Skip to end of metadata
Go to start of metadata

Version 2.0: September 2012

Information Security Awareness Speakers Bureau

If your group or institution would be interested in a FREE presentation utilizing our Information Security Awareness Speakers Bureau for your next meeting or campus event, these are the experts who have expressed interest in providing brief presentations on any of the following topics. Please feel free to contact the speaker(s) of your choice directly. For assistance in contacting a speaker, e-mail the EDUCAUSE/Internet2 Higher Education Information Security Council at security-council@educause.edu.

In addition to the list of available speakers, we've provided a basic set of guidelines for a good presentation below.

Note: Please remember that travel expenses may be the responsibility of an institution inviting any out-of-town speaker(s). It is up to the institution and speaker(s) to negotiate any travel terms.

Available Speakers

Jon Allen
Information Security Officer
Baylor University
Waco, TX
Topics: Security Awareness, General Information Security Issues, Encryption, Policy, PCI-DSS, Forensics
Jon_Allen@baylor.edu

Daniel Bennett
Manager of IT Security
Pennsylvania College of Technology
Williamsport, PA
Topics: Security Awareness, General Security Information, Security In-depth, Mobile Device Security, Security Concepts & Design, Malware, Threat Protection
dbennett@pct.edu
Note: This speaker is willing to travel within 50 miles each way. He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.

Sol Bermann
Privacy Officer and IT Policy and Enterprise Continuity Strategist
University of Michigan
Ann Arbor, MI
Topics: Information privacy; privacy/security education and awareness; Bring-your-own-device; cloud computing privacy/security/compliance; export control (ITAR/EAR) compliance; IT/Security policy
solb@umich.edu

Kelley Bogart
Senior Information Security Specialist
University of Arizona
Tucson, AZ
Topics: Security Awareness, General Information Security Issues, PCI Compliance, Governance
bogartk@email.arizona.edu
Note: This speaker is willing to travel out of town if travel and expenses are paid.

John Bruggeman
Director of Information Systems
Hebrew Union College - Jewish Institute of Religion
Cincinnati, OH
Topics: Security Awareness, Information Security Guide, Small School Focus
john@huc.edu
Note: This speaker is willing to travel if travel and expenses are paid.

Petr Brym
Director of IT Security
University of New Hampshire
Durham, NH
Topics: Building a Security Program, Developing October Cyber Security Events and Materials
Petr.Brym@unh.edu

Tammy L. Clark
Chief Information Security Officer
University of Tampa
Tampa, FL
Topics: Security Awareness, General Information Security Issues, Information Security Governance (ISO 27000)
tclark@ut.edu
Note: Travel limited to 100 miles R/T unless reimbursement is offered.

Dennis Devlin
Assistant Vice President, Information Security and Compliance Services
The George Washington University
Ashburn, VA
Topics: Information Security Program Development, Governance and Sponsorship, Education and Awareness
dmdevlin@gwu.edu
Note: Note: This speaker is willing to travel if expenses are covered or reimbursed.

Mary Dunker
Director, Secure Enterprise Technology Initiatives
Virginia Tech
Blacksburg, VA
Topics: Identity Management and Enterprise Directories, Federated Identity Management, InCommon Overview and Shibboleth Considerations, Selecting Appropriate Authentication Credentials, Experiences with PKI and Personal Digital Certificates, EDUCAUSE/Internet2 HEISC Information Security Guide
dunker@vt.edu
Note: This speaker is willing to travel if expenses are covered or reimbursed.

David Escalante
Director of Computer Policy & Security
Boston College
Chestnut Hill, MA
Topics: Security Awareness, General Information Security Issues, Security Policy
david.escalante@bc.edu
Note: This speaker is willing to travel; reimbursement for expenses related to travel is negotiable.

Greg Hedrick, CISSP
Director, Information Security Services
Purdue University
West Lafayette, IN
Topics: IT Security Tools and Techniques, Incident Response, Roles in Information Security
hedrick@purdue.edu
Note: This speaker is willing to travel within 50 miles each way. He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.

Cathy Hubbs, CISSP, CISA, CGEIT
Chief Information Security Officer
American University
Washington, DC
Topics: Security Awareness, General Information Security Issues, Getting Policies Sanctioned, Data Stewardship
hubbs@american.edu

Bob Kalal
Director (Retired), Information Technology Policy
The Ohio State University
Columbus, OH
Topics: Security Awareness, General Information Security Issues, Information Technology Security Policy, Compliance and Privacy Issues, Working with Law Enforcement
kalal.1@osu.edu
Note: This speaker is willing to travel if expenses are reimbursed.

Kathleen R. Kimball, MS, CISSP, CISM
Senior Director, Security Operations and Services
Information Technology Services, Penn State
University Park, PA
Topics: Security Awareness, General Information Security Issues
krk5@psu.edu
Note: This speaker is willing to travel. If out of state, reimbursement for expenses would be required.

Merri Beth Lavagnino
Chief Risk Officer
Indiana University
Indianapolis, IN
Topics: General Information Security, Privacy, and Risk Issues
mbl@iu.edu
Note: This speaker is willing to travel within about 100 miles and able to travel farther with travel expenses paid.

Jim Lowe
Chief Information Security Officer
University of Wisconsin-Madison
Madison, WI
Topics: General Information Security Issues, PCI compliance, Security Policies, Security Strategy
lowe@wisc.edu

Randy Marchany
Chief Information Security Officer
VA Tech
Blacksburg, VA
Topics: Security Awareness, General Information Security Issues, Privacy, Policies, Cloud Computing Security, Internet Threats, Mobile Device Security, Security Operations Centers, Sensitive Data Security, US Cyber Challenge
marchany@vt.edu
Note: This speaker is willing to travel if expenses are covered.

Wyman Miles
Manager of Security Engineering, IT Security Office
Cornell University
Ithaca, NY
Topics: Security awareness, general information security issues, confidential data discovery and cleanup, building an information security program, encryption
wm63@cornell.edu
Note: This speaker is willing to travel if expenses are covered.

Sarah Morrow
Chief Privacy Officer
The Pennsylvania State University
State College, PA
Topics: General privacy issues
sdm24@psu.edu
Note: This speaker is willing to travel if expenses are covered, at least in part.

Todd Plesco
Director of Information Security
Chapman University
Orange, CA
Topics: Developing an Information Security Program, Managing Access Controls, Incident Management, Compliance, Awareness & Training, Security Policies, HIPAA, IT Security Governance, Business Continuity
tplesco@chapman.edu
Note: This speaker is willing to travel up to 100 miles without reimbursement or nationwide if travel and lodging is covered.

Ken Ries, CISSP
Campus CIO, Pine Technical College
Minnesota State Colleges and Universities
Pine City, MN
Topics: Governance, Policy, PCI, Security Awareness, General Information Security Issues
ken.ries@csu.mnscu.edu
Note: This speaker is willing to travel within 50 miles each way. He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.

Kathleen Roberts
Principal
iSecure Solutions
Dresher, PA
Topics: Security Awareness, General Information Security Issues
kathleen@isecuresolutions.com
Note: This speaker is willing to travel out of town if travel expenses are reimbursed.

Joe St Sauver, Ph.D.
Nationwide Security Programs Manager, Internet2 and Senior Technical Advisor, Messaging Anti-Abuse Working Group (MAAWG)
Internet2 and the University of Oregon
Eugene, OR
Topics: Spam and Messaging Security, Malware and Bots, Security of the Domain Name System and DNSSEC, IPv6 and Security, BGP Route Injection, Disaster Recovery and Continuity of Operations, Cloud Computing Security, Mobile Device Security, Security Policies, Passwords and Authentication, Data Driven Approaches to Security, Cyber Crime, Cyber War, Cyber Terrorism and Cyber Espionage, SCADA Security, CALEA and Lawful Intercept, Privacy
joe@oregon.uoregon.edu or joe@internet2.edu
Note: This speaker is willing to consider traveling for speaking events depending on scheduling, provided actual expenses can be covered.

Marcos Vieyra
Chief Information Security Officer
University of South Carolina
Columbia, SC
Topics: General Information Security and Privacy Issues
mvieyra@mailbox.sc.edu

Kent Wada
Chief Privacy Officer and Director, Strategic IT Policy
UCLA
Los Angeles, CA
Topics: Privacy as an enabler of academic and intellectual freedom; distinguishing between different forms of privacy, between privacy and information security, and between privacy and compliance; governance models for privacy; privacy and security policy development.
kent@ucla.edu
Note: This speaker is willing to travel if expenses are covered.

Ben Woelk
Information Security Policy and Awareness Analyst
Rochester Institute of Technology
Rochester, NY
Topics: Developing a Security Awareness Program, Digital Self Defense (general audience), Security Policies, Developing Security Training
ben.woelk@rit.edu
Note: This speaker is willing to travel if expenses are covered.

Sallie Wright
Director of Information Technology
Georgia State University
Atlanta, GA
Topics: CISSP, Safeguarding Research Data, Mobile Device Security, PCI, HIPAA, Building an IT Security Organization, IT Security Basics, Security Councils
swright50@gsu.edu
Note: This speaker is willing to travel if within driving distance or if the organization is willing to pay travel and expenses.

EDUCAUSE Speaker Concierge Tools

Whether you're preparing a proposal, designing and delivering your session, deconstructing evaluations, or promoting your work for colleagues and management, the EDUCAUSE Speaker Concierge has a tool to help you every step of the way.

Basic Guidelines for a Good Presentation

The following tips are suggestions only and they are not intended to change your approach if you already have a proven methodology to prepare for presentations.

  • Start early and plan ahead. Discuss and agree on target dates with the representative of the audience institution. (Suggested lead time is three months)
  • Secure endorsement/approval from your and the audience institution's management. (Suggested lead time is two months)
  • Confirm match between proposed presentation and intended audience. (Suggested lead time is one month)
  • Agree on any logistical and/or financial arrangements well in advance. (Suggested lead time is two months)
  • Ask the audience institution representative to advertise presentation with sufficient lead time to confirm minimum participation. (Suggested lead time is six weeks)
  • Submit a half page executive summary well in advance. (Suggested lead time is two months)
  • Employ good practices for PowerPoint. The EDUCAUSE Speaker Concierge offers tips and resources for designing an effective presentation.
  • Submit preview of PowerPoint or other material to the audience institution representative in advance. (Suggested lead time is two weeks)
  • Use appropriate presentation format (presentation, panel, forum) & leave time for questions and discussion.
  • Debrief and provide feedback to help improve this program.

Back to Top


Questions or comments? Contact us.

Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Labels:
speakers speakers Delete
bureau bureau Delete
information information Delete
security security Delete
experts experts Delete
awareness awareness Delete
presentations presentations Delete
educause educause Delete
heisc heisc Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.