Top 3 Influential CISOs
Gartner
Gartner nominates a list of noteworthy CISOs in one of three areas. The "influence" category is a peer-voted award for CISOs who have made a significant impact on the industry, voted on by over one-hundred CISOs.
While I've contributed to many publications, podcasts, and events, here are some of my favorites.
Gartner
Gartner nominates a list of noteworthy CISOs in one of three areas. The "influence" category is a peer-voted award for CISOs who have made a significant impact on the industry, voted on by over one-hundred CISOs.
CSO Magazine
CSO Online evaluates large and small security programs from across the world and recognizes extraordinary, outsized impacts.
Kennesaw State University
"Most Influential Professor" is a distinction granted solely by graduating seniors at Kennesaw State University. They choose one professor who has made the most impact on their education and career.
GCISO Foundation
The GCISO certification is the most modern and progressive executive security training certification. The governing body is responsible for the certification's content and direction.
Gartner
Hundreds of security leaders are members of the invite-only Gartner CISO Coalition. The Georgia Governing Body is responsible for the continued community involvement, growth, and membership of the Georgia chapter.
InfoSec CD Eastern Conference
The Academy for Computing Machinery coordinated a conference, focused on cutting-edge research and pedagogy. They pedagogy category is for novel and progressive ways to teach computer science.
IQPC Cybersecurity Exchange Opening Keynote
IQPC Cybersecurity Exchange hosted a conference in Amelia Island where CISOs and CIOs from companies of all sizes gathered to discuss the evolving landscape of security and risk management. More than 40 CISOs and CIOs were present for my speech.
Gartner Global CISO Executive Summit
Gartner hosts an annual, three-day destination Global CISO Executive Summit. My speech was delivered to the full, 100+ security leader audience .
CIO Magazine "CIO Perspectives" Conference
CIO Magazine held a conference for over 50 CIOs and senior IT leaders at the Atlanta Perimeter Center Marriott. This panel included three other IT executives and fielded rapid-fire questions from the audience.
CSO Magazine CSO50 Conference Keynote
CSO Magazine held its annual CSOConfab, invite-only security conference at a resort in Phoenix, AZ. Over 80 IT and security leaders attended my speech on the main stage.
Kennesaw State University Senior Design C-Day
Kennesaw State University hosts a large event where their seniors highlight innovative and impactful research and projects for IT executives across the nation. I was the opening keynote speech.
CSO Online Executive Sessions Podcast
The SVP and founder of CSO Magazine hosted a series of podcasts where he interviewed industry-regarded CISOs. On his third episode, I pleaded the case for business acumen, empathy, and communication skills in security leaders.
KSU Continuing Education
I developed a curriculum, presented and fielded questions for a large room of healthcare professionals. I guided them through secure technology usage, compliance requirements, and leveraging technology to improve patient outcomes.
Southern Polytechnic State University
Kennesaw State University
Kennesaw State University
Kennesaw State University
Kennesaw State University
The Academy for Computing Machinery (ACM)
Southern Polytechnic State University
Kennesaw State University
Southern Polytechnic State University
InfoSec CD Eastern Conference
Co-authored with Dr. Svetlana Peltsverger, this publication explored novel .
InfoSec CD Eastern Conference
In what was unheard of at the time, this research and accompanying paper followed along a controlled social-media based phishing campaign. Social media profiles, posts, and other information were leveraged for a 'pull' approach to phishing.
The Academy for Computing Machinery (ACM)
Quoted by researchers and conferences worldwide, this publication was the first to quantify risk and project the strength of passwords and cryptosystems based on threat actor resources such as hardware and finances.
HP Protect Conference
Co-authored with Symantec, this publication introduced a new way of managing mobile risk through automated compliance and remediation.
Kennesaw State University Master's Thesis
This thesis was the basis of the later acclaimed publication 'The Security of Cryptographic Hashes'. The thesis is a larger body of work consisting of over 100 pages of analysis, condensing results from hundreds of hours of research.