Events

Events

Eve Maler – ForgeRock

Why nominated: Eve Maler is a leading proponent on a variety of topics including from privacy and digital identity, security, privacy, and consent, with a focus on fostering successful ecosystems and individual empowerment. Maler drives privacy and consent innovation for the ForgeRock Identity Platform, enabling user-controlled and compliant data sharing across web, mobile, and IoT…

Rebecca Wynn – Matrix Medical Network

Why Nominated: Rebecca Wynn is responsible for fortifying Matrix Medical Network’s systems and data against increasingly sophisticated cyberattacks against health care providers, including data breaches, ransomware and IoT medical device exploitation. But her influence doesn’t stop at health care – Wynn boasts a proven track record of securing data and systems across a wide swath…

Laura Lee – Circadence Corporation

Why Nominated:  Laura Lee, who manages rapid-prototype projects for experiential cybersecurity learning on the Circadence’s AI-powered platform Project Ares, brings an exceptional leadership record in the field of cyber exercises and training, previously directing the research and development at Johns Hopkins University/Applied Physics Lab (JHU/APL). Profile: Her holistic delivery of learning material makes Laura Lee…

Andrew van der Stock – Synopsys

Why nominated: A 20-year veteran, Andrew van der Stock is a senior principal consultant at Synopsys, providing technical leadership in security architecture, threat modeling, secure coding guidelines and reviews, assurance and penetration tests, risk assessments, and developer training. Additionally, he leads the OWASP Top 10 and Application Security Verification Standard projects. He previously led the…

Yatia Hopkins – eSentire

Why nominated: Yatia Hopkins brings the mentoring skills she honed as lead of eSentire’s Solutions Engineering team to Yeshiva University’s MS in Cybersecurity program. A frequent participant in women’s career organizations, Hopkins is committed to making a positive impact on the next generation of tech and cyber leaders. Profile: This past April, Hopkins joined Manhattan-based Yeshiva…

Adam Isles – The Chertoff Group

Why Nominated: Adam Isles, who has held leadership positions in the U.S. Department of Homeland Security, Department of Justice, National Security Council and Raytheon before joining The Chertoff Group, is a senior associate (non- resident) at the Center for Strategic & International Studies Homeland Security & Counterterrorism Program and serves on the board of directors…

Ken Underhill – Cybrary

Why nominated: Ken Underhill primary mission is to be a hands on instructor using live and online cybersecurity classes to enable students to attend his classes worldwide. This is part of his core belief than people anywhere should have access to an affordable education if they wish to join the cybersecurity field. Profile: In the…

Ellison Anne Williams – Enveil

Why Nominated: Starting a company has been Ellison Anne’s dream since she was young and the success of Enveil shows her determination, technical expertise and innovation in securing data while it’s being used or processed. She developed the core of the company’s technology while at the National Security Agency (NSA) and once entering the private sector,…

Kabir Barday – OneTrust

Why nominated: While many people fear privacy regulation could be a detriment to innovation, Kabir Barday takes the opposite approach and views directives like GDPR and the upcoming California Consumer Privacy Act as an opportunity for a company differentiate itself. Profile: Because privacy is such a personal issue, Barday has worked to looked passed simply…

Abhishek Singh – Prismo Systems

Why nominated: Abhishek Singh has played a crucial role in the development of sophisticated cybersecurity technologies and processes, including real-time analysis via virtual machines, deception-based techniques, and intrusion prevention and detection. This past year, his research to detect injection exploitation in web applications led to an “API and Query Integrity Algorithm,” which was selected for…

Next post in Reboot Leadership Awards 2019