Author Directory
  • aaron-jentzen photo
    Aaron Jentzen
    Aaron Jentzen is a Marketing Writer for Wombat Security, a division of Proofpoint, a leading provider of information security awareness and training software that helps organizations educate employees. He combines his experience as an award-winning arts and technology journalist with expertise in technical writing and technology marketing. He holds master’s degrees in Professional Writing and Investigative Journalism from Carnegie Mellon University.
  • angie-white photo
    Angie White
    Angie has a passion for creating engaging content that speaks to customers problems and offers smart solutions. She has over eight years of experience in the Technology sector and has spent the last two years delving into cybersecurity. When she's not taking in the magnificent views of Portland from iovation's 32nd floor office, she's busy exploring the beautiful Pacific Northwest or catching up on Game of Thrones.
  • barbara-endicott-popovsky photo
    Barbara Endicott-Popovsky
    Barbara Endicott-Popovsky, Ph.D., CRISC, is Executive Director for the Center of Information Assurance and Cybersecurity at the University of Washington--designated by the NSA as a Center for Academic Excellence in Information Assurance Education and Research-- and the Academic Director for the Masters in Infrastructure Planning and Management in the Urban Planning Department of the School of Built Environments. This follows a 20-year career in industry in executive and consulting positions in IT architecture and project management. Her research interests include enterprise-wide information systems security and compliance management, forensic-ready networks, the science of digital forensics and secure coding practices. She is a member of the American Academy of Forensic Scientists.
  • bob-sullivan photo
    Bob Sullivan
    Bob Sullivan is the author of four books, including the 2008 New York Times Best-Seller, Gotcha Capitalism, and the 2010 New York Times Best Seller, Stop Getting Ripped Off! His latest, The Plateau Effect, was published in 2013, and as a paperback, called Getting Unstuck in 2014. He also offers an online course, a 30-day challenge to Get Unstuck in Your Career. He worked for MSNBC.com/NBC News for nearly 20 years, much of them creating and writing the popular consumer/tech blog The Red Tape Chronicles. Now an independent journalist, he is still a contributor on CNBC.com and NBCNews.com, and continues to appear on NBC TV programs as a consumer and technology expert. He is a contributor at Credit.com, writing about fraud, scams, and the economy. His stories have also appeared in The New York Times, New York magazine, BoingBoing.com and on dozens of other sites.
  • brian-krebs photo
    Brian Krebs
    Reporter and Publisher, Internet Security and Cybercrime Krebs on Security LLC Brian Krebs is the author of KrebsonSecurity.com, a daily news site dedicated to in-depth cyber security news and investigation, with a special focus on cybercrime. For the third year running, KrebsonSecurity.com was voted the Blog That Best Represents the Security Industry by judges at the 2013 RSA Conference, the world’s largest computer security gathering. KrebsOnSecurity also won the "Most Educational Security Blog” award, and last year Krebs was presented with the "Security Bloggers Hall of Fame Award,” alongside noted security expert Bruce Schneier. From 1995 to 2009, Mr. Krebs was a reporter for The Washington Post, where he covered internet security, technology policy, cybercrime and privacy issues for the newspaper and the website. A frequent interviewee and public speaker, Krebs's stories and investigations have also have appeared in Popular Mechanics, Wired.com and dozens of other publications. Krebs is a 1994 graduate of George Mason University, where he earned a Bachelor of Arts in International Relations.
  • bruce-sussman photo
    Bruce Sussman
    Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. A journalist, certified meteorologist, and public speaker, Sussman has been telling stories about InfoSec and cybersecurity for several years now. He is SecureWorld’s MMJ (multi-media journalist) and leads media development at the company. “This is cybersecurity’s prime time,” he says. “The world depends on leaders in InfoSec. I cannot believe I get to interview so many of them at our regional cybersecurity conferences, as they share best practices with their peers.” Sussman graduated from the University of Missouri School of Journalism back in the dark ages. If you have a news tip for him, his email is bruces@secureworldexpo.com.
  • bryant-g-tow photo
    Bryant G. Tow
    For over 25 years Bryant has held responsibilities as an entrepreneur and senior executive in all aspects of risk management including thought leadership in the area of cyber security, award winning development of security solutions, managing large global cyber and physical security teams. Bryant has held Partner positions in large consulting firms and been involved in several startups. Recently he was the Chief Security Officer for CSC‘s Financial Services Group securing 143 applications in 52 countries. Currently Bryant is the Managing Partner and founder of CyberRisk Solutions. In that capacity he assists clients at the executive level acting as CSO to help manage risk in the areas of people, process, technology and facilities in the financial services, healthcare, energy, retail and other verticals. Bryant has served in several leadership positions in the security industry including the Department of Homeland Security Sector Coordinating Council, ISSA, ISACA and InfraGard National Members Alliance board member and vice president. He is recognized as a Distinguished Fellow by the Ponemon Institute, the industry’s leading research organization. Bryant has published several books and articles on cyber security topics and has received several awards including "Governor's Office of Homeland Security Award for Exceptional Contribution in Recognition of Outstanding Support of Tennessee's Counter Terrorism Program.
  • chris-roberts photo
    Chris Roberts
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cybersecurity industry, Chris Roberts is the Chief of Adversarial Research and Engineering for LARES Consulting, helping to drive technology innovation and product leadership. Roberts understands enterprise security requirements, having served as both an in-house security expert and consultant on IT security, engineering, and architecture/design operations for scores of Fortune 500 companies across the finance, retail, energy, and services sectors. He is credentialed in many of the top IT and InfoSec disciplines. As a cybersecurity advocate and passionate industry voice, he has been featured in several documentaries and is regularly quoted in national newspapers, television news, and industry publications.
  • chuck-harold photo
    Chuck Harold
    Retired police officer, movie studio security executive, contract security company executive and now… On-Air Radio Host / Executive Producer of Security Guy Radio, a weekly radio show with over 65,000 listeners worldwide. Each week, Chuck, along with Paul Bristow, challenges the conventional wisdom of the security industry with his "plain talk" experience, humorous stories and answers from the top security experts in the field.
  • ciso-mag photo
    CISO MAG
    CISO MAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. CISO MAG provides in-depth, impartial, business and technical information to the proficient ones in cyberspace. The magazine features news, comprehensive analysis, cutting-edge features, and contributions from thought leaders, that are nothing like the ordinary. EC-Council has been the world’s leading information security certification body. EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security. To provide the cybersecurity experts key information and analysis to tackle the security challenges, EC-Council has created CISO MAG, an information security magazine for best practice, trends, and news.
  • colleen-riccinto photo
    Colleen Riccinto
    Don’t think of Colleen Riccinto as one of “those recruiters.” She shoots from the hip, speaks from the heart, and brings 15 years of experience in sales, security training, and leadership to her role. Colleen is the founder of Cyber Talent Search in Ann Arbor, Michigan.
  • cybertrend photo
    CyberTrend
    No longer in publication, CyberTrend was a monthly business technology magazine for executives and business owners.
  • dan-lohrmann photo
    Dan Lohrmann
    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor (www.securitymentor.com). In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations. Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government. Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013. He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
  • daniel-miller photo
    Daniel Miller
    Daniel is the Director of Product Marketing at Ericom Software. He has more than 15 years of industry experience in corporate and product marketing, business development, and product management, supporting an array of technology services, hardware and software solutions—with a strong focus on cybersecurity in recent years. He frequently shares his insights on cybersecurity at industry conferences and podcasts, and regularly contributes articles to enterprise security publications. Daniel holds graduate degrees in Behavioral Sciences and Business Administration.
  • dennis-hung photo
    Dennis Hung
    Dennis Hung is a former database developer and system architect, specializing in SQL, big data, and cybersecurity. He has his Master’s in Business Intelligence and enjoys freelancing on tech related blogs. His writing interests include cybersecurity, innovative technologies, database, big data, and analytics.
  • dr-branden-r-williams photo
    Dr. Branden R. Williams
    Branden R. Williams has nearly two decades of experience in technology and information security with a formidable background in the majority of the technologies that drive today’s businesses. After spending the first several years of his career working with education institutions and internet service providers to secure their infrastructures, Branden co-founded and sold an IT consulting business. He has practical experience working with global clients in multiple verticals and is known for creating innovative solutions to challenging problems. Branden has current, extensive experience in a number of popular server platforms, and further experience in other operating systems including Mainframe (z/OS) and OS X. From a networking perspective, Branden has experience with many of the major networking players as well as practical deployments of infrastructure to promote efficiency and order where cost and chaos normally exists. Branden is a Distinguished Fellow of the Information Systems Security Association (ISSA) and was also an Adjunct Professor at the University of Dallas’s Graduate School of Management where he taught in their NSA Certified Information Assurance program. He publishes regularly and co-authored multiple books on PCI Compliance. He has a BBA in Marketing, an MBA in Supply Chain Management & Market Logistics, and a Doctor of Business Administration in Business Intelligence. When he is not on the road or looking for a great brewpub, he resides in Flower Mound, Texas.
  • dr-larry-ponemon photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework. Ponemon Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation. Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws. Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
  • dr-mansur-hasib photo
    Dr. Mansur Hasib
    Dr. Mansur Hasib is the only cybersecurity and health information technology professional in the world with 12 years' experience as Chief Information Officer, a Doctor of Science in Cybersecurity, and the prestigious CISSP, PMP, and CPHIMS certifications. A global thought leader, Dr. Hasib has led technology and cybersecurity strategy for almost 30 years in healthcare, education, biotechnology, and energy. He currently serves as Program Chair of Cybersecurity Technology, The Graduate School, University of Maryland University College. He is a frequent speaker at local, national, and international conferences. For his doctoral dissertation in 2013, Dr. Hasib conducted a national study in US healthcare and examined the relationship between cybersecurity culture and cybersecurity compliance. He shares these results in a book titled Impact of Security Culture on Security Compliance in Healthcare in the USA. This work was cited in the references for ISC2’s new healthcare security and privacy certification. In September 2014, Dr. Hasib published the new edition of Cybersecurity Leadership: Powering the Modern Organization. In this work he shares his cybersecurity leadership and governance model and life-long learning with many examples drawn from his practical experiences, research and observations. His leadership model is applicable in any organization. Dr. Hasib served as Chief Information Officer at the Baltimore City Health Department and within the University System of Maryland for 12 years. He currently teaches and mentors the next generation of organizational executives at several U.S. universities. Dr. Hasib has developed unique holistic Master of Science and Doctor of Science programs in Business Information Technology and Cybersecurity which can be adapted by any university. He completed his Master’s degree in Political Science at Emory University and his Doctor of Science in Cybersecurity (IA) from Capitol Technology University. During the early 1980s Dr. Hasib became one of the first network engineers in the world and helped to transition two organizations from mainframe to network environments. Dr. Hasib enjoys table tennis, comedy, and travel, and has been to all 50 U.S. states.
  • dr-peter-stephenson photo
    Dr. Peter Stephenson
    Dr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, cyber criminology, cyber jurisprudence and cyber criminalistics on large-scale computer networks. He has lectured extensively on digital investigation and security, and has written, edited or contributed to 20 books and several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He is the series editor of the new Peter Stephenson Series on Cyber Crime Investigation (Auerbach). He spends his time in retirement as a writer and researcher specializing in cyber threat analysis, cyber criminology, and cyber jurisprudence. Dr. Stephenson was an Associate Professor and the Chief Information Security Officer for Norwich University and, prior to his retirement in July of 2015, was Director of the Norwich University Global Cyber Threat Observatory and Center for Advanced Computing and Digital Forensics, both of which he founded. He received the Distinguished Faculty Award in the Norwich College of Graduate and Continuing Studies. He retired from the university in July, 2015. Dr. Stephenson has lectured or delivered consulting engagements for the past 45 years in eleven countries plus the United States and has been a technologist for fifty-three years. Dr. Stephenson obtained his PhD by research in computing at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree (cum laude) in diplomacy with a concentration in terrorism from Norwich University. He currently is pursuing a second PhD in law focusing on cyber jurisprudence research. Dr. Stephenson is a full member of the Vidocq Society, for which he acts as Chief Information Security Officer, and has retired as a Fellow of the American Academy of Forensic Sciences. He is a member of the Albany chapter of InfraGard. He held—but has retired from—the CCFP, CISSP, CISM, FICAF and FAAFS designations, and currently is a licensed professional investigator in Michigan.
  • eddy-bobritsky photo
    Eddy Bobritsky
    Eddy Bobritsky is the Co-Founder and CEO of Minerva Labs, a provider of endpoint security solutions. He is a cyber and information security domain expert with more than 15 years in the industry. Before founding Minerva, Eddy was a senior cyber security consultant for the defense and financial sectors. During his military career in the Israel Defense Forces (IDF) Navy cyber unit, Eddy oversaw the largest Endpoint Protection project in Israel, from design, through development, to implementation and maintenance of hundreds of thousands of endpoints. Eddy’s rule of thumb is to 'keep things simple' to help businesses operate seamlessly, which is why he started Minerva. Eddy holds a Master's degree in Business Management and Information Technology.
  • eric-wolff photo
    Eric Wolff
    Eric Wolff, Senior Product Marketing Manager, markets and delivers content and training on Thales eSecurity cloud solutions for application-layer data protection and public and private cloud. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications and storage subsystems.
  • ernesto-digiambattista photo
    Ernesto DiGiambattista
    Ernesto DiGiambattista is the CEO and Founder of Cybric. He was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, where he was responsible for transforming a legacy technology team into a technology innovation service group. In addition, Ernesto was a senior member of Bank of America's Information Security & Resiliency Group and Corporate Audit organizations. During his tenure, he was responsible for assessing and managing the information security risk of global technology vendors. Further, Ernesto has been a trusted advisor on cybersecurity private and public policy to members of the U.S. Senate and U.S. House of Representatives. Ernesto is also a Steering Committee Member of the Security Innovation Network (SINET), SINET is a super-connector that accelerates Cybersecurity innovation into the global marketplace by providing trusted platforms for the business of Cyber to take place between investors, entrepreneurs and industry and government buyers. Ernesto also serves as a Board of Director to the Massachusetts Technology Collaborative, an innovative public agency working to support a vibrant, growing economy across Massachusetts. In June 2015, Ernesto was recognized by the Boston Business Journal as a 2015 Finalist for Boston CIO of the Year. Ernesto holds a BSc. in Computer Information Systems & MBA from Suffolk University. He is based in Lynnfield, MA, where he lives with his wife, son and daughter.
  • george-finney-j-d photo
    George Finney, J.D.
    Chief Security Officer, Southern Methodist University
  • gretel-egan photo
    Gretel Egan
    Gretel Egan is the Security Awareness and Training Strategist for Wombat Security, a division of Proofpoint and the leading provider of information security awareness and training software that helps organizations educate employees. She has extensive experience in researching and developing cybersecurity education content and was named one of “10 Security Bloggers to Follow” by IDG Enterprise.
  • jim-delorenzo photo
    Jim DeLorenzo
    Solutions Marketing Manager at Thales eSecurity
  • joel-weise photo
    Joel Weise
    Joel Weise has worked in the field of information security for over 35 years. As an information security practitioner he designs, architects, and engineers system and application security solutions for a range of different enterprises. Joel is also a leading expert on legal and regulatory issues as they relate to information security. He is a founding member of the Information Systems Security Association (ISSA), the chairman of the ISSA Journal Editorial Advisory Board, and a member of and Subject Matter Expert for the American Bar Association Science and Technology working committee. His other interests include the elaboration of adaptive security, complex adaptive systems, security governance, security maturity modeling and privacy.
  • john-frymier photo
    John Frymier
    Mr. Frymier is the Chief Information Security Officer of Unisys Corporation. He works with functional leaders across Unisys as well as vendors and partners to oversee the development and implementation of effective global information security policies, standards and procedures. Furthermore, as a thought leader and practitioner, he represents the company across the industry, as well as assisting in client presentations and the development of service delivery models and client material on matters pertaining to digital security. Mr. Frymier also leads the Unisys Consumerization of IT program, charged with fostering the overall evolution of Unisys information technology strategy and implementation to accommodate mobility and the adoption and effective use of consumer technologies in the Unisys infrastructure.
  • joseph-carson photo
    Joseph Carson
    Joe Carson is a cybersecurity professional with more than 20 years’ experience in enterprise security & infrastructure. Currently, Carson is the Chief Security Scientist at Thycotic. He is an active member of the cyber security community and a Certified Information Systems Security Professional (CISSP).
  • josh-corman photo
    Josh Corman
    Joshua Corman is Chief Security Officer and Senior Vice President at PTC. He has more than a decade of experience with security and networking software. Most recently he served as Research Director for Enterprise Security at The 451 Group following his time as Principal Security Strategist for IBM Internet Security Systems. Mr. Corman’s research cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting economics. His research and education efforts won him the title of Top Influencer of IT by NetworkWold magazine in 2009.
  • juan-c-asenjo photo
    Juan C. Asenjo
    Senior Partner Integration Marketing Manager – Thales eSecurity. Juan has worked in the information security field for over 25 years – in government, military, and private sector. He is currently responsible for cryptographic integrations with partner solutions, focusing on identity management, authentication, and encryption. Juan is a Certified Information Systems Security Professional (CISSP) holding a Bachelor’s degrees in Engineering, a Master’s in Business, and a Ph.D. in Information Science. In his current position, he helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.
  • kevin-beaver photo
    Kevin Beaver
    Kevin Beaver has over 23 years of experience serving in various information technology and security roles for several healthcare, e-commerce, financial and educational institutions. Striving to bring a voice of reason to information security, Kevin focuses his work around independent security assessments, speaking, writing and expert witness work.
  • kim-l-jones photo
    Kim L. Jones
    Kim L. Jones is Director, Cybersecurity Education Consortium, Arizona State University and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing and defense industries. Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. He is a member of the CISO Advisory Council for ISSA International.
  • le-creative-communications photo
    L&E Creative Communications
    Learnings & Entertainments (L&E) is a network of comedians, writers, and musicians that focus on employee engagement, communication and corporate education. The L&E Privacy & Info Security Suites are a customizable library of short, clever, catchy, advertising-like awareness communications consisting of video shorts, songs & jingles, GIFs & Memes that get attention and engage employees in 60 seconds or less. We also teach interactive improv-based skills building workshops to help security professionals with communication, collaboration, engagement and building rapport. For more information on the awareness Suites, improv-based learning, or other creative ways to improve engagement, communication and awareness, visit us at http://learningsentertainments.com/suites/info-security/.
  • michael-thelander photo
    Michael Thelander
    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technology. He loves to educate markets, tell stories that demonstrate value, play music, and on occasion fly small airplanes into active volcanoes.
  • mike-gentile photo
    Mike Gentile
    Mike Gentile is on a mission to change the status quo in information security. As Founder & CTO of Delphiis, LP, he leads a team working to translate the discipline from one that is often misunderstood, inefficiently applied, and painful to one that is seamless, collaborative, and repeatable in organizations across the globe. As a researcher, Mr. Gentile Co-Authored "The CISO Handbook" & "CISO Soft Skills," and is a Founder of CISOHandbook.com. This on-line portal serves as a free on-line resource for information security leaders.
  • morey-haber photo
    Morey Haber
    With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor’s of Science in Electrical Engineering from the State University of New York at Stony Brook.
  • nathan-wenzler photo
    Nathan Wenzler
    Nathan Wenzler is the Chief Security Strategist at AsTech, a leading information security consulting firm. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. He has helped government agencies and Fortune 1000 companies build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management, and the personnel side of a successful security effort. As Chief Security Strategist for AsTech, Wenzler brings his expertise on security program development and implementation in both the public and private sector to administrators, auditors, managers, C-Suite executives and security professionals across a wide variety of organizations and companies around the globe. Wenzler is frequently quoted in publications such as USA Today, Forbes, The Washington Post, TheStreet.com, Infosecurity Magazine, Dark Reading, and SC Magazine, and contributes regularly to his own column on CSO Online, “The Layer 8 Debate". He is also a frequent presenter on BrightTalk and at a number of leading conferences worldwide.
  • quincy-jackson photo
    Quincy Jackson
    Quincy Jackson (CISSP, C|EH, GWAPT) is a Security Risk Consultant with over 17 years of experience. In addition to his eight years of U.S. military service, his experience includes building InfoSec programs at Continental Airlines and Universal Weather & Aviation. Quincy specializes in web application security penetration testing, mobile device security, and IT security risk management. Quincy is an active member of InfraGard and serves as a board member for the National Information Security Group - Houston (NAISG). He provides the community with IT Security news and information via his blog.
  • rebecca-herold photo
    Rebecca Herold
    Rebecca is Co-Founder and President of SIMBUS, LLC, provider of Information Security, Privacy & Compliance cloud services, and CEO of The Privacy Professor ® consultancy she established in 2004. Rebecca is a technology services entrepreneur, as well as an information privacy, security and compliance expert, consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries with over 25 years of systems engineering, information security, privacy and compliance experience. She has authored 18 books and hundreds of articles. Rebecca appears monthly on the CW Iowa Live television show to raise public awareness of current information security and privacy topics. She led the NIST SGIP Smart Grid Privacy Subgroup for 8 years, and was a founding officer for the IEEE Par 1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group. She has also been an Adjunct Professor for the Norwich University MSISA program since 2005, and is an Expert Witness for information security, privacy and compliance cases. Rebecca holds the following certifications: FIP, CISSP, CISA, CISM, CIPT, CIPM, CIPP/US, and FLMI. See more at www.SIMBUS360.com.
  • rick-delgado photo
    Rick Delgado
    Rick Delgado is a business technology consultant for several Fortune 500 companies. He is also a frequent contributor to news outlets such as Wired, Tech Page One, and Cloud Tweaks. Rick enjoys writing about the intersection of business and new innovative technologies.
  • rick-killpack photo
    Rick Killpack
    Rick Killpack has over 23 years of experience in the enterprise and cloud markets. He started working in IT security with Novell in 1991. Throughout his career, he has a proven track record in business development, sales management, strategy management, product management, channel and technical services. Rick is very knowledgeable about the cloud marketplace and specifically as it pertains to cybersecurity. His previous employment was with Akamai technologies in which he designed and rolled out a Global Security channel strategy for Akamai's Cloud Security Services. He currently is employed at Thales e-Security as a Director of Channel Development helping public cloud and SaaS providers deliver data security services to their end customers. He has published technical manuals still available today on Amazon as well as business security briefs in well-known publications like CIO magazine, SAP GRC and others. He has spoken as a security authority in various security events sponsored by the CISSP and CISO organizations. Rick’s unique mixture of technical and business skills along with his vast experience in security has allowed him to provide insights into cloud security best practices to hundreds of risk, compliance and security leaders in the largest enterprises and governments across the globe. Rick is considered a technical subject matter expert in CDN, DDoS, DNS, Identity Management, Data Security, Access Management, SIEM, Threat Intelligence, ITGRC, Privileged User Management and Advanced Authentication/Authorization services.
  • robb-reck photo
    Robb Reck
    Robb Reck, MBA, CISSP, is an Information Security and Risk professional with over 16 years of experience in IT, Risk Management, and Information Security. Robb has created comprehensive security programs for multiple financial institutions. He previously served as VP and CISO for Pulte Financial Services. He currently is CISO for Ping Identity. Robb is also the President of the Denver chapter of ISSA. He is active in the security community nationally, and he has made it his goal to make Colorado the mecca for information security.
  • scott-schober photo
    Scott Schober
    Scott Schober is the President and CEO of Berkeley Varitronics Systems, an experienced provider of wireless test and security solutions. He is considered one of the foremost wireless technology and cybersecurity experts in the world, and is regularly interviewed for leading national publications, as well as appearing on major network television and radio stations to offer his expertise. He is the author of the hit book "Hacked Again," which examines a multitude of cybersecurity issues affecting us all, including: malware, hackers, email scams, identity theft, spam, social engineering, passwords, and the Dark Web.
  • scott-waddell photo
    Scott Waddell
    Scott has over 20 years of experience in the security and technology field. He began his career pioneering tools and techniques for automated vulnerability assessment and incident response at the Air Force Information Warfare Center. Around the office he is known for his collection of Hawaiian shirts and his amazing ability to put complex concepts into layman’s terms.
  • secureworld-digital-team photo
    SecureWorld Digital Team
  • secureworld-news-team photo
    SecureWorld News Team
  • shamoun-siddiqui photo
    Shamoun Siddiqui
    Shamoun Siddiqui is VP and CISO of The Neiman Marcus Group, Inc. He possesses a bachelor’s and a master’s degree in Mechanical Engineering and a doctorate in Aerospace Engineering from the University of Texas at Austin. After a successful career in aerospace engineering, he switched to Information Technology and Information Security and has been a leader in this space for more than 15 years, having served as the Director of IT at Hitachi Printing Solutions, Manager for Information Security for CVS/Caremark, and Director of Information Security at Sabre. He has several engineering and information security publications to his name.
  • shawn-e-tuma photo
    Shawn E. Tuma
    Shawn Tuma is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world. Shawn is also the manager of the Business Cybersecurity Law Blog.
  • steve-durbin photo
    Steve Durbin
    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include the emerging security threat landscape, cyber security, BYOD, the cloud, and social media across both the corporate and personal environments. Previously, he was senior vice president at Gartner.
  • tapan-shah photo
    Tapan Shah
    Tapan is a Managing Director at Sila and heads the National Consulting Practice. He brings over 25 years of experience and industry eminence in Cybersecurity and Risk with contributions to multiple publications, conferences, and advisory boards. His career has been dedicated to working with senior executives of Fortune 500 companies, helping them apply governance, process, and technology to improve their cybersecurity and risk posture.
  • tim-scargill photo
    Tim Scargill
    Tim Scargill is a former IBM consultant and electronic engineering graduate, now writing about all things technology related. He is particularly interested in how emerging technologies will affect enterprise in the future. After completing a masters degree in Electronic Engineering at the University of York, he moved on to become an IT consultant at IBM UK. Gaining knowledge and experience of big data and its business applications, he specialized in the analysis and processing of sensitive data. Specific interests include big data analytics and strategy, natural language processing, and machine learning.
  • trevor-hawthorn photo
    Trevor Hawthorn
    Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim, where he was co-founder and CTO. Trevor has a technical and hands-on background, with over 18 years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, Cybertrust (now Verizon Enterprise Security Solutions), and in 2005 co-founded Stratum Security, a security consulting boutique where ThreatSim was developed.
See what SecureWorld can do for you. Contact us today!
Contact us