IMPORTANT FIGURES IN CYBERSECURITY

IMPORTANT FIGURES IN CYBERSECURITY
Introduction
As hackers become more competent, we need more and more cybersecurity professionals in the business to counteract black hat hackers. In areas such as Washington DC and Silicon Valley, the rise of jobs in the field of technology has influenced the entire landscape of cybersecurity as a whole. These places have become hubs of cybersecurity knowledge because of the private sector in Silicon Valley and the Governmental sector in Washington DC. With the rise of cybersecurity jobs and professionals, important figures have also risen to the forefront as powerful influencers in the industry. Certain people have the power to influence many prominent government officials in policies or legislation that is published. The purpose of this website is to give an overview of two of these people along with one major country that have significant influence in the cyber space.

Countermeasures to Threats
Russia
One of the biggest current problems in the realms of cyberspace is the problem we have with governments funding essentially public hacking organizations to do their dirty work for them. This applies most prevalently to Russia’s hacking attempts because their attempts are the most well-known and documented. They constantly attempt to mess with their neighbors such as Lithuania, Latvia, Estonia, Belarus, Ukraine, and others.
​
Ever since the fall of the Soviet Union, Russia has been attempting to reclaim its former glory, especially under the reign of Vladimir Putin. Putin has expanded the reach of Russia's hacking force considerably over the years, and they have become some of the most well-known hackers in the world. We need to expand our reach of cybersecurity professionals and counteract these Russian hackers as even the US, presumably one of the most advanced countries in the world, has had problems in the past with counteracting Russian hackers, as seen in the 2016 election.

“Because cyberspace is constantly evolving and the nefarious actors who operate within it are continually adapting, maintaining up-to-date information on cyber threats is an endless challenge"