Philip D. Quade
National Security Agency
Special Assistant to the Director for Cyber and Chief of the Cyber Task Force
Mr. Quade is the Special Assistant to the Director National Security Agency for Cyber, and Chief of the NSA Cyber Task Force.

Immediately prior, he served the Chief Operating Officer of the Information Assurance Directorate at NSA, managing day-to-day operations, strategy, planning, integration, and relationships, in cybersecurity and related disciplines.

Mr. Quade served external to NSA as head of the Information Operations Technology Center's Advanced Technology Group, as a Professional Staffer at the US Senate, and at the Office of the Director of National Intelligence for a cross-discipline intelligence effort.

Previous assignments at NSA include serving as a computer scientist, cryptanalyst, computer & network security evaluator, and a variety of policy, program management, and resource jobs.
Mr. Quade is married with three children.

Keynote Speakers
Dr. Zulfikar Ramzan
RSA, The Security Division of EMC
Chief Technology Officer
Dr. Zulfikar Ramzan serves as the Chief Technology Officer of RSA, the Security Division of EMC. In this role, he is responsible for leading the development of the company's technology strategy and bringing to market the innovations that help protect RSA customers from the growing number of advanced threats. Prior to joining RSA, Dr. Ramzan served as Chief Technology Officer of Elastica and, preceding that, as Chief Scientist of Sourcefire (acquired by Cisco in October 2013). Before joining Sourcefire via its acquisition of Immunet in 2010, he was Technical Director of Symantec's Security Technology and Response division. In all of these roles, Dr. Ramzan has leveraged his expertise across numerous domains of cybersecurity and large scale data analytics to bring innovations to market that have protected customers from a large variety of threats to their information assets.

Dr. Ramzan has co-authored over 50 technical articles, and two books including Crimeware: Understanding New Attacks and Defenses, Addison-Wesley Professional, 2008. He also has over 50 granted patents. Dr. Ramzan was selected and served as General Chair of Crypto 2010, the premier conference in the field of Cryptography. Beyond that, he is a frequent public speaker and has briefed both numerous media outlets including the New York Times, Wall Street Journal, Associated Press, and Reuters as well as members of the United States Congress on cyber-security trends and issues. Dr. Ramzan has produced a number of online videos on cybersecurity trends that have collectively been viewed over a million times and he has served as a guest faculty for the educational non-profit Khan Academy (

Dr. Ramzan holds a Ph.D. in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology. His doctoral advisor was Professor Ronald L. Rivest, who co-founded RSA Data Security..

Michael Daniel
The White House
Special Assistant to the President and Cybersecurity Coordinator
Michael Daniel is a Special Assistant to the President and the Cybersecurity Coordinator. In this position, Michael leads the interagency development of national cybersecurity strategy and policy, and he oversees agencies' implementation of those policies. Michael also ensures that the federal government is effectively partnering with the private sector, non-governmental organizations, other branches and levels of government, and other nations.

Prior to coming to the National Security Staff, Michael served for 17 years with the Office of Management and Budget (OMB). From September 2001 to June 2012, he served as the Chief of the Intelligence Branch, National Security Division, in a career Senior Executive Service position. This branch oversees the Intelligence Community (IC) and other classified Department of Defense programs. In this position, Michael played a key role in shaping intelligence budgets, improving the management of the IC, and resolving major IC policy issues. The branch also oversaw a variety of cross-cutting issues, including cybersecurity, counterterrorism spending, and information sharing and safeguarding.

Within OMB, Michael also served as an examiner in the National Security Division's Front Office supporting the Deputy Associate Director and in the Operations branch reviewing Navy and Marine Corps operational activities and overseas military operations such as Bosnia and Kosovo.
Since 2007, Michael has been heavily involved with Federal cybersecurity activities, starting with the Comprehensive National Cybersecurity Initiative. He has worked on cybersecurity funding issues in almost every budget since then and led an annual cross-cut review of Federal agencies' cybersecurity spending. He represented OMB on cybersecurity issues in the interagency policy process and worked with various Congressional committees and staff on cybersecurity issues. Finally, he has worked on tracking cybersecurity spending and the development of useful cyber performance metrics.

Originally from Atlanta, Michael received a Bachelor's in Public Policy from the Woodrow Wilson School at Princeton University. Subsequently, he obtained a Master's in Public Policy from the Kennedy School of Government at Harvard with a focus on International Affairs and Security. Michael also obtained a Master of Science in National Resource Strategy from the National Defense University's Industrial College of the Armed Forces in 2001.
Outside of work, Michael and his wife are raising two rambunctious boys. Michael also studies martial arts in the Chishin Ryu style with Dai Nippon Botoku Kai, a Norfolk-based karate association.

Tony Scott
Office of Management and Budget, The White House
Federal Chief Information Officer
Tony Scott is the third Chief Information Officer of the United States, appointed by President Obama on February 5th, 2015. Prior to his position in the White House, Mr. Scott led the global information technology group at VMware Inc., a position he had held since 2013. Prior to joining VMware Inc., Mr. Scott served as Chief Information Officer (CIO) at Microsoft from 2008 to 2013. Previously, he was the CIO at The Walt Disney Company from 2005 to 2008. From 1999 to 2005, Mr. Scott served as the Chief Technology Officer of Information Systems & Services at General Motors Corporation. He received a B.A. from the University of San Francisco and a J.D. from Santa Clara University.

John Summers
Akamai Technologies
Vice President Security Business Unit
John Summers leads Akamai's security services business and is responsible for driving the product roadmap, business planning, revenue growth and profitability of those services. Akamai's Kona Security services provide cloud-based application security, DDoS defense and data protection services that leverage Akamai's unique distributed computing platform to provide a globally distributed layer of defense that scales on demand, in real time. John joined Akamai in 2007 to manage the Site Acceleration products and during his tenure that business grew dramatically. Prior to Akamai, John built and ran Managed Security Services businesses at Genuity and at Unisys. John holds a Master of Science degree in computer science engineering from the University of Pennsylvania. He was a member of the 1980 U.S. Olympic Team and a three time U.S. National Ice Dance Champion.

Denise Anderson
National Health Information Sharing and Analysis Center
Executive Director
Denise Anderson has over 25 years of management level experience in the private sector. Denise is Executive Director of the National Health Information Sharing and Analysis Center (NH-ISAC), a non-profit organization that is dedicated to protecting the health sector from physical and cyber attacks and incidents through dissemination of trusted and timely information.

Denise currently serves as Chair of the National Council of ISACs and participates in a number of industry groups such the Cross-Sector Cyber Security Working Group (CSCSWG). She was instrumental in implementing a CI/KR industry initiative to establish a private sector liaison seat at the National Infrastructure Coordinating Center (NICC) to enhance information sharing between the private sector, CI/KR community and the federal government and serves as one of the liaisons. She is a financial and health sector representative to the National Cybersecurity and Communications Integration Center (NCCIC) - a Department of Homeland Security-led coordinated watch and warning center that improves national efforts to address threats and incidents affecting the nation's critical information technology and cyber infrastructure. She sits on the Cyber Unified Coordination Group, (UCG) - a public/private advisory group that comes together to provide guidance during a significant cyber event - where she also represents the financial and health sectors.
Denise is certified as an EMT (B), Firefighter I/II and Instructor I/II in the state of Virginia, and is an Adjunct Instructor at the Fire and Rescue Academy in Fairfax County, Virginia. She is also certified under the National Incident Management System (NIMS). In addition, she has served on the Board and as Officer and President of an international credit association, and has spoken at events all over the globe.

Denise holds a BA in English, magna cum laude, from Loyola Marymount University and an MBA in International Business from American University. She is a graduate of the Executive Leaders Program at the Naval Postgraduate School Center for Homeland Defense and Security.

Richard Ayers
Computer Scientist
Mr. Rick Ayers is a computer scientist in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD. Rick, a participant of the Cyber Corps program graduated from the University of Tulsa with a BS and MS in computer science. Current research focus is on mobile device forensics tools and proper acquisition techniques.

Mr. Richard Ayers is a summa cum laude graduate from the University of Tulsa with a BS and MS in computer science. Certifications include NSTISSI 4011 - Information Systems Security Professional, 4012 - Designated Approving Authority, 4013 - System Administration in Information Security Systems, 4014 - Information Systems Security Officer, 4015 - Systems Certifier. He has been in the IT field for over 10 years and is currently specializing in Mobile Forensics. Rick co-authored numerous mobile device forensic publications and is currently performing formal testing for the Computer Forensic Tool Testing project.

Lee Badger
Information Technology Laboratory, NIST
Group Manager, Computer Security Division
Lee Badger is a computer scientist at the National Institute of Standards and Technology (NIST), and manages the Security Components and Mechanisms group in the Computer Security Division of NIST's Information Technology Laboratory. Mr. Badger has over 20 years of experience with computer security research, with a focus on operating systems and access control. Prior to joining NIST in 2008, Mr. Badger served as a Defense Advanced Research Projects Agency (DARPA) program manager for 6 years where he funded and managed a variety of programs focusing on self-regenerating systems, intrusion tolerance, self-defending applications, software security analysis, and software producibility. Prior to joining DARPA, Mr. Badger led development efforts culminating in implementations of Domain and Type Enforcement (DTE) for UNIX, a DTE-enforcing firewall, a Generic Software Wrappers system for UNIX, and application of software wrappers for intrusion detection. Mr. Badger holds an M.S. in Computer Science from the University of Maryland, College Park, awarded in 1987.

John Banghart

John is currently the Senior Director for Trusted Engineering within the Microsoft Azure Global Ecosystem. In this role, he works across developers, operations and customers to understand and improve security and compliance requirements for Microsoft's cloud services. Prior to joining Microsoft, he spent several years at NIST working on security automation and was also the Director for Federal Cybersecurity with the National Security Council staff at the White House where he helped to set government wide cybersecurity policy.

Matthew Barrett
NIST Cybersecurity Framework
Program Manager
Mr. Barrett and his team are responsible for establishing and maintaining relationships with both private and public sector Cybersecurity Framework stakeholders. Mr. Barrett works through those relationships to provide perspective and guidance, as well as gather input on use of the Framework and to inform broader NIST cybersecurity activities. Matt is also known for his program management of the Security Content Automation Protocol (SCAP) Program and NIST's support of OMB's Federal Desktop Core Configuration initiative (predecessor to the U.S. Government Consensus Baseline initiative). Previous to NIST and over the past decade, Matt has served in various IT security executive roles.

Mike Bartock
IT Specialist
Mike Bartock is an IT specialist in the Computer Security Division in the Information Technology Laboratory at the National Institute of Standards and Technology. He performs applied cybersecurity research specializing in hardware roots of trust to enforce policy-based cloud workload migration, LTE backhaul protection, and derived PIV credentials. His work focuses on collaborating with industry partners to build and implement proof of concept reference architectures. He has experience in managing virtualized environment, cloud computing, software development, cryptography, derived PIV credentials, and LTE security for public safety networks. He received his Bachelor's in Mathematics from the University of Maryland.

Larry Bassham
Computer Scientist
Larry Bassham works in the Cryptographic Technology Group. His primary focus is on algorithms and their implementations. Research areas include Lightweight Cryptography and the NIST Randomness Beacon.

Swarup Bhunia
University of Florida

Paul Black
Computer Scientist
Dr. Black has nearly 20 years of industrial experience in areas such as developing software for IC design and verification, assuring software quality, and managing business data processing. He is a member of the SAMATE team in the Software Quality Group, Systems and Software Division, Information Technology Laboratory at NIST. He earned a Ph.D. at Brigham Young University in 1998. Dr. Black has been active in the formal methods research community and has organized several workshops related to software assurance. He has taught classes at Brigham Young University and Johns Hopkins University. Dr. Black has published in the areas of static analysis, software testing, software configuration control, networks and queuing analysis, formal methods, software verification, quantum computing, and computer forensics. He is a member of ACM and IEEE Computer Society and a senior member of IEEE.

Dr. Lindsley Boiney
The MITRE Corporation
Principal Cybersecurity Researcher/Engineer
Lindsley Boiney is a Principal Cybersecurity Engineer at the MITRE Corporation. Her expertise lies at the intersection of human behavior and information technology, applying a blend of social/behavioral science methodologies and decision support technologies to improve judgments, decisions and information sharing in crisis response environments (e.g., high risk, fast tempo, ambiguous information, diverse stakeholders). She has worked in diverse sponsor domains including Cybersecurity, DoD Command and Control, and Aviation Security, and has been a principal investigator on numerous research projects.

She has ten years prior experience as a business professor, conducting research and teaching business executives in decision analysis, statistics, and management information systems at George Mason University and Pepperdine University. She is the winner of two teaching awards and author of over two dozen published research papers and book chapters. Lindsley holds a Ph.D. in Decision Science and a B.A. in Computer Science.

Sean Brooks
Privacy Engineer
Sean Brooks is a Privacy Engineer in the Information Technology Lab of the National Institute of Standards and Technology (NIST), where he supports a broad range of programs related to online privacy and cybersecurity. Sean received his MPA at NYU's Wagner Graduate School of Public Service, where he was a graduate research fellow with The Governance Lab and the NYU Center for Interdisciplinary Studies in Security and Privacy. Previously, he spent two years serving as a program associate in the San Francisco office of the Center for Democracy and Technology, a non-profit public interest organization focused on civil liberties and human rights issues online. Sean has also worked in the private sector, supporting Silicon Valley companies ranging from multinational information security and business intelligence companies to consumer technology start-ups. Sean received his undergraduate degree in politics from the University of California at Santa Cruz.

Dr. Eric Burger
Georgetown University
Research Professor of Computer Science and Director of the Georgetown Site of the Security and Software Engineering Research Center I/UCRC
Dr. Burger's current research areas include privacy and information protection; cyber security; privacy-preserving information sharing; real-time interactive multimedia; network attribution; and Internet policy. Prior to Georgetown, Eric was CTO of Neustar and prior to that was CTO or held senior positions with BEA Systems, MCI, Cable & Wireless, and a number of network equipment manufacturers.

Greg Cavalli
Virginia DMV
Program Specialist

Dave Challener
Johns Hopkins University- Applied Physics Laboratory

Dave Challener is currently a member of the Senior Professional Staff at Johns Hopkins University - Applied Physics Laboratory where he is a recognized expert in cyber security. David received his PhD from the University of Illinois in Applied Mathematics in 1984 and began his career at IBM in the semi-conductor field where he became a member of the technical staff to the President of the IBM PC company, and later became chief engineer in the Center for Natural Computing. He played an active role in building security into and in the PC and x86 server architecture. Dave also worked on the design of the IBM PC embedded security subsystem and the first TCPA TPM chip. Dr. Challener co-authored "A Practical Guide to Trusted Computing", the only book available on how to program with the TCG Software Stack. He has been active in the Trusted Computing Group, serving on the Board of Directors, and as a member of the Technical Committee, Virtualization Workgroup, and Storage Workgroup. He currently co-chairs the TPM Working Group which recently released specifications for TPM 2.0 and edited the TCG Software Stack as chair of that committee.

Brant Cheikes
The MITRE Corporation
Principal Cybersecurity Engineer
Brant Cheikes is a Principal Cybersecurity Engineer at The MITRE Corporation, based in Bedford, Massachusetts. Since joining MITRE in 1993, Brant has supported and led a variety of research and technology development projects that span artificial intelligence, training and education, intelligence analysis, cognitive decision support, forecasting of emerging technologies, and cybersecurity. In 2007, Brant became the leader of the MITRE team managing the development of the Common Platform Enumeration (CPE) standard, and led the team that developed version CPE version 2.3. Currently he is supporting DHS and NSA cybersecurity efforts, and leading activities intended to raise awareness and promote adoption of software identification tags in the marketplace. Brant holds a B.S. degree in Computer Engineering from Boston University, and M.S. and Ph.D. degrees in Computer and Information Science from the University of Pennsylvania.

Yee-Yin Choong
Cognitive Scientist
Within the Visualization and Usability Group at NIST, Yee-Yin conducts research in the areas of user-centered design and evaluation methodology, symbols and icons, biometrics usability, usable security, human factors, and cognitive engineering. She has contributed to numerous papers, book chapters and conferences on the topics of user-centered design and evaluation, cross-cultural usability, symbols and icons design, biometrics symbology, and usable cybersecurity.

Prior to joining NIST in 2006, she practiced usability engineering in the private sector for 10 years. Her work covered areas including telecommunications, Business-to-Business eCommerce, Web-based applications, and software internationalization. Yee-Yin received her Ph.D. in Industrial Engineering - Human Factors from the Purdue University and her Master of Engineering in Industrial Engineering from the Pennsylvania State University.

Jeffrey Cichonski
IT Specialist
Jeff Cichonski is an Information Technology Specialist working with a broad array of technologies at the National Institute of Standards and Technology; working in the Computer Security Division under the umbrella of the Information Technology Laboratory. One of his current areas of focus is LTE network security, with a specific interest in security for public safety LTE Implementations. Other areas of interests include virtualization, derived credential research, and cyber physical systems. He has a Bachelor of Science In Information Science and Technology from the Pennsylvania State University.

Paul Cichonski
Cloud Architect
Paul Cichonski is a Cloud Architect at Lancope where he is leading the development and rollout of Lancope1s SaaS offering. Prior to Lancope, Paul was a Senior Software Engineer at Lithium Technologies, focusing on building backend systems using Cassandra. Before joining Lithium, Paul worked at the National Institute of Standards and Technology, where he focused on building ontologies to help foster IT security data interoperability.

Mike Cooper
Manager, Security Testing, Validation and Measurement Group

Donna Dodson
Chief Cybersecurity Advisor
Donna F. Dodson is the Chief Cybersecurity Advisor for the National Institute of Standards and Technology (NIST). She is also the Director of NIST's National Cybersecuity Center of Excellence (NCCoE).

Donna oversees ITL's cyber security program to conduct research, development and outreach necessary to provide standards, guidelines, tools, metrics and practices to protect the information and communication infrastructure. This includes collaborations with industry, academia and other government agencies in research areas such as security management and assurance, cryptography and systems security, identity management, security automation, secure system and component configuration, test validation and measurement of security properties of products and systems, security awareness and outreach and emerging security technologies. In addition, Donna guides programs to support both national and international security standards activities. She recently led the establishment of the NIST NCCoE. Through partnerships with state, local and industry, the NCCoE collaborates with industry sectors to accelerate the widespread adoption of standards-based cyber security tools and technologies.

Donna received two Department of Commerce Gold Medasl and three NIST Bronze Medals. She was a Fed 100 Award winner for her innovations in cybersecurity and in 2011 was included in the top 10 influential people in government information security. Recently, FedScoop recognized Donna as one of DC's Top 50 Women in Tech.

Michael Dyer
Trapezoid Inc.
VP Software Development
Michael is a 27-year veteran of the information technology and distribution industry. During this time, he has held the position of Latin American IT Director for, CHS, Merisel, and International Micro Systems. Michael has an extensive technical background covering computer and networking systems, internet security, software development and applications integration, data communications and telecommunications. He was the key architect in the eCommerce system used by Merisel Latin America, CHS Latin America and Additionally Michael has participated in Microsoft, SAP, JBA and Oracle Enterprise Resource Planning (ERP) system implementations and was a member of the RosettaNet Implementation Framework team.

Rick Engle
Microsoft Federal
Principal Windows Technologies Specialist
Rick Engle is a Principal Windows Technologies Specialist and is currently part of the Microsoft Federal Technology team focused on the Windows powered device technologies and is a technical lead for mobility solutions. He has been with Microsoft for twenty-five years and has specialized in advanced emerging technologies operating systems technologies and development tools.

Prior to Microsoft, Rick worked for Wang Laboratories providing consulting on PC, OIS and VS connectivity solutions.

He has been focused on the Federal Government sector for 34 years.

Eric Eskam
Integrated Technology Services, General Services Administration
Program Manager
Eric Eskam is a seasoned IT professional who specializes in the strategic sourcing of Enterprise software and the implementation of software asset management in the public sector. He has over 20 years of experience in developing cost effective ways to manage Federal software spend within organizations such GSA and DOI. Currently he supports a team made up from top executives at DOD, GSA and OMB in developing a service offering for Software License Management (SLM). Eric is also GSA's representative to TagVault and is a chief proponent of adopting ISO 19770 standards in in the Federal Government.

Michael Farnsworth
Senior Architect and Program Lead
With over 20 years of IT experience, Mike Farnsworth has served in many roles related to identity management as a technical program manager and architect with extensive development, architecture and program management experience gained working on multi-million dollar initiatives in the government, defense and healthcare IT sectors.

Mike presently is responsible for the technical delivery of HealthIDx's identity management platform. Mike recently served as a program manager and architect for's public sector and healthcare lines of business. Previously he served the Virginia Department of Motor Vehicles as the program manager for several Commonwealth e-Identity initiatives, and as the technical lead and program manager for the Cross Sector Digital Identity Initiative (CSDII) which was a pilot project of NIST's National Strategy for Trusted Identities in Cyberspace (NSTIC).

He began his career in the defense industry and prior to beginning state service, served as a program manager for the Mobilization, Education, Training, and Security Division for the 67th Combat Support Hospital in Wurzburg, Germany.
He is a member of many professional organizations, maintains numerous IT certifications, and is considered a thought leader in the identity management and large scale system implementation arenas.

Hildegard Ferraiolo
NIST/ITL/Computer Security Division
HSPD-12/PIV Program Lead and Senior Computer Scientist
Hildegard Ferraiolo is a Senior Computer Scientist at National Institute of Standards and Technology (NIST) where she is the lead for the PIV Program activities including the recent completed revision 2 of Federal Information Processing Standard (FIPS) 201-the standard for identity verification of federal employees and contractors. Hildegard co-authored and developed several NIST publications in the FIPS 201 standard suite - including SP 800-157 Derived PIV Credentials for Mobile Device . Prior to leading the PIV Program, Hildegard launched the NIST Personal Identity Verification test program (NPIVP), resulting in the full accreditation of ten independent test laboratories and (to date) validation of over 70 PIV Middleware and Card applications products

David Ferraiolo
Manager of the Secure Systems and Applications group
David F. Ferraiolo is the manager of the Secure Systems and Applications group of the Computer Security Division at the National Institute of Standards and Technology (NIST) and the Manager of the Policy Machine research program. He is a coauthor of a book on Role-based Access Control, is the author or coauthor of more than 40 papers in the area of access control. He received a U.S. Department of Commerce gold medal and an Excellence in Technology Transfer award from the Federal Laboratory Consortium for research, and has served on the editorial boards of numerous standardization efforts to include, U.S Federal Criteria and the international Common Criteria (ISO 15408), Role-Based Access Control (ANSI/INCITS 359), and Next Generation Access Control (ANSI/INCITS 499).

William (Bill) Fisher
National Cybersecurity Center of Excellence at NIST
Senior Engineer
William (Bill) Fisher is a security engineer at the NCCoE at NIST. In his role as a security engineer, Bill is responsible for leading a team of engineers that work collaboratively with industry partners to address cybersecurity business challenges facing the nation. Bill is the lead for the center1s Attribute Based Access Control (ABAC) project and focuses on all topics related to identity and access management. Previous to his work at the NCCoE, Bill was a program security advisor for the System High Corporation support the Network Security Deployment division at the Department of Homeland Security.

Jessica Fitzgerald-McKay

Dr. Peter Fonash
Department of Homeland Security
Chief Technology Officer for the Office of Cybersecurity and Communications (CS&C)
Peter M. Fonash is the Chief Technology Officer for the Office of Cybersecurity and Communications (CS&C) at the Department of Homeland Security (DHS). He has previously held positions at CS&C as the Director of the National Communications System, Acting Director of the National Cyber Security Division, and Acting Deputy Assistant Secretary. Formerly, at the Defense Information Systems Agency he served as the Chief of the Advanced Technology Office and Chief of the Joint Combat Support Applications Division. Dr. Fonash received a Bachelor of Science in Electrical Engineering and a Master of Science in Engineering from the University of Pennsylvania; a Master of Business Administration from the University of Pennsylvania Wharton School; and a Ph.D. in Information Technology and Engineering from George Mason University.

Domenic Forte
University of Florida

Paul Fox
Paul Fox has over 20 years in the industry focusing on identity / access and security. Mr. Fox has worked for both the Federal Government (U.S. Navy and Executive Office of the President) and industry (Microsoft).

Sheila Frankel
Senior Computer Scientist, Computer Security Division
Sheila Frankel is a computer scientist and computer security researcher in NIST's Computer Security Division. She is an active participant in the Internet Engineering Task Force (IETF) IPsec standardization effort, and was responsible for NIST's IPsec/IKE reference implementation and interactive Web-based interoperability tester. She is the author of a book on IPsec, "Demystifying the IPsec Puzzle" and author of several IPsec-related RFCs. She is involved with the Federal Government's transition to IPv6, and is an author of NIST's U.S. Government IPv6 Profile and NIST SP 800-119, Guidelines for the Secure Deployment of IPv6. She also contributed to IEEE's 802.11i wireless security standardization. Currently, she is working with NIST's PSCR (Public Safety Communications Research), consulting on the development and testing of security for FirstNet, the Public Safety Mobile Broadband Network. She is also a participant in the 3GPP LTE SA3 Working Group, which is developing the security requirements for the next generation telecommunications standard. She holds a Masters degree from New York University's Courant Institute.

Joshua Franklin
IT Specialist
Joshua is an IT Specialist at the National Institute of Standards and Technology (NIST) focusing on public safety and electronic voting security. Prior to NIST, Joshua worked at the U.S. Election Assistance Commission gathering extensive experience with voting technologies. After graduating from Kennesaw State University with a Bachelors of Science in Information Systems he received a Masters of Science in Information Security and Assurance from George Mason University.

Serban Gavrila
Computer Scientist
Serban Gavrila is a Computer Scientist with NIST since 2007. He is doing research in various areas of access control, including formal model development and reference and prototype implementation. He received an Excellence in Technology Transfer award from the Federal Laboratory Consortium. He has contributed to the standardization efforts for Role-Based Access Control (ANSI/INCITS 359), and INCITS Next Generation Access Control (ANSI/INCITS 499).

Bob Gourley
Cognitio Corporation
Bob Gourley is a co-founder and partner of Cognitio and the publisher of and Bob's most recent book, The Cyber Threat, provides business executives with actionable insights into the threat landscape. Bob's first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Bob was the first Director of Intelligence (J2) at DoD's cyber defense organization JTF-CND. Following retirement from the Navy, Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the CTO of the Defense Intelligence Agency (DIA). Bob was named one of the top 25 most influential CTOs in the globe by Infoworld. He was selected for AFCEAs award for meritorious service to the intelligence community, and was named by Washingtonian as one of DC's "Tech Titans."

Sugumar Govindarajan
Security Architect
Sugumar Govindarajan is a Security Architect for Intel Server BIOS, where he is responsible for BIOS requirements, Architecture & Design, for Intel security technologies and features.

Chris Greamo
Invincea Labs
Vice President and General Manager
Chris Greamo manages Invincea Labs and its 40+ (and growing) team of multidisciplinary technology researchers, engineers, and scientists. Chris has more than 12 years of experience as a researcher and principal investigator on multiple cybersecurity R&D programs for agencies such as DARPA. Chris holds a Bachelor of Science in Electrical Engineering from Carnegie-Mellon University and a Master of Science in Electrical Engineering from MIT.

Paul Green
G2, Inc
As the Founder and CEO of G2, Inc., Mr. Green is responsible for creating and communicating the corporate strategy and shaping the company's culture. Over the last 14 years, Paul has focused his efforts on building a scalable business platform that can produce sustainable results for its clients, employees and shareholders.

Mr. Green is passionate about the art of innovation, he strongly encourages his employees to question the status quo and run with their ideas. As a result G2 consistently produces new and innovative capabilities that it provides to its clients in the form of targeted solutions.

G2 operates at the intersection of the organizations that shape our Nation's ability to create an information advantage at the nexus between data exploitation and protection. In 2012 G2 was voted the #1 company for Encouraging New Ideas by the Baltimore Sun Top Places to Work. G2 is expected to close FY2015 at a 28M dollar run rate across its five prime contracts and 25+ subcontracts.

Paul is a graduate from the US Merchant Marine Academy at Kings Point, was honorably discharged from the US Naval Reserves after eight years of service and has served for four years on the Board of Directors for the Central Maryland chapter of AFCEA.

Kristen Greene
Cognitive Scientist
Kristen Greene is a Cognitive Scientist in the Visualization and Usability Group within the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). She is an experienced research scientist, having conducted research in the Attention and Perception Laboratory at the University of South Carolina, the Usability Testing and Analysis Facility at NASA Johnson Space Center, the Computer Human Interaction Laboratory at Rice University, and now the Information Technology Laboratory at NIST.

She began working at NIST in 2011, and has worked on NIST's voting usability and accessibility project, usable security project, biometric web services project, and now the public safety project. Across projects, she is broadly interested in understanding how emerging technology and device constraints impact human cognition and total human-system performance. She has an M.A. and Ph.D. in Cognitive Psychology from Rice University.

Steve Grubb
Red Hat
Senior Principal Engineer
Steve Grubb is a Senior Principal Engineer whose role in Red Hat Enterprise Linux (RHEL) Engineering is as a Security Architect with a focus on Security Certifications (such as Common Criteria and FIPS-140) and configuration Guidance (such as DISA STIG, USGCB, and the CIS RHEL Benchmark). He also performs Software Assurance studies such as reviewing protection mechanisms, threats, and vulnerability detection and analysis to guide product development to a safer posture.

Steve Hanna
Senior Principal
Steve Hanna is a Senior Principal at Infineon Technologies, responsible for IoT security strategy and technology. Mr. Hanna is an inventor or co-inventor on 43 issued patents, the author of innumerable standards and white papers, and a regular speaker at industry events.

Jim Hanson
Cyber Engineering Services, Inc.
Director of Engineering and Development
Jim currently serves as a designer and implementer of technical software and hardware solutions to help CyberESI's customers to actively detect and combat malicious activity on their networks. He has developed many of the proprietary tools actively used on a day to day basis in support of CyberESI's operations. Recently a tool was developed in conjunction with NIST to demonstrate the conversion of a government shared source of indicators of compromise encoded in the STIX language into OVAL for use with SCAP 1.2 tools. Before CyberESI Jim worked at Tenable Network Security and performed some early development on the Nessus ability to scan hosts using OVAL as the source content. Previous to his work in the cyber security field Jim spent many years as a computer game developer.

Malcolm Harkins
Cylance Inc.
Global Chief Information Security Officer
Malcolm Harkins is the Chief Security and Trust Officer at Cylance Inc. In this role he reports to the CEO and is responsible for enabling business growth through trusted infrastructure, systems, and business processes. He has direct organizational responsibility for information technology, information risk and security, as well as security and privacy policy. Malcolm is also responsible for peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks.

Previously Malcolm was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation. In that role Malcolm was responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel's information assets, products, and services.

Before becoming Intel's first CSPO he was the Chief Information Security Officer (CISO) reporting into the Chief Information Officer. Malcolm also held roles in Finance, Procurement, and various business operations. He has managed IT benchmarking and Sarbanes-Oxley compliance initiatives. Harkins acted as the profit and loss manager for the Flash Product Group at Intel; was the general manager of Enterprise Capabilities, responsible for the delivery and support of Intel's Finance and HR systems; and worked in an Intel business venture focusing on e-commerce hosting.

Malcolm previously taught at the CIO institute at the UCLA Anderson School of Management and was an adjunct faculty member at Susquehanna University in 2009. In 2010, he received the RSA Conference Excellence in the Field of Security Practices Award. He was recognized by Computerworld as one of the Premier 100 Information Technology Leaders for 2012. (ISC)2 recognized Malcolm in 2012 with the Information Security Leadership Award. In September 2013, Malcolm was recognized as one of the Top 10 Breakaway Leaders at the Global CISO Executive Summit. In November 2015, he received the Security Advisor Alliance Excellence in Innovation Award. He is a Fellow with the Institute for Critical Infrastructure Technology, a non-partisan think-tank providing on cybersecurity to the House, Senate, and a variety of federal agencies. Malcolm is a sought-after speaker for industry events. He has authored many white papers and in December 2012 published his first book, Managing Risk and Information Security: Protect to Enable. He also was a contributing author to Introduction to IT Privacy, published in 2014 by the International Association of Privacy Professionals.

Malcolm received his bachelor's degree in economics from the University of California at Irvine and an MBA in finance and accounting from the University of California at Davis.

Nelson Hastings
Electronics Engineer
Nelson Hastings is a member of the Public Safety Communications Research (PSCR) program team organizing and leading their security research and testing efforts. Located in Gaithersburg, he has been part of the Computer Security Division in the Information Technology Laboratory at NIST for the past 15 years. Before joining the PSCR efforts, he was the Technical Lead of the NIST Voting Program while leading the program's computer security efforts. He also co-chaired the Cyber Security Working Group's Testing and Certification sub-group of the Smart Grid Interoperability Panel. In addition, he has worked in the areas of public key infrastructure and the cryptographic module validation (FIPS 140-2) program.

Dr. Hastings received his Ph.D. in computer engineering from Iowa State University, M.S. in electrical engineering from Western Michigan University, and B.S. degrees in electrical engineering and computer engineering from the University of Missouri-Columbia.

Ryan Holley
Sales Engineer
Ryan has extensive experience designing and deploying a variety of complex security credentialing programs with a focus on the PIV standard. Ryan specializes in applying the PIV standard to mobile devices and has worked with leading US Federal agencies and Enterprises implementing Intercede's technology.

Chris Hoover
GRC Strategist
Chris Hoover is the GRC Strategist for Federal Solutions at RSA Archer. He has 17 years in Risk Management in the federal community. He started his security career in the US Air Force. Since then, Mr. Hoover has spent his career helping federal agencies build effective IA and Risk Management programs in highly classified environments like the Pentagon, NGA HQ, Baghdad Embassy, and Los Alamos Labs.

Yier Jin
University of Florida

Gopi Katwala

Greg Kazmierczak
Wave Systems
Chief Technology Officer
Mr. Kazmierczak is responsible for defining Wave's technology roadmap, including the company's strategy for PC and mobile platform Trust Ecosystems, as well as data-at-rest and data-in-motion products. In addition, Mr. Kazmierczak manages intellectual property and initiates research and incubation of advanced trust capabilities that utilize hardware-based security devices to further the goal of protecting user and enterprise assets. Mr. Kazmierczak joined the company in 1992, and previously served as Director of Hardware Engineering and Vice President of Technology Strategy. With over twenty-two years' experience in the security industry, he has extensive background in architecture and system design. Mr. Kazmierczak represents Wave at standards organizations such as the Trusted Computing Group, IEEE, IETF, and OASIS. He has authored and edited numerous TCG specifications, holds a number of patents and helped found two start-ups. Before joining Wave, he served as a Research Scientist for Siemens Corporate Research, conducting research on analog integrated circuits. Mr. Kazmierczak holds B.S. and M.S. degrees in Electrical Engineering from the University of Pennsylvania.

John Kelsey
NIST/ITL/Computer Security Division
Cryptographic Technology Group

Hormuzd Khosravi
Principal Engineer
Hormuzd Khosravi is a Principal Engineer in Intel Security Group and serves as the Lead Security Architect for Business Client Platforms at Intel. Hormuzd began his career at Intel in 1999, working for Intel Labs. At Intel Labs, he worked in the areas of communications, security, manageability and virtualization. Hormuzd led the definition of several security technologies such as end-point access control and OS Streaming within the 802.1x network protocol which were featured in Intelr vProT platforms. Hormuzd also led delivery of several content protection technologies featured in Google TV, Comcast Xfinity, and Bouygues Telecom Bbox products as part of Service Provider Division (Digital Home Group) at Intel. Hormuzd has filed over 100 patents and represented Intel in multiple standards bodies including the Internet Engineering Task Force and Network Processing Forum. Hormuzd holds an M.S. degree in Computer Engineering from Rutgers University, New Jersey.

Steve Klos
Executive Director
Steve Klos is the Vice President for Software Asset Optimization for 1E and the Executive Director for, the non-profit organization providing technical support, tools and certification services for organizations that want to streamline the creation of industry normalized SWID tag implementations. He is the convener and editor of the ISO/IEC published SWID tagging standard (technically known as ISO/IEC 19770-2). Steve is a member of the U.S. Technical Advisory Group and is heavily involved in ISO's working group 21 - which is focused on both process and technical ITAM standards. Steve also supports the efforts between and numerous other standards development organizations including the DMTF, the Industry Connections Security Group (ICSG) within the IEEE, the IETF, NIST, and the Trusted Computing Group. Steve's efforts in the commercial world with 1E reflect his deep seated interest in improving automation IT Systems Management within Enterprise level organizations.

Phil Lam
National Strategy for Trusted Identities in Cyberspace, NIST
Trusted Identity Strategist
Phil Lam is a Trusted Identity Strategist for the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office. He leads a portfolio of pilot projects under cooperative agreements with private sector companies, providing subject-matter expertise on user experience, security, interoperability standards and privacy. The mission is to seed the marketplace with solutions that individuals and organizations can use to access online services in a manner that promotes confidence, privacy, choice and innovation. Phil holds a BS in Computer Engineering from Northwestern University and an MBA from Purdue University.

Lisa Lorenzin
Pulse Secure
Principal Solutions Architect
Lisa Lorenzin is a Principal Solutions Architect with Pulse Secure, specializing in security and mobility solutions, and co-chair of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.

John Loucaides
Intel Corporation
Security Researcher
John Loucaides is a Security Researcher for Intel Corporation, where he focuses mostly on responding to firmware security issues. He is active in creating repeatable methods for assurance, including contributing to the CHIPSEC project and organizing threats and countermeasures such as described in previous talks and training.

Jim Mann
Distinguished Technologist
Jim Mann is a Hewlett-Packard Distinguished Technologist in the Printing and Personal Systems in the Office of the Chief Engineer. Jim's primary responsibility is leading the product security strategy for all client products, as well as open source strategy. He serves as a key technology contact for external partners and other HP organizations, including HP Labs. Jim is active in and leads various efforts in multiple security industry consortia. He has been with HP for 25 years and has served in positions ranging in scope from hardware and software development, to R&D Director, to Chief Technologist and strategist for products ranging from iPAQ Pocket PC devices to PC's to server products.

Jim holds a B.S. and M.S. in Computer Engineering from Iowa State University where he graduated with Distinction and performed graduate work in the fields of non-destructive evaluation and artificial intelligence, and was awarded the 1992 Achievement Award by the American Society for Nondestructive Testing.

Doug Maughan
Division Director
Dr. Douglas Maughan is the division director of the Cyber Security Division in the Homeland Security Advanced Research Projects Agency (HSARPA) within the Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS).

Dr. Maughan, who joined DHS in October 2003, directs and manages the cybersecurity research and development activities and staff at DHS S&T. His research interests and related programs are in the areas of networking and information assurance. Dr. Maughan has been responsible for helping bring to market more than 40 commercial and open-source information security products during his tenure at DHS. He also is the senior executive responsible for the DHS Silicon Valley Innovation Program.

Prior to his appointment at DHS, Dr. Maughan was a program manager at the Defense Advanced Research Projects Agency (DARPA). Prior to his appointment at DARPA, Dr. Maughan worked for the National Security Agency (NSA) as a senior computer scientist and in this role led several research teams performing network security research.

Tim McBride

Tim McBride is the Associate Director of Operations for the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE). In this role Mr. McBride oversees the Centers operations which include oversight of the FFRDC Operator and the NCCoE FFRDC's Work for Others Program. Mr. McBride previously held the position of Branch Chief of the Requirements and Acquisition Support Branch at the Office of Cybersecurity and Communications at the Department of Homeland Security. In this role Mr. McBride lead Acquisition efforts for the CDM Program and the Information Systems Security Line of Business. Prior to Mr. McBride's federal service he held a variety of positions in the private sector.

Kerry McKay
Computer Scientist
Kerry McKay is a computer scientist in the cryptographic technology group at the National Institute of Standards and Technology, where she develops cryptographic standards and performs research. Her projects include topics in TLS, random bit generation, lightweight cryptography, and SHA-3.

Adam Migus
Confyrm, Inc
Security Director
Adam is an IT consultant with experience in network, software and systems security. Most recently Adam served as Principal Security Architect at E•TRADE Financial where he led identity, access management initiatives and enterprise architecture projects. Prior to that, Adam focused on threat intelligence as a third-tier security analyst at Symantec's Security Operations Center. Adam also devoted several years to network and operating system security research for DARPA at McAfee Research. He earned his B.Sc. in Computer Science from Memorial University of Newfoundland, where he also started his career in earnest as a network administrator.

Thomas Millar
Communications Chief, US-CERT
Mr. Thomas R. Millar serves as the United States Computer Emergency Readiness Team's (US-CERT) Chief of Communications, a role which finds him at the intersection of outreach, awareness, standards development, and technical interoperability initiatives. In this role, Mr. Millar is focused on modernizing US-CERT's approaches to information sharing, knowledge exchange and coordination. Since joining US-CERT in 2007, he has played a significant role in US-CERT's response activities during major cyber events such as the Distributed Denial of Service (DDoS) attacks on Estonia in 2007, the outbreak of the Conficker worm, and the DDoS attacks on major U.S. Government and commercial Web sites in 2009.

Mr. Millar has previously worked as a team lead for intrusion detection and analysis at the FBI's Enterprise Security Operations Center. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force.

Mr. Millar has a Master's of Science in Engineering Management from the George Washington University.

Dustin Moody
Dr. Dustin Moody is a mathematician in the Computer Security Division of the National Institute of Standards and Technology. His area of research deals with elliptic curves, and their applications in cryptography. He received his Ph.D. from the University of Washington in 2009.

John Morello
Chief Technology Officer
John Morello graduated Summa Cum Laude from LSU and joined Microsoft as a new college hire in 2000. He started out answering the phones in Premier Support and then spent 5 years in Microsoft Consulting Services where he built solutions for companies and governments around the world. From 2006-2011, he was a Program Manager in the Server and Tools Business and ran feature teams that shipped Windows, Windows Server, Azure, and Office 365. In 2011, he returned to Services as the Lead Architect of the hybrid cloud consulting team for the Americas.

In 2014, John joined Albemarle, a Fortune 1000 chemical company, as CISO and Director of IT Infrastructure. At Albemarle, he led the groups responsible for servers, networking, storage, security, and devices across Albemarle's >70 global locations, supporting >7000 users.

In July 2015, he had a unique opportunity to join a startup focused on the two technologies he's most passionate about, cloud and security. Twistlock is a company focused on securing containerized computing platforms like Docker and is doing ground breaking work on protecting the next generation of web scale computing. As CTO, John helps lead work with strategic customers and partners and drives the product roadmap.

John lives in Louisiana with his wife and two young sons. They love to run, scuba dive, and fish, and John also serves as Vice Chairman of the Board of Directors of the Coalition to Restore Coastal Louisiana (

Bill Munyan
Center for Internet Security

Andrew Nash
Confyrm, Inc
Andrew was Director of Identity Services at Google and Senior Director of Identity Service at PayPal. Andrew has developed consumer identity vetting and verified information systems, and as CTO for Trulioo, and as CTO at Sonoa Systems and Reactivity built XML and Web Services Gateways. As Director of Technologies at RSA Security, Andrew worked on a wide range of identity and security systems. Andrew has been a board member at the Open ID Foundation, Open Identity eXchange and the Information Card Foundation.He was recognized by InfoWorld as one of the "Top 25 Most Influential CTO's of 2006".

Amy Nelson
Engineering Technologist and Security Architect
Amy Nelson is an Engineering Technologist and Security Architect for Dell's Data Security Solutions team. Amy represents Dell within the Trusted Computing Group, chairing the PC Client Work Group and the Security Evaluation Work Group. In her role as Security Architect for Dell, Amy supports for Trusted Platform Module (TPM), encryption hardware, including Dell Data Protection | Hardware Crypto Accelerator and Self Encrypting Drives, and authentication hardware and software. Amy has participated in assurance activities within FIPS 140-2 and FIPS 201 validation schemes and Common Criteria for the last five years, serving as an editor for the TCG PC Client Specific Protection Profile for TPM 2.0, chairing working groups performing reviews of TCG specifications for FIPS and CC compliance issues, and presently serving as a Subject Matter Expert in the International Technical Community for the Collaborative Protection Profile for Full Disk Encryption. Amy has 20 years of experience in the PC industry and a B.S. in Electrical Engineering from Texas Tech University.

Bill Newhouse
NIST, National Initiative for Cybersecurity Education (NICE), National Cybersecurity Center of Excellence (NCCoE)

William D. Newhouse is a Cybersecurity advisor in the Computer Security Division, part of the Information Technology Lab at the National Institute of Standards and Technology. Mr. Newhouse's primary role is representing NIST in several collaborative efforts. Mr. Newhouse is part of the team at NIST leading the National Initiative for Cybersecurity Education (NICE). He represents NIST in a partnership with DHS and the financial sector to develop and test innovative Cybersecurity technologies and processes. Mr. Newhouse currently co-chairs the NITRD Cyber Security and Information Assurance Interagency Working Group (CSIA IWG) that just recently finished drafting a Strategic Plan for federal Cybersecurity research and development that will soon be available for public comment. Mr. Newhouse's role in the CSIA IWG also means that he will be part of the conversation regarding the S&T and R&D needs described in the National Strategy for Trusted Identities in Cyberspace (NSTIC). Mr. Newhouse is also a member of the Federal Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group, which is conducting a series of four Cybersecurity `assumption buster' workshops, starting in March 2011.

Before coming to NIST, William spent five years in the Office of the Secretary of Defense where he worked initially with the Director of Defense Research and Engineering (DDR&E) and then with the Assistant Secretary of Defense for Networks and Information Integration (NII) on Cybersecurity R&D issues and R&D portfolio management. Within (NII), William pushed the Defense Venture Catalyst Initiative (DeVenCI) to focus on Cybersecurity requirements, and he also led the effort to build a collaborative space known as IA Connect where Department of Defense Information Assurance or Cybersecurity professionals could learn what colleagues in the Department already know about Information Assurance vendors. Mr. Newhouse is a graduate of both the Georgia Institute of Technology and George Washington University and has been with the federal government for over 24 years.

Ronald L. Nielson
Department of Defense
Technical Director/SHARKSEER Program Manager
Mr. Ronald Nielson is the Technical Director for the SHARKSEER Program. In his current role, Mr. Nielson manages 25 civilian and contractor team members and is charged with leveraging emergent malware solutions to develop and respond to adversarial capabilities in real time.

Olivier Van Nieuwenhuyse
Senior R&D Engineer
Mr. Van Nieuwenhuyze currently serves as Senior R&D Engineer at STMicroelectronics. Within this role he has software architecture responsibilities for the NFC ecosystem and secure elements.

He joined STMicroelectronics in 2003 and since 1999 Mr. Van Nieuwenhuyze has been active in several smart card projects for banking, transport and near field communication.

Mr. Van Nieuwenhuyze currently serves as Chair of the Multi SE Working Group in GlobalPlatform's Card Committee and Chair of the Root of Trust Sub-Task Force with the Security Task Force.

Michael Ogata
Computer Scientist
Michael Ogata has worked for the National Institute of Standards and Technology(NIST) since 2005. During his tenure he has focused in digital forensics, specializing in mobile application forensics. Recently he has been supporting the Public Safety Communications Research effort at NIST to refine security requirements for mobile applications for first responders. Michael has a Bachelor of Science in Computer Science from the University of Maryland, Baltimore County.

Marcus Peinado
Microsoft Research
Marcus Peinado is an Architect in the Platform Infrastructure Group at Microsoft Research, Redmond. His interests include Operating Systems, Trusted Computing and System Security. His past and current projects in these areas include Hyper-V, Windows Media security, VC3 trusted MapReduce, Controlled Channel attacks and the MAS rootkit detector. Marcus holds a Ph.D. from Boston University.

Rene Peralta
Computer Scientist
René Peralta received a B.A. in Economics from Hamilton College in 1978. In 1980 he received a M.S. in Mathematics from the State University of New York at Binghamton. In 1985 he received a Ph.D. in Computer Science from the University of California at Berkeley. His publications are mostly in algorithmics and cryptology. Until 2005 he held teaching and research positions at various universities around the world. In that year he took a research scientist position at the National Institute of Standards and Technology. Currently he is at the Computer Security Division of NIST. He is involved in several projects of current relevance. These include SHA-3, the NIST Randomness Beacon, and the National Strategy for Trusted Identities in Cyberspace. His most active current research area is in circuit complexity and its applications to cryptographic protocols.

Kim Peretti
Alston & Bird, LLP
Partner, CISSP
Kim Peretti, CISSP, is a partner in the firm's Litigation & Trial Practice Group and co-chair of its Cybersecurity Preparedness & Response Team. Ms. Peretti is also a former director of PwC's cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section. She focuses her practice on managing complex, technical electronic investigations and responses, often resulting from cyber intrusions and data breaches. She also services a wide range of clients in matters of cybersecurity and cyber risk, including advising boards of directors and senior executives.

She is a faculty member of the Sedona Conference on Cyber Liability and an Advisory Board member of the Georgetown Law Cybersecurity Institute, and has served as a board advisor to the Financial Services Information Sharing and Analysis Center (FS-ISAC).

Wende Peters
Johns Hopkins Applied Physics Laboratory

Wende Peters is a member of the Principal Staff at the Johns Hopkins Applied Physics Laboratory and is the lead for APL's role as DHS and NSA trusted agent on Integrated Adaptive Cyber Defense. Ms. Peters previously served on behalf of the Government as the Lead Systems Engineer for Active Cyber Defense at NSA/IAD, and Lead Systems Engineer for CNCI-5 for NSA and DHS. She was the Technical Director for the National Information Assurance Engagement Center, a joint assessment and demonstration effort between NSA and DOD, and was a primary developer of the Mission-based Assessment methodology. Prior to transitioning to cyber, Ms. Peters was supervisor of APL's Ship Systems Engineering and Integration group and served as the US Navy's Chief Engineer for the Tactical Tomahawk Weapons Control System. Ms. Peters has a Bachelor's degree in Mathematics and a Master's degree in Applied Computer Systems.

Tim Polk
The White House
Assistant Director for Cybersecurity, Office of Science and Technology Policy
Tim Polk is the Assistant Director for Cybersecurity at the Office of Science and Technology Policy, where his responsibilities include cybersecurity R&D coordination, cybersecurity workforce development, and high performance computing. Tim joined OSTP in October 2012 after a thirty year career at the National Institute of Standards and Technology. He began his NIST career exploring computer networks and developing electronic publishing standards, then joined NIST's computer security division in 1989. Initially, he performed research in integrity models, security tools for system administrators, and computer viruses. The majority of his career has been focused on public-key infrastructure (PKI), contributing to the development of numerous Internet Engineering Task Force (IETF) PKI standards as an author, reviewer, and as co-chair of the IETF's Public Key Infrastructure using X.509 (PKIX) working group. Tim was a key contributor in the design and deployment of the Federal PKI, and helped establish the Bridge CA concept to implement what is now known as a federated trust model. As one of the authors of FIPS 201, Personal Identity Verification, Tim helped realize the government-wide identity credentials envisioned by HSPD-12. Tim also served four years on the IETF's Internet Engineering Steering Group (IESG) as one of two Area Directors for Security. Tim is co-author of the book "Planning for PKI", and has degrees in Computer Science and Electrical Engineering from University of Maryland.

Hemma Prafullchandra

Stephen Quinn
Senior Computer Scientist & Program Manager
Stephen Quinn is a senior computer scientist at the National Institute of Standards and Technology (NIST). He is a NIST program manager and supervisor.

Prior to joining NIST, Steve worked as consultant to the Department of Defense and large commercial outsourcings with Wall Street banking firms and insurance companies. Specifically, he comes from an operational background, having owned a company that provided services offering for vulnerability assessments, designing security architectures, code development, C&A, and ST&Es. His research experience includes cyber physical systems, computer viruses, intrusion detection systems (IDSs), vulnerability/misconfiguration identification, categorization, and remediation. He co-originator of the Security Content Automation Protocol (SCAP) with his NIST colleague Peter Mell. Steve also oversees the NIST National checklist program located at and the FDCC/USGCB initiatives at

Jenise Reyes-Rodriguez
Computer Scientist
Miss Jenise Reyes-Rodriguez is a computer scientist at the National Institute of Standards and Technology in Gaithersburg, MD. Jenise received her Bachelor's Degree in Computational Mathematics from the University of Puerto Rico at Humacao. She has been working in the Information Technology field for about 9 years and she is currently a member of the Computer Forensic Tool Testing Project (CFTT) where her main focus is Mobile Forensics.

David Ries
Joval Continuous Monitoring
David is a co-founder of Joval Continuous Monitoring ( where he leads business development efforts for their flagship product: Joval, an embeddable cross-platform SCAP 1.2 engine for enterprises and ISVs.

David and the Joval team have made significant contributions to SCAP including: serving on the OVAL board, authoring the JunOS and NETCONF schemas as well as dozens of OVAL tests; designing new governance models for the OVAL repository and language; and regularly presenting at OVAL developer conferences.

David also serves as CTO and lead engineer for, an enterprise-class implementation of the Open Checklist Interactive Language specification.

Dr. Charles Romine
Director of the Information Technology Laboratory
Charles Romine is Director of the Information Technology Laboratory (ITL). ITL is one of six research Laboratories within the National Institute of Standards and Technology (NIST) with an annual budget of $120 million, more than 350 employees, and about 160 guest researchers from industry, universities, and foreign laboratories.

Romine oversees a research program designed to promote U.S. innovation and industrial competitiveness by developing and disseminating standards, measurements, and testing for interoperability, security, usability, and reliability of information systems, including cybersecurity standards and guidelines for Federal agencies and U.S. industry, supporting these and measurement science at NIST through fundamental and applied research in computer science, mathematics, and statistics. Through its efforts, ITL supports NIST's mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Within NIST's traditional role as the overseer of the National Measurement System, ITL is conducting research addressing measurement challenges in information technology as well as issues of information and software quality, integrity, and usability. ITL is also charged with leading the nation in using existing and emerging IT to help meet national priorities, including developing cybersecurity standards, guidelines, and associated methods and techniques, cloud computing, electronic voting, smart grid, homeland security applications, and health information technology.

Romine received his Ph.D. in Applied Mathematics from the University of Virginia and his B.A. in Mathematics from the University of Virginia.

Ron Ross, Ph.D
NIST Fellow
Ron Ross is a Fellow at the National Institute of Standards and Technology (NIST). He currently leads the Federal Information Security Management Act (FISMA) Implementation Project, which includes the development of key security standards and guidelines for the federal government, contractors, and the United States critical infrastructure. He has authored numerous cyber security publications and is the principal architect of the NIST Risk Management Framework. Dr. Ross also leads the Joint Task Force Transformation Initiative Working Group, a joint partnership with NIST, the Department of Defense, and the Intelligence Community, to develop a unified information security framework for the federal government. A graduate of the United States Military Academy at West Point, Dr. Ross served in a variety of leadership and technical positions during his twenty-year career in the United States Army. Dr. Ross holds both Masters and Ph.D. degrees in Computer Science from the United States Naval Postgraduate School specializing in artificial intelligence and robotics.

Robert Rounsavall
Trapezoid Inc.
Robert is an expert in the development and deployment of security architecture for cloud computing platforms, especially in the Infrastructure as a Service (IaaS) area for large enterprise and federal government customers. Throughout his career, Robert has designed and built a 24x7 secure operations centers (SOCs) for commercial and federal customers. He's built and deployed multi-tenant security for virtualized hosting and cloud infrastructure customers. His experience also includes working many large incident response engagements; developing a Secure Executive Communication Platform that provided secure email, chat and voice for an extremely large financial institution; developing a patented portable large-scale, remotely-deployable network security system. Robert is published as a contributing author in the Computer and Information Security Handbook ISBN: 978-0123743541, contributor to the Open Data Center Alliance Provider Assurance Usage Model, and was an early adopter of the CCSK (Certificate of Cloud Security Knowledge) He served 12 years in the military where he was a Navy Cryptologic Chief.

Tony Sager
The Center for Internet Security
Senior VP and Chief Evangelist
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the Critical Security Controls, a worldwide consensus project. His 'volunteer army' cuts across all segments of the industry to identify, validate, and share best practices in cybersecurity that will stop the vast majority of attacks seen today. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute.

Tony retired from the National Security Agency in June 2012 after 34 years as an Information Assurance professional.. Tony led the Systems and Network Attack Center, oversaw all Red and Blue Team projects, established and led security product evaluation teams, helped guide the agency's top talent development programs, served as the founding chief of the Vulnerability Analysis and Operations Group, and retired as the Chief Operating Officer for the Information Assurance Directorate.

Matt Scholl
Chief of the Computer Security Division
Matthew Scholl is the Chief of the Computer Security Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). His responsibilities include cryptographic standards used by the US Government and internationally, Cybersecurity Research and Development, and Standards and Guidelines for Federal Agency Security Programs. He also leads NIST participation with Cybersecurity National and Internationals Standards Development Organizations (SDOs) and associated conformance testing programs.

Mr. Scholl has a Masters Degree and Bachelors Degrees in computer science and information systems from the University Of Maryland and the University of Richmond. He is a US Army veteran and has over 20 years of federal service.

Adam Sedgewick
Senior IT Policy Advisor
Adam Sedgewick serves as Senior Information Technology Policy Advisor at the National Institute of Standards and Technology. In this role, Adam represents NIST on the Department of Commerce's Internet Policy Task Force and advises NIST leadership on cybersecurity issues. Previously, Adam was Senior Advisor to the Federal Chief Information Officer Council, developing and coordinating cross-agency initiatives and assisting in the implementation of government wide policy.

Adam served as Professional Staff Member for the Senate Committee on Homeland Security and Governmental Affairs for nine years, handling cyber security and federal information technology policy. In 2008 and 2013, Sedgewick received the Fed 100 award for his contributions to the Federal information technology community and both BankInfoSecurity and GovInfoSecurity named Sedgewick a "Top Ten Influencer" for 2014. He was also awarded the 2014 AFCEA Government-Wide Initiatives Excellence Awards for Security, and was named one of Security Magazine's Most Influential People in Security for 2014

Greg Shannon
The White House
Office of Science and Technology Policy
Greg Shannon is the Assistant Director for Cybersecurity Strategy at the White House Office of Science and Technology Policy in the National Security and Internatinal Affairs Division.

Shannon is also the Chief Scientist for the CERT(r) Division at Carnegie Mellon University's Software Engineering Institute, a federally funded research and development center (FFRDC). He works to expand the division's research results, impact, and visibility. Outside of CERT, he works to influence national and international research agendas by promoting data-driven science for cybersecurity.

Shannon recently served as the Chair of IEEE's Cybersecurity Initiative, and he cofounded the Workshop on Learning from Authoritative Security Experiment Results (LASER). Prior to joining CERT, Shannon was Chief Scientist at two startups working on statistical anomaly detection in sensor streams, the science of cybersecurity, and insider threats. In earlier positions, he led applied research and development in cybersecurity and data analysis at Lucent Technologies, Lumeta, Ascend Communications, Los Alamos National Laboratory, Indiana University, and his own startup company. Shannon received a BS in Computer Science from Iowa State University with minors in Mathematics, Economics, and Statistics. He earned his MS and PhD in Computer Sciences at Purdue University, on a fellowship from the Packard Foundation. He is a member of ACM and a Senior Member of IEEE.

Martin Stanley
Department of Homeland Security

Martin Stanley is the Branch Chief of the Cybersecurity Assurance Branch and the Cybersecurity Performance Management Branch at Office of Cybersecurity and Communications at the Department of Homeland Security. In this role Martin leads the assessment and reporting of civilian federal agency cybersecurity programs and performance under FISMA. While at DHS Martin has led the development of the CDM Phase II technical requirements and serves as the co-chair of the Information Security Continuous Monitoring sub-working group of the Federal CIO Council. Martin previously led the Information Security Program at the Food and Drug Administration where he oversaw world-wide enterprise information security for 300+ applications and 2 modern data centers serving 17000+ employees and contractors. Prior to his federal service Martin held executive leadership positions at Vonage and UUNET Technologies.

Robert Staples
IT Specialist
Robert Staples is an IT specialist at the National Institute of Standards and Technology. His past work has included research into the effects of large-scale virtualization on software entropy sources, and will be published in the near future. He is currently working with Dr. Apostol Vassilev on research focused on evaluating the concept of a public service providing provably cryptographically-secure entropy to networked devices. He holds a B.S. in Computer Science from Hood College."

Kevin Stine
Manager, Security Outreach and Integration Group
Kevin Stine is the Manager of the Security Outreach and Integration Group in NIST's Computer Security Division. The group focuses on the mission-specific application of security standards, guidelines, and technologies to help organizations manage cybersecurity risk. Kevin also co-led development of the Framework for Reducing Cyber Risk to Critical Infrastructure which was developed in response to Executive Order 13636.

Michael Stone
Senior Security Analyst
Mike Stone is a senior security analyst at the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology. The NCCoE collaborates with members of industry, government and academia to build open, standards-based, modular and practical example reference designs that address cybersecurity challenges in key economic sectors. The center benefits from formal partnerships with market leaders including several Fortune 50 companies.

Since starting at the NCCoE in August 2013, Mike has been the program manager for the center's activities involving the financial sector. Mike collaborates with members of the financial sector and security vendors to develop solutions to complex cybersecurity problems.

Mike has been working in cybersecurity since 2000 and in other computer related fields since 1989. He has held positions in management, development, testing and support. Mike has a bachelor's degree in Computer Science from the University of Maryland and a master's degree in Telecommunications and Computers from the George Washington University. Mike has focused on wireless network security since 2003 and has tested devices, written software, developed architectures and installed components.

Richard Struse
U.S. Department of Homeland Security
Chief Advanced Technology Officer
Mr. Struse serves as the Chief Advanced Technology Officer for the U.S. Department of Homeland Security's National Cybersecurity and Communications Integration Center (NCCIC) where he is responsible for technology vision, strategy and implementation in support of the NCCIC's mission. Mr. Struse is the creator of the STIX and TAXII automated information sharing initiatives which have been widely adopted across the public and private sectors. In October 2014, Secretary of Homeland Security Jeh Johnson presented Mr. Struse with one of the department's highest honors, the Secretary's Award for Excellence, in recognition of his pioneering work on STIX and TAXII.
Prior to joining DHS, Mr. Struse was Vice President of Research and Development at VOXEM, Inc., where he was responsible for the architecture, design and development of a high-performance, extreme high-reliability communications software platform that is in use in telecommunications systems around the world. He began his technical career at Bell Laboratories where his work focused on tools to automate software development and the UNIX operating system.

In 2015 Mr. Struse was named by Federal Computer Week as one of the "Federal 100" in recognition of his leadership role in the development of cyber threat intelligence technology standards.

D. Renee Tarun
National Security Agency
Deputy Chief of the Cyber Task Force
Ms. Tarun is the Deputy Chief for the National Security Agency's Cyber Task Force.
Immediately prior, she served as the Assistant to the Chief Operating Officer of the Information Assurance Directorate at the National Security Agency. Her focus areas include strategy, planning, integration, and relationship management, in cybersecurity and related disciplines.

Ms. Tarun has served as a Cyber Strategist in a joint Defense Department-Homeland Security Department organization for orchestrating coordinated joint efforts in operational planning, policy and strategic development, and identification of gaps and solutions for cyber issues.

Ms. Tarun served as the Protect Data and Networks and Operational Resiliency Portfolio Lead for the Deputy Assistant Secretary of Defense for Information and Identity Assurance.

Previous assignments include serving as a computer scientist, information technologist, and a variety of policy, program management, and resource jobs.

Ms. Tarun is married with two children.

Mark Tehranipoor
University of Florida

Mary Theofanos
Computer Scientist
Mary Theofanos is a Computer Scientist with the National Institute of Standards and Technology's Materials Measurement Laboratory where she performs research on usability and human factors of systems. Mary is the principal architect of the Usability and Security Program evaluating the human factors and usability of cyber security and biometric systems. She established the Biometrics Usability Program for the federal government, the first open research program to incorporate usability into biometrics research, elevating usability to a recognized critical component of biometrics research and developing standards for ISO. Before joining NIST, she was the Manager of the National Cancer Institute's (NCI) Communication Technologies Research Center (CTRC) a state-of-the-art usability testing facility for web sites, applications, and emerging technologies, as well as a training facility and collaborative design center. She spent 15 years as a program manager for software technology at the Oak Ridge National Laboratory complex of the U.S. Department of Energy.

Matthew Thompson
Matthew Thompson is a creator/shaper, intellectual athlete, and leader. Matt served in the military for eleven years, to include four combat deployments to Iraq and Afghanistan, as a member of the elite Army Rangers and the 101st Airborne Division, where he received numerous decorations for valorous and exemplary leadership. Upon separation from the military, Captain Thompson attended Harvard Business School to obtain an MBA. His business experience includes employment with McKinsey & Company, Goldman Sachs,, and HealthIDx. Matt is currently on the Board of Directors and Chair of the Management Council of the Identity Ecosystem Steering Group, a private sector-led steering group chartered under the National Strategy for Trusted Identities in Cyberspace to administer the development and adoption of the Identity Ecosystem Framework.

Ryan Trost
ThreatQuotient, Inc.
Co-Founder and CIO
Ryan Trost, co-founder and CIO at ThreatQuotient, has over 15 years of security experience focusing on intrusion detection and cyber intelligence with specialized insights into computer network defense (CND) operations. He is a recognized thought leader in the cyber industry through conference speaking engagements including BlackHat, DEFCON, SANS, and ISACA ISRM, as well as, published author of Practical Intrusion Analysis. He developed one of the first geospatial intrusion detection algorithms used to identify geoip-based attack patterns. Ryan has successfully managed several large 35+ DIB and USG SOC teams by focusing on forward-leaning techniques for detecting and responding to nation-state adversaries; structuring and automating the IOC lifecycle; and fusing Intel from non-traditional sources.

Brian Turner
IBM BigFix Development
Program Manager
Brian Turner is currently a senior development manager on the IBM Bigfix development team as well as the IBM representative to the ISO/JTC1 SC7 WG 21 (IT Asset Management). Day to day responsibilities include development deliverables, customer support and planning for the Bigfix Inventory and Bigfix Compliance products. Prior to joining the Bigfix team, he held several key software development jobs in IBM focusing on enterprise network and security related products. Brian enjoys working with customers and partners to solve today's complex business problems and innovate for the future.

Andy Ubel
The Valspar Corporation
Chief Intellectual Property Counsel & Chair of Information Security Council
Andy Ubel started his working career as a research scientist for 3M where he is a named inventor on over 25 patents. He has a B.S. in Chemical Engineering ( MIT 1981), and a M.S. in Mat. Sci. (Univ. of MN 1986). After happily slaving away in the 3M labs for about ten years, he made a career change and went to law school to became a patent attorney. Andy joined Valspar in 2000 as their Chief Intellectual Property counsel, where he has responsibility for Valspar's global patent, trademark, copyright and trade secret matters. These matters span the globe and Andy has been involved in litigation cases in nearly every jurisdiction of the world. Since March of 2009 Andy has been responsible for managing Valspar's Information Security efforts. He developed a risk-based scorecard for assessing information security efforts and has been working to implement better security awareness throughout a large multi-national organization.

Apostol Vassilev
NIST/ITL/Computer Security Division
Technical Director, Cryptographic Module Validation Program
Dr. Vassilev is a Research Team Lead in the Security Testing Validation & Measurement Group and the Technical Director of the Cryptographic Module Validation Program at NIST. He works closely with academia, industry and government agencies on the development and adoption of novel approaches to cybersecurity testing and measurement. Dr. Vassilev also interacts with vendors and the accredited testing laboratories participating in the Cryptographic Validation Program at NIST to validate modules under the FIPS 140-2 Federal information security standard.

Dr. Vassilev holds a Ph.D. in Mathematics. He holds five US patents and has authored over thirty papers in leading scientific journals.

Grant Wagner
Technical Director of Trusted Systems Research
Mr. Wagner has worked at the National Security Agency in the information assurance field for over 30 years, the last fifteen in research. He is currently the Technical Director of the Trusted Systems Research Group. He is responsible for the content and quality of the information assurance research effort at the NSA in addition to his own research interests in security architectures and secure operating systems. Before coming to the research organization, Mr. Wagner was a major contributor to the US Government's efforts to create national and international computer security evaluation criteria.

David Waltermire
Lead Standards Architect
David Waltermire is the Lead Standards Architect for the Security Automation Program at the National Institute of Standards and Technology. He has been a significant contributor to the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP), Continuous Monitoring and other security automation projects. He represents the NIST Security Automation Program to advance standards in a number of international, consensus standards development organizations including the Internet Engineering Task Force (IETF), the International Organization for Standardization (ISO), and the Trusted Computing Group (TCG).

Prior to joining NIST, he worked as a security consultant advancing security automation capabilities within the government sector. His background is in systems and network operations for internet service providers and also working as a software engineer designing and developing distributed systems. His research experience includes incident handling, continuous monitoring, vulnerability/misconfiguration identification, reporting, categorization and remediation.

Shawn Webb
G2, Inc
Security Engineer
Shawn Webb joined G2 in January 2015, coming from Cisco Talos before joining G2. He is a skilled security enthusiast, cofounding HardenedBSD and working in his spare time as a lead security engineer and software engineer. Shawn co-implemented ASLR along with an increasing amount of exploit mitigation techniques in HardenedBSD.

W. Preston Werntz
U.S. Department of Homeland Security
Chief, National Cybersecurity and Communications Integration Center (NCCIC) Technology Services Section
Mr. Werntz serves as the Chief of the Technology Services Section for the U.S. Department of Homeland Security's National Cybersecurity and Communications Integration Center (NCCIC) where he leads a team responsible for providing operations support, technology planning and technology development. In addition, Mr. Werntz is currently the lead for the Automated Indicator Sharing initiative, which seeks to maximize the near-real-time dissemination of all relevant and actionable cyber threat indicators among the private sector and Federal Departments and Agencies. Prior to joining DHS, Mr. Werntz was co-founder of Newbrook Solutions, Inc. where he supported the Intelligence Community and Department of Defense as a system architect and software development team lead.

Roger Wigenstam

Joe Wolfkiel
Secure Configuration Management Branch Engineering Lead
Joe Wolfkiel is charged with product integration and portfolio engineering oversight for tools acquired by the Department of Defense (DoD) to assess and enforce device and network security policies. He works to establish, implement, visualize, and enforce standardized security configurations across the DoD through integration of a set of government-built and commercial tools. Starting in 2006, Joe has been an active member in creating and evolving NIST standards such as the Common Platform Enumeration (CPE), Asset Reporting Format (ARF), and Asset Summary Results (ASR) which are focused on software labeling and associating compliance results with installed operating system and application software. Since 2010, Joe has overseen the design and implementation of DoD software and compliance reporting capabilities that currently feed a DoD enterprise repository that contains data on over 1 million devices.

Bradley J. Wood
G2, Inc.
Senior Scientist
Bradley Wood is a Senior Scientist and research engineer at G2, Incorporated, Annapolis Junction MD. Brad began his career at Sandia National Labs where he became a Distinguished Member of the Technical Staff and Program Manager for the Information Design Assurance Red Team. In 2000, he joined SRI International where he was the Program & Facilities Manager for the Cyber Defense Research Center. In 2003, Brad joined BBN Technologies and became Division Engineer and Tech Director, focused on research for the Defense and Intelligence communities. Brad's research focus has always been on improving cyber defense, first by simulating sophisticated adversaries and then developing countermeasures for advanced persistent and insider threats. His current research interest is effective countermeasures for sophisticated malware.

John Wunder

Raghu Yeluri
Intel Corporation
Principal Engineer
Raghu Yeluri is a Principal Engineer and lead Security Solutions Architect in the Data Center & Cloud Products Group at Intel Corporation with focus on container, virtualization and cloud security usages, solution architectures and technology initiatives. In this role, he drives security solution Pathfinding and development to deliver hardware-assisted security solutions that enable deep visibility , orchestration and control in private and public Clouds. He is a frequent presenter at technical conference like OpenStack Summit, Intel Developers Forum, VMWorld, etc on Security. Prior to this role, he has worked in various engineering and architecture positions in systems development and deployment, focusing on service-oriented architectures and large data analytics, in Information Technology and Manufacturing Technology groups during the last 15+ years at Intel. Raghu has multiple patents filed in security, attestation and control in virtualization and cloud computing, and has co-authored two books on cloud computing and cloud security.

Back to the Top