Gokila Dorai, PhD

Assistant Professor · Augusta University

Dr. Dorai’s area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.

Algorithms Mobile Computing loT forensics research Mobile Research Digital Crimes

Raheem Beyah

VP Interdisciplinary Research, professor, Electrical and Computer Engineering · Georgia Tech - COE

Raheem Beyah is an expert in the intersection of the networking and security fields.

Energy Grid Security Network Security Cyber-physical systems security Privacy Network Monitoring and Performance

John Jiang

Eli Broad Endowed Professor in Accounting · Michigan State University

John (Xuefeng) Jiang collects novel data to address public policy questions at the interface of accounting and finance.

Corporate Finance Healthcare Management Corporate Governance Public Policy Information Technology Systems

Michael Mattarock

Executive Director, National Security Research · Carnegie Mellon University

Michael Mattarock develops and implements strategies to enhance the national security research portfolio.

Data Security and Privacy Security of AI and ML AI Engineering Cybersecurity National Security

Peter Krapp

Professor, Film & Media Studies · UC Irvine

Expertise in: Secret communications & cryptologic history; cultural memory and media history; history of computing & simulations

Media History Cultural Memory Aesthetic Communication Cryptologic History Secret Communications

Gareth James

John H. Harland Dean and Professor of Information Systems & Operations Management · Emory University, Goizueta Business School

Data is the sword of the 21st century, those who wield it well, the Samurai. -Jonathan Rosenberg, adviser to Larry Page & former Google SVP

Statistical Problems in Marketing Functional Data Analysis Statistical Methodology High Dimensional Regression

Lance Hunter, PhD

Professor of Political Science · Augusta University

Dr. Lance Hunter studies the connection between terrorism and political stability in democracies.

Politics Terrorism International Relations Voting Civil Liberties

Beth Virnig

Dean and Professor · University of Florida

Beth Virnig’s research examines how patient factors and system factors combine to influence health care and health outcomes.

Cancer Care End-Of-Life Care Health Care Systems Health Disparities Medicare

Siobhan Gorman

Partner, Washington, D.C. · Brunswick Group

Siobhan Gorman concentrates on crisis, cybersecurity, public affairs, and media relations.

Cyber Security Cyberattacks National Security Litigation Media Relations

Matthew Vernhout

Founder, Author and Speaker · EmailKarma

Digital Privacy & Marketing Advocate

Deliverability DMARC Email Authentication Omni-Channel Marketing Email Markerting

Carl Elks, Ph.D.

Associate Professor, Department of Electrical and Computer Engineering · VCU College of Engineering

Professor Elks' career focuses on maturing and advancing the state of the art in the areas of safety assessment and fault tolerance.

Runtime Verification and Monitoring Fault Injection for Cyber Physical Systems Complexity Aware Design for Critical Systems Assessment Methods for Dependable and High Integrity Systems Cyber Physical Systems

Jerod Brennen

Founder and Principal Consultant · Brennen Consulting

I help clients protect their businesses by building effective, efficient, forward-thinking cybersecurity programs.

Cyber Security Web Application Security Identity and Access Management Information Security

Rahul Telang

Trustees Professor and Program Chair · Carnegie Mellon University

Rahul Telang is interested in how information and communication technologies (ICTs) information impact consumers, business and policies.

Digitization of Information Intellectual Properity Policy Market Failures Privacy Piracy

Supriyo Bandyopadhyay, Ph.D.

Commonwealth Professor, Department of Electrical and Computer Engineering · VCU College of Engineering

Professor Bandyopadhyay has authored and co-authored over 400 research publications

Self-assembly of Regimented Nanostructure Arrays Spintronics Quantum Devices Hot Carrier Transport in Nanostructures Nanoelectronics

Aleecia M. McDonald

Assistant Professor · Carnegie Mellon University

AleeciaMcDonald focuses on the public policy issues of Internet privacy, user expectations for privacy tools and behavioral economics.

Internet Law and Regulation Behavioral Economics Cybersecurity Privacy Tools Public Policy issues of Internet Privacy

Brendan D Saltaformaggio

Assistant Professor, Electrical and Computer Engineering · Georgia Tech - COE

Dr. Brendan Saltaformaggio's lab investigates advanced cyber crimes and the analysis and prevention of next-generation malware attacks.

Mobile/IoT Security Binary Analysis and Instrumentation Cyber Forensics Computer Systems Security Memory Forensics

Brian Levine

Director of Cybersecurity Institute and Distinguished Professor in the Manning College of Information & Computer Sciences · University of Massachusetts Amherst

Brian Levine's work focuses on thwarting child sexual exploitation on the internet.

internet-based child exploitation Digital Forensics Network Security Internet Security Child Rescue

Sherif Abdelwahed, Ph.D.

Professor, Department of Electrical and Computer Engineering · VCU College of Engineering

Dr. Abdelwahed is a professor in the Department of Electrical and Computer Engineering

Autonomic Computing Model based Design and Analysis of Cyber-phyiscal Systems Formal Verification System Diagnosis and Fault Analysis Model-integrated Computing

Nevin Markwart

Chief Information Security Officer · FutureVault

Nevin Markwart is a Canadian retired professional ice hockey player who played 309 games in the National Hockey League.

Cybersecurity Corporate Culture Corporate Strategy Investment Management Sovereign Wealth Funds

Kathleen M. Carley

Professor · Carnegie Mellon University

Kathleen M. Carley's research combines cognitive science and computer science to address complex social and organizational problems.

Dynamic Network Analysis Cognitive Science Cybersecurity and Privacy Computer Science Social Networks