Date: Thu, 28 Mar 2024 20:54:04 +0000 (UTC) Message-ID: <115546988.6993.1711659244228@ip-10-10-7-29.ec2.internal> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_6992_1026130756.1711659244227" ------=_Part_6992_1026130756.1711659244227 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
Last reviewed: May 2018=
=
If your group or institution would be interested in a FREE presentation = utilizing our Information Security Awareness Speakers Bureau for your next = meeting or campus event, these are the experts who have expressed interest = in providing brief presentations on any of the following topics. Please fee= l free to contact the speaker(s) of your choice directly. For assistance in= contacting a speaker, e-mail the Higher Education Information Security Cou= ncil at security-council@educause.edu.
In addition to the list of available speakers, we've provided a basic set of guidelines for a good presen= tation below.
Note: Please remember that travel expenses may be the responsibility= of an institution inviting any out-of-town speaker(s). It is up to the ins= titution and speaker(s) to negotiate any travel terms.
Jon Allen
Assistant Vice President & Chief Information Security Officer
Baylor University
Waco, TX
Topics: Security Awareness, General Information Security Issues, Encryptio=
n, Policy, PCI-DSS, Forensics
Jon_Allen@baylor.edu
Josh Beeman
Executive Director of Information Security & University Information Sec=
urity Officer
University of Pennsylvania
Philadelphia, PA
Topics: General Information Securit=
y issues, Awareness and Training, Incident Handling, Building an Informatio=
n Security Program and Successful Information Security Teams, IT Security G=
overnance, Incident Management, Compliance, Security Policies, Standard Sec=
urity Frameworks and Regulations (e.g., NIST 800-53, ISO 27000 series, Crit=
ical Security Controls, etc.), Risk Assessment programs, Information Securi=
ty Futures and implications
jbeeman@isc.upenn=
.edu
Note: This speaker is willing to travel out of town if travel and expenses are paid.
Daniel Bennett
Manager of IT Security
Pennsylvania College of Technology
Williamsport, PA
Topics: Security Awareness, General Security Information, Security In-dept=
h, Mobile Device Security, Security Concepts & Design, Malware, Threat =
Protection
dbennett@pct.edu
Note: This speaker=
is willing to travel within 50 miles each way. He can travel further based=
on scheduling and if other organizations are willing to pay travel and exp=
enses.
Sol Bermann
Privacy Officer and IT Policy, Compliance and Enterprise Continuity Strate=
gist
ITS - Information & Infrastructure Assurance
University of Michigan
Topics: Information privacy; privacy/security education and awareness; Brin=
g-your-own-device; cloud computing privacy/security/compliance; export cont=
rol (ITAR/EAR) compliance; IT/Security policy
solb@umich.edu
Kelley Bogart
Senior Information Security Specialist
University of Arizona
Tucson, AZ
Topics: Security Awareness, General Information Security Issues, PCI Compl=
iance, Governance
bogartk@email.arizona.edu<=
br>Note: This speaker is willing to travel out of town if travel and ex=
penses are paid.
John Bruggeman
Director of Information Systems
Hebrew Union College - Jewish Institute of Religion
Cincinnati, OH
Topics: Security Awareness, Information Security Guide, Small School Focus=
john@huc.edu
Note: This speaker is willing to tra=
vel if travel and expenses are paid.
Petr Brym
Assistant Chief Information Security Officer
University of California, Davis
Davis, CA
Topics: Building a Security Program, Developing October Cyber Security Eve=
nts and Materials
prbrym@ucdavis.edu
John Christly
Chief Information Security Officer/HIPAA Security Officer
Nova Southeastern University
Davie, FL
Topics: Cyber Security Awareness, Cloud Security, Mobile Device Securi=
ty, Forensics and eDiscovery, Managed Security Solutions, Threat Protection=
, Internal Auditing, Risk Assessments, Vulnerability Assessments, Penetrati=
on Testing, Fraud Auditing, Vendor Management, Compliance strategies (HIPAA=
, PCI, FERPA, FIPA, GLBA), ISO and NIST.
jchristly@gma=
il.com
Note: This speak=
er is willing to travel if expenses are covered.
Tammy L. Clark
Chief Information Officer
The University of Tampa
Tampa, FL
Topics: Information Security Governance (ISO 27000), Risk Manag=
ement, Cloud Security Issues, ERP/EA SaaS selection/implementation (informa=
tion security considerations); third party oversight, contract and security=
reviews; data protection; designing a robust security architecture; develo=
ping an effective information security program; Compliance strategies (HIPA=
A, PCI, GLBA, HEOA); gaining executive support for information security pro=
grams; translating your message for Higher Ed executives (and more..)
tclark@ut.edu
Note: This speaker=
is willing to travel if expenses are covered.
David Escalante
Director of Computer Policy & Security
Boston College
Chestnut Hill, MA
Topics: Security Awareness, General Information Security Issues, Security =
Policy
david.escalante@bc.edu
Note: This=
speaker is willing to travel; reimbursement for expenses related to travel=
is negotiable.
Greg Hedrick, CISSP
Chief Information Security Officer
Purdue University
West Lafayette, IN
Topics: IT Security Tools and Techniques, Incident Response, Roles in Info=
rmation Security
hedrick@purdue.edu
Note: Th=
is speaker is willing to travel within 50 miles each way. He can travel fur=
ther based on scheduling and if other organizations are willing to pay trav=
el and expenses.
Hendra Hendrawan
Senior Information Security Analyst
York University
Toronto, Ontario, Canada
Topics: Security Awareness, General Information Security Issues, PCI DSS, =
IPS, IDS, Incident Handling
hendra@yorku.ca
Not=
e: This speaker is willing to travel if expenses are paid.
Cathy Hubbs, CISSP, CISA, CGEIT
Chief Information Security Officer
American University
Washington, DC
Topics: Security Awareness, General Information Security Issues, Getting P=
olicies Sanctioned, Data Stewardship
hubbs@american.edu=
Kathleen R. Kimball, MS, CISSP, CISM
Senior Information Technology Auditor
Audit Department
University of Virginia
Charlottesville, VA 22903
Topics: Security Awareness, General Information Security Issues
krk6p@eservices.virgin=
ia.edu
Note: This speaker is w=
illing to travel. If out of state, reimbursement for expenses would be requ=
ired.
Jim Lowe
Chief Information Security Officer
University of Wisconsin-Madison
Madison, WI
Topics: General Information Security Issues, PCI compliance, Security Poli=
cies, Security Strategy
lowe@wisc.edu
Randy Marchany
Chief Information Security Officer
VA Tech
Blacksburg, VA
Topics: Security Awareness, General Information Security Issues, Privacy, =
Policies, Cloud Computing Security, Internet Threats, Mobile Device Securit=
y, Security Operations Centers, Sensitive Data Security, US Cyber Challenge=
marchany@vt.edu
Note: This speaker is willing =
to travel if expenses are covered.
Wyman Miles
Chief Information Security Officer
Cornell University
Ithaca, NY
Topics: Security awareness, general information security issues, confident=
ial data discovery and cleanup, building an information security program, e=
ncryption
wm63@cornell.edu
Note: This speaker =
is willing to travel if expenses are covered.
Sarah Morrow
Health Sciences Center (HSC) Privacy Officer
University of New Mexico
Albuquerque, NM
Topics: General privacy issues
smorrow2@unm.edu
<=
em>Note: This speaker is willing to travel if expenses are covered, at leas=
t in part.
Todd Plesco
President
Information Security Pro
Irvine, CA
Topics: Developing an Information Security Program, Managing Access Contro=
ls, Incident Management, Compliance, Awareness & Training, Security Pol=
icies, HIPAA, IT Security Governance, Business Continuity
todd.plesco@infosecurity.pro
Note: This speaker is =
willing to travel if travel/lodging expenses are covered.
Kathleen Roberts
Principal
iSecure Solutions
Dresher, PA
Topics: Security Awareness, General Information Security Issues
kathleen@isecuresolutions.com
Note: This sp=
eaker is willing to travel out of town if travel expenses are reimbursed.=
em>
Sean Sweeney
Chief Security Advisor, Enterprise Cybersecurity Group
Microsoft
Pittsburgh, PA
Topics: Security Awareness, General Information Security Issues, Strategic =
Information Security
sesweene@microsoft.com
Joe St Sauver, Ph.D.
Courtesy Associate Professor, Network Startup Resource Center, Univ =
of Oregon
Scientist, Farsight Security, Inc.
Senior Technical Advisor, Messagin=
g, Malware and Mobile Anti-Abuse Working Group (M3AAWG)
Topics: Spam and Messaging Securit=
y, Malware and Bots, Security of the Domain Name System and DNSSEC, IPv6 an=
d Security, BGP Route Injection, Disaster Recovery and Continuity of Operat=
ions, Cloud Computing Security, Mobile Device Security, Security Policies, =
Passwords and Authentication, Data Driven Approaches to Security, Cyber Cri=
me, Cyber War, Cyber Terrorism and Cyber Espionage, SCADA Security, CALEA a=
nd Lawful Intercept, Privacy
jjoe@stsauver.com
https://www.stsauver.com/joe/
Note: This speaker is willing to consider traveling for speaking events d=
epending on scheduling, provided actual expenses can be covered.
Kent Wada
Chief Privacy Officer and Director, Strategic IT Policy
UCLA
Los Angeles, CA
Topics: Privacy as an enabler of academic and intellectual freedom; distin=
guishing between different forms of privacy, between privacy and informatio=
n security, and between privacy and compliance; governance models for priva=
cy; privacy and security policy development.
kent@ucla.edu=
a>
Note: This speaker is willing to travel if expenses are covered.<=
/em>
Ben Woelk
Information Security Program Manager
Rochester Institute of Technology
Rochester, NY
Topics: Developing a Security Awareness Program, Digital Self Defense (gen=
eral audience), Security Policies, Developing Security Training, Introverte=
d Leadership
ben.woelk@rit.edu
Note: This spe=
aker is willing to travel if expenses are covered.
Whether you're preparing a proposal, = designing and delivering your session, deconstructing evaluations, or promo= ting your work for colleagues and management, the EDUCAUSE Presenter Concierge<= /span> has a tool to help you every step= of the way.
The following tips are suggestions only and they are not intended to cha= nge your approach if you already have a proven methodology to prepare for p= resentations.
Back to Top
Questions or= comments? Contact us.
Except wher= e otherwise noted, this work is licensed under a Creative Commons Attributi= on-NonCommercial-ShareAlike 4.0 International License (= CC BY-NC-SA 4.0).