#CISO, Twitter, 5/28/2019 8:08:21 AM, 198269


FAQ | Problem?

#CISO_2019-05-28_00-36-51.xlsx
#CISO_2019-05-28_00-36-51.xlsx
From:
Connected Action NodeXL-Reports
Uploaded on:
May 28, 2019
Short Description:
#CISO via NodeXL http://bit.ly/2W9SxEl
@strike_ready
@sectest9
@cybersec_feeds
@corix_jc
@cybersecuritysf
@tekzilla_it
@stephanenappo
@aneeshnair
@kipboyle
@itds_itdm

Top hashtags:
#ciso
#cybersecurity
#infosec
#security
#cio
#dataprotection
#gdpr
#dataprivacy

Description:
Description
The graph represents a network of 1,587 Twitter users whose recent tweets contained "#CISO", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Tuesday, 28 May 2019 at 07:49 UTC.

The tweets in the network were tweeted over the 9-day, 16-hour, 46-minute period from Saturday, 18 May 2019 at 14:51 UTC to Tuesday, 28 May 2019 at 07:38 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 1587
Unique Edges : 2449
Edges With Duplicates : 2625
Total Edges : 5074
Self-Loops : 992
Reciprocated Vertex Pair Ratio : 0.0349146110056926
Reciprocated Edge Ratio : 0.0674734140080675
Connected Components : 184
Single-Vertex Connected Components : 120
Maximum Vertices in a Connected Component : 1281
Maximum Edges in a Connected Component : 4715
Maximum Geodesic Distance (Diameter) : 12
Average Geodesic Distance : 4.404777
Graph Density : 0.00108344040601006
Modularity : 0.44778
NodeXL Version : 1.0.1.412

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[44] https://www.peerlyst.com/posts/peertalk-tm-what-should-c-suite-know-about-soar-solutions-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[37] https://mailchi.mp/ff99e6627c81/rluq4elg61
[26] https://www.helpnetsecurity.com/2019/04/18/secure-vanishing-perimeter/
[24] https://www.cnbc.com/2019/05/17/google-gmail-tracks-purchase-history-how-to-delete-it.html?twitter=@aneeshnair
[23] https://ciowatercooler.co.uk/three-factors-marginalising-the-historical-role-of-the-ciso/?sp_url=6flr
[22] https://www.csoonline.com/article/3397044/over-90-of-data-transactions-on-iot-devices-are-unencrypted.html?twitter=@aneeshnair
[21] https://www.teckedin.com/
[20] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[18] https://www.peerlyst.com/posts/devsecops-one-ciso-s-journey-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[16] https://www.peerlyst.com/posts/get-to-know-some-cisos-kimberly-crawley?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

Top URLs in Tweet in G1:
[37] https://mailchi.mp/ff99e6627c81/rluq4elg61
[22] https://ciowatercooler.co.uk/three-factors-marginalising-the-historical-role-of-the-ciso/?sp_url=6flr
[21] https://www.helpnetsecurity.com/2019/04/18/secure-vanishing-perimeter/
[20] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[14] http://www.darkreading.com/attacks-breaches/under-attack-over-half-of-smbs-breached-last-year/a/d-id/1334239
[13] https://www.technative.io/getting-more-women-into-cyber-roles/
[13] https://medium.com/security-transformation-leadership
[12] https://www.bankinfosecurity.com/after-2-years-wannacry-remains-threat-a-12496#.XOJA5eh2olY.twitter
[12] https://www.techrepublic.com/article/cheat-sheet-how-to-become-a-cybersecurity-pro/
[12] https://hbr.org/2019/03/the-marriott-breach-shows-just-how-inadequate-cyber-risk-disclosures-are

Top URLs in Tweet in G2:
[7] https://www.youtube.com/watch?v=MPl9imJ43uI&list=PLno7KA4c7u-5ZApSE40zIkQD6iHWYnYaU&index=19&t=0s&utm_source=You-Tube&utm_medium=CISO-Talks&utm_campaign=10-1

[6] http://www.ttcgroupe.com/la-promesse-et-le-peril-de-la-5g/
[5] https://www.avanade.com/en/blogs/avanade-insights/security/simplify-your-security-landscape
[4] https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/1963786/2019CISOBenchmarkReportCiscoCybersecuritySeries.pdf?ccid=cc000160&dtid=esootr000875&ecid=14396&oid=wprsc015512
[3] https://techhq.com/2019/05/just-eat-ciso-how-to-earn-respect-in-cybersecurity/
[3] https://lnkd.in/ecH6F34
[3] https://lnkd.in/gF6z_wf
[2] https://www.ibm.com/security/ciso
[2] https://twitter.com/CyberSecurityES/status/1114145209728872449
[2] https://en.itpedia.nl/2019/05/20/saas-beveiliging-en-de-rol-van-de-ciso/

Top URLs in Tweet in G3:
[3] http://ier.catsone.com/careers/index.php?m=portal&a=details&jobOrderID=12008362
[3] https://www.exevi.com/soluciones/soporte-y-asesoramiento-ciso/
[3] https://www.darkreading.com/attacks-breaches/moodys-downgrade-of-equifax-a-wake-up-call-to-boards/d/d-id/1334800
[2] https://securityintelligence.com/making-the-business-case-for-managed-iam-solutions/?cm_mmc=OSocial_Twitter-_-Security_Optimize+the+Security+Program-_-WW_WW-_-IAM&cm_mmca1=000000NJ&cm_mmca2=10000252&linkId=67854676
[2] https://www.savannah-group.com/why-cybersecurity-is-where-talented-individuals-are-building-their-careers/
[2] https://www.itpro.co.uk/security/33697/security-researcher-auctions-off-windows-10-zero-day-exploits
[2] https://www.itpro.co.uk/security/33670/hackers-steal-data-from-113000-other-hackers
[2] https://lnkd.in/fi3Pbsm
[2] https://www.itpro.co.uk/data-breaches/33701/fresh-talktalk-customer-data-found-publicly-available-online
[2] https://www.computerweekly.com/opinion/Why-cyber-security-needs-to-be-prioritised-at-board-level

Top URLs in Tweet in G4:
[5] https://www.bleepingcomputer.com/news/security/android-users-being-spammed-using-fake-missed-call-alerts/?utm_source=[Seguridad]+Vigilancia+Digital&utm_campaign=4270ef643f-EMAIL_CAMPAIGN_2019_05_24_04_59&utm_medium=email&utm_term=0_05ce9d4432-4270ef643f-81508177
[5] https://unaaldia.hispasec.com/2019/05/filtrados-datos-de-45m-de-visitantes-de-la-web-de-la-alhambra.html
[3] https://blog.24by7security.com/5-ways-cybersecurity-can-actually-improve-your-bottom-line?utm_campaign=Nist%20guide&utm_content=92286167&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725
[3] https://www.ciol.com/integrate-essential-cloud-visibility-security-strategy/
[3] https://www.egnyte.com/blog/2019/05/5-advantages-of-deploying-a-data-governance-solution/
[3] https://www.f5.com/labs/articles/cisotociso/4-areas-where-infosec-facts-and-fiction-clash--mind-the-gap-pt-3?sf213068777=1
[3] https://www.risklens.com/blog
[3] https://securityboulevard.com/2019/05/why-cisos-need-a-mentor-and-what-they-can-learn-from-one/?sf212673193=1
[2] http://www.cyberdefensemagazine.com/data-security-in-the-digital-era/?utm_content=92286568&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725
[2] https://securityboulevard.com/2019/05/6-ways-poor-cybersecurity-hurts-businesses/?utm_content=92228615&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725

Top URLs in Tweet in G5:
[4] https://soundcloud.com/itspmagazine/jason-fruge-ciso-from-fossil-chats-on-the-road-to-rsac-2019?utm_source=soundcloud&utm_campaign=share&utm_medium=twitter
[4] https://www.darkreading.com/attacks-breaches/moodys-downgrade-of-equifax-a-wake-up-call-to-boards/d/d-id/1334800
[4] https://www.youtube.com/watch?v=jZKJkufhwFM

[4] https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2019/fortinet-to-provide-strategic-cyber-insight-to-global-leaders.html
[3] https://www.zdnet.com/google-amp/article/the-security-snapshot-were-in-the-endgame-now/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A%2BTrending%2BContent&utm_content=5ceae2492866ef00011c91b0&utm_medium=trueAnthem&utm_source=twitter&__twitter_impression=true
[2] https://www.youtube.com/watch?v=PLHVVCQNBPo&feature=youtu.be

[2] https://cybersecurityventures.com/blackstone-ciso-on-coffee-technology-and-the-future-of-cybersecurity/
[2] https://www.youtube.com/watch?v=o4OELt286kY&feature=youtu.be

[2] https://twitter.com/rsasecurity/status/1132025476346724353
[2] https://cybersecurityventures.com/ask-the-ciso-podcast-video-interviews/

Top URLs in Tweet in G6:
[44] https://www.peerlyst.com/posts/peertalk-tm-what-should-c-suite-know-about-soar-solutions-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[18] https://www.peerlyst.com/posts/devsecops-one-ciso-s-journey-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[16] https://www.peerlyst.com/posts/get-to-know-some-cisos-kimberly-crawley?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[12] https://www.peerlyst.com/posts/peerlyst-weekly-roundup-may-11th-may-17th-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[10] https://www.peerlyst.com/posts/securing-your-database-101-michael-ball?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[9] https://www.peerlyst.com/posts/roll-back-time-when-users-click-on-a-bad-link-with-our-new-free-tool-second-chance-knowbe4?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/how-to-engage-with-the-c-suite-on-cyber-risk-management-part-3-christopher-j-hodson-m-inst-isp-cissp?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/how-to-engage-with-the-c-suite-on-cyber-risk-management-part-one-christopher-j-hodson-m-inst-isp-cissp?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/windows-dde-registry-tweaks-roger-barnett?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[7] https://www.peerlyst.com/posts/how-to-engage-with-the-c-suite-on-cyber-risk-management-part-2-christopher-j-hodson-m-inst-isp-cissp?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

Top URLs in Tweet in G7:
[15] https://www.teckedin.com/
[7] https://www.security-innovation.org/events/new-york/
[3] https://www.security-innovation.org/events/new-york/speakers/
[3] https://www.scmagazine.com/malware-author-anarchy-builds-18000-strong-huawei-router-botnet/article/782395/
[2] https://www.studynotesandtheory.com/single-post/Stories-of-a-CISSP-TCP-Handshake
[2] https://www.studynotesandtheory.com/single-post/How-Feroze-Cracked-His-CISSP-Exam
[1] https://www.teckedin.com/login_try.html
[1] https://www.studynotesandtheory.com/signup
[1] https://www.studynotesandtheory.com/telegramgroup
[1] https://www.studynotesandtheory.com/single-post/How-Michelle-Cracked-Her-CISSP-Exam

Top URLs in Tweet in G8:
[5] https://www.zdnet.com/article/the-security-ramifications-of-serverless-computing/?ftag=TRE624278d&bhid=27801984672562340771491569297699
[1] https://screamingbox.com/
[1] https://www.gartner.com/en
[1] https://www.cnbc.com/2019/05/01/microsoft-ciso-bret-arsenault-wants-to-eliminate-passwords.html
[1] https://www.gartner.com/smarterwithgartner/cio-agenda-2019-take-a-hard-and-soft-approach-to-cybersecurity/?source=BLD-200123&utm_medium=social&utm_source=bambu&utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-SWG

Top URLs in Tweet in G9:
[1] https://cybersecurityventures.com/ciso-minute-podcast-for-chief-information-security-officers/
[1] https://mashable.com/article/gmail-new-device-sign-in-bug/
[1] https://www.vice.com/en_us/article/xwnva7/snapchat-employees-abused-data-access-spy-on-users-snaplion

Top URLs in Tweet in G10:
[1] https://bs.serving-sys.com/Serving/adServer.bs?cn=trd&pli=1074752913&adid=1078606567&ord=[timestamp]
[1] https://bs.serving-sys.com/Serving/adServer.bs?cn=trd&pli=1074736878&adid=1078566087&ord=[timestamp]
[1] https://twitter.com/ibm_in/status/1130669543615918080
[1] https://twitter.com/ibm_in/status/1130726914862092288

Top Domains
Top Domains in Tweet in Entire Graph:
[239] peerlyst.com
[117] twitter.com
[98] helpnetsecurity.com
[91] jdsupra.com
[82] scoop.it
[79] lnkd.in
[66] co.uk
[63] csoonline.com
[49] darkreading.com
[49] aravo.com

Top Domains in Tweet in G1:
[90] jdsupra.com
[80] scoop.it
[54] helpnetsecurity.com
[52] co.uk
[43] bankinfosecurity.com
[43] aravo.com
[37] mailchi.mp
[33] twitter.com
[32] darkreading.com
[31] csoonline.com

Top Domains in Tweet in G2:
[17] lnkd.in
[12] twitter.com
[12] dy.si
[9] youtube.com
[7] avanade.com
[6] ttcgroupe.com
[5] aravo.com
[4] cisco.com
[4] forbes.com
[4] thesecuritycompany.com

Top Domains in Tweet in G3:
[22] lnkd.in
[17] dy.si
[8] co.uk
[6] twitter.com
[5] darkreading.com
[4] thecisocollective.com
[3] catsone.com
[3] forbes.com
[3] okt.to
[3] securityintelligence.com

Top Domains in Tweet in G4:
[11] 24by7security.com
[11] csoonline.com
[10] cyberdefensemagazine.com
[9] bit.ly
[9] f5.com
[8] risklens.com
[6] darkreading.com
[6] medium.com
[5] securityboulevard.com
[5] egnyte.com

Top Domains in Tweet in G5:
[8] youtube.com
[7] cybersecurityventures.com
[4] twitter.com
[4] soundcloud.com
[4] darkreading.com
[4] fortinet.com
[3] zdnet.com
[3] lnkd.in
[1] okt.to
[1] triangleinfosecon.com

Top Domains in Tweet in G6:
[235] peerlyst.com
[2] lnkd.in
[2] scoop.it
[1] twitter.com
[1] infosys.com
[1] eventbrite.com

Top Domains in Tweet in G7:
[16] teckedin.com
[11] studynotesandtheory.com
[10] security-innovation.org
[3] scmagazine.com
[2] hmgstrategy.com
[1] jdsupra.com
[1] wired.com
[1] tag-cyber.com
[1] linkedin.com
[1] fiercehealthcare.com

Top Domains in Tweet in G8:
[5] zdnet.com
[2] gartner.com
[1] screamingbox.com
[1] cnbc.com

Top Domains in Tweet in G9:
[1] cybersecurityventures.com
[1] mashable.com
[1] vice.com

Top Domains in Tweet in G10:
[2] serving-sys.com
[2] twitter.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2293] ciso
[1519] cybersecurity
[944] infosec
[737] security
[704] cio
[441] dataprotection
[341] gdpr
[244] dataprivacy
[212] technology
[188] cto



Top Hashtags in Tweet in G1:
[954] cybersecurity
[824] ciso
[517] security
[515] infosec
[408] cio
[374] dataprotection
[257] gdpr
[206] dataprivacy
[178] technology
[151] leadership

Top Hashtags in Tweet in G2:
[245] ciso
[94] cybersecurity
[75] infosec
[36] cio
[31] gdpr
[27] security
[18] privacy
[17] cso
[16] cisco
[15] seguridad

Top Hashtags in Tweet in G3:
[161] ciso
[58] cybersecurity
[34] cio
[27] security
[21] infosec
[10] risk
[10] gdpr
[8] cto
[8] compliance
[7] cso

Top Hashtags in Tweet in G4:
[136] ciso
[78] infosec
[58] cio
[43] datasecurity
[40] dataprotection
[39] cybersecurity
[39] cdo
[38] business
[36] security
[16] fair

Top Hashtags in Tweet in G5:
[62] ciso
[16] cybersecurity
[12] asktheciso
[10] icymi
[10] fortinet
[6] digitalrisk
[6] hhs
[6] healthcare
[4] infosec
[4] rsac2019

Top Hashtags in Tweet in G6:
[271] ciso
[89] infosec
[56] soar
[49] cybersecurity
[39] career
[28] blueteam
[21] soc
[18] devsecops
[12] knowledgesharing
[12] careeradvice

Top Hashtags in Tweet in G7:
[51] ciso
[38] cybersecurity
[21] ai
[18] cio
[17] security
[17] technews
[15] technology
[15] edtech
[14] infosec
[14] govtech

Top Hashtags in Tweet in G8:
[26] cybersecurity
[24] infosec
[20] ciso
[17] malware
[14] security
[13] itsecurity
[13] cyberattacks
[10] infographic
[8] hack
[7] hacker

Top Hashtags in Tweet in G9:
[41] cybersecurity
[35] data
[32] monaco
[32] cloud
[16] cloudcomputing
[9] ciso
[4] sundaythoughts
[4] privacy
[3] rfit2019
[3] cio

Top Hashtags in Tweet in G10:
[39] ciso
[17] mumbai
[16] ibmsecuritysummit
[14] it
[13] security
[4] cto
[3] cybersecurity
[2] securityleaders
[1] experts
[1] data

Top Words
Top Words in Tweet in Entire Graph:
[2068] Words in Sentiment List#1: Positive
[2020] Words in Sentiment List#2: Negative
[4] Words in Sentiment List#3: Angry/Violent
[75515] Non-categorized Words
[79603] Total Words
[2283] #ciso
[1520] #cybersecurity
[945] #infosec
[787] gt
[737] #security

Top Words in Tweet in G1:
[955] #cybersecurity
[825] #ciso
[741] gt
[517] #security
[516] #infosec
[408] #cio
[374] #dataprotection
[257] #gdpr
[234] security
[206] #dataprivacy

Top Words in Tweet in G2:
[244] #ciso
[94] #cybersecurity
[75] #infosec
[59] know
[50] security
[47] out
[36] s
[36] #cio
[32] need
[31] #gdpr

Top Words in Tweet in G3:
[156] #ciso
[58] #cybersecurity
[34] #cio
[31] security
[27] #security
[21] #infosec
[21] more
[15] ciso
[15] know
[15] out

Top Words in Tweet in G4:
[136] #ciso
[78] #infosec
[58] #cio
[43] #datasecurity
[40] #dataprotection
[39] #cybersecurity
[39] #cdo
[38] #business
[36] #security
[29] risk

Top Words in Tweet in G5:
[62] #ciso
[25] fortinet
[21] cybersecuritysf
[20] sponsored
[16] #cybersecurity
[15] series
[15] more
[13] new
[12] great
[12] big

Top Words in Tweet in G6:
[271] #ciso
[89] #infosec
[80] peerlyst
[77] know
[62] c
[56] #soar
[55] suite
[49] #cybersecurity
[45] great
[45] good

Top Words in Tweet in G7:
[51] #ciso
[38] #cybersecurity
[21] #ai
[18] #cio
[17] #security
[17] #technews
[16] ad
[16] free
[15] posted
[15] #technology

Top Words in Tweet in G8:
[26] #cybersecurity
[24] #infosec
[20] #ciso
[17] #malware
[15] top
[14] woop
[14] 2019
[14] threats
[14] #security
[13] 5

Top Words in Tweet in G9:
[41] #cybersecurity
[35] #data
[33] stephanenappo
[32] readyforit_2019
[32] #monaco
[32] gathering
[32] focussed
[32] #cloud
[17] security
[16] #cloudcomputing

Top Words in Tweet in G10:
[39] #ciso
[29] ibm_in
[21] security
[20] leaders
[17] #mumbai
[16] #ibmsecuritysummit
[14] welcome
[14] #it
[14] professionals
[14] women

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[277] #cio,#ciso
[260] #ciso,#cio
[181] #dataprivacy,#dataprotection
[179] gt,gt
[165] #cybersecurity,#cio
[164] #dataprotection,#cybersecurity
[157] #security,#infosec
[148] #ciso,#cpo
[148] #news,#technology
[147] #cpo,#security

Top Word Pairs in Tweet in G1:
[187] #cio,#ciso
[172] #dataprivacy,#dataprotection
[167] gt,gt
[160] #dataprotection,#cybersecurity
[156] #cybersecurity,#cio
[147] #ciso,#cio
[147] #ciso,#cpo
[147] #cpo,#security
[147] #security,#news
[147] #news,#technology

Top Word Pairs in Tweet in G2:
[25] need,know
[23] find,out
[21] know,fines
[21] fines,associated
[21] associated,#gdpr
[21] #gdpr,offenses
[21] offenses,quite
[21] quite,punitive
[21] punitive,find
[21] out,need

Top Word Pairs in Tweet in G3:
[15] #cio,#ciso
[11] #ciso,#cybersecurity
[10] #ciso,#cio
[10] #cybersecurity,#ciso
[8] check,out
[6] information,security
[6] #cybersecurity,#infosec
[6] read,more
[6] gt,gt
[6] know,fines

Top Word Pairs in Tweet in G4:
[50] #ciso,#cio
[39] #datasecurity,#dataprotection
[38] #cdo,#ciso
[34] #infosec,#business
[30] #dataprotection,#infosec
[30] #security,#datasecurity
[27] #cio,#security
[12] #infosec,#ciso
[11] #ciso,#infosec
[7] #cybersecurity,#infosec

Top Word Pairs in Tweet in G5:
[12] big,challenge
[12] #asktheciso,series
[12] series,sponsored
[10] sponsored,#fortinet
[10] #fortinet,liz
[10] liz,joyce
[10] joyce,svp
[10] svp,#ciso
[10] #ciso,hpe
[10] hpe,speaks

Top Word Pairs in Tweet in G6:
[55] c,suite
[44] panel,c
[44] suite,know
[44] solutions,#ciso
[24] #infosec,#ciso
[23] listen,peertalk
[23] peertalk,panel
[23] know,#soar
[23] #soar,solutions
[23] #ciso,#infosec

Top Word Pairs in Tweet in G7:
[16] ad,free
[16] #cio,#ciso
[15] #technews,posted
[15] posted,ad
[15] free,#technology
[15] #technology,platform
[15] platform,covering
[11] gt,#cissp
[11] #cissp,#security
[11] #security,#ceh

Top Word Pairs in Tweet in G8:
[13] top,5
[13] 5,cyber
[13] cyber,threats
[13] threats,2019
[13] #cybersecurity,#security
[13] #security,#infosec
[13] #infosec,#malware
[13] #malware,#cyberattacks
[11] #itsecurity,#cybersecurity
[10] #cybersecurity,#infosec

Top Word Pairs in Tweet in G9:
[32] readyforit_2019,#monaco
[32] #monaco,gathering
[32] gathering,focussed
[32] focussed,#cloud
[32] #cloud,#cybersecurity
[32] #cybersecurity,#data
[29] stephanenappo,readyforit_2019
[16] #data,#cloudcomputing
[16] #data,digital
[16] digital,security

Top Word Pairs in Tweet in G10:
[14] welcome,#ciso
[14] #ciso,#it
[14] #it,security
[14] security,professionals
[14] professionals,women
[14] women,leaders
[14] leaders,come
[14] come,#mumbai
[13] rise,shine
[13] shine,big

Top Replied-To
Top Replied-To in Entire Graph:
@aynrandpaulryan
@tcrawford
@raj_samani
@lowermybills
@senwarren
@siemplify
@ebay
@kylegriffin1
@lidarmonkey
@davidu

Top Replied-To in G1:
@aynrandpaulryan
@raj_samani
@technoidhub
@lidarmonkey
@kylegriffin1
@ebay
@senwarren
@lowermybills
@aravo
@fslabs

Top Replied-To in G2:
@tcrawford
@davidu
@infogovworld

Top Replied-To in G7:
@cybersecboardrm
@currynichols

Top Mentioned
Top Mentioned in Entire Graph:
@corix_jc
@transform_sec
@douglittlejr
@corixpartners
@peerlyst
@aneeshnair
@aravo
@stephanenappo
@limorelbaz
@belevgevgeny

Top Mentioned in G1:
@corix_jc
@transform_sec
@douglittlejr
@corixpartners
@aravo
@bsmuir
@datashadow
@auguryit
@marcwilczek
@cyberpoint_intl

Top Mentioned in G2:
@cisco_spain
@euti
@infosecurity
@merconference
@1gguru
@infogovworld
@techhq
@red_seguridad
@pwnjeetdo
@mlsedigital

Top Mentioned in G3:
@cybersecuritypl
@itleadersafrica
@cioinspired
@dchou1107
@briskinfosec

Top Mentioned in G4:
@csoonline
@forbes
@egnyte
@cyberdefensemag
@24by7security
@fairinstitute
@f5labs
@_mnemo
@darkreading
@governanceguru

Top Mentioned in G5:
@fortinet
@cybersecuritysf
@hpe
@csoroland
@rsasecurity
@blackstone
@erickachick
@adp
@jasonfruge
@fossil

Top Mentioned in G6:
@peerlyst
@limorelbaz
@ghayslip
@chrishinfosec
@belevgevgeny
@kim_crawley
@claushoumann
@unix_guru
@knowbe4
@wimzkl

Top Mentioned in G7:
@gavriels1
@sinetconnection
@robertherjavec
@michaeldell
@stevecase
@hashtag_cyber
@huawei
@nemertes
@johnatilljohnso
@tryteckedin

Top Mentioned in G8:
@karolina_kurzac
@m49d4ch3lly
@rootconph
@imoyse
@antgrasso
@sarbjeetjohal
@ingliguori
@evankirstel
@thecloudand_me
@alcgroup

Top Mentioned in G9:
@stephanenappo
@readyforit_2019
@topcybernews
@ipfconline1
@comexposium
@events_monaco
@hcltech
@ovh
@chuckdbrooks
@gvtmonaco

Top Mentioned in G10:
@ibm_in
@jaideep400
@mosaic
@vodaidea_news
@ruchi_mohan
@ibmsecurity
@vak_305
@bwbusinessworld
@karanbajwa_in
@sudeepkdas

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@cyberdomain
@nosqldigest
@delta
@evankirstel
@digestwordpress
@ottlegalrebels
@chidambara09
@fintechna
@business

Top Tweeters in G1:
@sectest9
@cyberdomain
@digestwordpress
@fintechna
@business
@cnbc
@santchiweb
@saukel
@andrewmorrisuk
@machinelearn_d

Top Tweeters in G2:
@delta
@thesun
@weranowplaying
@_maryhshultz
@gdpr25thmay18
@mthiele10
@duncanriley
@tcrawford
@siliconangle
@womentechbot

Top Tweeters in G3:
@martinabutters
@dchou1107
@yourlocalchurch
@theiotwarehouse
@finleynmatlock
@mariagildac
@wlassalle
@tripwireinc
@ier_recruiting
@complexd

Top Tweeters in G4:
@foxnews
@forbes
@racingpost
@jeffsheehan
@thinksnews
@wired
@cmswire
@marketingland
@macea_ivan
@homesatmetacoda

Top Tweeters in G5:
@aninave
@fossil
@grandma_hockey
@kennethholley
@hackedagainbook
@marcociappelli
@itspmagazine
@rsaconference
@youtube
@securees

Top Tweeters in G6:
@opexxx
@vishne0
@claushoumann
@unix_guru
@kim_crawley
@whenonkstreet
@mrmeritology
@crmunoz27
@2ndleprechaun
@peerlyst

Top Tweeters in G7:
@calcaware
@wil_bielert
@djimb3rry
@iamukasa
@cybersecboardrm
@stevecase
@markj_ohnson
@zahidtg
@cbinsights
@miacontent_1

Top Tweeters in G8:
@evankirstel
@gvalan
@serverlessfan
@topcybernews
@junjudapi
@imoyse
@gcpanel
@poramatepi
@archonsec
@avrohomg

Top Tweeters in G9:
@mashable
@smoothsale
@ipfconline1
@techpearce2
@patrick_henz
@plainternet
@pierrepinna
@therealginaclay
@hcltech
@queryonlinenl

Top Tweeters in G10:
@yazdjbilimoria
@bwbusinessworld
@jsingh0110
@beingnastik
@jitendermiglan1
@milindtapaswi
@ibm_in
@deepalinaair
@anjali2806
@harshadthegreat


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.