Skip to end of metadata
Go to start of metadata

Last reviewed: September 2017

Information Security Awareness Speakers Bureau

If your group or institution would be interested in a FREE presentation utilizing our Information Security Awareness Speakers Bureau for your next meeting or campus event, these are the experts who have expressed interest in providing brief presentations on any of the following topics. Please feel free to contact the speaker(s) of your choice directly. For assistance in contacting a speaker, e-mail the Higher Education Information Security Council at security-council@educause.edu.

In addition to the list of available speakers, we've provided a basic set of guidelines for a good presentation below.

Note: Please remember that travel expenses may be the responsibility of an institution inviting any out-of-town speaker(s). It is up to the institution and speaker(s) to negotiate any travel terms.

Available Speakers

Jon Allen
Assistant Vice President & Chief Information Security Officer
Baylor University
Waco, TX
Topics: Security Awareness, General Information Security Issues, Encryption, Policy, PCI-DSS, Forensics
Jon_Allen@baylor.edu

Josh Beeman
Executive Director of Information Security & University Information Security Officer
University of Pennsylvania
Philadelphia, PA
Topics: General Information Security issues, Awareness and Training, Incident Handling, Building an Information Security Program and Successful Information Security Teams, IT Security Governance, Incident Management, Compliance, Security Policies, Standard Security Frameworks and Regulations (e.g., NIST 800-53, ISO 27000 series, Critical Security Controls, etc.), Risk Assessment programs, Information Security Futures and implications
jbeeman@isc.upenn.edu
Note: This speaker is willing to travel out of town if travel and expenses are paid.

Daniel Bennett
Manager of IT Security
Pennsylvania College of Technology
Williamsport, PA
Topics: Security Awareness, General Security Information, Security In-depth, Mobile Device Security, Security Concepts & Design, Malware, Threat Protection
dbennett@pct.edu
Note: This speaker is willing to travel within 50 miles each way. He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.

Sol Bermann
Privacy Officer and IT Policy, Compliance and Enterprise Continuity Strategist
ITS - Information & Infrastructure Assurance
University of Michigan
Topics: Information privacy; privacy/security education and awareness; Bring-your-own-device; cloud computing privacy/security/compliance; export control (ITAR/EAR) compliance; IT/Security policy
solb@umich.edu

Kelley Bogart
Senior Information Security Specialist
University of Arizona
Tucson, AZ
Topics: Security Awareness, General Information Security Issues, PCI Compliance, Governance
bogartk@email.arizona.edu
Note: This speaker is willing to travel out of town if travel and expenses are paid.

John Bruggeman
Director of Information Systems
Hebrew Union College - Jewish Institute of Religion
Cincinnati, OH
Topics: Security Awareness, Information Security Guide, Small School Focus
john@huc.edu
Note: This speaker is willing to travel if travel and expenses are paid.

Petr Brym
CSO for Student Affairs IT
University of California, Berkeley
Berkeley, CA
Topics: Building a Security Program, Developing October Cyber Security Events and Materials
petr.brym@berkeley.edu

John Christly
Chief Information Security Officer/HIPAA Security Officer
Nova Southeastern University
Davie, FL
Topics: Cyber Security Awareness, Cloud Security, Mobile Device Security, Forensics and eDiscovery, Managed Security Solutions, Threat Protection, Internal Auditing, Risk Assessments, Vulnerability Assessments, Penetration Testing, Fraud Auditing, Vendor Management, Compliance strategies (HIPAA, PCI, FERPA, FIPA, GLBA), ISO and NIST.
jchristly@gmail.com
Note: This speaker is willing to travel if expenses are covered.

Tammy L. Clark
Chief Information Officer
The University of Tampa
Tampa, FL
Topics: Information Security Governance (ISO 27000), Risk Management, Cloud Security Issues, ERP/EA SaaS selection/implementation (information security considerations); third party oversight, contract and security reviews; data protection; designing a robust security architecture; developing an effective information security program; Compliance strategies (HIPAA, PCI, GLBA, HEOA); gaining executive support for information security programs; translating your message for Higher Ed executives (and more..)
tclark@ut.edu
Note: This speaker is willing to travel if expenses are covered.

Mary Dunker
Director, Secure Enterprise Technology Initiatives
Virginia Tech
Blacksburg, VA
Topics: Identity Management and Enterprise Directories, Multi-factor Authentication, Federated Identity Management, InCommon Overview and Shibboleth Considerations, Selecting Appropriate Authentication Credentials, Experiences with PKI and Personal Digital Certificates, HEISC Information Security Guide
dunker@vt.edu
Note: This speaker is willing to travel if expenses are covered or reimbursed.

David Escalante
Director of Computer Policy & Security
Boston College
Chestnut Hill, MA
Topics: Security Awareness, General Information Security Issues, Security Policy
david.escalante@bc.edu
Note: This speaker is willing to travel; reimbursement for expenses related to travel is negotiable.

Greg Hedrick, CISSP
Chief Information Security Officer
Purdue University
West Lafayette, IN
Topics: IT Security Tools and Techniques, Incident Response, Roles in Information Security
hedrick@purdue.edu
Note: This speaker is willing to travel within 50 miles each way. He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.

Hendra Hendrawan
Senior Information Security Analyst
York University
Toronto, Ontario, Canada
Topics: Security Awareness, General Information Security Issues, PCI DSS, IPS, IDS, Incident Handling
hendra@yorku.ca
Note: This speaker is willing to travel if expenses are paid.

Cathy Hubbs, CISSP, CISA, CGEIT
Chief Information Security Officer
American University
Washington, DC
Topics: Security Awareness, General Information Security Issues, Getting Policies Sanctioned, Data Stewardship
hubbs@american.edu

Bob Kalal
Director (Retired), Information Technology Policy
The Ohio State University
Columbus, OH
Topics: Security Awareness, General Information Security Issues, Information Technology Security Policy, Compliance and Privacy Issues, Working with Law Enforcement
kalal.1@osu.edu
Note: This speaker is willing to travel if expenses are reimbursed.

Kathleen R. Kimball, MS, CISSP, CISM
Senior Information Technology Auditor
Audit Department
University of Virginia
Charlottesville, VA 22903
Topics: Security Awareness, General Information Security Issues
krk6p@eservices.virginia.edu
Note: This speaker is willing to travel. If out of state, reimbursement for expenses would be required.

Jim Lowe
Chief Information Security Officer
University of Wisconsin-Madison
Madison, WI
Topics: General Information Security Issues, PCI compliance, Security Policies, Security Strategy
lowe@wisc.edu

Randy Marchany
Chief Information Security Officer
VA Tech
Blacksburg, VA
Topics: Security Awareness, General Information Security Issues, Privacy, Policies, Cloud Computing Security, Internet Threats, Mobile Device Security, Security Operations Centers, Sensitive Data Security, US Cyber Challenge
marchany@vt.edu
Note: This speaker is willing to travel if expenses are covered.

Wyman Miles
Chief Information Security Officer
Cornell University
Ithaca, NY
Topics: Security awareness, general information security issues, confidential data discovery and cleanup, building an information security program, encryption
wm63@cornell.edu
Note: This speaker is willing to travel if expenses are covered.

Sarah Morrow
Health Sciences Center (HSC) Privacy Officer
University of New Mexico
Albuquerque, NM
Topics: General privacy issues
smorrow2@unm.edu
Note: This speaker is willing to travel if expenses are covered, at least in part.

Todd Plesco
Director of Information Security
Chapman University
Orange, CA
Topics: Developing an Information Security Program, Managing Access Controls, Incident Management, Compliance, Awareness & Training, Security Policies, HIPAA, IT Security Governance, Business Continuity
tplesco@chapman.edu
Note: This speaker is willing to travel if travel/lodging expenses are covered.

Kathleen Roberts
Principal
iSecure Solutions
Dresher, PA
Topics: Security Awareness, General Information Security Issues
kathleen@isecuresolutions.com
Note: This speaker is willing to travel out of town if travel expenses are reimbursed.

Sean Sweeney
Chief Security Advisor, Enterprise Cybersecurity Group
Microsoft
Pittsburgh, PA
Topics: Security Awareness, General Information Security Issues, Strategic Information Security
sesweene@microsoft.com 

Joe St Sauver, Ph.D.
Courtesy Associate Professor, Network Startup Resource Center, Univ of Oregon
Scientist, Farsight Security, Inc.
Senior Technical Advisor, Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)
Topics: Spam and Messaging Security, Malware and Bots, Security of the Domain Name System and DNSSEC, IPv6 and Security, BGP Route Injection, Disaster Recovery and Continuity of Operations, Cloud Computing Security, Mobile Device Security, Security Policies, Passwords and Authentication, Data Driven Approaches to Security, Cyber Crime, Cyber War, Cyber Terrorism and Cyber Espionage, SCADA Security, CALEA and Lawful Intercept, Privacy
jjoe@stsauver.com
https://www.stsauver.com/joe/
Note: This speaker is willing to consider traveling for speaking events depending on scheduling, provided actual expenses can be covered.

Kent Wada
Chief Privacy Officer and Director, Strategic IT Policy
UCLA
Los Angeles, CA
Topics: Privacy as an enabler of academic and intellectual freedom; distinguishing between different forms of privacy, between privacy and information security, and between privacy and compliance; governance models for privacy; privacy and security policy development.
kent@ucla.edu
Note: This speaker is willing to travel if expenses are covered.

Ben Woelk
Information Security Program Manager
Rochester Institute of Technology
Rochester, NY
Topics: Developing a Security Awareness Program, Digital Self Defense (general audience), Security Policies, Developing Security Training, Introverted Leadership
ben.woelk@rit.edu
Note: This speaker is willing to travel if expenses are covered.

EDUCAUSE Speaker Concierge Tools

Whether you're preparing a proposal, designing and delivering your session, deconstructing evaluations, or promoting your work for colleagues and management, the EDUCAUSE Presenter Concierge has a tool to help you every step of the way.

Basic Guidelines for a Good Presentation

The following tips are suggestions only and they are not intended to change your approach if you already have a proven methodology to prepare for presentations.

  • Start early and plan ahead. Discuss and agree on target dates with the representative of the audience institution. (Suggested lead time is three months)
  • Secure endorsement/approval from your and the audience institution's management. (Suggested lead time is two months)
  • Confirm match between proposed presentation and intended audience. (Suggested lead time is one month)
  • Agree on any logistical and/or financial arrangements well in advance. (Suggested lead time is two months)
  • Ask the audience institution representative to advertise presentation with sufficient lead time to confirm minimum participation. (Suggested lead time is six weeks)
  • Submit a half page executive summary well in advance. (Suggested lead time is two months)
  • Employ good practices for PowerPoint. The EDUCAUSE Speaker Concierge offers tips and resources for designing an effective presentation.
  • Submit preview of PowerPoint or other material to the audience institution representative in advance. (Suggested lead time is two weeks)
  • Use appropriate presentation format (presentation, panel, forum) & leave time for questions and discussion.
  • Debrief and provide feedback to help improve this program.

Back to Top


(question) Questions or comments? (info) Contact us.

(warning) Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).