Category: Q&A

Andrew Lee on Internet of Things and cybersecurity

As CEO for ESET North America, Andrew Lee brings the role a unique blend of corporate and security expertise. Having served as Chief Research Officer at ESET from 2004 to 2008, Mr. Lee was responsible...

Read more arrow_forward

Scott Schlimmer on Cybersecurity Training Program

Scott Schlimmer is an award winning former Central Intelligence Agency (CIA) officer who now runs Schlimmer Intelligence Consulting, specializing in training, analysis, and cyber security. Mr....

Read more arrow_forward

Daniel J. Solove on Privacy and Security Training Program

Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law School.  He is also the founder of TeachPrivacy, a company that provides computer-based...

Read more arrow_forward

Kirk Nahra on Trump Administration and Cybersecurity

  Kirk J. Nahra is a partner with Wiley Rein LLP in Washington, D.C., where he represents companies in a broad range of industries in connection with privacy and data security laws and regulations...

Read more arrow_forward

Lisa Jiggetts on Women in Cybersecurity

Lisa Jiggetts is the founder and CEO of the Women's Society of Cyberjutsu (WSC), one of the fastest growing nonprofits dedicated to women in cybersecurity.  WSC provides women with the resources and...

Read more arrow_forward

Lisa Bock on “What’s on Your Network?”

Lisa Bock is an assistant professor of information technology at Pennsylvania College of Technology (www.pct.edu) in Williamsport, Pennsylvania. She has taught a variety of courses that include...

Read more arrow_forward

Daniel Reardon on Cybersecurity and Health Care Industry

Prior to joining Delta Risk(https://delta-risk.net/), Dan worked at Protiviti, where he performed a wide variety of security and privacy assessments, architecture, transformation and management...

Read more arrow_forward

David Leach Shares His Insight on Investing in Cybersecurity Firms

David Leach is a Principal and Head of Private Equity at The Chertoff Group. In this position, Mr. Leach leads The Chertoff Group’s Private Equity business, which provides growth capital to...

Read more arrow_forward

Rene Novoa on Data Recovery and Forensic Investigations

Since joining Drivesavers in 2001, Rene has performed data recovery on thousands of storage devices plagued with mechanical failures, physical damage and logical corruption. Over the past 5 years, he...

Read more arrow_forward

Joyce Brocaglia on The Cyber Security School Challenge and Cyber Bullying

 Joyce Brocaglia is the founder and CEO of Alta Associates. Founded in 1986 Alta Associates has become the most prominent boutique executive search firm specializing in Information Security, IT...

Read more arrow_forward

Vince Martinez on SEC and Cybersecurity Policies

Vince Martinez is a partner in the Government Enforcement practice of K&L Gates LLP, where he focuses on investigations, defense and compliance advice matters.  Mr. Martinez previously served...

Read more arrow_forward

Timothy Eades on Software-based Segmentation

With over 20 years of leadership experience in sales, marketing, and executive management at the CEO level, Tim has deep expertise in driving high growth for computing, security and enterprise...

Read more arrow_forward

Nick Akerman on Cybersecurity and Legal Challenges

A partner in Dorsey’s New York Office, Nick Akerman is a trial lawyer specializing in both complex civil and criminal cases.  He has a well-established expertise on data compliance, the...

Read more arrow_forward

Alen Gojak on Mobile forensics investigations

Alen Gojak, a mobile device examiner and mobile forensic expert based in Croatia, spoke about the current trend in mobile forensic investigations at an interview conducted by LIFARS. Alen is a former...

Read more arrow_forward

Jeff Brittain on Public Sector Information Security

Jeff Brittain started out as a programmer/analyst in Hickory Springs Manufacturing and worked his way up to an I.T. Manager followed by the role of an I.T. Director at companies like Corning...

Read more arrow_forward

Tyler Morgan on System Vulnerabilities

Tyler found his start primarily in I.T. operations and developed those skills for a number of years. Soon after, Tyler pursued of a career in transactional law after attending Law School. During and...

Read more arrow_forward

Ami Rojkes on the Price of Future Security

  Ami Rojkes is an Israeli-based writer with a focus in technology. Ami is currently the Chief Cyber Editor of Israel Defense, an Israeli magazine that covers topics in the Israeli...

Read more arrow_forward

Kenneth Rashbaum on Today's Privacy Concerns

  Kenneth N. Rashbaum is a Partner at Barton LLP and aN Adjunct Professor of Law at Fordham University School of Law. Kenneth has a background in advising multinational corporations and...

Read more arrow_forward

Jeff Costlow on Network Bridges & Security

    Jeff Costlow is the security architect for Tempered Networks where he is responsible for implementing security into all aspects of software development. As a software security...

Read more arrow_forward

Leo Taddeo on the Insider Threat

Leo Taddeo, the Chief Security Officer (CSO) of Cryptzone, joins LIFARS to answer questions from insights developed in his twenty years of experience as an elite FBI agent. Mr. Taddeo worked...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.