Experts Matter. Find Yours.
Connect for media, speaking, professional opportunities & more.
Filters
Milos Manic, Ph.D.
Professor of Computer ScienceVCU College of Engineering
Milos Manic, Ph.D., FIEEE., is director of VCU's Cybersecurity Center and an expert in cybersecurity and critical infrastructure protection.
Anahi Santiago, EMBA, CISM
Chief Information Security OfficerChristianaCare
Anahi Santiago is one of the nation's foremost cybersecurity experts and is interviewed by dozens of national media outlets each year.
Sandra Pavelka, Ph.D.
Expert in political science and justiceFlorida Gulf Coast University
Sandra Pavelka is an expert in elections, law and public policy, and juvenile and restorative justice.
Gokila Dorai, PhD
Assistant ProfessorAugusta University
Dr. Dorai’s area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.
Rita Singh
Associate ProfessorCarnegie Mellon University
Rita Singh works on core algorithmic aspects of computer voice recognition and artificial intelligence applied to voice forensics.
Irfan Ahmed, Ph.D.
Associate ProfessorVCU College of Engineering
Dr. Ahmed's research interests are broadly in cybersecurity, currently focusing on digital forensics, malware, and cyber-physical systems.
Brendan D Saltaformaggio
Assistant Professor, Electrical and Computer EngineeringGeorgia Tech - COE
Dr. Brendan Saltaformaggio's lab investigates advanced cyber crimes and the analysis and prevention of next-generation malware attacks.
Michael Nowatkowski, PhD
Professor; Director, AU Cyber InstituteAugusta University
A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.
Yoris Au
Chair and Associate ProfessorGeorgia Southern University
Yoris Au has a unique blend of technical, managerial and academic experiences in industry, consulting and academia
Kevin Butler
ProfessorUniversity of Florida
Kevin Butler directs the Florida Institute for Cybersecurity Research and studies the security of computers and the privacy of tech users.