This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
ISSA Journal - Journal Authors 2020
ISSA Journal

 

2020 ISSA Journal Authors

 

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.


Robert Slade

Cryptic Curmudgeon

Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.


Dimitra N. Kane
Chicago Chapter

CISO Tips on Presenting to the Board

Dimitra N. Kane, CISM and ABA-certified lawyers’ assistant, is an IT executive professional with experience in both the government and financial sectors.


Karen Martin

Privacy Column

Karen Martin is a San Jose based Information Security Engineer.


Lori L. Cole
Blue Ridge Chapter and Triad of NC Chapters

Offensive Cyber Operations Abroad Influence US Congressional Legislation

Lori Cole, GSEC, GCIH, is a member of the Women in Engineering and Cybersecurity Communities of the IEEE and the CompTIA Advancing Women in Technology Group.


James Carder
Denver Chapter

New Decade, New Possibilities

James Carder brings more than 22 years of experience working in corporate IT security and consulting for the Fortune 500 and US government.


Nima Zahadat
Northern Virginia Chapter

An Overview of Voice Authentication

Dr. Nima Zahadat is a professor of forensics, information systems, and data science. He has worked extensively with public and private sectors throughout the years.


Mike McCormick
Minnesota Chapter

Iran Is Ready for Cyberwar

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security


Frank Gearhart
Senior Member - Colorado Springs Chapter

The Ethical Use of Machine Learning in Cybersecurity; Quantum Cryptology: The Good, the Bad, and the Likely

Frank Gearhart is a lead cybersecurity engineer (contractor) at DoD Missile Defense Agency, Colorado Springs, CO.


Edgar Vera
Puerto Rico Chapter

Mastering Your Failure in Security

Edgar Vera is experienced in implementing systems and assessing weaknesses in pharmaceutical companies.


Yong Wang

Sophisticated Tools Alone Cannot Prevent Advanced Persistent Threats: What’s Next?

Yong Wang is an associate research professor in the Beacom College of Computer and Cyber Sciences at Dakota State University.


Charles Cresson Wood
San Francisco Chapter

Why Top Management Must Now Stop the Drift to Chaos and Disorder; Integrated Role Clarification and Performance Evaluation: Key to a Successful Information Security and Privacy Effort

Charles Cresson Wood, Esq., JD, MBA, MSE, CISM, CISSP, CISA, CGEIT, CIPP/US, is a manage-ment consultant and independent compliance auditor specializing in information security and privacy.


Asaf Ashkenazi

NY Shield Act Sets in Motion Sweeping Privacy Regulations

Asaf Ashkenazi currently serves as chief operating officer of Verimatrix.


Sandeep Jayashankar
Delaware Chapter

Demystifying Tokens for Securing Enterprise APIs

Sandeep Jayashankar, CISSP, GIAC GMOB, is an experienced information security architect with a demonstrated history of supporting the finance industry.


Subin Thayyile Kandy
Delaware Chapter

Demystifying Tokens for Securing Enterprise APIs

Subin Kandyhas led many successful red team operations and ethical hacking campaigns against enterprise organizations.


Nicole Smith
Buffalo Niagara Chapter

Quantum’s Potential Impact on Blockchain Computing

Nicole Smith, Esq., is a technology and data security and privacy lawyer at Beckage.


Rachel A. Cessna

Creating Value for Information Security in Company Culture

Rachel Cessna is a full-time website developer and a graduate student at East Carolina University pursuing her MSNT.


R. Scott Pierangelo

Using PCI Scope to Lower Risks and Cost

R. Scott Pierangelo, MSCS, QSA, CISSP, CISA, CISM, CRISC, CGEIT, PMP, CDPSE, PCIP, is a founding partner of Silent Storm Security.


Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.


Constantinos Doskas
Senior Member, Northern Virginia Chapter

The Python Programming Language

Constantinos Doskas is head of the IT and Security Department of Olympus.


Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.


Kory Fear
Triad of NC Chapter

Offensive Cyber Operations Abroad Influence US Congressional Legislation

Kory Fear, Network+, is a security analyst II at Hanesbrands Inc.


Mamady Konneh
Minnesota Chapter

Cyber Trends of 2019 and What They Mean for 2020

Mamady Konneh is a senior information security professional, speaker, mentor, and founder and president of WeNetworkNow.


Jeremy Swenson
Minnesota Chapter

Cyber Trends of 2019 and What They Mean for 2020

Jeremy Swenson, founder of Abstract Forward Consulting, is a senior IT consultant, writer, and speaker.


David Foote

How To Pay and Grow Talent in a Digital World

David Foote is co-founder and chief analyst at Foote Partners, LLC.


Mark Abrams
New England Chapter

Improving Cybersecurity Processes

Mark Abrams is a certified LSS Black Belt with over 17 years of experience in improving operations across industries.


Gilad Maayan

Leveraging and Building CSIRT Units

Gilad David Maayan is a technology writer who has worked with over 150 technology companies.


Jeff Stapleton
St. Louis Chapter

Quantum Cryptography: Myths, Legends, and Hypothesis

Jeff Stapleton has been an ISSA member and participated in X9 standards since 1989.


Tajdar Jawaid
UK Chapter

Quantum Computing and the Future Internet

Tajdar Jawaid, PMP, MS Cybersecurity from University of Dallas, TX, is a security architect working for Telefonica UK.


Perry Carpenter

Why Top Management Must Now Stop the Drift to Chaos and Disorder

Perry Carpenter, MSIA, CCISO, CCMT, is chief evangelist and strategy officer at KnowBe4, an information security and privacy awareness and training firm.


Jorge Orchilles
ISSA Fellow, South Florida Chapter

Ethical Hacking from Vulnerability Scanning to Adversary Emulation

Jorge Orchilles, MS, led the offensive security team in a large financial institution for 10 years and is a SANS Certified Instructor.


Koko Koffie-Lart
Northern Virginia Chapter

Managing Privacy Risk when Logging Events

Koko Koffie-Lart works as an IT auditor supporting audit readiness and the development and implementation of system controls.


Audrey Katcher

Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report

Audrey Katcher, CPA, CISA, CITP, has more than 25 years of experience, currently serving as a partner in RubinBrown’s Business Advisory Services Group.


Barry S. Herrin
Atlanta Chapter

Disrupting the Talk about Privacy and Security “Disruption”

Barry S. Herrin, JD, FAHIMA, FHIMSS, FACHE, is the founder of Herrin Health Law, P.C., in Atlanta, Ga.


Mauricio Tavares
Raleigh Chapter

Converging Data Privacy and Security

Mauricio Tavares (BS aerospace engineering) worked in education, finance, and medical fields.


Gregory Rasner
Raleigh Chapter

Third-Party Risk and Threat Hunting

Gregory Rasner leads corporate cybersecurity third-party risk at Truist Financial Corp.


Mark Langford
North Texas Chapter

Cyber Risk Management: Strategic Plan or Afterthought?

Mark Langford, CISSP, is the founder and principal consultant at Aberfoyle Associates, a cybersecurity consulting firm.


Chris van den Hooven
Netherlands Chapter

Quantitative Risk Calculation in Cybersecurity: The Value of Quantifying Risk

Chris van den Hooven is a senior security consultant, Nixu Corporation and has a 15-year track record in translating business risks into appropriate measures in the field of information security.


Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is a senior content manager at Evanta, working with the CFO, CIO, and CISO communities. Prior to Evanta, she was the content marketing strategist at SecureWorld and editor of the SecureWorld Post.


Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.


Curtis Campbell
Senior Member, Chattanooga Chapter

Women in Cybersecurity

Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.


Brian Ngac
Northern Virginia Chapter

Cyber Professionals Can Be the Best Cyber Teachers

Brian Ngac, C|CISO, CISSP, PMP, is an instructor of Information Systems & Operations Management at George Mason University’s School of Business.


Sean McElroy
North Texas Chapter

Detecting Server-Side Request Forgery Attacks on Amazon Web Services

Sean McElroy has been securing financial services solutions in the cloud for over 20 years.


Srini Vuggumudi
Silicon Valley Chapter

Burnout and Job Fatigue; Sophisticated Tools Alone Cannot Prevent Advanced Persistent Threats: What’s Next?

Srini Vuggumudi, CISSP, CEH, CCSK, PMP, Network+, is a senior security engineer at Malwarebytes Inc. and a PhD student at Dakota State University.


Matt Hartley
Senior Member, Northern Virginia Chapter

Measuring Security Effectiveness: A Critical Requirement for Cybersecurity Leaders

Matt Hartley, CISSP, is a senior vice president at FireEye, Inc., the intelligence-led security company.


Michael Doran
Kansas Chapter

Cyber Resilience: A Blueprint for Success in the Global Digital Era

Michael focuses on breach response preparedness, geopolitical cyber risks and M&A due diligence activities in order to enable enterprise resiliency.


Dale E. Drummond

Managing Remote Iot Platforms for Operational Tasks; Managing IoT Platforms with a Focus on Security

Dale Drummond is a graduate student at East Carolina University and is team lead/sr. network management engineer at MCNC.


Ulf Mattsson
New York Chapter

Data Privacy: De-Identification Techniques

Ulf Mattsson has participated in the development of standards in ANSI X9 and PCI DSS for more than fifteen years.


Gordon Lawson
National Capital Chapter

Can You Handle a Nation-State Cyber Attack?

Gordon Lawson has nearly two decades of experience in the security sector with a focus on SaaS optimization and global enterprise business development.


Steve Kirby
Greater Spokane Chapter

Mindlessly Following “Best Practices”

Stephen Kirby is an attorney based in Washington State and the managing director of an IT consulting firm.


Jennifer Zanone
Denver Chapter

Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report

Jennifer Zanone, CISA, PMP, is a manager in RubinBrown’s Business Advisory Services Group.


Christine Figge

Managing Outsourced Risk: How to Read a SOC 1 or SOC 2 Report

Christine Figge, CPA, CGMA, is a partner in RubinBrown’s Assurance and Business Advisory Services Groups.


Valdez Ladd
Raleigh Chapter

Converging Data Privacy and Security

Valdez Ladd (MBA, CISSP, CISA) is a Siemens healthineer who strives to keep the health industry safe and productive.


Randy Ward
Middle Tennessee Chapter

Keys, Certificates and The Defeat of the Imperial Japanese Navy

Randy is a 20+ year veteran of the IT industry living in Nashville.


Dylan Williams
National Capital Chapter

The MITRE ATT&CK Framework: Where Do You Start?

Dylan Williams, AWS-SAA, AWS-SOA, Security +, is a cybersecurity analyst at an economic consulting firm in Washington, DC.


David Lam

Using PCI Scope to Lower Risks and Cost

David Lam, CISSP, CPP, is partner and CISO at Miller Kaplan with 33 years of IT experience.


Erik Elbieh
New Jersey Chapter

Surveying Five Years of Java Deserialization CVEs

Erik Elbieh (OSCP) is a security researcher and consultant at Palindrome Technologies. Erik enjoys penetration testing nearly anything, from web apps to cloud environments.


Marilyn Hays

Proving the Negative Outcome

Marilyn Hays has spent her entire career in various IT positions running the gamut from digitization of paper records into CAD, as a developer of management information systems, IT department head, and since 2001 in various roles in security.


Richard Abrich

Privacy-Preserving Contact Tracing

Richard Abrich is a machine learning scientist, engineer, and entrepreneur.


Gary S. Chan

Privacy-Preserving Contact Tracing

Gary S. Chan is an information security management consultant who helps companies build and operate their security programs.


John E. Bennett
Denver Chapter

How to Calculate ROI and Deliver Business Value

John E. Bennett is based in Denver, CO, with global experience delivering enterprise value in cybersecurity, telecom, and IT.


Zamil Alshammari
Saudi Arabia Chapter

What is Data Loss Prevention?

Zamil Alshammari is board member of ISSA Saudi Arabia Chapter and data loss prevention specialist.


Mariusz Stawowski
Senior Member, Poland Chapter

CSIRT and What Next?

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.


Jharna Roy
Orange County Chapter

Overview of Customer Identity and Access Management

Jharna Roy, CISSP, is a cyber leader with 15 years of experience solving clients’ most complex problems and advising on enterprise-wide strategic cyber initiatives.


Arshad Noor

FIDO: Fast IDentity Online

Arshad Noor is the CTO of StrongKey since 2001.


Fabio Sobiecki
Brasil Chapter

Managing Personnel Turnover

Fabio Sobiecki, CISSP, CCSP, CDPSE, is now solutions engineer for Transmit Security but worked for more than 15 years as managing security consultant for worldwide projects.


 
 
 
 

Copyright © 2023 ISSA International | All Rights Reserved