Matthew Rosenquist Cybersecurity Expert

Matthew Rosenquist is an industry-recognized pragmatic, passionate, and innovative strategic security expert with 28 years of experience. He thrives in challenging cybersecurity environments and in the face of ever shifting threats. A leader in identifying opportunities, driving industry change, and building mature security organizations, Matthew delivers capabilities for sustainable security postures. He has experience in protecting billions of dollars of corporate assets, consulting across industry verticals, understanding current and emerging risks, communicating opportunities, forging internal cooperation and executive buy-in, and developing practical strategies. Matthew is a trusted advisor, security expert, and evangelist for academia, businesses, and governments around the world. A public advocate for best-practices, and communicating the risks and opportunities emerging in cybersecurity. He delivers engaging keynotes, speeches, interviews, and consulting sessions at conferences and to audiences around the globe. He has attracted a large social following of security peers, is an active member on advisory boards, and quoted in news, magazines, and books. Matthew is a recognized industry expert, speaker, and leader who enjoys the pursuit of achieving optimal cybersecurity. Matthew Rosenquist is experienced in building world class teams and capabilities, managing security operations, evangelizing best-practices to the market, developing security products, and improving corporate security services. 

 
Charges Against Russian State Hackers Sends a Message

Charges Against Russian State Hackers Sends a Message

The U.S. Department of Justice filed charges against six Russian agents, identified as members of the APT group known as Sandworm. 

Read More...
Cyber Threats Enhance Phishing with AI and Worm Functions for Rapid Disruption

Cyber Threats Enhance Phishing with AI and Worm Functions for Rapid Disruption

New phishing malware leverages artificial intelligence (AI) and worm functionality to rapidly spread to contacts of victims. 

Read More...
Apple T2 Chip Vulnerability Challenges the Industry

Apple T2 Chip Vulnerability Challenges the Industry

Recent verified reports highlight exploitable vulnerabilities in Apple’s security chip that cannot be patched.

Read More...
The IoT Cybersecurity Regulations Debate

The IoT Cybersecurity Regulations Debate

It simply makes no sense to call for IoT devices to be certified safe-and-secure. Before you get bent out of shape, hear me out. 

Read More...
Painful IoT Security Lessons Highlighted by a Digital Padlock

Painful IoT Security Lessons Highlighted by a Digital Padlock

The first warning sign was “hackproof” in the 360Lock marketing materials. 

Read More...

Share this article

Save
Cookies user prefences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Read more
Analytics
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics
Accept
Decline