#CISO, Twitter, 8/5/2019 3:37:03 PM, 205728


FAQ | Problem?

#CISO_2019-08-05_07-50-33.xlsx
#CISO_2019-08-05_07-50-33.xlsx
From:
Connected Action NodeXL-Reports
Uploaded on:
August 05, 2019
Short Description:
#CISO via NodeXL http://bit.ly/2YomDoR
@cybersec_feeds
@sectest9
@strike_ready
@stephanenappo
@wynandbooysen
@fisher85m
@corix_jc
@mikequindazzi
@topcybernews
@helpnetsecurity

Top hashtags:
#ciso
#cybersecurity
#infosec
#security
#cio
#dataprotection
#dataprivacy

Description:
Description
The graph represents a network of 1,978 Twitter users whose recent tweets contained "#CISO", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Monday, 05 August 2019 at 15:06 UTC.

The tweets in the network were tweeted over the 9-day, 2-hour, 30-minute period from Saturday, 27 July 2019 at 12:24 UTC to Monday, 05 August 2019 at 14:55 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 1978
Unique Edges : 6753
Edges With Duplicates : 6854
Total Edges : 13607
Self-Loops : 1211
Reciprocated Vertex Pair Ratio : 0.0327048864948057
Reciprocated Edge Ratio : 0.0633383010432191
Connected Components : 174
Single-Vertex Connected Components : 111
Maximum Vertices in a Connected Component : 1685
Maximum Edges in a Connected Component : 13209
Maximum Geodesic Distance (Diameter) : 11
Average Geodesic Distance : 3.504854
Graph Density : 0.00205906857066579
Modularity : 0.41038
NodeXL Version : 1.0.1.418

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[42] https://www.teckedin.com/
[28] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html
[26] https://www.cio.com/article/3260187/arvr-gets-real-3-promising-pilots-of-augmented-reality-and-virtual-reality-in-business.html?twitter=@aneeshnair
[25] https://www.mckinsey.com/business-functions/risk/our-insights/cybersecurity-linchpin-of-the-digital-enterprise?cid=soc-web
[23] https://www.forbes.com/sites/cognitiveworld/2019/03/29/is-the-future-of-artificial-intelligence-tied-to-the-future-of-blockchain/
[22] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[20] https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/
[20] https://www.computerweekly.com/news/252466576/Attacks-against-AI-systems-are-a-growing-concern
[19] https://www.helpnetsecurity.com/2019/07/31/solving-security-problems/
[18] https://www.healthcareitnews.com/news/europe/health-tech-balancing-between-risks-and-opportunities?twitter=@aneeshnair

Top URLs in Tweet in G1:
[42] https://www.teckedin.com/
[22] https://www.mckinsey.com/business-functions/risk/our-insights/cybersecurity-linchpin-of-the-digital-enterprise?cid=soc-web
[16] https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/
[14] https://www.wired.com/story/vxworks-vulnerabilities-urgent11-china-social-credit-score
[13] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html
[11] https://www.csoonline.com/article/3412006/is-the-cloud-lulling-us-into-security-complacency.html#tk.rss_all
[10] http://bit.ly/2VuiJ7v?utm_campaign=meetedgar&utm_medium=social&utm_source=meetedgar.com
[9] https://youtu.be/PBQQOxFS91c?utm_source=You-tube&utm_medium=CISO-talks&utm_campaign=13-1
[9] https://www.linkedin.com/slink?code=f9Er5zj
[9] https://www.jdsupra.com/legalnews/authorized-access-of-proprietary-31100/

Top URLs in Tweet in G2:
[10] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html
[9] https://www.ibm.com/thought-leadership/summit-supercomputer/?cm_mmc=OSocial_Twitter-_-Systems_Systems+-+Power-_-WW_WW-_-Power-Systems-Supercomputing-Summit&cm_mmca1=000018TL&cm_mmca2=10001909
[8] https://www.brighttalk.com/webcast/14809/259541?utm_content=buffer689cd&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[8] https://searchcio.techtarget.com/feature/Machine-learning-in-cybersecurity-moves-needle-doesnt-negate-threats?utm_content=buffer0557f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[7] https://hbr.org/resources/pdfs/comm/splunk/ThePowerofPredictiveIT.pdf
[7] https://www.linkedin.com/in/brianethomas1?utm_content=buffer04d76&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[7] https://searchsecurity.techtarget.com/feature/Portrait-of-a-CISO-Roles-and-responsibilities
[6] http://www.darktrace.com/en/press/2017/159/?utm_content=buffer13e1a&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[5] https://searchsecurity.techtarget.com/feature/Tackling-IT-security-awareness-training-with-a-county-CISO?utm_campaign=ssec_security&utm_content=1564589329&utm_medium=social&utm_source=twitter
[5] https://www.cyberdefensemagazine.com/common-sense-passwords/

Top URLs in Tweet in G3:
[23] https://www.forbes.com/sites/cognitiveworld/2019/03/29/is-the-future-of-artificial-intelligence-tied-to-the-future-of-blockchain/
[22] https://www.cio.com/article/3260187/arvr-gets-real-3-promising-pilots-of-augmented-reality-and-virtual-reality-in-business.html?twitter=@aneeshnair
[21] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[16] https://medium.com/security-transformation-leadership
[16] https://www.healthcareitnews.com/news/europe/health-tech-balancing-between-risks-and-opportunities?twitter=@aneeshnair
[14] https://www.humanresourcesonline.net/the-three-key-qualities-required-for-digital-leadership/?twitter=@aneeshnair
[12] https://us17.campaign-archive.com/?u=e3cb8b09ffc9f1d8c791043d4&id=1af815b9c1
[10] https://www.mckinsey.com/business-functions/risk/our-insights/cybersecurity-linchpin-of-the-digital-enterprise?utm_medium=social&utm_source=twitter
[10] https://us17.campaign-archive.com/?u=e3cb8b09ffc9f1d8c791043d4&id=be407d855b
[10] https://www.computerweekly.com/news/252466576/Attacks-against-AI-systems-are-a-growing-concern

Top URLs in Tweet in G4:
[14] https://www.helpnetsecurity.com/2019/07/31/solving-security-problems/
[10] https://www.helpnetsecurity.com/2019/08/02/new-infosec-products-of-the-week-august-2-2019/
[6] https://www.helpnetsecurity.com/2019/07/25/cybercrime-economy-cost/
[6] https://www.helpnetsecurity.com/2019/07/30/black-hat-usa-2019-trends/
[6] https://cisoseries.com/who-are-the-perfect-targets-for-ransomware/
[5] https://www.helpnetsecurity.com/2019/08/01/mandatory-password-changes-are-obsolete/
[5] https://cisoseries.com/just-click-accept-as-we-explain-informed-consent/
[4] https://www.helpnetsecurity.com/2019/07/30/secure-your-data/
[4] https://cisoseries.com/passwords-so-good-you-cant-help-but-reuse-them/
[3] https://www.helpnetsecurity.com/2019/07/29/biometrics-passwordless-security/

Top URLs in Tweet in G5:
[8] https://applicant.mightyrecruiter.com/jobs/apply/dir-vp-security-professional-services-at-laka---company-in-chicago-il-c660ec860d781f3b88fb048f33d5aaa5?utm_source=apply-link&utm_medium=other&utm_campaign=external&utm_content=laka%20&%20company-dir/vp%20security%20professional%20services-227296-na&utm_term=employer-action&fp=f
[3] https://www.darkreading.com/threat-intelligence/cisos-must-evolve-to-a-data-first-security-program/a/d-id/1335334
[3] http://www.dss.mil/documents/ci/Summary_of_FY17_Industry_Reporting.pdf
[2] http://www.pathmaker-group.com/how-to-instantly-see-privileged-account-compromise-or-abuse/
[2] https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/
[1] https://www.iafrikan.com/2019/07/28/huawei-ceo-libra-china-facebook-cryptocurrency-digital/
[1] https://mondaynote.com/bezos-a-ceo-who-can-write-2f368ee36599
[1] https://www.linkedin.com/slink?code=ekAKGPR
[1] https://dy.si/dP5iZ
[1] https://www.csoonline.com/article/3407779/how-cisos-become-business-leaders.html#tk.rss_all

Top URLs in Tweet in G6:
[7] https://www.russellreynolds.com/insights/thought-leadership/cyber-security-the-ciso-assessment-level-model-calm
[2] https://thecybersecurityplace.com/security-or-compliance-stop-choosing-between-them/
[1] https://www.eccgs.com/services/security-strategy-and-transformation/?utm_content=buffer5d3f5&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[1] https://www2.deloitte.com/insights/us/en/industry/financial-services/cybersecurity-maturity-financial-institutions-cyber-risk.html
[1] https://www.gartner.com/en
[1] https://store.eccouncil.org/product/ciso-mag-annual-membership-fee-2
[1] https://twitter.com/CISOMAG/status/1154725877659426818
[1] https://securityintelligence.com/articles/the-many-dimensions-of-effective-ciso-leaders/

Top URLs in Tweet in G7:
[12] https://www.peerlyst.com/posts/get-to-know-some-cisos-kimberly-crawley?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/a-ciso-looking-back-dear-younger-me-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/a-ciso-s-seven-fundamentals-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[6] https://www.peerlyst.com/posts/how-to-secure-remote-desktop-protocol-sessions-s-delano?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[6] https://www.peerlyst.com/posts/nsm-101-tony-robinson-1?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[5] https://www.peerlyst.com/posts/oracle-database-security-scan-part-ii-practical-implementation-dataplus?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[5] https://www.peerlyst.com/posts/securing-your-database-101-michael-ball?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/canadian-spies-release-new-malware-heuristic-tools-to-the-public-kimberly-crawley?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/a-list-of-security-services-that-companies-contract-out-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[4] https://www.peerlyst.com/posts/third-party-vendor-quality-management-and-assurance-wiki-1337mark?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

Top URLs in Tweet in G8:
[11] https://www.infosecurity-magazine.com/webinars/data-driven-identity-1-1-1-1-1-1-1/?utm_source=InfosecWebinar&utm_medium=InternalPromotions&utm_campaign=LogMeInWebinarAB
[2] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa
[1] https://twitter.com/ITPro/status/1156876227027886080
[1] https://ww2.cyxtera.com/l/436732/2019-08-02/p686km
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9840651
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9840645
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9838733
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9837065
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9836840
[1] https://www.itpro.co.uk/security/34062/how-gregory-touhill-became-the-first-ciso-of-the-usa?es_p=9834301

Top URLs in Tweet in G9:
[4] https://securityboulevard.com/2019/07/the-ciso-speaks-tim-callahan-on-how-aflac-is-approaching-application-security-and-devsecops/?sf216617411=1
[2] https://www.thesecuritycompany.com/infosec-news/how-new-regulations-could-shape-the-future-of-the-internet-of-things-iot/
[2] https://www.thesecuritycompany.com/insights-measurement/6-reasons-your-behavioural-change-plan-failed/
[2] https://www.thesecuritycompany.com/insights-measurement/the-ethics-of-ethical-phishing/
[2] https://www.f5.com/labs/articles/cisotociso/what-to-do-when-your-company-tells-you-they-re-making-a-mobile-app-part-3?utm_medium=owned-social&utm_source=twitter&utm_campaign=amer-f5labs&sf216362426=1
[2] https://www.f5.com/labs/articles/cisotociso/what-to-do-when-your-company-tells-you-they-re-making-a-mobile-a?utm_medium=owned-social&utm_source=twitter&utm_campaign=amer-security&sf216362492=1
[2] https://www.scmagazine.com/home/security-news/not-every-insider-threat-is-malicious-but-all-are-dangerous/?sf216427367=1
[2] https://www.rsaconference.com/blogs/the-ciso-speaks-tim-callahan-on-how-aflac-is-approaching-application-security-and-devsecops?utm_source=twitter&utm_medium=social&utm_content=ciso-speaks-tim-callahan-blog&utm_campaign=july-text-3652019
[2] https://www.linkedin.com/slink?code=eZEcd5N
[1] https://www.theregister.co.uk/2019/07/24/lancaster_university_hack_breach_man_arrested/

Top URLs in Tweet in G10:
[4] https://www.gartner.com/smarterwithgartner/gartner-top-7-security-and-risk-trends-for-2019?source=BLD-200123&utm_medium=social&utm_source=bambu&utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-SWG
[3] https://www.gartner.com/en/conferences/apac/security-risk-management-australia/agenda?utm_medium=social&utm_source=twitter&utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-EVT&utm_content=&sf216109086=1
[3] https://www.gartner.com/smarterwithgartner/gartner-top-7-security-and-risk-trends-for-2019?utm_source=twitter&utm_medium=social&utm_campaign=RM_GB_YOY_ITSEC_SOC_SF1_TOP-SEC-TRENDS&utm_content=tw-gartner-it
[2] https://www.gartner.com/en/conferences/apac/security-risk-management-india?utm_medium=social&utm_source=twitter&utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-EVT&utm_content=&sf213016652=1
[1] https://www.information-management.com/opinion/bring-your-own-identity-byoi-new-models-of-digital-identity?brief=00000159-ffbf-d8bf-af7b-ffbf558d0000&sf216104791=1
[1] https://www.gartner.com/en/conferences/apac/security-risk-management-india/speakers
[1] https://www.gartner.com/en/conferences/apac/security-risk-management-india/why-attend?utm_medium=social&utm_source=twitter&utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-EVT&utm_content=&sf216109056=1
[1] https://www.linkedin.com/slink?code=e3CVJxt
[1] https://www.linkedin.com/slink?code=ekga7ar
[1] https://www.linkedin.com/slink?code=e4dwrbm

Top Domains
Top Domains in Tweet in Entire Graph:
[347] jdsupra.com
[149] linkedin.com
[139] csoonline.com
[115] peerlyst.com
[110] twitter.com
[104] helpnetsecurity.com
[103] forbes.com
[95] co.uk
[82] scoop.it
[79] bankinfosecurity.com

Top Domains in Tweet in G1:
[345] jdsupra.com
[106] csoonline.com
[79] bankinfosecurity.com
[63] linkedin.com
[54] wired.com
[42] teckedin.com
[39] aravo.com
[31] helpnetsecurity.com
[31] forbes.com
[29] darkreading.com

Top Domains in Tweet in G2:
[26] techtarget.com
[14] linkedin.com
[13] csoonline.com
[11] ibm.com
[10] twitter.com
[8] brighttalk.com
[8] darkreading.com
[7] hbr.org
[6] darktrace.com
[5] cyberdefensemagazine.com

Top Domains in Tweet in G3:
[66] forbes.com
[53] co.uk
[52] scoop.it
[41] twitter.com
[37] cio.com
[26] computerweekly.com
[22] campaign-archive.com
[22] corixpartners.com
[21] medium.com
[16] healthcareitnews.com

Top Domains in Tweet in G4:
[64] helpnetsecurity.com
[19] cisoseries.com
[8] linkedin.com
[6] twitter.com
[4] darkreading.com
[3] cio.com
[3] futureconevents.com
[2] wired.com
[2] zdnet.com
[2] techtarget.com

Top Domains in Tweet in G5:
[23] linkedin.com
[13] risklens.com
[11] dy.si
[8] mightyrecruiter.com
[6] fairinstitute.org
[5] darkreading.com
[5] twitter.com
[3] pathmaker-group.com
[3] thecisocollective.com
[3] dss.mil

Top Domains in Tweet in G6:
[7] russellreynolds.com
[2] thecybersecurityplace.com
[1] eccgs.com
[1] deloitte.com
[1] gartner.com
[1] eccouncil.org
[1] twitter.com
[1] securityintelligence.com

Top Domains in Tweet in G7:
[103] peerlyst.com
[5] fortinet.com
[4] cybersecurityventures.com
[2] earlyadopter.com
[1] youtube.com
[1] podbean.com
[1] techtarget.com
[1] mightyguides.com
[1] twitter.com

Top Domains in Tweet in G8:
[11] infosecurity-magazine.com
[11] co.uk
[1] twitter.com
[1] cyxtera.com

Top Domains in Tweet in G9:
[8] thesecuritycompany.com
[6] securityboulevard.com
[4] scmagazine.com
[4] f5.com
[3] co.uk
[3] cisomag.com
[2] com.au
[2] rsaconference.com
[2] linkedin.com
[1] information-age.com

Top Domains in Tweet in G10:
[14] gartner.com
[4] linkedin.com
[1] information-management.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2808] ciso
[2295] cybersecurity
[1114] infosec
[1031] security
[1026] cio
[839] dataprotection
[682] dataprivacy
[447] iot
[406] gdpr
[397] ai



Top Hashtags in Tweet in G1:
[1337] ciso
[1319] cybersecurity
[785] dataprotection
[693] infosec
[653] dataprivacy
[572] cio
[469] security
[352] gdpr
[255] cpo
[245] hack

Top Hashtags in Tweet in G2:
[250] ciso
[187] cybersecurity
[182] iot
[171] ai
[121] augmentedreality
[111] security
[95] ar
[87] bigdata
[82] cloud
[81] megatrends

Top Hashtags in Tweet in G3:
[330] cybersecurity
[313] ciso
[288] security
[258] cio
[199] cto
[177] leadership
[121] infosec
[120] tech
[101] management
[98] cdo

Top Hashtags in Tweet in G4:
[119] ciso
[103] cybersecurity
[33] infosec
[32] security
[23] podcast
[17] cio
[16] cisoseries
[11] business
[10] visibility
[10] it

Top Hashtags in Tweet in G5:
[164] ciso
[50] cybersecurity
[34] security
[30] cio
[27] infosec
[9] iot
[8] cloud
[8] jobs
[7] ceo
[7] gartner

Top Hashtags in Tweet in G6:
[77] cybersecurity
[66] infosec
[58] ciso
[38] security
[38] iot
[20] digitaltransformation
[20] darknet
[20] blockchain
[20] cybercrime
[20] iiot

Top Hashtags in Tweet in G7:
[138] ciso
[37] cybersecurity
[25] infosec
[17] blueteam
[12] career
[6] rdp
[6] nsm
[5] phishing
[5] oracle
[4] dfir

Top Hashtags in Tweet in G8:
[38] ciso
[22] infosecwebinar
[10] isaca
[7] dyk
[4] identity
[4] databreach
[1] security
[1] access
[1] authentication
[1] smart

Top Hashtags in Tweet in G9:
[44] ciso
[20] infosec
[19] cybersecurity
[9] appsec
[9] devsecops
[4] mobile
[4] rsac
[3] security
[2] facebook
[2] iot

Top Hashtags in Tweet in G10:
[17] ciso
[16] gartnersec
[15] cybersecurity
[8] security
[7] risk
[5] riskmanagement
[3] irm
[3] cio
[2] hypecycle
[1] digital

Top Words
Top Words in Tweet in Entire Graph:
[3322] Words in Sentiment List#1: Positive
[4357] Words in Sentiment List#2: Negative
[6] Words in Sentiment List#3: Angry/Violent
[132135] Non-categorized Words
[139814] Total Words
[5318] #ciso
[3783] #cybersecurity
[2225] #infosec
[2213] #cio
[2024] #security

Top Words in Tweet in G1:
[2647] #ciso
[2343] #cybersecurity
[1506] #dataprotection
[1504] #infosec
[1302] #cio
[1165] #security
[952] #gdpr
[885] #dataprivacy
[691] #technology
[680] #hack

Top Words in Tweet in G2:
[705] #ciso
[319] cc
[291] #iot
[252] #cybersecurity
[248] #ai
[175] ty
[174] domhalps
[171] thomas_harrer
[168] mikequindazzi
[166] louisserge

Top Words in Tweet in G3:
[1179] gt
[723] #ciso
[631] #cio
[541] #cybersecurity
[498] #security
[483] #cto
[424] #leadership
[323] #infosec
[281] #management
[186] #tech

Top Words in Tweet in G4:
[198] #ciso
[153] #cybersecurity
[77] security
[71] #infosec
[49] #security
[34] #cisoseries
[33] #podcast
[28] #cio
[28] vendor
[26] threat

Top Words in Tweet in G5:
[167] #ciso
[54] #cybersecurity
[47] security
[35] risk
[34] #security
[30] #cio
[27] #infosec
[25] cyber
[24] more
[17] s

Top Words in Tweet in G6:
[123] #cybersecurity
[123] #ciso
[70] #infosec
[69] percent
[66] infographic
[57] #security
[56] antgrasso
[50] fisher85m
[48] link
[44] gt

Top Words in Tweet in G7:
[163] #ciso
[42] #cybersecurity
[28] cisos
[28] #infosec
[25] fortinet
[24] #blueteam
[23] good
[23] great
[23] ghayslip
[21] kim_crawley

Top Words in Tweet in G8:
[46] #ciso
[32] gt
[22] join
[22] #infosecwebinar
[22] raefmeeuwisse
[22] logmein
[20] michaelhill
[19] program
[19] itpro
[19] gregory_touhill

Top Words in Tweet in G9:
[44] #ciso
[21] #infosec
[19] #cybersecurity
[11] #appsec
[11] #devsecops
[10] tim
[10] aflac
[9] security
[8] need
[7] part

Top Words in Tweet in G10:
[23] #ciso
[20] #gartnersec
[20] #cybersecurity
[15] gartner
[12] more
[12] here
[11] analyst
[11] 2019
[9] trends
[9] read

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[992] #cio,#ciso
[711] #dataprivacy,#dataprotection
[692] #cybersecurity,#cio
[672] #ciso,#cpo
[671] #dataprotection,#cybersecurity
[663] #cpo,#security
[663] #security,#news
[663] #news,#technology
[663] #technology,#hack
[659] #gdpr,#dataprotection

Top Word Pairs in Tweet in G1:
[883] #cio,#ciso
[688] #dataprivacy,#dataprotection
[682] #cybersecurity,#cio
[663] #dataprotection,#cybersecurity
[663] #ciso,#cpo
[656] #cpo,#security
[656] #security,#news
[656] #news,#technology
[656] #technology,#hack
[650] #infosec,#gdpr

Top Word Pairs in Tweet in G2:
[258] #ciso,cc
[88] s,n
[86] n,#ciso
[77] #cloud,#bigdata
[75] #ai,#iot
[74] cc,evankirstel
[72] digital,tech
[72] tech,industry
[72] industry,4
[72] 4,0

Top Word Pairs in Tweet in G3:
[420] #cio,#cto
[351] gt,gt
[330] #ciso,#cio
[226] #leadership,#management
[202] #cybersecurity,#security
[163] #cto,#ciso
[162] #security,#infosec
[109] #infosec,#leadership
[91] https,t
[91] t,co

Top Word Pairs in Tweet in G4:
[35] #infosec,#cybersecurity
[34] #ciso,#security
[29] #cybersecurity,#ciso
[26] vendor,relationship
[25] #security,vendor
[25] relationship,#podcast
[24] mike,johnson
[23] #cisoseries,#infosec
[19] #cybersecurity,#infosec
[16] #infosec,#ciso

Top Word Pairs in Tweet in G5:
[22] cyber,risk
[16] #ciso,#infosec
[14] risk,quantification
[10] #ciso,#security
[9] follow,link
[8] amazing,director
[8] director,vp
[8] vp,security
[8] security,professional
[8] professional,services

Top Word Pairs in Tweet in G6:
[48] infographic,#cybersecurity
[44] link,gt
[23] financial,services
[23] services,organizations
[23] organizations,spent
[23] spent,anywhere
[23] anywhere,6
[23] 6,percent
[23] percent,14
[23] 14,percent

Top Word Pairs in Tweet in G7:
[22] #ciso,#blueteam
[21] kim_crawley,#ciso
[14] #cybersecurity,#ciso
[12] know,cisos
[12] cisos,series
[12] series,interviews
[12] interviews,kim_crawley
[12] #ciso,#career
[12] 100,coins
[11] people,actualy

Top Word Pairs in Tweet in G8:
[20] michaelhill,raefmeeuwisse
[20] #ciso,logmein
[18] #infosecwebinar,join
[18] logmein,discuss
[18] challenges,exist
[18] exist,today
[18] solutions,help
[18] help,future
[16] join,michaelhill
[16] discuss,key

Top Word Pairs in Tweet in G9:
[9] #appsec,#devsecops
[8] #ciso,#infosec
[7] #ciso,#cybersecurity
[7] #cybersecurity,#infosec
[6] speaks,tim
[6] tim,callahan
[6] callahan,aflac
[6] aflac,approaching
[5] #ciso,speaks
[5] approaching,#appsec

Top Word Pairs in Tweet in G10:
[14] #ciso,#cybersecurity
[11] gartner,analyst
[10] #gartnersec,#ciso
[9] read,more
[9] more,here
[7] analyst,pfirstbrook
[7] pfirstbrook,shares
[7] shares,top
[7] top,7
[7] 7,#security

Top Replied-To
Top Replied-To in Entire Graph:
@lidarmonkey
@facebook
@thedemocrats
@melissajpeltier
@sonicwall
@itpro
@senatemajldr
@infoblox
@repmikejohnson
@fortinet

Top Replied-To in G1:
@lidarmonkey
@facebook
@thedemocrats
@melissajpeltier
@sonicwall
@senatemajldr
@infoblox
@theartist_mbs
@repmikejohnson
@recordedfuture

Top Replied-To in G2:
@randomuserid
@austcyber
@finologee
@fortinet
@recordedfuture

Top Replied-To in G3:
@sonicwall

Top Replied-To in G4:
@zerosum0x0

Top Replied-To in G5:
@silverfort

Top Replied-To in G7:
@fortinet

Top Replied-To in G8:
@itpro

Top Mentioned
Top Mentioned in Entire Graph:
@mikequindazzi
@thomas_harrer
@domhalps
@louisserge
@evankirstel
@topcybernews
@cybersecboardrm
@frronconi
@corix_jc
@digitalcloudgal

Top Mentioned in G1:
@digitalcloudgal
@cybersecboardrm
@avrohomg
@pvynckier
@archonsec
@aghiathchbib
@robmay70
@fogle_shane
@thecloudand_me
@m49d4ch3lly

Top Mentioned in G2:
@domhalps
@thomas_harrer
@mikequindazzi
@louisserge
@evankirstel
@frronconi
@pierrepinna
@cloudpreacher
@heinzvhoenen
@topcybernews

Top Mentioned in G3:
@corix_jc
@corixpartners
@forbes
@cioonline
@transform_sec
@grattonboy
@scoopit
@mikequindazzi
@computerweekly
@jayshreepandya

Top Mentioned in G4:
@attivonetworks
@qualys
@trendmicro
@riskiq
@mbsangster
@dspark
@esentire
@blackhatevents
@capsule8
@elastic

Top Mentioned in G6:
@antgrasso
@fisher85m
@deloitteinsight
@gartner_inc
@marvalsoftware
@rraonleadership
@observatore2
@gersonrolim
@mikequindazzi
@eccouncil

Top Mentioned in G7:
@ghayslip
@kim_crawley
@fortinet
@wimzkl
@cybersecuritysf
@earlyadopterear
@whitehouse
@trackerpayton
@fortalicellc
@da_667

Top Mentioned in G8:
@raefmeeuwisse
@logmein
@michaelhill
@gregory_touhill
@rationalcybrsec
@connorlbjones
@itpro
@cyxtera
@infosecuritymag

Top Mentioned in G9:
@securityblvd
@f5labs
@aflac
@teiss
@f5security
@cisomag
@cioonline
@scmagazineuk
@scmagazine
@rsaconference

Top Mentioned in G10:
@pfirstbrook
@davemahdi
@infomgmt

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@cyberdomain
@nosqldigest
@deejayiwan
@evankirstel
@techl0g
@aldoceccarelli
@chidambara09
@ottlegalrebels
@thehill

Top Tweeters in G1:
@sectest9
@cyberdomain
@ottlegalrebels
@kotaknaren
@tmobile
@foxnews
@melissajpeltier
@santchiweb
@gezgintrk
@nomoreslaves

Top Tweeters in G2:
@nosqldigest
@deejayiwan
@evankirstel
@chidambara09
@reuters
@infopronetwork
@mashable
@vanja180700
@7wdata
@rjlayalawilt

Top Tweeters in G3:
@aldoceccarelli
@thehill
@rvp
@fintechna
@evanderburg
@nytimes
@grattonboy
@andrewmorrisuk
@caring_mobile
@saukel

Top Tweeters in G4:
@aaroncuddeback
@sequoia2001
@ashot_
@candicelanier
@quinncenation
@1c3m4n_09
@js_bot_code
@juancarlosvigol
@target
@jc_vazquez

Top Tweeters in G5:
@barbarakimmel
@dchou1107
@osint_sec
@thewarrenwelsh
@stevesanders7
@gregdavidlaka
@felixevargas
@cyberintel
@kerry_rea
@fico

Top Tweeters in G6:
@jacobussystems
@johnny9904
@imoyse
@mezgravis
@interfima
@antgrasso
@atulpati
@hajer_alqassimi
@fisher85m
@elearningpros

Top Tweeters in G7:
@ceektechnology
@ovidiug
@clt_trafficguy
@securityblog
@claushoumann
@brianlinuxing
@kim_crawley
@jax_masters
@lizscherer
@peerlyst

Top Tweeters in G8:
@linuxmil
@itpro
@infosecuritymag
@danraywood
@isacanews
@infosecurity
@dchez24
@logmein
@shirley78547054
@infoseceditor

Top Tweeters in G9:
@theregister
@lucasoft_co_uk
@informationage
@rsaconference
@scmagazineuk
@laurenweinstein
@chrisri80029765
@sumans0urav
@securityblvd
@globalcyberalln

Top Tweeters in G10:
@infomgmt
@gartner_it
@stellebelle
@amitracks
@johnawheeler
@cpettey
@roberthouraghan
@smooregartner
@minazadenwala
@rohanmantri


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.