Matthew Rosenquist
CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker, 190k followers
Folsom, California, United States
195K followers
500+ connections
About
I am a CISO, industry advisor, speaker, innovator, and advisory board member, passionate about making a tangible impact in the ever-evolving world of cybersecurity. As a pragmatic leader, I thrive in complex and fast-changing environments, collaborating with fellow thought-leaders to shape more effective, efficient, and sustainable cybersecurity strategies.
With contributions spanning multiple publications, patents, training programs, and certifications, I actively influence the cybersecurity community. Whether delivering keynotes, leading consulting sessions, or engaging in interviews, I bring insights that resonate with security professionals across various platforms. My large social following serves as a dynamic community where I share knowledge, collaborate, and tackle some of the industry's toughest challenges.
Specialties Include:
• Cybersecurity thought leadership, risk analysis, and innovation
• Board advisory and guidance for cybersecurity risk oversight
• Executive consulting and communications
• Identifying evolving cybersecurity threats and opportunities
• Security evangelism and promotion of best practices
• Strategic planning for robust cybersecurity programs
• Advising on organizational risk management
• Driving industry communication and leadership initiatives
Let’s collaborate to make cybersecurity a core enabler for organizational success, and a force for societal good.
Services
Courses by Matthew
-
Five Biggest Mistakes of Cybersecurity Programs1h 16m
Five Biggest Mistakes of Cybersecurity Programs
By: Matthew Rosenquist
Articles by Matthew
Contributions
Activity
-
🙌 I'm deeply honored and humbled to be named among Clutch's Top 25 B2B Tech Influencers for 2025, along side many amazing and accomplished friends…
🙌 I'm deeply honored and humbled to be named among Clutch's Top 25 B2B Tech Influencers for 2025, along side many amazing and accomplished friends…
Liked by Matthew Rosenquist
Experience
-
LinkedIn Learning Instructor
Freelance
-
Advisory Board Member
University of Phoenix, College of Business and Information Technology
-
Cybersecurity Strategist and Advisor
Independent
-
Advisory Board Member
HMG CISO Executive Leadership Summit Advisory Board
-
Advisory Board Member - Committee for the Master of Science in Information Security
Brandeis University
-
Advisory Board Member - Futurum Group’s CyberSphere CISO Advisory Board
The Futurum Group
-
Eclipz.io, Inc.
-
Chief Information Security Officer
Eclipz.io, Inc.
-
Advisory Board Member
Eclipz.io, Inc.
-
-
Advisory Board Member
Techno Security & Digital Forensics Conference
-
Advisory Board Member
Connected Security Expo Advisory Board
-
Intel Corporation
Licenses & Certifications
Skills
Publications
-
Cybersecurity Insurance is Missing the Risk
HelpNetSecurity.com
Cybersecurity insurance is a rapidly growing market, swelling from approximately $13B in 2022 to an estimated $84B in 2030 (26% CAGR), but insurers are struggling with quantifying the potential risks of offering this type of insurance.
-
Five Biggest Mistakes of Cybersecurity Programs
LinkedIn Learning
Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.
Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced…Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.
Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced leadership, deprioritized strategic thinking, failing to optimize for threats, insufficient organizational teamwork, and failing to maximize value. Matt brings a wealth of cybersecurity knowledge gleaned from over three decades of industry experience, showing you how to manage risk more effectively so you can avoid costly blunders. -
The Next Great Challenge For CISOs
Top Cyber News Magazine
Featured Article: The Next Great Challenge for CISOs
I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe. -
When Does Customer Cybersecurity Trump the Government’s Demands?
medium.com
Technology is taking center stage in a debate between national security and individual privacy. Governments are challenging encryption practices and requesting backdoors to products, to the concern of many companies and customers. The debate is heated and at risk are unintended consequences. Matthew Rosenquist, Intel’s cybersecurity strategist, provides insights and recommendations. He wants rational thoughts, facts, and for the global community to gain from a long term understanding of the…
Technology is taking center stage in a debate between national security and individual privacy. Governments are challenging encryption practices and requesting backdoors to products, to the concern of many companies and customers. The debate is heated and at risk are unintended consequences. Matthew Rosenquist, Intel’s cybersecurity strategist, provides insights and recommendations. He wants rational thoughts, facts, and for the global community to gain from a long term understanding of the challenges before decisions are made. Everyone wants security and privacy. The challenge is finding the optimal balance.
Other authors -
Defending Ourselves in an Increasingly Connected World
Motherboard
As we race to embrace technology, we make ourselves increasingly vulnerable to cyber attacks. This is a calculated risk we all take. But recently, the threat has evolved in ways both startling and inventive. Whereas a few years ago hackers had focused on crashing websites or harvesting data, a new type of attack—an “integrity” attack—quietly compromises the internal workings of companies or organizations, allowing criminals to pilfer exorbitant sums of money with minimal fuss. As these methods…
As we race to embrace technology, we make ourselves increasingly vulnerable to cyber attacks. This is a calculated risk we all take. But recently, the threat has evolved in ways both startling and inventive. Whereas a few years ago hackers had focused on crashing websites or harvesting data, a new type of attack—an “integrity” attack—quietly compromises the internal workings of companies or organizations, allowing criminals to pilfer exorbitant sums of money with minimal fuss. As these methods become more popular, our desperate need for trained cybersecurity professionals to combat them becomes more acute.
Motherboard spoke with Matthew Rosenquist, a cybersecurity strategist and Intel Evangelist with over 20 years of experience, about the evolving methods of attackers and what we can do to defend ourselves in this digitally intertwined world.Other authors -
A field guide to insider threat
Intel Corporation
Intel IT hopes enterprises can use our Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
-
Intel Security Group’s McAfee Labs Threats Report - August 2015
Intel Security Group's McAfee Labs
Cybersecurity Industry quarterly threat report and 5-year retrospective
-
Top 10 Cybersecurity Predictions for 2015 and Beyond
Intel Security
Cybersecurity is poised for a notorious year. The computer security industry had a tumultuous 2014, with significant breaches, compromises, and vulnerabilities permeating the news. Governments, businesses, and huge swaths of everyday people were affected. In the next twelve to eighteen months will see even greater, bolder, and more complex attacks emerge.
This year’s installment for the top computer security predictions highlights how the threats are advancing, outpacing defenders…Cybersecurity is poised for a notorious year. The computer security industry had a tumultuous 2014, with significant breaches, compromises, and vulnerabilities permeating the news. Governments, businesses, and huge swaths of everyday people were affected. In the next twelve to eighteen months will see even greater, bolder, and more complex attacks emerge.
This year’s installment for the top computer security predictions highlights how the threats are advancing, outpacing defenders, and the landscape is becoming more professional and organized. New targets will emerge and the expectations of security will rise. As the industry changes, there will be struggles, setbacks, victories, and surprises. Although the view of our cybersecurity future is obscured, one thing is for certain, it will be an exciting ride. -
Top 10 Security Predictions for 2013 and Beyond
As the chapter of 2012 has come to a close and the blank pages of 2013 open before us to be written, it is time once again to look into the future and predict what the next 12 months hold for the cyber and information security domain.
-
Improving Healthcare Risk Assessments to Maximize Security Budgets
Intel
Whitepaper: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through application of safeguards until the residual risks are below the acceptable level set by the organization. Risk assessments can be improved with attention to threat agents, for example internal Curious or Disgruntled Healthcare…
Whitepaper: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through application of safeguards until the residual risks are below the acceptable level set by the organization. Risk assessments can be improved with attention to threat agents, for example internal Curious or Disgruntled Healthcare Workers, or external Prescription Fraudsters. This guides budget allocation to highest priority risks, and avoids information privacy and security becoming a budgetary black hole.
Other authorsSee publication -
Prioritizing Information Security Risks with Threat Agent Risk Assessment
Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.
It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to…Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives which are reasonably attainable and could cause unsatisfactory losses to Intel.
It would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive methodology to prioritize specific areas of concern, we can both proactively target the most critical exposures and efficiently apply our resources for maximum results. The TARA methodology identifies which threat agents pose the greatest risk, what they want to accomplish, and the likely methods they will employ. These methods are cross-referenced with existing vulnerabilities and controls to pinpoint the areas that are most exposed. Our security strategy then focuses on these areas to minimize efforts while maximizing effect. -
Information Security Defense In Depth Whitepaper
Intel developed a defense-in-depth strategy to optimize information security using interlocking prediction, prevention, detection and response capabilities. It is a structure designed to support consistent and comprehensive security controls throughout the organization while allowing flexibility needed to manage risk.
It promotes continual improvement, maturity of security services, and adaptability to evolving threats. At Intel, proliferation of the defense in depth methodology has…Intel developed a defense-in-depth strategy to optimize information security using interlocking prediction, prevention, detection and response capabilities. It is a structure designed to support consistent and comprehensive security controls throughout the organization while allowing flexibility needed to manage risk.
It promotes continual improvement, maturity of security services, and adaptability to evolving threats. At Intel, proliferation of the defense in depth methodology has resulted in more efficient business decisions. The fundamental aspects allows for consolidation of support resources, helps highlight alternative methods for managing risk, aligns programs across environments, and keeps focus on achieving optimal security. -
Measuring the Return on IT Security Investments
Quantifying value for security programs is difficult at best. Intel IT developed a model for measuring Return on Security Investment (ROSI) in our manufacturing environments that produces a much higher level of accuracy than other methods currently available. Although not the silver bullet to measure all security programs, it does show in some circumstances, value can be quantified to the level needed to make sound business decisions.
Patents
-
Hardware-Generated Dynamic Identifier
Filed US US20170187525A1
In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing…
In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.
Other inventorsSee patent
Languages
-
English
Native or bilingual proficiency
Recommendations received
2 people have recommended Matthew
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Matthew Rosenquist in United States
-
Matthew Rosenquist, MBA
-
Matthew Rosenquist
--Diesel Mechanic
-
Matthew Rosenquist MBA
Project Manager at Entertainment Cruise Productions
-
Matthew Rosenquist
General Manager at Staples
10 others named Matthew Rosenquist in United States are on LinkedIn
See others named Matthew Rosenquist