Author Directory
  • aaron-jentzen photo
    Aaron Jentzen
    Aaron Jentzen is a Program Content Writer for Proofpoint Security Awareness Training, a leading provider of information security awareness and training software that helps organizations educate employees. He combines his experience as an award-winning arts and technology journalist with expertise in technical writing and technology marketing. He holds master’s degrees in Professional Writing and Investigative Journalism from Carnegie Mellon University.
  • alan-baptista photo
    Alan Baptista
    Alan is a Product Marketing Director at Chef, working remotely from Southern California. His career of over 20 years has been in product marketing, sales operations and international business roles for enterprise software, telecommunications and government space at organizations such as CA Technologies, Experian, InterVoice and US Commerce Department. When not helping customers tell their success stories he enjoys traveling and exploring Sous-Vide cooking and BGE Grilling.
  • amruta-gawde photo
    Amruta Gawde
    Amruta is the Assistant Vice President, Products & Offerings, at Simeio. She has nearly a decade and a half of experience in the area of Information Security, with the majority of time focused in the Identity and Access Management domain.
  • angie-white photo
    Angie White
    Angie has a passion for creating engaging content that speaks to customers problems and offers smart solutions. She has over eight years of experience in the Technology sector and has spent the last two years delving into cybersecurity. When she's not taking in the magnificent views of Portland from iovation's 32nd floor office, she's busy exploring the beautiful Pacific Northwest or catching up on Game of Thrones.
  • balraj-dhillon photo
    Balraj Dhillon
    Balraj Dhillon is the Engagement Director of Key Accounts at Simeio Solutions. He is part of the Simeio Engagement and Delivery team, focusing on Identity Access Management solutions across government and private sector customers in Canada. He has led a number of initiatives related to citizen identity, attestation programs, and technology modernization initiatives. He also has extensive experience with product and technology development, deployment and positioning for solutions across healthcare, payments and telecommunications industries.
  • barbara-endicott-popovsky photo
    Barbara Endicott-Popovsky
    Barbara Endicott-Popovsky, Ph.D., CRISC, is Executive Director for the Center of Information Assurance and Cybersecurity at the University of Washington--designated by the NSA as a Center for Academic Excellence in Information Assurance Education and Research-- and the Academic Director for the Masters in Infrastructure Planning and Management in the Urban Planning Department of the School of Built Environments. This follows a 20-year career in industry in executive and consulting positions in IT architecture and project management. Her research interests include enterprise-wide information systems security and compliance management, forensic-ready networks, the science of digital forensics and secure coding practices. She is a member of the American Academy of Forensic Scientists.
  • bob-sullivan photo
    Bob Sullivan
    Bob Sullivan is the author of four books, including the 2008 New York Times Best-Seller, Gotcha Capitalism, and the 2010 New York Times Best Seller, Stop Getting Ripped Off! His latest, The Plateau Effect, was published in 2013, and as a paperback, called Getting Unstuck in 2014. He also offers an online course, a 30-day challenge to Get Unstuck in Your Career. He worked for News for nearly 20 years, much of them creating and writing the popular consumer/tech blog The Red Tape Chronicles. Now an independent journalist, he is still a contributor on and, and continues to appear on NBC TV programs as a consumer and technology expert. He is a contributor at, writing about fraud, scams, and the economy. His stories have also appeared in The New York Times, New York magazine, and on dozens of other sites.
  • brian-krebs photo
    Brian Krebs
    Reporter and Publisher, Internet Security and Cybercrime Krebs on Security LLC Brian Krebs is the author of, a daily news site dedicated to in-depth cyber security news and investigation, with a special focus on cybercrime. For the third year running, was voted the Blog That Best Represents the Security Industry by judges at the 2013 RSA Conference, the world’s largest computer security gathering. KrebsOnSecurity also won the "Most Educational Security Blog” award, and last year Krebs was presented with the "Security Bloggers Hall of Fame Award,” alongside noted security expert Bruce Schneier. From 1995 to 2009, Mr. Krebs was a reporter for The Washington Post, where he covered internet security, technology policy, cybercrime and privacy issues for the newspaper and the website. A frequent interviewee and public speaker, Krebs's stories and investigations have also have appeared in Popular Mechanics, and dozens of other publications. Krebs is a 1994 graduate of George Mason University, where he earned a Bachelor of Arts in International Relations.
  • bruce-sussman photo
    Bruce Sussman
    Emmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career" he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWorld podcast published each Tuesday, and oversees news content for Sussman graduated from the University of Missouri School of Journalism back in the dark ages. Message him on LinkedIn if you'd like to connect!
  • bryant-g-tow photo
    Bryant G. Tow
    For over 25 years Bryant has held responsibilities as an entrepreneur and senior executive in all aspects of risk management including thought leadership in the area of cyber security, award winning development of security solutions, managing large global cyber and physical security teams. Bryant has held Partner positions in large consulting firms and been involved in several startups. Recently he was the Chief Security Officer for CSC‘s Financial Services Group securing 143 applications in 52 countries. Currently Bryant is the Managing Partner and founder of CyberRisk Solutions. In that capacity he assists clients at the executive level acting as CSO to help manage risk in the areas of people, process, technology and facilities in the financial services, healthcare, energy, retail and other verticals. Bryant has served in several leadership positions in the security industry including the Department of Homeland Security Sector Coordinating Council, ISSA, ISACA and InfraGard National Members Alliance board member and vice president. He is recognized as a Distinguished Fellow by the Ponemon Institute, the industry’s leading research organization. Bryant has published several books and articles on cyber security topics and has received several awards including "Governor's Office of Homeland Security Award for Exceptional Contribution in Recognition of Outstanding Support of Tennessee's Counter Terrorism Program.
  • chester-avey photo
    Chester Avey
    Chester Avey has over a decade of experience in cybersecurity. He enjoys sharing his knowledge with other like-minded professionals through his writing.
  • chris-roberts photo
    Chris Roberts
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cybersecurity industry, Chris Roberts is the Chief of Adversarial Research and Engineering for LARES Consulting, helping to drive technology innovation and product leadership. Roberts understands enterprise security requirements, having served as both an in-house security expert and consultant on IT security, engineering, and architecture/design operations for scores of Fortune 500 companies across the finance, retail, energy, and services sectors. He is credentialed in many of the top IT and InfoSec disciplines. As a cybersecurity advocate and passionate industry voice, he has been featured in several documentaries and is regularly quoted in national newspapers, television news, and industry publications.
  • chuck-harold photo
    Chuck Harold
    Retired police officer, movie studio security executive, contract security company executive and now… On-Air Radio Host / Executive Producer of Security Guy Radio, a weekly radio show with over 65,000 listeners worldwide. Each week, Chuck, along with Paul Bristow, challenges the conventional wisdom of the security industry with his "plain talk" experience, humorous stories and answers from the top security experts in the field.
  • ciso-mag photo
    CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. CISO MAG provides in-depth, impartial, business and technical information to the proficient ones in cyberspace. The magazine features news, comprehensive analysis, cutting-edge features, and contributions from thought leaders, that are nothing like the ordinary. EC-Council has been the world’s leading information security certification body. EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security. To provide the cybersecurity experts key information and analysis to tackle the security challenges, EC-Council has created CISO MAG, an information security magazine for best practice, trends, and news.
  • clare-ogara photo
    Clare O’Gara
    Writer for SecureWorld News
  • colleen-riccinto photo
    Colleen Riccinto
    Don’t think of Colleen Riccinto as one of “those recruiters.” She shoots from the hip, speaks from the heart, and brings 15 years of experience in sales, security training, and leadership to her role. Colleen is the founder of Cyber Talent Search in Ann Arbor, Michigan.
  • cybertrend photo
    No longer in publication, CyberTrend was a monthly business technology magazine for executives and business owners.
  • dan-lohrmann photo
    Dan Lohrmann
    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor ( In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations. Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government. Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web," published in November 2008 by Brazos Press, and "BYOD for You: The Guide to Bring Your Own Device to Work," published in Kindle format in April 2013. He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing Magazine, and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana, and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
  • daniel-miller photo
    Daniel Miller
    Daniel is the Director of Product Marketing at Ericom Software. He has more than 15 years of industry experience in corporate and product marketing, business development, and product management, supporting an array of technology services, hardware and software solutions—with a strong focus on cybersecurity in recent years. He frequently shares his insights on cybersecurity at industry conferences and podcasts, and regularly contributes articles to enterprise security publications. Daniel holds graduate degrees in Behavioral Sciences and Business Administration.
  • dennis-hung photo
    Dennis Hung
    Dennis Hung is a former database developer and system architect, specializing in SQL, big data, and cybersecurity. He has his Master’s in Business Intelligence and enjoys freelancing on tech related blogs. His writing interests include cybersecurity, innovative technologies, database, big data, and analytics.
  • devon-warren-kachelein photo
    Devon Warren-Kachelein
    Devon Warren-Kachelein is a Multimedia Specialist at SecureWorld. She covers news related to the cybersecurity industry, hacking, and more. Reach out at
  • dr-branden-r-williams photo
    Dr. Branden R. Williams
    Branden R. Williams has nearly two decades of experience in technology and information security with a formidable background in the majority of the technologies that drive today’s businesses. After spending the first several years of his career working with education institutions and internet service providers to secure their infrastructures, Branden co-founded and sold an IT consulting business. He has practical experience working with global clients in multiple verticals and is known for creating innovative solutions to challenging problems. Branden has current, extensive experience in a number of popular server platforms, and further experience in other operating systems including Mainframe (z/OS) and OS X. From a networking perspective, Branden has experience with many of the major networking players as well as practical deployments of infrastructure to promote efficiency and order where cost and chaos normally exists. Branden is a Distinguished Fellow of the Information Systems Security Association (ISSA) and was also an Adjunct Professor at the University of Dallas’s Graduate School of Management where he taught in their NSA Certified Information Assurance program. He publishes regularly and co-authored multiple books on PCI Compliance. He has a BBA in Marketing, an MBA in Supply Chain Management & Market Logistics, and a Doctor of Business Administration in Business Intelligence. When he is not on the road or looking for a great brewpub, he resides in Flower Mound, Texas.
  • dr-larry-ponemon photo
    Dr. Larry Ponemon
    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework. Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation. Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws. Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
  • dr-mansur-hasib photo
    Dr. Mansur Hasib
    Dr. Mansur Hasib is the only cybersecurity and health information technology professional in the world with 12 years' experience as Chief Information Officer, a Doctor of Science in Cybersecurity, and the prestigious CISSP, PMP, and CPHIMS certifications. A global thought leader, Dr. Hasib has led technology and cybersecurity strategy for almost 30 years in healthcare, education, biotechnology, and energy. He currently serves as Program Chair of Cybersecurity Technology, The Graduate School, University of Maryland University College. He is a frequent speaker at local, national, and international conferences. For his doctoral dissertation in 2013, Dr. Hasib conducted a national study in US healthcare and examined the relationship between cybersecurity culture and cybersecurity compliance. He shares these results in a book titled Impact of Security Culture on Security Compliance in Healthcare in the USA. This work was cited in the references for ISC2’s new healthcare security and privacy certification. In September 2014, Dr. Hasib published the new edition of Cybersecurity Leadership: Powering the Modern Organization. In this work he shares his cybersecurity leadership and governance model and life-long learning with many examples drawn from his practical experiences, research and observations. His leadership model is applicable in any organization. Dr. Hasib served as Chief Information Officer at the Baltimore City Health Department and within the University System of Maryland for 12 years. He currently teaches and mentors the next generation of organizational executives at several U.S. universities. Dr. Hasib has developed unique holistic Master of Science and Doctor of Science programs in Business Information Technology and Cybersecurity which can be adapted by any university. He completed his Master’s degree in Political Science at Emory University and his Doctor of Science in Cybersecurity (IA) from Capitol Technology University. During the early 1980s Dr. Hasib became one of the first network engineers in the world and helped to transition two organizations from mainframe to network environments. Dr. Hasib enjoys table tennis, comedy, and travel, and has been to all 50 U.S. states.
  • dr-peter-stephenson photo
    Dr. Peter Stephenson
    Dr. Peter Stephenson retired from active consulting and teaching after a 55-year career and now spends his time in writing and research. His research, largely, is in cyber-legal practice and next generation cyber threat/intelligence analysis on large-scale computer networks such as the Internet. Dr. Stephenson was technology editor for several years for SC Magazine, which he wrote for over 25 years. He is enabled in his research by an extensive personal research laboratory as well as a multi-alias presence in the Dark Web. He has lectured extensively on digital investigation and security, and has written, edited or contributed to over 20 books as well as several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He spent ten years as a professor at Norwich University teaching digital forensics, cyber law and information security. He retired from the university as an Associate Professor in 2015. Dr. Stephenson obtained his PhD at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree in diplomacy with a concentration in terrorism from Norwich University in Vermont. Dr. Stephenson is a full member, ex officio board member and CISO of the Vidocq Society ( He is a member of the Albany, NY chapter of InfraGard. He held - but has retired from - the CCFP, CISM, FICAF and FAAFS designations as well as holding the CISSP (ret) designation.
  • drew-todd photo
    Drew Todd
    Drew covers cybersecurity for SecureWorld News.
  • eddy-bobritsky photo
    Eddy Bobritsky
    Eddy Bobritsky is the Co-Founder and CEO of Minerva Labs, a provider of endpoint security solutions. He is a cyber and information security domain expert with more than 15 years in the industry. Before founding Minerva, Eddy was a senior cyber security consultant for the defense and financial sectors. During his military career in the Israel Defense Forces (IDF) Navy cyber unit, Eddy oversaw the largest Endpoint Protection project in Israel, from design, through development, to implementation and maintenance of hundreds of thousands of endpoints. Eddy’s rule of thumb is to 'keep things simple' to help businesses operate seamlessly, which is why he started Minerva. Eddy holds a Master's degree in Business Management and Information Technology.
  • eric-wolff photo
    Eric Wolff
    Eric Wolff, Senior Product Marketing Manager, markets and delivers content and training on Thales eSecurity cloud solutions for application-layer data protection and public and private cloud. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications and storage subsystems.
  • ernesto-digiambattista photo
    Ernesto DiGiambattista
    Ernesto DiGiambattista is the CEO and Founder of Cybric. He was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, where he was responsible for transforming a legacy technology team into a technology innovation service group. In addition, Ernesto was a senior member of Bank of America's Information Security & Resiliency Group and Corporate Audit organizations. During his tenure, he was responsible for assessing and managing the information security risk of global technology vendors. Further, Ernesto has been a trusted advisor on cybersecurity private and public policy to members of the U.S. Senate and U.S. House of Representatives. Ernesto is also a Steering Committee Member of the Security Innovation Network (SINET), SINET is a super-connector that accelerates Cybersecurity innovation into the global marketplace by providing trusted platforms for the business of Cyber to take place between investors, entrepreneurs and industry and government buyers. Ernesto also serves as a Board of Director to the Massachusetts Technology Collaborative, an innovative public agency working to support a vibrant, growing economy across Massachusetts. In June 2015, Ernesto was recognized by the Boston Business Journal as a 2015 Finalist for Boston CIO of the Year. Ernesto holds a BSc. in Computer Information Systems & MBA from Suffolk University. He is based in Lynnfield, MA, where he lives with his wife, son, and daughter.
  • george-finney-j-d photo
    George Finney, J.D.
    Chief Security Officer, Southern Methodist University
  • gretel-egan photo
    Gretel Egan
    Gretel Egan is a security awareness training strategist for Proofpoint. A graduate of Carnegie Mellon University, she has been working in technical, business, and consumer communications for more than 20 years. Gretel has extensive experience in researching and developing cybersecurity education content and was named one of “10 Security Bloggers to Follow” by IDG Enterprise. In addition, Gretel has written and provided commentary for international, industry, and trade publications, including the Daily Mirror, Dark Reading, and Accounting Today. She is also a frequent presenter for events and webinars hosted by industry-leading organizations like SecureWorld, ISSA, Infosecurity Europe, ISACA, and SC Media.
  • heather-cyrus photo
    Heather Cyrus
    Heather is a freelance author who has spent more than 12 years writing and copyediting in various roles, including formerly on staff at SecureWorld. Heather graduated from the University of Oregon with a B.S. in Environmental Studies and a B.S. in Journalism & Communications. When she is off duty, she enjoys exploring Oregon with her family, volunteering for local non-profits, and sipping wine at outdoor music festivals. She is also an advocate for environmental stewardship and holds a Master Recycler Certification for the Portland Metro area.
  • idsa photo
    The Identity Defined Security Alliance is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies. The IDSA is a nonprofit organization that facilitates community collaboration to create a body of knowledge that provides organizations with practical guidance, implementation best practices and validated solutions to reduce the risk of a breach.
  • james-quick photo
    James Quick
    James works as a Director of Solutions & Advisory for Simeio Solutions, where he has a proven track record managing programs that holistically integrate identity and access management with data security and with information security strategy and initiatives. James has delivered cutting edge technology solutions to many of the Fortune Global 500 with proven results.
  • jim-delorenzo photo
    Jim DeLorenzo
    Solutions Marketing Manager at Thales eSecurity
  • joel-weise photo
    Joel Weise
    Joel Weise has worked in the field of information security for over 35 years. As an information security practitioner he designs, architects, and engineers system and application security solutions for a range of different enterprises. Joel is also a leading expert on legal and regulatory issues as they relate to information security. He is a founding member of the Information Systems Security Association (ISSA), the chairman of the ISSA Journal Editorial Advisory Board, and a member of and Subject Matter Expert for the American Bar Association Science and Technology working committee. His other interests include the elaboration of adaptive security, complex adaptive systems, security governance, security maturity modeling and privacy.
  • john-frymier photo
    John Frymier
    Mr. Frymier is the Chief Information Security Officer of Unisys Corporation. He works with functional leaders across Unisys as well as vendors and partners to oversee the development and implementation of effective global information security policies, standards and procedures. Furthermore, as a thought leader and practitioner, he represents the company across the industry, as well as assisting in client presentations and the development of service delivery models and client material on matters pertaining to digital security. Mr. Frymier also leads the Unisys Consumerization of IT program, charged with fostering the overall evolution of Unisys information technology strategy and implementation to accommodate mobility and the adoption and effective use of consumer technologies in the Unisys infrastructure.
  • jordan-fischer photo
    Jordan Fischer
    Jordan L. Fischer, Esq. is the Global Privacy Practice Group leader at Beckage, PLLC, a seasoned team of lawyers focused on data security, data privacy, and technology law. She focuses her practice on international data privacy, cybersecurity and cross-border data management, with a special emphasis in European Union data privacy regulations, the GDPR, and the CCPA. Jordan brings extensive experience in the intersection of law and technology to counsel global companies to create legal solutions. She is also an Assistant Professor of Law at the Thomas R. Kline School of Law at Drexel University and a Cybersecurity Lecturer at UC Berkeley, School of Information.
  • joseph-carson photo
    Joseph Carson
    Joe Carson is a cybersecurity professional with more than 20 years’ experience in enterprise security & infrastructure. Currently, Carson is the Chief Security Scientist at Thycotic. He is an active member of the cyber security community and a Certified Information Systems Security Professional (CISSP).
  • josh-corman photo
    Josh Corman
    Joshua Corman is Senior Advisor and Visiting Researcher for U.S. DHS Cybersecurity and Infrastructure Security Agency (CISA). Prior to that, he was Chief Security Officer and Senior Vice President at PTC. He has more than a decade of experience with security and networking software. He served as Research Director for Enterprise Security at The 451 Group following his time as Principal Security Strategist for IBM Internet Security Systems. His research cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting economics. His research and education efforts won him the title of Top Influencer of IT by NetworkWorld magazine in 2009.
  • juan-c-asenjo photo
    Juan C. Asenjo
    Juan has worked in the information security field for over 25 years in government, military, and the private sector. As Senior Manager at nCipher Security, he brings to market innovative cryptographic integrations that use identity management, authentication, and encryption to help customers use security as an enabler for digital transformation. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, Juan helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.
  • kevin-beaver photo
    Kevin Beaver
    Kevin Beaver has over 23 years of experience serving in various information technology and security roles for several healthcare, e-commerce, financial and educational institutions. Striving to bring a voice of reason to information security, Kevin focuses his work around independent security assessments, speaking, writing and expert witness work. He is the author of "Hacking For Dummies," one of the top selling books on information security.
  • kim-l-jones photo
    Kim L. Jones
    Kim L. Jones is Director, Cybersecurity Education Consortium, Arizona State University and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing and defense industries. Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. He is a member of the CISO Advisory Council for ISSA International.
  • kristin-judge photo
    Kristin Judge
    Kristin Judge is CEO and President of Cybercrime Support Network. She founded the nonprofit in 2017 to be a voice for cybercrime victims. She's a national speaker, sharing cybersecurity best practices with elected officials, businesses, and consumers. She's appeared on the C-SPAN Network and local news outlets, and been called on by numerous technology publications, to share advice for online safety. Previously at MS-ISAC and National Cyber Security Alliance, she worked as a "technology interpreter" helping nontechnical people become more secure. Kristin was an SC Media "Women in IT Security Influencer" in 2017, and authored the LinkedIn course, "Cybersecurity for Small and Medium Businesses: Essential Training."
  • le-creative-communications photo
    L&E Creative Communications
    Learnings & Entertainments (L&E) is a network of comedians, writers, and musicians that focus on employee engagement, communication and corporate education. The L&E Privacy & Info Security Suites are a customizable library of short, clever, catchy, advertising-like awareness communications consisting of video shorts, songs & jingles, GIFs & Memes that get attention and engage employees in 60 seconds or less. We also teach interactive improv-based skills building workshops to help security professionals with communication, collaboration, engagement and building rapport. For more information on the awareness Suites, improv-based learning, or other creative ways to improve engagement, communication and awareness, visit us at
  • michael-bailey photo
    Michael Bailey
    Michael is the Senior Product Marketing Manager at Proofpoint. He has a bachelor’s degree in Business Communications from the University of Pittsburgh.
  • michael-thelander photo
    Michael Thelander
    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technology. He loves to educate markets, tell stories that demonstrate value, play music, and on occasion fly small airplanes into active volcanoes.
  • mike-gentile photo
    Mike Gentile
    Mike Gentile is on a mission to change the status quo in information security. As the Founder, President, and CEO of CISOSHARE, he leads a team working to translate the discipline from one that is often misunderstood, inefficiently applied, and painful to one that is seamless, collaborative, and repeatable in organizations across the globe. As a researcher, Mike co-authored "The CISO Handbook" and "CISO Soft Skills" books.
  • morey-haber photo
    Morey Haber
    Morey Haber is CTO and CISO of BeyondTrust. He has more than 20 years of IT industry experience and authored the book “Privileged Attack Vectors and Asset Attack Vectors.” He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees the vision for BeyondTrust technology encompassing privileged access management, remote access, and vulnerability management solutions, and BeyondTrust’s own internal information security strategies. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor’s of Science in Electrical Engineering from the State University of New York at Stony Brook.
  • nathan-wenzler photo
    Nathan Wenzler
    Nathan Wenzler is the Senior Director of Cybersecurity at Moss Adams. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. He has helped government agencies and Fortune 1000 companies build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management, and the personnel side of a successful security effort. Wenzler is frequently quoted in publications such as USA Today, Forbes, The Washington Post,, Infosecurity Magazine, Dark Reading, and SC Magazine, and contributes regularly to his own column on CSO Online, “The Layer 8 Debate". He is also a frequent presenter on BrightTalk and at a number of leading conferences worldwide.
  • neko-papez photo
    Neko Papez
    Neko Papez is the Product Marketing Manager for Proofpoint's Email and Browser Isolation solutions. Prior to his role as PMM for Isolation, Neko was also a part of the Commercial Sales team here at Proofpoint for over two years actively managing accounts across the South East region. Neko has over six of years of information security and/or SaaS experience with a range of positions from Sales to Product Marketing.
  • quincy-jackson photo
    Quincy Jackson
    Quincy Jackson (CISSP, C|EH, GWAPT) is a Security Risk Consultant with over 17 years of experience. In addition to his eight years of U.S. military service, his experience includes building InfoSec programs at Continental Airlines and Universal Weather & Aviation. Quincy specializes in web application security penetration testing, mobile device security, and IT security risk management. Quincy is an active member of InfraGard and serves as a board member for the National Information Security Group - Houston (NAISG). He provides the community with IT Security news and information via his blog.
  • rebecca-herold photo
    Rebecca Herold
    Rebecca is Co-Founder and President of SIMBUS, LLC, provider of Information Security, Privacy & Compliance cloud services, and CEO of The Privacy Professor ® consultancy she established in 2004. Rebecca is a technology services entrepreneur, as well as an information privacy, security and compliance expert, consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries with over 25 years of systems engineering, information security, privacy and compliance experience. She has authored 18 books and hundreds of articles. Rebecca appears monthly on the CW Iowa Live television show to raise public awareness of current information security and privacy topics. She led the NIST SGIP Smart Grid Privacy Subgroup for 8 years, and was a founding officer for the IEEE Par 1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group. She has also been an Adjunct Professor for the Norwich University MSISA program since 2005, and is an Expert Witness for information security, privacy and compliance cases. Rebecca holds the following certifications: FIP, CISSP, CISA, CISM, CIPT, CIPM, CIPP/US, and FLMI. See more at
  • rebecca-rakoski photo
    Rebecca Rakoski, Esq.
    Rebecca L. Rakoski is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. As an experienced litigator, she has handled hundreds of matters in state and federal courts. Rebecca advises her clients on a proactive, multi-jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She works with clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure. As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section, and also served on the Complex Business Litigation Committee that drafted and revised the Court Rules involving electronic discovery in complex litigation matters. She has been appointed in several litigation matters by the New Jersey Superior Court as a Discovery Special Master. Rebecca is on the Board of Governors for Temple University Health Systems, and is an adjunct professor at Drexel University’s Thomas R. Kline School of Law and Rowan University.
  • rick-delgado photo
    Rick Delgado
    Rick Delgado is a business technology consultant for several Fortune 500 companies. He is also a frequent contributor to news outlets such as Wired, Tech Page One, and Cloud Tweaks. Rick enjoys writing about the intersection of business and new innovative technologies.
  • rick-killpack photo
    Rick Killpack
    Rick Killpack has over 23 years of experience in the enterprise and cloud markets. He started working in IT security with Novell in 1991. Throughout his career, he has a proven track record in business development, sales management, strategy management, product management, channel and technical services. Rick is very knowledgeable about the cloud marketplace and specifically as it pertains to cybersecurity. His previous employment was with Akamai technologies in which he designed and rolled out a Global Security channel strategy for Akamai's Cloud Security Services. He currently is employed at Thales e-Security as a Director of Channel Development helping public cloud and SaaS providers deliver data security services to their end customers. He has published technical manuals still available today on Amazon as well as business security briefs in well-known publications like CIO magazine, SAP GRC and others. He has spoken as a security authority in various security events sponsored by the CISSP and CISO organizations. Rick’s unique mixture of technical and business skills along with his vast experience in security has allowed him to provide insights into cloud security best practices to hundreds of risk, compliance and security leaders in the largest enterprises and governments across the globe. Rick is considered a technical subject matter expert in CDN, DDoS, DNS, Identity Management, Data Security, Access Management, SIEM, Threat Intelligence, ITGRC, Privileged User Management and Advanced Authentication/Authorization services.
  • robb-reck photo
    Robb Reck
    Robb Reck, MBA, CISSP, is an Information Security and Risk professional with over 16 years of experience in IT, Risk Management, and Information Security. Robb has created comprehensive security programs for multiple financial institutions. He previously served as VP and CISO for Pulte Financial Services. He currently is CISO for Ping Identity. Robb is also the President of the Denver chapter of ISSA. He is active in the security community nationally, and he has made it his goal to make Colorado the mecca for information security.
  • robert-shields photo
    Robert Shields, CISSP
    Product Marketing, Security Awareness Training, at Proofpoint Astute, high-impact marketing leader and data privacy and security expert with 15+ years of demonstrated marketing management experience across a diverse array of industries―including telecommunications, energy and utilities, retail, and government. Driving strategic insight and execution for all aspects of enterprise marketing including content creation, pipeline coverage and go-to-market planning, demand generation, market analysis, campaign management, and field enablement.
  • scott-schober photo
    Scott Schober
    Scott Schober is the President and CEO of Berkeley Varitronics Systems, an experienced provider of wireless test and security solutions. He is considered one of the foremost wireless technology and cybersecurity experts in the world, and is regularly interviewed for leading national publications, as well as appearing on major network television and radio stations to offer his expertise. He is the author of the hit book "Hacked Again," which examines a multitude of cybersecurity issues affecting us all, including: malware, hackers, email scams, identity theft, spam, social engineering, passwords, and the Dark Web.
  • scott-waddell photo
    Scott Waddell
    Scott has over 20 years of experience in the security and technology field. He began his career pioneering tools and techniques for automated vulnerability assessment and incident response at the Air Force Information Warfare Center. Around the office he is known for his collection of Hawaiian shirts and his amazing ability to put complex concepts into layman’s terms.
  • shamoun-siddiqui photo
    Shamoun Siddiqui
    Shamoun Siddiqui is VP and CISO of The Neiman Marcus Group, Inc. He possesses a bachelor’s and a master’s degree in Mechanical Engineering and a doctorate in Aerospace Engineering from the University of Texas at Austin. After a successful career in aerospace engineering, he switched to Information Technology and Information Security and has been a leader in this space for more than 15 years, having served as the Director of IT at Hitachi Printing Solutions, Manager for Information Security for CVS/Caremark, and Director of Information Security at Sabre. He has several engineering and information security publications to his name.
  • shawn-e-tuma photo
    Shawn E. Tuma
    Shawn Tuma is a business lawyer with an internationally-recognized reputation in cybersecurity, computer fraud, and data privacy law. Having practiced in this area of law since 1999, he is one of the most experienced and well-respected cybersecurity and data privacy law attorneys in the United States. He is a Partner at Spencer Fane LLP, and Co-Chair of the Cybersecurity & Data Privacy Practice Group. Shawn is also the manager of the Business Cybersecurity Law Blog.
  • steve-durbin photo
    Steve Durbin
    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, cyber security, BYOD, the cloud, and social media across both the corporate and personal environments. Previously, he was senior vice president at Gartner.
  • tapan-shah photo
    Tapan Shah
    Tapan is a Principal at Ernst & Young, LLP. Previously, he was Managing Director at Sila and heads the National Consulting Practice. He brings over 25 years of experience and industry eminence in cybersecurity and risk with contributions to multiple publications, conferences, and advisory boards. His career has been dedicated to working with senior executives of Fortune 500 companies, helping them apply governance, process, and technology to improve their cybersecurity and risk posture.
  • tim-scargill photo
    Tim Scargill
    Tim Scargill is a former IBM consultant and electronic engineering graduate, now writing about all things technology related. He is particularly interested in how emerging technologies will affect enterprise in the future. After completing a masters degree in Electronic Engineering at the University of York, he moved on to become an IT consultant at IBM UK. Gaining knowledge and experience of big data and its business applications, he specialized in the analysis and processing of sensitive data. Specific interests include big data analytics and strategy, natural language processing, and machine learning.
  • trevor-hawthorn photo
    Trevor Hawthorn
    Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim, where he was co-founder and CTO. Trevor has a technical and hands-on background, with over 18 years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, Cybertrust (now Verizon Enterprise Security Solutions), and in 2005 co-founded Stratum Security, a security consulting boutique where ThreatSim was developed.
See what SecureWorld can do for you. Contact us today!
Contact us