#CISO, Twitter, 6/20/2019 2:55:04 PM, 200588


FAQ | Problem?

#CISO_2019-06-20_07-19-18.xlsx
#CISO_2019-06-20_07-19-18.xlsx
From:
Connected Action NodeXL-Reports
Uploaded on:
June 20, 2019
Short Description:
#CISO via NodeXL http://bit.ly/2Rnz2CS
@cybersec_feeds
@strike_ready
@sectest9
@stephanenappo
@corix_jc
@gartner_it
@cybersecuritysf
@beyondtrust
@equologix
@transform_sec

Top hashtags:
#ciso
#cybersecurity
#infosec
#security
#cio
#cto
#leadership
#ai
#gartnersec

Description:
Description
The graph represents a network of 1,942 Twitter users whose recent tweets contained "#CISO", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 20 June 2019 at 14:30 UTC.

The tweets in the network were tweeted over the 9-day, 21-hour, 43-minute period from Monday, 10 June 2019 at 16:30 UTC to Thursday, 20 June 2019 at 14:14 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 1942
Unique Edges : 3260
Edges With Duplicates : 3342
Total Edges : 6602
Self-Loops : 1068
Reciprocated Vertex Pair Ratio : 0.0466628959276018
Reciprocated Edge Ratio : 0.0891650905160767
Connected Components : 163
Single-Vertex Connected Components : 106
Maximum Vertices in a Connected Component : 1664
Maximum Edges in a Connected Component : 6262
Maximum Geodesic Distance (Diameter) : 9
Average Geodesic Distance : 3.841647
Graph Density : 0.000981848145418581
Modularity : 0.428693
NodeXL Version : 1.0.1.413

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[32] https://www.youtube.com/watch?v=AAnWhD_CNtM

[28] https://www.scoop.it/topic/artificial-intelligence-and-cyber-security/p/4107148020/2019/04/24/artificial-intelligence-a-cybersecurity-solution-or-the-greatest-risk-of-all?utm_medium=social&utm_source=twitter
[25] https://www.helpnetsecurity.com/2019/06/13/ciso-board-reporting/
[24] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[23] http://mydaily.equologix.com/
[21] https://medium.com/security-transformation-leadership/gdpr-and-the-dpo-threats-or-levers-for-the-ciso-b13c0635c9be
[20] https://www.teckedin.com/
[20] https://www.aravo.com/white_papers/cybersecurity-regulatory-radar-five-top-trends-in-cybersecurity-regulation/?utm_content=94207033&utm_medium=social&utm_source=twitter&hss_channel=tw-31273094
[16] https://www.linkedin.com/company/opensky-corp/?viewAsMember=true&utm_source=social&utm_medium=social
[15] http://khipu-networks.com/news

Top URLs in Tweet in G1:
[24] https://www.blurb.co.uk/b/9015902-cyber-security-the-lost-decade-2018-edition
[18] https://www.scoop.it/topic/artificial-intelligence-and-cyber-security/p/4107148020/2019/04/24/artificial-intelligence-a-cybersecurity-solution-or-the-greatest-risk-of-all?utm_medium=social&utm_source=twitter
[15] https://ciowatercooler.co.uk/three-factors-marginalising-the-historical-role-of-the-ciso/?sp_url=6flr
[15] https://medium.com/security-transformation-leadership/gdpr-and-the-dpo-threats-or-levers-for-the-ciso-b13c0635c9be
[15] http://khipu-networks.com/news
[14] https://medium.com/security-transformation-leadership
[10] https://goo.gl/BUKXsC?utm_campaign=meetedgar&utm_medium=social&utm_source=meetedgar.com
[9] https://us17.campaign-archive.com/?u=e3cb8b09ffc9f1d8c791043d4&id=d6bf3b622a
[9] https://mailchi.mp/ff99e6627c81/rluq4elg61
[9] http://bit.ly/2VuiJ7v?utm_campaign=meetedgar&utm_medium=social&utm_source=meetedgar.com

Top URLs in Tweet in G2:
[32] https://www.youtube.com/watch?v=AAnWhD_CNtM

[19] https://www.teckedin.com/
[7] https://www.silicon.co.uk/security/cyberwar/asco-ransomware-attack-262913
[6] https://www.scoop.it/topic/artificial-intelligence-and-cyber-security/p/4107148020/2019/04/24/artificial-intelligence-a-cybersecurity-solution-or-the-greatest-risk-of-all?utm_medium=social&utm_source=twitter
[6] https://www.cnet.com/news/election-hacking-has-never-been-cheaper-easier-or-more-profitable/#ftag=COS-05-10aaa0j
[6] https://www.helpnetsecurity.com/2019/06/13/ciso-board-reporting/
[5] https://twit.tv/shows/security-now/episodes/716?autostart=false
[5] https://www.amazon.com/dp/1099453399
[5] https://www.simetrica.biz/wpaclv20190802.html
[5] https://www.itpro.co.uk/intellectual-property/33847/google-caught-red-handed-lifting-lyrics-data

Top URLs in Tweet in G3:
[6] https://www.youtube.com/embed/En7A8vZTcvc
[6] https://cybersecuritynews.es/streaming-ciso-day-2019/
[5] https://cisoday.es/
[3] https://medium.com/security-transformation-leadership/gdpr-and-the-dpo-threats-or-levers-for-the-ciso-b13c0635c9be
[2] https://twitter.com/compliancetips/status/1139609754144317440
[2] https://www.cisomag.com/baltimore-hackers-leak-data-on-twitter-after-no-ransom-was-paid/?utm_content=93769807&utm_medium=social&utm_source=twitter&hss_channel=tw-393818842
[2] https://info.alagen.com/webinar-are-you-ready-for-a-ciso?utm_campaign=Ready%20for%20a%20CISO%20Webinar&utm_content=93644608&utm_medium=social&utm_source=twitter&hss_channel=tw-503312910
[2] https://lnkd.in/eDAuqrH
[2] https://www.infosecurity-magazine.com:443/news/infosec19-cisos-remember-kiss-1-1/
[2] https://apprater.net/?p=25877&utm_source=short_url&utm_medium=social&utm_campaign=sharing_25877

Top URLs in Tweet in G4:
[10] https://www.gartner.com/smarterwithgartner/gartner-top-7-security-and-risk-trends-for-2019/?utm_medium=social&utm_source=twitter&utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-SWG&utm_content=&sf214561733=1
[10] http://www.altaassociates.com/
[7] https://www.gartner.com/en/newsroom/press-releases/2019-06-17-gartner-says-security-and-risk-management-leaders-must-leverage-the-automation-continuum-to-create-new-value-for-their-organizations?source=BLD-200123&utm_medium=social&utm_source=bambu&utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-PR
[7] https://www.gartner.com/smarterwithgartner/gartner-top-10-security-projects-for-2019/?utm_medium=social&utm_source=twitter&utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-SWG&utm_content=&sf214486127=1
[7] https://www.tripwire.com/state-of-security/?p=53675#.XQDWic4y_M8.twitter
[7] https://www.itworldcanada.com/event/w/ITWC-June18.php?source=social
[6] https://www.computerweekly.com/news/252465174/Inside-F5s-cyber-security-playbook?sf214453961=1
[5] https://www.gartner.com/smarterwithgartner/gartner-top-7-security-and-risk-trends-for-2019?source=BLD-200123&utm_medium=social&utm_source=bambu&utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-SWG
[5] https://www.itworldcanada.com/article/tip-and-best-practices-for-managing-cyber-security-incidents/417752
[4] https://www.gartner.com/smarterwithgartner/gartner-keynote-leverage-automation-for-modern-security/?source=BLD-200123&utm_medium=social&utm_source=bambu&utm_campaign=SM_GB_YOY_GTR_SOC_BU1_SM-BA-SWG

Top URLs in Tweet in G5:
[3] https://www.darkreading.com/vulnerabilities---threats/data-breach-threats-bigger-than-ever/a/d-id/1333332
[2] https://www.pwc.com/us/en/services/consulting/assets/journey-to-digital-trust.pdf
[1] https://www.information-age.com/how-5g-introduces-new-security-vulnerabilities-123483244/
[1] https://techcrunch.com/2019/06/12/ibm-brings-its-quantum-computer-program-to-16-african-universities/
[1] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=199689
[1] https://airbus-cyber-security.com/about/
[1] https://www.gzeromedia.com/the-graphic-truth-whos-hacking-whom-2638914966.html
[1] http://ey.com/GISS
[1] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=198269
[1] https://eandt.theiet.org/content/articles/2019/06/uk-more-vulnerable-than-ever-to-cyber-attacks-government-body-warns/

Top URLs in Tweet in G6:
[6] https://www.tripwire.com/state-of-security/security-data-protection/cisos-take-away-2019-dbir/#.XQID-z2Qdj0.twitter
[4] http://www.dss.mil/documents/ci/Summary_of_FY17_Industry_Reporting.pdf
[2] https://www.avanade.com/en/solutions/security-services/ciso-guide
[2] https://www.darkreading.com/threat-intelligence/the-cisos-drive-to-consolidation-/a/d-id/1334910
[2] https://www.exevi.com/soluciones/soporte-y-asesoramiento-ciso/
[2] https://www.helpnetsecurity.com/2019/06/13/ciso-board-reporting/
[2] https://www.briskinfosec.com/blogs/blogsdetail/Cyber-Security-Products-Vs-Cyber-Security-Services
[2] https://www.lastline.com/blog/impact-of-false-positives-on-breach-detection-system-accuracy/
[2] https://lnkd.in/hnif5a
[2] https://lnkd.in/bkhVr8U

Top URLs in Tweet in G7:
[8] https://www.youtube.com/watch?v=bnFOYyPWrO0&feature=youtu.be

[8] https://youtu.be/bnFOYyPWrO0
[3] https://www.secureworldexpo.com/industry-news/baltimore-ransomware-attack-2019#.XPuEePbTkhk.twitter
[2] https://www.youtube.com/watch?v=o4OELt286kY&feature=youtu.be

[2] https://cybersecurityventures.com/how-to-avoid-the-unintended-risks-of-digital-transformation/?utm_source=twitter&utm_medium=social&utm_campaign=corpcomms&utm_content=editorial
[2] https://www.itdigitalsecurity.es/whitepapers/content-download/e2cf7ea6-907b-4d3d-99e1-88a1d26cd0d4/cybersecurity-summit-2019.pdf?s=RA
[2] https://thecybersecurityplace.com/ciso-dos-and-donts-for-board-reporting/
[2] https://thecybersecurityplace.com/what-does-runtime-container-security-really-mean/
[2] https://lnkd.in/eEqk8m5
[2] http://www.idenhaus.com/9-cyber-security-questions-every-executive-should-ask/

Top URLs in Tweet in G8:
[11] https://www.peerlyst.com/posts/sap-abap-code-injection-alexander-polyakov?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[10] https://www.peerlyst.com/posts/a-ciso-looking-back-dear-younger-me-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/10-things-to-think-about-before-accepting-that-ciso-job-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[8] https://www.peerlyst.com/posts/less-than-crowdsourcing-greater-than-how-to-write-a-good-business-continuity-plan-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[7] https://www.peerlyst.com/posts/resource-free-comprehensive-information-security-policy-template-for-small-business-smb-sme-claus-cramon?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[6] https://www.peerlyst.com/posts/resource-how-to-avoid-data-breaches-and-lawsuits-a-manual-for-cisos-guurhart?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[6] https://www.peerlyst.com/posts/top-posts-about-email-security-on-peerlyst-an-email-security-wiki-peerlyst?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[6] https://www.peerlyst.com/posts/download-the-free-chief-information-security-officer-guide-magda-chelly-ph-d?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[5] https://www.peerlyst.com/posts/how-cisos-view-their-jobs-gary-hayslip-cissp-cisa-crisc-ccsk?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post
[5] https://www.peerlyst.com/posts/what-every-ciso-should-know-about-ddos-attacks?utm_source=twitter&utm_medium=social&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post

Top URLs in Tweet in G9:
[7] https://solutionsreview.com/endpoint-security/is-fileless-malware-the-future-and-can-it-be-stopped/
[5] https://www.theguardian.com/technology/2019/jun/14/cybersecurity-giant-symantec-plays-down-unreported-breach-of-test-data?utm_content=94130634&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725
[4] https://www.darkreading.com/threat-intelligence/the-cisos-drive-to-consolidation-/a/d-id/1334910
[4] https://www.darkreading.com/perimeter/cost-per-cyberattack-jumps-to-$46m-in-2019/d/d-id/1335008
[3] https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-ransomware-sewer-bills-20190617-story.html?utm_content=94365874&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725
[3] https://ziften.com/replace-your-anti-virus/?utm_campaign=2019Q2-avreplace&utm_medium=social&utm_source=twitter&utm_term=organic&utm_content=ebook
[3] https://securityboulevard.com/2019/06/women-in-cybersecurity-no-longer-an-anomaly
[2] http://www.cyberdefensemagazine.com/knowledge-is-power-confronting-the-intersection-of-digital-transformation-and-ddos-2/
[2] https://thehackernews.com/2019/06/improve-your-cybersecurity.html?utm_campaign=Feed%3A%20TheHackersNews%20%28The%20Hackers%20News%20-%20Cyber%20Security%20Blog%29&utm_content=94457738&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725
[2] https://www.wired.com/story/phishing-links-google-calendar-invites/?utm_content=94457809&utm_medium=social&utm_source=twitter&hss_channel=tw-2830775725

Top URLs in Tweet in G10:
[7] https://www.computing.co.uk/ctg/news/3077226/hackers-bug-bounties-top-ten-security-flaws
[6] https://www.youtube.com/watch?v=OO2IBlYy9Os&feature=youtu.be

[2] https://www.redhat.com/en/resources/container-security-openshift-cloud-devops-whitepaper?utm_medium=Email&utm_campaign=weekly&sc_cid=701f20000012sAeAAI
[2] https://elevateit.regfox.com/elevateit-dallas
[1] https://lnkd.in/gUZXB_h
[1] https://lnkd.in/fw4ZYVJ
[1] https://lnkd.in/gpXNjrD
[1] https://lnkd.in/fxsHVv4
[1] https://lnkd.in/fxWdKVZ
[1] https://lnkd.in/f5R8c2F

Top Domains
Top Domains in Tweet in Entire Graph:
[197] peerlyst.com
[137] lnkd.in
[124] scoop.it
[100] co.uk
[88] twitter.com
[83] helpnetsecurity.com
[77] youtube.com
[67] gartner.com
[63] medium.com
[53] aravo.com

Top Domains in Tweet in G1:
[101] scoop.it
[52] co.uk
[47] medium.com
[23] studynotesandtheory.com
[21] corixpartners.com
[17] aravo.com
[17] twitter.com
[16] helpnetsecurity.com
[16] nodexlgraphgallery.org
[15] lnkd.in

Top Domains in Tweet in G2:
[39] co.uk
[34] youtube.com
[28] lnkd.in
[24] teckedin.com
[21] forbes.com
[19] scoop.it
[17] helpnetsecurity.com
[11] twitter.com
[10] darkreading.com
[10] csoonline.com

Top Domains in Tweet in G3:
[15] lnkd.in
[10] twitter.com
[7] youtube.com
[7] cybersecuritynews.es
[5] cisoday.es
[4] helpnetsecurity.com
[4] gartner.com
[4] com.au
[4] tacticaledge.co
[3] medium.com

Top Domains in Tweet in G4:
[50] gartner.com
[15] itworldcanada.com
[10] altaassociates.com
[8] tripwire.com
[8] computerweekly.com
[8] f5.com
[7] ciodive.com
[7] radian6.com
[6] lmgsecurity.com
[6] securityintelligence.com

Top Domains in Tweet in G5:
[4] darkreading.com
[2] pwc.com
[2] nodexlgraphgallery.org
[1] information-age.com
[1] techcrunch.com
[1] airbus-cyber-security.com
[1] gzeromedia.com
[1] ey.com
[1] theiet.org
[1] gartner.com

Top Domains in Tweet in G6:
[31] lnkd.in
[6] tripwire.com
[6] gartner.com
[5] twitter.com
[5] dy.si
[4] youtube.com
[4] darkreading.com
[4] linkedin.com
[4] dss.mil
[3] helpnetsecurity.com

Top Domains in Tweet in G7:
[16] youtube.com
[10] youtu.be
[6] cybersecurityventures.com
[5] thecybersecurityplace.com
[3] lnkd.in
[3] secureworldexpo.com
[2] itdigitalsecurity.es
[2] idenhaus.com
[1] globbsecurity.com
[1] nodexlgraphgallery.org

Top Domains in Tweet in G8:
[185] peerlyst.com
[7] lnkd.in
[5] ibm.biz
[3] twitter.com
[2] nzzl.us
[2] checkpoint.com
[2] scoop.it
[1] cybertalk.org
[1] helpnetsecurity.com
[1] thecisocollective.com

Top Domains in Tweet in G9:
[18] 24by7security.com
[14] darkreading.com
[8] csoonline.com
[8] securityboulevard.com
[7] solutionsreview.com
[6] cyberdefensemagazine.com
[6] theguardian.com
[6] ziften.com
[5] medium.com
[5] wired.com

Top Domains in Tweet in G10:
[11] lnkd.in
[7] co.uk
[6] youtube.com
[2] redhat.com
[2] regfox.com
[2] twitter.com
[1] arstechnica.com
[1] ssidecisions.com
[1] cisecurity.org
[1] peerlyst.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2816] ciso
[1738] cybersecurity
[952] infosec
[751] security
[652] cio
[236] cto
[202] leadership
[200] ai
[196] gartnersec
[167] gdpr



Top Hashtags in Tweet in G1:
[615] cybersecurity
[565] ciso
[330] infosec
[326] security
[240] cio
[177] leadership
[157] cto
[105] tech
[99] management
[70] cyber

Top Hashtags in Tweet in G2:
[483] ciso
[451] cybersecurity
[132] security
[119] infosec
[95] cio
[56] ai
[48] vciso
[35] virtualciso
[33] technology
[33] vcso

Top Hashtags in Tweet in G3:
[243] ciso
[59] cybersecurity
[50] cisoday19
[31] security
[25] infosec
[23] ciberseguridad
[21] gartnersec
[12] cio
[12] ceo
[7] gdpr

Top Hashtags in Tweet in G4:
[202] ciso
[128] gartnersec
[97] security
[87] cybersecurity
[46] infosec
[41] risk
[24] it
[21] cio
[18] automation
[14] cloud

Top Hashtags in Tweet in G5:
[46] cybersecurity
[33] ai
[27] dl
[27] artificialintelligence
[26] emergingtechnologies
[26] digital
[26] machinelearning
[25] ciso
[19] france
[19] pas19

Top Hashtags in Tweet in G6:
[145] ciso
[41] cybersecurity
[37] cio
[32] security
[20] infosec
[10] gartnersec
[9] ceo
[7] business
[6] cfo
[6] cdo

Top Hashtags in Tweet in G7:
[86] ciso
[24] cybersecurity
[19] cio
[17] fortinet
[14] asktheciso
[10] infosec
[8] passwords
[7] innovation
[6] security
[6] digitalrisk

Top Hashtags in Tweet in G8:
[238] ciso
[49] infosec
[43] blueteam
[34] cybersecurity
[11] sapsecurity
[11] sap
[11] hackers
[8] bcp
[8] python
[7] encryption

Top Hashtags in Tweet in G9:
[135] ciso
[75] infosec
[60] cybersecurity
[57] cio
[31] security
[31] datasecurity
[28] business
[27] cdo
[27] dataprotection
[19] devops

Top Hashtags in Tweet in G10:
[36] ciso
[35] cybersecurity
[34] infosec
[18] malware
[18] security
[14] cybercrime
[11] dfw
[10] ransomware
[9] dfir
[9] zerotrust

Top Words
Top Words in Tweet in Entire Graph:
[2854] Words in Sentiment List#1: Positive
[2192] Words in Sentiment List#2: Negative
[5] Words in Sentiment List#3: Angry/Violent
[93409] Non-categorized Words
[98455] Total Words
[2790] #ciso
[1738] #cybersecurity
[1100] gt
[952] #infosec
[752] #security

Top Words in Tweet in G1:
[840] gt
[615] #cybersecurity
[564] #ciso
[330] #infosec
[326] #security
[240] #cio
[203] corix_jc
[177] #leadership
[174] security
[167] transform_sec

Top Words in Tweet in G2:
[474] #ciso
[451] #cybersecurity
[212] ciso
[150] security
[136] gt
[133] #security
[129] virtual
[119] #infosec
[95] #cio
[79] more

Top Words in Tweet in G3:
[241] #ciso
[59] #cybersecurity
[50] #cisoday19
[41] security
[41] cisos
[31] ciso
[31] #security
[25] #infosec
[24] evento
[23] #ciberseguridad

Top Words in Tweet in G4:
[201] #ciso
[128] #gartnersec
[110] gartner
[97] #security
[95] 2019
[87] #cybersecurity
[83] security
[79] gartner_it
[64] more
[58] read

Top Words in Tweet in G5:
[67] stephanenappo
[46] #cybersecurity
[33] top
[33] #ai
[28] mikequindazzi
[28] learn
[27] critical
[27] gt
[27] #dl
[27] #artificialintelligence

Top Words in Tweet in G6:
[140] #ciso
[45] security
[41] #cybersecurity
[37] #cio
[32] #security
[20] #infosec
[17] ciso
[16] more
[16] 2019
[12] gt

Top Words in Tweet in G7:
[86] #ciso
[29] cybersecuritysf
[24] #cybersecurity
[24] watch
[22] bret
[22] arsenault
[19] #cio
[18] sponsored
[18] microsoft
[17] #fortinet

Top Words in Tweet in G8:
[236] #ciso
[55] ghayslip
[53] peerlyst
[51] guide
[49] #infosec
[45] security
[43] #blueteam
[36] good
[34] #cybersecurity
[29] more

Top Words in Tweet in G9:
[135] #ciso
[75] #infosec
[60] #cybersecurity
[57] #cio
[33] security
[31] #security
[31] #datasecurity
[28] #business
[27] #cdo
[27] #dataprotection

Top Words in Tweet in G10:
[35] #cybersecurity
[34] #ciso
[34] #infosec
[18] #malware
[18] #security
[16] mclynd
[14] #cybercrime
[13] technology
[11] archonsec
[11] #dfw

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[308] gt,gt
[269] #ciso,#cio
[206] #cybersecurity,#ciso
[200] #ciso,#cybersecurity
[172] #cio,#ciso
[164] #cybersecurity,#infosec
[159] #cio,#cto
[153] #infosec,#ciso
[132] #infosec,#cybersecurity
[117] virtual,ciso

Top Word Pairs in Tweet in G1:
[214] gt,gt
[141] #ciso,#cio
[115] #cio,#cto
[89] #security,#infosec
[71] #leadership,#management
[69] #cybersecurity,#infosec
[60] #cybersecurity,#security
[57] #cybersecurity,lost
[55] #ciso,#cybersecurity
[51] lost,decade

Top Word Pairs in Tweet in G2:
[112] virtual,ciso
[70] #cybersecurity,#ciso
[59] #ciso,#cybersecurity
[44] #cio,#ciso
[36] #cybersecurity,#security
[36] looking,possibly
[36] possibly,engaging
[36] greg,schaffer
[35] gt,gt
[35] look,virtual

Top Word Pairs in Tweet in G3:
[18] figura,#ciso
[13] mayor,evento
[10] torno,figura
[10] manuel,barrios
[9] check,out
[8] evento,españa
[8] presente,futuro
[8] futuro,figura
[8] #ciso,análisis
[8] análisis,hoy

Top Word Pairs in Tweet in G4:
[55] #gartnersec,#ciso
[52] read,more
[44] #ciso,#cybersecurity
[44] gartner,analyst
[43] 2019,read
[34] security,risk
[34] shares,top
[31] #security,#risk
[31] live,#gartnersec
[27] gartner,analysts

Top Word Pairs in Tweet in G5:
[26] 11,#emergingtechnologies
[26] #emergingtechnologies,top
[26] top,level
[26] level,executives
[26] executives,critical
[26] critical,few
[26] few,confident
[26] confident,#cybersecurity
[26] #cybersecurity,#digital
[26] nowthisnews,#artificialintelligence

Top Word Pairs in Tweet in G6:
[12] #cio,#ciso
[10] #ciso,#cio
[8] gt,gt
[8] #cybersecurity,#ciso
[7] #ciso,#security
[7] security,incidents
[7] #ciso,#cybersecurity
[6] information,security
[6] approximately,56
[6] 56,percent

Top Word Pairs in Tweet in G7:
[22] bret,arsenault
[13] #asktheciso,series
[13] series,sponsored
[13] sponsored,#fortinet
[11] hear,more
[11] cybercrime,magazine
[11] #fortinet,bret
[11] arsenault,#ciso
[11] #ciso,microsoft
[11] #cio,#ciso

Top Word Pairs in Tweet in G8:
[35] #ciso,#blueteam
[27] #infosec,#ciso
[14] #ciso,needs
[14] guide,#ciso
[13] cybersecurity,seen
[13] seen,#ciso
[13] #ciso,perspective
[13] perspective,complex
[13] complex,here's
[13] overview,ghayslip

Top Word Pairs in Tweet in G9:
[40] #ciso,#cio
[27] #cdo,#ciso
[26] #datasecurity,#dataprotection
[25] #dataprotection,#infosec
[25] #infosec,#business
[24] #security,#datasecurity
[23] #cio,#security
[14] #cio,#ciso
[13] #cybersecurity,#infosec
[12] #cybersecurity,#ciso

Top Word Pairs in Tweet in G10:
[12] #infosec,#cybersecurity
[11] #dfw,technology
[11] technology,summit
[9] #cybersecurity,#ciso
[9] #cybersecurity,#dfir
[9] key,elevating
[9] elevating,overall
[9] overall,#security
[9] everyone,take
[9] take,#zerotrust

Top Replied-To
Top Replied-To in Entire Graph:
@privacypros
@xforcered
@gartner_it
@vulsecllc
@alaricaloor
@cioamaro
@techievicky
@javiercao
@microsofthelps
@telegram

Top Replied-To in G1:
@telegram
@matrix42_global
@drjdrooghaag
@corix_jc
@smr_foundation

Top Replied-To in G2:
@microsofthelps
@isc

Top Replied-To in G3:
@rsayar
@cso_australia
@csoonline
@ciscolive
@anncavoukian
@snakeyesv1
@javitobal
@tixeo

Top Replied-To in G4:
@gartner_it
@pfirstbrook
@attivonetworks
@gartner_inc

Top Replied-To in G8:
@xforcered

Top Replied-To in G10:
@alaricaloor
@cioamaro
@aghiathchbib
@360totalsec
@simon_t_gibbard
@infosecresource
@netconnectnyc
@hacker_combat
@alcgroup
@ciscoumbrella

Top Mentioned
Top Mentioned in Entire Graph:
@corix_jc
@transform_sec
@corixpartners
@stephanenappo
@gartner_it
@beyondtrust
@peerlyst
@ghayslip
@24by7security
@aravo

Top Mentioned in G1:
@corix_jc
@transform_sec
@corixpartners
@cybertalkldn
@karla_reffold
@stephanenappo
@thomas_harrer
@medium
@sectest9
@aravo

Top Mentioned in G2:
@transform_sec
@cisoinspired
@corix_jc
@corixpartners
@vcisoservices
@auguryit
@tryteckedin
@24by7security
@sasigevents
@gavriels1

Top Mentioned in G3:
@securitycurrent
@cybersecurityes
@drodriguezleal
@smart_hc
@bobzukis
@sumologic
@khelan
@abinbev
@geo112revista
@fintonic

Top Mentioned in G4:
@gartner_it
@gartner_inc
@pfirstbrook
@bethschumae
@katellit
@f5security
@f5labs
@breed0
@davemahdi
@itworldca

Top Mentioned in G5:
@stephanenappo
@mikequindazzi
@nowthisnews
@topcybernews
@thomas_harrer
@atulpan75718596
@ipfconline1
@nodexl
@ronald_vanloon
@chboursin

Top Mentioned in G6:
@briskinfosec
@stevesanders7
@attomushq

Top Mentioned in G7:
@cybersecuritysf
@microsoft
@rsasecurity
@fortinet
@pquade_ciso
@cdmmedia
@nyit
@steveschlarman
@cybersecuritypl

Top Mentioned in G8:
@ghayslip
@peerlyst
@chrishinfosec
@sh2kerr
@m49d4ch3lly
@thedawidbalut
@belevgevgeny
@xforcered
@checkpointsw
@notasecguru

Top Mentioned in G9:
@zifteninc
@24by7security
@darkreading
@securityblvd
@guardian
@cyberdefensemag
@matthias_by
@egnyte
@infosecuritymag
@solution_r

Top Mentioned in G10:
@mclynd
@archonsec
@robmay70
@elevate_it
@bsmuir
@drjdrooghaag
@pvynckier
@chuckdbrooks
@m49d4ch3lly
@clarinette02

Top Tweeters
Top Tweeters in Entire Graph:
@sectest9
@cyberdomain
@nosqldigest
@evankirstel
@techl0g
@aldoceccarelli
@chidambara09
@ottlegalrebels
@netminnow
@guardian

Top Tweeters in G1:
@sectest9
@netminnow
@aaroncuddeback
@lovetogive2
@williamhill
@letat_lechat
@santchiweb
@justeatuk
@andrewmorrisuk
@machinelearn_d

Top Tweeters in G2:
@chidambara09
@fintechna
@calcaware
@microsofthelps
@windows
@cnet
@ham_gretsky
@zdnet
@forbes
@fanfare100

Top Tweeters in G3:
@orange_es
@wsj
@rockpapermoon
@ciscolive
@sudigitallawyer
@mitsmr
@maupanas
@ceerreocee
@chemaalonso
@pmenonkp

Top Tweeters in G4:
@vishne0
@lucasoft_co_uk
@unix_guru
@jc_vazquez
@arpanetbot
@tripwireinc
@lynngr
@thesp0nge
@johndmeyer
@csocintel

Top Tweeters in G5:
@cyberdomain
@ramikantari
@reuters
@ajmuguia
@wef
@jblefevre60
@nowthisnews
@techpearce2
@deserthawk09
@crytpoinfo

Top Tweeters in G6:
@martinabutters
@osint_sec
@wlassalle
@renerobichaud
@nuharbor
@devopsdotcom
@vanrijmenam
@stevesanders7
@ier_network_com
@girardmaxime33

Top Tweeters in G7:
@office
@linuxmil
@bowling23
@it_connection
@tamaramccleary
@cleardiff
@cybersecupdate
@bankinter
@azure
@idenhaus

Top Tweeters in G8:
@ottlegalrebels
@claushoumann
@kim_crawley
@gagnelegal
@whenonkstreet
@2ndleprechaun
@peerlyst
@belevgevgeny
@uk_daniel_card
@limorelbaz

Top Tweeters in G9:
@guardian
@releaseteam
@wired
@scmagazine
@homesatmetacoda
@informationweek
@infosecuritymag
@edgar_villegas
@securityweek
@mathewcostello

Top Tweeters in G10:
@gvalan
@securityblog
@mclynd
@clarinette02
@archonsec
@avrohomg
@epicrelevance
@jbarbosapr
@drjdrooghaag
@chuckdbrooks


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.