Print Page   |   Contact Us   |   Sign In   |   Register
Journal Authors 2018

 

>> 2015 Authors     >> 2016 Authors     >> 2017 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.


Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.


Rhonda Farrell
ISSA Fellow, NOVA Chapter

Women in Security SIG Column

Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.


Diana L. Burley

Managing Cybersecurity Risk in the Age of “Smart” Everything

Diana L. Burley, PhD, is professor of human & organizational learning and executive director at The George Washington University.


Jason Remillard
Raleigh Chapter

GDPR – What Does It Mean for Infosec?

Jason Remillard, MBA, CISSP, is the President of Data443 and the founder of ClassiDocs.com.


Gail Coury
Denver Chapter

ISSA Honor Roll

Gail Coury leads the information security function for Oracle Cloud globally, which includes SaaS, PaaS, IaaS, and managed cloud services.


Miriam T. Levenstein
Capitol of Texas Chapter

Security in Mergers and Acquisitions

Miriam T. Levenstein, CISSP, CISM, PCI-QSA, is a senior consultant with NTT Security.


Mike McCormick
Minnesota Chapter

The End of Security

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.


Ulrich Lang

Securing Complex Cyber-Physical Medical Device Landscapes

Dr. Ulrich Lang is a renowned thought leader in cybersecurity, privacy, and data analytics/AI.


Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.


Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.


Steven W. Teppler

The Two Faces of Innovation – From Safe and Dumb to Vulnerable Smart Products and Infrastructure

Steven W. Teppler is a partner at the Abbott Law Group in Jacksonville, Florida, and leads the firm’s complex litigation and electronic discovery practice.


Barry S. Herrin
Metro Atlanta Chapter

Security Incidents and Breaches in the Healthcare Industry

Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia.


Adrian Sanabria

CPU Bugs: Trading Security for Performance

Adrian is the Director of Research for Threatcare. He previously co-founded Savage Security, which was acquired by Threatcare in late 2017.


Michael Rogers
Minnesota Chapter

The Basics of Privileged Access Management

Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybesecurity.


Steve Horstman
Fort Worth Chapter

Baking an IT Risk Program from Scratch

Steve Horstman, CISSP, has 25 years of experience as an IT professional.


Matt Wilgus
Raleigh Chapter

The Dangers in Perpetuating a Culture of Risk Acceptance

Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat and vulnerability related offerings.


Mike Nelson

Using PKI to Build a Secure Industrial Internet of Things

Mike Nelson, VP of IoT Security at DigiCert, is a leader in digital security.


Joel Weise
Distinguished Fellow, Vancouver Chapter

Security in the News

Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.


Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.


Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.


Steve Kirby
Greater Spokane Chapter

Legal Requirements of Notification of Breaches: An Overview

Mr. Kirby is a lawyer specializing in legal issues relating to technology and continues to work in the information technology field with a focus on issues relating to data.


Meir Brown

The Post Exploitation Malware Era

Meir Brown is Cyberbit’s Director of Research and is a 15-year cybersecurity veteran. Prior to Cyberbit, Brown spent 12 years at Check Point Software.


David R. Jackson
National Capital (Washington, DC) Chapter

Orchestrating the Responses Between Information Security and Privacy During a Data Breach

David Jackson is an attorney holding CISSP, CIPP/US, and CEH certifications.


Mariusz Stawowski
Senior member, Poland Chapter

How to Protect Critical Systems without Disrupting Continuity of Their Services

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.


Nathan Chung
Denver Chapter

Book Review: InSecurity


Tyson Brooks
Central Maryland Chapter

Cyber-Physical Intelligence

Dr. Tyson Brooks works for the US Department of Defense and as an adjunct professor in the School of Information Studies (iSchool) at Syracuse University.


Community Search
Sign In
Sign In securely
Calendar

5/2/2018 » 5/4/2018
ISSA Los Angeles Summit X

5/10/2018
ISSA Thought Leadership Series: Why Automation is Essential to Vulnerability Management

6/1/2018
ISSA Mid-Altantic Conference

6/19/2018
Cornerstones of Trust




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information