- Reset + PDFPrint

"20 Cyber Policy Experts To Follow On Twitter", Forbes, 7 April 2014

07.04.2014

Richard Stiennon


The emerging field of cyber policy is attracting government, academic, and technology experts. Here is a list of cyber policy experts from around the world who are well worth following on Twitter. You can follow them individually or read their posts on this Twitter list we have created. Please tweet suggested additions to the list to @securitycurrent.

David Betz is Senior Lecturer of War Studies, King's College London and co-author of Cyberspace and the State with Tim Stevens. Follow @Betz451

Myriam Dunn Cavelty is a Lecturer, Master of Strategic Security Management for the Austrian Federal Security Academy. Follow @CyberMyri

Ron Deibert is the Director of the Citizen Lab, Munk School of Global Affairs, University of Toronto. He is the author of Black Code: Inside the Battle for Cyberspace. Follow @RonDeibert

Bill Hagestad (Red-DragonRising) is a consultant, speaker and expert on Chinese cyber warfare. He is author of 21st Century Chinese Cyberwarfare and Chinese Information Warfare Doctrine Development 1994–2014 among others. Lieutenant Colonel(ret) US Marine Corps. Follow @RedDragon1949

Jason Healey is the Director, Cyber Statecraft Initiative at the Atlantic Council. He is also editor behind A Fierce Domain: Conflict in Cyberspace 1986 to 2012. Follow @Jason_Healey

Toomas Hendrik Ilves is the president of Estonia. Follow his tweets at @IlvesToomas

James A. Lewis is the Director and Senior Fellow Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C. Follow @james_a_lewis

Sean Lawson is a professor in the Department of Communication at the University of Utah. He Tweets about cyberwar, ICTs & security, and military theory. Author: Nonlinear Science and Warfare: Chaos, complexity and the U.S. military in the information age. He is a Forbes contributor. Follow @seanlawson

Stefano Mele is an attorney in the Intelligence & Security Legal Department of Carnelutti Law Firm in Milan, Italy. He writes frequently on cyber policy issues. Follow @MeleStefano

Patrick C. Miller is an Advisor on Critical Infrastructure Security and Compliance. He is Managing Principal at The Anfield Group and Founder, Director and President Emeritus of EnergySec. Follow @PatrickCMiller

Lynette Nusbacher is an expert on horizon scanning and strategy. She was part of the team that created two of the UK's National Security Strategies and set up Britain's National Security Council. She is principal at Nusbacher Associates. Follow @Nusbacher

Dan Philpott is a solution architect at Natoma Technologies and curator of FISMApedia. Follow @danphilpott

Tom Quillin is the Director of Cyber Security Technology & Initiatives at Intel Corporation. Follow @tomquillin

Thomas Rid is Professor of Security Studies at King's College London and author of Cyberwar Will Not Take Place. Follow him @RidT

Rafal Rohozinski is CEO of SecDev Group and Senior Fellow at the International Institute for Strategic Studies. Follow @rohozinski

Adam Segal is the Maurice R. Greenberg Senior Fellow China Studies, at Council on Foreign Relations. He is the author of Advantage: How American Innovation Can Overcome the Asian Challenge. Follow @adschina

Peter W. Singer is the Director of the Center for 21st Century Security and Intelligence at the Brookings Institute. He is author of Wired for War and Cybersecurity and Cyberwar: What Everyone Needs to Know. Follow @peterwsinger

Tim Stevens is a Research Associate in the War Studies department at Kings College London. He is co-author of Cyberspace and the State with David Betz. Follow @tcstvns

Tiffany Strauchs Rad is Adjunct Professor University of Southern Maine and part of the Global Research & Analysis Team at Kaspersky Lab. Follow @TiffanyRad

Dave Weinstein is a Senior Cybersecurity Consultant for Deloitte. He was a Strategic Planner for US Cyber Command. Follow @djweinstein23

There are many more experts on cyber strategy, policy, and national security to follow. This list will be updated as oversights are brought to our attention.


This column first appeared at securitycurrent.com.


Original article on the Forbes webpage.