Tom Holt

Professor of Criminal Justice · Michigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

Terror Malware Information Warfare Cybercrime Identity Theft

Carol Fung, Ph.D.

Associate Professor · VCU College of Engineering

Computer scientist specializing in collaborative security in social networks, mobile systems, and software defined networks.

Security management and collaborative security Intrusion detection and malware/botnet detection Security in social networks mobile networks and cloud environment

Mark Seifert

Partner, Washington, D.C. · Brunswick Group

Mark Seifert offers insights and practical advice to clients addressing complex privacy issues.

Telecommuncations Media Relations Cyber Security Telecommunications Privacy and Data Management

Angelos Keromytis

Professor, Electrical and Computer Engineering · Georgia Tech - COE

Angelos Keromytis is an expert in systems and network security, and applied cryptography.

Computer and Network Security Privacy Software Security Network Security Cryptography Software

Stefan Savage

Professor · UC San Diego

Stefan Savage specializes in computer engineering with a focus on cybersecurity.

Security Cybersecurity Computer Engineering Computer Science

Ashraf Tantawy, Ph.D.

Assistant Professor, Department of Electrical and Computer Engineering · VCU College of Engineering

Dr. Tantawy's research focuses on AI-Enabled Cyber Physical Human Systems (CPHS), Cyber Security, and Reinforcement Learning.

Modeling and Simulation Model-Based Design Safety & Security of Cyber Physical Systems Embedded Computing Cyber Physical Systems

Irfan Ahmed, Ph.D.

Assistant Professor · VCU College of Engineering

Dr. Ahmed's research interests include digital forensics, system security, cyber-physical systems security, and cybersecurity education.

Cyber-physical systems security Cybersecurity Education System Security Digital Forensics Malware

Hal Gottfried

Founder · Level Up Labs

Strategic Coach, Mentor, Open Source Hardware Advocate, Educator and IT Ninja

Integration Telecommunications Encryption Startups Non Profit

Pamela Rutledge, PhD

Doctoral Faculty - Media Psychology · Fielding Graduate University

Rutledge focuses on identifying human motivations, behavioral triggers & instinctive drives to inform messaging & data strategies

Trust in Information Applied Narrative Persuasive Messaging Positive Psychology Applied to Media Qualitative Research and Analysis

Michael S. Rogers

Senior Advisor, Washington, D.C. · Brunswick Group

Michael Rogers advises in the areas of cyber security, privacy, geopolitics, technology and intelligence as well as crisis management.

National Security Crisis Management Telecommuncations Cyber Security Intelligence and Counter Intelligence

Paddy McGuinness

Senior Advisor, London · Brunswick Group

Paddy McGuinness advises on crisis and resilience issues, providing senior counsel to clients on ever-evolving business and political risk.

Crisis Management Cyber Security National Secuirty UK Politics UK Business Trends

Siobhan Gorman

Partner, Washington, D.C. · Brunswick Group

Siobhan Gorman concentrates on crisis, cybersecurity, public affairs, and media relations.

Cyber Security Cyberattacks National Security Litigation Media Relations

George Little

Partner, Head of Office, Washington, D.C. · Brunswick Group

George Little specializes in crisis communications, cybersecurity, reputational and public affairs matters.

International Relations Crisis Communication Counter Terrorism American Politics and Government Media Relations

Cody Buntain

Assistant Professor · New Jersey Institute of Technology

Research interests intersect with data science and social science, have key applications in crisis informatics and political engagement

Machine Learning Weak Supervision Social Media Online Political Engagement Crisis Informatics

Brendan D Saltaformaggio

Assistant Professor, Electrical and Computer Engineering · Georgia Tech - COE

Dr. Brendan Saltaformaggio's lab investigates advanced cyber crimes and the analysis and prevention of next-generation malware attacks.

Mobile/IoT Security Binary Analysis and Instrumentation Cyber Forensics Computer Systems Security Memory Forensics