Securepairs.org is an organization of information technology (IT) and information security (“cyber”) professionals who support the right to repair. Our members are some of the most respected names in the information security field and include executives, researchers, product managers, entrepreneurs and academics.

Here are some of the people who we count as supporters and signatories to our securepairs.org Statement of Principles.

Paul Roberts, Securepairs.org

Paul F Roberts

Founder
Paul Roberts is the founder of SecuRepairs.org. Paul is a seasoned reporter, editor and industry analyst with almost two decades’ experience covering the information technology security space. His writing about cyber security has appeared in publications including The Christian Science Monitor, MIT Technology Review, The Economist Intelligence Unit, CIO Magazine, ZDNet and Fortune Small Business.
Bruce Schneier

Bruce Schneier

Supporter

Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of 13 books–including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World–as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier FoundationAccessNow, and the Tor Project; an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org; and a special advisor to IBM Security.

Tarah Wheeler

Tarah Wheeler

Supporter

Tarah  is a security industry veteran, strategist, international conflict scientist, and oft-cited cybersecurity media expert. She is a Cybersecurity Policy Fellow at New America. She is an inaugural contributing cybersecurity expert for the Washington Post and a Foreign Policy contributor on cyber warfare. She is the lead author of the best-selling Women In Tech: Take Your Career to The Next Level With Practical Advice And Inspiring Stories. She previously spent over a decade as Principal Security Strategist advising on information security and serving as vCISO for multiple clients at Red Queen Technologies. She has led web application security projects at Microsoft Game Studios (Halo and Lips) and architected systems at encrypted mobile communications firm Silent Circle. She has spoken on information security at the OECD and FTC, at Stanford and Oxford, on PBS NOVA, and many other governmental and industry conferences.

Gary McGraw is Chief Technology Officer at

Gary McGraw

Supporter

Gary McGraw is a globally recognized authority on software security and the author of eight best selling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online Games, and 6 other books; and he is editor of the Addison-Wesley Software Security series.  Dr. McGraw has also written over 100 peer-reviewed scientific publications, authors a periodic security column for SearchSecurity, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Maxmyinterest, NTrepid, and Ravenwhite.  He has also served as a Board member of Cigital and Codiscope (acquired by Synopsys) and as Advisor to Dasient (acquired by Twitter), Fortify Software (acquired by HP), and Invotas (acquired by FireEye). His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics.  Gary produces the monthly Silver Bullet Security Podcast for Synopsys and IEEE Security & Privacy magazine (syndicated by SearchSecurity).

Jon Callas ACLU

Jon Callas

Supporter

Jon Callas is a Senior Technology Fellow at the American Civil Liberties Union (ACLU). Jon has held major positions at Digital Equipment CorporationApple, PGP, and Entrust, and is considered “one of the most respected and well-known names in the mobile security industry.” Jon is a co-founder of the firm Blackphone and a co-founder and former Chief Technology Officer at the firm Silent Circle. He is co-credited with creating several Internet Engineering Task Force (IETF) standards, including OpenPGP, DKIM, and ZRTP, which he wrote. Prior to his work at Entrust, he was Chief Technical Officer and co-founder of PGP Corporation and the former Chief Technical Officer of Entrust.

Billy Rios

Billy Rios

Supporter

Billy is the founder of Whitescope LLC, a startup focused on embedded device security. Billy is recognized as one of the world’s most respected experts on emerging threats related to Industrial Control Systems (ICS), Critical Infrastructure (CI), and, medical devices. He discovered thousands of security vulnerabilities in hardware and software supporting ICS and critical infrastructure. Billy has worked at Google where he led the front-line response for externally reported security issues and incidents. Prior to Google, Billy was the Security Program Manager at Internet Explorer (Microsoft).

 

Marcus Sachs

Supporter

Internationally recognized senior executive with over 35 years of professional leadership in national, homeland, and cyber security. Deep technical experience in secure operations of large data networks and response to high profile security incidents. Currently the CSO for Pattern Computer and a Partner at RIDGE-LANE Limited Partners. Former White House National Security Council Presidential Appointee and first Department of Homeland Security cyber security mission area leader. Former Vice President for National Security Policy at Verizon Communications. Former Senior Vice President and Chief Security Officer at the North American Electric Reliability Corporation.

Dan Geer In-Q-Tel

Dan Geer

Supporter

Dan Geer is a computer security analyst and risk management specialist. He is recognized for raising awareness of critical computer and network security issues before the risks were widely understood, and for ground-breaking work on the economics of security. Geer is currently the chief information security officer for In-Q-Tel, a not-for-profit venture capital firm that invests in technology to support the Central Intelligence Agency.

Gordon "Fyodor" Lyon NMAP

Gordon “Fyodor” Lyon

Supporter

Gordon (aka “Fyodor”) runs the Internet security resource sites Insecure.OrgNmap.OrgSecLists.Org, and SecTools.Org. One of the most respected white-hat hackers in the industry, he created and maintains the Nmap Security Scanner. He has written numerous books, web sites, and technical papers about network security and is a founding member of the Honeynet Project and was Vice President of Computer Professionals for Social Responsibility.

Bruce Potter

Bruce Potter

Supporter

Bruce Potter is the chief information security officer (CISO) at Expel, where he’s responsible for cyber risk management and ensuring the secure operations of Expel’s services.

Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company that worked with organizations ranging from hedge funds to intelligence agencies. Bruce sold Ponte Technologies to the KeyW Corporation where he served as CTO for two years. In 2016, Bruce served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security.

Bruce is the founder of the Shmoo Group, which has hosted the popular annual hacker conference, ShmooCon, in Washington, DC since 1996. Bruce has co-authored several books and written numerous articles on security (or the lack thereof). He regularly speaks at industry conferences including DefCon, Blackhat, and O’Reilly Security, as well as at private events hosted by the United States Military Academy, the Library of Congress, the National Security Agency and other government agencies.

Richard Forno UMBC

Richard Forno

Supporter

Richard is the Director of UMBC’s Graduate Cybersecurity Program, Assistant Director of UMBC’s Center for Cybersecurity, and Affiliate of the Stanford Law School’s Center for Internet and Society (CISS).

Richard has 20+ years of experience in government, military, and private sector, including helping to build the first formal cybersecurity program for the U.S. House of Representatives, serving as the first Chief Security Officer for at Network Solutions (operator of the InterNIC), and co-founding the Maryland Cyber Challenge. He was also one of the early thought leaders on the subject of “information warfare” and he remains a longtime commentator on the influence of Internet technology upon society.

In addition to teaching cybersecurity at UMBC, Richard has lectured on information security, information warfare, and infrastructure protection at American University, and the National Defense University in Washington D.C. He is an affiliate of the Stanford Center for Internet and Society (CIS) and from 2005-12 was a Visiting Scientist at the Software Engineering Institute at Carnegie Mellon University, serving as an instructor for the CERT Coordination Center.

Richard’s interdisciplinary research and professional interests include information age conflict, cybersecurity operations, risk communication, and the social shaping of technology — specifically, issues related to resiliency and autonomy in networked societies. In addition to many articles and commentaries over the years, he is the co-author of O’Reilly’s Incident Response (2001). He holds a Ph.D. in Internet Studies from Curtin University of Technology in Australia.

Avi Rubin

Avi Rubin is a Professor at Johns Hopkins University

Ming Chow

Ming Chow

Supporter

Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of interest are web and mobile security, and Computer Science education. Ming has spoken at numerous organizations and conferences including the HTCIA, OWASP, InfoSec World, Design Automation Conference (DAC), DEF CON, Intel, SOURCE, HOPE, BSides, and ACM SIGCSE. He has served as a mentor to a BSides Las Vegas Proving Ground track speaker since 2014, a track focused on helping new speakers in the information security and hacker communities acclimate to public speaking. Ming was named the 2016 Henry and Madeline Fischer Award recipient at Tufts, awarded annually to a faculty member of the School of Engineering judged by graduating seniors of the School of Engineering to be “Engineering’s Teacher of the Year.” He was named the 2017 Lerman-Neubauer Prize for Outstanding Teaching and Advising recipient at Tufts, awarded annually to a faculty member who has had a profound intellectual impact on his or her students, both inside and outside the classroom.

Joe Grand, Grand Idea Studios

Joe Grand

Supporter

Joe is a product designer, hardware hacker, and the founder of Grand Idea Studio. He specializes in the invention and design of electronic devices.

Formerly known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of computer security vulnerability research and disclosure. Joe has spent more than a decade discovering security flaws in embedded systems and teaching others how to reverse engineer such systems. He holds a Bachelor of Science degree in Computer Engineering from Boston University and a Doctorate of Science in Technology (Honorary) degree from the University of Advancing Technology.

Lance Alligood

Lance Alligood

Supporter

Lance is a BI Engineer at Omicron Media, Inc.

Genevieve Aphrodite

Supporter

Genevieve is a problem-solver in Vancouver.

Marc Araujo

Supporter

Telecommunications Specialist 1 at Oneida Herkimer Madison BOCES

Asir Ashkir

Supporter

Asir is a Cyber Security Analyst for American Ecycling.

Clive Atwood

Supporter
Right to Repair Logo

Scott Belford

Supporter

Scott is a land scraper at Dunham Farms

Christopher Bell

Supporter

Christopher is the Director of Information Technology at Carlton Hospitality

Michael Betz

Supporter

Michael is a RF Electronics Engineer at Berkeley Lab.

Ajay Bhushan

Ajay Bhushan is a Field Technician at ABM Integrated Solutions

Andre Borie

Supporter

Andre is a freelance Django developer, software engineering consultant, and owner of Rjevski.co.

Ayman Bourramouss

Supporter

Ayman is a computer science student at Rovira I Virigili University.

Jonathan Brier

Supporter

Jonathan is a PhD student studying online communities and cyberinfrastructure primarily in citizen science.

Daniel Brinks

Supporter

Daniel is Associate Director, IT Operations at Michigan Technological University.

Logan Browne

Supporter

Logan is the Director of IT Security and Strategy at DXC. He is an experienced leader and expert in cyber security with practical experience defending against advanced attackers.

 

John Burnstead RDKL Inc.

John Bumstead

Supporter

John is the founder of RDKL Inc.

Michael Carson

Michael Carson

Michael Carson is a Senior Information Security Consultant

Lodrina Cherne

Lodrina Cherne is a Digital Forensics Instructor at SANS Institute

Joel Cline

Supporter

Joel is the owner of Cline Computers, a small retail computer repairs shop.

Adam Connor

Adam Connor is a Head of IT at Servicemax

Luke Cooper

Supporter

Luke Cooper is CEO and Founder at Fixt. With a deep understanding of the insurance and financial services ecosystem, he oversees the company’s leadership position as the central connector of repair solutions across the ecosystem. Prior to Fixt, Luke was a founding team member of CTS, Inc. (acquired by Paradigm Holding Solutions and CACI International Inc. for $60M), a leader in cybersecurity information assurance systems.

Ben Coverston

Ben Coverston is a Principal Technical Program Manager at Amazon

John Critchfield Jr.

Supporter

John is Senior Security Analyst at Johnson County Kansas Department of Technology and Innovation.

Jack Daniel

Jack Daniel

Supporter

The co-founder of Security B-Sides, Jack is a security strategist for Tenable Networks. A network and security systems engineer, Jack focuses on practical information security for the small enterprise, enterprise security and the integration of emerging technologies. Jack is a noted information technology and information security community advocate serving several leadership positions in the community, including board positions on three Security BSides 501(c)(3) corporations. He is a frequent speaker on technology, security, and compliance topics; from small groups to major conferences including Shmoocon, SOURCE Boston, DEFCON, RSA, and many BSides events.

Roland Dimai

Supporter

Sustainable policies advisor investor&business angel Green Tec Next gen.beverage chilling,super smart&economic EV policy

Dave Dittrich

Dave Dittrich is an independent consultant and computer security researcher

Cory Durand

Supporter

Furthering my talents as an IT professional with a culture that provides continuing opportunities toexpand, develop, and achieve success within areas of virtualization, security, compliance, andbusiness process alignment to an information technology framework.

Tony Ellis

Supporter

Tony is Chief Information Security Officer for York County, SC.

Tyler Evins

Supporter

Office Manager, Covina, CA

Rik Farrow

Rik Farrow

Supporter

Rik is the editor of ;login: The Usenix Magazine. Rik began working with UNIX system security in 1984 and with TCP/IP networks in 1988. He taught his first security class in 1987 and started teaching internationally the following year. He has been a consultant since 1980 and has advised both firewall and intrusion detection companies in the design of their products.

Rik has published two books, one on UNIX security and the other on system administration. He designed a five-day, hands-on class in Internet security for internal use by the Department of Defense. He wrote the “Network Defense” column for Network Magazine for over six years. Rik lives with his wife in the high desert of northern Arizona, where he continues to work and do research, and he still ventures out to teach.

Carole Fennelly

Carole Fennelly

Supporter

Carole  is a freelance Information Security Management consultant in the Greater NYC area, with over 30 years of hands-on experience in the fields of Information Security and Technology. She has authored several industry-standard security benchmarks based on her extensive experience in operating system platforms and security practices. Carole is currently the Cyber Security Practice Lead at Sionic Advisors, a provider of strategic guidance and executive level support and services for Fortune 500 clients in the financial sector.

Robert Ferrell

Robert G. Ferrell

Supporter

Robert is a retired DoD Special Agent (information security, Defense Security Service)/Security Threat Assessment and Mitigation expert. He is an author, artist, musician, and all-purpose creative type who spent 25 years doing information security, systems administration, data forensics, network engineering, and IT systems design for the USGS, NBC/IBC, AMD, TRI, Texas Health Department, Gemini Software Systems, NovusWeb, and many more before becoming a full-time author in 2014.

Joel Foresman

Supporter

Brandon Frazier

Brandon Frazier is a Lead Mover, Box Truck owner operator at Self employed

John Frederickson

John Frederickson

Supporter

John is a systems engineer at @linode and a hacker at @Hive76.

Andrew Free

Supporter

Andrew is a software engineer at Penguin Computing.

Erik Fullmer

Erik Fullmer is a Director of Marketing at HelpCloud

Jim Gettys

Jim Gettys

Supporter

Jim is the founder and Chief Technology Officer at Muinin.net, which is working on bringing the power of reproducible builds to software supply chain security. He is co-author/designer of the X Window System. Jim edited the HTTP/1.1 standard, through RFC 2616. He has been involved off and on in embedded Linux since 1999, both in handheld devices and home routers, where he worked on bufferbloat, and is very familiar with how today’s embedded systems are assembled.

Ted Hahn

Supporter

Ted Hahn is an experienced Site Reliability Engineer at TCB Technologies, INC. and has worked at Google, Facebook and Uber.

Timothy Harrison

Supporter

Tim is Technical Product Executive at the Center for Internet Security.

Ken Hawthorn

Howard Haynes

Supporter

Howard is owner of Quantiv Networks.

Robert Hazbun

Supporter

Robert is Senior Embedded Engineer / Firmware Manager at Zero Motorcycles Inc.

David Hillman

Supporter

David is a Technology Security Consultant.

Rick Hohler

Supporter

Rick is a Mobile Software Architect with Sprint.

Mathias Hollstein

Supporter

Directorate Management at TRON-DELTA.ORG (NGO)

Mark Huss

Supporter

Mark is VP, Threat and Vulnerability at The Bancorp.

Mitchell Indelicato

Supporter

Student

Archie Jackson

Supporter

Information Security Leader (Global AVP), Genpact

Chris Jacobs

Supporter

Chris is a Litigation Paralegal and IT Specialist at Robert M. Geller, P.A.

Sujay Jiladi

Sujay Jaladi

Supporter

Sujay is the CISO of Harbor Inc. He’s a cybersecurity strategist with a strong technology background. He’s an expert in building cybersecurity programs and high-performance security teams for companies in various industries including technology, healthcare, financial and fintech. Assets protected varied from a few million dollars to ~$230 billion dollars.

Erkan Kahraman

Supporter

Erkan is Chief Security Officer at Syncron.

Samy Kamkar

Supporter

Samy Kamkar is a world renowned, independent security researcher and the co-founder of Openpath Security Inc.

Luke Kapustka

Luke Kapustka is a Penetration Tester

William Knowles

Supporter

William Knowles is an accomplished information security analyst, evangelist, and instructor to Fortune 100 companies, U.S. Military, Local, State, and Federal Government, as well as small and medium-sized enterprises.

Mitje Kolsek

Supporter

CEO at ACROS Security, Co-founder at 0patch

Oleg Kozedub

Supporter

Oleg is a Senior Software Engineer at OneLogin.

Ken Krauss

Supporter

Systems engineering, cybersecurity, and information assurance of large scale software and dataintensive applications. Formal modeling of web applications and software. Contributor to PenTestMagazine, Hakin9 Extra, Udemy.com.

Less Lincoln

Less Lincoln is the CEO at deadmoon

Mark Loveless

Mark Loveless

Supporter

Mark is a security engineer and researcher, blogger and content creator.

Tom MacDonald

Supporter

Tom is a retired Software Engineer in Minneapolis.

Mike Manoj

Supporter

Mike is a Cyber Security/ Federal Regulatory Compliance Consultant.

Kenneth Mazie

Supporter

I have over 25 years experience working the IT field. I have performed the roles of systems engineer, system administrator, desktop and field support for all aspects of the I.T. and telecommunications fields in both small and very large corporate environments. I am Microsoft MCSE, Novell CNE, VMware VCP certified. I also hold a Cisco CCNA which is in process of being renewed.

Donny McGhee

Supporter

Donny is a Office and Marketing Manager

Eddie Moran

Eddie is an IT Support Specialist at Alternatives Federal Credit Union

Katie Moussouris

Katie Moussouris

Supporter

Katie is the founder and CEO of Luta Security, which specializes in helping businesses and governments work with hackers to better defend themselves from digital attacks. Katie is a noted authority on vulnerability disclosure & bug bounties. She advises companies, lawmakers, & governments on the benefits of hacking & security research to help make the internet safer for everyone.

Katie helped the US Department of Defense start the government’s first bug bounty program, called “Hack the Pentagon.” Her work for Microsoft encompassed industry-leading initiatives such as Microsoft’s bug bounty programs & Microsoft Vulnerability Research. She is a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vulnerability handling processes (30111), and secure development (27034). She is a visiting scholar with MIT Sloan School doing research on the vulnerability economy and exploit market, a New America Foundation Fellow, and Harvard Belfer Affiliate. Katie serves on the CFP review board for RSA, O’Reilly Security Conference, Shakacon, and is an advisor to the Center for Democracy and Technology.

Katie is a frequent public speaker, including the opening Keynote at Hack in the Box Amsterdam 2014, Security Analyst Summit 2014, Nordic Security Con 2013, BruCON 2012, invited speaker at Dartmouth, Harvard Business School, MIT, HitB Malaysia 2012, EWF 2012, BlackHat Abu Dhabi 2011. She has spoken at BlackHat USA 2015, 2011, 2010, and 2008, HitB 2011, GOVCERT.NL 2010, RSA2016 – 2010, SOURCE Boston, Shmoocon, Toorcon Seattle, and was the keynote speaker at ShakaCon 2008.

Markus Musser

Supporter

I have been a watchmaker since 2000 and I’m currently a self-employed watchmaker living in Austria. I previously worked as a watchmaker in various jewelry stores in Austria and Switzerland. Before that I was a watch technician for Rolex After Sales Service Centre in St. Thomas, US Virgin Islands. I was also a watchmaker for IWC Schaffhausen, Branch of Richemont International SA, CH, in the departments of precision timing, chronographs, and manufacture caliber. My other qualifications include Rolex Complete Vocational Training Course in Geneva, CH, and Watchmaker Master Certification in Karlstein/ Thaya, Austria.

Bill Nestor

Supporter

Bill is a Senior Systems Engineer with Vanguard.

Peter Neumann

Dr. Peter Neumann

Supporter

Peter has been a member of the SRI International Computer Science Laboratory since September 1971. His main research interests involve security, crypto applications, overall system survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large, applications of formal methods, and risk avoidance.

Tim O’Donoghue

Supporter

Tim is a Product Support Engineer.

Davi Ottenheimer

Supporter

Davi is President of Flyingpenguin, a security consultancy.

David Otto

Nicholas J. Percoco

Supporter

Nicholas is the Chief Security Officer at Kraken Digital Asset Exchange and the founder of THOTCON.

Ken Pfeil TechDemocracy LLC

Ken Pfeil

Supporter

Ken is the Chief Security Architect at TechDemocracy, LLC. He was one of the first CISO’s ever. He’s an innovative Security and risk management executive/IT veteran with experience spanning almost three decades with companies such as Microsoft, Dell, Avaya, Identix, Pioneer Investments, MFS Investments and Merrill Lynch. While at Microsoft coauthored Microsoft’s “Best Practices for Enterprise Security”​ whitepaper series, was a technical contributor for the MCSE Exam “Designing Security for Windows 2000″​ and official course curriculum for the same. In 1998 founded “The NT Toolbox”​ and oversaw all operations until its acquisition by GFI Software in 2002. Subject Matter Expert for CompTIA’s Security+ certification and formerly on ISSA’s International Privacy Advisory Board covering GLBA. Performed technical vulnerability analysis for 4 years for Windows and .Net Magazine’s “Security Administrator”​ publication. Coauthor of the books “Hack Proofing Your Network – 2nd Edition”​, “Stealing the Network – How to Own the Box”​, and a contributing author of “Security Planning and Disaster Recovery”​ ,”Network Security – The Complete Reference”​, “The Best Damn IT Security Management Book: Period” and “Network Security Assessment: From Vulnerability to Patch”.

Matt Plymire

Matt Plymire is a Owner/operator at R M Plymire & Associates

Alex Rasekhi

Alexander Rasekhi

Supporter

Alexander is a Project Executive at Virtual Shield Systems LLC.

Vincent Rodriguez

Space Rogue IBM X Force

Space Rogue

Supporter
Chris Thomas (aka “Space Rogue”) is the Global Strategy Lead for IBM’s X Force Red Team. He has over twenty years in the security industry and a proven ability to use Open Source Intelligence to link disparate events, read between the lines and distill complex technical information into easy to understand and actionable intelligence. Widely sought after for unique views and perceptions of the security industry, Cris has testified before the Senate Committee on Governmental Affairs and have been quoted in numerous media outlets from Austrian TV to MTV and from Wired to MSNBC. I have spoke on a wide range of topics in front of audiences at OWASP, ISACA, Blackhat, Defcon, BSides, HOPE, Shmoocon, and others.  An early member of the security research think tank known as L0pht Heavy Industries Cris helped co-found the Internet security consultancy @Stake.
Owen Rubel

Owen Rubel

Supporter

Owen is Head API Researcher at Beapi.io.

Tommy Rydendahl

Supporter

Tommy is SIO at mentoriet.dk.

Dave Shackleford

Supporter

Dave is Principal Consultant, Voodoo Security.

Joseph Sharp

Joseph is an IT Manager at Holston Conference UMC

scott shui

Scott Shui

Supporter

Scott is the creator of The Library Infinite, A Brave New Web Portal and author of “Speaking Computer.”

John Snigier

John Snigier is a Owner/Technician at John’s Autowheel

Jeremy Soller

Supporter

Jeremy is the principal engineer at System76.

Justin Stamps

Supporter

Justin Stamps is a Senior Manager in Interpublic Group of Companies (IPG) IT Internal Audit Group. Prior to IPG, he spent eight and a half years at Deloitte working across a grouping of Market Offerings focusing primarily within the Advertising and Consumer Products industries. At Deloitte, he performed contract risk and compliance (CRC) services, Operational Business Cycle Controls as well as General Computing Controls testing for Sarbanes-Oxley compliance audits, process flow evaluations, pre-implementation reviews, and internal audits.

Gabriel Sterritt

Robert Stevens

Supporter

Robert is CEO at Total Telecom.

Robert Taylor

Supporter

Robert is IT Services Manager for Gannett.

Dustin Trammell

Dustin Trammell

Supporter

Dustin is the Chief Executive Officer at Trammell Ventures.

His career has primarily been focused on Information Security Research & Development in the areas of vulnerability research and exploit development, reverse code engineering, and general advanced security research of technologies such as smart-cards, Voice over IP (VoIP), and covert communications. He is a Bitcoin early adopter and have experience with Bitcoin, distributed ledger, and blockchain FinTech. He is also an advocate of the bodyhacking and biohacking movements.

Johannes Ullrich, SANS

Dr. Johannes Ullrich

Supporter

Johannes Ullrich is a Fellow at the SANS Institute where he is responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, Johannes founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry.

Prior to working for SANS, Johannes worked as a lead support engineer for a web development company and as a research physicist. Johannes holds a PhD in physics from SUNY Albany and is based in Jacksonville, Florida. His daily podcast summarizes current security news in a concise format.

Tarjei Utnes

Supporter

Tarjei is Analyst and Partner at Red Ocean Technology AS.

Andrew Villeneuve

Supporter

WordPress security analyst and nonprofit executive working to better the lives of others through socially oriented entrepreneurship and political activism.

Maurice Volaski

Supporter

Maurice is a Sysadmin at Albert Einstein College of Medicine

Chenxi Wang

Chenxi Wang

Supporter

Chenxi is a Managing General Partner at Rain Capital and the Founder of the Jane Bond Project, an independent security research and advisory firm. She also serves on the boards of various startups and VC funds.

Previously, Chenxi was the Chief Strategy Officer at Twistlock. She is the 2016 and 2017 program Co-Chair for Security and Privacy at the Grace Hopper Conference and named by SC Magazine as a 2016 Women of Influence.

Chenxi built an illustrious career at Forrester Research, Intel Security and CipherCloud, where she wrote hard-hitting research papers and led successful strategy projects. Chenxi started her career as a professor at Carnegie Mellon University. She is a sought-after public speaker and a trusted advisor for IT executives. Wang holds a Ph.D. in computer science from the University of Virginia.

Stuart Ward

Stuart Ward

Supporter

Stuart is security geek, hacker, maker and open source advocate. He has experience in security, revenue management, call centres, mobile telecoms, computer systems and networks. An internationally recognised reputation within the GSM Association, ETSI, 3GPP and Tele Management Forum with regard to telecoms network expertise.

Aaron Webber

Supporter

Security Systems Engineer at InsideSales.com

Vita Wells

Vita Wells is the founder of The Culture of Repair Project

Kyle Wiens

Kyle Wiens

Supporter

Kyle is the CEO if iFixit.com, the online repair manual and Chairman of the Board of repair.org

Connor Williams

Supporter
Right to Repair Logo

Tom Williams

Tom Williams is a Lead Consultant at BMS Security Solution

Albert Wolfkiel

Supporter

Albert is a Cyber Security Engineer with the US Navy

Chris Wysopal

Chris Wysopal

Supporter

Chris Wysopal is Chief Technology Officer at Veracode. He oversees technology strategy and information security. Prior to co-founding Veracode in 2006 Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec.

In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress on the subjects of government security and how vulnerabilities are discovered in software.

Chris received a BS in computer and systems engineering from Rensselaer Polytechnic Institute. He is the author of The Art of Software Security Testing.

Chris is often called upon to download the latest Minecraft mods for his 6-year-old son. An avid photographer and nature-lover, Chris spends his free time hiking the many conservation trails near his home outside Boston.

Tatu Ylonen

Tatu Ylonen

Supporter

Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers.

Tatu is the inventor of some of the most widely used technologies in computer security and networking – SSH and SFTP – and co-author of related IETF standards; one of the early developers of IPSec, VPN and firewall technology; inventor of IETF and 3GPP-standardized NAT Traversal solutions; co-author of SPKI (Simple Public Key Infrastructure) proposals. He has been awarded 45 US patents with several US patent applications pending. Tatu authored NIST IR 7966 (best practice guidelines for SSH key-based access management) and several Internet standards (RFC 4251, 4252, 4253, 4254).

He is also an experienced entrepreneur and founded a NASDAQ OMX-listed security company (SSH Communications Security). Tatu has held various leadership roles in a public company (including CEO, CTO, and Chairman).

Tatu is currently a Visiting Scholar at the University of Helsinki, where he is working on machine learning, language understanding, and knowledge representation, as well as cybersecurity, particularly SSH key management and security of AI.

Jay Zack

Supporter

Independent technician, Camden AR

Matt Zieminski

Supporter

The Repair Association Board Member