Topic Abstracts
How Academia is helping combat cybersecurity
Panel abstract: During this panel discussion four leading Georgia Universities will share their role in helping improve defense capabilities both in the physical and virtual space. The Panel will share how universities collaborate on research, how they pursue joint research projects with corporations, and the resources universities have available to help companies overcome their security challenges. They will also share how their research centers are pushing the envelope when it comes to identifying, detecting, preventing and responding to security incidents. Questions for the panel can be submitted by emailing [email protected].
Working to secure our future through effective cyber operations and collaboration
Veteran FBI Cyber Division Section Chief Ron Yearwood takes an in depth look at what it takes to conduct effective and high impact cyber operations through investigation and collaboration between the FBI and private sector.
Left of Bang, with Awareness, Preparedness and Resilience
“Security is a process, not a product...”
The Process of Security, by Bruce Schneier. Information Security April 2000
“…not if, but when…”
Unknown
If then, else…If "security is a process; not a product", then we should be able to apply process improvement techniques, like: define, measure, analyze, improve and control to our cyber security strategies and business programs. Moving from a reactive nature, to more of an awareness and preparedness posture. Enterprises are beginning to focus more-and-more on “detection-and-prevention” strategies rather than simply depending on respond/response.
Left of Bang! We must focus more on “left of bang” processes/procedures, like awareness and preparedness, before the bad stuff happens. Hackers and bad-actors use the “cyber kill chain” process to infiltrate and exfiltrate and we know this. We must derail or disrupt the process before the BIG-BANG… Define, measure analyze, improve and control – rinse and repeat! When you are left of bang you can identify some of the prevention indicators that exist before an infiltration, breach, and during reconnaissance. This gives enough time to be proactive or left of the BANG!
We will briefly chat about these defensible actions:
The Process of Security, by Bruce Schneier. Information Security April 2000
“…not if, but when…”
Unknown
If then, else…If "security is a process; not a product", then we should be able to apply process improvement techniques, like: define, measure, analyze, improve and control to our cyber security strategies and business programs. Moving from a reactive nature, to more of an awareness and preparedness posture. Enterprises are beginning to focus more-and-more on “detection-and-prevention” strategies rather than simply depending on respond/response.
Left of Bang! We must focus more on “left of bang” processes/procedures, like awareness and preparedness, before the bad stuff happens. Hackers and bad-actors use the “cyber kill chain” process to infiltrate and exfiltrate and we know this. We must derail or disrupt the process before the BIG-BANG… Define, measure analyze, improve and control – rinse and repeat! When you are left of bang you can identify some of the prevention indicators that exist before an infiltration, breach, and during reconnaissance. This gives enough time to be proactive or left of the BANG!
We will briefly chat about these defensible actions:
- Workforce Development
- Detection, Deny, Disrupt, Degrade, Deceive, and Containment
- Network and Host Monitoring, Vul_Mgmt., /Log Mgmt
Breakout 1 Security track: Session 1 - Cloud Security, Regulations and Data Protection
Actionable items and case studies from projects including EU GDPR, HIPAA and PCI DSS
Breakout 1 Security track: Session 2 - You're Under Attack. Now Live the Response.
A Cyber Incident is a business issue, not just a security issue. To combat this danger, you need to create a security culture for your organization, and that starts with a comprehensive plan of preparedness. Using a state-of-the-art cyber range can train your security team, business leaders, and communications, human resources, public relations and legal representatives to act on a cyber attack as it’s happening—by showing them what it’s like to live through an attack. To help your firm survive, the cyber range gives your team the tools they need through a completely immersive security experience that tests skills, process and leadership competence.
Breakout 2 Physical Track: Session 1 - Voice Biometrics Based Client Monitoring
Voice Biometrics was employed in telephony based and wireless applications for monitoring populations under house arrest, probation, and other government mandated scenarios. The use of biometrics in these applications raised a number of challenges related to accuracy, tampering, and evolution of underlying technologies. The challenges, risk mitigation strategies, and lessons learned from this nearly 15 year effort are discussed. Ideas for future directions for biometrics based monitoring are presented.
Breakout 2 Physical Track: Session 2 - Using Untrusted Factories - Hardware Security
Today the production of hardware devices involves multiple suppliers at various stages of the production and support life-cycle. With very few exceptions, no electronics manufacturer actually designs and manufactures every single component of a device in their own factory. These hardware and manufacturing supply chains introduce considerable risk that threat actors could gain an opportunity to defraud, steal, counterfeit, or otherwise undermine the security of the produced electronic devices.
Some things that we will discuss in detail:
Some things that we will discuss in detail:
- Why you should not trust your factories. We will explore the various attack patterns seen in real world manufacturing environments.
- How you can build a secure product that your customers can trust even when using untrusted factories and repair center partners. We will talk about actual solutions that have been implemented to great effect.
Keynote 2: Cyber-Enabled Economic Warfare: The New Battleground
Economic warfare has been practiced since almost the beginning of time through various means including blockades, trade embargoes, and freezing capital assets. The Foundation for the Defense of Democracies has defined a new kind of warfare termed Cyber-Enabled Economic Warfare (CEEW). CEEW is distinguished from other types of cyber-attacks by the motivation and strategy of the nation-state attacker.
The Great Debate: Innovation Versus Security
The speed of innovation now outpaces our ability to comprehend and assess it ramifications. This is especially true in cybersecurity. How do we balance convenience versus security when it comes to implementing new technology in our critical infrastructure. Why is it so important to pause and openly debate the long term consequences of new technology and the security of our critical infrastructure. How do we balance the competing interests of the private sector and government when it comes to the convenience versus security debate.
Speaker Biographies
Georgia State Richard Baskerville is Regents’ Professor and Board of Advisors Professor in the Department of Computer Information Systems, J. Mack Robinson College of Business at Georgia State University, and Professor (partial appointment) in the School of Information Systems, Curtin Business School, at Curtin University, Perth, Western Australia. His research specializes in security of information systems, methods of information systems design and development, and the interaction of information systems and organizations. His interest in methods extends to qualitative research methods and the design science research paradigm.
Baskerville is the author of Designing Information Systems Security (J. Wiley) and more than 300 articles in scholarly journals, professional magazines, and edited books. He is Editor Emeritus and past Editor-in-Chief for The European Journal of Information Systems, Associate Editor for the Journal of Database Management, and serves on the editorial advisory board of the Journal of Systems and Information Technology, the Journal of Information Systems Security, and the International Journal of E-Collaboration.
Baskerville's practical and consulting experience includes advanced information system designs for the U.S. Defense and Energy Departments. He is past president of the Information Systems Academic Heads International, past chairman of the Information Systems Department at Georgia State, past chair of the IFIP Working Groups 8.2 (Information Systems and Organizations) and 8.11/11.13 (Information Systems Security Research), a Chartered Engineer under the British Engineering Council, a member of The British Computer Society and a Chartered IT Professional.
Baskerville holds degrees from the University of Maryland (B.S. summa cum laude, Management), the London School of Economics, of London (M.Sc., Analysis, Design and Management of Information Systems, and Ph.D., Systems Analysis). Honors and awards include honorary degrees from the University of Pretoria (PhD ), and Roskilde University (. ). Baskerville was awarded The LEO Award for Lifetime Exceptional Achievement by the Association for Information Systems in 2016 and the Silver Coreby the International Federation for Information Processing in 1998.
Baskerville is the author of Designing Information Systems Security (J. Wiley) and more than 300 articles in scholarly journals, professional magazines, and edited books. He is Editor Emeritus and past Editor-in-Chief for The European Journal of Information Systems, Associate Editor for the Journal of Database Management, and serves on the editorial advisory board of the Journal of Systems and Information Technology, the Journal of Information Systems Security, and the International Journal of E-Collaboration.
Baskerville's practical and consulting experience includes advanced information system designs for the U.S. Defense and Energy Departments. He is past president of the Information Systems Academic Heads International, past chairman of the Information Systems Department at Georgia State, past chair of the IFIP Working Groups 8.2 (Information Systems and Organizations) and 8.11/11.13 (Information Systems Security Research), a Chartered Engineer under the British Engineering Council, a member of The British Computer Society and a Chartered IT Professional.
Baskerville holds degrees from the University of Maryland (B.S. summa cum laude, Management), the London School of Economics, of London (M.Sc., Analysis, Design and Management of Information Systems, and Ph.D., Systems Analysis). Honors and awards include honorary degrees from the University of Pretoria (PhD ), and Roskilde University (. ). Baskerville was awarded The LEO Award for Lifetime Exceptional Achievement by the Association for Information Systems in 2016 and the Silver Coreby the International Federation for Information Processing in 1998.
Justin S. Daniels provides corporate and commercial real estate advice to growth oriented and middle market domestic and international businesses.
His corporate practice consists of representing businesses and business owners in all aspects of their growth cycle, from structuring new ventures, raising capital and advising on acquisitions and divestitures to reviewing and negotiating key vendor, franchise, employment and customer contracts. He specifically advises on cyber business and legal issues that pertain to mergers and acquisitions, investment capital transactions and related due diligence matters, vendor and customer contracts and cyber insurance. He has closed M&A transactions valued collectively more than $1 billion.
He represents international companies based in the United Kingdom, France, Italy, Sweden, Israel, Australia and Canada to establish U.S. operations for their technology related companies. His international experience makes him adept at identifying cultural, business and other differences in the U.S. market that can impact the ability of international companies to be successful in the U.S. market.
His corporate practice consists of representing businesses and business owners in all aspects of their growth cycle, from structuring new ventures, raising capital and advising on acquisitions and divestitures to reviewing and negotiating key vendor, franchise, employment and customer contracts. He specifically advises on cyber business and legal issues that pertain to mergers and acquisitions, investment capital transactions and related due diligence matters, vendor and customer contracts and cyber insurance. He has closed M&A transactions valued collectively more than $1 billion.
He represents international companies based in the United Kingdom, France, Italy, Sweden, Israel, Australia and Canada to establish U.S. operations for their technology related companies. His international experience makes him adept at identifying cultural, business and other differences in the U.S. market that can impact the ability of international companies to be successful in the U.S. market.
Matt has been with IBM Security for over 10 years, coming over as part of the Internet Security System acquisition by in IBM in 2006. His main focus is developing strategies and solutions for increasing situational awareness, threat detection and response orchestration though integration and automation.
Mr. Gatewood is Chief Information Security Officer for the state of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services program, and GTA.
He has more than 33 years of experience in cyber security programs for the U.S. military, state and federal governments, higher education, and global corporations. Prior to joining GTA, Mr. Gatewood served as Director of Cyber Workforce Development for Dell Secureworks. He was also Chief Information Security Officer for the University of Georgia, Interim Vice President for Information Technology and Chief Information Officer for Albany State University, and Chief Information Security Officer for the Board of Regents of the University System of Georgia.
Mr. Gatewood is a distinguished fellow at the Ponemon Institute, the widely known research center dedicated to privacy, data protection, and information security policy. He has also received numerous honors for his work in the field of information security, served as an active member of several professional associations, and published articles on information security.
He has more than 33 years of experience in cyber security programs for the U.S. military, state and federal governments, higher education, and global corporations. Prior to joining GTA, Mr. Gatewood served as Director of Cyber Workforce Development for Dell Secureworks. He was also Chief Information Security Officer for the University of Georgia, Interim Vice President for Information Technology and Chief Information Officer for Albany State University, and Chief Information Security Officer for the Board of Regents of the University System of Georgia.
Mr. Gatewood is a distinguished fellow at the Ponemon Institute, the widely known research center dedicated to privacy, data protection, and information security policy. He has also received numerous honors for his work in the field of information security, served as an active member of several professional associations, and published articles on information security.
David J. LeValley has served as the Special Agent in Charge (SAC) of the Atlanta Division since November 2016. Previously, Mr. LeValley served as the SAC of the Criminal and Cyber Division at the Washington Field Office (WFO).
Mr. LeValley entered on duty as a Special Agent with the FBI in 1996 assigned to the New York Division. He investigated Colombian/Caribbean drug trafficking and money laundering organizations on a task force with the New York City Police Department. In 2004, Mr. LeValley managed national investigations into major theft syndicates, transnational gangs, and drug trafficking groups in the Criminal Investigative Division at FBI Headquarters. He also led the FBI’s Jewelry and Gem Program. In 2007, Mr. LeValley supervised the FBI/MPD Safe Streets Violent Gang Task Force in Washington, D.C. and led investigations and
initiatives to reduce gang-related violence in the Nation’s capital. He would later lead WFO’s Violent Crimes Branch as an Assistant Special Agent in Charge. In 2013, Mr. LeValley served as the Section Chief for the Transnational Organized Crime – Western Hemisphere Section where he provided executive level leadership for international organized crime matters. In June 2015, he was appointed SAC of the Criminal and Cyber Division at WFO.
Mr. LeValley earned a Bachelor of Science degree in Criminal Justice from Shippensburg University of Pennsylvania and a Continuing Education Certificate in Leadership from Georgetown University. Prior to joining the FBI, he served with the United States Marine Corps and as a police officer for the Harrisburg Police Department in Pennsylvania.
Mr. LeValley lives in the metro Atlanta area with his wife. They have three children.
Mr. LeValley entered on duty as a Special Agent with the FBI in 1996 assigned to the New York Division. He investigated Colombian/Caribbean drug trafficking and money laundering organizations on a task force with the New York City Police Department. In 2004, Mr. LeValley managed national investigations into major theft syndicates, transnational gangs, and drug trafficking groups in the Criminal Investigative Division at FBI Headquarters. He also led the FBI’s Jewelry and Gem Program. In 2007, Mr. LeValley supervised the FBI/MPD Safe Streets Violent Gang Task Force in Washington, D.C. and led investigations and
initiatives to reduce gang-related violence in the Nation’s capital. He would later lead WFO’s Violent Crimes Branch as an Assistant Special Agent in Charge. In 2013, Mr. LeValley served as the Section Chief for the Transnational Organized Crime – Western Hemisphere Section where he provided executive level leadership for international organized crime matters. In June 2015, he was appointed SAC of the Criminal and Cyber Division at WFO.
Mr. LeValley earned a Bachelor of Science degree in Criminal Justice from Shippensburg University of Pennsylvania and a Continuing Education Certificate in Leadership from Georgetown University. Prior to joining the FBI, he served with the United States Marine Corps and as a police officer for the Harrisburg Police Department in Pennsylvania.
Mr. LeValley lives in the metro Atlanta area with his wife. They have three children.
DeBrae Kennedy-Mayo is a Research Faculty Member at the Scheller College of Business at the Georgia Institute of Technology, where she engages in research on legal and policy issues concerning privacy and cybersecurity. Peter Swire and Ms. Kennedy-Mayo will be co-authors on the 2018 edition of U.S. Private Sector Privacy: Law and Practice for Information Privacy Professionals, the International Association of Privacy Professionals’ book used by those studying for privacy certification. With Swire, Ms. Kennedy-Mayo also co-authored the 2017 Emory Law Journal article entitled, “Why Both the EU and US are ‘Stricter’ than Each Other for the Privacy of Government Requests for Information.” This article examined privacy protections provided in EU law as well as those that exist in US law, in an effort to further the discussions concerning mutual legal assistance.
Ms. Kennedy-Mayo has been an attorney for 15 years. Ms. Kennedy-Mayo has spent most of her career working in government, acting as both an Assistant Attorney General for the State of Georgia and as an Assistant District Attorney in several Georgia counties.
Ms. Kennedy-Mayo graduated with honors from Emory Law School in Atlanta. For many years, Ms. Kennedy-Mayo has been a member of InfraGard – Atlanta Alliance.
Ms. Kennedy-Mayo has been an attorney for 15 years. Ms. Kennedy-Mayo has spent most of her career working in government, acting as both an Assistant Attorney General for the State of Georgia and as an Assistant District Attorney in several Georgia counties.
Ms. Kennedy-Mayo graduated with honors from Emory Law School in Atlanta. For many years, Ms. Kennedy-Mayo has been a member of InfraGard – Atlanta Alliance.
Professor Mattord currently teaches undergraduate courses in Information Security and Assurance and Information Systems. He is the Operations Manager of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the coordinator for the KSU department of Computer Science and Information Systems Certificate in Information Security and Assurance.
He completed 24 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at Kennesaw State University. While engaged in his IT career, he worked as an adjunct professor at Kennesaw State University in Kennesaw Georgia, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University-San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where his practical knowledge of information security implementation and management was acquired.
Herb is the co-author with Dr. Michael Whitman of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, Readings and Cases in the management of Information Security: Volume II: Legal and Ethical Issues, Roadmap to Information Security Management for IT and InfoSec Professionals, and The Hands-on Information Security Lab Manual.
He completed 24 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at Kennesaw State University. While engaged in his IT career, he worked as an adjunct professor at Kennesaw State University in Kennesaw Georgia, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University-San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where his practical knowledge of information security implementation and management was acquired.
Herb is the co-author with Dr. Michael Whitman of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, Readings and Cases in the management of Information Security: Volume II: Legal and Ethical Issues, Roadmap to Information Security Management for IT and InfoSec Professionals, and The Hands-on Information Security Lab Manual.
Ulf is the Head of Innovation at TokenEx, previously Chief Technology Officer at Atlantic BT Security Solutions, and earlier CTO at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity. He invented the Protegrity Vaultless Tokenization, Data Type Preserving Encryption and he created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM.
Ulf is the inventor of more than 55 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. One line of his research during the last 15 years is in the area of managing and enforcing security policies for databases, including joint projects with research and development teams at IBM, Microsoft, Hewlett-Packard, Oracle, Sybase, Informix, Teradata, and RSA.
Ulf is a research member of IFIP and a member of ANSI X9. Leading journals and professions magazines, including IEEE Xplore, ISACA and IBM Journals, published more than 100 of his in-depth professional articles and papers. Ulf received Industry's 2008 Most Valuable Performers (MVP) award together with technology leaders from IBM, Cisco Systems, Ingres, Google and other leading companies. Ulf frequently gives presentations at leading security and database conferences in US, Europe and ASIA, and frequent tutorials at the Information Systems Security Association (ISSA) and Information Systems Audit and Control Association (ISACA).
Specialties: IT Security, Data Encryption, Key Management, Databases, PCI DSS. Please check out https://www.brighttalk.com/channel/14723/ and https://www.linkedin.com/in/umattsson/
Ulf is the inventor of more than 55 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention. One line of his research during the last 15 years is in the area of managing and enforcing security policies for databases, including joint projects with research and development teams at IBM, Microsoft, Hewlett-Packard, Oracle, Sybase, Informix, Teradata, and RSA.
Ulf is a research member of IFIP and a member of ANSI X9. Leading journals and professions magazines, including IEEE Xplore, ISACA and IBM Journals, published more than 100 of his in-depth professional articles and papers. Ulf received Industry's 2008 Most Valuable Performers (MVP) award together with technology leaders from IBM, Cisco Systems, Ingres, Google and other leading companies. Ulf frequently gives presentations at leading security and database conferences in US, Europe and ASIA, and frequent tutorials at the Information Systems Security Association (ISSA) and Information Systems Audit and Control Association (ISACA).
Specialties: IT Security, Data Encryption, Key Management, Databases, PCI DSS. Please check out https://www.brighttalk.com/channel/14723/ and https://www.linkedin.com/in/umattsson/
Mr. Michael is a technology consultant with over 25 years IT experience including 15 years in speech recognition and voice biometrics. He holds a Masters degree in Physics from Georgia State University and is Co-inventor of United States Patent US 9489819 B2: Personal monitor and tracking system.
Dr. Bryson Payne is a professor of computer science in the Mike Cottrell College of Business at the University of North Georgia and is a Certified Information Systems Security Professional (CISSP®). Dr. Payne has taught computer science at UNG since 1999 and served as the university's chief information officers for six years, overseeing an IT division with budgets in excess of $4 million annually.
Dr. Payne is the author of the book Teach Your Kids to Code: A parent-friendly guide to Python programming (2015) from No Starch Press. He has been featured in CIO Magazine, Campus Technology and the Wall Street Journal.
Dr. Payne has been programming computers for over 30 years; he sold his first paid program to RUN Magazine (Commodore 64) for their "Magic" column in 1985, for $10. In addition to his affinity for technology, Dr. Payne speaks Spanish and French, and is conversational in Russian and Mandarin Chinese.
Dr. Payne is the author of the book Teach Your Kids to Code: A parent-friendly guide to Python programming (2015) from No Starch Press. He has been featured in CIO Magazine, Campus Technology and the Wall Street Journal.
Dr. Payne has been programming computers for over 30 years; he sold his first paid program to RUN Magazine (Commodore 64) for their "Magic" column in 1985, for $10. In addition to his affinity for technology, Dr. Payne speaks Spanish and French, and is conversational in Russian and Mandarin Chinese.
Mark Weatherford is the Chief Cybersecurity Strategist at vArmour. He has more than 20 years of security operations leadership and executive-level policy experience and his former roles include:
• Principal - The Chertoff Group
• Deputy Under Secretary for Cybersecurity at DHS
• CSO - North American Electric Reliability Corporation
• CISO - State of California
• CISO - State of Colorado
• U.S. Navy cryptologist
He holds a BS from the University of Arizona, an MS from the Naval Postgraduate School and is a CISSP. He was awarded SC Magazine’s “2010 CSO of the Year”, named one of the “10 Most Influential People in Government Information Security” by GovInfoSecurity in both 2012 and 2013, selected for the 2013 CSO Compass Award, and presented the 2017 SC Media Reboot ‘Influencer’ Leadership Award.
• Principal - The Chertoff Group
• Deputy Under Secretary for Cybersecurity at DHS
• CSO - North American Electric Reliability Corporation
• CISO - State of California
• CISO - State of Colorado
• U.S. Navy cryptologist
He holds a BS from the University of Arizona, an MS from the Naval Postgraduate School and is a CISSP. He was awarded SC Magazine’s “2010 CSO of the Year”, named one of the “10 Most Influential People in Government Information Security” by GovInfoSecurity in both 2012 and 2013, selected for the 2013 CSO Compass Award, and presented the 2017 SC Media Reboot ‘Influencer’ Leadership Award.
Rob Wood is the Practice Director for the Hardware and Embedded Security Services practice at NCC Group. His career in embedded devices spans 16 years, having worked at both BlackBerry and Motorola Mobility in roles focussed on embedded software development, product firmware and hardware security, and supply chain security. Rob is an experienced firmware developer with extensive security architecture experience. His specialty is in designing, building, and reviewing products to push the security boundaries deeper into the firmware, hardware, and supply chain. He is most comfortable working with the software layers deep in the bowels of the system, well below userland, where the lines between hardware and software begin to blur. This includes things like the bootloaders, kernel, device drivers, firmware, baseband, trusted execution environments, debug and development tools, factory and repair tools, and all the processes that surround them.
Rob has built and managed three hardware security labs with varying budgets and levels of capabilities. These labs produced a number of projects including leading-edge security research, product security assessments, and security incident response. Capabilities have included circuit and component level testing and assessments, silicon device failure analysis (with outside help), factory and repair process/tool/system security and incident response.
Rob has built and managed three hardware security labs with varying budgets and levels of capabilities. These labs produced a number of projects including leading-edge security research, product security assessments, and security incident response. Capabilities have included circuit and component level testing and assessments, silicon device failure analysis (with outside help), factory and repair process/tool/system security and incident response.
Ronald J. Yearwood, Jr., has been a Special Agent with the FBI for 22 years and is currently a Section Chief in the FBI Cyber Division. Prior to this position, SC Yearwood was assigned as Assistant Special Agent in Charge (ASAC) of Branch 2B for the Minneapolis Field Office, managing cyber and violent crime matters along with all administrative functions within the division. SC Yearwood has worked in a number of offices, including Boston, Houston, two tours at FBI Headquarters, and one tour in Iraq. Mr. Yearwood has had the privilege of leading various challenging initiatives in a number of assignments during his tenure, including terrorism investigations and responses to emerging terrorism incidents, violent crime / bank robberies, computer intrusions, online exploitation of children, and all other forms of cyber crime. Before entering the FBI, SC Yearwood was a police officer for nearly seven years in the city of Sunrise, Florida, working road patrol and juvenile crimes / youth gangs as a School Resource Officer (SRO).
InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.