Gudrun Susanne Wetzel is a German computer scientist known for her work in computer security, including the use of information channels such as voice or keystroke dynamics to strengthen password-based security, and the security of wireless communications standards including Bluetooth and GSM. She is a professor of computer science at the Stevens Institute of Technology.
Wetzel earned a diploma from the Karlsruhe Institute of Technology in 1993, and completed her doctorate (Dr. rer. nat.) at Saarland University in 1998. [1] Her dissertation, Lattice Basis Reduction Algorithms and their Applications, concerned lattice reduction; her doctoral advisor was Johannes Buchmann. [2]
She joined the Stevens Institute of Technology in 2002. [3] In 2017, she served a one-year term as a program director at the National Science Foundation. [3] [4]
Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.
Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.
The Bachelor of Computer Science is a bachelor's degree awarded by some universities for completion of an undergraduate program in computer science. In general, computer science degree programs emphasize the mathematical and theoretical foundations of computing.
The Penn State College of Information Sciences and Technology, also known as the College of IST, opened in 1999 as the information school of The Pennsylvania State University. Headquartered at the University Park campus in University Park, Pennsylvania, the college's programs are offered at 21 Penn State campus locations. Dr. Andrew Sears currently serves as the college's dean.
Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.
Lattice-based cryptography is the generic term for constructions of cryptographic primitives that involve lattices, either in the construction itself or in the security proof. Lattice-based constructions are currently important candidates for post-quantum cryptography. Unlike more widely used and known public-key schemes such as the RSA, Diffie-Hellman or elliptic-curve cryptosystems—which could, theoretically, be defeated using Shor's algorithm on a quantum computer—some lattice-based constructions appear to be resistant to attack by both classical and quantum computers. Furthermore, many lattice-based constructions are considered to be secure under the assumption that certain well-studied computational lattice problems cannot be solved efficiently.
Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012.
Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integrates application analysis into development pipelines.
The Khoury College of Computer Sciences is the computer science school of Northeastern University in Boston, Massachusetts. It was the first college in the United States dedicated to the field of computer science when it was founded in 1982. In addition to computer science, it specializes in data science and cybersecurity. The college was also among the first to offer an information assurance degree program.
The Cyber Security Division (CSD) is a division of the Science and Technology Directorate of the United States Department of Homeland Security (DHS). Within the Homeland Security Advanced Research Projects Agency, CSD develops technologies to enhance the security and resilience of the United States' critical information infrastructure from acts of terrorism. S&T supports DHS component operational and critical infrastructure protections, including the finance, energy, and public utility sectors, as well as the first responder community.
A Master of Science in Information Assurance is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in information assurance.
Solange Ghernaouti is a professor at the University of Lausanne (UNIL) and an international expert on cybersecurity and cyberdefence. She regularly collaborates with various United Nations, European and government institutions as well as with private corporations.
Elena Ferrari is a Professor of Computer Science and Director of the STRICT Social Lab at the Università degli Studi dell’Insubria, Varese, Italy. Ferrari was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for contributions to security and privacy for data and applications. She has been named one of the “50 Most Influential Italian Women in Tech” in 2018. She was elected as an ACM Fellow in 2019 "for contributions to security and privacy of data and social network systems".
Brandeis Marshall is an American data scientist, CEO of DataedX, and Full Professor of Computer Science at Spelman College, where she is the former Chair of the Department of Computer and Information Sciences. Starting in September 2019, Marshall is a faculty associate at Berkman Klein Center for Internet & Society at Harvard University. She has also worked to broaden participation in the field of data science to increase representation of underrepresented minorities, including her effort 'Black Women in Data'.
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.
Rhonda Childress is an IBM Fellow Vice President of GTS. She has earned the title of being the first Services woman to be called an IBM Master Inventor, Security Fellow, and the first Fellow from a predominantly African-American college from spending her whole career in SO. She was also the first IBM fellow from a Historical Black University. Childress is a prolific inventor with over 200 patents, 130 of which are related to the management of systems, cyber security, mobile, aircraft, and IoT. In 2018, she was inducted into the WITI Hall of Fame for her efforts in her career at IBM. Childress is one of 25 female IBM fellow in IBM's history.
Sadie Creese is a British cybersecurity specialist. She is Professor of Cybersecurity in the Department of Computer Science at the University of Oxford, Director of the Global Cyber Security Capacity Centre at the Oxford Martin School, co-director of the university's Cyber Security Centre and of the Martin School's Institute for the Future of Computing, and a fellow of Worcester College, Oxford.
Andrea M. Matwyshyn is a United States law professor and engineering professor at The Pennsylvania State University. She is known as a scholar of technology policy, particularly as an expert at the intersection of law and computer security and for her work with government. She is credited with originating the legal and policy concept of the Internet of Bodies.
Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries, and redefining trust parameters for improved security in the cloud. Early on in his career, he was involved with the design of security protections for the Unix operating system in support of the US Government Orange Book security evaluation criteria. This research lead to real-time security design and trusted software protections for the United States Ballistic Missile Defense Program, also known as Star Wars. He has also pioneered concepts related to microsegmentation, a design strategy that allows for the creation of secure zones in data centers and cloud deployments.