Author Directory
  • aaron-jentzen photo
    Aaron Jentzen
    Aaron Jentzen is a Program Content Writer for Proofpoint Security Awareness Training, a leading provider of information security awareness and training software that helps organizations educate employees. He combines his experience as an award-winning arts and technology journalist with expertise in technical writing and technology marketing. He holds master’s degrees in Professional Writing and Investigative Journalism from Carnegie Mellon University.
  • ahanu-boyle photo
    Ahanu Boyle
    Ahanu Boyle is an Associate Cyber Risk Analyst at Cyber Risk Opportunities LLC and a lover of learning. They are based in Seattle and enjoy manga, translation studies, and making people scratch their heads.
  • alan-baptista photo
    Alan Baptista
    Alan is a Product Marketing Director at Chef, working remotely from Southern California. His career of over 20 years has been in product marketing, sales operations and international business roles for enterprise software, telecommunications and government space at organizations such as CA Technologies, Experian, InterVoice and US Commerce Department. When not helping customers tell their success stories he enjoys traveling and exploring Sous-Vide cooking and BGE Grilling.
  • alex-tray photo
    Alex Tray
    Alex Tray is a system administrator with 10 years of experience in the IT field. After getting his Bachelor's degree in computer science, he worked at a number of companies in Silicon Valley and helped start up a number of new businesses. Currently, Alex works as a cybersecurity consultant at NAKIVO, with a passion for enhancing digital security in today's fast-paced world. With years of hands-on experience in identifying and mitigating cyber threats, Alex has become a trusted expert in safeguarding sensitive data and ensuring the resilience of digital infrastructures.
  • alex-vakulov photo
    Alex Vakulov
    Alex Vakulov is a cybersecurity researcher with over 20 years of experience in malware analysis, with strong malware removal skills. He writes for numerous tech-related publications sharing his security experience. He assists organizations in making informed decisions to secure their data and assets effectively.
  • amruta-gawde photo
    Amruta Gawde
    Amruta is the Assistant Vice President, Products & Offerings, at Simeio. She has nearly a decade and a half of experience in the area of Information Security, with the majority of time focused in the Identity and Access Management domain.
  • angie-white photo
    Angie White
    Angie has a passion for creating engaging content that speaks to customers problems and offers smart solutions. She has over eight years of experience in the Technology sector and has spent the last two years delving into cybersecurity. When she's not taking in the magnificent views of Portland from iovation's 32nd floor office, she's busy exploring the beautiful Pacific Northwest or catching up on Game of Thrones.
  • anna-sarnek photo
    Anna Sarnek
    Anna Sarnek is the Director of Risk Solutions at SecurityScorecard. She is a technically oriented strategy and analytics professional with 10 years of experience in enterprise restructuring, divestiture and M&A, and cost, benefit, and risk based portfolio optimization. Anna is the former Head of Technology Alliances at RSA, and current head of the Risk Quantification product at SecurityScorecard.
  • arun-desouza photo
    Arun DeSouza
    Arun DeSouza is an award-winning thought leader with over two decades of experience in global security leadership and organizational transformation. Working as CISO, DeSouza’s areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. DeSouza has also earned numerous industry accolades, including Top Global CISO by Cyber Defense Magazine, Top 10 InfoSec Professional by OnCon, and induction into the CISO Hall of Fame by the global Cyber Startup Observatory. DeSouza’s proven ability to set the strategic direction for security within the organization aligns with enterprise stakeholders to build strategic roadmaps and implement flexible security solutions.
  • balraj-dhillon photo
    Balraj Dhillon
    Balraj Dhillon is the Engagement Director of Key Accounts at Simeio Solutions. He is part of the Simeio Engagement and Delivery team, focusing on Identity Access Management solutions across government and private sector customers in Canada. He has led a number of initiatives related to citizen identity, attestation programs, and technology modernization initiatives. He also has extensive experience with product and technology development, deployment and positioning for solutions across healthcare, payments and telecommunications industries.
  • barbara-endicott-popovsky photo
    Barbara Endicott-Popovsky
    Barbara Endicott-Popovsky, Ph.D., CRISC, is Executive Director for the Center of Information Assurance and Cybersecurity at the University of Washington--designated by the NSA as a Center for Academic Excellence in Information Assurance Education and Research-- and the Academic Director for the Masters in Infrastructure Planning and Management in the Urban Planning Department of the School of Built Environments. This follows a 20-year career in industry in executive and consulting positions in IT architecture and project management. Her research interests include enterprise-wide information systems security and compliance management, forensic-ready networks, the science of digital forensics and secure coding practices. She is a member of the American Academy of Forensic Scientists.
  • bidemi-ologunde photo
    Bidemi Ologunde
    Bidemi Ologunde, Senior Intelligence Analyst for Expedia Group, boasts a versatile career spanning incident response, SIEM operations, and the forefront of technological trends. His expertise is backed by an impressive portfolio of certifications, including CISA, C|EH, C|TIA, CASP+, amplifying his prowess in the InfoSec realm. His profound insights have been instrumental in shaping a dynamic security landscape. As the host and producer of 'The Bid Picture Podcast' and 'The Cyber Case Files Podcast', he discusses the daily implications of cybersecurity and analyzes federal cybercrime cases, respectively. He takes an active part in open-source investigations and uses his expertise to assist in locating missing children and supporting victims of human trafficking and domestic violence.
  • bob-sullivan photo
    Bob Sullivan
    Bob Sullivan is the author of four books, including the 2008 New York Times Best-Seller, Gotcha Capitalism, and the 2010 New York Times Best Seller, Stop Getting Ripped Off! His latest, The Plateau Effect, was published in 2013, and as a paperback, called Getting Unstuck in 2014. He also offers an online course, a 30-day challenge to Get Unstuck in Your Career. He worked for MSNBC.com/NBC News for nearly 20 years, much of them creating and writing the popular consumer/tech blog The Red Tape Chronicles. Now an independent journalist, he is still a contributor on CNBC.com and NBCNews.com, and continues to appear on NBC TV programs as a consumer and technology expert. He is a contributor at Credit.com, writing about fraud, scams, and the economy. His stories have also appeared in The New York Times, New York magazine, BoingBoing.com and on dozens of other sites.
  • bryant-g-tow photo
    Bryant G. Tow
    For over 25 years Bryant has held responsibilities as an entrepreneur and senior executive in all aspects of risk management including thought leadership in the area of cyber security, award winning development of security solutions, managing large global cyber and physical security teams. Bryant has held Partner positions in large consulting firms and been involved in several startups. Recently he was the Chief Security Officer for CSC‘s Financial Services Group securing 143 applications in 52 countries. Currently Bryant is the Managing Partner and founder of CyberRisk Solutions. In that capacity he assists clients at the executive level acting as CSO to help manage risk in the areas of people, process, technology and facilities in the financial services, healthcare, energy, retail and other verticals. Bryant has served in several leadership positions in the security industry including the Department of Homeland Security Sector Coordinating Council, ISSA, ISACA and InfraGard National Members Alliance board member and vice president. He is recognized as a Distinguished Fellow by the Ponemon Institute, the industry’s leading research organization. Bryant has published several books and articles on cyber security topics and has received several awards including "Governor's Office of Homeland Security Award for Exceptional Contribution in Recognition of Outstanding Support of Tennessee's Counter Terrorism Program.
  • cam-sivesind photo
    Cam Sivesind
    Cam is a content strategist for SecureWorld, helping build impactful agendas for in-person and virtual events. He is a strategic communications professional with 25-plus years' experience, including as a newspaper reporter and editor, a communications and PR lead for trade associations, and a copywriter and manager of marketing operations for a tech marketing startup. He and his wife also have a book resale business on Amazon.
  • chahak-mittal photo
    Chahak Mittal
    Chahak Mittal is a Certified Information Systems Security Professional (CISSP) and Cybersecurity Governance, Risk and Compliance Manager at Universal Logistics. Chahak is deeply committed to knowledge sharing and community engagement. She has actively contributed to the cybersecurity ecosystem through her roles as a Judge at Major League Hacking (MLH) Hackathons and a dedicated Cybersecurity Teacher in the Microsoft TEALS Program. Chahak's active involvement in organizations such as the Cybersecurity Collaboration Forum and SecureWorld's Detroit Advisory Council has been instrumental in her pursuit of staying at the forefront of industry trends and challenges. She has also channeled her insights into thought-provoking cybersecurity articles, published on SecureWorld.io, making a meaningful contribution to the field's intellectual discourse. Chahak's commitment to diversity and inclusion in cybersecurity is unwavering. She has actively participated in organizations like Women in Cybersecurity (WiCyS) and the Michigan Council of Women in Technology (MCWT), where she has championed the cause of gender diversity within the field. Her outreach efforts extend to interviews on prominent media platforms like PBS Channel and the Women in Technology podcast, where she has shared her insights to inspire young girls to consider cybersecurity as a viable and rewarding career path.
  • charlotte-hooper photo
    Charlotte Hooper
    Charlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specialising in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in Cybercrime Investigation. Charlotte delivers cybercrime related training sessions around the world for police forces, victim support charities and private organisations. Her areas of expertise include: Cybercrime investigations, cybercrime law enforcement & regulation, open-source intelligence, cyberstalking & online harassment, the cybercrime & online harm threat landscape and the impact of cybercrime on victims.
  • chester-avey photo
    Chester Avey
    Chester Avey has over a decade of experience in cybersecurity. He enjoys sharing his knowledge with other like-minded professionals through his writing.
  • chris-novak photo
    Chris Novak
    Chris Novak is the Global Director of Verizon's Threat Research Advisory Center.
  • chris-roberts photo
    Chris Roberts
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cybersecurity industry, Chris Roberts helps to drive technology innovation and product leadership. Chris understands enterprise security requirements, having served as both an in-house security expert and consultant on IT security, engineering, and architecture/design operations for scores of Fortune 500 companies across the finance, retail, energy, and services sectors. He is credentialed in many of the top IT and InfoSec disciplines. As a cybersecurity advocate and passionate industry voice, he has been featured in several documentaries and is regularly quoted in national newspapers, television news, and industry publications.
  • christopher-stienburg photo
    Christopher Stienburg
    Christopher Stienburg is a seasoned litigator at Roberts & Obradovic law firm. With extensive experience, he has successfully represented clients in complex employment law disputes, elder abuse and estates cases, professional misconduct claims, commercial disputes, personal injury claims, and more. He served as lead counsel in the Ontario Court of Appeal case, Lam v. UWO (2019 ONCA 82), a leading case on contracts between students and universities and the rights of students to sue universities in Ontario courts. His legal expertise extends to all court levels and various tribunals. A graduate of Osgoode Hall Law School, Christopher is dedicated to helping individuals and businesses navigate the legal landscape.
  • chuck-harold photo
    Chuck Harold
    Retired police officer, movie studio security executive, contract security company executive and now… On-Air Radio Host / Executive Producer of Security Guy Radio, a weekly radio show with over 65,000 listeners worldwide. Each week, Chuck, along with Paul Bristow, challenges the conventional wisdom of the security industry with his "plain talk" experience, humorous stories and answers from the top security experts in the field.
  • ciso-mag photo
    CISO MAG
    CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. CISO MAG provides in-depth, impartial, business and technical information to the proficient ones in cyberspace. The magazine features news, comprehensive analysis, cutting-edge features, and contributions from thought leaders, that are nothing like the ordinary. EC-Council has been the world’s leading information security certification body. EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security. To provide the cybersecurity experts key information and analysis to tackle the security challenges, EC-Council has created CISO MAG, an information security magazine for best practice, trends, and news.
  • clare-ogara photo
    Clare O’Gara
    Writer for SecureWorld News
  • colleen-riccinto photo
    Colleen Riccinto
    Don’t think of Colleen Riccinto as one of “those recruiters.” She shoots from the hip, speaks from the heart, and brings 15 years of experience in sales, security training, and leadership to her role. Colleen is the founder of Cyber Talent Search in Ann Arbor, Michigan.
  • dan-lohrmann photo
    Dan Lohrmann
    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor (www.securitymentor.com). In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations. Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government. Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web," published in November 2008 by Brazos Press, and "BYOD for You: The Guide to Bring Your Own Device to Work," published in Kindle format in April 2013. He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing Magazine, and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana, and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
  • dan-shoemaker photo
    Dan Shoemaker
    Dr. Dan Shoemaker received a doctorate from the University of Michigan in 1978. He taught at Michigan State University and then moved to the Directorship of the information systems function for the Medical schools at MSU. He held a joint teaching and Department Chair position at Mercy College of Detroit. When Mercy was consolidated with the University of Detroit in 1990 he moved to the Business School to Chair their Department of Computer Information Systems (CIS). He attended the organizational roll-out of the discipline of software engineering at the Carnegie-Mellon University Software Engineering Institute in the fall of 1987, and he was already teaching a SEI based software engineering curriculum, which he established as a separate degree program to the MBA within the UDM College of Business Administration. Dr. Shoemaker’s specific areas of scholarship, publication and teaching were the process based stages of the waterfall; specification, SQA and acceptance/sustainment. He was also a primary consultant in the Detroit area on the CMM/CMMI. Dr. Shoemaker’s transition into cybersecurity came as a result of the audit and compliance elements of that body of knowledge, as well as the long established SQA/SCM elements of their curriculum. They were designated the 39th Center of Academic Excellence by the NSA/DHS at West Point in 2004, and they have tried to stay on the leading edge in the architectural aspects of cybersecurity system design and implementation as well as software assurance. As a result of Dr. Shoemaker’s associations with NSA/DHS and his interest in software assurance, he participated in the earliest meetings of the software assurance initiative. He was one of the three authors of the Common Body of Knowledge to Produce, Acquire and Sustain Software (2006), and he Chaired the Workforce Education and Training committee from 2007-2010. He was Chair of Workforce Training and Education for the Software Assurance Initiative at DHS (2007-2012), and he was a subject matter expert for NICE (2009 and NICE II – 2010-11), Securely Provision. Dr. Shoemaker was also an SME for the CSEC2017 (Human Security). He also published frequently in the Build-Security-In website. This exposure led to a grant to develop curricula for software assurance and the founding of the Center for Cybersecurity where he currently resides. The Center is a free-standing academic unit in the College of Liberal Arts, which is the administrative locus for Research Centers within UDM. Dr. Shoemaker’s final significant grant was from the DoD to develop a curriculum and teaching and course material for Secure Acquisition (in conjunction with the Institute for Defense Analysis and the National Defense University). A book was subsequently published by CRC press.
  • daniel-miller photo
    Daniel Miller
    Daniel is the Director of Product Marketing at Ericom Software. He has more than 15 years of industry experience in corporate and product marketing, business development, and product management, supporting an array of technology services, hardware and software solutions—with a strong focus on cybersecurity in recent years. He frequently shares his insights on cybersecurity at industry conferences and podcasts, and regularly contributes articles to enterprise security publications. Daniel holds graduate degrees in Behavioral Sciences and Business Administration.
  • david-anderson photo
    David Anderson
    Vice President, Cyber Liability, Woodruff Sawyer
  • david-balaban photo
    David Balaban
    David Balaban is a computer security researcher with over 18 years of experience in malware analysis and antivirus software evaluation. David runs MacSecurity.net and Privacy-PC.com projects that present expert opinions on contemporary information security matters, including social engineering, malware, penetration testing, threat intelligence, online privacy, and white hat hacking. David has a strong malware troubleshooting background, with a recent focus on ransomware countermeasures.
  • dennis-hung photo
    Dennis Hung
    Dennis Hung is a former database developer and system architect, specializing in SQL, big data, and cybersecurity. He has his Master’s in Business Intelligence and enjoys freelancing on tech related blogs. His writing interests include cybersecurity, innovative technologies, database, big data, and analytics.
  • dr-branden-r-williams photo
    Dr. Branden R. Williams
    Branden R. Williams has nearly two decades of experience in technology and information security with a formidable background in the majority of the technologies that drive today’s businesses. After spending the first several years of his career working with education institutions and internet service providers to secure their infrastructures, Branden co-founded and sold an IT consulting business. He has practical experience working with global clients in multiple verticals and is known for creating innovative solutions to challenging problems. Branden has current, extensive experience in a number of popular server platforms, and further experience in other operating systems including Mainframe (z/OS) and OS X. From a networking perspective, Branden has experience with many of the major networking players as well as practical deployments of infrastructure to promote efficiency and order where cost and chaos normally exists. Branden is a Distinguished Fellow of the Information Systems Security Association (ISSA) and was also an Adjunct Professor at the University of Dallas’s Graduate School of Management where he taught in their NSA Certified Information Assurance program. He publishes regularly and co-authored multiple books on PCI Compliance. He has a BBA in Marketing, an MBA in Supply Chain Management & Market Logistics, and a Doctor of Business Administration in Business Intelligence. When he is not on the road or looking for a great brewpub, he resides in Flower Mound, Texas.
  • dr-larry-ponemon photo
    Dr. Larry Ponemon
    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework. Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation. Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws. Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
  • dr-mansur-hasib photo
    Dr. Mansur Hasib
    Dr. Mansur Hasib is the only cybersecurity and health information technology professional in the world with 12 years' experience as Chief Information Officer, a Doctor of Science in Cybersecurity, and the prestigious CISSP, PMP, and CPHIMS certifications. A global thought leader, Dr. Hasib has led technology and cybersecurity strategy for almost 30 years in healthcare, education, biotechnology, and energy. He currently serves as Program Chair of Cybersecurity Technology, The Graduate School, University of Maryland University College. He is a frequent speaker at local, national, and international conferences. For his doctoral dissertation in 2013, Dr. Hasib conducted a national study in US healthcare and examined the relationship between cybersecurity culture and cybersecurity compliance. He shares these results in a book titled Impact of Security Culture on Security Compliance in Healthcare in the USA. This work was cited in the references for ISC2’s new healthcare security and privacy certification. In September 2014, Dr. Hasib published the new edition of Cybersecurity Leadership: Powering the Modern Organization. In this work he shares his cybersecurity leadership and governance model and life-long learning with many examples drawn from his practical experiences, research and observations. His leadership model is applicable in any organization. Dr. Hasib served as Chief Information Officer at the Baltimore City Health Department and within the University System of Maryland for 12 years. He currently teaches and mentors the next generation of organizational executives at several U.S. universities. Dr. Hasib has developed unique holistic Master of Science and Doctor of Science programs in Business Information Technology and Cybersecurity which can be adapted by any university. He completed his Master’s degree in Political Science at Emory University and his Doctor of Science in Cybersecurity (IA) from Capitol Technology University. During the early 1980s Dr. Hasib became one of the first network engineers in the world and helped to transition two organizations from mainframe to network environments. Dr. Hasib enjoys table tennis, comedy, and travel, and has been to all 50 U.S. states.
  • dr-peter-stephenson photo
    Dr. Peter Stephenson
    Dr. Peter Stephenson retired from active consulting and teaching after a 55-year career and now spends his time in writing and research. His research, largely, is in cyber-legal practice and next generation cyber threat/intelligence analysis on large-scale computer networks such as the Internet. Dr. Stephenson was technology editor for several years for SC Magazine, which he wrote for over 25 years. He is enabled in his research by an extensive personal research laboratory as well as a multi-alias presence in the Dark Web. He has lectured extensively on digital investigation and security, and has written, edited or contributed to over 20 books as well as several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He spent ten years as a professor at Norwich University teaching digital forensics, cyber law and information security. He retired from the university as an Associate Professor in 2015. Dr. Stephenson obtained his PhD at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree in diplomacy with a concentration in terrorism from Norwich University in Vermont. Dr. Stephenson is a full member, ex officio board member and CISO of the Vidocq Society (http://www.vidocq.org). He is a member of the Albany, NY chapter of InfraGard. He held - but has retired from - the CCFP, CISM, FICAF and FAAFS designations as well as holding the CISSP (ret) designation.
  • drew-hall photo
    Drew Hall
    Drew Hall serves as Director of Marketing and content editor for SecureWorld. Fascinated by the field of Information Security, he enjoys helping cyber defenders attain the information, resources, and connections they need to win the battle. He has a Bachelor's in Magazine Journalism and Master's in Strategic Communication from the University of Oregon. Go Ducks!
  • drew-todd photo
    Drew Todd
    Drew covers cybersecurity for SecureWorld News.
  • eoin-hinchy photo
    Eoin Hinchy
    Before founding Tines in early 2018, Eoin worked in various enterprise security teams. He was a senior engineer in eBay Inc.’s Global Threat Management team, and most recently as DocuSign’s senior director of security operations, he led the company’s incident response, security tooling, threat intel/hunting, and forensics programs. Eoin has two engineering degrees: a masters in security and forensics from Dublin City University, and an MBA from Imperial College London.
  • eric-wolff photo
    Eric Wolff
    Eric Wolff, Senior Product Marketing Manager, markets and delivers content and training on Thales eSecurity cloud solutions for application-layer data protection and public and private cloud. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications and storage subsystems.
  • ernesto-digiambattista photo
    Ernesto DiGiambattista
    Ernesto DiGiambattista is the CEO and Founder of Cybric. He was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, where he was responsible for transforming a legacy technology team into a technology innovation service group. In addition, Ernesto was a senior member of Bank of America's Information Security & Resiliency Group and Corporate Audit organizations. During his tenure, he was responsible for assessing and managing the information security risk of global technology vendors. Further, Ernesto has been a trusted advisor on cybersecurity private and public policy to members of the U.S. Senate and U.S. House of Representatives. Ernesto is also a Steering Committee Member of the Security Innovation Network (SINET), SINET is a super-connector that accelerates Cybersecurity innovation into the global marketplace by providing trusted platforms for the business of Cyber to take place between investors, entrepreneurs and industry and government buyers. Ernesto also serves as a Board of Director to the Massachusetts Technology Collaborative, an innovative public agency working to support a vibrant, growing economy across Massachusetts. In June 2015, Ernesto was recognized by the Boston Business Journal as a 2015 Finalist for Boston CIO of the Year. Ernesto holds a BSc. in Computer Information Systems & MBA from Suffolk University. He is based in Lynnfield, MA, where he lives with his wife, son, and daughter.
  • fabiola-fernandez photo
    Fabiola Fernandez
    Fabiola Fernandez is Product Marketing Manager, Security Awareness Training, at Proofpoint, educating and training our customers and sellers on Security Awareness Training and People-centric Security Messaging, building key collateral and presenting webinars and training sessions. Fabiola has over 3.5 years of experience in the cybersecurity industry and 6 years in the security space, having worked in several customer engagement events in her prior role at Keysight Technologies. She received her education at Santa Clara University and enjoys hiking and going to the beach in her spare time.
  • george-finney-j-d photo
    George Finney, J.D.
    Chief Security Officer, Southern Methodist University
  • gretel-egan photo
    Gretel Egan
    Gretel Egan is a security awareness training strategist for Proofpoint. A graduate of Carnegie Mellon University, she has been working in technical, business, and consumer communications for more than 20 years. Gretel has extensive experience in researching and developing cybersecurity education content and was named one of “10 Security Bloggers to Follow” by IDG Enterprise. In addition, Gretel has written and provided commentary for international, industry, and trade publications, including the Daily Mirror, Dark Reading, and Accounting Today. She is also a frequent presenter for events and webinars hosted by industry-leading organizations like SecureWorld, ISSA, Infosecurity Europe, ISACA, and SC Media.
  • harshil-parikh photo
    Harshil Parikh
    CEO of Tromzo, a Developer-First Application Security Management Platform backed by 25+ leading CISOs.
  • heather-cyrus photo
    Heather Cyrus
    Heather is a freelance author who has spent more than 12 years writing and copyediting in various roles, including formerly on staff at SecureWorld. Heather graduated from the University of Oregon with a B.S. in Environmental Studies and a B.S. in Journalism & Communications. When she is off duty, she enjoys exploring Oregon with her family, volunteering for local non-profits, and sipping wine at outdoor music festivals. She is also an advocate for environmental stewardship and holds a Master Recycler Certification for the Portland Metro area.
  • idsa photo
    IDSA
    The Identity Defined Security Alliance is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies. The IDSA is a nonprofit organization that facilitates community collaboration to create a body of knowledge that provides organizations with practical guidance, implementation best practices and validated solutions to reduce the risk of a breach.
  • jack-naglieri photo
    Jack Naglieri
    Jack Naglieri is a veteran security practitioner who founded Panther Labs to solve the challenges of security operations at scale. Jack began his career at Yahoo as an incident responder and later transitioned into a security engineer role, with the challenge of deploying security monitoring tools that could analyze data at a massive scale. In 2016, he joined Airbnb and led the development of an open-source platform called StreamAlert which became widely adopted and was a giant leap forward in the scalability and flexibility essential for modern security teams. This experience led him to create Panther in 2018 to achieve his vision of delivering the power to detect any breach, anywhere, for security teams everywhere.
  • jack-norris photo
    Jack Norris
    Jack Norris is a Marketing Intern covering cybersecurity news for SecureWorld. Originally from Boston, MA, he is currently studying journalism at the University of Kansas. Rock Chalk!
  • james-quick photo
    James Quick
    James works as a Director of Solutions and Advisory for Simeio Solutions, where he has a proven track record managing programs that holistically integrate identity and access management with data security and with information security strategy and initiatives. James has delivered cutting edge technology solutions to many of the Fortune Global 500 with proven results.
  • jim-delorenzo photo
    Jim DeLorenzo
    Solutions Marketing Manager at Thales eSecurity
  • joel-weise photo
    Joel Weise
    Joel Weise has worked in the field of information security for over 35 years. As an information security practitioner he designs, architects, and engineers system and application security solutions for a range of different enterprises. Joel is also a leading expert on legal and regulatory issues as they relate to information security. He is a founding member of the Information Systems Security Association (ISSA), the chairman of the ISSA Journal Editorial Advisory Board, and a member of and Subject Matter Expert for the American Bar Association Science and Technology working committee. His other interests include the elaboration of adaptive security, complex adaptive systems, security governance, security maturity modeling and privacy.
  • jordan-fischer photo
    Jordan Fischer
    Jordan L. Fischer, Esq. is a cyber attorney and partner at Constangy, Brooks, Smith & Prophete, LLP. She represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia. Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS). Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.
  • joseph-carson photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO at Delinea as a contributor guest for SecureWorld. Joseph is a cybersecurity professional with more than 25 years of experience in enterprise security and infrastructure. He is an active member of the cybersecurity community and a Certified Information Systems Security Professional (CISSP). Joseph and Delinea are focused on redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure modern enterprise attack surfaces.
  • juan-c-asenjo photo
    Juan C. Asenjo
    Juan has worked in the information security field for over 25 years in government, military, and the private sector. As Senior Manager at nCipher Security, he brings to market innovative cryptographic integrations that use identity management, authentication, and encryption to help customers use security as an enabler for digital transformation. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, Juan helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.
  • kathleen-moriarty photo
    Kathleen Moriarty
    Kathleen Moriarty, Chief Technology Officer, Center for Internet Security, has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Kathleen achieved over 20 years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Published work: "Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain," July 2020.
  • kim-l-jones photo
    Kim L. Jones
    Kim L. Jones is Director, Cybersecurity Education Consortium, Arizona State University and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing and defense industries. Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. He is a member of the CISO Advisory Council for ISSA International.
  • kimberly-haywood photo
    KJ Haywood
    Ms. Kimberly "KJ" Haywood has more than 25 years of experience in an array of industries, such as Financial, Technology, Healthcare, and Government, to name a few. Her career includes launching management and security practices, including her own firms, Knowledge Management & Associates, Inc. and Nomad Cyber Concepts, LLC, which serves nationwide clients. Her deep comprehension of compliance and business strategy has allowed her to gain instinctive knowledge and understanding of Cybersecurity, Governance Risk & Compliance. She's known for her ability to create and improve programs and has worked in prominent roles with top organizations such as USAA, Google, Bank of America, Wells Fargo, Harris Corporation, Texas Health Resources, and others. She has served on various boards throughout her career (e.g, former VP ISC2-DFW) and participated as a presenter, panelist, or moderator. She’s the Global Chief Education and Governance Advisor for AI Connex of Dallas and serves as an Adjunct Professor for Collin College's Cybersecurity Program in Frisco, TX. For further information, you may contact her via LinkedIn.
  • kip-boyle photo
    Kip Boyle
    Kip Boyle is the Virtual Chief Information Security Officer (vCISO) of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as a CISO and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
  • kristin-judge photo
    Kristin Judge
    Kristin Judge is CEO and President of Cybercrime Support Network. She founded the nonprofit in 2017 to be a voice for cybercrime victims. She's a national speaker, sharing cybersecurity best practices with elected officials, businesses, and consumers. She's appeared on the C-SPAN Network and local news outlets, and been called on by numerous technology publications, to share advice for online safety. Previously at MS-ISAC and National Cyber Security Alliance, she worked as a "technology interpreter" helping nontechnical people become more secure. Kristin was an SC Media "Women in IT Security Influencer" in 2017, and authored the LinkedIn course, "Cybersecurity for Small and Medium Businesses: Essential Training."
  • lisa-plaggemier photo
    Lisa Plaggemier
    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
  • lynn-dohm photo
    Lynn Dohm
    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.
  • michael-bailey photo
    Michael Bailey
    Michael is the Senior Product Marketing Manager at Proofpoint. He has a bachelor’s degree in Business Communications from the University of Pittsburgh.
  • michael-gregg photo
    Michael Gregg
    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues. With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
  • michael-holcomb photo
    Michael Holcomb
    Michael Holcomb is the Fellow and Director of Information Security for Fluor, one of the world's largest construction, engineering, and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing and industrial controls for the global organization. He also teaches cybersecurity as an adjunct instructor at Greenville Technical College and helps students, career transitioners, and others that are new to cybersecurity.
  • michael-thelander photo
    Michael Thelander
    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technology. He loves to educate markets, tell stories that demonstrate value, play music, and on occasion fly small airplanes into active volcanoes.
  • morey-haber photo
    Morey Haber
    Morey Haber is Chief Security Officer of BeyondTrust. He has more than 20 years of IT industry experience and authored the book "Privileged Attack Vectors and Asset Attack Vectors." He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees the vision for BeyondTrust technology encompassing privileged access management, remote access, and vulnerability management solutions, and BeyondTrust's own internal information security strategies. In 2004, Morey joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Morey began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor's of Science in Electrical Engineering from the State University of New York at Stony Brook.
  • myriah-jaworski photo
    Myriah Jaworski
    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
  • nahla-davies photo
    Nahla Davies
    Nahla Davies is a software developer and tech writer. Before devoting her work full time to technical writing, she managed—among other intriguing things—to serve as a lead programmer at an Inc. 5,000 experiential branding organization whose clients include Samsung, Time Warner, Netflix, and Sony.
  • nathan-wenzler photo
    Nathan Wenzler
    Nathan Wenzler is the Chief Security Strategist for Tenable. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. He has helped government agencies and Fortune 1000 companies build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management, and the personnel side of a successful security effort. Wenzler is frequently quoted in publications such as USA Today, Forbes, The Washington Post, TheStreet.com, Infosecurity Magazine, Dark Reading, and SC Magazine, and contributes regularly to his own column on CSO Online, "The Layer 8 Debate." He is also a frequent presenter on BrightTalk and at a number of leading conferences worldwide.
  • neil-h-simon photo
    Neil H. Simon
    Neil H. Simon is executive vice president at Resolute Strategic Services, where he helps organizations navigate cybersecurity crises. He is based in Portland, Ore.
  • neko-papez photo
    Neko Papez
    Neko Papez is the Product Marketing Manager for Proofpoint's Email and Browser Isolation solutions. Prior to his role as PMM for Isolation, Neko was also a part of the Commercial Sales team here at Proofpoint for over two years actively managing accounts across the South East region. Neko has over six of years of information security and/or SaaS experience with a range of positions from Sales to Product Marketing.
  • rebecca-herold photo
    Rebecca Herold
    Rebecca Herold is CEO of the Privacy & Security Brainiacs SaaS services business she launched in 2021 with her son Noah, the third SaaS business for which she has been co-founder and engineering architect. Rebecca is also founder (2004) and CEO of The Privacy Professor consultancy. Rebecca has over 25 years of systems engineering, information security, privacy, and compliance experience. Rebecca has authored 22 books to date. The most recent book is the soon-to-be-published second in the Privacy & Security Brainiacs "Cybersecurity for Grandparents and Everyone Else!" series of books, "IoT Security and Privacy." Rebecca is finishing another book in 2022 published by CRC Press titled, "Security & Privacy when Working from Home & Travelling." Rebecca has her own radio/podcast show, "Data Security and Privacy with the Privacy Professor" on Voice America. Rebecca has been a subject matter expert since January 2020 on the NIST Cybersecurity for IoT Program team. Rebecca also serves as an expert witness for IT, security, privacy, and compliance topics, including two cases so far that involved IoT use to commit crimes, including assaults. Rebecca was Adjunct Professor for the Norwich University MSISA program for nearly 10 years and has earned 10 professional certifications (FIP, CDPSE, CISSP, CIPP/US, CIPT, CIPM, CISM, CISA, FLMI, Ponemon Institute Fellow). Rebecca has Master's and Bachelor's degrees in Computer Science, Mathematics, and Education, and lives in Des Moines, Iowa, USA. For more information about Rebecca see: www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor www.privacyguidance.com
  • rebecca-rakoski photo
    Rebecca Rakoski, Esq.
    Rebecca L. Rakoski is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. As an experienced litigator, she has handled hundreds of matters in state and federal courts. Rebecca advises her clients on a proactive, multi-jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She works with clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure. As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section, and also served on the Complex Business Litigation Committee that drafted and revised the Court Rules involving electronic discovery in complex litigation matters. She has been appointed in several litigation matters by the New Jersey Superior Court as a Discovery Special Master. Rebecca is on the Board of Governors for Temple University Health Systems, and is an adjunct professor at Drexel University’s Thomas R. Kline School of Law and Rowan University.
  • rick-delgado photo
    Rick Delgado
    Rick Delgado is a business technology consultant for several Fortune 500 companies. He is also a frequent contributor to news outlets such as Wired, Tech Page One, and Cloud Tweaks. Rick enjoys writing about the intersection of business and new innovative technologies.
  • rick-killpack photo
    Rick Killpack
    Rick Killpack has over 23 years of experience in the enterprise and cloud markets. He started working in IT security with Novell in 1991. Throughout his career, he has a proven track record in business development, sales management, strategy management, product management, channel and technical services. Rick is very knowledgeable about the cloud marketplace and specifically as it pertains to cybersecurity. His previous employment was with Akamai technologies in which he designed and rolled out a Global Security channel strategy for Akamai's Cloud Security Services. He currently is employed at Thales e-Security as a Director of Channel Development helping public cloud and SaaS providers deliver data security services to their end customers. He has published technical manuals still available today on Amazon as well as business security briefs in well-known publications like CIO magazine, SAP GRC and others. He has spoken as a security authority in various security events sponsored by the CISSP and CISO organizations. Rick’s unique mixture of technical and business skills along with his vast experience in security has allowed him to provide insights into cloud security best practices to hundreds of risk, compliance and security leaders in the largest enterprises and governments across the globe. Rick is considered a technical subject matter expert in CDN, DDoS, DNS, Identity Management, Data Security, Access Management, SIEM, Threat Intelligence, ITGRC, Privileged User Management and Advanced Authentication/Authorization services.
  • robb-reck photo
    Robb Reck
    Robb Reck, MBA, CISSP, is an Information Security and Risk professional with over 16 years of experience in IT, Risk Management, and Information Security. Robb has created comprehensive security programs for multiple financial institutions. He is currently the Field CISO for Red Canary. He previously served as VP and CISO for Pulte Financial Services and CISO for Ping Identity. Robb is also the President of the Denver chapter of ISSA. He is active in the security community nationally, and he has made it his goal to make Colorado the mecca for information security. He co-hosts the "Colorado = Security" podcast.
  • robert-shields photo
    Robert Shields, CISSP
    Product Marketing, Security Awareness Training, at Proofpoint Astute, high-impact marketing leader and data privacy and security expert with 15+ years of demonstrated marketing management experience across a diverse array of industries―including telecommunications, energy and utilities, retail, and government. Driving strategic insight and execution for all aspects of enterprise marketing including content creation, pipeline coverage and go-to-market planning, demand generation, market analysis, campaign management, and field enablement.
  • sara-pan photo
    Sara Pan
    Sara is Team Manager, Product Marketing, at Proofpoint
  • scott-schober photo
    Scott Schober
    Scott Schober is the President and CEO of Berkeley Varitronics Systems, an experienced provider of wireless test and security solutions. He is considered one of the foremost wireless technology and cybersecurity experts in the world, and is regularly interviewed for leading national publications, as well as appearing on major network television and radio stations to offer his expertise. He is the author of the hit book "Hacked Again," which examines a multitude of cybersecurity issues affecting us all, including: malware, hackers, email scams, identity theft, spam, social engineering, passwords, and the Dark Web.
  • scott-waddell photo
    Scott Waddell
    Scott has over 20 years of experience in the security and technology field. He began his career pioneering tools and techniques for automated vulnerability assessment and incident response at the Air Force Information Warfare Center. Around the office he is known for his collection of Hawaiian shirts and his amazing ability to put complex concepts into layman’s terms.
  • shamoun-siddiqui photo
    Shamoun Siddiqui
    Shamoun Siddiqui is VP and CISO of The Neiman Marcus Group, Inc. He possesses a bachelor’s and a master’s degree in Mechanical Engineering and a doctorate in Aerospace Engineering from the University of Texas at Austin. After a successful career in aerospace engineering, he switched to Information Technology and Information Security and has been a leader in this space for more than 15 years, having served as the Director of IT at Hitachi Printing Solutions, Manager for Information Security for CVS/Caremark, and Director of Information Security at Sabre. He has several engineering and information security publications to his name.
  • shannon-flynn photo
    Shannon Flynn
    Shannon Flynn is a technology writer and Managing Editor at ReHack.com. She's written about security and business tech on CompTIA, CSO, Finovate, MakeUseOf, and more. Shannon aims to write articles that help businesses and organizations mitigate cybersecurity threats to keep at-risk individuals safe.
  • shawn-e-tuma photo
    Shawn E. Tuma
    Shawn Tuma is a business lawyer with an internationally-recognized reputation in cybersecurity, computer fraud, and data privacy law. Having practiced in this area of law since 1999, he is one of the most experienced and well-respected cybersecurity and data privacy law attorneys in the United States. He is a Partner at Spencer Fane LLP, and Co-Chair of the Cybersecurity & Data Privacy Practice Group. Shawn is also the manager of the Business Cybersecurity Law Blog.
  • stacey-wright photo
    Stacey Wright
    Stacey A. Wright, CISSP, is Vice President of Cyber Resiliency Services for Cybercrime Support Network (CSN). Stacey leads projects to assist the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in developing the cyber domain for the National Information Exchange Model (NIEM) and the development of the international Cyber Classification Compendium. She works with multiple partners and stakeholders around the world, particularly in state and local governments, and law enforcement. Previously, Stacey was the Directors of Partnerships and Cyber Intelligence at the Multi-State Information Sharing and Analysis Center (MS-ISAC) at the Center for Internet Security (CIS), where she developed partnerships and produced timely, actionable, unbiased state, local, tribal, and territorial government and elections-focused insight. In addition, Stacey teaches two graduate cybersecurity and threat intelligence courses at the State University of New York. Prior to her employment at CIS, Stacey was the Cyber Intelligence Analyst for the Federal Bureau of Investigation (FBI) Albany Division, where she was responsible for coordinating the local cyber intelligence program and served as the FBI's liaison to the MS-ISAC. Stacey began her career as an Information Systems Specialist for the Cambridge, MA, Public Safety departments. She received her Bachelor of Science in Criminal Justice from Northeastern University and her Master of Business Administration from the University of Massachusetts, Boston. She is a formally trained Intelligence Analyst and a national speaker on cybercrime.
  • steve-durbin photo
    Steve Durbin
    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, cyber security, BYOD, the cloud, and social media across both the corporate and personal environments. Previously, he was senior vice president at Gartner.
  • susannah-clark-matt photo
    Susannah Clark Matt
    Susannah is an award-winning writer and editor with specialties in cyberthreat intelligence, academic research, and creative nonfiction writing. At Red Canary, she translates technical jargon into snappy prose. She's been known to spend days agonizing over a single word choice, and she has a personal vendetta against the passive voice.
  • tapan-shah photo
    Tapan Shah
    Tapan is a Principal at Ernst & Young, LLP. Previously, he was Managing Director at Sila and heads the National Consulting Practice. He brings over 25 years of experience and industry eminence in cybersecurity and risk with contributions to multiple publications, conferences, and advisory boards. His career has been dedicated to working with senior executives of Fortune 500 companies, helping them apply governance, process, and technology to improve their cybersecurity and risk posture.
  • tim-green photo
    Tim Green
    Tim Green is passionate about cybersecurity and currently enjoys writing content for working professionals who specialize in the Fintech & SaaS markets. Tim frequently contributes to leading industry publications to share and expand his knowledge and skillset with the wider community. Connect with Tim over on LinkedIn and Twitter!
  • tim-scargill photo
    Tim Scargill
    Tim Scargill is a former IBM consultant and electronic engineering graduate, now writing about all things technology related. He is particularly interested in how emerging technologies will affect enterprise in the future. After completing a masters degree in Electronic Engineering at the University of York, he moved on to become an IT consultant at IBM UK. Gaining knowledge and experience of big data and its business applications, he specialized in the analysis and processing of sensitive data. Specific interests include big data analytics and strategy, natural language processing, and machine learning.
  • tom-brennan photo
    Tom Brennan
    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.
  • trevor-hawthorn photo
    Trevor Hawthorn
    Trevor Hawthorn is Founder and Managing Partner of Stratum Security. Previously, Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim, where he was co-founder and CTO. Trevor has a technical and hands-on background, with over 18 years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, Cybertrust (now Verizon Enterprise Security Solutions), and in 2005 co-founded Stratum Security, a security consulting boutique where ThreatSim was developed.
  • vikram-subramanian photo
    Vikram Subramanian
    Vikram is responsible for shaping the solution strategy that Simeio recommends for each of its customers including Professional/Advisory and Expert Managed Services. He joined Simeio in 2009 and has played a vital role in helping the company grow from a service integrator to an IAM services leader.
See what SecureWorld can do for you. Contact us today!
Contact us