Seth Hamman, Ph.D.

Director, Center for the Advancement of Cybersecurity and Associate Professor of Cyber Operations and Computer Science · Cedarville University

Dr. Hamman is interested in helping to shape the young and growing discipline of cybersecurity education.

Cybersecurity Issues and Stories

Tai Ming Cheung

Professor of International Relations & Director · UC San Diego

Tai Ming Cheung is a expert on Chinese and East Asian defense, innovation and national security affairs.

Defense Innovation Chinese Science, Technology and Innovation Chinese Political Economy Chinese and East Asian Security and Defense Policy Chinese Politics

Vladlena Benson

Professor of Cybersecurity Management · Aston University

Vladlena is an industry-recognised expert in cybersecurity management and governance.

Emergent Technologies Cybersecurity and Risk Management Digital Transformation

Michael S. Rogers

Senior Advisor, Washington, D.C. · Brunswick Group

Michael Rogers advises in the areas of cyber security, privacy, geopolitics, technology and intelligence as well as crisis management.

National Security Crisis Management Telecommuncations Cyber Security Intelligence and Counter Intelligence

Scott Shackelford

Assistant Professor of Business Law and Ethics · Indiana University, Kelley School of Business

Scott Shakelford performs research in the field of environmental law, property rights and cybersecurity law and policy.

Policy Analysis Public Policy International Law Legal Research Political Science

Mark Seifert

Partner, Washington, D.C. · Brunswick Group

Mark Seifert offers insights and practical advice to clients addressing complex privacy issues.

Telecommuncations Media Relations Cyber Security Telecommunications Privacy and Data Management

Walter Schilling Jr., Ph.D.

Professor · Milwaukee School of Engineering

Dr. Walter Schilling is an expert in software reliability, software security and embedded systems software.

Static Analysis Embedded Systems Computer Science Software Engineering Software Reliability Analysis

Kurt Rohloff

Associate Professor, Computer Science · New Jersey Institute of Technology

Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography, and cybersecurity

Contact Tracing Software Engineering Cryptography Computer Security and Privacy Cybersecurity Cryptography

Sam Curry

Chief Product and Security Officer · Cybereason

Sam Curry is an expert in cyber conflict and security, information security management and enabling a safe, reliable and connected world.

Computer Security Identity Management Information Serucity Management Network Security Product Marketing

Tom Holt

Professor of Criminal Justice · Michigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

Terror Malware Information Warfare Cybercrime Identity Theft

Ramnath K Chellappa

Associate Dean & Academic Director of Master of Science in Business Analytics; Goizueta Foundation Term Professor of Information Systems & Operations Management · Goizueta Business School

Pricing Digital Product Pricing and Piracy Economics of Privacy Electronic Markets and US Airline Pricing Management of Information Security and Privacy

Daniel Reis

Director, PMM · Consultant

Dan Reis, a cyber security professional, provides detailed insights on how to protect yourself and your data

Yogesh Shivhare

Senior Analyst, Security and Infrastructure · International Data Corporation (IDC)

Professional analyst with experience in Market Research and Advisory within the IT Infrastructure and security industry

Cybersecurity and Risk Management Network Infrastructure Datacentre Networking Enterprise Systems Market Research

Nazrul Islam

Chair, Security Systems and Law Enforcement Technology Department · Farmingdale State College

Dr. Islam is Chair of the Security Systems and Law Enforcement Technology Department, and a member of the Protect New York think tank.

Facial Recognition solid-state devices Digital Image Processing Wireless Communications optical communication

Michael Nowatkowski

Associate Professor · Augusta University

A leading cybersecurity expert available to discuss the way to keep web conferencing tools safe during the COVID-19 crisis.

Cyber Operations Education Medical Device Security Information Assurance Hardware and Embedded Systems Defensive Cyber Operations

Alizabeth Calder

Research Adjunct Advisor · International Data Corporation (IDC)

Alizabeth Calder is an adjunct analyst with IDC's IT Executive Programs

Change Management Logistics Transportation Healthcare Professional Services

Randy Magiera

Adjunct professor of information security and cybersecurity · Tulane University

Randy Magiera is a cybersecurity expert in security management, risk analysis and vulnerability assessments.

Risk Analysis Vulnerability Assessments Information Security Information Technology Cybersecurity

Lea Deesing

Assistant City Manager, former CIO · City of Riverside

Motivate staff and spark innovation. Encourage kids to pursue STEM fields. Increase government transparency and improve cyber security.

Information Technology Innovation Leadership STEM Education Government

Lillian Cassel, PhD

Professor of Computing Sciences | College of Liberal Arts and Sciences · Villanova University

Lillian N. Cassel, PhD, is an expert on information storage, classification, retrieval and networking.

Digital Libraries Web-based Information Retrieval Data Science Education Women in Computer Science

Angelos Keromytis

Professor, Electrical and Computer Engineering · Georgia Tech - COE

Angelos Keromytis is an expert in systems and network security, and applied cryptography.

Computer and Network Security Privacy Software Security Network Security Cryptography Software