include small businesses, medical practices, and law firms. The company is currently owned and operated by Dr. Rachel Levitch, who has expanded its services to provide advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. CECB's services follow industry-recognized cybersecurity frameworks such as the National Institute of Standards and Technology (NIST), ISO 27001, and CIS Controls to help organizations establish robust cybersecurity practices and culture.

Featured In:

C
M
B
+5
View Profile
TH

Trevor Horwitz

CISO at TrustNet

Cloud Computing
Compliance
Computer Forensics
+2 more

CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…

Featured In:

F
G
S
+5
View Profile
BM

Bill Mann

Privacy Expert at Cyber Insider

3d Printing
Books
Cloud Computing
+2 more

I have over 30 years experience as an Electrical Engineer, Technical Writer, and Documentation Manager. I worked in technical areas including avionics, systems integration, mobile software, SaaS. Several years ago I left the corporate world to care for sick parents. I supported myself building websites, writing technical “how-to” books, and leading online courses. Now, with family issues behind me, I have the time to take on some freelance clients. My atypical career path taught me to work well with a wide range of clients and audiences. Clients like Honeywell and Microsoft, McGraw-Hill and other book publishers, even pre-IPO startups. Audiences from computer beginners, to B2B buyers, to engineers building aircraft systems. I'm skilled at learning complex technologies like VPNs and cryptocurrencies. And I excel at turning that raw data into understandable content for a target audience. I am looking to contribute to projects that need these skills. I'm particularly interested in subjects that empower individuals such as online privacy.

Featured In:

F
E
A
+6
View Profile
ON

Oleg Naumenko

CEO at Hideez

Philadelphia, Пенсильвания, США
Authentication
Cybersecurity
Data breach
+7 more

I'm Oleg Naumenko, CEO of Hideez Group Inc. I’m a serial entrepreneur with a deep background in technology and cybersecurity. As a certified member of the FIDO Alliance, we work with government, finance, and healthcare organizations to replace outdated login methods with secure, seamless access to workstations and accounts. With deep in-house expertise, we help companies stay ahead of threats while making life easier for their workforce.

Featured In:

P
M
W
+6
View Profile
LP

Larry Pesce

VP of Services at Finite State

Animal Bites
Application Security
Ceh
+2 more
View Profile
DK

Dmitry Kurskov

Head of Information Security Department and Principal Cybersecurity Architect at ScienceSoft

Active Directory
Dhcp
Dns
+2 more

Information and cyber security systems architect / manager with more than 20 years of practical experience, including over 10 years in corporate IT and Cybersecurity management.

View Profile
JP

Jonathan Pearse

Director of Cybersecurity Services at DataFortified

Eastbourne, UK
Cyber Awareness Training
Cybersecurity
Cyber Security
+3 more
View Profile
KT

Kendall Thomas

Chief Information Security Officer at Emeritus

Active Directory
Computer Networking
Computer Technology
+2 more

I began working with computers as far back as DOS and Lantastic. I started working professionally in the IT Field since 1999 and have worked with every Microsoft server since Windows NT. I now hold the role as CISO at ITRemedy/ Happy Computer where we consult with networks from single users to clients that run into the 100's of devices.

Featured In:

D
T
View Profile
TO

Tiernan OMalley

Director, Client Services at Framework Security

AI/ML
Cybersecurity
Education
+1 more

Tiernan is dedicated to providing cybersecurity guidance to all of our customers. She brings a wealth of experience in client success, technical presales, and information security. Based in Los Angeles, her expertise lies in roles focusing on consulting and recruitment in the information technology and cybersecurity space.

View Profile
HS

Harman Singh

Director at Cyphere

Manchester, UK
AI security
cyber security
cyber security strategy
+3 more

Harman Singh, director at respected consultancy Cyphere, is an experienced security professional consulting public and private sector customers across the globe. He brings over a decade of intensive consulting experience, advising both private and public sector organisations on security matters around offensive and defensive security, particularly SOC operations maturity, CREST pen testing, risk and governance. Harman is recognised for his teaching ability; he is not just a consultant, but an educator of other experts: Black Hat Trainer: He has delivered advanced, practical training sessions at the prestigious Black Hat security conferences. Advanced Hacking: His training focuses on sophisticated techniques for attacking and defending complex digital infrastructure, upskilling security teams worldwide. Corporate Consulting: Beyond training, he possesses extensive experience consulting with corporate security teams, helping them manage threats across traditional networks and cloud-based systems. His insights—covering regulatory compliance, comments and best practices—are frequently featured in publications such as Infosecurity Magazine and Fast Company.

Featured In:

T
F
A
+6
View Profile
OL

Oussama Louhaidia

Founder/CTO at getcybr, inc.

London, UK
cyber
cybersecurity
IT security
+2 more

Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.

Featured In:

G
G
G
+3
View Profile
BG

Bob Gourley

Chief Technology Officer and Author at The Cyber Threat

Air Force
Army
Big Data
+2 more

Would love it if you contact me via OODA.com instead of DM here. Bob Gourley is an experienced board member, a Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity, risk mitigation in artificial intelligence and blockchain projects, and data analytics. CTO of OODA LLC, home of the OODA Network, a community of business leaders, technologists, intelligence and security professionals. Winner of InfoWorld top 25 CTO and Washingtonian Magazine's "DC Tech Titan" list.Served as the CTO for the Defense Intelligence Agency and was previously a naval intelligence officer.

Featured In:

G
F
E
View Profile
SF

Sead Fadilpašić

Cybersecurity Writer at Restore Privacy

Blogging
Communication
Copywriting
+2 more

Seasoned content writer with more than a decade of experience.Wrote hundreds of blogs, ebooks, newsletters, social media content, news articles.Worked with numerous tech start-ups, digital marketing agencies, and media publications.Focused mostly on B2B tech, cybersecurity, blockchain, and AI. Capable of covering virtually any topic.Experienced in journalistic writing.

Featured In:

A
A
T
+6
View Profile
KA

Kunal Andhale

Sr. Manager - Infrastructure Security & Automation

Denver, CO, USA
Artificial Intelligence
Cybersecurity
GenAI
+2 more

Results-oriented technology leader with over 9 years of experience in Infrastructure Security, Automation, Generative AI, and Software-Defined Operations. Demonstrated ability to lead high-performing teams, streamline enterprise support, and execute strategic initiatives that enhance organizational resilience and operational efficiency. A seasoned cybersecurity professional, experienced in vulnerability and patch management at scale, with a strong track record of driving measurable, data-driven impact through intelligent automation. Skilled in designing and implementing secure, scalable, and compliant infrastructure solutions that align with business and regulatory goals. Proven expertise in project and program management, particularly within Agile and Scrum frameworks, with a focus on cross-functional collaboration, risk mitigation, and continuous improvement. Recognized for combining technical depth with strategic vision to deliver transformative outcomes in complex enterprise environments.

Featured In:

D
View Profile
PB

Paul Baka

Director at SSLTrust

Sydney NSW, Australia
AI Security
Cyber Security
Email Security
+3 more

Paul is a leading Cyber Security Expert and an integral part of the SSLTrust team. He is world-renowned for his knowledge of SSL/TLS Certificates and PKI Solutions, and enterprise companies and small business clients frequently seek his expert opinion on website security.

Featured In:

S
S
S
+6
View Profile
AW

Anant Wairagade

Senior Engineer(FinTech)

Enterprise Integrations
FinTech
Identity and Access Management

Anant Wairagade is a Technical Lead with over 20 years of experience in Software Engineering enabling IT organizations with digital transformation and helping them become secure organizations. In his more than two decades long career, Anant has worked for financial services companies where he led the design and development of several successful products in the Security, Finance and CRM domain. Beginning of his career, Anant worked as a Technology consultant for major Financial Services companies and Banks. Anant is a thought leader in Enterprise Integrations solutions. He is expert in API based data connector development, Kafka and Messaging Middleware. Anant is also an active member of several Industry Open Standard communities. He is an IEEE Senior member and serves as Program Committee Member for several IEEE and other IT conferences.

Featured In:

D
D
F
+1
View Profile

Showing 20 of 960 experts

Drug Development
Biotechnology Innovation
Pharmaceutical Manufacturing
Health Services Research
Healthcare Management
Pediatric Healthcare
Mental Health
Medical Training
Clinical Trials
Medical Simulation

What topics can healthcare cybersecurity experts comment on for publishers?

Healthcare cybersecurity experts can provide valuable insights on a wide range of topics, including: recent data breaches in healthcare organizations, HIPAA compliance and patient data protection, emerging threats like ransomware targeting hospitals, security challenges of Internet of Medical Things (IoMT) devices, AI and machine learning in healthcare security, cloud security for health records, and strategies for building cyber-resilient healthcare systems. Their expertise helps publishers create comprehensive, authoritative content on these critical issues.

How can healthcare cybersecurity experts benefit from being featured in publications?

Being featured in reputable publications offers numerous benefits for healthcare cybersecurity experts. It enhances their professional visibility and credibility within the industry, potentially leading to new career opportunities or collaborations. Regular media appearances establish them as thought leaders, which can attract speaking engagements, consulting roles, or academic positions. Additionally, sharing knowledge through publications contributes to raising awareness about healthcare cybersecurity issues, ultimately helping to improve the overall security posture of the healthcare sector.

Why is healthcare cybersecurity expertise crucial for modern journalism?

Healthcare cybersecurity expertise is vital for modern journalism due to the increasing frequency and sophistication of cyber attacks on healthcare systems. These incidents can compromise patient data, disrupt critical services, and have far-reaching consequences. Journalists need insights from cybersecurity experts to accurately report on these complex issues, explain the potential impacts on public health and safety, and provide context on the evolving threat landscape in healthcare IT.

What makes Featured.com an effective platform for connecting healthcare cybersecurity experts with publishers?

Featured.com excels in connecting healthcare cybersecurity experts with publishers through its specialized focus and efficient matching process. The platform maintains a curated directory of verified experts, making it easy for publishers to find relevant, qualified sources quickly. For experts, Featured.com provides exposure to a wide network of reputable publishers, increasing chances of being quoted in high-profile articles. The platform's user-friendly interface and topic-specific categorization ensure that both parties can connect effectively for timely and insightful content creation in the rapidly evolving field of healthcare cybersecurity.

No options available

No options available

No options available

No options available

No options available

No options available

No options available