Are you planning an event?

Do you need to hire a trusted expert for a meeting, conference, corporate event, seminar, trade-show, convention, or company workshop?

Here is a list of the top experts and thought leaders on cybersecurity to consider for your event that can deliver a memorable speech and presentation that will inspire, educate, and entertain your audience.

These cybersecurity speakers can cover such topics as cloud vulnerability, how to address ransomware, social engineering attacks, the psychology of cyber-crime, understanding hackers, remote working cybersecurity risks, data privacy as a discipline, mobile cybersecurity, how the Internet of Things (IoT) creates more opportunities for cybercrime, how AI and machine learning can improve your security infrastructure, and much more.

If you would like to hire any of these speakers or need more suggestions, fill out this form and our agent will respond within two business hours.

Please note, we work with over 5000 experts and thought leaders who may not be listed on our site.

Frank Figliuzzi


Cesare Frank Figliuzzi, Jr. is a former American government leader who was born on September 12, 1962. He was previously the Federal Bureau of Investigation’s right-hand man for counterintelligence.

Figliuzzi graduated with honors from the University of Connecticut School of Law and holds a Bachelor of Arts in English writing from Fairfield University. Figliuzzi also completed the John F. Kennedy School of Government’s Harvard University National Security Program for Senior Executives in Government.

Figliuzzi began working for the FBI in August 1987 as a specialist and has worked in Atlanta, Washington, D.C., base camp, San Francisco, Miami, and Cleveland. He was the associate specialist in charge of the FBI’s fifth-largest field office, the Miami Field Office.

Jonathan Zittrain


As a cybersecurity speaker, Zittrain gives riveting keynotes and moderates vibrant, stimulating debates, and is frequently regarded as one of the top speakers and presenters at big and influential meetings. He is known for his wit as much as his intelligence. He has served on the Board of Advisors for Scientific American and is a former Trustee of the Internet Society.

He has been a long-time counselor to governments and international enterprises. He has moderated sessions and debates between world leaders at the World Economic Forum’s Annual Meeting in Davos for more than fifteen years, where he was recognized as a Young Global Leader and led the Global Agenda Council on the Future of the Internet. Zittrain was inducted into the American Academy of Arts and Sciences in 2017.

Tyler Cohen Wood


Tyler Cohen is a writer who lives in New York Good if you know what you’re up against and how to prepare, according to Wood. Wood is an Internet Intelligence expert who has been consulted by the highest levels of government, and she is now sharing her wealth of insider information and tried-and-true methodologies with forward-thinking audiences around the country.

Wood is a true cyber insider who captivates audiences with her candid keynotes, equipping corporations, non-profits, and the general public with the tools they need to protect themselves in the digital world. She has also contributed her substantial knowledge to NASA and the technology giant IBM.

Nicole Perlroth


Nicole Perlroth is a cybersecurity journalist who has had her work republished for film and television by the New York Times. She is a frequent lecturer at the Stanford Graduate School of Business and a graduate of Princeton University and Stanford University. She and her family live in the Bay Area, but she is lured to their cabin in the woods, where they live off the grid.

Juliette Kayyem


Juliette is currently the CEO of Zemcar, a lifestyle brand that connects busy parents with competent drivers to help them meet their family’s mobility needs.

Ms. Kayyem is a Belfer Lecturer in International Security at Harvard Kennedy School, where she teaches disaster management and homeland security to future leaders.

She is a weekly featured commentator on Boston Public Radio, 89.7 WGBH Boston’s Local NPR, and a regular on-air national security analyst and contributor for CNN. She also runs a national security podcast called The SCIF and is a regular on-air national security analyst and contributor for CNN.

Juliette is the creator of Kayyem Solutions, LLC, a female-owned security firm that offers strategic guidance to a variety of businesses in areas such as technology, risk management, mega-event planning, venture financing, and more.

Chris Domas


Chris Domas works at the Battelle Memorial Institute as a cybersecurity researcher. He specializes in reverse engineering (RE) and vulnerability analysis for embedded systems, which entails determining how to control electrical equipment. His group uses this knowledge to produce cyber technology that defends people on the newest front of the worldwide conflict.

Domas earned his bachelor’s degree from Ohio State University, where he set out to take every class the school offered. He joined Battelle as a cyber security researcher after settling on a degree in computer science with an insignificant handful of minors. He continues to present research at cyber security conferences across the country, most notably at Black Hat, REcon, and DerbyCon.

Graham Cluley


Graham Cluley is a security blogger, public speaker, and researcher who has won numerous awards. He’s been a prominent figure in the PC security sector since the mid-1990s when he worked as a software developer for Dr. Solomon’s Anti-Virus Toolkit for Windows, the initial version of which was historically significant.

Graham has keynoted at events such as Microsoft Future Decoded, WebSummit, RSA, Campus Party, ISSA, CSO Perspectives, IP Expo, Virus Bulletin, EICAR, ISACA, ICSA, RANT, British Computer Society, AVAR, Cyber Security Symposium, Insight Technology Show, Ecrime Congress, Infosec, and the European Internet Security Forum.

Karen Elazari


Keren Elazari is a well-known security researcher, author, and strategic analyst who has worked in the international cyber security field for many years. Elazari has worked with renowned Israeli security corporations, government organizations, Big 4 firms, Fortune 500 companies, and revolutionary startup companies since 2000, assisting worldwide organizations with complicated cyber security concerns.

Furthermore, Scientific American and WIRED have covered her independent research and writing on new security challenges, and she is a frequent speaker and commentator at international events and in the media.

Michael Herrick


Michael Herrick is the founder and CEO of Matter form, a software development, and technology strategy organization. He’s released software on everything from floppy disks to SAAS, and he was the first to introduce e-commerce shopping cart technology three months before Amazon.com. Michael’s love for huge problems has prompted him to focus on healthcare technologies in recent years.

Michael’s cybersecurity consultancy is fueled by his unique perspective, which blends technology and policy with an unrelenting commitment to human-centered design. Michael and his family live in Albuquerque, New Mexico’s downtown area. Check Michael Herrick’s and other prominent speakers’ and celebrities’ availability by contacting a speaker booking agent.

Wendi Whitmore


Wendi is an industry pioneer with over 15 years of experience in Incident Response, Proactive and Strategic Information Security Services Intelligence Services, and Data Breach Investigations.

Wendi is the Global Lead of IBM X-Force Incident Response and Intelligence Services (IRIS), where she is responsible for the global proactive incident response administrations and insight units within IBM Services.

Wendi worked with Mandiant for six years before joining CrowdStrike as a Managing Director in 2012. Wendi previously worked for the Air Force Office of Special Investigations as a Special Agent in charge of Computer Crime Investigations (AFOSI). ”

Scott Schober

It was a privately-owned corporation founded in 1972 in Berkeley Heights, NJ, where Scott grew up surrounded by designers and gadgets. Scott’s father continues to serve as the organization’s CTO to this day. Scott began his career in broadcast communications and software engineering.

In 1999, he was appointed President and CEO of Berkeley Varitronics Systems. It was the first manufacturer of broadcast communications and security items. My family continues to keep the organization a secret.

Scott began broadcasting sequences from a YouTube and iTunes video digital broadcast called 2 Minute Cybersecurity Briefing in 2012. They investigate and educate people on the principles of data fraud and hacking techniques in order to make our advanced systems safer.”

MK Palmore


Rachel Wilson spent the first fifteen years of her career working at the National Security Agency (NSA). During her time at the NSA, she held several significant-top executive leadership positions.

Between 2008 to 2010, she was in charge of the National Security Agency’s counterterrorism processes and led an international effort to uncover and destroy terrorist plots against the United States and its allies.

Wilson worked out of the US Embassy in London as the NSA’s Leader of Processes in the United Kingdom from 2010 to 2012. She worked with the UK intelligence community in this position to combat terrorist and cyber assaults during the 2012 London Olympics. Wilson returned to the United States in 2012 and spent the next five years managing the National Security Agency’s cyber extortion operations.

Wolfgang Ischinger


Wolfgang Ischinger is the Chairman of the Munich Security Conference, the world’s foremost venue for debating international security policy. He was a former German Ambassador to both the United States and the United Kingdom.

World in Danger: Germany and Europe in an Uncertain Time, his European best-seller, has been praised by global thinking leaders such as Henry Kissinger and Madeline Albright.

Ambassador Ischinger blends an exceptional quantity of diplomacy knowledge with experience as a corporate executive and board member as a speaker. His speeches provide vital insights into today’s most pressing geopolitical and economic challenges, such as US-EU business and political ties, the EU’s future, cybersecurity policy, and the global economy.

Bart McDonough


Bart McDonough, a cybersecurity and managed IT consultant, discusses how to safeguard your company’s most valuable assets: customer and member data. He discusses our nonchalant attitude toward cybersecurity as a society, the inherent security concerns, and our natural conviction that we will never be hacked.

Bart’s greatest strength in front of an audience is making the ethereal tangible. He demonstrates how giving shape to an intangible as cybersecurity allows for action, movement, and ultimately the establishment of necessary change. Bart explains how to protect yourself from today’s – and tomorrow’s – most prevalent and dangerous cyber-threats.

Gary Miliefsky


Gary is cybersecurity, privacy, and breach prevention expert with a global reputation. He is a frequent keynote speaker, panelist, and moderator. He is a multi-patent holder and the founder of a number of cybersecurity firms.

He is a frequent guest on national and international media, speaking on topics such as mobile privacy, cyber security, cybercrime, and cyber terrorism, and has been featured in Forbes, Fortune, and Inc. magazines.

As the CEO of Cyber Defense Media Group, he has been quite active in the cyber defense sphere (CDMG). With millions of readers and a constantly rising subscriber base, his CDMG manages three Cyber Defense platforms: Cyber Defense Awards, Cyber Defense TV, and Cyber Defense Magazine.

Pete Kofod

Peter Kofod is a top government and cloud security specialist with over twenty years of technical and leadership expertise in IT, including the development of secure hosted services for the transportation industry as well as designing and operating networks in the utilities and defense sectors.

Peter has also served as an advisor to the American Public Transit Association’s network security committee and led various Red Team efforts, including full mission profile penetration testing of transit authority trail control systems.

He is a renowned speaker and thought leader on issues of Internet security, system management, trustless systems, and privacy. He recently spoke to the US Secret Service about network and cyber security, as well as the resiliency of trustless systems like the internet of things.

Need help booking a speaker?

If you are interested in booking any of the speakers on this page or want some more suggestions, use the form below to contact an agent.

We have access to over 5000 experts and thought leaders, many of whom are not listed on this site.

Let one of our agents help you find the perfect speaker that fits your budget, needs, and date.

Speaker Request

Step 1 – Fill out the form below.

Step 2 – Our agent will respond within one business day.

Related speakers: