{"id":104922,"date":"2025-04-07T05:54:00","date_gmt":"2025-04-07T04:54:00","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=104922"},"modified":"2025-04-02T18:11:25","modified_gmt":"2025-04-02T17:11:25","slug":"greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/","title":{"rendered":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats"},"content":{"rendered":"\n<p>Greg van der Gaast is a pioneering <a href=\"https:\/\/ai-speakers-agency.com\/topics\/cybersecurity-speakers\">cybersecurity speaker<\/a> and thought leader known for his unconventional journey from infamous hacker to global security executive. <\/p>\n\n\n\n<p>With decades of experience spanning technical operations, leadership, and strategy, Greg challenges outdated security norms and advocates for business-aligned, human-centric approaches to cyber defence. <\/p>\n\n\n\n<p>We spoke with Greg to explore the lessons of his early hacking years, the persistent vulnerabilities still facing UK businesses, and how leadership in cybersecurity must evolve to drive meaningful, lasting impact.<\/p>\n\n\n\n<p><strong>Your early career as a hacker is widely known, and even labelled as infamous. How did those formative experiences shape your perspective on cybersecurity, and in what ways did they ultimately influence your transition into ethical hacking and cyber defence?<\/strong><\/p>\n\n\n\n<p>It\u2019s interesting because, in one way, it gave me an attention to detail around what causes breaches. But, somewhat strangely, I think what it influenced most was my defensive mindset.<\/p>\n\n\n\n<p>Back then, you built a computer, installed your operating system, and then joined a chat room full of hackers. We didn\u2019t have broadband or home routers. Your computer was directly connected to the Internet, and there were no firewalls yet.<\/p>\n\n\n\n<p>If you hadn\u2019t secured it \u2014 locked it down, patched everything, updated everything \u2014 hard drives still made noise back then, and about 30 seconds after joining that chat room, your hard drive would start making a lot of noise. Things would start shutting down, and you\u2019d have to reinstall Windows.<\/p>\n\n\n\n<p>So, oddly enough, that\u2019s probably what stuck with me the most \u2014 making absolutely sure that everything is properly locked down.<\/p>\n\n\n\n<p><strong>Businesses across all sectors are increasingly under threat from cyberattacks. In your view, what is the most significant and persistent cybersecurity threat facing UK organisations today? And why does it remain so difficult to address despite years of awareness?<\/strong><\/p>\n\n\n\n<p>Everyone will say ransomware, but ransomware is really just a payload \u2014 it\u2019s a way of monetising a breach. What\u2019s truly shocking is that the way companies get breached, the way attackers get in, hasn\u2019t fundamentally changed in the 25 years I\u2019ve been doing this.<\/p>\n\n\n\n<p>People are still not building systems properly. They\u2019re not maintaining them properly. They\u2019re still not doing asset inventories, they\u2019re not patching effectively, their processes are poor, and they lack consistency in how they operate. It\u2019s like living in a house with a thousand doors and windows, with several of them constantly being left open.<\/p>\n\n\n\n<p>That\u2019s how attackers get in.<\/p>\n\n\n\n<p>For large businesses and organisations, you need a holistic, business-aligned security approach \u2014 one that\u2019s genuinely proactive and integrated with how the business operates. That\u2019s how you come up with effective, sustainable ways of doing things, instead of relying on the current security status quo, which is essentially: \u2018just buy another tool\u2019.<\/p>\n\n\n\n<p><strong>Cybersecurity is often discussed in highly technical terms, but effective leadership in the field goes far beyond frameworks and compliance. In your experience, what defines true leadership in cybersecurity? And what\u2019s missing from how the industry currently approaches it?<\/strong><\/p>\n\n\n\n<p>I think leadership is leadership. It shouldn\u2019t be defined by cybersecurity specifically.<\/p>\n\n\n\n<p>I see so many leadership courses in cybersecurity focused on tech, frameworks, compliance \u2014 things like that. But I\u2019ve found that being able to have a proper, human conversation with an executive is incredibly refreshing for them.<\/p>\n\n\n\n<p>Speak in plain English. Don\u2019t be that really boring person no one wants to invite to dinner. You\u2019d be surprised how much more traction you get when you communicate clearly and openly.<\/p>\n\n\n\n<p>In security, we\u2019re often shielded because people don\u2019t really understand what we\u2019re talking about \u2014 we\u2019re the \u2018geeks\u2019. And when something goes wrong, no one wants to deal with us.<\/p>\n\n\n\n<p>I was at a conference a few years ago where boards were asked why they fund their security teams or give CISOs money. The most popular answer \u2014 at 35% \u2014 was simply to make them go away. Not because they\u2019d justified a strategy, approach, or ROI, but because they were seen as annoying or difficult to be around.<\/p>\n\n\n\n<p>I don\u2019t believe security should be treated purely as a cost centre \u2014 and I mean that beyond just risk. Security should provide value to the business \u2014 ideally, it should help generate more revenue than it consumes. And if you&#8217;re reducing risk in the process, that\u2019s a bonus.<\/p>\n\n\n\n<p><strong>Reflecting on your journey, from technical expertise to leadership at the board level, what is one piece of advice you would offer your younger self \u2014 or to others just starting out \u2014 to help them develop both professionally and personally in the cybersecurity space?<\/strong><\/p>\n\n\n\n<p>I\u2019ve had a hugely transformational journey. I suffered from what I call \u201cRockstar Syndrome\u201d at an early age \u2014 I was very technically strong, quite arrogant, highly certified, and doing lots of things.<\/p>\n\n\n\n<p>Eventually, I hit a point in my career where things became pretty dire. I thought, \u201cI may as well just give away everything I know.\u201d And that\u2019s when the real transformation happened \u2014 when I started sharing everything I knew, helping others without expecting anything in return.<\/p>\n\n\n\n<p>That\u2019s when the recognition started. People began to see that I actually knew what I was talking about. It automatically positioned me as an authority, and that changed everything. It opened the door to the leadership roles I now hold, working at the C-level and board level, leading my own teams.<\/p>\n\n\n\n<p>And my teams. They\u2019re not just colleagues. They\u2019re my people. They\u2019re like family. I love them to bits.<\/p>\n\n\n\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@ayrus_hill?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Ayrus Hill<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/persons-hand-on-blue-lighted-computer-keyboard-2fsDwu5Zza4?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Unsplash<\/a><\/p>\n\n\n\n<p>This interview with <a href=\"https:\/\/cyber-security-speakers.com\/speaker\/greg-van-der-gaast\">Greg van der Gaast<\/a> was conducted by <a href=\"https:\/\/motivationalspeakersagency.co.uk\/author\/mark-matthews\">Mark Matthews<\/a>.\u202f\u202f\u202f<\/p>\n\n\n\n<p><strong><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out&nbsp;<a target=\"_blank\" href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" rel=\"noreferrer noopener\">Cyber Security &amp; Cloud Expo<\/a>&nbsp;taking place in Amsterdam, California, and London.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Explore other upcoming enterprise technology events and webinars powered by TechForge&nbsp;<a target=\"_blank\" href=\"https:\/\/techforge.pub\/events\/\" rel=\"noreferrer noopener\">here<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Greg van der Gaast is a pioneering cybersecurity speaker and thought leader known for his unconventional journey from infamous hacker to global security executive. With decades of experience spanning technical operations, leadership, and strategy, Greg challenges outdated security norms and advocates for business-aligned, human-centric approaches to cyber defence. We spoke with Greg to explore the [&hellip;]<\/p>\n","protected":false},"author":57372,"featured_media":104925,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,1969,3],"tags":[185,1986],"ppma_author":[882],"class_list":["post-104922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-interviews","category-cloud-computing-security","tag-cybersecurity","tag-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats<\/title>\n<meta name=\"description\" content=\"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats\" \/>\n<meta property=\"og:description\" content=\"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-07T04:54:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Duncan MacRae\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan MacRae\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\"},\"author\":{\"name\":\"Duncan MacRae\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\"},\"headline\":\"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats\",\"datePublished\":\"2025-04-07T04:54:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\"},\"wordCount\":996,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg\",\"keywords\":[\"cybersecurity\",\"threats\"],\"articleSection\":[\"Cloud Computing\",\"Interviews\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\",\"name\":\"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg\",\"datePublished\":\"2025-04-07T04:54:00+00:00\",\"description\":\"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg\",\"width\":1920,\"height\":1281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\",\"name\":\"Duncan MacRae\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"caption\":\"Duncan MacRae\"},\"description\":\"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.\",\"sameAs\":[\"duncan@techforge.pub\"],\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats","description":"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/","og_locale":"en_GB","og_type":"article","og_title":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats","og_description":"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2025-04-07T04:54:00+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg","type":"image\/jpeg"}],"author":"Duncan MacRae","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Duncan MacRae","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/"},"author":{"name":"Duncan MacRae","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870"},"headline":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats","datePublished":"2025-04-07T04:54:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/"},"wordCount":996,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg","keywords":["cybersecurity","threats"],"articleSection":["Cloud Computing","Interviews","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/","name":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg","datePublished":"2025-04-07T04:54:00+00:00","description":"Exploring Greg van der Gaast\u2019s journey from hacker to cybersecurity executive, his insights on leadership, and the ongoing challenges businesses face in defending against evolving cyber threats.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/ayrus-hill-2fsDwu5Zza4-unsplash.jpg","width":1920,"height":1281},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/greg-van-der-gaast-former-hacker-cybersecurity-leadership-and-evolving-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Greg van der Gaast, former hacker: Cybersecurity leadership and evolving threats"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870","name":"Duncan MacRae","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","caption":"Duncan MacRae"},"description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.","sameAs":["duncan@techforge.pub"],"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/"}]}},"authors":[{"term_id":882,"user_id":0,"is_guest":1,"slug":"duncan1","display_name":"Duncan MacRae","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg"},"author_category":"","user_url":"","last_name":"MacRae","first_name":"Duncan","job_title":"Editor-in-Chief","description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/57372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=104922"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104922\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/104925"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=104922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=104922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=104922"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=104922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}