| ISSA Journal - Journal Authors 2017 |
2017 ISSA Journal Authors
Sabett’s Brief Randy V. Sabett, J.D., CISSP, is Special Counsel at Cooley LLP and a member of the Boards of Directors of ISSA NOVA and the Georgetown Cybersecurity Law Institute. He was named the ISSA Professional of the Year for 2013.
Herding Cats Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives.
Cryptic Curmudgeon Rob Slade is an information security and management consultant from North Vancouver, British Columbia, Canada.
California Dreaming – The Fight with the Federal Government over Technology Mr. Jackson, CISSP, CEH, CIPP, works as a regulatory attorney for a government contractor in the Washington DC area.
Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization Philip Casesa, CISSP, CSSLP, PMP, ITIL, SAFe Agilist, is a director at Focal Point with years of experience in cybersecurity, software development, and consulting.
Security Made Amazon Profitable Michael McCormick is an information security consultant, researcher, and founder of Taproot Security.
Technology Repurposing: What Will Blockchain Be Tomorrow? Mark Kadrich is a well-known speaker and evangelist on network security matters at technical conferences and security events.
We Are the Front Lines – Protecting Yourself Protects the Organization Tony Buenger assumed the role of CISO for Augusta University in 2018. He served as an Associate Professor for the National Defense University.
Building a Risk-Based Information Security Culture Don McKeown is currently an Information Security Manager at Wolters Kluwer Health.
Basic Principles of Database Security John Gray, PhD, is an ISS analyst with over 15 years experience in information security and is employed by the Department of Defense.
Security Awareness Geordie Stewart, MSc, CISSP, is the Principle Security Consultant at Risk Intelligence and is a regular speaker and writer on the topic of security awareness.
Crypto Corner Luther Martin is a Distinguished Technologist at Micro Focus.
Practical Approaches to Overcome Security Challenges in Cloud Computing Seetharaman Jeganathan, CISSP, has 17 years of experience in IT, security consulting, and pro-ject management.
SIEM Implementation for School Districts Utilizing FOSS Alex Smith is a database administrator and DevOps engineer focusing on application team cy-bersecurity in public school districts.
Automation of Business-Aware Incident Management Mariusz Stawowski, PhD, CISSP, CEH, CCISO, is CTO / Technical Director of CLICO, a security technologies distributor and service provider operating in Poland and other Central and Eastern European countries.
Application Security, Ethics, & Eight-Year-Olds Matt Wilgus is the Security Practice Director at Schellman where he leads the firm’s threat- and vulnerability-related offerings.
The Quest for Visibility and Control in the Cloud Yuri Diogenes, CISSP, MS in Cybersecurity Intelligence & Forensics Investigation, currently works for Microsoft as Senior Program Manager for Azure Security Center.
Countering Gender Disparity: Creating Anti-Predictions Using Data Science Lori L. Cole, GSEC, GCIH, is a cyber threat analyst at BB&T. She was named SC Magazine’s IT Security 2018 Women to Watch.
Protecting Information Assets against Insider Threats T. Sean Kelly is a Senior Director at FTI Consulting.
Protecting Information Assets against Insider Threats Andrew Shaxted is a Senior Director in FTI Technology’s information governance, privacy and security practice.
Security in the News Kris Tanaka is the content marketing strategist for SecureWorld Expo and editor of the SecureWorld Post. She formerly served as the events and communications manager for ISSA International.
Gray Hat Dr. Mark Anderson is an ACM Distinguished Engineer with over 30 years information security experience.
Role-Based Security Awareness Training for Technology Joe Malec is a Senior Security Analyst at Express Scripts with more than 25 years of experience in information technology.
Women in Cybersecurity Dr. Curtis Campbell is a cybersecurity author with 25 years experience in information security, compliance, procurement, and third-party risk in the enterprise.
Reasons to Outsource Your Internal IT Audit Function John Huckeby, PCI QSA, HSA, CISA, ISO Lead Auditor, has been helping organizations secure their environ-ments for over 18 years.
Lost Cryptographics Keys – Lessons from Gerald Cotton Stephen Kirby is an attorney based in Washington State and the CEO of an IT consulting firm.
Anonymous Digital Signatures Phillip, CISM, actively participates in ITU-T SG17 Security, ISO TC68/SC2 Security, ISO/IEC JTC1/SC27 Security techniques, and X9 Financial Services standards development.
A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques Liu Hua Yeo is a doctoral student in technology at the College of Technology at Eastern Michigan University.
A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques Dr. Xiangdong Che, CISSP, is an Associate Professor in the Information Assurance program at Eastern Michigan University.
The Python Programming Language Constantinos Doskas is head of the IT and Security Department of Olympus. |
This feature is restricted to registered members.
If you are already a member of the community,
click here to sign in.
If you have not yet registered,
click here to get connected!