{"id":1407,"date":"2019-07-28T05:46:57","date_gmt":"2019-07-28T05:46:57","guid":{"rendered":"https:\/\/britopian.com\/?p=1407"},"modified":"2023-01-22T07:03:38","modified_gmt":"2023-01-22T07:03:38","slug":"top-cybersecurity-influencers","status":"publish","type":"post","link":"https:\/\/www.britopian.com\/influencer-marketing\/top-cybersecurity-influencers\/","title":{"rendered":"Top CyberSecurity Influencers: Here\u2019s What my Experiment Revealed"},"content":{"rendered":"
<\/div>\n

Below is a quick analysis I did on the top cybersecurity influencers. But are they the top influencers?<\/p>\n\n\n\n

Ask any tech marketer how they measure influence, and you won’t get the same answer twice. This isn’t a bad thing. Influencer intelligence<\/a> should always be the first step, and there are many variables to influencer measurement. These data points can be weighted differently based on goals, objectives, the industry, and the audience you’re trying to reach.<\/span><\/p>\n\n\n\n

This is one reason why I’m not a fan of influencer lists. Whenever I present influencer data to clients, I always say, “these are 10 of the top security influencers,<\/em>” not<\/strong> “these are the top 10 security influencers.<\/em>” It sounds similar, but it’s not. Influencer measurement is subjective. <\/span><\/p>\n\n\n\n

Another reason I do this is because of granularity. For example, in my research, malware influencers differ from SecOps (DevSecOps, SIEM). So, categorizing influencers in the high-level topic of “security” isn’t as actionable. <\/span><\/p>\n\n\n\n

I say all this because I wanted to experiment. <\/span><\/p>\n\n\n\n

I Googled “top security influencers” and found several results of influencer lists. Most of them were from security software vendors (here<\/a>, here<\/a>, and here<\/a>), a B2B tech marketing agency, Marketing Envy, and one from Onalytica — an influencer identification and management platform.<\/span><\/p>\n\n\n\n

Of each list, one consistent security influencer made the top five – Brian Krebs, who owns\/operates Krebs on Security, and he appeared on 4 of the five lists. Bill Brenner appeared on two different lists. Here’s a quick breakdown of each list (only the top 5 noted): <\/span><\/p>\n\n\n\n

\n
\n