Top 15+1 Identity Pros to Follow on LinkedIn

Top 15+1 Identity Pros to Follow on LinkedIn
Oasis Team

Oasis Team

Published on

July 30, 2024

Our curated list of experts features prominent professionals and leaders who provide a comprehensive perspective on the cybersecurity industry, with a particular focus on Identity Security and Access Management (IAM). By following these experts, IAM leaders can gain valuable insights into the latest developments and trends in identity security, understand hacker behavior, and explore future predictions. These global cybersecurity authorities, who have navigated complex security challenges, offer unique and practical perspectives that are invaluable for anyone involved in or interested in cybersecurity. Discover the top 15 cybersecurity experts we recommend following on LinkedIn.

Simon Moffatt

https://www.linkedin.com/in/simonmoffatt/

Simon Moffat brings over 20 years of expertise in cybersecurity, identity, and access management. As the founder and research analyst at The Cyber Hut, he provides independent analysis, advisory, and education globally. Simon co-hosts The Week in Identity podcast, where he explores the latest trends and innovations in the IAM space. An accomplished author and speaker, he has penned the industry’s first best-selling book on consumer identity and access management and contributes to standards at NIST and IETF. With a postgraduate diploma in information security and certifications including CISSP, CISA, CCSP, and CEH, Simon is also UK SC cleared until 2033 and has a strong interest in geopolitical cyber defense and operations.

Henrique Bernardes B Teixeira

https://www.linkedin.com/in/bernardes/

Henrique is dedicated to enhancing organizational and individual safety through expert advice, research, and leveraging the power of identity to improve security and user experiences. As the Senior Vice President for Strategy at Saviynt, a leading provider of cloud-first identity governance and privileged access management solutions, Henrique drives innovation to challenge conventional approaches and advance the field of identity and access management.

With over 25 years in the identity and cybersecurity sectors, Henrique’s experience spans roles at Gartner, IBM, Microsoft, Oracle, CA, and BMC Software. At Gartner, he served as a VP Analyst and chaired the Gartner IAM Summit in North America, where he influenced global IAM trends and best practices. He is known for coining the Cloud Infrastructure Entitlement Management (CIEM) acronym and co-authoring the Identity Threat Detection and Response (ITDR) framework. Henrique has authored pivotal research on IGA, CIEM, and CIAM, and was the lead author of the Magic Quadrant for Access Management.

Mark van der Horst

https://www.linkedin.com/in/mark-van-der-horst/

Mark is the Director of Digital Identity at PwC, where he leads organizations towards advanced and effective digital identity solutions. With a focus on supporting financial services clients in overcoming digital identity challenges, Mark also oversees Human Capital as Team Lead. His role involves driving sales, acquiring new business, and bringing cutting-edge IAM solutions to market.

Previously, Mark served as Principal Client Executive Identity and Advisor on the IAM Vision Board at PwC, where he was instrumental in guiding clients through digital transformations and developing strategic IAM propositions. He was part of the European Center of Excellence for IAM, advising on growth strategies and innovative business solutions.

Known for his honest, reliable approach and strong communication skills, Mark excels in connecting people, solving complex problems, and leading multidisciplinary teams. His passion for innovation and business development makes him a key figure in the digital identity space.

Graham Cluley

https://www.linkedin.com/in/grahamcluley

Graham is a researcher, blogger, public speaker and podcaster. He talks about computer security threats and works with law enforcement agencies on hacker and cyber gang investigations. Graham’s daily blog, grahamcluley.com, focuses mainly on cyber attacks and scams. Reports are bite-sized and include concise explanations coupled with tips for readers. Graham also hosts the Smashing Security podcast, together with Carole Theriault.

Martin Sandren

https://www.linkedin.com/in/martinsandren/

Martin Sandren is a security architect and product lead with over twenty years of experience of various information security related roles. Primarily focused on security architecture and digital identity including global scale customer, privileged and employee IAM systems using Microsoft Azure Active Directory, Sailpoint, saviynt, Forgerock, IBM and Oracle security stacks.

Experience includes architect, onshore and offshore team lead as well as individual developer. Wide international experience gained through having lived and worked in Sweden, Germany, UK, USA and the Netherlands. Martin is a frequent speaker at international conferences such as Consumer Identity World, MyData and European Identitiy and Cloud Conference.

In my role as IAM lead at Inter Ikea I am responsible for creating an IAM system that enables our coworkers to deliver a better everyday life for the many people as well as ensuring smooth delivery of meatballs and billys across the world.

Heiko Klarl

https://www.linkedin.com/in/heiko-klarl/

Dr. Heiko Klarl is the Chief Marketing and Sales Officer of iC Consult and a seasoned expert in Identity and Access Management (IAM) with over 18 years of experience. He has been serving in a top management position at iC Consult since 2012 and is responsible for coordinating iC Consult's worldwide sales, marketing, and talent acquisition efforts. He built these functions from scratch and has been a key player in the company's growth, including three M&A integrations and the re-launch of iC Consult Americas in 2021. 

Heiko seeks to bridge the gap between business and IT through holistic solutions, integrating customer strategy with technological implementation. He is passionate about understanding his customers' challenges and working with them to find the best-fit solution. 

He has studied Computer Science in Regensburg, Germany and holds a PhD with a dissertation titled “Access Control in Business Processes – A Model-Driven Approach.” He has extensive experience delivering successful IAM projects across industries, including automotive, banking, and logistics. Heiko is a regular speaker at conferences and known for his expertise in the field, having published research and articles focused on IAM.

Jesse Minor

https://www.linkedin.com/in/jesse-minor/

With over 15 years of experience in cybersecurity, Jesse is a seasoned leader known for his expertise in enhancing organizational security through strategic leadership and innovation. Holding certifications such as CISM, CIAM, CIGE, CIMP, and CIST, he excels in developing resilient teams and driving operational efficiencies. Jesse has a proven track record of defining and executing comprehensive security programs, including advanced solutions in Identity Security and Access Management. He has managed extensive IAM roadmaps with budgets up to $15 million, ensuring alignment with strategic goals and optimizing resource allocation. Additionally, Jesse has successfully led and developed teams across multiple time zones, conducted Proof of Concepts for a range of identity management solutions, and maintained clear communication with executive leadership. His focus remains on fostering a culture of continuous learning and enhancing organizational security and efficiency.

Paul Lanzi

https://www.linkedin.com/in/planzi/

Paul is a technology leader with a deep commitment to creating practical and user-centric solutions that address pressing business challenges. His journey began in 1994 when, as a junior high school student, he co-founded his rural county's first Internet Service Provider, gaining invaluable experience in technical support and user empathy. Over the decades, Paul has led IT projects and software development teams with a focus on delivering technology and process solutions that empower users.

In 2015, Paul co-founded Remediant, an information security startup aimed at helping enterprises manage privileged access—a critical area identified in 82% of security breaches according to the Verizon DBIR. His leadership is characterized by a detail-oriented, data-driven approach and a strong emphasis on building a supportive and growth-oriented team culture. Paul believes that effective leadership involves not just solving user problems but creating solutions that enhance their experience.

Beyond his professional endeavors, Paul is dedicated to giving back to the community. He leads a Technical Working Group in the Identity Defined Security Alliance and has collaborated with the NIST NCCoE on key projects related to privileged access management and property management systems. Paul also serves on the ATARC Technical Working Group for Identity Security and contributes to various organizations that support diversity in cybersecurity, including The Diana Initiative, PyLadies, Day of Shecurity, WoSec, and WISP. As a Board Advisor to the Cybersecurity Nonprofit, he is committed to advancing cybersecurity knowledge and diversity.

Andrew Wilder

https://www.linkedin.com/in/apwilder/

Andrew is a seasoned professional with over two decades of experience in Cybersecurity, Risk Management, and Organizational Design across industries such as Consumer Packaged Goods, Retail, and Financial Services. He has led strategic reorganizations globally, generating over $100 million in cost savings.

Andrew is recognized for his leadership in Cybersecurity Risk Quantification, ISO 27001 (ISMS), and Non-Human Identity (NHI) Management. He holds certifications including Certified Chief Information Security Officer (CCISO), Certified Information Security Manager (CISM), and CompTIA Security+.

His advocacy for NHI's role in modern identity frameworks has shaped industry standards, reflecting his commitment to innovation and operational excellence in cybersecurity.

Eve Maler

https://www.linkedin.com/in/evemaler/

Eve is a globally recognized pioneer in identity and access management and standards, with roots in semi-structured data modeling and the API economy and a passion for fostering successful ecosystems and individual empowerment. At Venn Factory she drives identity, security, and privacy success in the connected world by helping you develop irresistible identity strategies.

Eve's leadership on pivotal protocols such as XML, SAML, UMA, and HEART as well as industry efforts like UK Open Banking, US government health IT, and the medical Internet of Things demonstrate her unwavering commitment to innovation.

As CTO of ForgeRock, Eve oversaw emerging technology R&D, evangelism, and innovation culture, and empowered her team and cross-functional colleagues to deliver results to dozens of Global 5000 customers, partners, analysts, publications, and events. She previously served as a Forrester Research security and risk analyst covering IAM, strong authentication, and API security.

Magda Chelly

https://www.linkedin.com/in/m49d4ch3lly/

Dr. Magda Lilia Chelly is a cybersecurity leader, influencer and author who appears regularly in the media. She has authored three books and regularly leverages her public stance to promote social issues, like gender equality in the workplace or WLB. By following her, you’ll devour a  broad range of cybersecurity topics, from remote work requirements to risk management to cybersecurity trends. Most of her thoughts and content are strategic, and can help any leader looking to design or improve their organizational security.

Hayden Waisanen

https://www.linkedin.com/in/hayden-waisanen-9a27003a/

Hydan is an experienced software engineer with a robust background in identity and access management (IAM) and cloud computing. Currently serving as the Engineering Manager for IAM at Roblox, he oversees the development of innovative solutions in digital identity and access control. Before joining Roblox, Hydan was a Senior Software Engineer at Netflix, where he worked on IAM solutions to support their extensive streaming platform. His prior experience includes a role as a Software Development Engineer at Amazon Web Services (AWS), where he contributed to the rearchitecting of AWS Lambda's frontend data plane API service, addressing scalability challenges and improving deployment processes. Additionally, Hydan has worked as a Software Engineer at Amazon and IMVU, where he focused on product development and continuous deployment practices. His career is distinguished by a commitment to enhancing user experiences and building resilient, scalable systems.

Lance Peterman

https://www.linkedin.com/in/lancepeterman/

Lance Peterman leads the Identity & Access Management program at Dick's Sporting Goods. With more than 20 years of experience working in various sectors of the technology industry, Lance’s current focus has been in specialized areas of information security, including identity & access management, risk management, cybersecurity, cloud security, and mobility.

In addition to his 'day job', he is also an Adjunct Professor at the University of North Carolina at Charlotte, where he teaches Software Architecture & Design and various topics on information security. He is also an election judge in Mecklenburg County.

Steve Craig

https://www.linkedin.com/in/stevenbcraig/

Steve Craig is the Founder and CEO of PEAK IDV, where he is dedicated to empowering 10,000 individuals to become experts in digital identity. With over 20 years of experience in technology, Steve has developed a deep passion for identity verification (IDV) and artificial intelligence (AI). Over the past decade, he has held key roles in product development, strategy, and sales for leading IDV and AI solution providers, spearheading the creation of innovative software products across mobile and SaaS platforms. Steve has built web and native applications, SDKs, and APIs for some of the world’s largest brands.

As we stand at the cusp of significant technological and societal transformation, including advancements in AI, globalization, and demographic shifts, Steve emphasizes the importance of preserving our authentic selves in an increasingly digital world. He believes that embracing and driving change is crucial to adapting to the future.

Lalit Choda

https://www.linkedin.com/in/lalit-choda-5b924120/

Lalit is a leading expert in Non-Human Identity (NHI) management, specializing in addressing one of the most pressing challenges in cybersecurity and identity access management. With over 25 years of hands-on experience, Lalit focuses on the secure management of machine identities—an increasingly critical area as these non-human identities become the primary attack vector for both external and internal threats. 

As the founder of the highly-regarded Non-Human Identity Management Group and Portal, Lalit is a prominent advocate for advancing NHI practices. He has authored numerous influential white papers and articles on the subject and serves as an executive and board advisor on NHI matters. Lalit's expertise is instrumental in helping organizations understand the risks and challenges associated with NHIs and developing effective strategies to mitigate these threats.

Navigating the cybersecurity landscape can often feel like an endless game of Whack-A-Mole. The experts we've listed can assist in streamlining your strategic focus, identifying critical issues, and optimizing resource allocation. Are there additional experts who have helped you prioritize your efforts in this field? We invite you to share your recommendations with us in the comments.


Rohit Agnihotri

https://www.linkedin.com/in/rohit-agnihotri/

Rohit Agnihotri has over 15 years of deep-seated expertise in Identity and Access Management (IAM), cultivating a reputation as an authority in product development, consulting, thought leadership, and leading global IAM teams. His journey in IAM began as a developer, where he honed his skills in crafting robust identity solutions from the ground up. Progressing through roles of increasing responsibility and complexity, Rohit transitioned into a consulting capacity, assisting businesses in integrating and optimizing IAM systems tailored to their unique needs.

As a consultant and architect, Rohit demonstrated a knack for designing comprehensive IAM frameworks that not only enhance security but also drive operational efficiency. His visionary approach to IAM has been instrumental in aligning security protocols with business goals, fostering both protection and growth.

In recent years, stepping into an executive role, Rohit has been at the forefront of strategy and decision-making, ensuring that IAM initiatives are both innovative and in harmony with industry trends. His vast experience spanning multiple facets of IAM positions him as a sought-after expert, leading with a blend of hands-on technical prowess and high-level strategic insight. He is also the host of the Identity Navigator podcast.

More like this