Lukasz Kurgan, Ph.D.

Robert J. Mattauch Endowed Professor and Vice Chair of Computer Science · VCU College of Engineering

Data scientist specializing in high-throughput structural bioinformatics of proteins & small RNAs.

Structural Bioinformatics Intrinsically Disordered Proteins Protein-ligand(drug) interactions Computer-aided molecular modeling Big Data Analysis

Michael Reiter, Ph.D.

Research Professor, Department of Computer Science, College of Arts and Sciences · UNC-Chapel Hill

Dr. Reiter's research interests include all areas of computer and communications security and distributed computing.

Computer and communications security Distributed Computing Network Security Applied cryptography

Daniel Hanttula

Owner · Inject the Tech Enterprises

Author, Speaker, IT Professional

Internet Safety Bullying and Cyberbullying Scouting Freemasonry Computer & Internet Security/Privacy

Griffin Boyce

Tech Committee · AIDS Policy Project

Tech Committee at AIDS Policy Project

Censorship Arab Spring Computer Security

Stefan Savage

Professor · UC San Diego

Stefan Savage specializes in computer engineering with a focus on cybersecurity.

Security Cybersecurity Computer Engineering Computer Science

Sam Curry

Chief Product and Security Officer · Cybereason

Sam Curry is an expert in cyber conflict and security, information security management and enabling a safe, reliable and connected world.

Computer Security Identity Management Information Serucity Management Network Security Product Marketing

Michael Ali, PhD

Public Trustee · Fielding Graduate University

Chief Digital and Information Officer for Omega Engineering, a manufacturer and distributor of sensing devices. Fielding Board of Trustees.

Machine Learning Computer Security Information Technology Information Security

Danny Allan

Chief Technology Officer · Veeam Software

Danny Allan is an expert in developing technical and product strategy and bringing them to the market.

Vulnerability Assessment Enterprise Architecture Product Management Web Services Computer Security

Ender Yuksel

Postdoctoral Researcher · Technical University of Denmark

Researcher, Computer Scientist

Security Verification Sensors

Samantha Bradshaw

Doctor of Philosophy Candidate · Oxford Internet Institute

Samantha Bradshaw is a D. Phil. candidate at the Oxford Internet Institute, working on the Computational Propaganda project.

Government Internet Governance Cyber Security Social Media and Democracy Computational Propaganda

Kurt Rohloff

Associate Professor, Computer Science · New Jersey Institute of Technology

Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography and cybersecurity

Contact Tracing Software Engineering Cryptography Computer Security and Privacy Cybersecurity Cryptography

Taghi Khoshgoftaar, Ph.D.

Motorola Professor · Florida Atlantic University

Taghi Khoshgoftaar researches computer security and intrusion detection systems.

Computer Security and Intrusion Detection Systems Software Engineering Machine Learning Data Mining Big Data Analytics

Robert (B.J.) Johnson

Graduate Program Director and Clinical Assistant Professor of Computer Science · Loyola Marymount University

Seaver College of Science and Engineering

Computer Systems Organization Software Engineering Computer Science Database Systems Agile Development

Tom Holt

Professor of Criminal Justice · Michigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

Terror Malware Information Warfare Cybercrime Identity Theft

Ian Sutcliffe

Partner · Sutcliffe & Associates, Management Consultants

Highly rated business speaker and entrepreneur who conects strategy to execution

Service Quality - Driving Satisfaction & Profitability Web 2.0 Strategies and Tactics That Work Linking Social Media and Profitability Effective Relationship Marketing for Technology Companies Marketing Performance - Be Where the Customer Is

Robert Dahlberg, Ph.D.

Associate Professor · VCU College of Engineering

Computer Science Capstone Coordinator and Computer Science teaching faculty

Cybersecurity – Information and System Security emphasis on Access Control Blockchain – Blockchain management and utilities. Application of blockchain technology. Software Engineering – Architecture & Design Methodologies. Software Development Lifecycle.

Professor Awais Rashid

Professor of Cyber Security · University of Bristol

Tackling largescale cyber security and privacy attacks against systems serving society

IT Systems Protection Computer Fraud Security Vulnerabilities Cybersecurity Computer Science