This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
Journal Authors 2017

 

>> 2015 Authors     >> 2016 Authors     >> 2017 Authors     >> 2018 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.


Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.


Robert Slade

Cryptic Curmudgeon

Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.


David R. Jackson
National Capital (Washington, DC) and Northern Virginia Chapters

California Dreaming – The Fight with the Federal Government over Technology

Mr. Jackson, CISSP, CEH, CIPP, works as a regulatory attorney for a government contractor in the Washington DC area.


Philip Casesa

Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization

Philip Casesa, CISSP, CSSLP, PMP, ITIL, SAFe Agilist, is a director at Focal Point with years of experience in cybersecurity, software development, and consulting.


Mike McCormick
Minnesota Chapter

Security Made Amazon Profitable

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.


Mark Kadrich
Silicon Valley Chapter

Technology Repurposing: What Will Blockchain Be Tomorrow?

Mark Kadrich is a well-known speaker and evangelist on network security matters at technical conferences and security events.


Tony Buenger
Greater Augusta Chapter

We Are the Front Lines – Protecting Yourself Protects the Organization

Tony Buenger assumed the role of CISO for Augusta University in 2018. He served as an Associate Professor for the National Defense University.


Donald A. McKeown
New England Chapter

Building a Risk-Based Information Security Culture

Don McKeown is currently an Information Security Manager at Wolters Kluwer Health.


John Gray
Rainier Chapter

Basic Principles of Database Security

John Gray, PhD, is an ISS analyst with over 15 years experience in information security and is employed by the Department of Defense.


Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.


Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.


Seetharaman Jeganathan

Practical Approaches to Overcome Security Challenges in Cloud Computing

Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.


Alex Smith
Central Ohio Chapter

SIEM Implementation for School Districts Utilizing FOSS

Alex Smith is a database administrator and DevOps engineer focusing on application team cy-bersecurity in public school districts.


Mariusz Stawowski
Senior Member, Poland Chapter

Automation of Business-Aware Incident Management

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, is CTO / Technical Director of CLICO, a security technologies distributor and service provider operating in Poland and other Central and Eastern European countries.


Matt Wilgus
Raleigh Chapter

Application Security, Ethics, & Eight-Year-Olds

Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat- and vulnerability-related offerings.


Yuri Diogenes
Senior Member, Fort Worth Chapter

The Quest for Visibility and Control in the Cloud

Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security Center.


Lori L. Cole
Blue Ridge Chapter

Countering Gender Disparity: Creating Anti-Predictions Using Data Science

Lori L. Cole, GSEC, GCIH, is a cyber threat analyst at BB&T. She was named SC Magazine’s IT Security 2018 Women to Watch.


Sean Kelly

Protecting Information Assets against Insider Threats

T. Sean Kelly is a Senior Director at FTI Consulting.


Andrew Shaxted

Protecting Information Assets against Insider Threats

Andrew Shaxted is a Senior Director in FTI Technology’s information governance, privacy and security practice.


Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.


Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.


Joe Malec
ISSA Fellow

Role-Based Security Awareness Training for Technology

Joe Malec is a Senior Security Analyst at Express Scripts with more than 25 years of experience in information technology.


Curtis Campbell
Senior Member, Chattanooga Chapter

Women in Cybersecurity

Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.


John Huckeby

Reasons to Outsource Your Internal IT Audit Function

John Huckeby, PCI QSA, HSA, CISA, ISO Lead Auditor, has been helping organizations secure their environ-ments for over 18 years.


Steve Kirby
Greater Spokane Chapter

Lost Cryptographics Keys – Lessons from Gerald Cotton

Stephen Kirby is an attorney based in Washington State and the CEO of an IT consulting firm.


Phillip H. Griffin
Fellow, Raleigh Chapter

Anonymous Digital Signatures

Phillip, CISM, actively participates in ITU-T SG17 Security, ISO TC68/SC2 Security, ISO/IEC JTC1/SC27 Security techniques, and X9 Financial Services standards development.


Liu Hua Yeo

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Liu Hua Yeo is a doctoral student in technology at the College of Technology at Eastern Michigan University.


Xiangdong Che

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Dr. Xiangdong Che, CISSP, is an Associate Professor in the Information Assurance program at Eastern Michigan University.


Constantinos Doskas
Senior Member, Northern Virginia Chapter

The Python Programming Language

Constantinos Doskas is head of the IT and Security Department of Olympus.


Community Search
Sign In


Calendar

1/22/2020
ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information