>> 2015 Authors >> 2016 Authors >> 2017 Authors
Randy V. Sabett
Senior Member, Northern Virginia Chapter
Sabett’s Brief
Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Branden R. Williams
Distinguished Fellow, North Texas Chapter
Herding Cats
Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Rhonda Farrell
ISSA Fellow, NOVA Chapter
Women in Security SIG Column
Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.
Diana L. Burley
Managing Cybersecurity Risk in the Age of “Smart” Everything
Diana L. Burley, PhD, is professor of human & organizational learning and executive director at The George Washington University.
Jason Remillard
Raleigh Chapter
GDPR – What Does It Mean for Infosec?
Jason Remillard, MBA, CISSP, is the President of Data443 and the founder of ClassiDocs.com.
Gail Coury
Denver Chapter
ISSA Honor Roll
Gail Coury leads the information security function for Oracle Cloud globally, which includes SaaS, PaaS, IaaS, and managed cloud services.
Miriam T. Levenstein
Capitol of Texas Chapter
Security in Mergers and Acquisitions
Miriam T. Levenstein, CISSP, CISM, PCI-QSA, is a senior consultant with NTT Security.
Mike McCormick
Minnesota Chapter
The End of Security; Your Social Insecurity Number; VEP Makes Me Wanna Cry
Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.
Ulrich Lang
Securing Complex Cyber-Physical Medical Device Landscapes
Dr. Ulrich Lang is a renowned thought leader in cybersecurity, privacy, and data analytics/AI.
David Vaughn
Senior Memeber, Raleigh Chapter
They Say That Everything Happens for a Reason
ISSA International Director
Sue Wang
Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information
Sue Wang is a technical lead of the Healthcare Sector Team within the National Cybersecurity FFRDC.
Zach Furness
Northern Virginia Chapter
Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information
Zach Furness is a technical director within the National Cybersecurity FFRDC.
Dena T. Bauckman
North Texas Chapter
S/MIME Certificate Management through DNS – DANE: A New Approach
Dena T. Bauckman, CISSP, is the VP of Product Management at Zix, a leader in email security.
Alex Grohmann
ISSA Fellow, Northern Virginia Chapter
Evolution of the Cybersecurity Framework
Alex Grohmann, CISSP, CISA, CISM, CIPT, is an independent consultant and information security professional with nearly 25 years of experience.
Mark Shriner
Puget Sound Chapter
A Multi-Pronged Approach to GDPR Compliance
Mark Shriner is Director North America for Wordbee and is responsible for client engagement and partner development at adaQuest, a Microsoft Security & Compliance Partner.
Anthony J. Ferrante
Cryptocurrency and Corporate Security
Anthony J. Ferrante is the global head of cybersecurity and a senior managing director at FTI Consulting.
D. Frank Hsu
Cryptocurrency and Corporate Security
D. Frank Hsu, PhD, is the Clavius Distinguished Professor of Science and a professor of computer and information science at Fordham University in New York, NY.
Grace Buckler
National Capital Chapter
How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR
Grace Buckler, CIPP/E, CIPP/US, CIPP/G, CISA, CISSP, CRISC, PMP, is the founder and president of The Privacy Advocate.
Steven J. Ross
The Brave Old New World of Privacy
Steven J. Ross is Executive Principal of Risk Masters International LLC and was formerly a global practice leader at Deloitte.
Carl Saiyed
Greater Spokane Chapter
Bookworm: A Threat Hunting Story
Carl Saiyed, CISSP, is a Senior Cyber Security Analyst focusing on threat hunting and cybersecurity evangelism.
Robert Slade
Cryptic Curmudgeon
Rob Slade is an information security and management consultant from North Vancouver, Brit-ish Columbia, Canada.
Whitney Partridge
A Look at the Espionage Act of 1917 for the Internet Age
Whitney Partridge is an eDiscovery Analyst at the Food and Drug Administration (FDA).
Kevin Beaver
Metro Atlanta Chapter
The Key to Security Improvement Is Not What You Think
Kevin Beaver, CISSP, is an information security consultant, writer, and professional speaker with Principle Logic, LLC.
Jack Freund
Charlotte Metro Chapter
The Future of IT Risk Management Will Be Quantified
Dr. Jack Freund, CISSP, CISA, CISM, CRISC, CIPP, PMP, is a leading voice in cyber risk measure-ment and management.
Jennifer Kinney
Our Journey in Phishing Mitigation
Jennifer Kinney, CBCP, is a Senior Business Continuity & Information Security Specialist at Lex-isNexis® Risk Solutions.
Geordie Stewart
UK Chapter
Security Awareness
Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.
Luther Martin
Silicon Valley Chapter
Crypto Corner
Luther Martin is a Distinguished Technologist at Micro Focus.
Steven W. Teppler
The Two Faces of Innovation – From Safe and Dumb to Vulnerable Smart Products and Infrastructure
Steven W. Teppler is a partner at the Abbott Law Group in Jacksonville, Florida, and leads the firm’s complex litigation and electronic discovery practice.
Barry S. Herrin
Metro Atlanta Chapter
Security Incidents and Breaches in the Healthcare Industry; Employee and Insider Data Breaches: Vulnerability or Threat Vector?
Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia.
Adrian Sanabria
CPU Bugs: Trading Security for Performance
Adrian is the Director of Research for Threatcare. He previously co-founded Savage Security, which was acquired by Threatcare in late 2017.
Michael Rogers
Minnesota Chapter
The Basics of Privileged Access Management
Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybesecurity.
Steve Horstman
Fort Worth Chapter
Baking an IT Risk Program from Scratch
Steve Horstman, CISSP, has 25 years of experience as an IT professional.
Matt Wilgus
Raleigh Chapter
The Dangers in Perpetuating a Culture of Risk Acceptance
Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat and vulnerability related offerings.
Mike Nelson
Using PKI to Build a Secure Industrial Internet of Things
Mike Nelson, VP of IoT Security at DigiCert, is a leader in digital security.
Ken Dunham
Distinguished Fellow, Boise Chapter
Orchestration and Automation in the Real World; Malware: Cat and Mouse Forever?
Ken Dunham brings more than 27 years of business, technical, and leadership experience in cybersecurity, incident response, and cyber threat intelligence.
Vincent Sritapan
Security Threats, Defenses, and Recommended Practices for Enterprise Mobility
Vincent Sritapan is a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T.
Karim Eldefrawy
Security Threats, Defenses, and Recommended Practices for Enterprise Mobility
Karim Eldefrawy is a senior computer scientist at Computer Science Laboratory at SRI International.
Maria Schuett
Minnesota Chapter
Rationalizing Behavioral Biometrics
Maria Schuett, CRISC, GLEG, is an information security architect and advisor.
Jeff Stapleton
St. Louis Chapter
Spoofing a Hardware Security Module; Cloud Cryptography and Key Management; Did GDPR Revoke the Digital Certificate?
Jeff Stapleton has been involved in the development of more than three dozen ANSI and ISO standards and chaired the X9F4 standards workgroup for over 15 years.
Antonella Commiato
Los Angeles Chapter
Information Security Standards: Differences, Benefits, Impacts, and Evolution
Antonella Commiato, Chief Technology Officer/Chief Information Security Officer EXTEND Resources, has 23 years of IT leadership experience.
Michael Sturgill
Information Security Standards: Differences, Benefits, Impacts, and Evolution
Michael Sturgill, CISM, CEH, and SEC+, Information Security Manager EXTEND Resources, has more than 15 years of experience in information systems.
Frederick Scholl
Middle Tennessee Chapter
Book Review - The Perfect Weapon; Digital Relilience
Dr. Frederick Scholl, CISSP, is President of Monarch Information Networks, LLC, an independent cybersecurity risk management consultancy.
Robert G. Parker
The Brave Old New World of Privacy
Robert G. Parker is an independent consultant specializing in Data Privacy and was formerly a partner at Deloitte.
Amn Rahman
On the Effects of Enterprise Security on Employee Privacy
Amn Rahman is an engineer on the Growth team at Docker.
Ashish Gehani
On the Effects of Enterprise Security on Employee Privacy
Ashish Gehani is a Principal Computer Scientist at SRI International. His research focuses on da-ta provenance and security.
Chris Wolski
Delaware Valley (Philadelphia, PA) Chapter
Cloud Security Due Diligence
Chris Wolski, CISO Ascension Global Technology, has over a thirty years of IT security experience.
Reg Harnish
Rochester Chapter
Pulling Back the Privacy Curtain
Reg Harnish is an entrepreneur, speaker, author, and CEO of GreyCastle Security.
Seetharaman Jeganathan
Practical Approaches to Overcome Security Challenges in Cloud Computing
Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.
Stephen Wu
Did GDPR Revoke the Digital Certificate?
Stephen Wu is an attorney and shareholder at Silicon Valley Law Group in San Jose, California.
Tim O’Neal
Staring Down the Future of Cloud Computing
Tim O’Neal has been a technology professional for over 25 years.
Joel Weise
Distinguished Fellow, Vancouver Chapter
Security in the News
Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.
Kris Tanaka
Portland Chapter
Security in the News
Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.
Mark Anderson
Australia Chapter
Gray Hat
Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Steve Kirby
Greater Spokane Chapter
Legal Requirements of Notification of Breaches: An Overview
Mr. Kirby is a lawyer specializing in legal issues relating to technology and continues to work in the information technology field with a focus on issues relating to data.
Meir Brown
The Post Exploitation Malware Era
Meir Brown is Cyberbit’s Director of Research and is a 15-year cybersecurity veteran. Prior to Cyberbit, Brown spent 12 years at Check Point Software.
David R. Jackson
National Capital (Washington, DC) Chapter
Orchestrating the Responses Between Information Security and Privacy During a Data Breach
David Jackson is an attorney holding CISSP, CIPP/US, and CEH certifications.
Mariusz Stawowski
Senior member, Poland Chapter
How to Protect Critical Systems without Disrupting Continuity of Their Services
Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.
Nathan Chung
Denver Chapter
Book Review: InSecurity
Tyson Brooks
Central Maryland Chapter
Cyber-Physical Intelligence
Dr. Tyson Brooks works for the US Department of Defense and as an adjunct professor in the School of Information Studies (iSchool) at Syracuse University.
Dave Presuhn
Minnesota Chapter
Securing a Medical Device
Dave Presuhn is a member of the Connected Device Management team for Boston Scientific.
Andrew Bomett
Securing a Medical Device
Andrew Bomett, CISSP, GCFE, is the manager of product security at Boston Scientific.
Curtis Campbell
Senior Member, Chattanooga Chapter
Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment
Dr. Curtis C. Campbell, DM/IST, is a vice president and IT procurement manager at a financial institution.
Mangaya Sivagnana
Minnesota Chapter
A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things; Security Measures That Help Reduce the Cost of a Data Breach
Mangaya Sivagnanam is currently Principal Cybersecurity Systems Architect at Ingersoll Rand.
Nima Zahadat
Northern Virginia Chapter
Net Neutrality: What Is It and Is It Necessary?; A Look at the Espionage Act of 1917 for the Internet Age
Dr. Nima Zahadat is a professor of forensics, information systems, and data science.
Scott D. Fether
PCAP Next Generation: Is Your Sniffer Up to Snuff?
Scott Fether is an Information Protection Warrant Officer for the United States Army. For the past 14 years he has worked in various information technology positions for the Army.
Michael R. Grimaila
Dayton (OH) Chapter
The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence
Michael R. Grimaila, PhD, CISM, CISSP, is a professor and head of the Department of Systems Engineering and Management and a member of the Center for Cyberspace Research at the Air Force Institute of Technology.
Indrajit Atluri
Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age
Indrajit Atluri, CRISC, CISM, CISSP, HCISPP, ITILv3, is the Information Security Manager and HIPAA Security Officer at ProPath Services LLC.
Kelley Bryant
Puget Sound Chapter
The Art of Pushing Left in Application Security
Kelley Bryant, CISSP, CSSLP, is a Senior Security Consultant for AT&T Cybersecurity Solutions.
Ken Spinner
Waking Up to New Consumer Data Privacy Protection
Ken Spinner leads all technical pre- and post-sales engineering activities for Varonis.
Mark J. Lucas
Extracting Timely Sign-in Data from Office 365 Logs
In 1997, he became system administrator at the California Institute of Technology. He is currently heading the technical arm of projects to move all campus email to the cloud.
Yuri Diogenes
Fort Worth Chapter
Holistic Approach to Enhance Your Security Posture
Yuri works for Microsoft as Senior Program Manager for the CxE Security Team.
Aurobindo Sundaram
Our Journey in Phishing Mitigation
Aurobindo Sundaram, CISSP, is the Head of Information Assurance & Data Protection at RELX Group.
Michael Doran
St. Louis Chapter
The Impact of Cryptocurrency on Modern-Day Cybercrime
Michael Doran, CISSP, CISM, CCSK, CFCE, CCE, GCFA, is a Senior Security Consultant in Optiv’s Enterprise Incident Management practice.
Ben Rothke
Book Review: Security without Obscurity: A Guide to Cryptographic Architectures
Ben Rothke, CISSP, PCI QSA, is a security consultant with Nettitude and a member of the Cy-bersecurity Canon project.
|
|
|