Featured Faculty
Bird is an internationally recognized identity-centric security expert who has been a CIO, CISO and the global head of identity management for JP Morgan Chase.
An internationally recognized data privacy and identity-centric security expert and global speaker, Bird leverages his diverse experiences as a strategic advisor and solutions provider to challenge current notions about cybersecurity. An early proponent of the zero trust strategy, Bird is a frequent speaker on keynote platforms around the world. He is a Forbes Tech council member and speaks on topics ranging from data protection regulations to cybersecurity-enabled consumer protection.
Richard BirdChief Security Officer, Traceable AI An internationally recognized data privacy and identity-centric security expert and global speaker, Bird leverages his diverse experiences as a strategic advisor and solutions provider to challenge current notions about cybersecurity. An early proponent of the zero trust strategy, Bird is a frequent speaker on keynote platforms around the world. He is a Forbes Tech council member and speaks on topics ranging from data protection regulations to cybersecurity-enabled consumer protection.

Maler is ForgeRock's CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment.
Maler has been at the forefront of almost every innovation in identity in the internet age, including co-creating such landmark technologies as XML and innovating and leading standards such as SAML and User-Managed Access (UMA). She has also served as a Forrester Research security and risk analyst with John Kindervag. She is also a strong advocate of zero trust identity.
Eve MalerCTO, ForgeRock Maler has been at the forefront of almost every innovation in identity in the internet age, including co-creating such landmark technologies as XML and innovating and leading standards such as SAML and User-Managed Access (UMA). She has also served as a Forrester Research security and risk analyst with John Kindervag. She is also a strong advocate of zero trust identity.

Dr. Chase Cunningham known as the Doctor of Zero Trust, Chase is an early advocate and proponent of the Zero Trust strategy and is currently the CEO of Demo-Force. In this role, Chase shapes the company’s strategic vision, roadmap and key partnerships
Dr. Cunningham previously served as vice president and principal analyst at Forrester Research, providing strategic guidance on Zero Trust, artificial intelligence, machine learning and security architecture design for security leaders around the globe.
Dr. Chase CunninghamCEO, Demo-Force Dr. Cunningham previously served as vice president and principal analyst at Forrester Research, providing strategic guidance on Zero Trust, artificial intelligence, machine learning and security architecture design for security leaders around the globe.

Kindervag is considered one of the world's foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of cybersecurity.
Kindervag currently advises both public and private sector organizations with the design and building of zero trust networks and other cybersecurity topics. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH and CCNA. He has a practitioner background, having served as a security consultant, penetration tester and security architect. His expertise lies in the areas of secure network design, wireless security and voice-over-IP hacking.
JOHN KINDERVAGCreator of Zero Trust, and SVP, Cybersecurity Strategy, ON2IT Kindervag currently advises both public and private sector organizations with the design and building of zero trust networks and other cybersecurity topics. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH and CCNA. He has a practitioner background, having served as a security consultant, penetration tester and security architect. His expertise lies in the areas of secure network design, wireless security and voice-over-IP hacking.

Finney is the chief security officer of Southern Methodist University. He is an early advocate of zero trust as an IT security strategy, and is an expert in policy, awareness, compliance, operational management, and the complex legal issues surrounding modern information security.
He is a bestselling author of several cybersecurity books, including the award-winning book "Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future." He holds a JD from the Southern Methodist University, as well as several cybersecurity certifications, including CISSP, CISM and CIPP.
GEORGE FINNEYChief Security Officer & Director of Digital Interests, Southern Methodist University He is a bestselling author of several cybersecurity books, including the award-winning book "Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future." He holds a JD from the Southern Methodist University, as well as several cybersecurity certifications, including CISSP, CISM and CIPP.

Kale is the co-founder of Think.Design.Cyber to pioneer critical, systems and design thinking in the cybersecurity discipline. She is also the founding executive fellow of the CyberTheory Institute.
In 2020, Kale co-authored an award-winning research article "Cybersecurity: The End Game" published in Taylor and Francis' EDPACS journal. Her multi-disciplinary career is focused on bridging gaps between business ROI, technology and people. She has successfully led cybersecurity initiatives and managed cybersecurity board reporting and budgets. She is also an executive coach and D&I practitioner and advises growth companies focused on human-centered, sustainable products and technology.
PRACHEE KALECo-founder of Think.Design.Cyber, and Executive Fellow of the CyberTheory Institute In 2020, Kale co-authored an award-winning research article "Cybersecurity: The End Game" published in Taylor and Francis' EDPACS journal. Her multi-disciplinary career is focused on bridging gaps between business ROI, technology and people. She has successfully led cybersecurity initiatives and managed cybersecurity board reporting and budgets. She is also an executive coach and D&I practitioner and advises growth companies focused on human-centered, sustainable products and technology.

Touhill is director of the world-renowned CERT division of the Carnegie Mellon University Software Engineering Institute, where he leads researchers,
software engineers, security analysts and digital intelligence specialists working together to research security vulnerabilities in software products and contribute to long-term changes in networked systems design.
Touhill was appointed by former President Barack Obama to be the first CISO of the U.S. government. Previously, he served in the Department of Homeland Security as deputy assistant secretary in the Office of Cybersecurity and Communications. He is a 30-year veteran of the U.S. Air Force and retired with the rank of brigadier general.
Greg TouhillDirector, CERT Division, Carnegie Mellon University Software Engineering Institute Touhill was appointed by former President Barack Obama to be the first CISO of the U.S. government. Previously, he served in the Department of Homeland Security as deputy assistant secretary in the Office of Cybersecurity and Communications. He is a 30-year veteran of the U.S. Air Force and retired with the rank of brigadier general.

Sam Curry is a 30-year veteran of the cybersecurity industry. He began his career in signals and cryptanalysis and was the first employee at Signal 9 Solutions, a small start-up that invented the personal firewall, executed the first commercial implementation of Blowfish, and devised early stealthy (symmetric key) VPN technology that was ultimately sold to McAfee. Sam would go on to serve as Chief Security Architect there and as head of Product for McAfee.com before holding several positions at RSA including head of RSA labs at MIT, head of product, and CTO, as well as Distinguished Engineer for EMC.
After seven years with RSA, Curry acted as SVP and CISO at Microstrategy, CSO & CTO for Arbor Networks before it became Netscout, and as CSO for Cybereason. Sam is a Forbes contributor, holds 17 active patents in cybersecurity and a master’s degree in counterterrorism, and sits on two boards of directors. In addition, he teaches courses at Harvard (online), Wentworth Technology Institute, and Nichols College. He is also a Fellow at the National Security Institute at George Mason University.
SAM CURRYVP, CISO, Zscaler After seven years with RSA, Curry acted as SVP and CISO at Microstrategy, CSO & CTO for Arbor Networks before it became Netscout, and as CSO for Cybereason. Sam is a Forbes contributor, holds 17 active patents in cybersecurity and a master’s degree in counterterrorism, and sits on two boards of directors. In addition, he teaches courses at Harvard (online), Wentworth Technology Institute, and Nichols College. He is also a Fellow at the National Security Institute at George Mason University.

Grant is a member of Venable's Cybersecurity Risk Management Group, where he advises clients on policy impacts across the IT, cybersecurity, identity and payments sectors. An early proponent of zero trust principles, he is a well-known expert on identity authentication and proofing.
Grant joined Venable after serving as a managing director at The Chertoff Group. Before that, he established and led the National Program Office for the National Strategy for Trusted Identities in Cyberspace for NIST and also served as NIST's senior executive advisor for identity management, leading efforts to improve identity and authentication for individuals and devices in the NIST Roadmap.
JEREMY GRANTManaging Director, Technology Business Strategy, Venable LLP Grant joined Venable after serving as a managing director at The Chertoff Group. Before that, he established and led the National Program Office for the National Strategy for Trusted Identities in Cyberspace for NIST and also served as NIST's senior executive advisor for identity management, leading efforts to improve identity and authentication for individuals and devices in the NIST Roadmap.

Schneider is a recognized leader in the cybersecurity sector with extensive experience driving organizational change, improving program maturity while reducing costs, developing policy and governance structures, and driving enterprise-wide technology modernization initiatives.
Having served as the U.S. federal chief information security officer (CISO) based out of the White House and on the White House National Security Council (NSC) as senior director for cybersecurity policy, Schneider is uniquely positioned to help navigate the strategic, operational, and risk management needs of large-scale global technology environments. Prior to being appointed as the federal CISO, he served as the first deputy federal CISO, supporting the creation of the new office within OMB and the establishment of the federal CISO Council. His experience also includes developing identity management policies that implement multifactor authentication capabilities to enhance information sharing and security.
GRANT SCHNEIDERSenior Director for Cybersecurity Services, Venable LLP Having served as the U.S. federal chief information security officer (CISO) based out of the White House and on the White House National Security Council (NSC) as senior director for cybersecurity policy, Schneider is uniquely positioned to help navigate the strategic, operational, and risk management needs of large-scale global technology environments. Prior to being appointed as the federal CISO, he served as the first deputy federal CISO, supporting the creation of the new office within OMB and the establishment of the federal CISO Council. His experience also includes developing identity management policies that implement multifactor authentication capabilities to enhance information sharing and security.

Brooks is on the adjunct faculty in the Graduate Cybersecurity Program at Georgetown University and a widely respected cybersecurity thought leader, influencer and technology evangelist. He is a featured writer/speaker/blogger on homeland security, cybersecurity, CBRNE, artificial intelligence, the internet of things, science and technology, public/private partnerships, risk management, blockchain, and security innovation.
Brooks served as the SME for cybersecurity for the U.S. Homeland Defense and Security Information Analysis Center; is a former technology partner advisor at the Bill and Melinda Gates Foundation; served on the EC-Council Global Advisory Board and the MIT Technology Review Advisory Board; and is Chairman of the CompTIA New and Emerging Technologies committee. Brooks also served as the vice president for Homeland Security for Xerox, the vice president of Government Relations for SRA, and the vice president of R&D for Rapiscan.
CHUCK BROOKSAdjunct Faculty, Georgetown University Brooks served as the SME for cybersecurity for the U.S. Homeland Defense and Security Information Analysis Center; is a former technology partner advisor at the Bill and Melinda Gates Foundation; served on the EC-Council Global Advisory Board and the MIT Technology Review Advisory Board; and is Chairman of the CompTIA New and Emerging Technologies committee. Brooks also served as the vice president for Homeland Security for Xerox, the vice president of Government Relations for SRA, and the vice president of R&D for Rapiscan.

Redbord is the head of legal and government affairs at TRM Labs, the blockchain intelligence company. Prior to joining TRM Labs, he served as a senior advisor to the deputy secretary and the under secretary for terrorism and financial intelligence at the United States Department of Treasury. In this capacity, he worked with teams from the Financial Crimes Enforcement Network (FinCEN), Office of Foreign Assets Control (OFAC), and other Treasury and interagency components on issues related to sanctions, the Bank Secrecy Act, cryptocurrency, and anti-money laundering strategies.
Previously, he served as a senior assistant United States Attorney for the District of Columbia, where he investigated and prosecuted cases related to cryptocurrency, terrorist financing, sanctions evasion, export control, child exploitation and human trafficking. He has received numerous awards from FinCEN, the FBI and the United States Attorney's Office, including the Attorney General's Award for leading an interagency task force dedicated to prosecuting those who abuse and exploit children.
Ari RedbordHead of Legal and Government Affairs, TRM Labs Previously, he served as a senior assistant United States Attorney for the District of Columbia, where he investigated and prosecuted cases related to cryptocurrency, terrorist financing, sanctions evasion, export control, child exploitation and human trafficking. He has received numerous awards from FinCEN, the FBI and the United States Attorney's Office, including the Attorney General's Award for leading an interagency task force dedicated to prosecuting those who abuse and exploit children.

Leach has spent more than 25 years advocating for the advancement of responsible and safe technology to improve the quality of living and parity for all. As the chief strategy officer, Leach supports Cloud Security Alliance's corporate strategy and ongoing mission to provide new and relevant cloud security awareness, education, research, programs and membership participation. He specifically focuses on external engagements and corporate initiatives surrounding the financial services and payment industries, cryptocurrency, and related government activities and serves as a featured CSA speaker at various industry events.
Additionally, he sits on advisory boards as an expert in information security and financial payments and also advises universities on future cybersecurity curricula. He also is recognized within the World Economic Forum as an expert in blockchain and cybersecurity.
TROY LEACHChief Strategy Officer, Cloud Security Alliance Additionally, he sits on advisory boards as an expert in information security and financial payments and also advises universities on future cybersecurity curricula. He also is recognized within the World Economic Forum as an expert in blockchain and cybersecurity.

Dr. Sample is the cybersecurity principal at MTSI. She is a visiting academic at the University of Warwick, and a guest lecturer at Bournemouth University, Rensselaer Polytechnic University, and Royal Holloway University. Prior to MTSI, she was the chief cybersecurity research scientist for the Cybercore division at Idaho National Laboratory.
Dr. Sample has more than 20 years of experience in the information security industry. Her research focuses on deception and the role of cultural values in cybersecurity events. More recently, she has begun researching the relationship between human cognition and machines. Presently, she is continuing research on modeling cyber behaviors by culture. Her other areas of research are data resilience, cyber-physical systems and industrial control systems.
DR. CHAR SAMPLECybersecurity Principal, MTSI Dr. Sample has more than 20 years of experience in the information security industry. Her research focuses on deception and the role of cultural values in cybersecurity events. More recently, she has begun researching the relationship between human cognition and machines. Presently, she is continuing research on modeling cyber behaviors by culture. Her other areas of research are data resilience, cyber-physical systems and industrial control systems.

Hood is an EVP and cybersecurity engineering expert supporting organizations across sectors to develop and implement strategies to manage cybersecurity and privacy risks to their business. She works with organizations to meet cybersecurity best practices, controls and standards, including the NIST Cybersecurity Framework, CMMC, SP 800-53, SP 800-171 and ISO 27001.
Hood assisted the NIST Cybersecurity Framework team in the evolution and outreach of the Cybersecurity Framework. Recently, she has supported the CMMI Institute in the development and expansion of the CMMI Cybermaturity Platform. The patented approach she helped develop for CMMI translates cybersecurity risk to cybermaturity goals and identifies mitigation strategies to help organizations improve their cybersecurity capabilities. Hood is also a registered practitioner for the Certificated Maturity Model Certification program.
KELLY HOODEVP and Cybersecurity Engineer, Optic Cyber Solutions Hood assisted the NIST Cybersecurity Framework team in the evolution and outreach of the Cybersecurity Framework. Recently, she has supported the CMMI Institute in the development and expansion of the CMMI Cybermaturity Platform. The patented approach she helped develop for CMMI translates cybersecurity risk to cybermaturity goals and identifies mitigation strategies to help organizations improve their cybersecurity capabilities. Hood is also a registered practitioner for the Certificated Maturity Model Certification program.

Kellerman is the senior vice president of cyber strategy for Contrast Security. He is responsible for developing and overseeing the company's government and financial sector strategy, which includes advising government agencies, standard bodies, financial institutions, insurers and regulators.
In addition, Kellerman drives Contrast's industrywide approach to share strategic, software-layer cyber-intelligence. Prior to joining Contrast, he held the positions of head of cybersecurity strategy for VMware and chief cybersecurity officer for Carbon Black. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service, and was appointed a commissioner on the Commission on Cyber Security in 2008 for the 44th President of the United States.
TOM KELLERMANSVP of Cyber Strategy, Contrast Security In addition, Kellerman drives Contrast's industrywide approach to share strategic, software-layer cyber-intelligence. Prior to joining Contrast, he held the positions of head of cybersecurity strategy for VMware and chief cybersecurity officer for Carbon Black. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service, and was appointed a commissioner on the Commission on Cyber Security in 2008 for the 44th President of the United States.

Peachey is an expert in the cyber insurance space. Currently, she serves as the director of business development, connecting clients and partners with cybersecurity solutions at Arete Incident Response, an insurance company and security insurance space.
Previously earning her two bachelor's degrees from Rutgers University in New Jersey in psychology and industrial relations, then her JD from Pace University's Elizabeth Haub School of Law, Peachey is licensed in multiple states, including New York, California, Texas and Florida, as well as admitted to the New York and New Jersey Bar.
LYNN PEACHEYDirector of Business Development, Arete Incident Response Previously earning her two bachelor's degrees from Rutgers University in New Jersey in psychology and industrial relations, then her JD from Pace University's Elizabeth Haub School of Law, Peachey is licensed in multiple states, including New York, California, Texas and Florida, as well as admitted to the New York and New Jersey Bar.

Barnier brings a unique synthesis on change ranging from global economics to technology that is reshaping time and space. Technologically, he has led teams to nine U.S. patents. Previously, he led initiatives at Ameritech (now AT&T), Lucent (now Nokia) and IBM.
Barnier has taught operations, finance and economics at the graduate level in the U.S., and has been a guest lecturer in Russia and Mexico. In 2014, he served on the faculty of the Wharton/ABA Stonier Graduate School of Banking. He earned an MBA and BBA both with distinction and other honors (including Beta Gamma Sigma and Financial Management Honor Society) from the University of Michigan Ross School of Business Administration.
BRIAN BARNIERHead of Decision Science and Analytics, ValueBridge Advisors; and Co-founder and Product Owner, Think.Design.Cyber Barnier has taught operations, finance and economics at the graduate level in the U.S., and has been a guest lecturer in Russia and Mexico. In 2014, he served on the faculty of the Wharton/ABA Stonier Graduate School of Banking. He earned an MBA and BBA both with distinction and other honors (including Beta Gamma Sigma and Financial Management Honor Society) from the University of Michigan Ross School of Business Administration.

Bordow is the SVP and principal systems architect for advanced technologies at Wells Fargo Bank. In this role, he is responsible for leading the quantum technology research team, and many other advanced, innovation and ideation efforts across WF technology.
Bordow has more than 30 years of technology and thought leadership/ management experience across financial, aerospace, defense and communications industries. He has managed large technology projects in research and development, business innovation, and innovation labs. At Wells Fargo, he has been awarded the 2020 Galileo Award for integrating patent strategy in support of Wells Fargo's key priorities, the 2019 Einstein Award for advancing innovation in uncharted areas and the 2017 Gold Coin Award for innovation. He has filed more than two dozen patents with the U.S. Patent Office in 2019/2020 on topics such as digital identity, quantum technology and post-quantum cryptography.
PETER BORDOWSVP, Distinguished Engineer, Wells Fargo Bank Bordow has more than 30 years of technology and thought leadership/ management experience across financial, aerospace, defense and communications industries. He has managed large technology projects in research and development, business innovation, and innovation labs. At Wells Fargo, he has been awarded the 2020 Galileo Award for integrating patent strategy in support of Wells Fargo's key priorities, the 2019 Einstein Award for advancing innovation in uncharted areas and the 2017 Gold Coin Award for innovation. He has filed more than two dozen patents with the U.S. Patent Office in 2019/2020 on topics such as digital identity, quantum technology and post-quantum cryptography.

Dr. Robinson is a senior cybersecurity engineer with more than 15 years of experience in the IT and cybersecurity fields. Skilled in statistical data analysis, team leadership, penetration testing and risk management, Dr. Robinson earned her doctorate in cybersecurity from Capitol Technology University.
Dr. Robinson is a member of the Board of Directors for InfraGard Maryland Chapter and provides support for InfraGard at the national level on the Journal Review Committee. Dr. Robinson teaches graduate-level courses in quantitative methods, incident response and healthcare mobile device security at Touro College and Capitol Technology University. She holds multiple industry certifications, including CISSP and CEH.
Dr. NIKKI ROBINSONCybersecurity Engineer, IBM Dr. Robinson is a member of the Board of Directors for InfraGard Maryland Chapter and provides support for InfraGard at the national level on the Journal Review Committee. Dr. Robinson teaches graduate-level courses in quantitative methods, incident response and healthcare mobile device security at Touro College and Capitol Technology University. She holds multiple industry certifications, including CISSP and CEH.

Previous
Next
"I think one of the most critical needs we have in this space is a lack of shared knowledge. CyberEd.io has a massive network and distribution channel that I see as an avenue to rectifying some of that lack of shared institutional experience via their well-managed digital channel. By teaming up with and authoring content on CyberEd.io, I know that we will have made a contribution to the collective good of cyber security practitioners, leaders, researchers, and learners that is critical to our future success and overall security posture."

Dr. Chase Cunningham
Chief Strategy Officer, Ericom
CyberEd.io Faculty
CyberEd.io Faculty
Join our Faculty
CyberEd.io works with award-winning and highly reputable practitioners to develop courses that aren’t available anywhere else.
If you have proven in-depth knowledge in cybersecurity and a desire to share your expertise and help create the next generation of cyber professionals, we are interested in hearing from you.
Requirements & Benefits
- Must demonstrate expertise in their subject-matter area of interest.
- Must be able to dedicate significant effort to course creation and development of supporting instructional materials.
- Faculty will gain access to CyberEd.io network.
- CyberEd.io will promote the faculty and course .