Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

The Intersection of Cybersecurity and Business Operations: Protecting Your Company's Automated Infrastructure

In today's rapidly evolving digital landscape, cybersecurity has emerged as an indispensable aspect of business operations. Automated infrastructures, which include endpoint devices, cloud services, and IoT systems, have made companies more vulnerable to cyber threats. These threats can disrupt operations, lead to financial losses, and compromise sensitive data. Therefore, understanding and implementing robust cybersecurity measures is non-negotiable for modern enterprises seeking resilience and stability. Dr. Walter Schilling, professor and cybersecurity expert at Milwaukee School of Engineering, is available to discuss what companies should consider when designing their cyber defense strategy. To protect their automated infrastructure, businesses must: integrate cybersecurity deeply into their overall strategy adopt a proactive approach to identifying and mitigating risks conduct regular security assessments deploy advanced threat detection systems enforce strong access control policies train employees on cybersecurity best practices foster a culture of vigilance is equally important.

Walter Schilling, Jr., Ph.D.
1 min. read

Key topics at RNC 2024: Artificial Intelligence, Machine Learning and Cybersecurity

As the Republican National Convention 2024 begins, journalists from across the nation and the world will converge on Milwaukee, not only to cover the political spectacle but also to cover how the next potential administration will tackled issues that weren't likely on the radar or at least front and center last election: Artificial Intelligence, Machine Learning and Cybersecurity With technology and the threats that come with it moving at near exponential speeds - the next four years will see challenges that no president or administration has seen before. Plans and polices will be required that impact not just America - but one a global scale. To help visiting journalists navigate and understand these issues and how and where the Republican policies are taking on these topics our MSOE experts are available to offer insights. Dr. Jeremy Kedziora, Dr. Derek Riley and Dr. Walter Schilling are leading voices nationally on these important subjects and are ready to assist with any stories during the convention. . .    . Dr. Jeremy Kedziora Associate Professor, PieperPower Endowed Chair in Artificial Intelligence Expertise: AI, machine learning, ChatGPT, ethics of AI, global technology revolution, using these tools to solve business problems or advance business objectives, political science. View Profile “Artificial intelligence and machine learning are part of everyday life at home and work. Businesses and industries—from manufacturing to health care and everything in between—are using them to solve problems, improve efficiencies and invent new products,” said Dr. John Walz, MSOE president. “We are excited to welcome Dr. Jeremy Kedziora as MSOE’s first PieperPower Endowed Chair in Artificial Intelligence. With MSOE as an educational leader in this space, it is imperative that our students are prepared to develop and advance AI and machine learning technologies while at the same time implementing them in a responsible and ethical manner.” MSOE names Dr. Jeremy Kedziora as Endowed Chair in Artificial Intelligence MSOE online March 22, 2023 . .     . Dr. Derek Riley Professor, B.S. in Computer Science Program Director Expertise: AI, machine learning, facial recognition, deep learning, high performance computing, mobile computing, artificial intelligence View Profile “At this point, it's fairly hard to avoid being impacted by AI," said Derek Riley, the computer science program director at Milwaukee School of Engineering. “Generative AI can really make major changes to what we perceive in the media, what we hear, what we read.” Fake explicit pictures of Taylor Swift cause concern over lack of AI regulation CBS News January 26, 2024 . .    . Dr. Walter Schilling Professor Expertise: Cybersecurity and the latest technological advancements in automobiles and home automation systems; how individuals can protect their business operations and personal networks. View Profile Milwaukee School of Engineering cybersecurity professor Walter Schilling said it's a great opportunity for his students. "Just to see what the real world is like that they're going to be entering into," said Schilling. Schilling said cybersecurity is something all local organizations, from small business to government, need to pay attention to. "It's something that Milwaukee has to be concerned about as well because of the large companies that we have headquartered here, as well as the companies we're trying to attract in the future," said Schilling. Could the future of cybersecurity be in Milwaukee?: SysLogic holds 3rd annual summit at MSOE CBS News April 26, 2022 . .     . For further information and to arrange interviews with our experts, please contact: Media Relations Contact To schedule an interview or for more information, please contact: JoEllen Burdue Senior Director of Communications and Media Relations Phone: (414) 839-0906 Email: burdue@msoe.edu . .     . About Milwaukee School of Engineering (MSOE) Milwaukee School of Engineering is the university of choice for those seeking an inclusive community of experiential learners driven to solve the complex challenges of today and tomorrow. The independent, non-profit university has about 2,800 students and was founded in 1903. MSOE offers bachelor's and master's degrees in engineering, business and nursing. Faculty are student-focused experts who bring real-world experience into the classroom. This approach to learning makes students ready now as well as prepared for the future. Longstanding partnerships with business and industry leaders enable students to learn alongside professional mentors, and challenge them to go beyond what's possible. MSOE graduates are leaders of character, responsible professionals, passionate learners and value creators.

Walter Schilling, Jr., Ph.D.Jeremy Kedziora, Ph.D.Derek Riley, Ph.D.
3 min. read

Milwaukee-Based Experts Available During 2024 Republican National Convention

Journalists attending the Republican National Convention (RNC) are invited to engage with leading Milwaukee School of Engineering (MSOE) experts in a range of fields, including artificial intelligence (AI), machine learning, cybersecurity, urban studies, biotechnology, population health, water resources, and higher education. MSOE media relations are available to identify key experts and assist in setting up interviews (See contact details below). As the RNC brings national attention to Milwaukee, discussions are expected to cover pivotal topics such as national security, technological innovation, urban development, and higher education. MSOE's experts are well-positioned to provide research and insights, as well as local context for your coverage. Artificial Intelligence, Machine Learning, Cybersecurity Dr. Jeremy Kedziora Associate Professor, PieperPower Endowed Chair in Artificial Intelligence Expertise: AI, machine learning, ChatGPT, ethics of AI, global technology revolution, using these tools to solve business problems or advance business objectives, political science. View Profile Dr. Derek Riley Professor, B.S. in Computer Science Program Director Expertise: AI, machine learning, facial recognition, deep learning, high performance computing, mobile computing, artificial intelligence View Profile Dr. Walter Schilling Professor Expertise: Cybersecurity and the latest technological advancements in automobiles and home automation systems; how individuals can protect their business operations and personal networks. View Profile Milwaukee and Wisconsin:  Culture, Architecture & Urban Planning, Design Dr. Michael Carriere Professor, Honors Program Director Expertise: an urban historian, with expertise in American history, urban studies and sustainability; growth of Milwaukee's neighborhoods, the challenges many of them are facing, and some of the solutions that are being implemented. Dr. Carriere is an expert in Milwaukee and Wisconsin history and politics, urban agriculture, creative placemaking, and the Milwaukee music scene. View Profile Kurt Zimmerman Assistant Professor Expertise: Architectural history of Milwaukee, architecture, urban planning and sustainable design. View Profile Biotechnology Dr. Wujie Zhang Professor, Chemical and Biomolecular Engineering Expertise: Biomaterials; Regenerative Medicine and Tissue Engineering; Micro/Nano-technology; Drug Delivery; Stem Cell Research; Cancer Treatment; Cryobiology; Food Science and Engineering (Fluent in Chinese and English) View Profile Dr. Jung Lee Professor, Chemical and Biomolecular Engineering Expertise: Bioinformatics, drug design and molecular modeling. View Profile Population Health Robin Gates Assistant Professor, Nursing Expertise: Population health expert: understanding and addressing the diverse factors that influence health outcomes across different populations. View Profile Water Resources Dr. William Gonwa Professor, Civil Engineering Expertise: Water Resources, Sewers, Storm Water, Civil Engineering education View Profile Higher Education Dr. Eric Baumgartner Executive Vice President of Academics Expertise: Thought leadership on higher education, relevancy and value of higher ed, role of A.I. in future degrees and workforce development. View Profile Dr. Candela Marini Assistant Professor Expertise: Latin American Studies and Visual Culture View Profile Dr. John Walz President Expertise: Thought leadership on higher education, relevancy and value of higher ed View Profile Media Relations Contact To schedule an interview or for more information, please contact: JoEllen Burdue Senior Director of Communications and Media Relations Phone: (414) 839-0906 Email: burdue@msoe.edu About Milwaukee School of Engineering (MSOE) Milwaukee School of Engineering is the university of choice for those seeking an inclusive community of experiential learners driven to solve the complex challenges of today and tomorrow. The independent, non-profit university has about 2,800 students and was founded in 1903. MSOE offers bachelor's and master's degrees in engineering, business and nursing. Faculty are student-focused experts who bring real-world experience into the classroom. This approach to learning makes students ready now as well as prepared for the future. Longstanding partnerships with business and industry leaders enable students to learn alongside professional mentors, and challenge them to go beyond what's possible. MSOE graduates are leaders of character, responsible professionals, passionate learners and value creators.

3 min. read

ExpertSpotlight: The iPhone turns 17 years old Saturday!

The iPhone revolutionized the tech industry and transformed how we communicate, work, and interact with the digital world. This topic is not only newsworthy due to its technological innovation but also because of its significant impact on global culture, economics, and societal norms. The iPhone’s evolution over the past decade and a half has shaped consumer expectations and driven the development of the mobile and app economy, affecting everything from entertainment to education. The history of the iPhone offers a wealth of story angles that highlight its enduring influence and ongoing evolution, including: Technological Innovation and Evolution: Exploring how the iPhone has advanced in terms of hardware, software, and design, setting new standards in the tech industry. Economic Impact and Market Dynamics: Analyzing the iPhone's role in shaping the global smartphone market, influencing economic trends, and driving Apple's financial success. Cultural and Social Influence: Investigating how the iPhone has changed social behaviors, communication methods, and media consumption patterns worldwide. Privacy and Security Challenges: Assessing the iPhone's impact on privacy concerns and cybersecurity, including Apple's stance on data protection and encryption. App Economy and Ecosystem Development: Understanding how the introduction of the App Store transformed the software development industry and created a new economic ecosystem. Environmental and Ethical Considerations: Examining the environmental footprint of iPhone production, Apple's sustainability initiatives, and ethical issues related to manufacturing and labor practices. The history of the iPhone offers journalists an opportunity to delve into the multifaceted ways this device has shaped and continues to shape technology, economy, and society. Connect with an Expert about the History of the iPhone: Alex Cequea Editor in Chief · iPhone Life magazine Meredith David, Ph.D. Associate Professor, Marketing · Baylor University Mark Jamison Director/Professor · University of Florida Gokila Dorai, PhD Assistant Professor · Augusta University Liran Ma Professor · Texas Christian University To search our full list of experts visit www.expertfile.com Photo credit: Tron Le

2 min. read

#ExpertSpotlight: Who is Julian Assange?

In the ever-evolving landscape of digital information and cybersecurity, Julian Assange stands as a central figure, symbolizing the complex intersection of transparency, secrecy, and journalism in the modern world. This topic is not only newsworthy because of Assange’s controversial role in founding WikiLeaks and exposing classified information, but also due to the profound implications his actions have had on national security, international relations, and the ethics of journalism. Furthermore, Assange's ongoing legal battles and the broader debates they spark about freedom of speech, whistleblower protections, and government accountability are crucial for understanding the dynamics of information control in contemporary society. The story of Julian Assange offers multiple angles of interest, including: The Genesis of WikiLeaks: Exploring the foundation and mission of WikiLeaks, and how it has changed the landscape of journalism and whistleblowing. Major Leaks and Their Impact: Analyzing significant leaks published by WikiLeaks, such as the Iraq War Logs and the diplomatic cables, and their impact on global politics and public opinion. Legal Battles and Extradition: Investigating Assange’s legal challenges, including the charges against him, the extradition process, and the implications for international law and human rights. Freedom of Speech vs. National Security: Examining the debates surrounding Assange's actions, balancing the right to information with concerns over national security and the protection of sensitive information. Role of Journalism in the Digital Age: Discussing the ethical considerations and responsibilities of journalists and media organizations in handling leaked information. Assange’s Personal Journey: Delving into Assange’s personal life, his motivations, and the psychological and physical toll of his prolonged legal and diplomatic battles. The life and actions of Julian Assange provide journalists with a wealth of storylines that illuminate the complex and often contentious relationship between transparency, security, and the right to know in the digital age. Connect with an Expert about Julian Assange : Keith Werhan Professor Emeritus · Tulane University School of Law Samantha Bradshaw Doctor of Philosophy Candidate · Oxford Internet Institute Michael Moreland, JD, PhD University Professor of Law and Religion; Director, Eleanor H. McCullen Center for Law, Religion and Public Policy | Charles Widger School of Law · Villanova University Craig Albert, PhD Professor of Political Science and Graduate Director of the Master of Arts in Intelligence and Security Studies · Augusta University Michael S. Rogers Senior Advisor, Washington, D.C. · Brunswick Group Robert Anderson National Security Consultant & Intelligence Analyst · Altadena Group To search our full list of experts visit www.expertfile.com Photo credit: Markus Spiske

2 min. read

How Vulnerable Are America’s Water Systems to Outside Attack? | Media Advisory

The security of America's water systems is an issue of national importance, touching on the well-being and safety of millions. This topic gains urgency as it ties into broader concerns about infrastructure vulnerability, cyber-terrorism, and the readiness of public utilities to handle emerging threats. In light of recent breaches and heightened geopolitical tensions, the resilience of these essential systems is not just a matter of public safety but also of national security. Exploring this issue offers insights into: Cybersecurity measures for water supply systems The impact of climate change on water system resilience Federal and state responses to infrastructure threats Public health implications of water system breaches The role of technology in safeguarding against attacks Connect with an Expert about the Security of America's Water Systems For journalists seeking research or insights for their coverage about the Security of America's Water Systems, here is a select list of experts from our database. To search our full list of experts, visit www.expertfile.com Seth Hamman Director, Center for the Advancement of Cybersecurity and Associate Professor of Cyber Operations and Computer Science - Cedarville University David Bader Distinguished Professor, Data Science · New Jersey Institute of Technology Vladlena Benson Professor of Cybersecurity Management · Aston University William Hatcher Chair of the Department of Social Sciences · Augusta University TJ O’Connor, LTC (Ret.) Assistant Professor, Cybersecurity Program Chair | Computer Engineering and Sciences · Florida Tech                                                                                                                                                             Photo by: Adi Goldstein

1 min. read

Small buildings, big impact: OpenCyberCity Director Sherif Abdelwahed, Ph.D., talks about smart city research and the new capabilities of VCU Engineering’s miniature city

Municipalities around the world have invested significant resources to develop connected smart cities that use the Internet of Things (IoT) to improve sustainability, safety and efficiency. With this increased demand for IoT experience, the VCU College of Engineering formed the OpenCyberCity testbed in 2022. The 1:12 scale model city provides a realistic, small-scale cityscape where students and researchers can experiment with new and existing smart city technology. Sherif Abdelwahed, Ph.D., electrical and computer engineering professor, is director of OpenCyberCity. He recently answered some questions about new developments within the testbed. The OpenCyberCity is a smart city testbed, but are there any real-life cities that one could call a smart city? Several real-life locales are considered smart cities due to their extensive use of technology and data-driven initiatives to optimize infrastructure and services. Dubai is one of the most notable. They have implemented smart transportation systems, buildings and artificial intelligence to transform the city’s operations and make them more efficient. Other reputable smart cities include Singapore and Seoul, which utilize smart energy management, smart transportation and comprehensive data analytics for improved urban planning and services. Seoul, in particular, has an initiative with smart grids and connected street lights, which VCU Engineering’s own OpenCyberCity test bed is working to implement. How does the OpenCyberCity address privacy? With so much technology related to monitoring, how are individual citizens protected from these technologies? Privacy is a major concern for smart cities and it is one of the main research directions for VCU Engineering’s OpenCyberCity. We are developing several techniques to prevent unwanted surveillance of personal information. Sensitive data is protected by solid protocols and access restrictions that only allow authorized users to view the data. Our aim is to find a reasonable middle ground between technological progress and privacy rights, staying within legal and ethical bounds. Some techniques to address privacy concerns include: Data Anonymization: This makes it difficult to trace back information to individual identities. Within the testbed, we will evaluate how to protect individual privacy while maintaining data utility and assess the impact on data quality. Secure Data Storage and Transmission: Encrypt data to protect it from unauthorized access. In the smart city testbed, these access control mechanisms will be implemented within the testbed’s infrastructure. We will also test different data handling processes and access control models to determine their ability to safeguard sensitive data. Privacy Impact Assessments: Regularly evaluate potential privacy risks of new smart city projects in order to mitigate them and ensure the ethical handling of data by those with access. Policy and Regulation Development: Data and insights generated from OpenCyberCity experiments can inform the development of cybersecurity policies and regulations for smart cities. How is the College of Engineering’s OpenCyberCity test bed different from similar programs at other institutions? While other universities have similar smart-city-style programs, each has their own specialty. The VCU College of Engineering’s OpenCyberCity test bed focuses on real-world contexts, creating a physical space where new technologies, infrastructure, energy-efficient transportation and other smart city services can be tested in a controlled environment. Our lab monitors real-time data and develops smart buildings, smart hospitals and smart manufacturing buildings to enhance the city’s technologies. Recent additions to the OpenCyberCity allow for expanded research opportunities like: Advanced Manufacturing: Students can apply advanced manufacturing techniques in a controlled environment. They can also test new materials, processes and automation technologies to improve efficiency and product quality. Energy Efficiency Testing: Environmental engineers and sustainability experts can evaluate energy consumption patterns within the smart manufacturing unit to implement energy-saving measures and assess their impact on sustainability. Production Optimization: Manufacturers can use real-time data from the smart manufacturing unit to optimize production schedules, minimize downtime and reduce waste. Predictive maintenance algorithms also help prevent equipment breakdowns. Education and Training: Hands-on experience with state-of-the-art manufacturing technologies helps train the workforce of the future. Integration with Smart City Services: Data generated by the manufacturing unit can be integrated with smart city services. For example, production data can inform supply chain management and energy consumption data can contribute to overall city energy efficiency initiatives. How has the OpenCyberCity changed in the last year? Is the main focus still data security? What started with research examining, analyzing and evaluating the security of next-generation (NextG) applications, smart city operations and medical devices has expanded. Data security is now only one aspect of OpenCyberCity. Its scope has grown to encompass more expansive facets of cybersecurity like automation and data analytics in the domain of smart manufacturing systems. The implementation of a smart manufacturing system in 2023 is something students really enjoy. Thanks to the vendor we used, undergraduate students had the option to develop functionality for various features of the manufacturing plant. Graduate students were also able to research communications protocols and cybersecurity within the smart manufacturing system. What does the smart manufacturing system entail and what kind of work is occurring within that system? An automated system is there for students to work with. Robot arms, microcontrollers, conveyor belts, ramps, cameras and blocks to represent cargo form an environment that emulates a real manufacturing setting. We’re currently brainstorming an expansion of the smart manufacturing system in collaboration with the Commonwealth Cyber Initiative (CCI). We plan to set up two building models, one for manufacturing and one for distribution, linked by a sky bridge conveyor system that moves items between the locations. Students work to leverage convolutional neural networks that use images to facilitate machine learning. When paired with the advanced cameras, it forms a computer vision system that can accurately place blocks in a variety of lighting conditions, which can be a challenge for other systems. By having to optimize the communication protocols that command the smart manufacturing system’s robotic arms, students also get a sense for real-world constraints . The Raspberry Pi that functions as the controller for the system is limited in power, so finding efficiencies that also enable stability and precision with the arms is key. Is there an aspect of cybersecurity for these automated systems? Yes. Devices, sensors and communication networks integral to the IoT found in smart manufacturing systems and smart cities generate and share vast amounts of data. This makes them vulnerable to cybersecurity threats. Some of the issues we look to address include: Data Privacy: Smart systems collect and process vast amounts of data, including personal and sensitive information. Protecting this data from unauthorized access and breaches is a top priority. Device Vulnerabilities: Many IoT devices used in smart systems have limited computational resources and may not receive regular security updates, making them vulnerable to exploitation. Interconnectedness: The interconnected nature of smart city components increases the attack surface. A breach in one system can potentially compromise the entire network. Malware and Ransomware: Smart systems are susceptible to malware and ransomware attacks, which can disrupt services and extort organizations for financial gain. Insider Threats: Employees with malicious intent or negligence can pose significant risks to cybersecurity. Potential solutions to these problems include data encryption, frequent software updates, network segmentation with strict access controls, real-time intrusion detection (with automated responses to detected threats), strong user authentication methods, security training for users and the development of well-designed incident response plans.

Sherif Abdelwahed, Ph.D.
5 min. read

Think your city is ready for a cyber-attack? Think again according to our experts

There is no way around it; every day there are new cybersecurity threats to not only individuals, but governments at all levels as well. There have been some high-profile breeches that involve major cities like Atlanta and Baltimore. But those attacks are going to all levels, and recent research has shown most municipalities and cities are ill-prepared for cyberattacks. Research conducted by Donald Norris, PhD, and Laura Mateczun, JD, of the University of Maryland, Baltimore County along with William Hatcher, PhD, Wesley Meares, PhD, and John Heslen, PhD, of Augusta University, found various reasons why local governments struggle with cybersecurity. The research shows local governments recognize the need for cybersecurity but are not taking crucial next steps to ensure cybersecurity by integrating policies into daily management practices. Not just that, some local governments were unaware how often they were under cyberattack. Throw in budgetary constraints, and it leads local governments to be in a tough situation.  That, unto itself, is a major sticking point, but the burden could be lessened. “Effective cybersecurity is expensive and too much of a strain on the budgets of many cities and counties,” said Hatcher, chair of the Department of Social Sciences in Pamplin College of Arts, Humanities, and Social Sciences at Augusta University. “This is why we suggest regional solutions to the program, so multiple governments carry the cost.” Meares, associate professor and MPA director in Pamplin College, added it’s not just the financial aspect, but said there’s a shortage of cybersecurity talent nationwide, which compounded with limited budgets, makes it tough to compete. In the quest for talent between private and public sector, usually the private sector can offer more to entice a cybersecurity expert to come work for them. There’s also an issue of many local governments using dated technologies, which may be easier for cyber criminals to attack. “Local government is increasingly being more digitally connected, with vital infrastructure, data and services connected which creates more opportunities for cyber-attacks. Additionally, local governments tend to lag in updating critical technology due to limited resources (both human and financial resources),” added Meares. None of this comes as a surprise in the lack of cybersecurity training. “It’s an expensive service for local governments to provide. This is why we suggest more budgetary support for the training,” said Heslen, assistant professor in Pamplin College. “We’re also unsurprised because local governments often struggle to fund professional training in other areas.” But researchers say there are ways to improve upon safety of critical data most notably adopting dedicated cybersecurity budgets funded at an appropriate level in all local governments. Those resources can help address many limitations in local government cybersecurity programs, from staffing and hardware and software deficiencies to awareness training for all parties in local governments. They also recommend the adoption and implementation of cybersecurity policies to manage and regulate actions taken by all that affect the organization’s cybersecurity. By taking the recommended actions, local governments will have a better chance to provide high levels of cybersecurity and protect their information assets more effectively. This is an important topic and if you are a journalist looking to know more about the importance of being ready and able to react if and when a municipality comes under threat from a cyber-attack - then let us help/. William Hatcher and John Heslen are both available to speak with media - simply contact them now to arrange an interview today.

Jay Heslen, PhDWilliam Hatcher, PhD, MPA
3 min. read

ChristianaCare Chief Information Security Officer Anahi Santiago Receives Prestigious Routhy Award

ChristianaCare Chief Information Security Officer Anahi Santiago, EMBA, CISM, has been recognized with the Routhy Award, which honors one cybersecurity professional each year who delivers a profound impact within health care and the information security profession. Health-ISAC awards the Routhy. The organization is a global, member-driven non-profit that offers health care stakeholders a trusted community and forum for coordinating, collaborating and sharing vital physical and cyber threat intelligence and best practices with each other. “Anahi is a one-of-a-kind CISO,” said Randy Gaboriault, MS, MBA, chief digital and information officer and senior vice president at ChristianaCare. “Deeply committed to information security, Anahi shares her wide breadth of experience and knowledge with peers throughout the country as a gifted speaker, mentor and content expert. She is expert in the field of cybersecurity. “Through her deep commitment to patient safety and information security she has led the implementation of some of the most progressive cybersecurity safeguards within ChristianaCare. This is a well deserved recognition and we are thrilled to see Anahi receive this prestigious award.” Santiago is recognized as one of the nation’s foremost cybersecurity experts. With over 20 years in Information Technology, Santiago has extensive experience in areas of cybersecurity, privacy, regulatory compliance, program management and infrastructure services. “We are so pleased to have the opportunity to recognize Anahi for her years of leadership and selfless contributions to the community of Health-ISAC, affiliated associations, and the health care sector,” said Denise Anderson, Health-ISAC president and CEO. “She has been instrumental in sharing with her peers, participating in initiatives, and mentoring others in the sector. She is absolutely deserving of the Routhy Award. Congratulations, Anahi, and thank you!” Santiago has overall responsibility for the organization’s information security program and strategic direction. She leads a team of high performing information security professionals in supporting ChristianaCare’s strategic initiatives. Santiago does this by partnering with the business leaders and managing risks, implementing policies and controls, and generating overall awareness. “For years, I’ve watched people that I admire receive this award,” Anahi Santiago said. “I want to credit this amazing Health-ISAC organization for advancing cybersecurity in health care, protecting patients and bringing cybersecurity professionals together to share, innovate and protect.”

Anahi Santiago, EMBA, CISM
2 min. read

Georgia Southern adding two engineering doctorates this fall

Georgia Southern University is launching two new engineering doctorates – a Ph.D. in applied computing degree and a Ph.D. in engineering – after approval of the programs this week from the University System of Georgia’s Board of Regents. With almost 4,000 students in its programs, Georgia Southern’s Allen E. Paulson College of Engineering and Computing identified the need for the new graduate degrees to sustain growth in the discipline, continue to aid workforce development in the region, add substantially to the university’s research capabilities, and provide additional teacher-scholars for Georgia. “In line with Georgia Southern’s Strategic pillars, the new Ph.D. programs will greatly enhance the University’s research capabilities and further advance key partnerships in the region,” said Carl Reiber, Ph.D., Georgia Southern’s provost and vice president for academic affairs. “A strong Ph.D. program improves faculty recruiting and is a prerequisite for applying for research grants from sources such as the National Science Foundation, the National Institutes of Health, the Department of Energy and the Department of Defense.” The proposed engineering Ph.D. program will have concentrations in civil, electrical, advanced manufacturing and mechanical engineering, and will fuel future multidisciplinary research synergies with other departments and centers within Georgia Southern in fields such as natural sciences, environmental sustainability, public health and education. Greater scholarly collaborations with sister institutions within the university system and beyond are also envisioned. The Ph.D. in engineering program will have a positive impact on the economic and technological development of Southeast Georgia, contributing significantly to the growth of the I-16 technology corridor. The Ph.D. in applied computing degree program will be offered jointly by the Department of Computer Science and the Department of Information Technology within the Allen E. Paulson College of Engineering and Computing at Georgia Southern Universit. The program will provide students with the requisite foundation to conduct basic and applied research to solve advanced technical problems in computing foundations, cybersecurity and machine learning. The program aims to promote the education of individuals who will become exceptional researchers, high-quality post-secondary educators, and innovative leaders and entrepreneurs in the field of applied computing. It will advance research and the generation of new knowledge in applied computing and support the growing knowledge-based economy in Southeast Georgia. The mission of the Ph.D. in applied computing degree program is to ensure student, graduate and faculty success by preparing graduates with the skills and depth of knowledge to advance the computing disciplines through application and scholarship. It will mentor students who will support faculty in their scholarly pursuits as they prepare to assume professional computing and computing-related positions that utilize their applied technical skills, problem-solving aptitude and scholarly abilities upon graduation. “The addition of these two new degree programs is part of Georgia Southern University’s commitment to be a world-class institution that provides a population of advanced graduates who can contribute to regional economic development and public-impact research,” Reiber said. “The programs will enhance the vitality and growth of the bachelor’s and master’s computer science and information technology degree programs by expanding the academic and research missions of the Allen E. Paulson College of Engineering and Computing." For more information about these new engineering doctorates coming to Georgia Southern this fall research or to speak with Carl Reiber, Ph.D., Georgia Southern’s provost and vice president for academic affairs — simply reach out to Georgia Southern's Director of Communications Jennifer Wise at jwise@georgiasouthern.edu to arrange an interview today.

3 min. read