Each year, the Institute for CyberSecurity, in collaboration with the
Computer Science Department and IT Support Services, hosts Cyber Security Day (known previously as Information Assurance Day). This day-long event
features nationally recognized security experts as well as speakers from regional law enforcement, the government, the security industry, and academia. Cyber Security Day is open to the public, community colleges, and neighboring universities.
Please join us in the Stouffer auditorium. Presentations lined up for the event include:
James Joshi is a professor of School of
Computing and Information at the University of Pittsburgh, and the director and
co-founder of the Laboratory of Education and Research on Security Assured
Information Systems (LERSAIS), which has been designated as a Center of
Academic Excellence in Information Assurance and Cyber Defense Education and
Research (CAE and CAE-R). He is an elected fellow of the Society of Information
Reuse and Integration (SIRI) and a senior member of the IEEE and the ACM. His
research interests include access control models, security and privacy of
distributed systems, trust management, network security, and security and
privacy services in cloud computing, critical infrastructures, and social
networking environments. He is a recipient of the US NSF-CAREER award in 2006.
He has served as program co-chair and/or general co-chair of several
international conferences/workshops. He currently serves as the steering
committee chair of IEEE CIC. He was a founder and co-Editor-in-chief of EAI Endorsed
Transactions on Collaborative Computing. Currently, he is the EiC of the IEEE
Transactions on Services Computing. He had also served in or is in the
editorial board of several international journals. His work has been recognized
with Best Paper award in ACM CODASPY 2011 and BigData Congress in 2017, and
Best Student Paper award in ACM SIGSPATIAL 2011. He is a co-editor of the book
titled “Information Assurance: Dependability and Security of Networked Systems”
published in 2007. He has published over 120 articles as book chapters and
papers in journals, conferences and workshops, and has served as a special
issue editor of several journals including Elsevier Computer & Security,
ACM TISSEC (now TOPS), Springer MONET, IJCIS, and Information Systems Frontiers
Skip Irwin is an account executive for Wombat Security Technologies, a leading provider of security education that changes employee behavior. Founded in 2008, Wombat’s Security Education Platform includes integrated knowledge assessments, a library of
simulated attacks, and interactive training modules.
Isaac is a senior engineer at the RAND Corporation, where he currently serves as the director of the Acquisition and Development Program in the Homeland Security Operational Analysis Center. As the director, Isaac overseas a wide range of projects supporting
the Department of Homeland Security and its components. He joined RAND in 1998 after graduating from the University of Michigan with a PhD in electrical engineering. He has led research projects for the US Navy, US Army, the Department of Homeland
Security, the Joint Staff, and the Office of the Secretary of Defense. He has served on the US Army Science Board supporting a number of its cyber-related panels. At the Institute of Politics and Strategy at Carnegie Mellon University, Isaac serves
as an adjunct instructor, where he teaches a graduate class titled Policy and Technology of Cyberwar. He has authored numerous RAND publications, peer-reviewed journal articles, and conference papers. He is also a frequent contributor of op-eds and
commentary for news outlets on military and science topics and has been quoted in other media outlets, including National Public Radio, the San Francisco Chronicle, and the Baltimore Sun.
Isaac’s areas of expertise include cybersecurity, network and communication technology, intelligence, surveillance and reconnaissance (ISR) systems, data mining, modeling and simulation, cybersecurity, rapid acquisition processes, and operations research
techniques. In 2016, he presented testimony on emerging cyber threats and implications before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Isaac’s latest publication, Cyber Power Potential of the Army’s
Reserve Component, focuses on research conducted on how to train, manage, and develop the Army’s cyber force.
Joe Harford is president and founder of Reclamere, a 16-year old information security company located in Central Pennsylvania that serves clients in highly regulated market sectors. The company has been providing its clients with information security
solutions throughout the Mid-Atlantic region. Reclamere works with clients of all sizes and stages of the security maturity model.
C. Brown, PMP, CISSP, is the founder of Business Complete Solutions®. He shows
leaders of manufacturing companies how to grow their business, and improve
their competitiveness while they manage the risk of cyber-attacks and
has more than twenty-five years experience in manufacturing and seventeen in
various cybersecurity roles. He has filled leadership positions in diverse
engineering, consulting, and management positions at a wide variety of
companies and industries.
specializes in using cybersecurity tools, techniques, and procedures to enable
companies to innovate and improve business profits. https://www.businesscompletesolutions.com/.
Fraud, Waste, and Abuse Hotline
© 2007–17 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100