Dustin Haisler
President · e.Republic
President of e.Republic | GovTech GTM & PE-Backed Executive | GovTech M&A Advisor | Former Government CIO/ACM | TEDx Speaker (2x)
Crowdsourcing Innovation Management Local Government Emerging Technology Innovation
John Volakis
Professor & Chope Chair, Department of Electrical & Computer Engineering | College of Engineering · The Ohio State University
Electrical engineering expert, focusing on computational electromagnetics
Wireless Communication and Propagation Antennas and Arrays RF Materials and Packaging RF Matching and Tunable Circuits RFIDs
Sameer Hinduja, Ph.D.
Professor · Florida Atlantic University
Sameer Hinduja is recognized internationally for his work on the subjects of cyberbullying, safe social media use, and youth well-being.
Safe Social Media Use Cyberbullying
Richard Reiner
Executive Chair · dfuse Platform Inc
Globally recognized thought leader on cloud computing, cloud security, password management, IT security, and IT risk
Cloud Computing Cloud Security / Cloud Computing Security It Security Information Security It Risk
Dr. PANKAJ DHUSSA (- Ph.D. & Sc.D. -)
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION · NASA
Research Scientist & iNaturalist
Astronomy iNaturalist Futuristic Thinking Research & Development Technology & Innovation
Joshua Carl, Ph.D.
Associate Professor · Milwaukee School of Engineering
Dr. Joshua Carl is an expert in the modeling and simulation of cyber-physical systems.
Numerical Integration Parallel Computation Modeling and Simulation of Cyber-Physical Systems Embedded Systems High Performance Computing
Mack Jackson Jr
Speaker · MJ Computer Concepts Inc
A Speaker For The Digital Age
Identity Theft Credit Card Processing Protecting Business Fraud Finanical Fitness
Russell John
IT Consultant · Trance Informatics
Professional Linux system administrator and highly experienced webmaster.
Linux Open Source Software
Marie-Michelle Strah, PhD
CEO and Chief Architect · Phydian Systems LLC
Enterprise Architecture, Information Security and Healthcare Information Technology | Chief Architect at Phydian Systems
Information Security Management Enterprise Architecture Healthcare Information Technology
Kai Roer
Founder & CEO · The Roer Group
Inspiring leaders worldwide!
Leadership Information Security Communication Internationalization Entrepreneurship
Ben Thomas
Senior Cloud Engineer
Virtualization Evangelist and Technologist
Vmware Virtualization Performance
Jerod Brennen
Founder and Principal Consultant · Brennen Consulting
I help clients protect their businesses by building effective, efficient, forward-thinking cybersecurity programs.
Cyber Security Web Application Security Identity and Access Management Information Security
Juraj Bednar
partner, strategy · DIGMIA s.r.o.
mapping unconventional corners of real and imaginary worlds
Bitcoin It Security Server Architecture
Eric Lundquist
Vice President and Editorial Analyst · United Business Media
Vice President and Editorial Analyst at United Business Media
Custom Publishing Publishing Technology Social Media Digital Media
Alex (Alexander) Nizini
Technology Consultant in the digital and industrial domain / Creative Digital and Industrial Services · NAR / HAR
Product leader, user experience designer, strategist, friendly geek, entrepreneurial thinker, real estate investor
Research Business Development & Partnerships Economic Analysis and Forecasting Healthcare Education
Lawrence Husick
Sr. Fellow · Foreign Policy Research Institute
Experience, dynamic, humorous and knowledgable on a stunningly wide range of topics.
Cyberwar Cyberterrorism Cybercrime. Innovation History and Practice.
Mike Reed
Technical Evangelist · MobileIron
Technology Evangelist at MobileIron
Mobility Mobile Security Byod
Robert E. (Bob) Cannon, M.B.A., C.M.C.
Product Sales and Marketing Advisor to small and medium size manufacturers. · Cannon Advantage
Product Innovation, Sales & Marketing Advisor to small and medium sized manufacturers; www.cannonadvantage.com
Richard Hollis
Director · Risk Crew
Cyber Security Risk Management Speaker
AI Cybersecurity Social Engineering HIPPA IoT Security SOC 2