Information Security Speakers
You've got a tech-focused event coming up, but every speaker pitch sounds the same. Buzzwords. Acronyms. Zero audience connection.
You're not just looking for someone with credentials. You want someone who can actually hold a room and make information security feel real, urgent, and maybe even a little exciting.
But how do you find the right information security speakers for your podcast, conference, or livestream?
This guide zeroes in on exactly that. We'll show you what makes a great information security speaker, what kinds of events they thrive in, and how to know if they're the right fit for your audience.
I've seen how much better tech events are when the speaker actually knows how to translate complex topics into real-world impact.
Whether you're booking for a startup summit or a cybersecurity podcast, these information security speakers know their stuff - and know how to deliver it.
Take a look through the list and find someone worth booking for your next event.
Top Information Security Speakers List for 2025
Chris Parker
Guarding Your Privacy, Securing Your Digital Life
Jim Bradfield
Empowering your connectivity with innovative wireless solutions worldwide.
Dane Deutsch
Empowering leaders to excel through character-driven leadership
Pete Canavan
I am the Safety Sensei and I will make you safer and more secure in minutes, not months!
René-Sylvain Bédard
I help small and medium business achieve growth and compliance through cybersecurity.
Fred Simpson
Stay One Step Ahead of Scammers – Secure Your Digital World.
Andrew Townley
I help the Global 500 build effective, value-driven security programs starting from business outcomes, not technology or threats.
Chris Miller
Tech gadget and social media privacy enthusiast, reviewer and commentator
Harry Taheem
Cyber Security Professional, Career coach, loves digging into the business and investment worlds. Always looking to share my experiences.
What Makes a Great Information Security Speaker
What sets them apart is their ability to connect. They read the room, adapt their delivery, and use analogies that stick. A great speaker might compare a zero-day exploit to a thief finding a hidden door in your house that no one knew existed. That kind of imagery makes the topic memorable.
But it's not just about storytelling. The best speakers also bring credibility. They've worked in the trenches-maybe for a Fortune 500 company, a government agency, or a fast-moving startup. They've seen the evolution of threats firsthand and can speak to trends with authority.
And finally, they inspire action. Whether it's a keynote at a tech conference or a guest spot on a podcast, they leave the audience thinking differently about their digital habits. They don't just inform-they motivate. That's the difference between a decent speaker and a great one in this space.
How to Select the Best Information Security Speaker for Your Show
1. Define Your Audience and Goals
- Know who you're talking to. Are they small business owners, enterprise IT leaders, or everyday users?
- Clarify your objective. Are you aiming to educate, entertain, or spark debate? This will shape the tone and depth of the speaker's content.
2. Search on Trusted Platforms
- Use Talks.co to browse vetted speakers with experience in cybersecurity. You can filter by topic, industry, and even speaking style.
- Check speaker directories like SpeakerHub or LinkedIn Events. Look for those with recent speaking engagements and solid testimonials.
3. Review Their Content
- Watch past talks. Look for clarity, charisma, and the ability to simplify complex ideas.
- Read their articles or blog posts. Are they thought leaders or just repeating headlines?
4. Evaluate Fit and Relevance
- Check industry alignment. A speaker who specializes in healthcare cybersecurity might not be the best fit for a fintech audience.
- Assess cultural resonance. If your audience is global, make sure the speaker can connect across regions and norms.
5. Reach Out and Ask Questions
- Use their Talks.co speaker page to contact them directly or through their agent.
- Ask about customization. Can they tailor their message to your audience's needs?
6. Confirm Logistics
- Time zones, tech setup, and format. Make sure they're comfortable with your platform-whether it's Zoom, StreamYard, or a live stage.
By following these steps, you'll land a speaker who not only knows their stuff but also knows how to deliver it in a way your audience will remember.
How to Book a Information Security Speaker
1. Start with a Shortlist
- Use platforms like Talks.co to build a list of potential speakers. Look for those with relevant experience, strong delivery, and audience alignment.
- Check their speaker page for availability, topics, and testimonials.
2. Reach Out with a Clear Ask
- Send a concise message outlining your event, audience, format (live, virtual, hybrid), and what you're hoping they can bring to the table.
- Include your preferred dates and times, and ask about their availability.
3. Discuss Customization and Expectations
- Ask if they can tailor their talk to your audience's industry or region. For example, a speaker addressing cybersecurity in Latin America might highlight different threat vectors than one speaking to a U.S.-based SaaS company.
- Clarify expectations around interactivity, Q&A, and tech setup.
4. Confirm Fees and Deliverables
- Some speakers charge a flat fee, others may offer a package that includes pre-event promotion or post-event content.
- Be upfront about your budget. Many speakers are flexible, especially for virtual events or nonprofit causes.
5. Lock It In
- Once both sides agree, send a simple agreement outlining the date, time, topic, format, and payment terms.
- Use scheduling tools like Calendly to finalize the slot.
6. Prep and Promote
- Share promotional materials with the speaker so they can help spread the word.
- Schedule a tech check if needed, especially for virtual events.
Done right, booking a speaker is less about paperwork and more about partnership. Keep the process human, clear, and collaborative.
Common Questions on Information Security Speakers
What is a information security speaker
These speakers might come from a variety of backgrounds. Some are ethical hackers who've spent their careers identifying vulnerabilities in systems. Others are CISOs (Chief Information Security Officers) who've led security teams at major corporations. Some are researchers, educators, or even journalists who focus on digital threats and data protection.
What makes them unique is their ability to communicate. While a cybersecurity engineer might be brilliant at writing code to detect malware, a speaker in this space knows how to explain that process in a way that resonates with a non-technical audience. They use analogies, real-world examples, and storytelling to make the topic accessible.
You'll find information security speakers at conferences like RSA, Black Hat, or DEF CON, but also on podcasts, webinars, and virtual summits. Their role is not just to inform, but to engage and empower people to take action on digital safety.
So when someone says they're a information security speaker, they're not just talking about firewalls and phishing. They're helping people understand how to protect themselves-and their organizations-in an increasingly digital world.
Why is a information security speaker important
In today's hyperconnected world, cybersecurity isn't just an IT issue. It's a business issue, a legal issue, and a human issue. A skilled speaker in this field helps organizations and individuals understand the stakes. They explain how a phishing email can lead to a multi-million dollar loss, or how poor password hygiene can compromise an entire supply chain.
But beyond the scare tactics, these speakers offer solutions. They educate audiences on best practices, emerging threats, and evolving regulations like GDPR or CCPA. For example, a speaker might walk a room of small business owners through how to implement two-factor authentication or train staff to spot social engineering attacks.
They also play a key role in shaping culture. In many companies, security is seen as a blocker-something that slows down innovation. A great speaker can shift that mindset, showing how security can actually enable growth by building trust with customers and partners.
Whether it's a keynote at a fintech summit or a guest spot on a startup podcast, a information security speaker brings clarity to a topic that's often misunderstood. And in a world where digital threats are only increasing, that clarity is not just helpful-it's essential.
What do information security speakers do
1. Educate Diverse Audiences. They translate technical jargon into plain language. Whether it's a boardroom of executives or a classroom of students, they tailor their message to the audience's level of understanding.
2. Raise Awareness About Threats. From ransomware to zero-day exploits, they highlight current and emerging risks. For example, a speaker might explain how deepfake technology is being used in phishing scams or how AI is changing the threat landscape.
3. Offer Practical Solutions. They don't just point out problems-they suggest fixes. This could include recommending password managers, outlining secure development practices, or explaining compliance frameworks like ISO 27001.
4. Inspire Cultural Change. In many organizations, security is an afterthought. Speakers help shift that mindset by showing how proactive security can protect brand reputation and customer trust.
5. Contribute to Policy and Strategy. Some speakers consult with governments or corporations to shape cybersecurity policies. They bring insights from the field into strategic planning sessions.
6. Engage Across Platforms. They appear at conferences, on podcasts, in webinars, and even on YouTube. Their goal is to meet audiences where they are-whether that's in a corporate training session or scrolling through LinkedIn.
In short, information security speakers are communicators, educators, and advocates. They help people understand not just what the risks are, but what they can do about them.
How to become a information security speaker
1. Build Deep Expertise in Cybersecurity
- You can't fake this. Whether you're a penetration tester, CISO, or ethical hacker, your credibility starts with real-world experience.
- Stay current with certifications like CISSP, CEH, or OSCP.
- Follow threat intelligence feeds, read whitepapers, and contribute to open-source security tools or research.
2. Define Your Niche and Message
- Are you focused on ransomware defense, cloud security, or social engineering? Pick a lane.
- Craft a signature talk that solves a specific problem or offers a unique insight. For example, "How AI Is Changing Phishing Tactics" or "Zero Trust for Remote Teams".
3. Create a Speaker Page
- Use platforms like Talks.co to build a professional speaker profile. Include your bio, topics, testimonials, and a short video clip.
- Make it easy for event organizers to see your value and book you.
4. Start Small, Then Scale
- Apply to speak at local meetups, university events, or virtual summits.
- Record your talks and use them to pitch larger conferences like Black Hat, DEF CON, or RSA.
5. Network with Hosts and Other Speakers
- Use Talks.co to connect with event organizers and fellow experts.
- Join LinkedIn groups, attend speaker mixers, and offer to be a panelist or moderator.
6. Keep Improving
- Ask for feedback after every talk.
- Watch recordings of top speakers and study their delivery, slides, and audience engagement.
Becoming an information security speaker is a mix of expertise, storytelling, and visibility. Start where you are and build from there.
What do you need to be a information security speaker
1. Technical Credibility
You need a solid foundation in cybersecurity. That could come from years of experience in roles like security analyst, penetration tester, or CISO. Certifications like CISSP, CISM, or OSCP help validate your expertise, especially when pitching to high-profile events.
2. Communication Skills
Public speaking is a skill, not a talent. You need to be able to explain zero-day vulnerabilities to non-technical executives or walk through a ransomware kill chain with fellow experts. Practice is key. Toastmasters, speaker coaching, or even recording yourself can help.
3. A Clear Personal Brand
What makes you different? Maybe you specialize in healthcare cybersecurity or focus on nation-state threats. Define your niche and build a consistent message across your Talks.co speaker page, LinkedIn, and other platforms.
4. A Digital Footprint
Event organizers want to see you in action. Post short clips of your talks, write LinkedIn articles, or contribute to podcasts. Talks.co is a great place to centralize all this and connect with hosts looking for speakers.
5. A Willingness to Engage
Speaking is more than delivering a keynote. It's about engaging with your audience before, during, and after the event. Answer questions, join panels, and be active on social media.
So, what do you need to be an information security speaker? A mix of credibility, clarity, and connection. And a platform like Talks.co to help you get discovered.
Do information security speakers get paid
Paid vs. Unpaid Gigs
- Corporate Conferences: These often have budgets for keynote speakers, especially if you're well-known or bring a unique angle.
- Community Events & Meetups: These are usually unpaid, but they offer exposure and networking.
- Virtual Summits: Payment varies. Some offer speaker fees, others offer affiliate commissions or free access.
Factors That Influence Payment
- Reputation: If you're a published author or have spoken at DEF CON, you're more likely to get paid.
- Topic Relevance: Hot topics like ransomware, AI in security, or zero trust architecture tend to attract higher fees.
- Audience Size: Speaking to 5,000 CISOs at a global summit? That's a different ballgame than a local workshop.
Data Snapshot
Event Type | Typical Pay Range |
---|---|
Local Meetup | $0 - $200 |
Regional Conference | $500 - $2,000 |
National Tech Summit | $2,000 - $10,000 |
Corporate Keynote | $5,000 - $25,000+ |
How do information security speakers make money
1. Speaking Engagements
This is the most direct method. Speakers are paid to deliver keynotes, workshops, or panels at conferences, corporate events, and government summits. Fees vary based on experience, topic, and event scale.
2. Consulting and Advisory Services
Many speakers use their stage presence to attract consulting clients. After a talk, companies often approach them for help with audits, training, or incident response planning.
3. Online Courses and Webinars
Platforms like Udemy, Teachable, or even private webinars can be lucrative. Speakers package their knowledge into courses and sell them to individuals or enterprises.
4. Affiliate and Sponsorship Deals
Some speakers partner with cybersecurity vendors. They might mention tools or services during talks and earn affiliate income. Others get sponsored to speak at vendor-hosted events.
5. Books and Publications
Publishing a book on cybersecurity can open doors to paid speaking gigs and consulting. It also adds authority to your Talks.co speaker page.
6. Virtual Summits and Revenue Sharing
On platforms like Zoom, speakers can participate in summits that offer revenue sharing based on ticket sales, affiliate links, or upsells.
Comparison Table
Revenue Stream | Passive or Active | Typical Range |
---|---|---|
Speaking Fees | Active | $500 - $25,000+ |
Consulting | Active | $150 - $500/hour |
Online Courses | Passive | $1,000 - $10,000/month |
Sponsorships/Affiliates | Passive | Varies widely |
Book Sales | Passive | $500 - $5,000/month |
How much do information security speakers make
Entry-Level Speakers
- These are professionals just starting out, often speaking at local meetups, webinars, or small conferences.
- Typical pay: $0 to $1,000 per event.
- Many use these gigs to build their profile and get testimonials.
Mid-Level Speakers
- These speakers have a few years of experience, maybe a published book or a strong LinkedIn following.
- Typical pay: $1,000 to $5,000 per event.
- They often supplement income with consulting or training gigs.
High-Profile Speakers
- Think keynote speakers at RSA, Black Hat, or corporate summits.
- Typical pay: $5,000 to $25,000+ per event.
- Some also earn from book deals, online courses, and sponsored content.
Annual Income Estimates
Speaker Tier | Events/Year | Estimated Annual Income |
---|---|---|
Entry-Level | 10-20 | $5,000 - $20,000 |
Mid-Level | 20-30 | $30,000 - $100,000 |
High-Profile | 30+ | $100,000 - $500,000+ |
How much do information security speakers cost
1. Type of Event
- Local Meetups & Community Events: Often free or under $500. Many speakers volunteer to build their brand.
- Corporate Workshops: These are more hands-on and can range from $2,000 to $10,000 depending on duration and customization.
- Keynote Speeches at Conferences: Expect to pay anywhere from $5,000 to $25,000+ for a well-known name.
2. Speaker Experience
- New Speakers: $500 - $2,000. Great for niche topics or internal training.
- Established Experts: $2,000 - $10,000. These speakers often have books, media appearances, or a Talks.co profile.
- Celebrity Speakers: $15,000 - $50,000+. Think Bruce Schneier or Kevin Mitnick.
3. Format and Location
- Virtual Events: Typically 30-50% cheaper than in-person due to no travel or lodging.
- In-Person Events: Add travel, accommodation, and per diem costs.
Sample Budget Table
Speaker Type | Virtual Fee | In-Person Fee |
---|---|---|
New Speaker | $500 | $1,000 - $2,000 |
Mid-Level Expert | $2,000 | $5,000 - $10,000 |
High-Profile Speaker | $5,000 | $15,000 - $25,000+ |
Who are the best information security speakers ever
- Bruce Schneier: Often called the 'security guru', Schneier has authored over a dozen books and is known for making complex security topics accessible.
- Kevin Mitnick: Once the world's most wanted hacker, Mitnick turned his life around and became a bestselling author and high-demand speaker.
- Mikko Hyppönen: Chief Research Officer at WithSecure, Mikko is known for his TED talks and global advocacy for digital rights.
- Katie Moussouris: A pioneer in vulnerability disclosure and bug bounty programs, Katie is a powerful voice in ethical hacking.
- Dan Kaminsky: The late security researcher who discovered a critical DNS flaw in 2008. His talks were legendary for both clarity and depth.
- Eva Galperin: Director of Cybersecurity at EFF, she's known for her work on spyware and digital privacy, especially in authoritarian regimes.
- Troy Hunt: Creator of Have I Been Pwned, Troy is a frequent speaker on data breaches and password security.
- Brian Krebs: While more of a journalist, his investigative work has made him a sought-after speaker on cybercrime.
- Harri Hursti: Known for exposing vulnerabilities in voting machines, Harri's talks blend technical insight with civic urgency.
- Joanna Rutkowska: Creator of Qubes OS, she's respected for her deep knowledge of operating system security.
These speakers have not only educated but also influenced policy, product design, and public awareness around cybersecurity.
Who are the best information security speakers in the world
- Keren Elazari (Israel): A TED speaker and cybersecurity analyst, Keren brings a unique blend of hacker culture and policy insight.
- Chris Roberts (USA): Known for his controversial research on aviation security, Chris is a dynamic speaker who challenges norms.
- Raj Samani (UK): Chief Scientist at Rapid7, Raj is a frequent keynote speaker at global conferences and a strong advocate for public-private collaboration.
- Magda Chelly (Singapore): A leader in cyber risk and diversity in tech, Magda speaks across Asia and Europe on CISO leadership and digital trust.
- Jaya Baloo (Netherlands): Former CISO of Avast, Jaya is known for her engaging talks on quantum security and future threats.
- Allan Liska (USA): A ransomware expert at Recorded Future, Allan is a go-to speaker for practical insights on threat intelligence.
- Lisa Forte (UK): Co-founder of Red Goat Cyber Security, Lisa is known for her storytelling approach to social engineering and insider threats.
- Dr. Alissa Abdullah (USA): Former White House Deputy CIO, Dr. Abdullah brings a high-level perspective on government cybersecurity.
- Mohammed Al-Kuwaiti (UAE): Head of Cybersecurity for the UAE Government, he speaks on national security and international cooperation.
- Eva Chen (Taiwan): CEO of Trend Micro, Eva is a rare example of a cybersecurity executive who also speaks regularly on global stages.
These speakers are not only experts in their field but also skilled communicators who can engage audiences from boardrooms to developer meetups.
Common myths about information security speakers
1. Myth: Information security speakers are only relevant to tech conferences.
This couldn't be further from the truth. While cybersecurity is deeply rooted in tech, the topics information security speakers cover are increasingly relevant to healthcare, finance, education, and even entertainment. For example, a speaker at a healthcare summit might focus on HIPAA compliance and patient data protection, while someone at a film industry event could address digital piracy and intellectual property theft.
2. Myth: You need to be a hacker or coder to be an information security speaker.
Nope. Many successful speakers in this space come from policy, legal, or even communications backgrounds. What matters is your ability to translate complex security concepts into actionable insights for your audience. Think of Bruce Schneier: while he's a cryptographer, his talks are more about the human side of security than deep technical dives.
3. Myth: All information security speakers sound the same.
This stereotype comes from a handful of high-profile speakers who use similar jargon-heavy styles. But the field is full of variety. Some speakers focus on storytelling, others on live demos or case studies. For instance, Keren Elazari blends pop culture with cybersecurity, making her talks accessible and engaging for non-technical audiences.
4. Myth: You need to work for a big company to be taken seriously.
Independent experts, researchers, and even ethical hackers working solo have made huge waves on stage. In fact, many event organizers prefer speakers who aren't tied to corporate messaging. Their insights often feel more authentic and less filtered.
5. Myth: It's all doom and gloom.
While cybersecurity threats are serious, the best speakers know how to balance urgency with optimism. They offer solutions, not just problems. They inspire action rather than fear. That's what keeps audiences engaged and coming back for more.
Case studies of successful information security speakers
Then there's Mikko Hyppönen, the Finnish security expert who's been speaking for over two decades. His storytelling is legendary. At RSA Conference, he once walked the audience through the evolution of malware using real-world examples from the 80s to today. He didn't just talk about code. He talked about culture, geopolitics, and the psychology behind cybercrime. That's what made his message stick.
Closer to the startup world, consider Tanya Janca. She started out as a developer, then pivoted into security advocacy. Her talks are packed with practical advice for developers who want to build secure apps. She's spoken at OWASP, DevSecCon, and countless meetups. Her success came not from being the loudest voice, but from being the most relatable one. She built a community around her message.
And let's not forget the regional voices. In Nigeria, cybersecurity speaker Confidence Staveley has been raising awareness about digital safety for women and youth. Her work combines education, advocacy, and public speaking. She's proof that you don't need to be in Silicon Valley to make an impact.
These speakers didn't follow a single path. Some came from tech, others from advocacy or education. What they share is clarity, passion, and the ability to connect with audiences across industries and borders.
Future trends for information security speakers
- Hybrid and virtual keynotes are here to stay. Even as in-person events return, organizers are keeping digital formats. That means speakers need to master both stage presence and webcam charisma. Expect more interactive formats, like live Q&A, polls, and breakout sessions.
- Non-technical audiences are demanding more security content. From small business owners to school administrators, people outside of IT are realizing they need to understand cybersecurity. Speakers who can simplify complex ideas without dumbing them down will be in high demand.
- AI and privacy will dominate the conversation. With tools like ChatGPT and deepfakes becoming mainstream, audiences are hungry for guidance on how to protect data in an AI-driven world. Speakers who can address ethical, legal, and technical angles will stand out.
- Regional voices are gaining global traction. As more conferences go virtual, speakers from Africa, Southeast Asia, and Latin America are getting international exposure. This is opening up opportunities for diverse perspectives and localized insights.
- Storytelling is becoming a differentiator. The days of slide-heavy, jargon-filled talks are fading. Audiences want narratives they can relate to. Speakers who use real-world stories, analogies, and humor are more likely to be remembered and rebooked.
In short, the future belongs to speakers who are adaptable, audience-focused, and willing to evolve their message. Whether you're just starting out or already on the circuit, staying ahead of these trends will keep your content fresh and your calendar full.
Tools and resources for aspiring information security speakers
1. Talks.co. A smart platform that connects speakers with podcast hosts and event organizers. Perfect for getting your first few appearances or expanding into new niches.
2. CFP Land. Stay on top of open calls for proposals (CFPs) at security and tech conferences worldwide. Filter by region, topic, or deadline to find the right fit.
3. SpeakerHub. Create a speaker profile, list your topics, and get discovered by event planners. It also offers training resources and a speaker directory.
4. OWASP Chapters. Local OWASP meetups are a great place to test your material and get feedback from a technical audience. Many chapters welcome new speakers and offer mentorship.
5. Slidebean. If design isn't your thing, this tool helps you build clean, professional-looking slides fast. Great for making your message pop without spending hours in PowerPoint.
6. Cybersecurity Canon. A curated list of must-read books in the field. Use these to deepen your knowledge or cite credible sources in your talks.
7. Toastmasters International. Not security-specific, but invaluable for sharpening your public speaking skills. Many chapters now meet virtually, making it easy to join from anywhere.
8. YouTube Channels like Black Hat and DEF CON. Watching top-tier talks helps you study delivery styles, topic framing, and audience engagement. Take notes on what works and what doesn't.
Use these tools not just to get on stage, but to stay sharp, stay booked, and stay relevant. The more you invest in your craft, the more your message will resonate.