Contact Us   |   Print Page   |   Sign In   |   Register
Journal Authors 2017


>> 2015 Authors     >> 2016 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.

Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.

Jon J. Banks
Denver Chapter

Executive Juris Doctor: Rewarding and Influential Career Path

Dr. Jon J. Banks, EJD, GPEN, CEH, OSWP, CISSP is a Sr. Security Architect at Link Technologies with 19 years of experience building information security architectures and programs.

Rhonda Farrell
ISSA Fellow, NOVA Chapter

Women in Security SIG Column

Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.

Grace Buckler
National Capital Chapter

Blended Families: Initial Steps to Security and Privacy Collaboration

Grace Buckler, CIPP/E, CIPP/US, CIPP/G, CISA, CISSP, CRISC, PMP, is the founder and president of The Privacy Advocate, a Washington DC–based global privacy consulting firm.

Emily Duke
Minnesota Chapter

When Baby Monitors become Weapons. Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army

Emily Duke, Esq. regularly assists clients in managing technology in order to comply with legal data security standards and in business disputes.

Avani Desai
Women in Security SIG member

The Whys and Wherefores of Innovation in the World of Cybersecurity; When You Cannot Be Silent: Whistle-Blowing 2.0

Avani Desai is a principal and the Executive Vice President at Schellman. She has more than 15 years of experience in IT attestation, risk management, compliance, and privacy.

John Garris

There’s No Going It Alone: Disrupting Major Cybercrime Rings

John Garris, CISSP, GSEC, CCE, GCIH, is the Deputy Assistant Inspector General for Investigations within NASA’s Office of Inspector General (OIG).

Kelley Archer
Distinguished Fellow, Minnesota Chapter

Professional Ethics Questions and Answers

Kelley Archer, CISSR, is a manager of risk and security in health care. He is a Distinguished Fellow with 27 years of experience, a member of the ISSA Ethics Committee, and an executive advisor to the Minnesota Chapter.

Mark Heckman
Senior Member, Sacramento Valley Chapter

The Promise and Limits of Big Data for Improving Intrusion Detection

Mark Heckman has worked in the field of information security for over 30 years as a researcher, developer, and practitioner. He currently is a professor at the University of San Diego.

Stephan Jou
Toronto Chapter

Deep Learning and Security: Beyond the Hype

Stephan Jou is CTO at Interset. He holds an MSc in Computational Neuroscience and Biomedical Engineering and a dual BSc in Computer Science and Human Physiology from the University of Toronto.

Jason Kichen
Puget Sound Chapter

The Future of Cybersecurity Needs Eyes and AIs on the Inside

Jason Kichen, Director of Cybersecurity Services at Versive, had a 13-year career at the Department of Defense and is an expert in technical and offensive cyber operations.

Anthony J. Ferrante

Battening Down for the Rising Tide of IoT Risks

Anthony J. Ferrante, Senior Managing Director at FTI Consulting, served as Director for Cyber Incident Response at the US National Security Council at the White House.

Barry S. Herrin
Metro Atlanta Chapter

Cybersecurity Risk in Health Care

Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia. Herrin has over 25 years of experience practicing law in the areas of healthcare and hospital law and policy.

Jon Sternstein
Raleigh Chapter

Healthcare Security Ailments and Treatments the World Needs to Know

Jon Sternstein, CISS, is the founder and principal consultant of Stern Security, a data security consulting company headquartered in Raleigh, NC, focused on protecting healthcare organizations and is a former healthcare security officer.

Gordon Merrill
Chattanooga Chapter

What You Don’t Know Is Limiting Your Potential for Success

Gordon Merrill, MSIA, CISSP, is a cybersecurity professional whose career spans over three decades and has taken him to 48 states and six foreign countries.

Seetharaman Jeganathan

Quantum Computing Opportunities and Threats: Part 1

Seetharaman Jeganathan, CISSP, has more than 15 years of experience in IT security consulting and program management.

Zhenfe Zang

When Side-Channel Attacks Meet Quantum-Safe Cryptography

Dr. Zhenfei Zhang is a senior research scientist of Onboard Security Inc. His main research area includes lattice-based cryptography, NTRU cryptosystems, and fully homomorphic encryptions.

Mike McCormick
Minnesota Chapter

Cracks in Facebook’s Walled Garden

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security

Charles Cresson Wood

A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work

Charles Cresson Wood, JD, MBA, MSE, CISA, CISM, CISSP, CGEIT, is an attorney, plus independent information security and privacy consultant.

William S. Rogers, Jr.

A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work

William S. Rogers, Jr., Esq., is chair of Prince Lobel’s Data Privacy and Security Practice in Boston, MA.

Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.

Luther Martin
Silicon Valley Chapter

Crypto Corner; Why Risk Management Is Hard; Crypto Wars II; The Use and Misuse of Entropy; Cyberwar and International Law

Luther Martin is a Distinguished Technologist at Hewlett Packard Enterprise.

Patrick Looney

Practical Steps for Compliance with New EU Data Privacy Regulations

Patrick Looney is the UK/Ireland Client Director of eDiscovery/Digital Forensics for AccessData.

Muzamil Riffat

Contextualizing the Blurring Boundaries of Information Security, Privacy, and Legal Aspects

Muzamil Riffat has more than 15 years of experience in computer systems development, IT audit, and security. He is currently responsible for the audit function in a large government organization in the Middle East.

Anthony S. Mendoza
Minnesota Chapter

When Baby Monitors become Weapons. Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army

Anthony Mendoza, Esq. has over 20 years of experience working with telecommunications and Internet technology clients, advocating for clients across all levels of government.

Kayne McGladrey
Puget Sound Chapter

Lessons about Cloud Security from 1980s Horror Movies

Kayne McGladrey is a professional services director at Integral Partners with 20+ years of experience, including 10 years cultivating and building best practices within professional services organizations.

Tanya Forsheit

Every Move You Make, I’ll Be Watching You Watching Me Watching You

Tanya Forsheit is co-chair of Frankurt Kurnit Klein + Selz’s Privacy & Data Security Group, and a partner in the Technology & Digital Media, Litigation, and Advertising, Marketing & Public Relations groups.

Daniel Goldberg

Every Move You Make, I’ll Be Watching You Watching Me Watching You

Daniel M. Goldberg is an associate in Frankurt Kurnit Klein + Selz’s Privacy & Data Security Group focusing on advertising, branded entertainment, and intellectual property matters.

Ravi Balupari

Recon and Respond to Malware Threats in the Cloud

Ravi Balupari is Director of Netskope Threat Research Labs, supervising the research of malware, ransomware, and other cloud security threats.

Abhinav Singh
Silicon Valley Chapter

Recon and Respond to Malware Threats in the Cloud

Abhinav Singh is a security researcher whose core work areas include malware analysis and reverse engineering. He is also the author of Metasploit Penetration Testing Cookbook and Instant Wireshark.

Tom Pendergast
Puget Sound Chapter

What Happens When AI Meets Security Awareness?

Tom Pendergast is the chief architect of MediaPro’s Adaptive Awareness Framework™ approach to plan, train, reinforce, and analyze workforce learning and awareness in the subjects of information security, privacy, and corporate compliance.

Dave Cullinane
ISSA Fellow, Silicon Valley Chapter

A CISO’s Perspective on Threat Intelligence

Dave Cullinane served for 5+ years as the CISO for eBay and was the CISO for the sixth largest bank in the United States and the largest thrift in the world.

Gerry McGreevy
South Texas Chapter

Blockchain: Considerations for Infosec

Gerry McGreevy, MBA, MS, CISSP, Senior Systems Analyst MD Anderson Cancer Cente, has been active developing various blockchain projects integrating PKI and blockchain architectures.

Karen Martin

Don’t Blame the Victims, It’s Not the End of Cryptography as We Know It

Karen Martin is a San Jose, California-based technical writer with over a decade of experience in information security.

Barbara Filkins

Medical Data Sharing: Establishing Trust in Health Information Exchange

Barbara Filkins, an (ISC)2 member and a 2017 SANS Technology Institute graduate, has been deeply involved with healthcare privacy and security issues for 20+ years.

Duncan McAlynn
South Texas Chapter

WannaCry/NotPetya and How We Failed Miserably!

Duncan McAlynn is a nearly 20-year veteran of information technology, focued on systems and security management and is a principal security engineer and evangelist for Ivanti.

Steve Giles

Hollywood Presbyterian Medical Center Ransomware: A Retrospective Review

Steve Giles has more than 40 years of healthcare information technology experience, currently serving CHA Hollywood Presbyterian Medical Center as the CIO.

Brian Toevs
Central Indiana Chapter

Hollywood Presbyterian Medical Center Ransomware: A Retrospective Review

Dr. Toevs is currently the VP/CISO for a large regional bank in Indiana and faculty/subject matter expert in computer forensics for Sullivan University.

Phillip H. Griffin
ISSA Fellow, Raleigh Chapter

Biometric Electronic Signatures

Phillip H. Griffin, CISM, has over 20 years experience in the development of commercial, national, and international security standards and cryptographic messaging protocols.

Ralph Spencer Poore
Distinguish Fellow, North Texas Chapter

A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work

Ralph Spencer Poore, PCIP, CFE, CISA, CISSP, CHS-III, X9F1 Vice Chair, has over 45 years of information security experience, including more than 20 years of applied cryptography.

Curtis Campbell
Senior Member, Chattanooga Chapter

Securing the Vendor: Changing the Dynamic of the Infosec Relationship

Dr. Curtis C. Campbell, DM/IST, is a vice president and IT procurement manager at a financial institution, co-founder and VP, Programs of the ISSA Chattanooga Chapter.

Joel Weise
Distinguished Fellow, Vancouver Chapter

Security in the News

Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.

Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.

David Jackson
Northern Virginia Chapter

Regulatory Review of 2016 and a Look Ahead

David Jackson, CISSP, CIPP, CEH, is currently the Manager of Customs and Licensing at Pacific Architects and Engineers (PAE). He is a regulatory attorney, licensed in Missouri, and a licensed Customs broker.

Carlos Valiente, Jr.
Tampa Bay Chapter

Achieving Compliance with Internal Controls

Carlos Valiente Jr., CISSP, CISA, CISM, CGEIT, 27001-LA, is a results-driven cybersecurity specialist and compliance audit professional with 25+ years experience.

Keith Russell
Chicago Chapter

Growing Popularity and Challenges of the IoT

Keith Russell, CompTIA A+, Network+, is a veteran of the United States Marine Corps and is studying Information Security and Assurance at Capella University.

Marcelo Carvalho
Brasil Chapter

HSTS and New Trends for Secure Browsing; Access Control Capabilities and Healthcare Informatics Needs

Marcelo Carvalho, CISSP, CISA, CRISC, has 17 years of information security experience at telecom and digital certificate companies and is currently an IS auditor and IT/IS professor at various universities.

Stefan Winkel

Security Assurance of Docker Containers

Stefan Winkel, CISSP, GSEC, GNFA, GCIA, GREM, GPEN, GWAPT, GCIH, GCPM, has 15+ years’ experience of security, business, and software development and assurance in the high-tech industry.

Brian Schultz
ISSA Distinguish Fellow, former ISSA International Board Member and NOVA Chapter President

Howard A. Schmidt Memorial Tribute

Matt Wilgus
Raleigh Chapter

Best Practices When Implementing Web Application Scanning into an SDLC

Matt Wilgus is the Practice Director for Schellman’s Threat & Vulnerability Assessment offerings. He leads delivery of Schellman’s penetration testing services, as well as other regulatory and compliance programs.

Yuri Diogenes
Fort Worth Chapter

Embracing Cloud Computing to Enhance Your Overall Security Posture

Yuri Diogenes, CISSP, CASP, E|CEH, E|CSA, currently works for Microsoft as Senior Content Developer for the Enterprise Mobility Team and Azure Security.

Jeff Stapleton
St. Louis Chapter

Cryptographic Architectures: Missing in Action

Jeff Stapleton has been involved in the development of ANSI and ISO standards for over 20 years, has chaired the X9F4 standards workgroup for over 15 years.

Tonia Dudley
Phoenix Chapter

Building a Phishing Program: Why Haven’t You Started Yet?

Tonia Dudley, CISSP, CISM, CISA, is currently the Director of Security Awareness for a financial services organization and previously managed the security awareness program for a fortune 100 global manufacturing organization.

Tyson Macaulay

Disrupting the Disruptors

Tyson Macaulay is a veteran of the information security industry with 24 years of experience, spanning most industry verticals and critical infrastructures.

Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.

Bryan S. Cline
North Texas Chapter

Leveraging a Control-Based Framework to Simplify the Risk Analysis Process

Bryan Cline, Ph.D., is a former CISO with 30 years of experience in information systems and cybersecurity in the public and private sectors.

Jacob Ansari

Malware in 2017: The More Things Change

Jacob’s career spans 15 years of information security consulting and assessment services, including network and application security assessments, penetration testing, forensic examinations, and security code reviews.

Carlos Valiente, Jr.
Tampa Bay Chapter

Addressing Malware with Cybersecurity Awareness

Carlos is a results-driven cybersecurity specialist and compliance audit professional with 25+ years experience leading and managing global IT, information security, compliance, and risk management programs in Big 4, Fortune 500 and 1000 companies.

Sergey Tikhonov
ISSA member, Russia

Application of Quantum Technologies for Practical Tasks

Sergey Tikhonov is Chief of Strategic Development, Finteller LLC. He has over 20 years experience in IT and information security in the financial sector.

Miroslava Bondarenko
ISSA member, Russia

Application of Quantum Technologies for Practical Tasks

Miroslava Bondarenko is Chief Executive Officer, Finteller LLC. She has over 20 years experience in IT and information security in the financial sector.

Frank Gearhart
Colorado Springs Chapter

Is Encryption Dead? Quantum Computing’s Impact on Cryptograph

Frank Gearhart, C|CISO, CISO, is a contractor at the Missile Defense Agency.

Samuel Roth

Tort Liability in Open Source Software Systems

Samuel Roth is a graduate student at the Ohio State University, where he investigates problems at the intersection of computer security, privacy, and machine learning.

Community Search
Sign In


ISSA International Series: Trials & Tribulations of Social Engineering

8/4/2018 » 8/9/2018
Black Hat USA 2018

ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

10/17/2018 » 10/18/2018
2018 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information