AttackIQ has appointed cybersecurity veteran Derek Whigham to its Advisory Board as a Senior Advisor. With over 30 years of experience, including his recent role as Chief Product Owner in the Chief Security Office at Lloyds Banking Group, Whigham will collaborate with AttackIQ’s leadership and product teams to advance Continuous Threat Exposure Management (CTEM) practices and help organizations measure, validate, and strengthen cyber defenses amid rapid technological evolution.
As enterprises grapple with accelerating threats, AI adoption, and the need to demonstrate effective defenses against real-world attacker tactics, Whigham’s extensive background in complex financial environments and emerging technologies positions him to provide strategic guidance. His insights will support AttackIQ’s mission to deliver evidence-based security outcomes through continuous validation of exposures against adversary behavior.
Whigham’s tenure at Lloyds Banking Group involved leading security strategy and operations in one of the world’s most demanding financial ecosystems. Combined with his advisory work at MITRE’s Center for Threat-Informed Defense and leadership at ISACA on AI and quantum risks, he brings deep knowledge of translating threat intelligence into operational confidence and measurable improvements.
Whigham’s advisory role will emphasize long-term product evolution, helping organizations pivot swiftly while preserving resilience. By focusing on continuous, adversary-validated testing, AttackIQ enables security teams to move beyond assumptions, prioritize high-impact risks, and optimize investments in an increasingly dynamic threat landscape.
AttackIQ is the industry’s leading Continuous Threat Exposure Management (CTEM) platform, enabling organizations to measure true exposure, prioritize risk, and disrupt real-world attack paths. By moving beyond static vulnerability data, AttackIQ operationalizes CTEM by continuously validating exposures against real adversary behavior and defensive controls. The platform connects vulnerabilities, configurations, identities, and detections into adversary-validated attack paths—quantifying the likelihood of attacker movement and impact. This evidence-based approach empowers security leaders to focus on what matters most, optimize defensive investments, and strengthen resilience through threat-informed, AI-driven security operations.