How to be a Security Evangelist, Now and in the Future

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The role of a security evangelist may be among the most appealing in cybersecurity: you get the security of working for a vendor, you deal with the press, customers and are invited to speak at conferences and are not as accountable as a CEO. However, is the job really as rosy as it seems, and what sort of person has the attributes to fill such a role?

In this webinar we will look at the role of a security evangelist; hearing from those doing the job and get an understanding of what sort of experience and qualifications are required to become such a valued person both within a company and to the wider cybersecurity industry.

Key takeaways:

  • What are the daily duties in the life of a security evangelist?
  • Is there a job description for the role?
  • Are vendors now looking for this type of ‘all-rounder’?
  • What experience would a vendor typically require to appoint an evangelist?


Photo of Mark Crosbie

Mark Crosbie

Global Head of Trust and Privacy, Dropbox

Photo of Ryan Hausknecht

Ryan Hausknecht

Security Consultant and Analyst

Photo of Wendy Nather

Wendy Nather

Head of Advisory CISOs, Cisco

Photo of Gregory Parfitt

Gregory Parfitt

Application Security Specialist

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Infosecurity Magazine here: Please see Infosecurity Magazine’s privacy policy for more information.