Public works and accolades.

While I've contributed to many publications, podcasts, and events, here are some of my favorites.

Accolades

Top 3 Influential CISOs

Gartner

Gartner nominates a list of noteworthy CISOs in one of three areas. The "influence" category is a peer-voted award for CISOs who have made a significant impact on the industry, voted on by over one-hundred CISOs.

Most Influential Professor

Kennesaw State University

"Most Influential Professor" is a distinction granted solely by graduating seniors at Kennesaw State University. They choose one professor who has made the most impact on their education and career.

GCISO Certification Governing Board Member

GCISO Foundation

The GCISO certification is the most modern and progressive executive security training certification. The governing body is responsible for the certification's content and direction.

Gartner CISO Coalition Governing Body - Georgia

Gartner

Hundreds of security leaders are members of the invite-only Gartner CISO Coalition. The Georgia Governing Body is responsible for the continued community involvement, growth, and membership of the Georgia chapter.

Best Paper, Pedagogy

InfoSec CD Eastern Conference

The Academy for Computing Machinery coordinated a conference, focused on cutting-edge research and pedagogy. They pedagogy category is for novel and progressive ways to teach computer science.

Speaking Engagements

Unleash Your Program's Full Potential Through Diversity

IQPC Cybersecurity Exchange Opening Keynote

IQPC Cybersecurity Exchange hosted a conference in Amelia Island where CISOs and CIOs from companies of all sizes gathered to discuss the evolving landscape of security and risk management. More than 40 CISOs and CIOs were present for my speech.

Bridging the Skill Gap through Diversity

Gartner Global CISO Executive Summit

Gartner hosts an annual, three-day destination Global CISO Executive Summit. My speech was delivered to the full, 100+ security leader audience .

Building a Cybersecurity Shock Absorber for the Enterprise

CIO Magazine "CIO Perspectives" Conference

CIO Magazine held a conference for over 50 CIOs and senior IT leaders at the Atlanta Perimeter Center Marriott. This panel included three other IT executives and fielded rapid-fire questions from the audience.

Run Your Security Program Like a Startup

CSO Magazine CSO50 Conference Keynote

CSO Magazine held its annual CSOConfab, invite-only security conference at a resort in Phoenix, AZ. Over 80 IT and security leaders attended my speech on the main stage.

Opening Keynote

Kennesaw State University Senior Design C-Day

Kennesaw State University hosts a large event where their seniors highlight innovative and impactful research and projects for IT executives across the nation. I was the opening keynote speech.

In Security, Soft Skills are King

CSO Online Executive Sessions Podcast

The SVP and founder of CSO Magazine hosted a series of podcasts where he interviewed industry-regarded CISOs. On his third episode, I pleaded the case for business acumen, empathy, and communication skills in security leaders.

Management of Information Technology

KSU Continuing Education

I developed a curriculum, presented and fielded questions for a large room of healthcare professionals. I guided them through secure technology usage, compliance requirements, and leveraging technology to improve patient outcomes.

Lectures

Publications

Friendship 101: How to Steal Data from Friends for Fun and Profit

InfoSec CD Eastern Conference

In what was unheard of at the time, this research and accompanying paper followed along a controlled social-media based phishing campaign. Social media profiles, posts, and other information were leveraged for a 'pull' approach to phishing.

The Security of Cryptographic Hashes

The Academy for Computing Machinery (ACM)

Quoted by researchers and conferences worldwide, this publication was the first to quantify risk and project the strength of passwords and cryptosystems based on threat actor resources such as hardware and finances.