| ISSA Journal - Journal Authors 2020 |
2020 ISSA Journal Authors
Sabett’s Brief Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Cryptic Curmudgeon Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.
CISO Tips on Presenting to the Board Dimitra N. Kane, CISM and ABA-certified lawyers’ assistant, is an IT executive professional with experience in both the government and financial sectors.
Privacy Column Karen Martin is a San Jose based Information Security Engineer.
Offensive Cyber Operations Abroad Influence US Congressional Legislation Lori Cole, GSEC, GCIH, is a member of the Women in Engineering and Cybersecurity Communities of the IEEE and the CompTIA Advancing Women in Technology Group.
New Decade, New Possibilities James Carder brings more than 22 years of experience working in corporate IT security and consulting for the Fortune 500 and US government.
An Overview of Voice Authentication Dr. Nima Zahadat is a professor of forensics, information systems, and data science. He has worked extensively with public and private sectors throughout the years.
Iran Is Ready for Cyberwar Michael McCormick is an information security consultant, researcher, and founder of Taproot Security
The Ethical Use of Machine Learning in Cybersecurity; Quantum Cryptology: The Good, the Bad, and the Likely Frank Gearhart is a lead cybersecurity engineer (contractor) at DoD Missile Defense Agency, Colorado Springs, CO.
Mastering Your Failure in Security Edgar Vera is experienced in implementing systems and assessing weaknesses in pharmaceutical companies.
Sophisticated Tools Alone Cannot Prevent Advanced Persistent Threats: What’s Next? Yong Wang is an associate research professor in the Beacom College of Computer and Cyber Sciences at Dakota State University.
Why Top Management Must Now Stop the Drift to Chaos and Disorder; Integrated Role Clarification and Performance Evaluation: Key to a Successful Information Security and Privacy Effort Charles Cresson Wood, Esq., JD, MBA, MSE, CISM, CISSP, CISA, CGEIT, CIPP/US, is a manage-ment consultant and independent compliance auditor specializing in information security and privacy.
NY Shield Act Sets in Motion Sweeping Privacy Regulations Asaf Ashkenazi currently serves as chief operating officer of Verimatrix.
Demystifying Tokens for Securing Enterprise APIs Sandeep Jayashankar, CISSP, GIAC GMOB, is an experienced information security architect with a demonstrated history of supporting the finance industry.
Demystifying Tokens for Securing Enterprise APIs Subin Kandyhas led many successful red team operations and ethical hacking campaigns against enterprise organizations.
Quantum’s Potential Impact on Blockchain Computing Nicole Smith, Esq., is a technology and data security and privacy lawyer at Beckage.
Creating Value for Information Security in Company Culture Rachel Cessna is a full-time website developer and a graduate student at East Carolina University pursuing her MSNT.
Using PCI Scope to Lower Risks and Cost R. Scott Pierangelo, MSCS, QSA, CISSP, CISA, CISM, CRISC, CGEIT, PMP, CDPSE, PCIP, is a founding partner of Silent Storm Security.
Crypto Corner Luther Martin is a Distinguished Technologist at Micro Focus.
The Python Programming Language Constantinos Doskas is head of the IT and Security Department of Olympus.
Herding Cats Branden R. Williams, DBA, CISSP, CISM, is a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Offensive Cyber Operations Abroad Influence US Congressional Legislation Kory Fear, Network+, is a security analyst II at Hanesbrands Inc.
Cyber Trends of 2019 and What They Mean for 2020 Mamady Konneh is a senior information security professional, speaker, mentor, and founder and president of WeNetworkNow.
Cyber Trends of 2019 and What They Mean for 2020 Jeremy Swenson, founder of Abstract Forward Consulting, is a senior IT consultant, writer, and speaker.
How To Pay and Grow Talent in a Digital World David Foote is co-founder and chief analyst at Foote Partners, LLC.
Improving Cybersecurity Processes Mark Abrams is a certified LSS Black Belt with over 17 years of experience in improving operations across industries.
Leveraging and Building CSIRT Units Gilad David Maayan is a technology writer who has worked with over 150 technology companies.
Quantum Cryptography: Myths, Legends, and Hypothesis Jeff Stapleton has been an ISSA member and participated in X9 standards since 1989.
Quantum Computing and the Future Internet Tajdar Jawaid, PMP, MS Cybersecurity from University of Dallas, TX, is a security architect working for Telefonica UK.
Why Top Management Must Now Stop the Drift to Chaos and Disorder Perry Carpenter, MSIA, CCISO, CCMT, is chief evangelist and strategy officer at KnowBe4, an information security and privacy awareness and training firm.
Ethical Hacking from Vulnerability Scanning to Adversary Emulation Jorge Orchilles, MS, led the offensive security team in a large financial institution for 10 years and is a SANS Certified Instructor.
Managing Privacy Risk when Logging Events Koko Koffie-Lart works as an IT auditor supporting audit readiness and the development and implementation of system controls.
Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report Audrey Katcher, CPA, CISA, CITP, has more than 25 years of experience, currently serving as a partner in RubinBrown’s Business Advisory Services Group.
Disrupting the Talk about Privacy and Security “Disruption” Barry S. Herrin, JD, FAHIMA, FHIMSS, FACHE, is the founder of Herrin Health Law, P.C., in Atlanta, Ga.
Converging Data Privacy and Security Mauricio Tavares (BS aerospace engineering) worked in education, finance, and medical fields.
Third-Party Risk and Threat Hunting Gregory Rasner leads corporate cybersecurity third-party risk at Truist Financial Corp.
Cyber Risk Management: Strategic Plan or Afterthought? Mark Langford, CISSP, is the founder and principal consultant at Aberfoyle Associates, a cybersecurity consulting firm.
Quantitative Risk Calculation in Cybersecurity: The Value of Quantifying Risk Chris van den Hooven is a senior security consultant, Nixu Corporation and has a 15-year track record in translating business risks into appropriate measures in the field of information security.
Security in the News Kris Tanaka is a senior content manager at Evanta, working with the CFO, CIO, and CISO communities. Prior to Evanta, she was the content marketing strategist at SecureWorld and editor of the SecureWorld Post.
Gray Hat Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Women in Cybersecurity Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.
Cyber Professionals Can Be the Best Cyber Teachers Brian Ngac, C|CISO, CISSP, PMP, is an instructor of Information Systems & Operations Management at George Mason University’s School of Business.
Detecting Server-Side Request Forgery Attacks on Amazon Web Services Sean McElroy has been securing financial services solutions in the cloud for over 20 years.
Burnout and Job Fatigue; Sophisticated Tools Alone Cannot Prevent Advanced Persistent Threats: What’s Next? Srini Vuggumudi, CISSP, CEH, CCSK, PMP, Network+, is a senior security engineer at Malwarebytes Inc. and a PhD student at Dakota State University.
Measuring Security Effectiveness: A Critical Requirement for Cybersecurity Leaders Matt Hartley, CISSP, is a senior vice president at FireEye, Inc., the intelligence-led security company.
Cyber Resilience: A Blueprint for Success in the Global Digital Era Michael focuses on breach response preparedness, geopolitical cyber risks and M&A due diligence activities in order to enable enterprise resiliency.
Managing Remote Iot Platforms for Operational Tasks; Managing IoT Platforms with a Focus on Security Dale Drummond is a graduate student at East Carolina University and is team lead/sr. network management engineer at MCNC.
Data Privacy: De-Identification Techniques Ulf Mattsson has participated in the development of standards in ANSI X9 and PCI DSS for more than fifteen years.
Can You Handle a Nation-State Cyber Attack? Gordon Lawson has nearly two decades of experience in the security sector with a focus on SaaS optimization and global enterprise business development.
Mindlessly Following “Best Practices” Stephen Kirby is an attorney based in Washington State and the managing director of an IT consulting firm.
Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report Jennifer Zanone, CISA, PMP, is a manager in RubinBrown’s Business Advisory Services Group.
Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report Christine Figge, CPA, CGMA, is a partner in RubinBrown’s Assurance and Business Advisory Services Groups.
Converging Data Privacy and Security Valdez Ladd (MBA, CISSP, CISA) is a Siemens healthineer who strives to keep the health industry safe and productive.
Keys, Certificates and The Defeat of the Imperial Japanese Navy Randy is a 20+ year veteran of the IT industry living in Nashville.
The MITRE ATT&CK Framework: Where Do You Start? Dylan Williams, AWS-SAA, AWS-SOA, Security +, is a cybersecurity analyst at an economic consulting firm in Washington, DC.
Using PCI Scope to Lower Risks and Cost David Lam, CISSP, CPP, is partner and CISO at Miller Kaplan with 33 years of IT experience.
Surveying Five Years of Java Deserialization CVEs Erik Elbieh (OSCP) is a security researcher and consultant at Palindrome Technologies. Erik enjoys penetration testing nearly anything, from web apps to cloud environments.
Proving the Negative Outcome Marilyn Hays has spent her entire career in various IT positions running the gamut from digitization of paper records into CAD, as a developer of management information systems, IT department head, and since 2001 in various roles in security.
Privacy-Preserving Contact Tracing Richard Abrich is a machine learning scientist, engineer, and entrepreneur.
Privacy-Preserving Contact Tracing Gary S. Chan is an information security management consultant who helps companies build and operate their security programs.
How to Calculate ROI and Deliver Business Value John E. Bennett is based in Denver, CO, with global experience delivering enterprise value in cybersecurity, telecom, and IT.
What is Data Loss Prevention? Zamil Alshammari is board member of ISSA Saudi Arabia Chapter and data loss prevention specialist.
CSIRT and What Next? Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.
Overview of Customer Identity and Access Management Jharna Roy, CISSP, is a cyber leader with 15 years of experience solving clients’ most complex problems and advising on enterprise-wide strategic cyber initiatives.
FIDO: Fast IDentity Online Arshad Noor is the CTO of StrongKey since 2001.
Managing Personnel Turnover Fabio Sobiecki, CISSP, CCSP, CDPSE, is now solutions engineer for Transmit Security but worked for more than 15 years as managing security consultant for worldwide projects. |
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!