This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
Journal Authors 2019
Share |

 

>> 2015 Authors     >> 2016 Authors     >> 2017 Authors     >> 2018 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.


Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.


Robert Slade

Cryptic Curmudgeon

Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.


David R. Jackson
National Capital (Washington, DC) and Northern Virginia Chapters

California Dreaming – The Fight with the Federal Government over Technology

Mr. Jackson, CISSP, CEH, CIPP, works as a regulatory attorney for a government contractor in the Washington DC area.


Philip Casesa

Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization

Philip Casesa, CISSP, CSSLP, PMP, ITIL, SAFe Agilist, is a director at Focal Point with years of experience in cybersecurity, software development, and consulting.


Mike McCormick
Minnesota Chapter

Security Made Amazon Profitable

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.


Mark Kadrich
Silicon Valley Chapter

Technology Repurposing: What Will Blockchain Be Tomorrow?; Security Engineering and Integration Principles and Myths

Mark Kadrich is a well-known speaker and evangelist on network security matters at technical conferences and security events.


Tony Buenger
Greater Augusta Chapter

We Are the Front Lines – Protecting Yourself Protects the Organization

Tony Buenger assumed the role of CISO for Augusta University in 2018. He served as an Associate Professor for the National Defense University.


Donald A. McKeown
New England Chapter

Building a Risk-Based Information Security Culture

Don McKeown is currently an Information Security Manager at Wolters Kluwer Health.


John Gray
Rainier Chapter

Basic Principles of Database Security

John Gray, PhD, is an ISS analyst with over 15 years experience in information security and is employed by the Department of Defense.


Jeff Stapleton
St. Louis Chapter

Choosing Tokenization or Encryption; Security Standards Participation

Jeff Stapleton has been an ISSA member and participated in X9 standards for thirty years.


Clara Andress
Puget Sound Chapter

Drone Hacking: Mirai in the Sky?; Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA

Clara Andress is an application security expert, with a strong background in development and operations.


Jason Andress
Puget Sound Chapter

Drone Hacking: Mirai in the Sky?; Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA

Dr. Jason Andress is a seasoned security professional, security researcher, and technophile.


Maria Schuett
Minnesota Chapter

Robotic Process Automation Meets Identity and Access Management

Maria Schuett, CRISC, GLEG, is an information security architect and advisor.


Andy Igonor
Columbus Chapter

Cybersecurity Education: The Quest to Building “Bridge” Skills

Dr. Andy Igonor, CISM, CPHIMS, CRISC, is the Dean of the Ross College of Business at Franklin University in Columbus, OH.


Ray Forbes

Cybersecurity Education: The Quest to Building “Bridge” Skills

Dr. Ray Forbes is the Chair of the MS in Business Psychology at Franklin University.


Tim Norris

Cyber Risk Is Business Risk: But How Can We Work Better Together?

Tim Norris is a product and solution strategist at RSA.


Kevin A. Sesock
Oklahoma City Chapter

Immaturity and Moral Hazard in the Cyber Insurance Market

Kevin Sesock is a graduate student at Oklahoma State University and serves as the CIO for the Oklahoma Municipal Assurance Group.


Jari Peters
Central Florida Chapter

What I Wish STEM Programs Would Get Right

Jari Peters, CISM, CIPT, CIPM, ITIL Service Manager, is the Vice President of Security, Risk, and Regulatory Compliance for Oracle’s Global Business Units


Jason Remillard
Raleigh Chapter

DevOps and Infosec

Jason Remillard is CEO of Data443 Risk Mitigation, Inc. – A Data Privacy, Governance and Compliance SaaS & Services Provider.


Tony Rice
Raleigh Chapter

Secure DevOps before DevSecOps

Tony Rice, CISSP, is a DevSecOps architect at Cisco, regularly speaking on effectively incorporating application security into DevOps.


Kyle Bubp
East Tennessee Chapter

The Future of Security: It’s the Same Ol’ Song and Dance

Kyle is a defensive security practitioner with over a decade of experience in securing private and public sector organizations.


Jaret Langston

Mobile Devices and the Fifth Amendment

Jaret A. Langston, MsEng., is a credentialed course instructor andInterdisciplinary Engineering PhD candidate with the UAB School of Engineering.


Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.


Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.


Seetharaman Jeganathan

Practical Approaches to Overcome Security Challenges in Cloud Computing

Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.


Alex Smith
Central Ohio Chapter

SIEM Implementation for School Districts Utilizing FOSS

Alex Smith is a database administrator and DevOps engineer focusing on application team cy-bersecurity in public school districts.


Mariusz Stawowski
Senior Member, Poland Chapter

Automation of Business-Aware Incident Management

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, is CTO / Technical Director of CLICO, a security technologies distributor and service provider operating in Poland and other Central and Eastern European countries.


Matt Wilgus
Raleigh Chapter

Application Security, Ethics, & Eight-Year-Olds

Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat- and vulnerability-related offerings.


Yuri Diogenes
Senior Member, Fort Worth Chapter

The Quest for Visibility and Control in the Cloud

Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security Center.


Lori L. Cole
Blue Ridge Chapter

Countering Gender Disparity: Creating Anti-Predictions Using Data Science

Lori L. Cole, GSEC, GCIH, is a cyber threat analyst at BB&T. She was named SC Magazine’s IT Security 2018 Women to Watch.


Sean Kelly

Protecting Information Assets against Insider Threats

T. Sean Kelly is a Senior Director at FTI Consulting.


Andrew Shaxted

Protecting Information Assets against Insider Threats

Andrew Shaxted is a Senior Director in FTI Technology’s information governance, privacy and security practice.


Donna Gallaher
Metro Atlanta Chapter

Trends in Security Executive Leadership and the Rise of the vCISO

Donna Gallaher is the president and CEO of Atlanta-based New Oceans Enterprises, LLC, where she provides fractional/virtual CISO and operational risk advisory services.


William C. Barge
Northeast Indiana Chapter

The Mathematics behind RSA Encryption

William C. (Bill) Barge is an Associate Professor of Computer Science & Information Technology at Trine University in Angola, Indiana.


Kelley Bryant
Puget Sound Chapter

OWASP: Application Security’s Best Friend

Kelley Bryant, CISSP, CSSLP, AWS CCP, is a senior security consultant for AT&T Cybersecurity.


Mike Klepper
Puget Sound Chapter

Mitigating Supply Chain Risk through Insider Threat Programs

Mike Klepper, CISSP, CISM, AVSE, is an information security professional with over 26 years of experience.


Marcelo Carvalho
Brasil Chapter

Building on a Comfortable Gray Area

Marcelo Carvalho, CISSP, CISA, CRISC, has 18 years of information security experience at telecom and digital certificate companies.


Jonathan McCombs

Cybersecurity Education: The Quest to Building “Bridge” Skills

Dr. Jonathan McCombs is the Dean of the College of Health and Public Administration at Franklin University.


Greg Smith

Going Beyond FFIEC: How the Banking Industry Can Step Up Security Assessments

Greg Smith is a Senior Risk Advisor with Alagen cybersecurity solutions.


Jack Freund
Senior Member, Pittsburgh Chapter

Creating a Cyber Risk Intelligence Framework Integrating Best Practices and Standards

Dr. Jack Freund is a leading voice in cyber risk measurement and management.


John C. Montaña
Denver Chapter

The Role of Information Governance in Data Security

John Montaña, J.D. F.I.I.M, F.A.I.. is Vice President of Advisory Services at Montaña & Associates.


Seetharaman Jeganathan

DevSecOps: A Systemic Approach for Secure Software Development

Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and project management.


Delmer Nagy

Securing Terminology: Lessons from Interdisciplinary Research

Dr. Delmer Nagy is an Assistant Professor at Tarleton State University, part of the Texas A&M System.


Herbert Gomez

Securing Terminology: Lessons from Interdisciplinary Research

Herbert Gomez is pursuing his Bachelors Degree in Computer Information Technology.


Dale W. Callahan

Mobile Devices and the Fifth Amendment

Dale W. Callahan, PhD, is the Associate Dean at The University of Alabama Birmingham, with the UAB School of Engineering.


Joseph Popinski
ISSA Fellow, North Alabama Chapter

Mobile Devices and the Fifth Amendment

Joseph Popinski, PhD, retired, is an ad hoc faculty member at the University of Alabama in Birmingham in the School of Engineering.


Steve Kirby
Greater Spokane Chapter

Taking a Holistic Approach to Security

Stephen Kirby is an attorney based in Washington State and the managing director of an IT consulting firm.


Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.


Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.


Joe Malec
ISSA Fellow

Role-Based Security Awareness Training for Technology

Joe Malec is a Senior Security Analyst at Express Scripts with more than 25 years of experience in information technology.


Curtis Campbell
Senior Member, Chattanooga Chapter

Women in Cybersecurity

Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.


John Huckeby

Reasons to Outsource Your Internal IT Audit Function

John Huckeby, PCI QSA, HSA, CISA, ISO Lead Auditor, has been helping organizations secure their environ-ments for over 18 years.


Steve Kirby
Greater Spokane Chapter

Lost Cryptographics Keys – Lessons from Gerald Cotton

Stephen Kirby is an attorney based in Washington State and the CEO of an IT consulting firm.


Phillip H. Griffin
Fellow, Raleigh Chapter

Anonymous Digital Signatures; Privacy Preserving Blockchains; Security Standards Participation

Phillip, CISM, actively participates in ITU-T SG17 Security, ISO TC68/SC2 Security, ISO/IEC JTC1/SC27 Security techniques, and X9 Financial Services standards development.


Liu Hua Yeo

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Liu Hua Yeo is a doctoral student in technology at the College of Technology at Eastern Michigan University.


Xiangdong Che

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Dr. Xiangdong Che, CISSP, is an Associate Professor in the Information Assurance program at Eastern Michigan University.


Constantinos Doskas
Senior Member, Northern Virginia Chapter

The Python Programming Language

Constantinos Doskas is head of the IT and Security Department of Olympus.


Eric Lankford
Fort Worth Chapter

NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes

Eric Lankford is a cybersecurity engineer with more than twenty years of experience.


Paige M. Boshell

Smart Cities & Privacy

Paige Boshell is a managing member of Privacy Counsel LLC, which offers cybersecurity and privacy legal advice and strategies.


Joab Kose
South Florida Chapter

Privacy Concerns of Smartphone Technology

Joab Kose is currently doing his MS in Cybersecurity, with focus in Digital Forensics.


Jurgen van der Vlugt
Netherlands Chapter

Building on a Comfortable Gray Area

Ir.drs. Jurgen van der Vlugt, CISA, CRISC, is an independent advisor and IS auditor with 25 years of experience.


Kelley Archer
Distinguished Fellow, Minnesota Chapter

Building on a Comfortable Gray Area

Kelley Archer, CISSR, is a manager of risk and security in health care.


Sean D. Goodwin

Attackers Inside the Walls: Detecting Malicious Activity

Sean is a Senior Consultant in Wolf’s Information Technology (IT) Assurance Services group.


Paul Lanois
Silicon Valley Chapter

July 2019: The Month of Privacy?

Paul is a global privacy, data protection, and information security professional.


Stephen Berk
Minnesota Chapter

NIST Ushers in a New Era of IT Risk Management

Stephen Berk, CISSP, is an Information Systems Security Manager (ISSM) with CenturyLink’s public sector business unit.


Dorian Knoblauch

Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud

Dorian Knoblauch is a researcher in IT security, specialized on security test automation.


Jim de Haas
Netherlands Chapter

Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud

Jim de Haas has practiced information security for over 14 years and has presented at many conferences on the topic of cloud risk assessments.


Christopher Copeland

Securing Terminology: Lessons from Interdisciplinary Research

Dr. Christopher Copeland is an Assistant Professor at Tarleton State University, part of the Texas A&M System.


Jon-Michael Lacek

Changing the DevOps Culture One Security Scan at a Time

Jon-Michael Lacek is currently seeking a Master of Science in Information Security Management at SANS Technology Institute.


Ulf Mattsson
New York Chapter

Data Security: On Premise or in the Cloud

Ulf Mattsson has been an ISSA member and participated in X9 standards for more than fifteen years.


Carl Mehner
Alamo San Antonio Chapter

The Web PKI of the Future

Carl Mehner is an information security engineer who has spent the last decade working with the public key infrastructure, certificates, and secure protocols.


Community Search
Sign In


Calendar

1/22/2020
ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information