| ISSA Journal - Journal Authors 2019 |
2019 ISSA Journal Authors
Sabett’s Brief Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Herding Cats Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Cryptic Curmudgeon Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.
California Dreaming – The Fight with the Federal Government over Technology Mr. Jackson, CISSP, CEH, CIPP, works as a regulatory attorney for a government contractor in the Washington DC area.
Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization Philip Casesa, CISSP, CSSLP, PMP, ITIL, SAFe Agilist, is a director at Focal Point with years of experience in cybersecurity, software development, and consulting.
Security Made Amazon Profitable Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.
Technology Repurposing: What Will Blockchain Be Tomorrow?; Security Engineering and Integration Principles and Myths Mark Kadrich is a well-known speaker and evangelist on network security matters at technical conferences and security events.
We Are the Front Lines – Protecting Yourself Protects the Organization Tony Buenger assumed the role of CISO for Augusta University in 2018. He served as an Associate Professor for the National Defense University.
Building a Risk-Based Information Security Culture Don McKeown is currently an Information Security Manager at Wolters Kluwer Health.
Basic Principles of Database Security John Gray, PhD, is an ISS analyst with over 15 years experience in information security and is employed by the Department of Defense.
Choosing Tokenization or Encryption; Security Standards Participation Jeff Stapleton has been an ISSA member and participated in X9 standards for thirty years.
Drone Hacking: Mirai in the Sky?; Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA Clara Andress is an application security expert, with a strong background in development and operations.
Drone Hacking: Mirai in the Sky?; Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA Dr. Jason Andress is a seasoned security professional, security researcher, and technophile.
Robotic Process Automation Meets Identity and Access Management Maria Schuett, CRISC, GLEG, is an information security architect and advisor.
Cybersecurity Education: The Quest to Building “Bridge” Skills Dr. Andy Igonor, CISM, CPHIMS, CRISC, is the Dean of the Ross College of Business at Franklin University in Columbus, OH.
Cybersecurity Education: The Quest to Building “Bridge” Skills Dr. Ray Forbes is the Chair of the MS in Business Psychology at Franklin University.
Cyber Risk Is Business Risk: But How Can We Work Better Together? Tim Norris is a product and solution strategist at RSA.
Immaturity and Moral Hazard in the Cyber Insurance Market Kevin Sesock is a graduate student at Oklahoma State University and serves as the CIO for the Oklahoma Municipal Assurance Group.
What I Wish STEM Programs Would Get Right Jari Peters, CISM, CIPT, CIPM, ITIL Service Manager, is the Vice President of Security, Risk, and Regulatory Compliance for Oracle’s Global Business Units
DevOps and Infosec Jason Remillard is CEO of Data443 Risk Mitigation, Inc. – A Data Privacy, Governance and Compliance SaaS & Services Provider.
Secure DevOps before DevSecOps Tony Rice, CISSP, is a DevSecOps architect at Cisco, regularly speaking on effectively incorporating application security into DevOps.
The Future of Security: It’s the Same Ol’ Song and Dance Kyle is a defensive security practitioner with over a decade of experience in securing private and public sector organizations.
Mobile Devices and the Fifth Amendment Jaret A. Langston, MsEng., is a credentialed course instructor andInterdisciplinary Engineering PhD candidate with the UAB School of Engineering.
Security Awareness Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.
Crypto Corner Luther Martin is a Distinguished Technologist at Micro Focus.
Practical Approaches to Overcome Security Challenges in Cloud Computing; DevSecOps: A Systemic Approach for Secure Software Development Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.
SIEM Implementation for School Districts Utilizing FOSS Alex Smith is a database administrator and DevOps engineer focusing on application team cy-bersecurity in public school districts.
Automation of Business-Aware Incident Management Mariusz Stawowski, PhD, CISSP, CEH, CCISO, is CTO / Technical Director of CLICO, a security technologies distributor and service provider operating in Poland and other Central and Eastern European countries.
Application Security, Ethics, & Eight-Year-Olds Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat- and vulnerability-related offerings.
The Quest for Visibility and Control in the Cloud Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security Center.
Countering Gender Disparity: Creating Anti-Predictions Using Data Science Lori L. Cole, GSEC, GCIH, is a cyber threat analyst at BB&T. She was named SC Magazine’s IT Security 2018 Women to Watch.
Protecting Information Assets against Insider Threats T. Sean Kelly is a Senior Director at FTI Consulting.
Protecting Information Assets against Insider Threats Andrew Shaxted is a Senior Director in FTI Technology’s information governance, privacy and security practice.
Trends in Security Executive Leadership and the Rise of the vCISO Donna Gallaher is the president and CEO of Atlanta-based New Oceans Enterprises, LLC, where she provides fractional/virtual CISO and operational risk advisory services.
The Mathematics behind RSA Encryption William C. (Bill) Barge is an Associate Professor of Computer Science & Information Technology at Trine University in Angola, Indiana.
OWASP: Application Security’s Best Friend Kelley Bryant, CISSP, CSSLP, AWS CCP, is a senior security consultant for AT&T Cybersecurity.
Mitigating Supply Chain Risk through Insider Threat Programs Mike Klepper, CISSP, CISM, AVSE, is an information security professional with over 26 years of experience.
Building on a Comfortable Gray Area Marcelo Carvalho, CISSP, CISA, CRISC, has 18 years of information security experience at telecom and digital certificate companies.
Cybersecurity Education: The Quest to Building “Bridge” Skills Dr. Jonathan McCombs is the Dean of the College of Health and Public Administration at Franklin University.
Going Beyond FFIEC: How the Banking Industry Can Step Up Security Assessments Greg Smith is a Senior Risk Advisor with Alagen cybersecurity solutions.
Creating a Cyber Risk Intelligence Framework Integrating Best Practices and Standards Dr. Jack Freund is a leading voice in cyber risk measurement and management.
The Role of Information Governance in Data Security John Montaña, J.D. F.I.I.M, F.A.I.. is Vice President of Advisory Services at Montaña & Associates.
Securing Terminology: Lessons from Interdisciplinary Research Dr. Delmer Nagy is an Assistant Professor at Tarleton State University, part of the Texas A&M System.
Securing Terminology: Lessons from Interdisciplinary Research Herbert Gomez is pursuing his Bachelors Degree in Computer Information Technology.
Mobile Devices and the Fifth Amendment Dale W. Callahan, PhD, is the Associate Dean at The University of Alabama Birmingham, with the UAB School of Engineering.
Mobile Devices and the Fifth Amendment Joseph Popinski, PhD, retired, is an ad hoc faculty member at the University of Alabama in Birmingham in the School of Engineering.
Security in the News Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.
Gray Hat Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Role-Based Security Awareness Training for Technology Joe Malec is a Senior Security Analyst at Express Scripts with more than 25 years of experience in information technology.
Women in Cybersecurity Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.
Reasons to Outsource Your Internal IT Audit Function John Huckeby, PCI QSA, HSA, CISA, ISO Lead Auditor, has been helping organizations secure their environ-ments for over 18 years.
Lost Cryptographics Keys – Lessons from Gerald Cotton; Taking a Holistic Approach to Security Stephen Kirby is an attorney based in Washington State and the CEO of an IT consulting firm.
Anonymous Digital Signatures; Privacy Preserving Blockchains; Security Standards Participation Phillip, CISM, actively participates in ITU-T SG17 Security, ISO TC68/SC2 Security, ISO/IEC JTC1/SC27 Security techniques, and X9 Financial Services standards development.
A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques Liu Hua Yeo is a doctoral student in technology at the College of Technology at Eastern Michigan University.
A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques Dr. Xiangdong Che, CISSP, is an Associate Professor in the Information Assurance program at Eastern Michigan University.
The Python Programming Language Constantinos Doskas is head of the IT and Security Department of Olympus.
NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes Eric Lankford is a cybersecurity engineer with more than twenty years of experience.
Smart Cities & Privacy Paige Boshell is a managing member of Privacy Counsel LLC, which offers cybersecurity and privacy legal advice and strategies.
Privacy Concerns of Smartphone Technology Joab Kose is currently doing his MS in Cybersecurity, with focus in Digital Forensics.
Building on a Comfortable Gray Area Ir.drs. Jurgen van der Vlugt, CISA, CRISC, is an independent advisor and IS auditor with 25 years of experience.
Building on a Comfortable Gray Area Kelley Archer, CISSR, is a manager of risk and security in health care.
Attackers Inside the Walls: Detecting Malicious Activity Sean is a Senior Consultant in Wolf’s Information Technology (IT) Assurance Services group.
July 2019: The Month of Privacy? Paul is a global privacy, data protection, and information security professional.
NIST Ushers in a New Era of IT Risk Management Stephen Berk, CISSP, is an Information Systems Security Manager (ISSM) with CenturyLink’s public sector business unit.
Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud Dorian Knoblauch is a researcher in IT security, specialized on security test automation.
Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud Jim de Haas has practiced information security for over 14 years and has presented at many conferences on the topic of cloud risk assessments.
Securing Terminology: Lessons from Interdisciplinary Research Dr. Christopher Copeland is an Assistant Professor at Tarleton State University, part of the Texas A&M System.
Changing the DevOps Culture One Security Scan at a Time Jon-Michael Lacek is currently seeking a Master of Science in Information Security Management at SANS Technology Institute.
Data Security: On Premise or in the Cloud Ulf Mattsson has been an ISSA member and participated in X9 standards for more than fifteen years.
The Web PKI of the Future Carl Mehner is an information security engineer who has spent the last decade working with the public key infrastructure, certificates, and secure protocols. |
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!