1 Mark Bregman Executive Vice President and Chief Technology Officer Symantec Corporation Mark Bregman is executive vice president and chief technology officer at Symantec, responsible for the Symantec Research Labs, Symantec Security Response and shared technologies, emerging technologies, architecture and standards, localization and secure coding, and developing the technology strategy for the company. Bregman guides Symantec s investments in advanced research and is responsible for the company s development centers in India and China. Tim Brown Vice President and Chief Architect for Security Management CA, Inc. Tim Brown is vice president and chief architect for Security Management at CA, Inc. With more than 20 years of information security expertise, Brown has been involved in many areas of security including threat research, vulnerability management, consumer and enterprise identity and access management, network security, encryption, compliance and managed security services. An avid inventor, Brown has 14 filed patents in the security field. He is active in promoting cross-industry initiatives and has participated on a number of standards boards. Additionally, Bregman leads the field technical enablement team, which works closely with the technical sales team to ensure they are prepared to assist customers in managing the impact of changing and emerging technical requirements. Bregman joined Symantec through the company s merger with Veritas Software, where he served as chief technology officer, responsible for cross-product integration, advanced product development, merger and acquisition strategy, and the company s engineering development centers in India and China. Prior to joining Veritas, Bregman was CEO of Airmedia, a wireless Internet firm. Previously, Bregman spent 16 years at IBM where he led the RS/6000 and Pervasive Computing divisions and held senior management positions in IBM Research and IBM Japan. He was also technical assistant to IBM CEO Lou Gerstner. Bregman holds a bachelor s degree in physics from Harvard College and a master s degree and doctorate in physics from Columbia University. He is a member of the Visiting Committee to the Harvard University Libraries, a member of the American Physical Society, and a senior member of IEEE. He also serves on the Board of Directors of ShoreTel and the Bay Area Science and Innovation Consortium. Brown earned a Bachelor of Science degree in computer science from Massachusetts College of Liberal Arts and continues his education with the Wharton School of Business Executive Education program. Scott Charney Corporate Vice President, Trustworthy Computing Microsoft Corporation Scott Charney serves as Microsoft s Corporate Vice President for Trustworthy Computing, Engineering Excellence, and Environmental Sustainability. Trustworthy Computing is Microsoft s effort to help ensure secure, private and reliable computing experiences for everyone. Before joining Microsoft in 2002, Charney was a principal for the professional services organization PricewaterhouseCoopers. At PricewaterhouseCoopers he led the firm s Cybercrime Prevention and Response Practice, providing computer security services to Fortune 500 companies and smaller enterprises. Before joining PricewaterhouseCoopers, he served as Chief of the Computer Crime and Intellectual Property Section in the Criminal Division of the U.S. Department of Justice. As the leading federal prosecutor for computer crimes from 6 BSA CyBerSeCurity Forum 2010
2 Charney started his professional career as an Assistant District Attorney in Bronx County, New York, ultimately serving as Deputy Chief of the Investigations Bureau. In addition to supervising 23 prosecutors, he developed a computer-tracking system that was later used throughout the city for tracking criminal cases. Charney has received numerous professional awards, including the John Marshall Award for Outstanding Legal Achievement in 1995 and the Attorney General s Award for Distinguished Service in He was elected to the Information Systems Security Association Hall of Fame in Among his other affiliations, he served on the American Bar Association Task Force on Electronic Surveillance, the Software Engineering Institute Advisory Board at Carnegie-Mellon University, and the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software. He currently co-chairs the CSIS Commission on Cyber Security. Eric Cole Senior Vice President and CTO, Americas McAfee, Inc. Dr. Eric Cole serves McAfee as the senior vice president and chief technology officer of the Americas. In this role, he is responsible for providing guidance for key technologists and evangelists in product development and the field, ensuring alignment, creative thought leadership, prototyping of new products/technology/research and longer range strategic vision. Cole is an industry-recognized security expert with over 20 years of hands-on experience. He has experience in information technology with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Cole is the author of several books, including Hackers Beware, Hiding in Plain Site, Network Security Bible, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards including Purdue University. Cole holds a master s degree in computer science from New York Institute of Technology (NYIT) and a PhD from Pace University with a concentration in information security. Cole lives in Northern Virginia with his wife and three kids and he enjoys competing in triathlons. Charney holds a law degree with honors from Syracuse University in Syracuse, N.Y., and bachelor degrees in History and English from the State University of New York in Binghamton. BSA CyBerSeCurity Forum to 1999, he helped prosecute major hacker cases and co-authored numerous documents, including the Federal Guidelines for Searching and Seizing Computers, the National Information Infrastructure Protection Act of 1996, the federal computer crime sentencing guidelines, and the Criminal Division s policy on appropriate computer use and workplace monitoring. He also chaired the Group of Eight nations Subgroup on High-Tech Crime, served as Vice Chair and Head of the U.S. delegation to the Ad Hoc Group of Experts on Global Cryptography Policy for the Organization for Economic Cooperation and Development (OECD), was a member of the U.S. delegation to the OECD s Group of Experts on Security, Privacy and Intellectual Property Rights in the Global Information Infrastructure, and was a member of the Clinton Administration s Information Infrastructure Task Force, serving on the Privacy Working Group that published principles for handling personally identifiable information.
3 Dr. Patrick Gallagher Director, US Department of Commerce National Institute of Standards and Technology Dr. Patrick Gallagher was confirmed as the 14th Director of the U.S. Department of Commerce s National Institute of Standards and Technology (NIST) on Nov. 5, Gallagher provides high-level oversight and direction for NIST. The agency promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology. NIST s FY 2009 resources total $1.6 billion and the agency employs about 2,900 scientists, engineers, technicians, support staff and administrative personnel at two main locations in Gaithersburg, Md., and Boulder, Colo. In addition to $819 million in FY09 appropriations and $125 million from other agencies, the American Recovery and Reinvestment Act of 2009 provides a total of $610 million to NIST for building critically needed research facilities, expanding fellowships and research grants, and addressing important national priorities critical to the nation s future. Gallagher had served as Deputy Director since Prior to that, he served for four years as Director of the NIST Center for Neutron Research (NCNR), a national user facility for neutron scattering on the NIST Gaithersburg campus. The NCNR provides a broad range of neutron diffraction and spectroscopy capability with thermal and cold neutron beams and is presently the nation s most used facility of this type. Gallagher received his Ph.D. in Physics at the University of Pittsburgh in His research interests include neutron and X-ray instrumentation and studies of soft condensed matter systems such as liquids, polymers and gels. In 2000, Gallagher was a NIST agency representative at the National Science and Technology Council (NSTC). He has been active in the area of U.S. policy for scientific user facilities and was chair of the Interagency Working Group on neutron and light source facilities under the Office of Science and Technology Policy. Leslie Harris President and CEO Center for Democracy and Technology Leslie Harris is the President and CEO of the Center for Democracy & Technology. She is responsible for the overall vision and direction serves as the organization s chief strategist and spokesperson. Since joining CDT, Harris has led a successful effort to expand the organization s capacity and reach. Under her direction, the organization has grown significantly, opened a West Coast office and launched an influential Health Privacy Project. She was also instrumental in the creation of the Global Network Initiative, a collaboration of leading Internet companies, human rights and free expression groups, investors and academics to protect and advance freedom of expression and privacy in the ICT sector. Harris is a member of the Steering Committee of Open the Government. She serves on the Advisory Committee on International Communications and Information Policy at the Department of State, on the Taskforce on the National Health Information Network at the Department of Health and Human Services and is a member of the Board of the Global Network Initiative. In 2009 she was named one of Washington s Tech Titans by Washingtonian magazine. Prior to joining CDT, Harris was the founder and president of Leslie Harris & Associates ( LHA ), a public policy firm committed to harnessing the power of new information technologies for public good. In that capacity, Harris played a lead role in landmark Internet legislation ranging from the E-rate program, which brought the power of the Internet to rural and inner city classrooms and public libraries to the Children s Online Privacy Protection Act ( COPPA ) which mandated a privacy regime for children s personal information on the Internet. Prior to establishing Leslie Harris & Associates, Harris served in senior leadership positions in two prominent civil liberties organizations. She was the Director of Public Policy for People for the American Way, ( PFAW ) where she directed the organization s public policy program and served as a national spokesperson for the organization. Earlier, she served as the Chief Legislative Counsel for the Washington National Office of the American Civil Liberties Union. 8 BSA CyBerSeCurity Forum 2010
4 Admiral (Ret.) Elizabeth A. Hight Vice President, US Defense Command and Control Infrastructure Practice Hewlett-Packard Company Admiral (Ret.) Betsy Hight is the first director of the HP Enterprise Services US Defense Command and Control Infrastructure practice, which is designed to assist US defense clients in transforming their IT environments. Adm. Hight leads the effort to combine HP s knowledge of best in class technology solutions with her deep understanding of warfighters expectations for mission-relevant information, enabling HP to more clearly align its product, services and delivery offerings to the information needs of our clients. Previously, Adm. Hight served as the acting Director of Defense Information Systems Agency (DISA) and Commander of the Joint Task Force Global Network Operations (JTF GNO) from July until December She served as the vice director of the DISA, a worldwide organization of more than 6,600 military and civilian personnel responsible for planning, developing, and providing interoperable, global net-centric solutions that serve the needs of the President, Secretary of Defense, Joint Chiefs of Staff, the combatant commanders, the Military Departments and other US Department of Defense (DoD) components from April 2007 until her retirement. Adm. Hight also served as DISA s Principal Director for Operations and Deputy Commander, JTF GNO from 2005 to As Director of Operations, she was responsible for providing command, control, communications, and computer support to the nation s warfighters. As Deputy Commander, JTF-GNO, Adm. Hight was responsible to United States Strategic Command (USSTRATCOM) for directing the operation and defense of the Global Information Grid (GIG). Adm. Hight joined the Navy in March Her first duty station was Naval Communications Area Master Station Western Pacific, Guam, where she was the High-Frequency Receiver Site Division Officer. During her career in the Navy, Rear Adm. Hight served in many roles, including program sponsor for the UHF Satellite Communications Program on the CNO staff, Executive Officer of the Communications Security Material Systems, Assistant Program Manager for the UHF Follow-on communications satellite program and Commanding Officer, Fleet Surveillance Support Command. In July 1997, she transferred to the Joint Staff/J6 where she served as the Chief, Current Operations Division and then as the Executive Assistant to the Director, C4 Systems. In June 2000, Adm. Hight reported as the US Space Command Liaison Officer to the US European Command, Stuttgart, Germany. In 2001, she reported as the Commanding Officer, Navy Computer and Telecommunications Master Station, Atlantic and the Program Manager for all IT in the mid-atlantic region. She was transferred to the CNO Staff and served as the Director, Net-Centric Warfare from June 2003 until September She is a graduate of the Defense Systems Management College, the Naval Post-graduate School with a master s degree in telecommunications systems, and George Washington University with a master s degree in information systems. David Hoffman Director, Security Policy, Global Privacy officer Intel Corporation David A. Hoffman is director of security policy and global privacy officer at Intel Corporation. Hoffman joined Intel in 1998 as Intel s ebusiness attorney. In 1999, he founded Intel s privacy team and in 2000 was appointed group counsel of ebusiness and director of privacy. In 2005, Hoffman moved to Munich, Germany, as group counsel in the Intel European legal department while leading Intel s worldwide privacy and security policy team. Hoffman was a founding member of the BBBOnLine Steering Committee. He served on the TRUSTe board of directors from 2000 to He is also on the board of directors for the International Association of Privacy Professionals, for which he is treasurer. He holds the Certified Information Privacy Professional Certification and has lectured at law schools in the U.S., Europe and China. Hoffman has a J.D. from the Duke University School of Law, where he was an editor on the Duke Law Review. He also received an A.B. from Hamilton College. BSA CyBerSeCurity Forum Harris received her law degree cum laude from the Georgetown University Law Center and her BA at the University of North Carolina at Chapel Hill, where she graduated Phi Beta Kappa.
5 Robert W. Holleyman, II President and Chief Executive Officer Business Software Alliance Robert Holleyman is president and chief executive officer of the Business Software Alliance (BSA). Holleyman has headed the alliance since 1990, expanding BSA operations from startup phase to more than 80 countries and 13 foreign offices, in addition to its headquarters in Washington, DC. He has been active in leading industry efforts in emerging markets. Holleyman is widely known for his work on policy-related issues affecting the technology industry, including intellectual property laws, cybersecurity, international trade, and electronic commerce. Holleyman established BSA s CEO Forum series which brings high tech CEOs to Washington to discuss policy issues with senior political leaders. He has also overseen development of BSA s Global Tech Summit, Chief Technology Officers Forum, and General Counsel Forum series, which highlight key industry issues and trends around the globe. Honorable Gary Locke Secretary US Department of Commerce Gary Locke was appointed by President Obama as the 36th Secretary of Commerce and sworn into office on March 26, At the Department of Commerce, Locke is charged with helping implement President Obama s ambitious agenda to turn around the economy and put people back to work. As the first Chinese-American to hold this post in a president s cabinet, Locke has a distinctly American story. His grandfather emigrated from China to Washington state, initially finding employment as a servant, working in exchange for English lessons. Locke s father, also born in China, was a small business owner, operating a grocery store where Locke worked while receiving his education from Seattle s public school system. His strong work ethic and determination eventually took him to the highest office in the state of Washington. Holleyman has been named one of the 50 most influential people in the intellectual property world by the international magazine, Managing Intellectual Property. He was also named by The Washington Post as one of the key players in the U.S. Government s cybersecurity efforts for his work on behalf of industry on national cybersecurity policy. And, Holleyman was designated by a leading computer trade magazine as one of its Twenty to Watch in the computer software industry. He has also been named by Tech Counsel magazine as one of the most influential high tech advocates. Before joining BSA, Holleyman spent eight years serving as counsel in the US Senate and was an attorney with a leading law firm in Houston, Texas. His early legal experience included service as a judicial clerk in the US District Court in New Orleans, Louisiana. Holleyman earned his Bachelor of Arts degree in political science at Trinity University in San Antonio, Texas, and his Juris Doctor at Louisiana State University Law Center in Baton Rouge, Louisiana. He completed the executive management program at the Stanford Graduate School of Business. John Landwehr Director, Security Policy Adobe Systems, Inc. Prior to his appointment, Locke helped U.S. companies break into international markets as a partner in the Seattle office of the international law firm, Davis Wright Tremaine LLP. There, he co-chaired the firm s China practice and was active in its governmental relations practice. As the popular two-term governor of Washington, the nation s most trade-dependent state, Locke broke down trade barriers around the world to advance American products. He helped open doors for Washington State businesses by leading 10 productive trade missions to Asia, Mexico and Europe, significantly expanding the sale of Washington products and services. He also successfully strengthened economic ties between China and Washington State. His visits are credited with introducing Washington companies to China and helping more than double the state s exports to China to over $5 billion per year. As part of his considerable trade and economic development efforts, Locke launched Washington s Competitiveness Council with business, labor and civic leaders working together to effectively position Washington State for success at home and around the world. During the eight years of the Locke Administration, the state gained 280,000 jobs. Locke earned a bachelor s degree in political science from Yale University and a law degree from Boston University. He is married to Mona Lee Locke. They have three children: Emily, Dylan and Madeline. 10 BSA CyBerSeCurity Forum 2010
6 CTO for Security and Privacy IBM Research Dr. Charles C. Palmer is the CTO for Security and Privacy for IBM Research, and Associate Director of Computer Science at Watson. In these roles, he has broad responsibilities for initiatives and technical directions in the security and privacy areas across IBM Research. Palmer is also Senior Technical Advisor to the Institute for Information Infrastructure Protection (I3P) which is managed by Dartmouth College. Founded in 2002, the I3P is a national consortium of 28 universities, nonprofits, and national labs that is focused on doing funded research for the US Government in the area of cyber-security. For more information, see the I3P webpages and Dartmouth s announcement of Palmer s new position there. Palmer is also an adjunct Professor at Dartmouth College where he teaches CS38 Security and Privacy to the grads and undergrads and works with students on individual projects. Prior to taking on these roles at Dartmouth College, he led the Security and Privacy departments at IBM s Thomas J. Watson Research Center for several years. He continues to work with those teams and the teams at IBM s worldwide labs as well as with IBM s Software Group, Server Group, and Global Services organizations. For details on the security & Privacy research efforts around the world, see IBM s Research in Security & Privacy pages. One of those teams is the Global Security Analysis Lab also known as the ethical hackers which he founded in Palmer frequently speaks on the topics of computer and network security at conferences around the world. He holds several US and European patents and has several publications from his work at IBM and Polytechnic University. Palmer is a member of the US Department of Homeland Security s Data Privacy and Integrity Advisory Board where he chairs the emerging technology and applications subcommittee. He is also a member of the editorial boards for the IEEE Computer Society s Security & Privacy Magazine and the upcoming International Journal of Information and Computer Security. He was also an adjunct professor of computer science at Polytechnic University from 1993 to He was named a Distinguished Engineer of the ACM in 2006, and is also a member of the IEEE and IEEE Computer Society. In 2009 he was named a member of the IBM Academy of Technology. He has a Ph.D. in Computer Science, Polytechnic University, Brooklyn, NY, 1994, Dissertation title: An Approach to a Problem in Network Design Using Genetic Algorithms, M.S. in Computer Science, Tulane University, New Orleans, LA, 1984, and B.S. in Computer Science, Oklahoma State University, Stillwater, OK, Don Proctor Senior Vice President for Cybersecurity, Office of the Chairman and CEO Cisco Systems Don Proctor is a Senior Vice President at Cisco. As Executive Sponsor for Cisco s Cybersecurity initiative in the Office of the CEO, he works with Cisco customers, Cisco partners, and government leaders in defense, the intelligence community, and civilian agencies to advance the safety, privacy, and integrity of their critical network infrastructure. Proctor also has served on or led a broad variety of Cisco s corporate boards and councils, including the Enterprise Business Council, the Development Council, the Software Council, the Diversity and Inclusion Council, and the Public Policy Council. Proctor joined Cisco in 1995 and has held a variety of leadership positions in the company s enterprise, commercial, and service provider businesses. Most recently, he led Cisco s worldwide software development group and was responsible for Cisco s VoIP, web collaboration, Cisco IOS, network management, and global government solutions businesses. Before that he was Vice President and General Manager of Cisco s Service Provider Switching Group, the Voice Technology Group, and the Collaboration Software Group. Early in his tenure at Cisco, he led the product team that developed Cisco s first integrated voice/data router. Prior to joining Cisco, he worked for software maker Sybase. A graduate of the University of California, Berkeley, Proctor teaches in the Management of Technology program at UC Berkeley s Haas School of Business and formerly taught in the Telecommunications Engineering program at the UC Berkeley Extension. BSA CyBerSeCurity Forum Charles C. Palmer
7 Philip R. Reitinger Deputy Under Secretary for the National Protection and Programs Directorate and Director of the National Cybersecurity Center US Department of Homeland Security Philip R. Reitinger was appointed by US Department of Homeland Security (DHS) Secretary Janet Napolitano to serve as the Deputy Under Secretary for the National Protection and Programs Directorate (NPPD) on March 11, In this role, Reitinger leads the Department s integrated efforts to reduce risks across physical and cyber infrastructures. He oversees the coordinated operational and policy functions of the Directorate s subcomponents, which include Cybersecurity and Communications (CS&C), Infrastructure Protection (IP), Risk Management and Analysis (RMA), and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program. On June 1, 2009 Reitinger also became the Director of the National Cybersecurity Center (NCSC), which is charged with enhancing the security of federal networks and systems by collecting, analyzing, integrating and sharing information among interagency partners. In this role, Reitinger is responsible for coordinating situational awareness and reporting for federal cybersecurity organizations and personnel. As Deputy Under Secretary for NPPD and Director of NCSC, Reitinger provides strategic direction to the Department s cybersecurity efforts while ensuring preparedness and response capabilities across all federal computer systems. Prior to joining DHS, Reitinger was the Chief Trustworthy Infrastructure Strategist at Microsoft Corporation. In that role, he worked with government agencies and private sector partners to enhance cybersecurity and infrastructure protection. In November 2001, Reitinger became the Executive Director of the US Department of Defense s (DOD) Cyber Crime Center, which provides electronic forensic services and supports cyber investigative functions at DOD. Before joining DOD, he was Deputy Chief of the Computer Crime and Intellectual Property Section at the US Department of Justice. At the Department of Justice, he chaired the G8 subgroup on High Tech Crime. Reitinger has represented government and industry on critical information technology and security initiatives throughout his career, including the Industry Executive Subcommittee of the President s National Security Telecommunications Advisory Committee (NSTAC), where he chaired the Next Generation Networks Task Force. He was the first Chairman of the Software Assurance Forum for Excellence in Code (SAFECode), the President of the Information Technology-Information Sharing and Analysis Center (IT-ISAC), and a member of the Executive Committee of the IT Sector Coordinating Council (IT SCC). Reitinger was a member of the Federal Emergency Management Agency National Advisory Council and the Information Security and Privacy Advisory Board (ISPAB) of the National Institute of Standards and Technology. He was also a member of the CSIS Commission on Cybersecurity, which developed recommendations for the 44th Presidency. Reitinger holds a law degree from Yale Law School and a bachelor s degree in electrical engineering and computer science from Vanderbilt University. Honorable Jay Rockefeller Chairman US Senate Committee on Commerce, Science and Transportation Senator Jay Rockefeller has proudly served the people of West Virginia for over 40 years. Rockefeller first came to West Virginia in 1964 as a 27-year-old VISTA volunteer serving in the small mining community of Emmons. Many of the lessons that Rockefeller learned in Emmons have shaped his public service career and led to his life-long commitment to improving the lives of West Virginians and all Americans. Senator Rockefeller is the Chairman of the Senate Committee on Commerce, Science, and Transportation. He is also the Chairman of the Health Care Subcommittee on Finance; and a member of the Senate Select Committee on Intelligence. He also serves on the Senate Committee on Veterans Affairs. Rockefeller was born on June 18, He graduated from Harvard University in 1961 with a B.A. in Far Eastern Languages and History. In 1964, he came to Emmons, West Virginia, where he began his public service career serving the people of West Virginia. In 1966, he was elected to the West Virginia House of Delegates and to the office of West Virginia Secretary of State in He served as President of West Virginia Wesleyan College from 1973 to In 1976, Rockefeller was elected Governor of West Virginia, and was reelected in In 1984, he was elected to the United States Senate, and re-elected in 1990, 1996 and Since 1967, Rockefeller has been married to Sharon Percy Rockefeller with whom he has four children: John, Valerie, Charles, and Justin. Jay and Sharon are also the proud grandparents of four granddaughters and one grandson. 12 BSA CyBerSeCurity Forum 2010
8 Eric T. Werner Director, Public Policy Facebook Director for Cybersecurity, National Security Staff The White House Roger Thompson Chief Research Officer AVG As Chief Research Officer for AVG, Roger Thompson leads a global team of security researchers. He moved into his current position when his previous venture, Exploit Prevention Labs, was acquired by AVG in late Prior to co-founding Exploit Prevention Labs in 2005, Thompson headed the malware research operations for security industry leaders ICSA, PestPatrol and Computer Associates (CA). Thompson moved to the United States from his native Australia in the early 1990s, where he founded Thompson Network Software and earlier, co-founded the first Australian anti-virus company, Leprechaun Software. Roger speaks widely on computer security and forensics issues. Herb VanHook Vice President of Strategy, Office of the CTO BMC Software Eric T. Werner is a Director for Cybersecurity on the National Security Staff. He joined the NSS in February 2009 and was a member of the review team for President Obama s Cyberspace Policy Review. Within the Cybersecurity Directorate, Werner works on a range of issues including cyber incident response planning and U.S. international cybersecurity planning and coordination activities. Werner is presently on detail from the National Telecommunications and Information Administration (NTIA) at the U.S. Department of Commerce. At NTIA, he supports the agency s Critical Infrastructure Protection function, providing general and strategic advice on policy matters affecting all sectors of the telecommunications industry with particular emphasis on cybersecurity, continuity communications, and public safety interoperability. He also serves as a liaison from the agency to the Communications and Information Technology Sector Coordinating Councils. Prior to his arrival at NTIA, Werner served as Deputy (and Acting) Associate General Counsel at the United States Department of Homeland Security (DHS) where he managed legal support for DHS s initiatives in the areas of national preparedness, critical infrastructure protection, cybersecurity, and national security and emergency preparedness (NS/EP) telecommunications. Before entering public service, he spent a decade as a communications attorney in private practice, representing a broad range of clients in litigation before the Federal Courts and the Federal Communications Commission (FCC). Werner also served as law clerk to the Honorable Anthony J. Celebrezze on the United States Court of Appeals for the Sixth Circuit. Herb VanHook is vice president of strategy in the Office of the CTO at BMC Software, with a particular focus on the technology impacts and opportunities presented by cloud computing models. He has worked in strategic, corporate development, and business planning functions since joining BMC in Previously, VanHook held several executive positions at industry analyst firm META Group (now Gartner, Inc.) including executive vice president and research director, and last serving as META s interim president and chief operating officer. He has more than 30 years of experience in information technology across operations, development, support, and management including positions at IBM, Computer Associates, and Legent Corporation. BSA CyBerSeCurity Forum Tim Sparapani
9 SPEAKER BIOGRAPHIES Bill Whyman Senior Managing Director & Head of Technology Research International Strategy & Investment Group Bill Whyman is a Senior Managing Director of International Strategy and Investment Group, Inc. and leads ISI s technology research team. ISI is a broker dealer widely recognized as a leading source of strategy research for institutional investors. Prior to joining ISI, Whyman was co-founder and President of Precursor Inc., where he led Precursor s research team. Institutional Investor ranked Whyman and his team amongst the leading technology and telecom independent research providers. Barron s described this research as penetrating, unvarnished, and the most informed analysis around offer(ing) a perspective missing from much that passes as research and long before others make the connections. Whyman is a nationally recognized expert on the intersection of technology and economics in the public and private sectors. He was one of the few to correctly call the bottom of the tech bubble and subsequent inflections, based on his proprietary Tech Demand Model. Whyman has presented at the Federal Reserve, the FCC, the Commerce Dept., the Congressional Internet Caucus, and numerous industry events. He is quoted in leading media including the Wall St. Journal, Barron s and The Washington Post, and appears on CNN, CNBC, and PBS among others. Whyman served at the White House as a Director to the National Economic Council and the National Security Council, advising the President and then-nec head Robert E. Rubin 14 BSA CYBERSECURITY FORUM 2010 on economic policy issues. In addition, he has held a variety of economic and technology policy positions in the Executive Office of the President and at the State Department, both in Washington and overseas. Previously Whyman was a Principal at Legg Mason. He was also a member of the leading consulting firm, McKinsey & Co., where his client work focused on helping senior executives in Fortune 500 companies solve critical strategic and operational problems. Whyman completed his undergraduate studies at Cornell University and Oxford University (U.K.), and holds an M.P.A. from Princeton s Woodrow Wilson School. He serves on the Board of Visitors at the University of Maryland s School of Public Affairs.
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers June 4, 2015 Presented by: In Partnership With: Welcome On behalf of RANE,
COMMISSION ON REGULATION OF POSTSECONDARY DISTANCE EDUCATION Commissioner, Observer and Advisor Biographies COMMISSIONERS Richard W. (Dick) Riley, Commission Chair Former U. S. Secretary of Education Former
10 Cyber Security Summit 2014 SPEAKERS Mark Abbott Chief Information Officer, Atomic Data Inevitable Since the early nineties, Mark has garnered expertise in a diverse background of IT, law and business.
Bill Aerts, CISSP, CISM Director, Information Risk Management Medtronic Bill Aerts is the Director of Information Risk Management at Medtronic. In this role, he oversees information security and is developing
Information Assurance - Information Security -Digital Forensics Career Preparation and Opportunity Workshop For Guidance Counselors & STEM Coordinators Thursday, May 7, 2009 9:00 am 3:30 pm National Electronics
Investigate Securely Provision Operate and Maintain Collect and Operate Protect and Defend ANALYZE Oversight and Development Seven Categories of the National Cybersecurity Workforce Framework csrc.nist.gov/nice
NATIONAL ASSOCIATION FOR COURT MANAGEMENT AND NATIONAL ASSOCIATION OF STATE JUDICIAL EDUCATORS Speaker Biographies JOSEPH AIELLO has been a leader in the development of large-scale infrastructure and realestate
PROGRAM The University of Texas at Austin Thompson Conference Center Wednesday, September 12, 2012 DIALOGUES ON DETENTION Human Rights First would like to thank Michele Deitch, Kerri Battles, and Kelly
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
Edward J. Bergman President Innovative Development Services Inc. Eddie Bergman is President of Innovative Development Services Inc. (IDS), a consulting firm, which provides customized consultation services
WELCOME On behalf of the Federal Deposit Insurance Corporation. welcome to the L. William Seidman Center and thank you for attending this symposium on commercial payments fraud. We are pleased to engage
STEPHANI ABRAMSON Stephani Abramson has served as Counsel for Procurement and Employment Law with the Office of General Counsel of the National Archives and Records Administration since September 2009.
High-Level Conference of the Small Island Developing States Achieving Sustainable Energy for All in SIDS: Challenges, Opportunities, Commitments BARBADOS, WEST INDIES 7-9 May 2012 RENEWABLE ENERGY Welcome
COMPUTER SECURITY HANDBOOK COMPUTER SECURITY HANDBOOK Fifth Edition Volume 1 Edited by SEYMOUR BOSWORTH M.E. KABAY ERIC WHYNE John Wiley & Sons, Inc. Copyright C 2009 by John Wiley & Sons, Inc. All rights
FEATURED SPEAKERS Thomas E. Perez Thomas E. Perez, nominated by President Obama to serve as the Assistant Attorney General for the Civil Rights Division, was sworn in on October 8, 2009. Since then, Mr.
A Human Capital Crisis in Cybersecurity Technical Proficiency Matters A White Paper of the CSIS Commission on Cybersecurity for the 44th Presidency cochairs Representative James R. Langevin Representative
Bureau of Justice Assistance U.S. Department of Justice #JRSummit Justice Reinvestment National Summit Sustaining success, maintaining momentum Hilton San Diego Bayfront, San Diego - Nov. 17-19, 2014 Agenda
FACULTY BIOGRAPHIES 2 014 ASC Symposium The premier national conference addressing high-level business and legal issues affecting the ambulatory surgical center industry FRIDAY, FEBRUARY 21, 2014 FONTAINEBLEAU
Project Management Symposium 2013 PMI Montgomery County Chapter Location: University at Shady Grove Board Members: Charlie Geis, PMP Position President Vice President, Communications Vice President, Treasury
Texas Weighted Caseload Study Advisory Panel Members Robert C. Boruchowitz Job Title: Professor/Director Organization: Seattle University School of Law Phone: (206) 398-4151 Email: firstname.lastname@example.org Robert
Tribal Justice & Safety Tribal Training and Technical Assistance One OJP Presenter Biographies Jacqueline Agtuca Jacqueline Agtuca is the Director of Public Policy of Clan Star, Inc.; a public policy and
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
Online Global MBA Online International MBA 2008-2009 Academic Year January 1 - December 31, 2015 Message from the President As President, it is my pleasure to welcome you to the Anaheim University global
Report of the Cyber Security Task Force to the University System of Maryland, May 2011 rm biometrics iques protect e-mail sector hub techniques global engineering metrics act data see assess alias illegal
NESTOA 2012 SPEAKER BIOGRAPHIES ALPHABETICALLY BY LAST NAME Ainsworth, Richard- Richard Thompson Ainsworth, is a New Hampshire and Massachusetts attorney with over twenty years academic, government, and
PELL CENTER REPORT for INTERNATIONAL RELATIONS and PUBLIC POLICY One Leader at a Time: The Failure to Educate Future Leaders for an Age of Persistent Cyber Threat Francesca Spidalieri March 26, 2013 Internet-based
Roy L. Austin, Jr. Deputy Assistant to the President for the Office of Urban Affairs, Justice and Opportunity White House In March 2014, Roy L. Austin, Jr. joined the White House Domestic Policy Council
WHY TRUST THE NATIONAL BODY-WORN CAMERA TOOLKIT? WHY TRUST THE NATIONAL BODY-WORN CAMERA TOOLKIT? Body-worn camera (BWC) programs can support law enforcement strategies to improve public safety, reduce