| ISSA Journal - Journal Authors 2016 |
2016 ISSA Journal Authors
Sabett’s Brief Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Herding Cats Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Security Awareness Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.
Crypto Corner; Why Risk Management Is Hard, Crypto Wars II, The Use and Misuse of Entropy Luther Martin is a Distinguished Technologist at Hewlett Packard Enterprise.
Promoting Public Cloud Workload Security, Mobile Application Security Jason Paul Kazarian is a Senior Architect for Hewlett Packard Enterprise and specializes in integrating data security products with third-party subsystems.
Machine Learning Is Alive – and a Life Saver, Too; Machine Learning: A Primer for Security Stephan Jou is CTO at Interset. He was previously with IBM and Cognos and holds an MSc in Computational Neuroscience and Biomedical Engineering and a dual BSc in Computer Science and Human Physiology from the University of Toronto.
Protecting Your Data against Cyber Attacks in Big Data Environments Reiner Kappenberger has over 20 years of computer software industry experience focusing on encryption and security for big data environments. His background ranges from device management in the telecommunications sector to GIS and database systems.
Using Data Breach Reports to Assess Risk Analysis Quality Dr. Jack Freund, CISSP, CISA, CISM, CRISC, is currently Senior Manager, Cyber Risk & Controls at TIAA-CREF. He was awarded a Doctorate in Information Systems. Jack is the coauthor of Measuring and Managing Information Risk: A FAIR Approach.
Between a Rock and a Hard Place Kelley Archer, CISSR, is security consultant and has worked in the information security field for over 25 years with a vast array of experience. He was one of the co-founders of Secure360.
Fragmentation in Mobile Devices Ken Smith works for SecureState, works primarily on wireless and physical assessments as well as in mobile device and application security.
CryptoLocker Carl Saiyed, CISSP, is a full-time security analyst in critical infrastructure sectors.
Protecting against Tomorrow’s Malware Attacks Today Dr. Guy Bunkeris an internationally renowned IT expert with over 20 years experience in information security and IT management.
The Rise of Malicious Documents Didier Stevens (Microsoft MVP Consumer Security, SANS ISC Handler, Wireshark Certified Network Analyst, CISSP, GSSP-C) is an IT security consultant currently working at a large Belgian financial corporation.
Linking Information Security to Other Key Organizational Initiatives Eric M. Harper, EdD, is a talent-management leader for a financial services company. His doctoral research focuses on the variables impacting employee engagement.
Linking Information Security to Other Key Organizational Initiatives Alex L. Nehlebaeff, CISSP, is a retired US Navy Chief Petty Officer who has worked in the information security field since 1990.
Why the Merging of Security and Privacy is a Good Thing Steve Conrad is the founder and managing director of MediaPro and has extensive experience in improving organizational performance through effective awareness and learning solutions.
Preparing for New Electronic Communication Privacy Laws Rouman Ebrahim is a Deputy District Attorney for the County of Los Angeles, assigned to the High Technology Crime Division.
Stop Delivery of Phishing Emails Gary Landau, CISSP, CCNP, CCSK, is an experienced IT and security leader. He advocates for third-party security assessments and was a founding board member and past president of CSA-LA\SoCal.
Architecture 101 Mark Kadrich, CISO San Diego Health Connect, has 30+ years working in the security community, building knowledge, and contributing solutions.
Internet of Things: Security, Privacy and Governance Regner Sabillon is a PhD candidate at the Network and Information Technologies Programme – Catalonian Open University (UOC), Spain, and a Canadian researcher in cybersecurity, cyber law, cyberforensics, and cybercrime areas.
Show Me the Technology! Gordon Merrill, MSIA, CISSP, is a cybersecurity professional whose career spans over three decades and has taken him to 48 states and six foreign countries.
Infosec Staffing Steve Riess has been doing information technology staffing for over 25 years and is an active ISSA, ISACA, and AITP member.
The Role of the Adjunct in Educating the Security Practitioner Karen Quagliata, PhD, PMP, CISA, CISSP, is an information security analyst working in risk management and governance. She is also an adjunct instructor for multiple universities and colleges.
Beware the Blockchain Karen Martin is a San Jose, California-based technical writer with over a decade of experience in information security.
Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals Seetharaman Jeganathan, CISSP, mainly focuses on information systems risk assessments, identity and access management (IAM) solution strategy definition, architecture definition, and design and implementation of IAM security solutions.
Why Risk Management Is Hard, Crypto Wars II Amy Vosters is the Marketing Manager at SOASTA Inc., a SaaS company based in Mountain View, CA, that specializes in mobile- and web-performance test automation and real user monitoring solutions.
Oh Baby - The IoT and Security Avani Desai, first and foremost a mom, is an Executive Vice President at BrightLine. She has been helping clients with their compliance services for over 13 years.
Your CISSP Is Worthless - Take Two Dr. Frederick Scholl, CISSP, CISM, is president of Monarch Information Networks, LLC. He also teaches Risk Mitigation at Lipscomb University and Network Security at Vanderbilt University.
The Increasing Significance of Ethics in IT Security Betty Pierce, GSLC, is a program manager with a civilian US government agency and high-tech startup junkie with over 34 years in IT, the most recent 15 years specializing in information security.
Securing the Cloud Barettè Mort, MS Systems Engineering, is a security professional with Raytheon. She has worked in the industries of finance, web development, consulting, and defense.
Using Data Breach Reports to Assess Risk Analysis Quality Dr. Stephen Fritts, CISA, CISM, CISSP, CRMA, CRISC, PMP, is 20-year IT industry veteran and a subject matter expert in IT risk management. He received his Doctorate in the field of Business Management, and holds MBA, MS, and BA degrees.
Security’s Seat at the Big Data Table Tony Rice, CISSP, is a Senior Application Security Engineer at Cisco. He regularly speaks on effectively incorporating application security into DevOps and the wealth of source code and product-quality analytics possibilities that opens.
Using Data Breach Reports to Assess Risk Analysis Quality Joan Marius is a Senior Information Security Analyst at TIAA-CREF. Joan received a Master of Science in Mathematics with concentration in Applied Statistics. Joan specializes in multivariate analysis of risk and financial scenarios.
Mobile Application Security, Payment Ecosystem Security Smrithi Konanur, Global Product Management, HPE Security, has over 14 years of computer software industry experience including more than nine years of experience in the payment industry.
The Practice of Malware Protection for Commercial Banking, Practical View of Payment Security for Online Banking Systems Sergey Tikhonov is Chief of IT Department and Chief of IT Security Department in Aljba Alliance Commercial Bank Ltd and has over 20 years experience in IT and Information Security.
The Practice of Malware Protection for Commercial Banking, Practical View of Payment Security for Online Banking Systems Miroslava Bondarenko is Deputy Chief of IT Department and Deputy Chief of IT Security Department in Aljba Alliance Commercial Bank Ltd with over 20 years experience in IT and Information Security.
The Hotel Industry Has a PoS Malware Problem Andy Green is a veteran technology journalist with over 12 year of experience writing about high-tech topics.
Do Data Breaches Matter? A Review of Breach Data and What to Do Next Kristopher Dane, Associate at the international engineering firm Thornton Tomasetti, Inc.
FedRAMP’s Database Scanning Requirement: The Letter and Spirit Matt Wilgus is a Practice Director at Schellman & Company, Inc. where he leads the security testing and assessment offerings.
Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting Information Security Concerns Dallas Hammer is an attorney at Zuckerman Law and chairs the firm’s Whistleblower Rewards Practice Group.
Addressing Data Privacy Regulation & Standards: A Process Harsha Banavara, CSSLP, CIPP, Security+, MSc in Software Engineering, is cybersecurity analyst and the global subject matter expert in the “Requirements” stage of Secure Development Lifecycle at Schneider Electric with eight+ years of experience in information security.
Contribute – Be More Than Just a Member! Scott Parker has 30 years of tactical and strategic information security experience across multiple control points: data centers, endpoints, and gateways.
Impact of Social Media on Cybersecurity Employment and How to Use It to Improve Your Career Tim Howard is the founder of Fortify Experts, which helps companies find exceptional cybersecurity talent through executive search, permanent placement, and project consultants.
Internet of Things: Arduino Vulnerability Analysis Audrey Gendreau, PhD, CISSP, GCFE is a university-level Cybersecurity Researcher with several publications focused on the security of the Internet of Things.
Internet of Things: Key Challenges to Overcome Aditya Srivastava is a student at University of Petroleum and Energy Studies currently pursuing a Bachelor’s of Technology in Computer Science Engineering with specialization in Cybersecurity and Forensics by IBM.
Payment Card Security: Is a Standard Enough? Kimberly Wamba, PCIP, PMP, is an information security and project management professional currently working as a Relationship Manager for a local company specializing in PCI compliance and network security.
How Not to Become Statistics: What CISOs Should Know on Cyber Insurance, Privacy, and Innovations Dr. Ilya Kabanov is a global director, application security and compliance, and a Sloan Fellow alum at the Massachusetts Institute of Technology
End-to-End Encryption Security Jeff Hall, CISSP, CISM, has over 30 years of technology and compliance experience and is certified in the governance of enterprise information technology and a PCI QSA.
The Race against Cyber Crime Is Lost without Artificial Intelligence Keith Moore specializes in applying advanced data science and natural language processing algorithms to complex data sets.
Secure ERP Implementation Alexander Polyakov is CTO and founder of ERPScan, president of EAS-SEC.org Project, and an accomplished R&D professional.
Gaining Confidence in the Cloud Phillip H. Griffin, CISM, has over 20 years experience in the development of commercial, national, and international security standards and cryptographic messaging protocols. He has been awarded nine US patents at the intersection of biometrics, radio frequency identification (RFID), and information security management.
Security in the News Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.
Security in the News Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.
Gaining Confidence in the Cloud Jeff Stapleton has participated in X9 for over twenty years; he has contributed to the development of over three dozen X9 and ISO security standards, and has been the chair of the X9F4 work group for over 15 years.
Why Information Security Teams Fail Jason Lang (@curi0usJack) has worked in enterprise security for over 10 years in both offensive and defensive roles and is currently employed as a senior consultant with SynerComm in Brookfield, WI.
Securing Data to Prevent Data Theft Barry Stetler has worked in the technology industry since 2001 and has owned and operated two technology companies providing managed services, computer repair, web hosting, and Internet connectivity.
Big Data Security Analytics – Continuing the Innovation Wave Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.
Mobile App Testing for the Enterprise Vincent Sritapan is a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T.
Mobile App Testing for the Enterprise Dr. Angelos Stavrou is a founder and president of Kryptowire and has served as principal investigator on contracts from NSF, DARPA, IARPA, DHS, AFOSR, ARO, ONR.
Evolving Ransomware Stu Sjouwerman is the founder and CEO of KnowBe4, a security awareness training and simulated phishing platform.
Malware Evolution and the Cyber Talent Gap Domini Clark is the Principal for Blackmere Consulting, an executive search firm dedicated to the information security industry.
Internet Balkanization Is Coming, Thinking Survivability, Gray Hat Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Smart Practices in Managing an Identity-Auditing Project; Resolving the Cybersecurity Workforce Shortage Kerry A. Anderson, CISA, CISM, CRISC, CGEIT, CISSP, is an information security and records management professional with more than 18 years of experience in information security and IT.
On the Costs of Bitcoin Connectivity Dr. Ashish Gehani of SRI International holds a BS (Honors) in Mathematics from the University of Chicago and PhD in Computer Science from Duke University.
Addressing Data Privacy Regulation & Standards: A Process Jeffrey Farago, CSSLP, CEH, CPT, MSc in Cybersecurity, is cybersecurity director in the Building & IT Business Unit, for Schneider Electric with a 44-year career in product development, 21 years at Schneider Electric.
Blockchain: The Legal Industry; Social Media: The Danger Zone; Internet of Things: Trust; Infosec Careers and Guidance Rajinder Tumber is a two-time finalist for the “Personality of the Year” award in the cybersecurity industry, and a finalist for the “IT Manager of the Year” award from Computing and BCS – The Chartered Institute for IT.
Social Media Impact: Is It Possible to Be Social and Secure? Yuri Diogenes, CISSP, CASP, E|CEH, E|CSA, currently works for Microsoft as Senior Content Developer for the Enterprise Mobility Team and Azure Security
User-Managed Access – Do We Need Yet Another Standard? Patryk Królikowski, Senior Customer Engineer at ForgeRock, is an information security professional with over 10 years of field experience, involved in numerous projects covering privileged identity management, network security, DLP, and SIEM.
Cloud Dilemma? Alen Ilic lives in NYC, just received his Bachelors in InfoSec, and is looking to learn more by getting hands-on experience and taking graduate-level classes.
Attacker with Administrator Rights Jeff Hall, CISSP, CISM, has over 30 years of technology and compliance experience and is certified in the governance of enterprise information technology and a PCI QSA.
The Use and Misuse of Entropy Tim Roake is a Senior Software Engineer at Hewlett Packard Enterprise.
Cyber Workforce Strategy: Developing Professionals Internally Jeff Fenton, CISSP, ISSEP, ISSMP, CISM, CRISC, CIPP/US, GBLC, CBCP, is a Sr. Staff Cybersecurity Governance, Risk, and Compliance Analyst with Lockheed Martin’s Corporate Information Security organization.
Security Legal Update Monique Ferraro, CISSP, CIPP/US, is Counsel in the Cyber Practice at Harford Steam Boiler Inspection and Insurance Company. She provides legal and technical expertise in support of cyber efforts undertaken by Munich Re’s US Property & Casualty Operations.
Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures Jeff Bardin is Chief Intelligence Officer, Treadstone 71.
Secure Network Design: Micro Segmentation Brandon Peterson leads the Desert Research Institute’s Cyber Security and Incident Response team. He is also a community instructor with SANS. |
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!