| Journal Authors 2018 |
>> 2015 Authors >> 2016 Authors >> 2017 Authors
Sabett’s Brief Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Herding Cats Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Women in Security SIG Column Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.
Managing Cybersecurity Risk in the Age of “Smart” Everything Diana L. Burley, PhD, is professor of human & organizational learning and executive director at The George Washington University.
GDPR – What Does It Mean for Infosec? Jason Remillard, MBA, CISSP, is the President of Data443 and the founder of ClassiDocs.com.
ISSA Honor Roll Gail Coury leads the information security function for Oracle Cloud globally, which includes SaaS, PaaS, IaaS, and managed cloud services.
Security in Mergers and Acquisitions Miriam T. Levenstein, CISSP, CISM, PCI-QSA, is a senior consultant with NTT Security.
The End of Security; Your Social Insecurity Number; VEP Makes Me Wanna Cry Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.
Securing Complex Cyber-Physical Medical Device Landscapes Dr. Ulrich Lang is a renowned thought leader in cybersecurity, privacy, and data analytics/AI.
They Say That Everything Happens for a Reason ISSA International Director
Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information Sue Wang is a technical lead of the Healthcare Sector Team within the National Cybersecurity FFRDC.
Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information Zach Furness is a technical director within the National Cybersecurity FFRDC.
S/MIME Certificate Management through DNS – DANE: A New Approach Dena T. Bauckman, CISSP, is the VP of Product Management at Zix, a leader in email security.
Evolution of the Cybersecurity Framework Alex Grohmann, CISSP, CISA, CISM, CIPT, is an independent consultant and information security professional with nearly 25 years of experience.
A Multi-Pronged Approach to GDPR Compliance Mark Shriner is Director North America for Wordbee and is responsible for client engagement and partner development at adaQuest, a Microsoft Security & Compliance Partner.
Cryptocurrency and Corporate Security Anthony J. Ferrante is the global head of cybersecurity and a senior managing director at FTI Consulting.
Cryptocurrency and Corporate Security D. Frank Hsu, PhD, is the Clavius Distinguished Professor of Science and a professor of computer and information science at Fordham University in New York, NY.
How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR Grace Buckler, CIPP/E, CIPP/US, CIPP/G, CISA, CISSP, CRISC, PMP, is the founder and president of The Privacy Advocate.
The Brave Old New World of Privacy Steven J. Ross is Executive Principal of Risk Masters International LLC and was formerly a global practice leader at Deloitte.
Bookworm: A Threat Hunting Story Carl Saiyed, CISSP, is a Senior Cyber Security Analyst focusing on threat hunting and cybersecurity evangelism.
Cryptic Curmudgeon Rob Slade is an information security and management consultant from North Vancouver, Brit-ish Columbia, Canada.
A Look at the Espionage Act of 1917 for the Internet Age Whitney Partridge is an eDiscovery Analyst at the Food and Drug Administration (FDA).
The Key to Security Improvement Is Not What You Think Kevin Beaver, CISSP, is an information security consultant, writer, and professional speaker with Principle Logic, LLC.
The Future of IT Risk Management Will Be Quantified Dr. Jack Freund, CISSP, CISA, CISM, CRISC, CIPP, PMP, is a leading voice in cyber risk measure-ment and management.
Our Journey in Phishing Mitigation Jennifer Kinney, CBCP, is a Senior Business Continuity & Information Security Specialist at Lex-isNexis® Risk Solutions.
Security Awareness Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.
Crypto Corner Luther Martin is a Distinguished Technologist at Micro Focus.
The Two Faces of Innovation – From Safe and Dumb to Vulnerable Smart Products and Infrastructure Steven W. Teppler is a partner at the Abbott Law Group in Jacksonville, Florida, and leads the firm’s complex litigation and electronic discovery practice.
Security Incidents and Breaches in the Healthcare Industry; Employee and Insider Data Breaches: Vulnerability or Threat Vector? Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia.
CPU Bugs: Trading Security for Performance Adrian is the Director of Research for Threatcare. He previously co-founded Savage Security, which was acquired by Threatcare in late 2017.
The Basics of Privileged Access Management Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybesecurity.
Baking an IT Risk Program from Scratch Steve Horstman, CISSP, has 25 years of experience as an IT professional.
The Dangers in Perpetuating a Culture of Risk Acceptance Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat and vulnerability related offerings.
Using PKI to Build a Secure Industrial Internet of Things Mike Nelson, VP of IoT Security at DigiCert, is a leader in digital security.
Orchestration and Automation in the Real World; Malware: Cat and Mouse Forever? Ken Dunham brings more than 27 years of business, technical, and leadership experience in cybersecurity, incident response, and cyber threat intelligence.
Security Threats, Defenses, and Recommended Practices for Enterprise Mobility Vincent Sritapan is a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T.
Security Threats, Defenses, and Recommended Practices for Enterprise Mobility Karim Eldefrawy is a senior computer scientist at Computer Science Laboratory at SRI International.
Rationalizing Behavioral Biometrics Maria Schuett, CRISC, GLEG, is an information security architect and advisor.
Spoofing a Hardware Security Module; Cloud Cryptography and Key Management; Did GDPR Revoke the Digital Certificate? Jeff Stapleton has been involved in the development of more than three dozen ANSI and ISO standards and chaired the X9F4 standards workgroup for over 15 years.
Information Security Standards: Differences, Benefits, Impacts, and Evolution Antonella Commiato, Chief Technology Officer/Chief Information Security Officer EXTEND Resources, has 23 years of IT leadership experience.
Information Security Standards: Differences, Benefits, Impacts, and Evolution Michael Sturgill, CISM, CEH, and SEC+, Information Security Manager EXTEND Resources, has more than 15 years of experience in information systems.
Book Review - The Perfect Weapon; Digital Relilience Dr. Frederick Scholl, CISSP, is President of Monarch Information Networks, LLC, an independent cybersecurity risk management consultancy.
The Brave Old New World of Privacy Robert G. Parker is an independent consultant specializing in Data Privacy and was formerly a partner at Deloitte.
On the Effects of Enterprise Security on Employee Privacy Amn Rahman is an engineer on the Growth team at Docker.
On the Effects of Enterprise Security on Employee Privacy Ashish Gehani is a Principal Computer Scientist at SRI International. His research focuses on da-ta provenance and security.
Cloud Security Due Diligence Chris Wolski, CISO Ascension Global Technology, has over a thirty years of IT security experience.
Pulling Back the Privacy Curtain Reg Harnish is an entrepreneur, speaker, author, and CEO of GreyCastle Security.
Practical Approaches to Overcome Security Challenges in Cloud Computing Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.
Did GDPR Revoke the Digital Certificate? Stephen Wu is an attorney and shareholder at Silicon Valley Law Group in San Jose, California.
Staring Down the Future of Cloud Computing Tim O’Neal has been a technology professional for over 25 years.
Security in the News Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.
Security in the News Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.
Gray Hat Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Legal Requirements of Notification of Breaches: An Overview Mr. Kirby is a lawyer specializing in legal issues relating to technology and continues to work in the information technology field with a focus on issues relating to data.
The Post Exploitation Malware Era Meir Brown is Cyberbit’s Director of Research and is a 15-year cybersecurity veteran. Prior to Cyberbit, Brown spent 12 years at Check Point Software.
Orchestrating the Responses Between Information Security and Privacy During a Data Breach David Jackson is an attorney holding CISSP, CIPP/US, and CEH certifications.
How to Protect Critical Systems without Disrupting Continuity of Their Services Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.
Book Review: InSecurity
Cyber-Physical Intelligence Dr. Tyson Brooks works for the US Department of Defense and as an adjunct professor in the School of Information Studies (iSchool) at Syracuse University.
Securing a Medical Device Dave Presuhn is a member of the Connected Device Management team for Boston Scientific.
Securing a Medical Device Andrew Bomett, CISSP, GCFE, is the manager of product security at Boston Scientific.
Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment Dr. Curtis C. Campbell, DM/IST, is a vice president and IT procurement manager at a financial institution.
A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things; Security Measures That Help Reduce the Cost of a Data Breach Mangaya Sivagnanam is currently Principal Cybersecurity Systems Architect at Ingersoll Rand.
Net Neutrality: What Is It and Is It Necessary?; A Look at the Espionage Act of 1917 for the Internet Age Dr. Nima Zahadat is a professor of forensics, information systems, and data science.
PCAP Next Generation: Is Your Sniffer Up to Snuff? Scott Fether is an Information Protection Warrant Officer for the United States Army. For the past 14 years he has worked in various information technology positions for the Army.
The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence Michael R. Grimaila, PhD, CISM, CISSP, is a professor and head of the Department of Systems Engineering and Management and a member of the Center for Cyberspace Research at the Air Force Institute of Technology.
Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age Indrajit Atluri, CRISC, CISM, CISSP, HCISPP, ITILv3, is the Information Security Manager and HIPAA Security Officer at ProPath Services LLC.
The Art of Pushing Left in Application Security Kelley Bryant, CISSP, CSSLP, is a Senior Security Consultant for AT&T Cybersecurity Solutions.
Waking Up to New Consumer Data Privacy Protection Ken Spinner leads all technical pre- and post-sales engineering activities for Varonis.
Extracting Timely Sign-in Data from Office 365 Logs In 1997, he became system administrator at the California Institute of Technology. He is currently heading the technical arm of projects to move all campus email to the cloud.
Holistic Approach to Enhance Your Security Posture Yuri works for Microsoft as Senior Program Manager for the CxE Security Team.
Our Journey in Phishing Mitigation Aurobindo Sundaram, CISSP, is the Head of Information Assurance & Data Protection at RELX Group.
The Impact of Cryptocurrency on Modern-Day Cybercrime Michael Doran, CISSP, CISM, CCSK, CFCE, CCE, GCFA, is a Senior Security Consultant in Optiv’s Enterprise Incident Management practice.
Book Review: Security without Obscurity: A Guide to Cryptographic Architectures Ben Rothke, CISSP, PCI QSA, is a security consultant with Nettitude and a member of the Cy-bersecurity Canon project. |
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!