Seth Hamman, Ph.D.
Director, Center for the Advancement of Cybersecurity and Associate Professor of Cyber Operations and Computer Science · Cedarville University
Dr. Hamman is interested in helping to shape the young and growing discipline of cybersecurity education.
Cybersecurity Issues and Stories
David Bader
Distinguished Professor, Data Science · New Jersey Institute of Technology
Interests lie at the intersection of data science & high-performance computing, with applications in cybersecurity
Graph Analytics Massive-Scale Analytics High-Performance Computing Data Science Applications in Cybersecurity
Vladlena Benson
Professor of Cybersecurity Management · Aston University
Professor Benson is an industry-recognised expert in cybersecurity management and governance.
Emergent Technologies Cybersecurity and Risk Management Digital Transformation
TJ O’Connor, Ph.D., LTC (Ret.)
Assistant Professor, Cybersecurity Program Chair | Computer Engineering and Sciences · Florida Tech
Dr. O’Connor’s research is focused on cybersecurity education, wireless protocols, software-defined radio and machine learning.
Internet of Things (IoT) Information Security Engineering Cybersecurity Education Computer Security Computer Science
William Hatcher, PhD, MPA
Chair of the Department of Social Sciences · Augusta University
Dr. William Hatcher focuses on public administration and social, economic and political institutions in local communities.
Public Administration Public Policy Community and Economic Development Health Policy Public Budgeting and Finance
Michael S. Rogers
Senior Advisor, Washington, D.C. · Brunswick Group
Michael Rogers advises in the areas of cyber security, privacy, geopolitics, technology and intelligence as well as crisis management.
National Security Crisis Management Telecommuncations Cyber Security Intelligence and Counter Intelligence
Walter Schilling, Jr., Ph.D.
Professor · Milwaukee School of Engineering
Dr. Walter Schilling is an expert in software verification, software reliability, software security and embedded systems software.
Static Analysis Embedded Systems Software Engineering Software Reliability Cybersecurity
Chibuzo Ukegbu
Assistant Professor · Milwaukee School of Engineering
Chibuzo Ukegbu's research focuses on formal verification and analysis of industrial control systems software.
Software Engineering Cloud Security Computing Cloud Infrastructure Deployment Automation and Configuration Management
Lorrie Faith Cranor
Professor · Carnegie Mellon University
Lorrie Faith Cranor has authored over 150 research papers on online privacy, usable security, and other topics.
Engineering and Policy Privacy Cybersecurity and Privacy Computer Science Usable Security
Alexander Schwarzmann, PhD
Dean of the School of Computer and Cyber Sciences · Augusta University
Dean Schwarzmann is a nationally-recognized expert in cybersecurity of voting technology, computer science, and distributed systems.
Cybersecurity of Voting Technology Computer Science Research and Education Distributed Systems
Jay Heslen, PhD
Assistant Professor of Political Science, Cyber Institute faculty · Augusta University
Dr. John “Jay” Heslen is an Assistant Professor of Political Science and serves on faculty at Augusta University’s Cyber Institute
Cyber Conflict Political Science Cybersecurity Terrorism Counterintelligence
Mark Seifert
Partner, Washington, D.C. · Brunswick Group
Mark Seifert offers insights and practical advice to clients addressing complex privacy issues.
Telecommuncations Media Relations Cyber Security Telecommunications Privacy and Data Management
Kurt Rohloff
Associate Professor, Computer Science · New Jersey Institute of Technology
Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography and cybersecurity
Contact Tracing Software Engineering Cryptography Computer Security and Privacy Cybersecurity Cryptography
Sam Curry
Chief Product and Security Officer · Cybereason
Sam Curry is an expert in cyber conflict and security, information security management and enabling a safe, reliable and connected world.
Computer Security Identity Management Information Serucity Management Network Security Product Marketing
Tom Holt
Professor of Criminal Justice · Michigan State University
Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher
Terror Malware Information Warfare Cybercrime Identity Theft
Ramnath K Chellappa
Professor of Information Systems & Operations Management; Academic Director, MS in Business Analytics · Emory University, Goizueta Business School
Pricing Digital Product Pricing and Piracy Economics of Privacy Electronic Markets and US Airline Pricing Management of Information Security and Privacy
John Peiserich, Esq.
Executive Vice President | Environmental, Health & Safety Practice Lead · J.S. Held LLC
Environmental Risk & Compliance Expert | Independent Monitor - EPA Suspension & Debarment Program | Public Policy Advisor
Environmental Risk & Compliance Oil & Gas Products Liability & Mass Torts Toxic Torts Natural Resources
Daniel Reis
Director, PMM · Consultant
Dan Reis, a cyber security professional, provides detailed insights on how to protect yourself and your data
Anahi Santiago, EMBA, CISM
Chief Information Security Officer · ChristianaCare
Anahi Santiago is one of the nation's foremost cybersecurity experts and is interviewed by dozens of national media outlets each year.
Cybersecurity Issues and Stories Cybersecurity and Risk Management Cybersecurity Cybersecurity and Privacy Cybersecurity Education
Frank Katz
Assistant Professor · Georgia Southern University
Frank Katz's specialties include information security/cyber security, systems analysis and design, and database analysis and design.
Higher Education Systems Analysis and Design Information Security Cyber Security Database Analysis and Design