Dmitri Alperovitch: Co-founder of CrowdStrike, Alperovitch is recognized for intelligence on advanced threats, and his expertise has helped in the detection and mitigation of major cyber intrusions.

Mark Russinovich: The CTO of Microsoft Azure, Russinovich has made significant contributions to the Windows OS. He’s also authored several books and is known for his deep dives into Windows security issues.

Dr. Chase Cunningham: Often recognized from his times at Forrester , Dr. Cunningham provides deep insights into Zero Trust and implications for endpoint security. His works are foundational for adopting Zero Trust models.

Wendy Nather: As Head of Advisory CISOs at Duo Security (now Cisco), Nather’s focus has been democratizing security. Her work often revolves around how organizations can achieve robust endpoint security without substantial .

Lambert: Lambert, the General Manager of the Microsoft Threat Intelligence Center, is pivotal in highlighting the importance of and automated defenses in endpoint security.

Patrick Wardle: A macOS security , Wardle’s contributions to Apple’s security ecosystem are notable. His tools and research on macOS malware are indispensable resources for Apple endpoint security professionals.

Raj Samani: As Scientist at McAfee, Samani’s research has illuminated various threats in the endpoint domain. His insights into ransomware, cloud threats, and enterprise security are particularly profound.

Jamie Butler: With a career at Endgame, now Elastic, Butler is a go-to expert for advanced endpoint threat techniques. He’s renowned for his presentations on novel endpoint attack and strategies.

Paula Januszkiewicz: The founder of CQURE, Paula is an IT Security Auditor and Cloud and Datacenter Management MVP, with deep expertise in enterprise security, penetration testing, and endpoint protection.

Chris Wysopal: Co-founder and CTO of Veracode, Wysopal has been at the forefront of software and endpoint security. His experience dates back to his time with the influential hacker think tank, the L0pht.

Endpoint security, in today’s era of distributed work environments and burgeoning threat landscapes, has become paramount. The focus has shifted from just network security to ensuring every endpoint – be it a mobile device, laptop, or even IoT devices – is secure. These experts, with their vast knowledge, research, and hands-on experience, are pivotal in guiding best practices in this space. They continue to influence product design, security strategies, and practices essential for safeguarding organizational and individual assets. Following their insights and contributions ensures that you’re updated on the latest advancements, vulnerabilities, and best practices in endpoint security.

author avatar
Ian Khan
You are enjoying this content on Ian Khan's Blog. Ian Khan, AI Futurist and technology Expert, has been featured on CNN, Fox, BBC, Bloomberg, Forbes, Fast Company and many other global platforms. Ian is the author of the upcoming AI book "Quick Guide to Prompt Engineering," an explainer to how to get started with GenerativeAI Platforms, including ChatGPT and use them in your business. One of the most prominent Artificial Intelligence and emerging technology educators today, Ian, is on a mission of helping understand how to lead in the era of AI. Khan works with Top Tier organizations, associations, governments, think tanks and private and public sector entities to help with future leadership. Ian also created the Future Readiness Score, a KPI that is used to measure how future-ready your organization is. Subscribe to Ians Top Trends Newsletter Here