Contact Us   |   Print Page   |   Sign In   |   Register
Journal Authors 2018

 

>> 2015 Authors     >> 2016 Authors     >> 2017 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.


Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.


Rhonda Farrell
ISSA Fellow, NOVA Chapter

Women in Security SIG Column

Dr. Rhonda Farrell, JD, CISSP, CSSLP, is an Associate at Booz Allen Hamilton (BAH) and a member of the Board of Directors at ISSA International and ISSA NOVA Chapter.


Diana L. Burley

Managing Cybersecurity Risk in the Age of “Smart” Everything

Diana L. Burley, PhD, is professor of human & organizational learning and executive director at The George Washington University.


Jason Remillard
Raleigh Chapter

GDPR – What Does It Mean for Infosec?

Jason Remillard, MBA, CISSP, is the President of Data443 and the founder of ClassiDocs.com.


Gail Coury
Denver Chapter

ISSA Honor Roll

Gail Coury leads the information security function for Oracle Cloud globally, which includes SaaS, PaaS, IaaS, and managed cloud services.


Miriam T. Levenstein
Capitol of Texas Chapter

Security in Mergers and Acquisitions

Miriam T. Levenstein, CISSP, CISM, PCI-QSA, is a senior consultant with NTT Security.


Mike McCormick
Minnesota Chapter

The End of Security; Your Social Insecurity Number; VEP Makes Me Wanna Cry

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.


Ulrich Lang

Securing Complex Cyber-Physical Medical Device Landscapes

Dr. Ulrich Lang is a renowned thought leader in cybersecurity, privacy, and data analytics/AI.


David Vaughn
Senior Memeber, Raleigh Chapter

They Say That Everything Happens for a Reason

ISSA International Director


Sue Wang

Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information

Sue Wang is a technical lead of the Healthcare Sector Team within the National Cybersecurity FFRDC.


Zach Furness
Northern Virginia Chapter

Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information

Zach Furness is a technical director within the National Cybersecurity FFRDC.


Dena T. Bauckman
North Texas Chapter

S/MIME Certificate Management through DNS – DANE: A New Approach

Dena T. Bauckman, CISSP, is the VP of Product Management at Zix, a leader in email security.


Alex Grohmann
ISSA Fellow, Northern Virginia Chapter

Evolution of the Cybersecurity Framework

Alex Grohmann, CISSP, CISA, CISM, CIPT, is an independent consultant and information security professional with nearly 25 years of experience.


Mark Shriner
Puget Sound Chapter

A Multi-Pronged Approach to GDPR Compliance

Mark Shriner is Director North America for Wordbee and is responsible for client engagement and partner development at adaQuest, a Microsoft Security & Compliance Partner.


Anthony J. Ferrante

Cryptocurrency and Corporate Security

Anthony J. Ferrante is the global head of cybersecurity and a senior managing director at FTI Consulting.


D. Frank Hsu

Cryptocurrency and Corporate Security

D. Frank Hsu, PhD, is the Clavius Distinguished Professor of Science and a professor of computer and information science at Fordham University in New York, NY.


Grace Buckler
National Capital Chapter

How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR

Grace Buckler, CIPP/E, CIPP/US, CIPP/G, CISA, CISSP, CRISC, PMP, is the founder and president of The Privacy Advocate.


Steven J. Ross

The Brave Old New World of Privacy

Steven J. Ross is Executive Principal of Risk Masters International LLC and was formerly a global practice leader at Deloitte.


Carl Saiyed
Greater Spokane Chapter

Bookworm: A Threat Hunting Story

Carl Saiyed, CISSP, is a Senior Cyber Security Analyst focusing on threat hunting and cybersecurity evangelism.


Robert Slade

Cryptic Curmudgeon

Rob Slade is an information security and management consultant from North Vancouver, Brit-ish Columbia, Canada.


Whitney Partridge

A Look at the Espionage Act of 1917 for the Internet Age

Whitney Partridge is an eDiscovery Analyst at the Food and Drug Administration (FDA).


Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.


Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.


Steven W. Teppler

The Two Faces of Innovation – From Safe and Dumb to Vulnerable Smart Products and Infrastructure

Steven W. Teppler is a partner at the Abbott Law Group in Jacksonville, Florida, and leads the firm’s complex litigation and electronic discovery practice.


Barry S. Herrin
Metro Atlanta Chapter

Security Incidents and Breaches in the Healthcare Industry; Employee and Insider Data Breaches: Vulnerability or Threat Vector?

Barry S. Herrin, JD, FAHIMA, FACHE, is the founder of Herrin Health Law P.C. in Atlanta, Georgia.


Adrian Sanabria

CPU Bugs: Trading Security for Performance

Adrian is the Director of Research for Threatcare. He previously co-founded Savage Security, which was acquired by Threatcare in late 2017.


Michael Rogers
Minnesota Chapter

The Basics of Privileged Access Management

Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybesecurity.


Steve Horstman
Fort Worth Chapter

Baking an IT Risk Program from Scratch

Steve Horstman, CISSP, has 25 years of experience as an IT professional.


Matt Wilgus
Raleigh Chapter

The Dangers in Perpetuating a Culture of Risk Acceptance

Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat and vulnerability related offerings.


Mike Nelson

Using PKI to Build a Secure Industrial Internet of Things

Mike Nelson, VP of IoT Security at DigiCert, is a leader in digital security.


Ken Dunham
Distinguished Fellow, Boise Chapter

Orchestration and Automation in the Real World; Malware: Cat and Mouse Forever?

Ken Dunham brings more than 27 years of business, technical, and leadership experience in cybersecurity, incident response, and cyber threat intelligence.


Vincent Sritapan

Security Threats, Defenses, and Recommended Practices for Enterprise Mobility

Vincent Sritapan is a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T.


Karim Eldefrawy

Security Threats, Defenses, and Recommended Practices for Enterprise Mobility

Karim Eldefrawy is a senior computer scientist at Computer Science Laboratory at SRI International.


Maria Schuett
Minnesota Chapter

Rationalizing Behavioral Biometrics

Maria Schuett, CRISC, GLEG, is an information security architect and advisor.


Jeff Stapleton
St. Louis Chapter

Spoofing a Hardware Security Module; Cloud Cryptography and Key Management

Jeff Stapleton has been involved in the development of more than three dozen ANSI and ISO standards and chaired the X9F4 standards workgroup for over 15 years.


Antonella Commiato
Los Angeles Chapter

Information Security Standards: Differences, Benefits, Impacts, and Evolution

Antonella Commiato, Chief Technology Officer/Chief Information Security Officer EXTEND Resources, has 23 years of IT leadership experience.


Michael Sturgill

Information Security Standards: Differences, Benefits, Impacts, and Evolution

Michael Sturgill, CISM, CEH, and SEC+, Information Security Manager EXTEND Resources, has more than 15 years of experience in information systems.


Frederick Scholl
Middle Tennessee Chapter

Book Review - The Perfect Weapon; Digital Relilience

Dr. Frederick Scholl, CISSP, is President of Monarch Information Networks, LLC, an independent cybersecurity risk management consultancy.


Robert G. Parker

The Brave Old New World of Privacy

Robert G. Parker is an independent consultant specializing in Data Privacy and was formerly a partner at Deloitte.


Amn Rahman

On the Effects of Enterprise Security on Employee Privacy

Amn Rahman is an engineer on the Growth team at Docker.


Ashish Gehani

On the Effects of Enterprise Security on Employee Privacy

Ashish Gehani is a Principal Computer Scientist at SRI International. His research focuses on da-ta provenance and security.


Chris Wolski
Delaware Valley (Philadelphia, PA) Chapter

Cloud Security Due Diligence

Chris Wolski, CISO Ascension Global Technology, has over a thirty years of IT security experience.


Reg Harnish
Rochester Chapter

Pulling Back the Privacy Curtain

Reg Harnish is an entrepreneur, speaker, author, and CEO of GreyCastle Security.


Joel Weise
Distinguished Fellow, Vancouver Chapter

Security in the News

Joel Weise has worked in information security for over 30 years. His current research is focused on adaptive security, cloud computing, cryptographic systems, security governance, and security maturity modeling. Joel is a founding member of the ISSA and a member of the American Bar Association.


Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.


Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.


Steve Kirby
Greater Spokane Chapter

Legal Requirements of Notification of Breaches: An Overview

Mr. Kirby is a lawyer specializing in legal issues relating to technology and continues to work in the information technology field with a focus on issues relating to data.


Meir Brown

The Post Exploitation Malware Era

Meir Brown is Cyberbit’s Director of Research and is a 15-year cybersecurity veteran. Prior to Cyberbit, Brown spent 12 years at Check Point Software.


David R. Jackson
National Capital (Washington, DC) Chapter

Orchestrating the Responses Between Information Security and Privacy During a Data Breach

David Jackson is an attorney holding CISSP, CIPP/US, and CEH certifications.


Mariusz Stawowski
Senior member, Poland Chapter

How to Protect Critical Systems without Disrupting Continuity of Their Services

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, has for more than 20 years been responsible for management of security audits, projects, and professional services.


Nathan Chung
Denver Chapter

Book Review: InSecurity


Tyson Brooks
Central Maryland Chapter

Cyber-Physical Intelligence

Dr. Tyson Brooks works for the US Department of Defense and as an adjunct professor in the School of Information Studies (iSchool) at Syracuse University.


Dave Presuhn
Minnesota Chapter

Securing a Medical Device

Dave Presuhn is a member of the Connected Device Management team for Boston Scientific.


Andrew Bomett

Securing a Medical Device

Andrew Bomett, CISSP, GCFE, is the manager of product security at Boston Scientific.


Curtis Campbell
Senior Member, Chattanooga Chapter

Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment

Dr. Curtis C. Campbell, DM/IST, is a vice president and IT procurement manager at a financial institution.


Mangaya Sivagnana
Minnesota Chapter

A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things; Security Measures That Help Reduce the Cost of a Data Breach

Mangaya Sivagnanam is currently Principal Cybersecurity Systems Architect at Ingersoll Rand.


Nima Zahadat
Northern Virginia Chapter

Net Neutrality: What Is It and Is It Necessary?; A Look at the Espionage Act of 1917 for the Internet Age

Dr. Nima Zahadat is a professor of forensics, information systems, and data science.


Scott D. Fether

PCAP Next Generation: Is Your Sniffer Up to Snuff?

Scott Fether is an Information Protection Warrant Officer for the United States Army. For the past 14 years he has worked in various information technology positions for the Army.


Michael R. Grimaila
Dayton (OH) Chapter

The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence

Michael R. Grimaila, PhD, CISM, CISSP, is a professor and head of the Department of Systems Engineering and Management and a member of the Center for Cyberspace Research at the Air Force Institute of Technology.


Indrajit Atluri

Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age

Indrajit Atluri, CRISC, CISM, CISSP, HCISPP, ITILv3, is the Information Security Manager and HIPAA Security Officer at ProPath Services LLC.


Kelley Bryant
Puget Sound Chapter

The Art of Pushing Left in Application Security

Kelley Bryant, CISSP, CSSLP, is a Senior Security Consultant for AT&T Cybersecurity Solutions.


Ken Spinner

Waking Up to New Consumer Data Privacy Protection

Ken Spinner leads all technical pre- and post-sales engineering activities for Varonis.


Mark J. Lucas

Extracting Timely Sign-in Data from Office 365 Logs

In 1997, he became system administrator at the California Institute of Technology. He is currently heading the technical arm of projects to move all campus email to the cloud.


Yuri Diogenes
Fort Worth Chapter

Holistic Approach to Enhance Your Security Posture

Yuri works for Microsoft as Senior Program Manager for the CxE Security Team.


Community Search
Sign In


Calendar

11/27/2018
ISSA International Series: Security Professionals Dilemma

12/3/2018 » 12/5/2018
EDEX 2018




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information