In an era where data breaches and cyber threats loom large, cloud security has become paramount for businesses of all sizes. Featured.com presents a curated directory of leading cloud security experts, bringing together seasoned cybersecurity professionals who specialize in safeguarding digital assets and creating secure cloud environments. These authorities have been featured in prominent tech publications, offering invaluable insights on data protection, compliance, and emerging threats. For publishers and journalists, our directory provides quick access to trusted voices in cloud security for authoritative quotes and in-depth analysis. For cloud security specialists, it's an unparalleled platform to showcase expertise and connect with top media outlets. Discover our roster of cloud security experts below and tap into a wealth of knowledge to fortify your content or enhance your organization's cloud strategy.
Connect directly with our network of vetted cloud security experts for interviews, quotes, or in-depth analysis.
Many experts respond within hours to media requests
All experts undergo background and credential verification
No fees to connect with experts for legitimate media requests
Join our network of professionals and connect with journalists and publishers looking for your expertise.
Showing 20 of 1,684 experts
Security Engineer at Turo
An experienced security professional helping security folks discover their best with HealthyByte. Previously built and led secure design functions at Insight, secured and protected thousands of websites per day at SiteLock alongside malware research at Sectigo, and currently building and scaling security for millions of rental cars at Turo. I’m curious and a lifetime learner across every field. Areas of Expertise & Interest: ‣ Enterprise/Corporate Security ‣ Infrastructure Security ‣ AWS Cloud Security ‣ Offensive Security (Red Teaming) ‣ Incident Detection and Response
Founder/CTO at getcybr, inc.
Cybersecurity expert with over a decade and a half of deep-dive experience, I bring an unparalleled level of understanding and expertise in strategic Cybersecurity planning, effective risk control, and pioneering product innovation. My career reflects my role as a reliable authority for organizations of all sizes, as well as an effective liaison with different regulatory bodies.
Featured In:
CISO at TrustNet
CEO of TrustNet, a leading provider of cybersecurity and assurance services serving some…
Featured In:
Senior Information Security Engineer at Scott Altiparmak
Scott Altiparmak is a Senior Information Security Engineer with 8+ years of experience spanning identity and access management, email security, and cloud security, with a focus on building and automating enterprise security programs end to end. He is the creator of Threat Terminal, a live game-based research platform studying how humans detect phishing in the generative AI era, and maintains open-source tools including Enterprise-Zapp and Threat Intelligence Tarot. He serves as Director of Programming for the South Florida ISSA chapter and speaks regularly at industry and academic events including Tech Hub Pulse 2026, PBSC CyberWeek, and the PBSC Cybersecurity Symposium.
Featured In:
CISO at Charles Edda and Charles Bouley
Charles Edda & Charles Bouley, Inc. (CECB) is a Texas-based cybersecurity company founded in 1999. The company specializes in managed security risk assessments, including vulnerability scanning, penetration testing, and security awareness training. Its primary clients include small businesses, medical practices, and law firms. The company is currently owned and operated by Dr. Rachel Levitch, who has expanded its services to provide advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. CECB's services follow industry-recognized cybersecurity frameworks such as the National Institute of Standards and Technology (NIST), ISO 27001, and CIS Controls to help organizations establish robust cybersecurity practices and culture.
Featured In:
Director of Solutions Engineering EMEA
For over 20 years, I've been on the front lines of cybersecurity, working with global organisations to help them answer critical questions like: "How effective are our security measures against a cyber attack?" My passion is empowering companies to identify and fortify their attack surface. I help leadership teams evaluate their security stack's effectiveness and build actionable roadmaps. Some of the topics I cover are Enterprise cybersecurity and strategy, culture and how it impacts cyber resilience. Emerging attacks and attacker innovation in ransomware and increasingly AI security risks. This passion for sharing actionable knowledge is why I also started writing my blog. It's my way of sharing ideas and providing insights for enterprise security defenders and educate the wider community. In my day-to-day role at Pentera, I lead a team of talented security engineers. We partner with leading organisations who are ready to embrace change. As a speaker and mentor, I enjoy challenging the norms, introducing disruptive technologies, and sharing best practices to raise the bar.
Featured In:
Cybersecurity specialist, researcher at centurialabs
Cybersecurity Expert | Cyberwarfare Strategist | Founder, Centuria Labs Research With over 25 years of specialized experience, Giovanni Battista Caria is a prominent figure in the European cybersecurity landscape. As the head of Centuria Labs Research, he has dedicated his career to advanced research in digital crime prevention and the development of impenetrable defensive architectures. His work bridges the gap between technical innovation and strategic analysis, making him a sought-after speaker at major international forums, including the International Security & Digital Council. Literary Contribution & Strategic Insight Caria’s extensive research has culminated in a series of influential works that address the evolving nature of digital threats from both a technical and legal perspective: The Black Book of Cybersecurity (Il Libro Nero della Cybersecurity): A deep dive into the structural flaws of modern digital infrastructure and the methodologies of high-level cyber attacks. The Invisible Front (Cybersecurity & Cyberwarfare): Co-authored as a comprehensive guide to the convergence of law, technology, and national security, this work serves as a manual for understanding state-sponsored digital conflict. The Architects of Shadow (PsyOps & Information Warfare): An analytical exploration of psychological operations and social engineering, detailing how digital influence can compromise national stability and institutional trust. Innovation in Defensive Systems Throughout his two-decade-long career, Caria has focused on creating innovative defensive frameworks designed to be mathematically and structurally resilient. His approach at Centuria Labs emphasizes proactive threat hunting and the implementation of security layers that go beyond traditional firewalls, focusing instead on system-level integrity and zero-trust principles. Strategic Vision A recognized expert in the legal and technical facets of the GDPR and cyber-law, Caria integrates regulatory compliance with hard-core technical defense. His philosophy is rooted in the belief that true cybersecurity requires a holistic understanding of the "invisible front"—the space where software engineering, international law, and geopolitical interests collide. "Cyber defense is not a static wall, but a dynamic architecture of constant anticipation and research." — Giovanni Battista Caria
Founder & CISO at IOmergent
My path to security leadership came through offensive security testing, software engineering, and product management. I've written code, designed and built security products, created and sold managed security services, and served as both GM and CISO for organizations ranging from early-stage startups to multi-billion-dollar enterprises. That background shapes how I approach security: I understand the trade-offs engineering teams face, I know what's actually feasible to implement and operate, and I prioritize controls that reduce real risk over ones that just satisfy auditors. I stay hands-on with cloud architecture, application security, AI, and emerging threats. At IOmergent, my co-founder Brett Wilson and I work with growing companies that need real security leadership but aren't ready for a full-time CISO. We provide fractional CISO (vCISO) services, managed cloud security, and practical assessments that tell you where you actually stand. Our focus is on building security into engineering culture and operations, as well as with executive teams. We work extensively with SaaS companies, healthcare and fintech organizations, and AI startups navigating their first enterprise customers, dealing with incidents or near misses, or trying to figure out what "good enough" security actually looks like for their stage. If you're a founder or technical leader looking to mature your security posture, preparing for your first compliance audit, or navigating an incident and need experienced support, I'm always happy to connect. And if you just want to talk through a security challenge with someone who's been there, reach out.
Featured In:
Senior Security Engineer at Microsoft
📌 Key Areas: Secure Software Engineering | Zero-Trust Security | Cloud & DevOps Security | AI for Cyber Defense | Research & Innovation | Cybersecurity Advocacy I am an award-winning Cybersecurity Professional and Software Engineer with about 10 years of experience building secure, resilient, and scalable systems that safeguard enterprises and critical infrastructures worldwide. At Microsoft, I have spearheaded high-impact security engineering initiatives across Azure, DevOps, and enterprise security driving innovations in zero-trust frameworks, system observability, automation, and AI-integrated security solutions. My contributions have fortified services relied upon by global customers while elevating industry standards in reliability, compliance, and risk management. Beyond corporate impact, I am deeply committed to advancing the cybersecurity community. As an advisor, trainer, and researcher, I actively contribute to academic publications, global workshops, and non-profit initiatives with multiple global organizations like CyberNGO, Mentors Without Borders, TCET, CHARUSAT, PARUL, MSU, Live2Serve and Many More, promoting cybersecurity awareness and training future leaders. Recognized with honors such as the Global Recognition Award 2025 and multiple CISO50 Innovation & Excellence Awards, my mission is to bridge research, engineering, and leadership to shape the future of digital trust and resilience.
Featured In:
Information Security Specialist
Shwetha Babu Prasad is a data security and privacy professional, speaker, and published author with nearly a decade of experience in information security. Her work focuses on advancing practical, engineering-driven approaches to protect sensitive data and reduce systemic data exposure risks. She has experience implementing data protection controls across enterprise systems to mitigate the risk of sensitive data exposure. She is the author of Why Websites Fail at Data Protection and Privacy and Data Security in the Age of AI. An active member of ISC2 and the Information Systems Security Association, she contributes to industry initiatives aligned with National Institute of Standards and Technology frameworks through the ISSA Resilience Special Interest Group. Her work advances practical, engineering driven data protection and privacy capabilities, strengthening cyber resilience across enterprise and critical infrastructure environments.
Featured In:
Endpoint & Identity Security Consultant at HCLTech America
Shyam Gajula is a Cybersecurity Professional specializing in Endpoint Security, Identity & Access Management (IAM), Zero Trust Architecture, and Cloud Security with 9+ years of experience securing enterprise and hybrid environments. He helps organizations strengthen security posture by implementing identity-centric architectures, continuous risk reduction frameworks, and compliance-focused controls across AWS, VDI, and distributed infrastructures. Shyam holds the AWS Certified Solutions Architect credential and has hands-on expertise in cloud security design, endpoint hardening, authentication frameworks (including SAML 2.0 / SSO), access governance, EDR/agent policy optimization, and secure cloud operations. His research and practical work focus on real-world defenses against modern threats, endpoint risk scoring, and identity-driven security automation. He is a published cybersecurity researcher, an international keynote speaker, and serves as a judge and evaluator for global cybersecurity awards and innovation competitions. Shyam frequently contributes to peer review panels and provides expert insights on best practices for Zero Trust adoption, cloud risk mitigation, and securing modern digital workplaces. Orcid Research Profile: https://orcid.org/0009-0001-4279-9629
Featured In:
Enterprise Chief Information Security Officer at The Anschutz Corporation
Strategically focused, self motivated, results driven security professional with over 20 years of email system and IT management experience including over 10 years of SaaS and network and security systems management. Driving force behind security improvements, ensuring compliance, and facilitating advancement toward organizational goals. Expert at leveraging existing resources to introduce an effective security posture and vision as well as cost conscious and highly effective solutions. Strong relationship builder across senior management, internal and external customers, and industry organizations. Excellent collaborator and forward thinker with a mind and vision focused on the big picture. Recognized industry leader who is frequently quoted in the media, authored or co-authored many whitepapers and published articles. Valued member of leadership teams and an ethical steward of highly confidential data. My ideal roles continually challenge me to think on my feet and give me the ability to continue my role as a visionary in a management capacity. I thrive in an environment with constant challenge. I take pride in identifying a need within any aspect of a company and coming up with a creative, cost-effective solution for filling that need.Specialties: Information Security, Email Security, Network Security, Security Best Practices, Software Quality Assurance, Software Development, Project Management, Product Management, Linux Systems Administration
Featured In:
Cybersecurity Director at ITRES
Co-Founder of SG6, ITRES and DEV6. Cybersecurity consultant with a deep technical background. More than 20 years of experience in the fields of IT Security, Cybersecurity, Security Research and IT Best Practices. Dozens of acredited CVE vulnerabilities since Y2K. I publish practical offensive/defensive research: vulnerability analysis, exploitation notes, reverse engineering, and hardening/detection takeaways.
Featured In:
Head of Security
Dr. Connie McIntosh is a cybersecurity executive, academic, mentor and international speaker. She currently serves as Head of Security at Ericsson. Dr. McIntosh integrates cybersecurity, information security, product security, operational security, and data privacy into business strategy, fostering psychological safety and cultural transformation in traditionally siloed environments. Her background is in National Security and Cyber Defense working in in key Cybersecurity Leadership roles across Defense and Government classified networks, Academia and private enterprise. Her leadership has earned her accolades such as being named among the Top 100 Women in Cybersecurity by US Cyber Defense Magazine and the Black Unicorn Award at Black Hat 2020. In 2025, she was awarded the prestigious Global Recognition Award for Leadership Excellence in cybersecurity underscoring her global recognition and influence along with 2025 Young Leader of the Year - The Fast Mode Awards 2025 recognizing exceptional individuals whose leadership, resilience, and technical depth continue to elevate the global telecom ecosystem. Connie's contributions to cybersecurity have been featured in influential books and magazines, including the groundbreaking Women4Cyber's own "Europe's Top Women in Security, Hacking Gender Barriers", along with "The Rise of Cyber Women Vol 3", "Shining the Spotlight - Stories for Business Success." and others.
Featured In:
CEO & Co-founder at Cyscale
I believe that safer cloud environments equal a safer world. We need to do something extraordinary to have a better, easier, more secure way of designing and deploying SaaS cloud apps and storing data in the cloud._________________________________About me: secure and innovate in Cloud Security.Security: ISO 27001, HIPAA, OWASP Top 10, SOC 2, Risk Assessments, Compliance;Cloud & Infra: AWS, Azure, Google Cloud, Kubernetes;Programming Languages: Go and a bit of Javascript;Databases: Graph DBs, MySQL, MongoDB;Operating Systems: Linux, Windows.
Principal Consultant and Founder at Bedrock Intelligence
A pragmatic leader with experience guiding, building, and scaling cybersecurity and privacy programs across sectors. I formerly led the Information Security program for Udemy an EdTech firm. Implemented company-wide cybersecurity and data privacy governance programs for payment organizations, Led service delivery strategy, audits and penetration testing engagements for Consulting organizations and help company stakeholders understand likely business threats and practical methods to minimize risk.
Featured In:
CEO & Cyber Security Consultant at HostBreach
Franco Velasquez is the CEO and founder of HostBreach, a cybersecurity advisory firm specializing in external cyber intelligence, attack surface analysis, and intelligence-driven advisory for defense contractors and regulated organizations. His work focuses on understanding how attackers identify, prioritize, and compromise targets using publicly available intelligence, often before traditional security controls detect activity. Franco advises organizations on CMMC readiness, CUI exposure, ransomware risk, and pre-incident threat visibility, helping leaders understand real-world risk beyond checklist compliance. He has experience working with OSINT-based reconnaissance, threat actor behavior analysis, and tabletop attack simulations aligned to observed intrusion patterns. He is frequently consulted on topics including ransomware trends, external exposure management, supply chain risk, and how attackers exploit misconfigurations and unpatched systems. Franco emphasizes practical, intelligence-led decision-making that helps organizations reduce risk before incidents occur.
Featured In:
Cloud Security Architect at Myriad360
Featured In:
CISO at fromCISO
CISO and advisor helping FinTechs turn DORA/NIS2/PSD2, PCI DSS, ISO 27001, and GDPR into practical resilience and business value. 20+ years across architecture, incident response, and program build-out. I prioritise KPIs, clear board communication, and continuous improvement, not checkbox compliance. Highlights: led DORA/NIS2 readiness for cross-border teams (faster audits; 30%+ lower regulatory risk), stood up vCISO/vDPO programs with cloud-native controls, vendor risk, and privacy automation. Community: OWASP Riga and Cloud Security Alliance Chapter Lead. Need to get regulator-ready? Let’s connect.
Featured In:
Chief Information Security Officer at Secureleap
Marcal Santos is a seasoned cybersecurity leader with over 20 years of experience protecting organizations' digital assets across the globe. Based in Porto, Portugal, he is the Founder and Virtual CISO of SecureLeap, where he empowers SMBs and growing companies to turn security challenges into competitive advantages that drive business growth. Throughout his distinguished career, Marcal has held senior security leadership positions at prominent companies including Aircall (Information Security Director), Talkdesk (Information Security Officer/Manager), and Citi (Business Information Security Officer), where he earned the prestigious Citi ISO of the Year award in 2015.
Featured In:
Showing 20 of 1684 experts
Featured.com streamlines the process of connecting publishers with cloud security experts through its user-friendly platform. Publishers can browse expert profiles, view their areas of expertise, and send requests for quotes or insights on specific topics. Experts receive notifications about relevant opportunities and can respond with their contributions. The platform's efficient communication system enables timely exchanges, ensuring that publishers can access expert knowledge for their articles, while experts can contribute their insights to high-quality publications in a structured, professional manner.
Featured.com offers access to a diverse range of cloud security experts, including cybersecurity analysts, cloud architects, compliance specialists, and data protection officers. These professionals possess in-depth knowledge of various cloud platforms (e.g., AWS, Azure, Google Cloud), security frameworks, and emerging threats in cloud environments. Publishers can find experts specializing in areas such as encryption, access management, threat detection, and regulatory compliance for cloud-based systems.
Publishers frequently seek expert insights on a wide range of cloud security topics. Common areas of interest include best practices for securing multi-cloud environments, strategies for ensuring compliance with regulations like GDPR or HIPAA in cloud settings, emerging threats in cloud computing, and innovative approaches to cloud-native security. Other popular topics include zero-trust architecture implementation, securing IoT devices in cloud ecosystems, and the impact of AI and machine learning on cloud security measures.
Cloud security experts can significantly enhance their professional visibility and credibility by joining Featured.com. The platform provides opportunities to be quoted in reputable publications, potentially leading to increased industry recognition and new business prospects. Experts can showcase their specialized knowledge in areas like cloud infrastructure protection, data privacy regulations, or emerging security technologies. This exposure can lead to speaking engagements, consulting opportunities, and establishment as thought leaders in the rapidly evolving field of cloud security.