• Q&A
  • Login
  • Sign Up
Loading

7014 E Camelback Rd,
Suite B100A,
Scottsdale, AZ 85251
community@featured.com

Follow us

AboutReview ProcessBlogAPIAI LabsFAQContact UsPrivacy PolicyTerms

© 2026 Featured. All rights reserved

  1. Home
  2. Healthcare & Biotech
  3. Healthcare Cybersecurity

Recognized Healthcare Cybersecurity Leaders 2025

In today's digital healthcare landscape, cybersecurity has become paramount for protecting sensitive patient data and maintaining HIPAA compliance. Featured.com's Healthcare Cybersecurity expert directory connects you with leading professionals who are at the forefront of safeguarding medical information systems. Our curated network of specialists offers invaluable insights on data protection strategies, security protocols, and emerging threats in the healthcare sector. These experts have been featured in prestigious publications, sharing their knowledge on everything from ransomware prevention to secure telehealth implementations. For publishers and journalists, our directory provides quick access to authoritative sources for timely articles and in-depth reports. For cybersecurity professionals, it's an opportunity to showcase expertise and contribute to critical discussions in the field. Explore our directory to find the perfect healthcare cybersecurity expert for your next story or project.

Connect with Healthcare Cybersecurity Experts

More Healthcare Cybersecurity Topics

Need a Healthcare Cybersecurity Expert for Your Story?

Connect directly with our network of vetted healthcare cybersecurity experts for interviews, quotes, or in-depth analysis.

Quick Response Times

Many experts respond within hours to media requests

Verified Credentials

All experts undergo background and credential verification

Coming Soon

Free to Connect

No fees to connect with experts for legitimate media requests

Submit Media Request

Frequently Asked Questions About Healthcare Cybersecurity Experts

Are You a Healthcare Cybersecurity Expert?

Join our network of professionals and connect with journalists and publishers looking for your expertise.

Apply to Join

Showing 20 of 1,308 experts

Filters

Loading...
CI

CyRx Inc.

Cybersecurity Specialist at CyRx360 Inc.

Chicago, IL, USA
cybersecurity
Dark web monitoring

CYRX360 is a healthcare‐focused cybersecurity company dedicated to protecting medical practices, hospitals, and clinics with comprehensive, regulation-driven solutions. Our services include a 24/7 Security Operations Center (SOC), HIPAA compliance audits, endpoint & ransomware protection, secure password management, dark web surveillance, and incident response. We help organizations reduce risk, ensure patient data confidentiality, and maintain trust.

View Profile
JM

Javier Medina

Cybersecurity Director at ITRES

Spain
Cybersecurity

Co-Founder of SG6, ITRES and DEV6. Cybersecurity consultant with a deep technical background. More than 20 years of experience in the fields of IT Security, Cybersecurity, Security Research and IT Best Practices. Dozens of acredited CVE vulnerabilities since Y2K. I publish practical offensive/defensive research: vulnerability analysis, exploitation notes, reverse engineering, and hardening/detection takeaways.

Featured In:

L
L
L
+6
View Profile
AG

Andrey Gubarev

CISO at fromCISO

EU
CyberSecurity
Privacy

CISO and advisor helping FinTechs turn DORA/NIS2/PSD2, PCI DSS, ISO 27001, and GDPR into practical resilience and business value. 20+ years across architecture, incident response, and program build-out. I prioritise KPIs, clear board communication, and continuous improvement, not checkbox compliance. Highlights: led DORA/NIS2 readiness for cross-border teams (faster audits; 30%+ lower regulatory risk), stood up vCISO/vDPO programs with cloud-native controls, vendor risk, and privacy automation. Community: OWASP Riga and Cloud Security Alliance Chapter Lead. Need to get regulator-ready? Let’s connect.

Featured In:

F
F
F
+2
View Profile
DW

Don Warden II

President at Cyber Pros LLC

Franklin, TN, USA
AI
Business Resilience
Cybersecurity
+2 more

Don Warden is a seasoned cybersecurity executive and author with over 30 years of experience securing complex environments across diverse industries. His expertise spans digital forensics, cyber threat intelligence, and incident response, where he has led high-stakes investigations into ransomware attacks, insider threats, and cyber extortion. As a trusted advisor, Don has guided organizations and high-profile individuals through threat mitigation, resilience planning, and post-incident recovery. Holding advanced certifications, including Certified Ethical Hacker (CEH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don combines technical depth with strategic vision. His passion for ethical hacking and proactive defense drives his approach to strengthening security postures in an evolving digital landscape. Beyond cybersecurity, Don enjoys traveling with his family to remote destinations and is deeply committed to philanthropic efforts that make a meaningful impact on people’s lives.

Featured In:

H
H
H
+2
View Profile
KR

Karthikeyan Ramdass

Cybersecurity Lead Member of Technical Staff

Atlanta, GA, USA
AI Security
Application Security
Cybersecurity
+8 more

Karthikeyan Ramdass a seasoned cybersecurity professional with over 18 years of experience securing mission-critical systems for leading Fortune 500 companies across industries including aviation, finance, automotive, and technology. I have played a pivotal role in protecting organizations such as Southwest Airlines, Wells Fargo, Morgan Stanley, Toyota Motors North America, AIG, Cognizant, Salesforce, and Deluxe Corporation. Specializing in application security, vulnerability management, secure architecture, and supply chain defense, led the design and implementation of enterprise-scale security frameworks, CI/CD pipelines, and advanced security testing solutions. Extensive experience in SAST, DAST, SCA, zero-day vulnerability management, and penetration testing, ensuring compliance with global standards such as NIST CSF, PCI DSS, and OWASP Top 10.

Featured In:

E
B
S
+2
View Profile
YP

Yash Patel

Senior Security Engineer at Microsoft

Redmond, WA, USA
AI Security
Cyber Security
Digital Content Creation
+7 more

📌 Key Areas: Secure Software Engineering | Zero-Trust Security | Cloud & DevOps Security | AI for Cyber Defense | Research & Innovation | Cybersecurity Advocacy I am an award-winning Cybersecurity Professional and Software Engineer with about 10 years of experience building secure, resilient, and scalable systems that safeguard enterprises and critical infrastructures worldwide. At Microsoft, I have spearheaded high-impact security engineering initiatives across Azure, DevOps, and enterprise security driving innovations in zero-trust frameworks, system observability, automation, and AI-integrated security solutions. My contributions have fortified services relied upon by global customers while elevating industry standards in reliability, compliance, and risk management. Beyond corporate impact, I am deeply committed to advancing the cybersecurity community. As an advisor, trainer, and researcher, I actively contribute to academic publications, global workshops, and non-profit initiatives with multiple global organizations like CyberNGO, Mentors Without Borders, TCET, CHARUSAT, PARUL, MSU, Live2Serve and Many More, promoting cybersecurity awareness and training future leaders. Recognized with honors such as the Global Recognition Award 2025 and multiple CISO50 Innovation & Excellence Awards, my mission is to bridge research, engineering, and leadership to shape the future of digital trust and resilience.

Featured In:

F
C
C
+6
View Profile
SG

Shyam Kumar Gajula

Endpoint & Identity Security Consultant at HCLTech America

Atlanta, GA, USA
Cybersecurity
Cybersecurity Research
Distributed Systems Security
+3 more

Shyam Gajula is a Cybersecurity Professional specializing in Endpoint Security, Identity & Access Management (IAM), Zero Trust Architecture, and Cloud Security with 9+ years of experience securing enterprise and hybrid environments. He helps organizations strengthen security posture by implementing identity-centric architectures, continuous risk reduction frameworks, and compliance-focused controls across AWS, VDI, and distributed infrastructures. Shyam holds the AWS Certified Solutions Architect credential and has hands-on expertise in cloud security design, endpoint hardening, authentication frameworks (including SAML 2.0 / SSO), access governance, EDR/agent policy optimization, and secure cloud operations. His research and practical work focus on real-world defenses against modern threats, endpoint risk scoring, and identity-driven security automation. He is a published cybersecurity researcher, an international keynote speaker, and serves as a judge and evaluator for global cybersecurity awards and innovation competitions. Shyam frequently contributes to peer review panels and provides expert insights on best practices for Zero Trust adoption, cloud risk mitigation, and securing modern digital workplaces. Orcid Research Profile: https://orcid.org/0009-0001-4279-9629

Featured In:

X
View Profile
CM

Dr. Connie McIntosh

Head of Security

Melbourne VIC, Australia
Cyber Security
National Security
STEM

Dr. Connie McIntosh is a cybersecurity executive, academic, mentor and international speaker. She currently serves as Head of Security at Ericsson. Dr. McIntosh integrates cybersecurity, information security, product security, operational security, and data privacy into business strategy, fostering psychological safety and cultural transformation in traditionally siloed environments. Her background is in National Security and Cyber Defense working in in key Cybersecurity Leadership roles across Defense and Government classified networks, Academia and private enterprise. Her leadership has earned her accolades such as being named among the Top 100 Women in Cybersecurity by US Cyber Defense Magazine and the Black Unicorn Award at Black Hat 2020. In 2025, she was awarded the prestigious Global Recognition Award for Leadership Excellence in cybersecurity underscoring her global recognition and influence along with 2025 Young Leader of the Year - The Fast Mode Awards 2025 recognizing exceptional individuals whose leadership, resilience, and technical depth continue to elevate the global telecom ecosystem. Connie's contributions to cybersecurity have been featured in influential books and magazines, including the groundbreaking Women4Cyber's own "Europe's Top Women in Security, Hacking Gender Barriers", along with "The Rise of Cyber Women Vol 3", "Shining the Spotlight - Stories for Business Success." and others.

Featured In:

G
S
H
+6
View Profile
PJ

Mr Parthiban J OSCP, OSCE, GWAPT, GCIH, CCNA, RHCE

Managing Director at Peneto Labs

Chennai, Tamil Nadu, India
Application Penetration Testing
CERT-In Empanelled Pentest & Security Audit
Cisco Certified Network Associate (CCNA)
+7 more

I am a cybersecurity professional with over 18 years of experience in offensive security, penetration testing, and cyber defense. I focus on deeply understanding complex security challenges and developing practical, real-world solutions that strengthen organizations against evolving threats. I enjoy working across various security domains and approaching problems with a hands-on, analytical mindset. My colleagues and clients describe me as a hardworking, disciplined professional who remains calm and solution-oriented when handling high-risk incidents and challenging environments. My areas of expertise include vulnerability assessment, exploit development, incident response, network security architecture, and enterprise systems administration. I hold industry-recognized certifications such as OSCP, OSCE, GWAPT, GCIH, CCNA, and RHCE, which demonstrate my commitment to continuous learning and technical excellence.

Featured In:

S
C
View Profile
RD

Rishabh Das

Assistant Professor, Cybersecurity Researcher at Ohio University

Athens, OH, USA
Artificial Intelligence
Critical Infrastructure Security
Cybersecurity
+2 more

Dr. Rishabh Das is an Assistant Professor at the Scripps College of Communication, Ohio University. With over a decade of hands-on experience in operating, troubleshooting, and supervising control systems in the oil and gas industry, Dr. Das has become a recognized leader in the field of cybersecurity. His award-winning work in developing security architectures and detection algorithms has significantly advanced the protection of legacy industrial controllers against cyber threats. Dr. Das's research portfolio is extensive, encompassing the virtualization of Industrial Control Systems (ICS), threat modeling, penetration testing in ICS, active network monitoring, and the application of Machine Learning (ML) in cybersecurity. His expertise has been sought after by military associations and commercial entities alike, guiding them in meeting their cybersecurity requirements for critical infrastructure.

Featured In:

S
1
T
+3
View Profile
SA

Shakel Ahmed

Director of Solutions Engineering EMEA

Oxford, UK
AI Risk
Cloud Security
Cyber Resilience and Culture
+2 more

For over 20 years, I've been on the front lines of cybersecurity, working with global organisations to help them answer critical questions like: "How effective are our security measures against a cyber attack?" My passion is empowering companies to identify and fortify their attack surface. I help leadership teams evaluate their security stack's effectiveness and build actionable roadmaps. Some of the topics I cover are Enterprise cybersecurity and strategy, culture and how it impacts cyber resilience. Emerging attacks and attacker innovation in ransomware and increasingly AI security risks. This passion for sharing actionable knowledge is why I also started writing my blog. It's my way of sharing ideas and providing insights for enterprise security defenders and educate the wider community. In my day-to-day role at Pentera, I lead a team of talented security engineers. We partner with leading organisations who are ready to embrace change. As a speaker and mentor, I enjoy challenging the norms, introducing disruptive technologies, and sharing best practices to raise the bar.

Featured In:

C
P
S
+6
View Profile
AA

Ahmed Awad Ahmed Awad

Chief Security Strategist (CSS) | Senior Cyber Threat Intelligence Analyst | APT Hunter | National Security & MENA Threat Expert | Author | CISSP, CISO | Nullc0d3 at IntelX360 Cybersecurity Solutions

Business Strategy
Cybersecurity
Digital Transformation
+1 more

Cyber Threat Intelligence Leader | Nation-State Actor Hunter | Strategic Defense Architect With over 20 years at the forefront of cybersecurity—including senior roles in national security and government defense—I specialize in threat hunting, APT campaign attribution, and intelligence-driven defense. My career spans proactive threat detection, incident response, and mentoring high-stakes SOC/CTI teams in classified environments. I’ve led national-level threat hunting operations, correlated complex TTPs using MITRE ATT&CK, and produced actionable intelligence for executive stakeholders. My expertise includes SIEM, SOAR, threat intelligence platforms, and secure infrastructure design, with a deep focus on the MENA region’s cyber threat landscape. As the author of “Inside the Hacker Hunter’s Mind” and “Inside the Hacker Hunter’s Toolkit”, I share real-world insights into state-level threat actors, OSINT, malware analysis, and digital forensics. I’m passionate about mentoring the next generation of cyber defenders and building resilient, intelligence-led security postures. Let’s connect to discuss cybersecurity challenges, threat intelligence, or how I can contribute to your mission. Key Skills: Cyber Threat Intelligence | APT Attribution | Incident Response | Threat Hunting | SIEM/SOAR | MITRE ATT&CK | OSINT | Malware Analysis | Secure Infrastructure | Executive Reporting | Python/C# Automation | MENA Threat Context

Featured In:

C
M
A
+1
View Profile
FV

Francisco Velasquez

CEO & Cyber Security Consultant at HostBreach

Philadelphia, PA, USA
CMMC
Cybersecurity

Franco Velasquez is the CEO and founder of HostBreach, a cybersecurity advisory firm specializing in external cyber intelligence, attack surface analysis, and intelligence-driven advisory for defense contractors and regulated organizations. His work focuses on understanding how attackers identify, prioritize, and compromise targets using publicly available intelligence, often before traditional security controls detect activity. Franco advises organizations on CMMC readiness, CUI exposure, ransomware risk, and pre-incident threat visibility, helping leaders understand real-world risk beyond checklist compliance. He has experience working with OSINT-based reconnaissance, threat actor behavior analysis, and tabletop attack simulations aligned to observed intrusion patterns. He is frequently consulted on topics including ransomware trends, external exposure management, supply chain risk, and how attackers exploit misconfigurations and unpatched systems. Franco emphasizes practical, intelligence-led decision-making that helps organizations reduce risk before incidents occur.

Featured In:

A
View Profile
RL

Rachel Levitch

CISO at Charles Edda and Charles Bouley

Dallas, TX, USA
Business & Finance
Continuity
Evaluation and Measurement Tools
+4 more

Charles Edda & Charles Bouley, Inc. (CECB) is a Texas-based cybersecurity company founded in 1999. The company specializes in managed security risk assessments, including vulnerability scanning, penetration testing, and security awareness training. Its primary clients include small businesses, medical practices, and law firms. The company is currently owned and operated by Dr. Rachel Levitch, who has expanded its services to provide advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. CECB's services follow industry-recognized cybersecurity frameworks such as the National Institute of Standards and Technology (NIST), ISO 27001, and CIS Controls to help organizations establish robust cybersecurity practices and culture.

Featured In:

W
M
P
+4
View Profile
TH

Trevor Horwitz

CISO at TrustNet

Cloud Computing
Compliance
Computer Forensics
+2 more

CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…

Featured In:

F
G
S
+6
View Profile
ON

Oleg Naumenko

CEO at Hideez

Philadelphia, Пенсильвания, США
Authentication
Cybersecurity
Data breach
+7 more

I'm Oleg Naumenko, CEO of Hideez Group Inc. I’m a serial entrepreneur with a deep background in technology and cybersecurity. As a certified member of the FIDO Alliance, we work with government, finance, and healthcare organizations to replace outdated login methods with secure, seamless access to workstations and accounts. With deep in-house expertise, we help companies stay ahead of threats while making life easier for their workforce.

Featured In:

W
A
P
+6
View Profile
LP

Larry Pesce

VP of Services at Finite State

Animal Bites
Application Security
Ceh
+2 more

Featured In:

B
View Profile
JP

Jonathan Pearse

Director of Cybersecurity Services at DataFortified

Eastbourne, UK
Cyber Awareness Training
Cybersecurity
Cyber Security
+3 more
View Profile
MF

Michel Fotsing CISSP

Cybersecurity Architect & Senior Consultant at Levio Conseils

Montréal, QC, Canada
AI/ML
Business Strategy
Cybersecurity
+3 more

Michel Fotsing is a CISSP-certified cybersecurity architect specializing in AI governance for organizations navigating emerging regulations (EU AI Act, NIS2, Quebec Law 25, GDPR). He consults for Quebec's government through Levio and serves on the ISC2 Exam Review Commission, contributing to international cybersecurity certification standards. Author of "L'Architecte Numérique: Orchestrer les intelligences à l'ère de l'IA" (2026, distributed by Hachette), he developed the Three Zones Framework for classifying AI-augmented security decisions. He also created StructureClerk.ca, a free compliance tool covering 169 jurisdictions. Michel can speak to: AI governance and shadow AI risks for businesses, cybersecurity strategy for SMEs, the human-AI decision boundary in critical systems, and data privacy compliance across international frameworks.

View Profile
FO

Frank Osborne CPTIA, CIPM

Principal Consultant and Founder at Bedrock Intelligence

San Francisco, CA, USA
Cybersecurity
Leadership
Technology

A pragmatic leader with experience guiding, building, and scaling cybersecurity and privacy programs across sectors. I formerly led the Information Security program for Udemy an EdTech firm. Implemented company-wide cybersecurity and data privacy governance programs for payment organizations, Led service delivery strategy, audits and penetration testing engagements for Consulting organizations and help company stakeholders understand likely business threats and practical methods to minimize risk.

Featured In:

A
H
H
View Profile

Showing 20 of 1308 experts

What topics can healthcare cybersecurity experts comment on for publishers?

Healthcare cybersecurity experts can provide valuable insights on a wide range of topics, including: recent data breaches in healthcare organizations, HIPAA compliance and patient data protection, emerging threats like ransomware targeting hospitals, security challenges of Internet of Medical Things (IoMT) devices, AI and machine learning in healthcare security, cloud security for health records, and strategies for building cyber-resilient healthcare systems. Their expertise helps publishers create comprehensive, authoritative content on these critical issues.

How can healthcare cybersecurity experts benefit from being featured in publications?

Being featured in reputable publications offers numerous benefits for healthcare cybersecurity experts. It enhances their professional visibility and credibility within the industry, potentially leading to new career opportunities or collaborations. Regular media appearances establish them as thought leaders, which can attract speaking engagements, consulting roles, or academic positions. Additionally, sharing knowledge through publications contributes to raising awareness about healthcare cybersecurity issues, ultimately helping to improve the overall security posture of the healthcare sector.

Why is healthcare cybersecurity expertise crucial for modern journalism?

Healthcare cybersecurity expertise is vital for modern journalism due to the increasing frequency and sophistication of cyber attacks on healthcare systems. These incidents can compromise patient data, disrupt critical services, and have far-reaching consequences. Journalists need insights from cybersecurity experts to accurately report on these complex issues, explain the potential impacts on public health and safety, and provide context on the evolving threat landscape in healthcare IT.

What makes Featured.com an effective platform for connecting healthcare cybersecurity experts with publishers?

Featured.com excels in connecting healthcare cybersecurity experts with publishers through its specialized focus and efficient matching process. The platform maintains a curated directory of verified experts, making it easy for publishers to find relevant, qualified sources quickly. For experts, Featured.com provides exposure to a wide network of reputable publishers, increasing chances of being quoted in high-profile articles. The platform's user-friendly interface and topic-specific categorization ensure that both parties can connect effectively for timely and insightful content creation in the rapidly evolving field of healthcare cybersecurity.

No options available

No options available

No options available

No options available

No options available

No options available

No options available
Pharmaceutical
Immunotherapy
Biopharmaceutical
Medical Biotechnology
Clinical Trials
Health Analytics
Medical Compliance
Digital Health
Healthcare AI
Health Tech Innovation