This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
Journal Authors 2016


>> 2015 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.

Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.

Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.

Luther Martin
Silicon Valley Chapter

Crypto Corner; Why Risk Management Is Hard, Crypto Wars II, The Use and Misuse of Entropy

Luther Martin is a Distinguished Technologist at Hewlett Packard Enterprise.

Jason Paul Kazarian

Promoting Public Cloud Workload Security, Mobile Application Security

Jason Paul Kazarian is a Senior Architect for Hewlett Packard Enterprise and specializes in integrating data security products with third-party subsystems.

Stephan Jou
Toronto Chapter

Machine Learning Is Alive – and a Life Saver, Too; Machine Learning: A Primer for Security

Stephan Jou is CTO at Interset. He was previously with IBM and Cognos and holds an MSc in Computational Neuroscience and Biomedical Engineering and a dual BSc in Computer Science and Human Physiology from the University of Toronto.

Reiner Kappenberger

Protecting Your Data against Cyber Attacks in Big Data Environments

Reiner Kappenberger has over 20 years of computer software industry experience focusing on encryption and security for big data environments. His background ranges from device management in the telecommunications sector to GIS and database systems.

Jack Freund
Charlotte Metro Chapter

Using Data Breach Reports to Assess Risk Analysis Quality

Dr. Jack Freund, CISSP, CISA, CISM, CRISC, is currently Senior Manager, Cyber Risk & Controls at TIAA-CREF. He was awarded a Doctorate in Information Systems. Jack is the coauthor of Measuring and Managing Information Risk: A FAIR Approach.

Kelley Archer
Distinguished Fellow, Minnesota Chapter

Between a Rock and a Hard Place

Kelley Archer, CISSR, is security consultant and has worked in the information security field for over 25 years with a vast array of experience. He was one of the co-founders of Secure360.

Ken Smith

Fragmentation in Mobile Devices

Ken Smith works for SecureState, works primarily on wireless and physical assessments as well as in mobile device and application security.

Carl Saiyed
Greater Spokane Chapter


Carl Saiyed, CISSP, is a full-time security analyst in critical infrastructure sectors.

Guy Bunker
UK Chapter

Protecting against Tomorrow’s Malware Attacks Today

Dr. Guy Bunkeris an internationally renowned IT expert with over 20 years experience in information security and IT management.

Didier Stevens
Belgian Chapter

The Rise of Malicious Documents

Didier Stevens (Microsoft MVP Consumer Security, SANS ISC Handler, Wireshark Certified Network Analyst, CISSP, GSSP-C) is an IT security consultant currently working at a large Belgian financial corporation.

Eric M. Harper
North Texas Chapter

Linking Information Security to Other Key Organizational Initiatives

Eric M. Harper, EdD, is a talent-management leader for a financial services company. His doctoral research focuses on the variables impacting employee engagement.

Alex L. Nehlebaeff
North Texas Chapter

Linking Information Security to Other Key Organizational Initiatives

Alex L. Nehlebaeff, CISSP, is a retired US Navy Chief Petty Officer who has worked in the information security field since 1990.

Steve Conrad
Puget Sound Chapter Chapter

Why the Merging of Security and Privacy is a Good Thing

Steve Conrad is the founder and managing director of MediaPro and has extensive experience in improving organizational performance through effective awareness and learning solutions.

Rouman Ebrahim
Los Angeles Chapter

Preparing for New Electronic Communication Privacy Laws

Rouman Ebrahim is a Deputy District Attorney for the County of Los Angeles, assigned to the High Technology Crime Division.

Gary Landau
Los Angeles Chapter

Stop Delivery of Phishing Emails

Gary Landau, CISSP, CCNP, CCSK, is an experienced IT and security leader. He advocates for third-party security assessments and was a founding board member and past president of CSA-LA\SoCal.

Mark Kadrich
Silicon Valley Chapter

Architecture 101

Mark Kadrich, CISO San Diego Health Connect, has 30+ years working in the security community, building knowledge, and contributing solutions.

Regner Sabillon
Alberta Chapter

Internet of Things: Security, Privacy and Governance

Regner Sabillon is a PhD candidate at the Network and Information Technologies Programme – Catalonian Open University (UOC), Spain, and a Canadian researcher in cybersecurity, cyber law, cyberforensics, and cybercrime areas.

Gordon Merrill
Chattanooga Chapter

Show Me the Technology!

Gordon Merrill, MSIA, CISSP, is a cybersecurity professional whose career spans over three decades and has taken him to 48 states and six foreign countries.

Steve Riess
Chicago Chapter

Infosec Staffing

Steve Riess has been doing information technology staffing for over 25 years and is an active ISSA, ISACA, and AITP member.

Karen Quagliata
St. Louis Chapter

The Role of the Adjunct in Educating the Security Practitioner

Karen Quagliata, PhD, PMP, CISA, CISSP, is an information security analyst working in risk management and governance. She is also an adjunct instructor for multiple universities and colleges.

Karen Martin

Beware the Blockchain

Karen Martin is a San Jose, California-based technical writer with over a decade of experience in information security.

Seetharaman Jeganathan

Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals

Seetharaman Jeganathan, CISSP, mainly focuses on information systems risk assessments, identity and access management (IAM) solution strategy definition, architecture definition, and design and implementation of IAM security solutions.

Amy Vosters

Why Risk Management Is Hard, Crypto Wars II

Amy Vosters is the Marketing Manager at SOASTA Inc., a SaaS company based in Mountain View, CA, that specializes in mobile- and web-performance test automation and real user monitoring solutions.

Avani Desai
WIS SIG member

Oh Baby - The IoT and Security

Avani Desai, first and foremost a mom, is an Executive Vice President at BrightLine. She has been helping clients with their compliance services for over 13 years.

Frederick Scholl
Senior Member, Middle Tennessee Chapter

Your CISSP Is Worthless - Take Two

Dr. Frederick Scholl, CISSP, CISM, is president of Monarch Information Networks, LLC. He also teaches Risk Mitigation at Lipscomb University and Network Security at Vanderbilt University.

Betty Pierce
ISSA Fellow, Colorado Springs Chapter

The Increasing Significance of Ethics in IT Security

Betty Pierce, GSLC, is a program manager with a civilian US government agency and high-tech startup junkie with over 34 years in IT, the most recent 15 years specializing in information security.

Barettè Mort
North Texas Chapter

Securing the Cloud

Barettè Mort, MS Systems Engineering, is a security professional with Raytheon. She has worked in the industries of finance, web development, consulting, and defense.

Stephen Fritts
South Florida Chapter

Using Data Breach Reports to Assess Risk Analysis Quality

Dr. Stephen Fritts, CISA, CISM, CISSP, CRMA, CRISC, PMP, is 20-year IT industry veteran and a subject matter expert in IT risk management. He received his Doctorate in the field of Business Management, and holds MBA, MS, and BA degrees.

Tony Rice
Raleigh Chapter

Security’s Seat at the Big Data Table

Tony Rice, CISSP, is a Senior Application Security Engineer at Cisco. He regularly speaks on effectively incorporating application security into DevOps and the wealth of source code and product-quality analytics possibilities that opens.

Joan Marius

Using Data Breach Reports to Assess Risk Analysis Quality

Joan Marius is a Senior Information Security Analyst at TIAA-CREF. Joan received a Master of Science in Mathematics with concentration in Applied Statistics. Joan specializes in multivariate analysis of risk and financial scenarios.

Smrithi Konanur

Mobile Application Security, Payment Ecosystem Security

Smrithi Konanur, Global Product Management, HPE Security, has over 14 years of computer software industry experience including more than nine years of experience in the payment industry.

Sergey Tikhonov
ISSA member, Russia

The Practice of Malware Protection for Commercial Banking, Practical View of Payment Security for Online Banking Systems

Sergey Tikhonov is Chief of IT Department and Chief of IT Security Department in Aljba Alliance Commercial Bank Ltd and has over 20 years experience in IT and Information Security.

Miroslava Bondarenko
ISSA member, Russia

The Practice of Malware Protection for Commercial Banking, Practical View of Payment Security for Online Banking Systems

Miroslava Bondarenko is Deputy Chief of IT Department and Deputy Chief of IT Security Department in Aljba Alliance Commercial Bank Ltd with over 20 years experience in IT and Information Security.

Andy Green

The Hotel Industry Has a PoS Malware Problem

Andy Green is a veteran technology journalist with over 12 year of experience writing about high-tech topics.

Kristopher Dane
Puget Sound Chapter

Do Data Breaches Matter? A Review of Breach Data and What to Do Next

Kristopher Dane, Associate at the international engineering firm Thornton Tomasetti, Inc.

Matt Wilgus
Raleigh Chapter

FedRAMP’s Database Scanning Requirement: The Letter and Spirit

Matt Wilgus is a Practice Director at Schellman & Company, Inc. where he leads the security testing and assessment offerings.

Dallas Hammer
Quantico Chapter

Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting Information Security Concerns

Dallas Hammer is an attorney at Zuckerman Law and chairs the firm’s Whistleblower Rewards Practice Group.

Harsha Banavara

Addressing Data Privacy Regulation & Standards: A Process

Harsha Banavara, CSSLP, CIPP, Security+, MSc in Software Engineering, is cybersecurity analyst and the global subject matter expert in the “Requirements” stage of Secure Development Lifecycle at Schneider Electric with eight+ years of experience in information security.

Scott Parker
Distinguished Fellow, Alamo Chapter

Contribute – Be More Than Just a Member!

Scott Parker has 30 years of tactical and strategic information security experience across multiple control points: data centers, endpoints, and gateways.

Tim Howard
South Texas Chapter

Impact of Social Media on Cybersecurity Employment and How to Use It to Improve Your Career

Tim Howard is the founder of Fortify Experts, which helps companies find exceptional cybersecurity talent through executive search, permanent placement, and project consultants.

Audrey Ann Gendreau
Tampa Bay Chapter

Internet of Things: Arduino Vulnerability Analysis

Audrey Gendreau, PhD, CISSP, GCFE is a university-level Cybersecurity Researcher with several publications focused on the security of the Internet of Things.

Aditya Srivastava
Dehradun Chapter

Internet of Things: Key Challenges to Overcome

Aditya Srivastava is a student at University of Petroleum and Energy Studies currently pursuing a Bachelor’s of Technology in Computer Science Engineering with specialization in Cybersecurity and Forensics by IBM.

Kimberly Wamba
Motor City Chapter

Payment Card Security: Is a Standard Enough?

Kimberly Wamba, PCIP, PMP, is an information security and project management professional currently working as a Relationship Manager for a local company specializing in PCI compliance and network security.

Ilya Kabanov

How Not to Become Statistics: What CISOs Should Know on Cyber Insurance, Privacy, and Innovations

Dr. Ilya Kabanov is a global director, application security and compliance, and a Sloan Fellow alum at the Massachusetts Institute of Technology

Jeff Hall
Minnesota Chapter

End-to-End Encryption Security

Jeff Hall, CISSP, CISM, has over 30 years of technology and compliance experience and is certified in the governance of enterprise information technology and a PCI QSA.

Keith Moore
Capitol of Texas Chapter

The Race against Cyber Crime Is Lost without Artificial Intelligence

Keith Moore specializes in applying advanced data science and natural language processing algorithms to complex data sets.

Alexander Polyakov

Secure ERP Implementation

Alexander Polyakov is CTO and founder of ERPScan, president of Project, and an accomplished R&D professional.

Phillip H. Griffin
Fellow, Raleigh Chapter

Gaining Confidence in the Cloud

Phillip H. Griffin, CISM, has over 20 years experience in the development of commercial, national, and international security standards and cryptographic messaging protocols. He has been awarded nine US patents at the intersection of biometrics, radio frequency identification (RFID), and information security management.

Joel Weise
Distinguished Fellow, Vancouver Chapter

Security in the News

Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.

Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.

Jeff Stapleton
Fort Worth Chapter

Gaining Confidence in the Cloud

Jeff Stapleton has participated in X9 for over twenty years; he has contributed to the development of over three dozen X9 and ISO security standards, and has been the chair of the X9F4 work group for over 15 years.

Jason Lang

Why Information Security Teams Fail

Jason Lang (@curi0usJack) has worked in enterprise security for over 10 years in both offensive and defensive roles and is currently employed as a senior consultant with SynerComm in Brookfield, WI.

Barry Stetler

Securing Data to Prevent Data Theft

Barry Stetler has worked in the technology industry since 2001 and has owned and operated two technology companies providing managed services, computer repair, web hosting, and Internet connectivity.

Rhonda Farrell
Northern Virginia Chapter

Big Data Security Analytics – Continuing the Innovation Wave

Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.

Vincent Sritapan

Mobile App Testing for the Enterprise

Vincent Sritapan is a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T.

Angelos Stavrou

Mobile App Testing for the Enterprise

Dr. Angelos Stavrou is a founder and president of Kryptowire and has served as principal investigator on contracts from NSF, DARPA, IARPA, DHS, AFOSR, ARO, ONR.

Stu Sjouwerman

Evolving Ransomware

Stu Sjouwerman is the founder and CEO of KnowBe4, a security awareness training and simulated phishing platform.

Domini Clark
Utah Chapter

Malware Evolution and the Cyber Talent Gap

Domini Clark is the Principal for Blackmere Consulting, an executive search firm dedicated to the information security industry.

Mark Anderson
Australia Chapter

Internet Balkanization Is Coming, Thinking Survivability, Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.

Kerry Anderson
New England Chapter

Smart Practices in Managing an Identity-Auditing Project; Resolving the Cybersecurity Workforce Shortage

Kerry A. Anderson, CISA, CISM, CRISC, CGEIT, CISSP, is an information security and records management professional with more than 18 years of experience in information security and IT.

Ashish Gehani

On the Costs of Bitcoin Connectivity

Dr. Ashish Gehani of SRI International holds a BS (Honors) in Mathematics from the University of Chicago and PhD in Computer Science from Duke University.

Jeff Farago
Middle Tennessee Chapter

Addressing Data Privacy Regulation & Standards: A Process

Jeffrey Farago, CSSLP, CEH, CPT, MSc in Cybersecurity, is cybersecurity director in the Building & IT Business Unit, for Schneider Electric with a 44-year career in product development, 21 years at Schneider Electric.

R. S. Tumber
UK Chapter

Blockchain: The Legal Industry; Social Media: The Danger Zone; Internet of Things: Trust; Infosec Careers and Guidance

Rajinder Tumber is a two-time finalist for the “Personality of the Year” award in the cybersecurity industry, and a finalist for the “IT Manager of the Year” award from Computing and BCS – The Chartered Institute for IT.

Yuri Diogenes
Fort Worth Chapter

Social Media Impact: Is It Possible to Be Social and Secure?

Yuri Diogenes, CISSP, CASP, E|CEH, E|CSA, currently works for Microsoft as Senior Content Developer for the Enterprise Mobility Team and Azure Security

Patryk Krolikowski
Poland Chapter

User-Managed Access – Do We Need Yet Another Standard?

Patryk Królikowski, Senior Customer Engineer at ForgeRock, is an information security professional with over 10 years of field experience, involved in numerous projects covering privileged identity management, network security, DLP, and SIEM.

Alen Ilic
New York Metro Chapter

Cloud Dilemma?

Alen Ilic lives in NYC, just received his Bachelors in InfoSec, and is looking to learn more by getting hands-on experience and taking graduate-level classes.

Jeff Hall
Minnesota Chapter

Attacker with Administrator Rights

Jeff Hall, CISSP, CISM, has over 30 years of technology and compliance experience and is certified in the governance of enterprise information technology and a PCI QSA.

Tim Roake
Silicon Valley Chapter

The Use and Misuse of Entropy

Tim Roake is a Senior Software Engineer at Hewlett Packard Enterprise.

Jeff Fenton
Senior Member, Silicon Valley Chapter

Cyber Workforce Strategy: Developing Professionals Internally

Jeff Fenton, CISSP, ISSEP, ISSMP, CISM, CRISC, CIPP/US, GBLC, CBCP, is a Sr. Staff Cybersecurity Governance, Risk, and Compliance Analyst with Lockheed Martin’s Corporate Information Security organization.

Monique Ferraro

Security Legal Update

Monique Ferraro, CISSP, CIPP/US, is Counsel in the Cyber Practice at Harford Steam Boiler Inspection and Insurance Company. She provides legal and technical expertise in support of cyber efforts undertaken by Munich Re’s US Property & Casualty Operations.

Jeff Bardin

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

Jeff Bardin is Chief Intelligence Officer, Treadstone 71.

Brandon Peterson
ISSA member, Nevada

Secure Network Design: Micro Segmentation

Brandon Peterson leads the Desert Research Institute’s Cyber Security and Incident Response team. He is also a community instructor with SANS.

Community Search
Sign In


ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information