Contact Us   |   Print Page   |   Sign In   |   Join Now
Journal Authors 2019
Share |


>> 2015 Authors     >> 2016 Authors     >> 2017 Authors     >> 2018 Authors

Randy V. Sabett
Senior Member, Northern Virginia Chapter

Sabett’s Brief

Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.

Branden R. Williams
Distinguished Fellow, North Texas Chapter

Herding Cats

Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.

Robert Slade

Cryptic Curmudgeon

Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.

David R. Jackson
National Capital (Washington, DC) and Northern Virginia Chapters

California Dreaming – The Fight with the Federal Government over Technology

Mr. Jackson, CISSP, CEH, CIPP, works as a regulatory attorney for a government contractor in the Washington DC area.

Philip Casesa

Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization

Philip Casesa, CISSP, CSSLP, PMP, ITIL, SAFe Agilist, is a director at Focal Point with years of experience in cybersecurity, software development, and consulting.

Mike McCormick
Minnesota Chapter

Security Made Amazon Profitable

Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.

Mark Kadrich
Silicon Valley Chapter

Technology Repurposing: What Will Blockchain Be Tomorrow?; Security Engineering and Integration Principles and Myths

Mark Kadrich is a well-known speaker and evangelist on network security matters at technical conferences and security events.

Tony Buenger
Greater Augusta Chapter

We Are the Front Lines – Protecting Yourself Protects the Organization

Tony Buenger assumed the role of CISO for Augusta University in 2018. He served as an Associate Professor for the National Defense University.

Donald A. McKeown
New England Chapter

Building a Risk-Based Information Security Culture

Don McKeown is currently an Information Security Manager at Wolters Kluwer Health.

John Gray
Rainier Chapter

Basic Principles of Database Security

John Gray, PhD, is an ISS analyst with over 15 years experience in information security and is employed by the Department of Defense.

Jeff Stapleton
St. Louis Chapter

Choosing Tokenization or Encryption

Jeff Stapleton has been an ISSA member and participated in X9 standards for thirty years.

Geordie Stewart
UK Chapter

Security Awareness

Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.

Luther Martin
Silicon Valley Chapter

Crypto Corner

Luther Martin is a Distinguished Technologist at Micro Focus.

Seetharaman Jeganathan

Practical Approaches to Overcome Security Challenges in Cloud Computing

Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.

Alex Smith
Central Ohio Chapter

SIEM Implementation for School Districts Utilizing FOSS

Alex Smith is a database administrator and DevOps engineer focusing on application team cy-bersecurity in public school districts.

Mariusz Stawowski
Senior Member, Poland Chapter

Automation of Business-Aware Incident Management

Mariusz Stawowski, PhD, CISSP, CEH, CCISO, is CTO / Technical Director of CLICO, a security technologies distributor and service provider operating in Poland and other Central and Eastern European countries.

Matt Wilgus
Raleigh Chapter

Application Security, Ethics, & Eight-Year-Olds

Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat- and vulnerability-related offerings.

Yuri Diogenes
Senior Member, Fort Worth Chapter

The Quest for Visibility and Control in the Cloud

Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security Center.

Lori L. Cole
Blue Ridge Chapter

Countering Gender Disparity: Creating Anti-Predictions Using Data Science

Lori L. Cole, GSEC, GCIH, is a cyber threat analyst at BB&T. She was named SC Magazine’s IT Security 2018 Women to Watch.

Sean Kelly

Protecting Information Assets against Insider Threats

T. Sean Kelly is a Senior Director at FTI Consulting.

Andrew Shaxted

Protecting Information Assets against Insider Threats

Andrew Shaxted is a Senior Director in FTI Technology’s information governance, privacy and security practice.

Donna Gallaher
Metro Atlanta Chapter

Trends in Security Executive Leadership and the Rise of the vCISO

Donna Gallaher is the president and CEO of Atlanta-based New Oceans Enterprises, LLC, where she provides fractional/virtual CISO and operational risk advisory services.

William C. Barge
Northeast Indiana Chapter

The Mathematics behind RSA Encryption

William C. (Bill) Barge is an Associate Professor of Computer Science & Information Technology at Trine University in Angola, Indiana.

Kris Tanaka
Portland Chapter

Security in the News

Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.

Mark Anderson
Australia Chapter

Gray Hat

Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.

Joe Malec
ISSA Fellow

Role-Based Security Awareness Training for Technology

Joe Malec is a Senior Security Analyst at Express Scripts with more than 25 years of experience in information technology.

Curtis Campbell
Senior Member, Chattanooga Chapter

Women in Cybersecurity

Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.

John Huckeby

Reasons to Outsource Your Internal IT Audit Function

John Huckeby, PCI QSA, HSA, CISA, ISO Lead Auditor, has been helping organizations secure their environ-ments for over 18 years.

Steve Kirby
Greater Spokane Chapter

Lost Cryptographics Keys – Lessons from Gerald Cotton

Stephen Kirby is an attorney based in Washington State and the CEO of an IT consulting firm.

Phillip H. Griffin
Fellow, Raleigh Chapter

Anonymous Digital Signatures

Phillip, CISM, actively participates in ITU-T SG17 Security, ISO TC68/SC2 Security, ISO/IEC JTC1/SC27 Security techniques, and X9 Financial Services standards development.

Liu Hua Yeo

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Liu Hua Yeo is a doctoral student in technology at the College of Technology at Eastern Michigan University.

Xiangdong Che

A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques

Dr. Xiangdong Che, CISSP, is an Associate Professor in the Information Assurance program at Eastern Michigan University.

Constantinos Doskas
Senior Member, Northern Virginia Chapter

The Python Programming Language

Constantinos Doskas is head of the IT and Security Department of Olympus.

Eric Lankford
Fort Worth Chapter

NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes

Eric Lankford is a cybersecurity engineer with more than twenty years of experience.

Community Search
Sign In


ISSA International Series: Breach Response - Humans in Security

ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses

ISSA International Series: Passwordless Authentication

ISSA International Series: Privacy - GDPR a Year Later

ISSA International Series: Security Standards Organizations - The good, the bad, and the ugly?

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information