Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
|
|
|
- Julie Goodwin
- 10 years ago
- Views:
Transcription
1 Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership Mobile Phone: Academic Background Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012 M.S. Our Lady of the Lake University, San Antonio, TX, Computer Information Systems and Security, 2007 B.B.A. Nova Southeastern University, Ft Lauderdale, FL, Management, 1996 Certifications AccessData Certified Examiner, 2010 CISSP, 97235, 2006 CompTIA Sec+, 2006 Memberships ISSA WORK EXPERIENCE Academic Experience Assistant Professor, Our Lady of the Lake University (August, Present) - Assistant professor of Computer Information Systems and Security - Instructed courses in information security, computer and network security, information systems technology, networking, and computer forensics and investigations - Advised graduate and undergraduate students - Member of Information Technology Committee, Portal Governance Committee, - Chaired or participated on employee search committees Director, Center for Information Assurance Management & Leadership, Our Lady of the Lake University (May, Present)
2 - Directed NSA Center for Academic Excellence in Information Assurance and Education - Developed and implemented community outreach - Collaborated with business, government, and other academic institutions on information security issues. Adjunct Faculty, OLLU (May, August, 2008) - Developed and delivered curriculum - Managed classroom and schedule Non-Academic Experience National Director, Information Assurance, Department of the Army (March, August, 2008). - Senior installation Information Assurance Manager; oversaw IA actions of 60 IA professionals and network/system administrators supporting over 10,000 users and 7,000 hosts - Developed and enforced IA policies and procedures - Led incident response, determined appropriate actions and coordinated with Army Computer Emergency Response Team and Theater Network Operations and Security Center - Prepared installation's secure and unclassified networks for certification and accreditation under the Defense Information Assurance Certification and Accreditation Process Director, Information Assurance and Configuration Manager, Department of Defense (May, March, 2008). - Senior IT Configuration Management Specialist and technical field expert for the Tri-Service Infrastructure Management Program Office (TIMPO) that manages Department of Defense (DoD) Military Health System (MHS) communications and computing infrastructure (C&CI) - Developed configuration management policies and plans - Developed and executed program management office incident response plan - Managed enterprise ports, protocols and services; developed and executed certification and accreditation program; established service level agreements for computer network defense Implemented information assurance vulnerability management program and host based security system - Executed $10.2 million budget providing hardware and software maintenance and sparing, supporting enterprise with over 74,000 network infrastructure assets at 260 military medical treatment facilities - Coordinated government depot and private industry support to ensure flexible and cost effective sparing and maintenance program - Considered technological changes and advances to develop and execute upgrade and technical refresh plans ensuring network infrastructure met operation, security and supportability requirements. Submitted requests for proposals and evaluated contractor bids
3 - Evaluated, prioritized and initiated IT acquisition efforts to meet MHS C&CI infrastructure maintenance, sparing and technical refresh requirements - Served as a alternate project leader and performed oversight of contract performance - Chaired C&CI Disaster Recovery Planning Working Groups; led development of enterprise disaster recovery plan - Briefed supervisors, senior leaders and service representatives on program status and initiatives Telecommunications Senior Advisor, Department of Defense (March, Nov, 2004). - Established strategic direction, developed policy and managed manpower and personnel actions for 1,490 communications electronics maintenance positions at 39 locations in Europe - Assessed maintenance initiatives and advised the Air Force Career Field Manager on training, certification and development plans for 8 career fields - Determined manning priorities and optimum skill utilization to balance operations tempo and mission variations - Initiated action to create 210 manpower positions for Theater Deployable Communications; established funding strategy by analyzing manpower draw downs in existing missions - Led negotiations with MAJCOM manpower office and two units in U.K. to assess potential manpower savings from merger; sound analysis proved manpower overestimated manpower savings by 26% - Wrote, edited and coordinated executive level correspondence - Published command supplement to AF maintenance management instruction - Edited and secured Director approval for 11 manpower standard documents - Edited two statements of work to contract communications support at sites in Turkey and Bosnia Telecommunications/Information-Technology Manager, US Air Force, Misawa Cryptologic Operations Center (September, March, 2001) - Led 170 military, civilian and contractor personnel operating and maintaining state-of-the-art telecommunications and computer equipment valued at $85 million - Evaluated individual/work center performance; developed controls to improve efficiency/quality - Oversaw project management for approximately 60 computer system upgrades per year - Coordinated with other base organizations to ensure civil engineering, test equipment calibration/repair, security, supply, and other support functions met mission requirements - Assisted in developing and executing $360K operation and maintenance budget - Controlled scheduled/short-notice maintenance on antenna systems from Alaska to South Korea - Motivated subordinates, produced over 15 quarterly, annual, and professional military education award winners.
4 Satellite Systems Maintenance Manager, US Air Force, Misawa Cryptologic Operations Center (February, September, 1999) - Planned and programmed equipment upgrades; justified and awarded $14 million to upgrade satellite radio frequency distribution system - Supervised four work centers and 38 technicians installing and maintaining satellite systems, data processors, and a full range of fixed and tracking antennas - Recognized as Air Intelligence Agency Lt General Leo Marquez award winner, 1998, the command's best Communications-Electronics Maintenance Supervisor-Manager of the year - Managed engineering services contract; drafted Request For Proposals and Statement of Work; evaluated proposals and participated in award of new contract and transition between contractors - Developed and executed branch budget; authorized contract purchases up to $25,000 - Reviewed quality control reports to identify trends; implemented corrective action. International Telecommunications Senior Advisor, US Air Force, HQ USAFE (March, August, 2004) - Established strategic direction, developed policy, and managed manpower and personnel actions for 1,490 electronic maintainers at 39 locations in Europe - Created, reviewed, and edited executive correspondence; published maintenance policy - Determined manning priorities and skill utilization for emergency and contingency operations - Evaluated and submitted changes to manpower assessment standards; utilized manpower standards to determine most effective and efficient distribution of manpower resources - Directed development of formal training capabilities, implemented new courses - Assisted unit leaders throughout Europe to resolve complex policy, manpower, and personnel issues; trusted by leaders for making well researched, fair, and proper decisions - Provided functional expertise during development of AF-wide manpower measurement tools - Chaired boards to select individual, work center, and unit level awards; participated on AF central awards boards; edited three individual and one unit award that won AF level in Consulting 2010: Bills Pawn & Jewelry, Information Assurance Risk Assessment, Conduct information system risk assessment for business 2009: Bills Pawn and Jewelry, Network & Software Upgrade, Install and integrate security system with PoS software. Install new ISP connection and integrate with existing connection. Troubleshoot and resolve integration problems. TEACHING Courses Taught
5 Graduate: Internet Security Architecture Telecommunications and Networking Enterprise Security Management Information Assurance Planning and Management Principles of Information Assurance and Security Information Assurance Policies and Procedures Undergraduate: Information Assurance Principles Computer Forensics and Investigation Computer and Network Security Network Design and Implementation Networking Technology Current Concepts of Information and Computer Technology Current Concepts of Operating Systems Telecommunications and Administration Other Teaching Activities Student Assign-Independent Studies Student Assign-Independent Studies. 2 students, Independent study for CISS 3360 Fall Student Assign-Independent Studies. 3 students, Independent study for CISS 3362 Fall Student Assign-Students Advised (UG) Student Assign-Students Advised (UG). 17 students, Advised undergrad students - Fall Student Assign-Students Advised (UG). 18 students, Advised undergrad students - Spring Student Assign-Students Advised (UG). 17 students, Advised undergrad students, Spring Student Assign-Students Advised (UG). 17 students, Undergrad student advising for Fall INTELLECTUAL CONTRIBUTIONS: Research Grants Pending 2010: Barton, K. & Mohammed, D., AHPCRC HSI Research and Infrastructure Development Program, GOV-U.S. Army Research Office. Working Papers Barton, K. & Jeffries-Horner, C. (2011). "Database Intrusion Detection: Defending Against the Insider Threat". Other Research Activities
6 Contribution to Practice 2010: Special Projects or Assignments. Led and directed class project applying information security principles from multiple sources (NIST, DoD and ISO) to develop security policies for Bexar Metro District Network Discipline-Based Scholarship 2011: Research-in-Progress. A study of external influences and how they motivate senior management to establish information system security policies 2011: Research-in-Progress. Critical review of database intrusion detection research. Integrates range of research on database intrusion detection to provide conceptual model of comprehensive database intrusion detection and response system. SERVICE: Service to the University Department Assignments Mentoring Activities: : Touchstone: Counsel students on career application of CISS degree. University Assignments Member: : Portal Governance Committee: Member of Portal Governance Committee : Portal Implementation Team: Member of Portal Implementation Team Service to the Profession Other Professional Service Activities 2011: Hawaii International Conference on Systems Science, reviewer for two paper submissions to the Cybercrime in the Digital Economy mini track 2010: National Information Assurance Education and Training Program, Annual CAE conference, St Louis, Missouri (National). Reviewer - Grant Proposal Related to Expertise
7 2010: National Information Assurance Education and Training Program, reviewed applications for National Security Agency designation as Center of Academic Excellence - 2 Year Universities/Colleges (National). Service to the Community Member of a Committee 2009: Education Community of Interest-San Antonio Chamber of Commerce IT Committee, Member of Education Community of Interest. Working education sector of San Antonio Cyber Action Plan. 2008: San Antonio Greater Chamber IT Committee, Member of committee working to improve San Antonio's standing and recognition as a leader in the IT industry. 2008: Information Technology and Security Academy Board of Directors, Member of ITSA Board of Directors. Guides curriculum development and academy strategic direction. Other Community Service Activities 2011: Cyber Patriot Mentor, Advise Holmes High School during preparation for cyber patriot competition. Instruct students how to harden operating systems and applications. Develop competition strategies and assist with selection and implementation of security tools. 2011: Cyber Security for Business Training, The seminars are targeted to business leaders rather than information technology professionals, and are specifically intended to educate business leaders on their critical role in protecting business processes by protecting information systems. Protecting information systems from loss is a management problem, not a technical problem; whether that loss results from disaster, equipment failure, or cyber attack. This seminar series acknowledges that limited information technology (IT) expertise in many small- and medium-size businesses might present significant challenges in protecting their information systems, and provides the education and training needed for business leaders to protect their information systems. Industry and education experts in information security and disaster planning will provide business leaders with the tools and skills needed through lectures, discussions, and practical exercises. 2011: Linux Summer Boot Camp, Developed, organized, and instructed Linux security boot camp for high school students participating in Cyber Patriot Challenge 2011: San Antonio Community Cyber Exercise 2011: Cyber Security training for Business Leaders, Hosted cyber security training for business leaders. Organized 4 speakers from industry. 2011: Stop.Think.Connect Campaign, Organized national Stop.Think.Connect campaign on campus. Speakers from FBI, DHS and OLLU.
8 2010: Cyber Patriot Mentor, Mentor for Holmes High School Cyber Patriot competition team. Cyber Patriot is a high school computer security competition. 2009: CISSP Boot Camp, Organized 5-day CISSP boot camp. Attendance by military, government and industry CISSP candidates. Instructed 4 of 10 sections. Speech / Presentation at a Community Meeting 2010: Alamo AFCEA Cyber Symposium, Speaker, Cyber Academia Panel 2010: San Antonio Greater Chamber Brief to Gen Hayden, Brief Gen Hayden on OLLU participation in Cyber education in S.A., and OLLU's role in San Antonio Cyber Research and Innovation Consortium 2010: 2010 Community Development Summit, Member of Cyber Security panel during 2010 Community Development Summit, San Antonio, TX 2010: Career Day for Loma Elementary, Briefed students on career in information security 2009: San Antonio Greater Chamber Meeting, brief small businesses on information security needs 2009: San Antonio Human Resource Association, brief and Q&A with SAHRA members on securing human resource information systems. 2008: Women Presidents' Group, Discuss IT management for small business in relation to IT acquisition, operation and sustainment, security, and personnel. Address specific concerns on improving performance of IT service providers.
9 Faculty Development Other Professional Development 2009: Alamo Chapter, Information System Security Association. Monthly ISSA meetings. San Antonio, Texas. 2008: Alamo Chapter, Information System Security Association. Monthly Chapter Meeting. San Antonio, Texas. Technology-Related Training 2008: OLLU. SEDONA training. San Antonio, South Carolina. 2008: Blackboard training
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
How To Get A Degree From Our Lady Of The Lake University
S A N A N T O N I O, T E X A S o l l u s a. e d u WEEKEND AND ONLINE DEGREE PROGR AMS Flexible and convenient Our Lady of the Lake University (OLLU) recognizes that today s busy professional requires course
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona
Dr. Scott P. Paetzold University of Wisconsin Stout College of Science, Technology, Engineering and Math Menomonie, Wisconsin 54751 715-232-5498 [email protected] EDUCATION: Doctor of Philosophy in
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
P.O. Box 691593 San Antonio, Texas 78269. Summation
P.O. Box 691593 San Antonio, Texas 78269 Phone (210) 392-6993 E-mail [email protected] Dr. David Teneyuca, CISSP Summation Research Interest Project Leadership For Software Development Value-added Communication
Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS
Reynaldo Anzaldua EDUCATION University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS University of Texas Pan American, Edinburg, TX MBA/MIS GPA:
SENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Audria Ford. Adjunct Faculty Accounting, Finance & MIS College of Business Hobart Taylor 2C224 [email protected]
Audria Ford Adjunct Faculty Accounting, Finance & MIS College of Business Hobart Taylor 2C224 [email protected] Academic Background Memberships E.M.B.A. Tulane University, August 2011 International Studies,
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
CURRICULUM VITAE KEMIT S. GRAFTON Oklahoma State University-Oklahoma City Department of Information Systems and Technology
CURRICULUM VITAE KEMIT S. GRAFTON Oklahoma State University-Oklahoma City Department of Information Systems and Technology EDUCATION ACADEMIC DEGREES Doctor of Business Administration University of Phoenix
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
2015 Councils & Committees
2015 Councils & Committees Business Success Advocacy Community Advancement WorkforceMilitary Development Find your passion. Propel business success. Joining a committee is an excellent way to contribute
Jeffrey C. Johnson EDUCATION
Jeffrey C. Johnson EDUCATION The Union Institute and University 1999-2007 Cincinnati, OH Accreditation: North Central Association of Colleges and Schools Degree: PhD, Arts and Sciences Specialization:
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs
William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs Education University of Wisconsin at Platteville, Chemistry, B.S.,
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Dawn H. Dennis [email protected]
Dawn H. Dennis [email protected] Education 1998 Workforce Education and Development Ph.D. Pennsylvania State University 1995 Vocational Education/Business Education M.Ed. 1994 Vocational Education/Business
Hosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Carolyn J. Taylor, MBA, PMP Project Manager
Carolyn J. Taylor, MBA, PMP Project Manager Mrs. Taylor, a certified Project Management Professional (PMP), has 30+ years of federal government experience that includes 25+ years of program and project
Southwest Baptist University
Doctoral Program in Educational Leadership Application Packet Southwest Baptist University College of Education and Social Sciences Department of Graduate Studies in Education Page 1 Overview of Program
Melissa Sutherland, MA, LPC-S, NCC
Melissa Sutherland, MA, LPC-S, NCC San Antonio TX. [email protected] (210) 486-2378 I. BACKGROUND A. Education Doctor of Philosophy Grand Canyon University, Phoenix, AZ Major: Psychology: Industrial
EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected]
556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected] PROFESSIONAL EXPERIENCE 2001 - Present Member, Board of Directors, National Veterans Business
Deborah K. Huerta, Psy.D. The University of Texas at Brownsville [email protected]
Deborah K. Huerta, Psy.D. The University of Texas at Brownsville [email protected] Education Psy.D. Counseling Psychology (APA Accredited Program) (1998) Our Lady of the Lake University M.S. Clinical
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
BETTY K. JONES, Ph.D. (706) 340-3930 [email protected]
BETTY K. JONES, Ph.D. (706) 340-3930 [email protected] EXPERIENCE Grady College of Journalism and Mass Communication, The University of Georgia, Athens, Georgia 30602-3018, (706) 542-5046 (August 1998 to
CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS
Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with
How To Become A Computer Scientist
PROFESSIONAL SUMMARY Brian R. Salmans 1024 Summerfield Way Lawrence, KS 66049 334 652 9777 [email protected] Over 25 years of leadership and management experience in Department of Defense-level computer
How To Become A National Security Consultant
(Ed), Ph.D. 735 Woodmoor Acres Drive, Monument, Colorado 80132 (719) 493-2610 [email protected] Professional Profile Eager to share over twenty years of military and government homeland security experience
Karen L. Hays 428 Capstan Court Arnold, MD 21012 Office: (410-777-2332) Cell: (410-404-6345) E-mail: [email protected]
428 Capstan Court Arnold, MD 21012 Office: (410-777-2332) Cell: (410-404-6345) E-mail: [email protected] ADMINISTRATIVE EXPERIENCE Vice President for Learning Anne Arundel Community College, Arnold, MD June
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.19 March 14, 2013 USD(P&R) SUBJECT: Voluntary Education Programs in Overseas Areas References: See Enclosure 1. 1. PURPOSE. This instruction: a. Reissues DoD
Korey E. Kahler Faculty Vita (September 1, 2008 - August 31, 2013)
Korey E. Kahler Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Lecturer Qualification Status: Other Tenure Status: Non-Tenure Track EDUCATION MS, 2009. Institution:
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
MELISSA GRAVES. 118 Westbury Circle Oxford, MS 38655 [email protected] 662-832-6379 PROFESSIONAL EXPERIENCE
MELISSA GRAVES 118 Westbury Circle Oxford, MS 38655 [email protected] 662-832-6379 PROFESSIONAL EXPERIENCE July 2015-Present University of Mississippi Center for Intelligence and Security Studies Interim
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
Angela Marie Ross 7000 Fannin, Suite 690 Houston, Texas 77030 Phone 713-500-3991 [email protected]. Curriculum Vitae
Angela Marie Ross 7000 Fannin, Suite 690 Houston, Texas 77030 Phone 713-500-3991 [email protected] Curriculum Vitae Current Position/Title and Rank Assistant Professor, University of Texas Health
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
2.12 DISTANCE EDUCATION OR EXECUTIVE DEGREE PROGRAMS
Criterion 2.12 DISTANCE EDUCATION OR EXECUTIVE DEGREE PROGRAMS If the school offers degree programs using formats or methods other than students attending regular on-site course sessions spread over a
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
J. Eric Coleman, EdD 801 Main Street, Dallas, TX 75202 1402 Corinth Street, Dallas, TX 75215 214-860-5740 [email protected]
Curriculum Vita J. Eric Coleman, EdD 801 Main Street, Dallas, TX 75202 1402 Corinth Street, Dallas, TX 75215 214-860-5740 [email protected] EDUCATION Doctor of Education Higher Education Administration
UMD Department of Mechanical and Industrial Engineering
UMD Department of Mechanical and Industrial Engineering Indices and Standards for Tenure and Promotion to Professor as Required by Section 7.12 of the Board of Regents Policy on Faculty Tenure (June 10,
COLLEGE OF EDUCATION, HEALTH AND HUMAN SERVICES
Presidential Brief COLLEGE OF EDUCATION, HEALTH AND HUMAN SERVICES Daniel F. Mahony, Ph.D. Dean B.S., Virginia Tech M.A., West Virginia University Ph.D., The Ohio State University Job Responsibilities:
VITA CURRICULUM VITAE. Mark Pullin 116 Beechwood Victoria, TX 77901 Phone: 361-550-5270 Fax: 325-500-1051 Internet: mark.pullin@angelo.
VITA CURRICULUM VITAE Mark Pullin 116 Beechwood Victoria, TX 77901 Phone: 361-550-5270 Fax: 325-500-1051 Internet: [email protected] EDUCATION Ph.D. 2012 Criminal Justice Dissertation: Social Environmental
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
BUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Under moderate supervision, tests and troubleshoots hardware and/or software problems, makes repairs. May supervise or provide leadership to staff.
Information Technology University of Kansas Job Title Definitions Job Family Definition: Provides functional and/or technical support of software and hardware in the conceptualization, creation, development,
Resume. Essie Childers 4400 Belvoir Ct. College Station, TX 77845 PERSONAL:
Resume Essie Childers 4400 Belvoir Ct. College Station, TX 77845 PERSONAL: Married to Terry Childers Born: November 28, 1953 Children: Shalawn Harris, Jonathan, and Adam Health: Excellent Interests: Cooking,
Vitae 2012 Daniel A. Van Bogaert, J.D.
Vitae 2012 Daniel A. Van Bogaert, J.D. CURRENT RANK Adjunct Professor, Brandman University, part of Chapman University system (graduate level courses) Adjunct Professor, Loyola Marymount University-LA
North Georgia College and State University, Mike Cottrell College (School) of Business
Russell W. Teasley Ph.D. Associate Professor Management and International Business Mike Cottrell School of Business University of North Georgia, Dahlonega GA 30597 Email: [email protected] Education University
Faculty member in the Undergraduate and Graduate Schools of Business
DAVID LAWSON, PH.D. 633 NORTH CREEK CROSSING TRENTON, ILLINOIS 62293 618.558.6367 [email protected] WWW.LWSON.COM ACADEMIC CREDENTIALS Ph.D., 2004, Walker School of Business, Webster University M.B.A., Business
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
CURRICULUM VITA (January 15, 2010)
Francine Sanders Romero Francine.Romerona,utsa. edu CURRICULUM VITA (January 15, 2010) Home: 7518 Peppervine Lane San Antonio, TX 78249 (210) 877-1216 University: Department of Public Administration University
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
Jibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
