I Have Become a Security Twit

Maze.jpgAfter years of avoidance, I have given into Twitter.  Fearing the signal-to-noise ratio of valuable communication to worthless blithering, for many years I refused to become a ‘Twit’.  But now, at the relentless urging of my coworkers, industry associates, and information security blog followers I have created a Twitter account.  I have surely succumbed to the dark side of social communications.

For the record, I swear not to post what I eat for breakfast, how my kids scored in little league, or how many gray hairs have appeared since signing up.  …and will remove anyone who does something similar.

Instead, I will focus on my professional passion: cyber and information security.  Henceforth, I will use Twitter for good.  To communicate and blither about important things such as security strategy, metrics, knowing the attackers, proper risk assessments, and meaningful defense tactics.  And if I can embrace the horror of Twitter in the name of communicating and collaborating about security, then it will be worth every tweet, twit, or whatever 140 character or less mental nugget.

I blame my latest blog and video, where during a speaking engagement I pleaded with the audience of IT professionals to talk and share with each other their security experiences and reach out to the community to blog and yes, even Tweet.   Oh, what have I done…

@Matt_Rosenquist

Published on Categories Archive
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.