Dmitri Alperovitch: Co-founder of CrowdStrike, Alperovitch is recognized for his intelligence on advanced threats, and his expertise has helped in the detection and mitigation of major cyber intrusions.
Mark Russinovich: The CTO of Microsoft Azure, Russinovich has made significant contributions to the Windows OS. He’s also authored several books and is known for his deep dives into Windows security issues.
Dr. Chase Cunningham: Often recognized from his times at Forrester Research, Dr. Cunningham provides deep insights into Zero Trust and its implications for endpoint security. His works are foundational for organizations adopting Zero Trust models.
Wendy Nather: As Head of Advisory CISOs at Duo Security (now Cisco), Nather’s focus has been democratizing security. Her work often revolves around how organizations can achieve robust endpoint security without substantial investments.
John Lambert: Lambert, the General Manager of the Microsoft Threat Intelligence Center, is pivotal in highlighting the importance of machine learning and automated defenses in endpoint security.
Patrick Wardle: A macOS security expert, Wardle’s contributions to Apple’s security ecosystem are notable. His tools and research on macOS malware are indispensable resources for Apple endpoint security professionals.
Raj Samani: As Chief Scientist at McAfee, Samani’s research has illuminated various threats in the endpoint domain. His insights into ransomware, cloud threats, and enterprise security are particularly profound.
Jamie Butler: With a career at Endgame, now Elastic, Butler is a go-to expert for advanced endpoint threat techniques. He’s renowned for his presentations on novel endpoint attack and defense strategies.
Paula Januszkiewicz: The founder of CQURE, Paula is an IT Security Auditor and Cloud and Datacenter Management MVP, with deep expertise in enterprise security, penetration testing, and endpoint protection.
Chris Wysopal: Co-founder and CTO of Veracode, Wysopal has been at the forefront of software and endpoint security. His experience dates back to his time with the influential hacker think tank, the L0pht.
Endpoint security, in today’s era of distributed work environments and burgeoning threat landscapes, has become paramount. The focus has shifted from just network security to ensuring every endpoint – be it a mobile device, laptop, or even IoT devices – is secure. These experts, with their vast knowledge, research, and hands-on experience, are pivotal in guiding best practices in this space. They continue to influence product design, security strategies, and practices essential for safeguarding organizational and individual assets. Following their insights and contributions ensures that you’re updated on the latest advancements, vulnerabilities, and best practices in endpoint security.