Matthew Rosenquist

Matthew Rosenquist Matthew Rosenquist is an influencer

CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker, 190k followers

Folsom, California, United States
195K followers 500+ connections

About

I am a CISO, industry advisor, speaker, innovator, and advisory board member, passionate about making a tangible impact in the ever-evolving world of cybersecurity. As a pragmatic leader, I thrive in complex and fast-changing environments, collaborating with fellow thought-leaders to shape more effective, efficient, and sustainable cybersecurity strategies.

With contributions spanning multiple publications, patents, training programs, and certifications, I actively influence the cybersecurity community. Whether delivering keynotes, leading consulting sessions, or engaging in interviews, I bring insights that resonate with security professionals across various platforms. My large social following serves as a dynamic community where I share knowledge, collaborate, and tackle some of the industry's toughest challenges.

Specialties Include:
• Cybersecurity thought leadership, risk analysis, and innovation
• Board advisory and guidance for cybersecurity risk oversight
• Executive consulting and communications
• Identifying evolving cybersecurity threats and opportunities
• Security evangelism and promotion of best practices
• Strategic planning for robust cybersecurity programs
• Advising on organizational risk management
• Driving industry communication and leadership initiatives

Let’s collaborate to make cybersecurity a core enabler for organizational success, and a force for societal good.

Services

Courses by Matthew

Articles by Matthew

Contributions

Activity

Experience

  • Mercury Risk and Compliance, Inc. Graphic

    CISO and Cybersecurity Strategist

    Mercury Risk and Compliance, Inc.

    - Present 11 months

    California, United States

    CISO and Cybersecurity Strategist, leading the cyber risk management and showcasing how effective cybersecurity metrics empower informed decisions and greater overall value.

  • The Cyber Express By Cyble Graphic

    Editorial Advisory Board Member - The Cyber Express

    The Cyber Express By Cyble

    - Present 2 months

    • Collaborated with cybersecurity experts to deliver accurate and timely insights for the cyber defense community.
    • Empowered readers with relevant knowledge to combat evolving digital threats.
    • Contributed to the Editorial Advisory Board at The Cyber Express, a remote-based company.

  • The Cybersphere Group Graphic

    Advisory Board Member

    The Cybersphere Group

    - Present 2 months

  • Dominican University of California Graphic

    Advisory Board Member - Master of Science in Cybersecurity (MSC)

    Dominican University of California

    - Present 1 year 3 months

    The professionals of today must support the preparedness of the next-generation cybersecurity workforce. That is why I am thrilled to join the Master of Science in Cybersecurity (MSC) Advisory Board for Dominican University of California.

    This newly formed Advisory Board will help provide experience, guidance, and oversight for the program to benefit the students in their cybersecurity career journey!

  • LinkedIn Learning Instructor

    Freelance

    - Present 2 years 2 months

    In my new LinkedIn Learning class, I discuss the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature, and how to manage risk more effectively to avoid costly blunders.

  • United Cybersecurity Alliance Graphic

    Advisory Board Member

    United Cybersecurity Alliance

    - Present 3 years 7 months

    I am honored to join the United Cybersecurity Alliance advisory board. This organization is focused to improve the cybersecurity industry by driving and celebrating equity, inclusion, and equality for a diverse workforce that possesses the skills to protect organizations and communities from cyber-attacks.

    As a member of the distinguished Advisory Board, we are united to help realize a vision that will shape the future of cybersecurity opportunities and an inclusive workforce.

  • World Business Angels Investment Forum Graphic

    Advisory Board Member

    World Business Angels Investment Forum

    - Present 3 years 11 months

    Virtual

  • Private Directors Association® Graphic

    Advisory Board Member

    Private Directors Association®

    - Present 4 years 8 months

    I am very excited to join with esteemed cybersecurity colleagues on Private Directions Association’s (PDA) Cyber Security Initiative Strategic Council. Our charter is to drive timely and relevant communications to the board member community.

    https://www.privatedirectorsassociation.org/cyber-security-initiative-strategic-council

  • Advisory Board Member

    University of Phoenix, College of Business and Information Technology

    - Present 4 years 9 months

    Thrilled to announce that I am joining the Advisory Board for the University of Phoenix, College of Business and Information Technology! Academia plays a crucial role in fulfilling the staffing needs for the growing cybersecurity industry! We must all play a role to help prepare the next generation of professionals.

  • Cybersecurity Strategist and Advisor

    Independent

    - Present 5 years 8 months

    Sacramento, California Area

    Cybersecurity Strategist that actively advises global businesses, academia, and governments to identify emerging risks and opportunities. Formerly the Cybersecurity Strategist for Intel Corp. and benefiting from 30 years in the security field.

    Keynote Speaker, an evangelist for cybersecurity best-practices, member on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry. Top 10 Technology Voice in 2018 by LinkedIn, Top 10…

    Cybersecurity Strategist that actively advises global businesses, academia, and governments to identify emerging risks and opportunities. Formerly the Cybersecurity Strategist for Intel Corp. and benefiting from 30 years in the security field.

    Keynote Speaker, an evangelist for cybersecurity best-practices, member on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry. Top 10 Technology Voice in 2018 by LinkedIn, Top 10 Cybersecurity Thought Leader in 2019 by Thinkers360, and is heavily engaged with a very active following of over 190k professionals.

    Champions collaboration, partnerships, and communication across technology and cybersecurity organizations. Publishes blogs, evaluates technology and processes, authors opinion and whitepapers, and develops industry methodologies to improve security effectiveness and efficiencies. An active speaker and moderator at cybersecurity conferences, and evangelizes best practices across the digital ecosystem in the pursuit of optimal security.

  • Advisory Board Member

    HMG CISO Executive Leadership Summit Advisory Board

    - Present 8 years 5 months

    I am honored to join the esteemed list of colleagues on the HMG Strategy CISO Executive Leadership Summit Advisory Board. The charter of the board is to create organizational champions to secure the future enterprise. We work through the CISO Executive Leadership Summits and the development of joint industry recommendations.

    More information on the board can be found here: http://www.hmgstrategy.com/events/advisory-board.asp?eventID=132

  • Brandeis University Graphic

    Advisory Board Member - Committee for the Master of Science in Information Security

    Brandeis University

    - Present 9 years 7 months

    Members of the Graduate Professional Studies (GPS) Advisory Board are executives from leading companies that offer strategic guidance and expertise on the latest advances and demands in their industry.

    Members evaluate program goals and coursework to assess if graduates have the skills required of leading professionals in their respective industries.

    Members participate in committees relevant to their field and provide outreach and connections for program growth…

    Members of the Graduate Professional Studies (GPS) Advisory Board are executives from leading companies that offer strategic guidance and expertise on the latest advances and demands in their industry.

    Members evaluate program goals and coursework to assess if graduates have the skills required of leading professionals in their respective industries.

    Members participate in committees relevant to their field and provide outreach and connections for program growth.

    Advisory board members identify trends to align educational courses with emerging areas and new challenges within the industry.

  • Advisory Board Member - Futurum Group’s CyberSphere CISO Advisory Board

    The Futurum Group

    - 9 months

    Collaborating with amazingly talented peers to tackle the most pressing problems and provide cybersecurity insights on emerging threats and industry best practices.

  • Eclipz.io, Inc.

    Eclipz.io, Inc.

    4 years 8 months

    • Chief Information Security Officer

      Eclipz.io, Inc.

      - 4 years

      California, United States

      For over 30 years I have continually sought-out new professional challenges, been enticed at opportunities to overcome near-impossible obstacles, and have taken on new roles to further the cybersecurity industry.

      It is time for the next big move and contribution.

    • Advisory Board Member

      Eclipz.io, Inc.

      - 4 years 8 months

      Virtual

      It is my honor to join the Advisory Board of Eclipz; a cybersecurity innovator focused on securing data in transit, even on untrusted endpoints. Hardening digital communications from hackers and eavesdropping are crucial for security, privacy, and trust. It is time to make the connected world of data more secure.

  • EC-Council Graphic

    Advisory Board Member

    EC-Council

    - 2 years 8 months

    I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals. The advisory board collaborates to share best practices, emerging challenges, and opportunities for CISOs to better protect their organizations in alignment with overall business goals.

  • Advisory Board Member

    Techno Security & Digital Forensics Conference

    - 1 year 6 months

    Virtual

    I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries. I strongly believe professionals should contribute to the growth of the field by influencing, sharing knowledge, connecting others and pursuing beneficial ideas for greater impacts.

    Together, working as a team, we all…

    I am excited to announce I have accepted a position on the Techno Security & Digital Forensics Conference Advisory Board. I am honored to be part of this team to help drive education, awareness, training, and ethics across the digital forensics and cybersecurity industries. I strongly believe professionals should contribute to the growth of the field by influencing, sharing knowledge, connecting others and pursuing beneficial ideas for greater impacts.

    Together, working as a team, we all succeed.

  • Advisory Board Member

    Connected Security Expo Advisory Board

    - 3 years 1 month

    The Connected Security Expo is leading the education for the convergence between the physical and cyber security industries. This conference strives to bring top professionals from both fields together to explore the opportunities and challenges as these domains begin to overlap. The Advisory Board works to bring in the best speakers and content to this converged community.

    More information: http://www.connectedsecurityexpo.com/Education/Advisory-Board/

  • Intel Corporation

    Intel Corporation

    23 years

    • Intel Corporation Graphic

      Cybersecurity Strategist - Artificial Intelligence group

      Intel Corporation

      - 1 year 11 months

      Folsom, CA

      Responsible for developing, communicating, and championing corporate wide security initiatives to align cross-organizational efforts, optimize operations and processes, and support the delivery of secure Artificial Intelligence (AI) products to market. Explore and drive relevancy of AI security to internal groups and external industries. Research, analysis, and recommendations for emerging risks and opportunities. Advocate for best practices and thought-leadership across business…

      Responsible for developing, communicating, and championing corporate wide security initiatives to align cross-organizational efforts, optimize operations and processes, and support the delivery of secure Artificial Intelligence (AI) products to market. Explore and drive relevancy of AI security to internal groups and external industries. Research, analysis, and recommendations for emerging risks and opportunities. Advocate for best practices and thought-leadership across business, government, and academia. Confront difficult and ambiguous security problems for the greater protection of technology security, privacy, and safety. Communications and consulting at all levels, professional public speaking, trusted advocate to the industry, and expert of cybersecurity.

    • Intel Corporation Graphic

      Cybersecurity Strategist and Evangelist

      Intel Corporation

      - 3 years 10 months

      Folsom CA

      Responsible for developing, communicating, and championing corporate wide security initiatives to align cross-org efforts, optimize organizations and processes, promote the value of security architecture, platforms, products and services, and drive relevancy of security to internal groups and external markets. This includes industry research, sharing of best-known-methods, external consulting, analyzing threats and opportunities, and representing the company as a trusted advocate and expert of…

      Responsible for developing, communicating, and championing corporate wide security initiatives to align cross-org efforts, optimize organizations and processes, promote the value of security architecture, platforms, products and services, and drive relevancy of security to internal groups and external markets. This includes industry research, sharing of best-known-methods, external consulting, analyzing threats and opportunities, and representing the company as a trusted advocate and expert of cybersecurity.

    • Intel Corporation Graphic

      Cyber Security Strategist

      Intel Corporation

      - 1 year 9 months

      Responsible for developing, communicating, and championing corporate wide security initiatives to align cross-org efforts, optimize organizations and processes, promote the value of security products and services, and drive relevancy of security to internal groups and external markets.

    • Intel Corporation Graphic

      Security Strategic Planner

      Intel Corporation

      - 2 years 10 months

      Folsom CA

       Security strategic planning for the future of Intel Architecture(IA) based products across the global personal computer market
       Manage the security product playbook for Intel’s PC Client Group security features, protecting Intel’s brand, building Intel’s security reputation, and monetizing
       Develop strategies to make PC security relevant, effective, and sustainable to the global market

    • Intel Corp Graphic

      Information Security Strategist

      Intel Corp

      - 15 years

      Responsible for all information security aspects for corporate mergers, acquisitions, and divestitures
       Manage confidentiality, integrity, availability, as well as regulatory and security liability risks related to integration and separation of physical assets, intellectual property, and personnel investments
       Establish the strategy, policies, and operational procedures to insure information security continuity
       Develop and institute defensive postures against litigation and…

      Responsible for all information security aspects for corporate mergers, acquisitions, and divestitures
       Manage confidentiality, integrity, availability, as well as regulatory and security liability risks related to integration and separation of physical assets, intellectual property, and personnel investments
       Establish the strategy, policies, and operational procedures to insure information security continuity
       Develop and institute defensive postures against litigation and reasonable controls to assure regulatory compliance
       Negotiate acceptable risk strategies and mitigations across partner companies and organizations
       Insulate core business functions and intellectual property from the dangers of M&A integrations and divestiture carve-outs

Licenses & Certifications

Skills

Publications

  • Cybersecurity Insurance is Missing the Risk

    HelpNetSecurity.com

    Cybersecurity insurance is a rapidly growing market, swelling from approximately $13B in 2022 to an estimated $84B in 2030 (26% CAGR), but insurers are struggling with quantifying the potential risks of offering this type of insurance.

    See publication
  • Five Biggest Mistakes of Cybersecurity Programs

    LinkedIn Learning

    Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.

    Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced…

    Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.

    Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced leadership, deprioritized strategic thinking, failing to optimize for threats, insufficient organizational teamwork, and failing to maximize value. Matt brings a wealth of cybersecurity knowledge gleaned from over three decades of industry experience, showing you how to manage risk more effectively so you can avoid costly blunders.

    See publication
  • The Next Great Challenge For CISOs

    Top Cyber News Magazine

    Featured Article: The Next Great Challenge for CISOs

    I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe.

    See publication
  • When Does Customer Cybersecurity Trump the Government’s Demands?

    medium.com

    Technology is taking center stage in a debate between national security and individual privacy. Governments are challenging encryption practices and requesting backdoors to products, to the concern of many companies and customers. The debate is heated and at risk are unintended consequences. Matthew Rosenquist, Intel’s cybersecurity strategist, provides insights and recommendations. He wants rational thoughts, facts, and for the global community to gain from a long term understanding of the…

    Technology is taking center stage in a debate between national security and individual privacy. Governments are challenging encryption practices and requesting backdoors to products, to the concern of many companies and customers. The debate is heated and at risk are unintended consequences. Matthew Rosenquist, Intel’s cybersecurity strategist, provides insights and recommendations. He wants rational thoughts, facts, and for the global community to gain from a long term understanding of the challenges before decisions are made. Everyone wants security and privacy. The challenge is finding the optimal balance.

    Other authors
    • Simon Owens
    • Society of Information Management
    See publication
  • Defending Ourselves in an Increasingly Connected World

    Motherboard

    As we race to embrace technology, we make ourselves increasingly vulnerable to cyber attacks. This is a calculated risk we all take. But recently, the threat has evolved in ways both startling and inventive. Whereas a few years ago hackers had focused on crashing websites or harvesting data, a new type of attack—an “integrity” attack—quietly compromises the internal workings of companies or organizations, allowing criminals to pilfer exorbitant sums of money with minimal fuss. As these methods…

    As we race to embrace technology, we make ourselves increasingly vulnerable to cyber attacks. This is a calculated risk we all take. But recently, the threat has evolved in ways both startling and inventive. Whereas a few years ago hackers had focused on crashing websites or harvesting data, a new type of attack—an “integrity” attack—quietly compromises the internal workings of companies or organizations, allowing criminals to pilfer exorbitant sums of money with minimal fuss. As these methods become more popular, our desperate need for trained cybersecurity professionals to combat them becomes more acute.

    Motherboard spoke with Matthew Rosenquist, a cybersecurity strategist and Intel Evangelist with over 20 years of experience, about the evolving methods of attackers and what we can do to defend ourselves in this digitally intertwined world.

    Other authors
    • Joseph Neighbor
    See publication
  • A field guide to insider threat

    Intel Corporation

    Intel IT hopes enterprises can use our Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.

    See publication
  • Intel Security Group’s McAfee Labs Threats Report - August 2015

    Intel Security Group's McAfee Labs

    Cybersecurity Industry quarterly threat report and 5-year retrospective

    See publication
  • Top 10 Cybersecurity Predictions for 2015 and Beyond

    Intel Security

    Cybersecurity is poised for a notorious year. The computer security industry had a tumultuous 2014, with significant breaches, compromises, and vulnerabilities permeating the news. Governments, businesses, and huge swaths of everyday people were affected. In the next twelve to eighteen months will see even greater, bolder, and more complex attacks emerge.

    This year’s installment for the top computer security predictions highlights how the threats are advancing, outpacing defenders…

    Cybersecurity is poised for a notorious year. The computer security industry had a tumultuous 2014, with significant breaches, compromises, and vulnerabilities permeating the news. Governments, businesses, and huge swaths of everyday people were affected. In the next twelve to eighteen months will see even greater, bolder, and more complex attacks emerge.

    This year’s installment for the top computer security predictions highlights how the threats are advancing, outpacing defenders, and the landscape is becoming more professional and organized. New targets will emerge and the expectations of security will rise. As the industry changes, there will be struggles, setbacks, victories, and surprises. Although the view of our cybersecurity future is obscured, one thing is for certain, it will be an exciting ride.

    See publication
  • Top 10 Security Predictions for 2013 and Beyond

    As the chapter of 2012 has come to a close and the blank pages of 2013 open before us to be written, it is time once again to look into the future and predict what the next 12 months hold for the cyber and information security domain.

    See publication
  • Improving Healthcare Risk Assessments to Maximize Security Budgets

    Intel

    Whitepaper: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through application of safeguards until the residual risks are below the acceptable level set by the organization. Risk assessments can be improved with attention to threat agents, for example internal Curious or Disgruntled Healthcare…

    Whitepaper: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through application of safeguards until the residual risks are below the acceptable level set by the organization. Risk assessments can be improved with attention to threat agents, for example internal Curious or Disgruntled Healthcare Workers, or external Prescription Fraudsters. This guides budget allocation to highest priority risks, and avoids information privacy and security becoming a budgetary black hole.

    Other authors
    See publication
  • Prioritizing Information Security Risks with Threat Agent Risk Assessment

    Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.

    It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to…

    Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.

    It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to prioritize specific areas of concern, we can both proactively target the most critical exposures and efficiently apply our resources for maximum results. The TARA methodology identifies which threat agents pose the greatest risk, what they want to accomplish, and the likely methods they will employ. These methods are cross-referenced with existing vulnerabilities and controls to pinpoint the areas that are most exposed. Our security strategy then focuses on these areas to minimize efforts while maximizing effect.

    See publication
  • Information Security Defense In Depth Whitepaper

    Intel developed a defense-in-depth strategy to optimize information security using interlocking prediction, prevention, detection and response capabilities. It is a structure designed to support consistent and comprehensive security controls throughout the organization while allowing flexibility needed to manage risk.

    It promotes continual improvement, maturity of security services, and adaptability to evolving threats. At Intel, proliferation of the defense in depth methodology has…

    Intel developed a defense-in-depth strategy to optimize information security using interlocking prediction, prevention, detection and response capabilities. It is a structure designed to support consistent and comprehensive security controls throughout the organization while allowing flexibility needed to manage risk.

    It promotes continual improvement, maturity of security services, and adaptability to evolving threats. At Intel, proliferation of the defense in depth methodology has resulted in more efficient business decisions. The fundamental aspects allows for consolidation of support resources, helps highlight alternative methods for managing risk, aligns programs across environments, and keeps focus on achieving optimal security.

    See publication
  • Measuring the Return on IT Security Investments

    Quantifying value for security programs is difficult at best. Intel IT developed a model for measuring Return on Security Investment (ROSI) in our manufacturing environments that produces a much higher level of accuracy than other methods currently available. Although not the silver bullet to measure all security programs, it does show in some circumstances, value can be quantified to the level needed to make sound business decisions.

    See publication

Patents

  • Hardware-Generated Dynamic Identifier

    Filed US US20170187525A1

    In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing…

    In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.

    Other inventors
    See patent

Languages

  • English

    Native or bilingual proficiency

Recommendations received

View Matthew’s full profile

  • See who you know in common
  • Get introduced
  • Contact Matthew directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Matthew Rosenquist in United States

Add new skills with these courses