Matthew Rosenquist Cybersecurity Expert

Matthew Rosenquist is an industry-recognized pragmatic, passionate, and innovative strategic security expert with 28 years of experience. He thrives in challenging cybersecurity environments and in the face of ever shifting threats. A leader in identifying opportunities, driving industry change, and building mature security organizations, Matthew delivers capabilities for sustainable security postures. He has experience in protecting billions of dollars of corporate assets, consulting across industry verticals, understanding current and emerging risks, communicating opportunities, forging internal cooperation and executive buy-in, and developing practical strategies. Matthew is a trusted advisor, security expert, and evangelist for academia, businesses, and governments around the world. A public advocate for best-practices, and communicating the risks and opportunities emerging in cybersecurity. He delivers engaging keynotes, speeches, interviews, and consulting sessions at conferences and to audiences around the globe. He has attracted a large social following of security peers, is an active member on advisory boards, and quoted in news, magazines, and books. Matthew is a recognized industry expert, speaker, and leader who enjoys the pursuit of achieving optimal cybersecurity. Matthew Rosenquist is experienced in building world class teams and capabilities, managing security operations, evangelizing best-practices to the market, developing security products, and improving corporate security services. 

 
Why Marketing Cybersecurity on LinkedIn is Trending Up

Why Marketing Cybersecurity on LinkedIn is Trending Up

LinkedIn has become one of the most important tools for cybersecurity leaders to connect, discuss issues, find resources, and track trends. 

Read More...
Quantum Encryption Replacement Algorithm Hacked by AI

Quantum Encryption Replacement Algorithm Hacked by AI

Has the CRYSTALS-Kyber encryption algorithm, one of 4 quantum resistant methods that NIST has recommended to replace legacy encryption, fallen even before it has been rolled out? 

Read More...
The 10 Worst Cybersecurity Strategies You Need To Know

The 10 Worst Cybersecurity Strategies You Need To Know

Employees should be trained on basic cybersecurity practices and the dangers of phishing scams.

Read More...
Lessons from Uber’s Recent Breach

Lessons from Uber’s Recent Breach

Every cybersecurity breach is an opportunity to learn and adapt.

Read More...
3 Tips to Maximize Cybersecurity Value

3 Tips to Maximize Cybersecurity Value

Cybersecurity continues to be a major focus for organizations and business leaders.

Read More...

Share this article

Save
Cookies user prefences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Read more
Analytics
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics
Accept
Decline