Featured Work

Author or Co-Author

 20 Critical Security Controls – How CA Technologies Can Help Government Agencies Implement and Automate Cyber Security Controls and Compliance Processes, 2016 CA Security Whitepaper

 CA Technologies Solutions for IRS 1075 Compliance, 2015 CA Compliance Whitepaper 

Solutions for Identity, Credential, and Access Management (ICAM), 2014 ICAM Solutions Whitepaper 

Solutions for Criminal Justice Information Security Compliance, 2014 CJIS Security Whitepaper 

Identity and Access Management; Industry Advisory Group, 2009 Transition paper (IAM) 

Government Federated Identity Management, Industry Advisory Group, 2009 Transition Paper (Government Federation Identity)  

Recent Speaking Engagements

  2017 InfraGard Quarterly Training, Sacramento, CA – “Cyber Security Risk and Government Response” 

2017 National Governors Association Cyber Security Roundtable, Speaker for CA Technologies 

2017 Virginia Society for Technology Education -- “Supporting STEM Education and Driving Digital Transformation” 

 2017 New York State Information Security Forum --“Threat, Vulnerability, Compliance – What do I do first?” 

2016 PA Tech Con, Harrisburg, PA – “Identity and Access Management in the Commonwealth” 

2015 Virginia Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting 

2014 California Cyber-Security Symposium, “Privileged Identity Management” 

2014 North Carolina Digital Government Summit, “Privacy vs. Security: You Can Have Your Cake and Eat it Too” 

2014 Federal News Radio, Executive Forum on Mobility 

2014 Canada Government Expo, “The Changing landscape of Cyber-Security; Identity, Credential, & Access Management (ICAM)” 

2013 California Cyber-Security Symposium, “Identity is the New Perimeter” 

2013 Los Angeles Digital Government Summit, “Mobility and Mobile Device Management” 

2013 State of Oregon, Mobility Summit; “Mobility and BYOD: Harnessing the Best of Breed or Herding Cats?” 

2013 State of Texas, DIR Information Security Fourm, “Identity is the New Perimeter” 

2012 State of Oregon Security Summit, “The Case of the Disappearing Desktop, Safe and Secure BYOD” 

2012 Los Angeles Digital Government Summit, “Mobile Security and BYOD” 

2012 Webinar Featured speaker with Gov. Tom Ridge, “Meeting the FICAM/OMB M-11-11 Mandate: Will You be Ready to Meet the PIV Enabling Requirements? “  

Contact me for more information on Speaking Engagements or Cyber Evangelism