Securepairs.org is an organization of information technology (IT) and information security (“cyber”) professionals who support the right to repair. Our members are some of the most respected names in the information security field and include executives, researchers, product managers, entrepreneurs and academics.
Here are some of the people who we count as supporters and signatories to our securepairs.org Statement of Principles.

Paul F Roberts
Founder
Bruce Schneier
SupporterBruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of 13 books–including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World–as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org; and a special advisor to IBM Security.

Tarah Wheeler
SupporterTarah is a security industry veteran, strategist, international conflict scientist, and oft-cited cybersecurity media expert. She is a Cybersecurity Policy Fellow at New America. She is an inaugural contributing cybersecurity expert for the Washington Post and a Foreign Policy contributor on cyber warfare. She is the lead author of the best-selling Women In Tech: Take Your Career to The Next Level With Practical Advice And Inspiring Stories. She previously spent over a decade as Principal Security Strategist advising on information security and serving as vCISO for multiple clients at Red Queen Technologies. She has led web application security projects at Microsoft Game Studios (Halo and Lips) and architected systems at encrypted mobile communications firm Silent Circle. She has spoken on information security at the OECD and FTC, at Stanford and Oxford, on PBS NOVA, and many other governmental and industry conferences.

Gary McGraw
SupporterGary McGraw is a globally recognized authority on software security and the author of eight best selling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online Games, and 6 other books; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 100 peer-reviewed scientific publications, authors a periodic security column for SearchSecurity, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Maxmyinterest, NTrepid, and Ravenwhite. He has also served as a Board member of Cigital and Codiscope (acquired by Synopsys) and as Advisor to Dasient (acquired by Twitter), Fortify Software (acquired by HP), and Invotas (acquired by FireEye). His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics. Gary produces the monthly Silver Bullet Security Podcast for Synopsys and IEEE Security & Privacy magazine (syndicated by SearchSecurity).

Jon Callas
SupporterJon Callas is a Senior Technology Fellow at the American Civil Liberties Union (ACLU). Jon has held major positions at Digital Equipment Corporation, Apple, PGP, and Entrust, and is considered “one of the most respected and well-known names in the mobile security industry.” Jon is a co-founder of the firm Blackphone and a co-founder and former Chief Technology Officer at the firm Silent Circle. He is co-credited with creating several Internet Engineering Task Force (IETF) standards, including OpenPGP, DKIM, and ZRTP, which he wrote. Prior to his work at Entrust, he was Chief Technical Officer and co-founder of PGP Corporation and the former Chief Technical Officer of Entrust.

Billy Rios
SupporterBilly is the founder of Whitescope LLC, a startup focused on embedded device security. Billy is recognized as one of the world’s most respected experts on emerging threats related to Industrial Control Systems (ICS), Critical Infrastructure (CI), and, medical devices. He discovered thousands of security vulnerabilities in hardware and software supporting ICS and critical infrastructure. Billy has worked at Google where he led the front-line response for externally reported security issues and incidents. Prior to Google, Billy was the Security Program Manager at Internet Explorer (Microsoft).

Marcus Sachs
SupporterInternationally recognized senior executive with over 35 years of professional leadership in national, homeland, and cyber security. Deep technical experience in secure operations of large data networks and response to high profile security incidents. Currently the CSO for Pattern Computer and a Partner at RIDGE-LANE Limited Partners. Former White House National Security Council Presidential Appointee and first Department of Homeland Security cyber security mission area leader. Former Vice President for National Security Policy at Verizon Communications. Former Senior Vice President and Chief Security Officer at the North American Electric Reliability Corporation.

Dan Geer
SupporterDan Geer is a computer security analyst and risk management specialist. He is recognized for raising awareness of critical computer and network security issues before the risks were widely understood, and for ground-breaking work on the economics of security. Geer is currently the chief information security officer for In-Q-Tel, a not-for-profit venture capital firm that invests in technology to support the Central Intelligence Agency.

Gordon “Fyodor” Lyon
SupporterGordon (aka “Fyodor”) runs the Internet security resource sites Insecure.Org, Nmap.Org, SecLists.Org, and SecTools.Org. One of the most respected white-hat hackers in the industry, he created and maintains the Nmap Security Scanner. He has written numerous books, web sites, and technical papers about network security and is a founding member of the Honeynet Project and was Vice President of Computer Professionals for Social Responsibility.

Bruce Potter
SupporterBruce Potter is the chief information security officer (CISO) at Expel, where he’s responsible for cyber risk management and ensuring the secure operations of Expel’s services.
Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company that worked with organizations ranging from hedge funds to intelligence agencies. Bruce sold Ponte Technologies to the KeyW Corporation where he served as CTO for two years. In 2016, Bruce served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security.
Bruce is the founder of the Shmoo Group, which has hosted the popular annual hacker conference, ShmooCon, in Washington, DC since 1996. Bruce has co-authored several books and written numerous articles on security (or the lack thereof). He regularly speaks at industry conferences including DefCon, Blackhat, and O’Reilly Security, as well as at private events hosted by the United States Military Academy, the Library of Congress, the National Security Agency and other government agencies.

Richard Forno
SupporterRichard is the Director of UMBC’s Graduate Cybersecurity Program, Assistant Director of UMBC’s Center for Cybersecurity, and Affiliate of the Stanford Law School’s Center for Internet and Society (CISS).
Richard has 20+ years of experience in government, military, and private sector, including helping to build the first formal cybersecurity program for the U.S. House of Representatives, serving as the first Chief Security Officer for at Network Solutions (operator of the InterNIC), and co-founding the Maryland Cyber Challenge. He was also one of the early thought leaders on the subject of “information warfare” and he remains a longtime commentator on the influence of Internet technology upon society.
In addition to teaching cybersecurity at UMBC, Richard has lectured on information security, information warfare, and infrastructure protection at American University, and the National Defense University in Washington D.C. He is an affiliate of the Stanford Center for Internet and Society (CIS) and from 2005-12 was a Visiting Scientist at the Software Engineering Institute at Carnegie Mellon University, serving as an instructor for the CERT Coordination Center.
Richard’s interdisciplinary research and professional interests include information age conflict, cybersecurity operations, risk communication, and the social shaping of technology — specifically, issues related to resiliency and autonomy in networked societies. In addition to many articles and commentaries over the years, he is the co-author of O’Reilly’s Incident Response (2001). He holds a Ph.D. in Internet Studies from Curtin University of Technology in Australia.

Avi Rubin
Avi Rubin is a Professor at Johns Hopkins University

Ming Chow
SupporterMing Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of interest are web and mobile security, and Computer Science education. Ming has spoken at numerous organizations and conferences including the HTCIA, OWASP, InfoSec World, Design Automation Conference (DAC), DEF CON, Intel, SOURCE, HOPE, BSides, and ACM SIGCSE. He has served as a mentor to a BSides Las Vegas Proving Ground track speaker since 2014, a track focused on helping new speakers in the information security and hacker communities acclimate to public speaking. Ming was named the 2016 Henry and Madeline Fischer Award recipient at Tufts, awarded annually to a faculty member of the School of Engineering judged by graduating seniors of the School of Engineering to be “Engineering’s Teacher of the Year.” He was named the 2017 Lerman-Neubauer Prize for Outstanding Teaching and Advising recipient at Tufts, awarded annually to a faculty member who has had a profound intellectual impact on his or her students, both inside and outside the classroom.

Joe Grand
SupporterJoe is a product designer, hardware hacker, and the founder of Grand Idea Studio. He specializes in the invention and design of electronic devices.
Formerly known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of computer security vulnerability research and disclosure. Joe has spent more than a decade discovering security flaws in embedded systems and teaching others how to reverse engineer such systems. He holds a Bachelor of Science degree in Computer Engineering from Boston University and a Doctorate of Science in Technology (Honorary) degree from the University of Advancing Technology.

Lance Alligood
SupporterLance is a BI Engineer at Omicron Media, Inc.

Genevieve Aphrodite
SupporterGenevieve is a problem-solver in Vancouver.

Marc Araujo
SupporterTelecommunications Specialist 1 at Oneida Herkimer Madison BOCES

Asir Ashkir
SupporterAsir is a Cyber Security Analyst for American Ecycling.

Clive Atwood
Supporter
Scott Belford
SupporterScott is a land scraper at Dunham Farms

Christopher Bell
SupporterChristopher is the Director of Information Technology at Carlton Hospitality

Michael Betz
SupporterMichael is a RF Electronics Engineer at Berkeley Lab.

Ajay Bhushan
Ajay Bhushan is a Field Technician at ABM Integrated Solutions

Andre Borie
SupporterAndre is a freelance Django developer, software engineering consultant, and owner of Rjevski.co.

Ayman Bourramouss
SupporterAyman is a computer science student at Rovira I Virigili University.

Jonathan Brier
SupporterJonathan is a PhD student studying online communities and cyberinfrastructure primarily in citizen science.

Daniel Brinks
SupporterDaniel is Associate Director, IT Operations at Michigan Technological University.

Logan Browne
SupporterLogan is the Director of IT Security and Strategy at DXC. He is an experienced leader and expert in cyber security with practical experience defending against advanced attackers.

John Bumstead
SupporterJohn is the founder of RDKL Inc.

Michael Carson
Michael Carson is a Senior Information Security Consultant

Lodrina Cherne
Lodrina Cherne is a Digital Forensics Instructor at SANS Institute

Joel Cline
SupporterJoel is the owner of Cline Computers, a small retail computer repairs shop.

Adam Connor
Adam Connor is a Head of IT at Servicemax

Luke Cooper
SupporterLuke Cooper is CEO and Founder at Fixt. With a deep understanding of the insurance and financial services ecosystem, he oversees the company’s leadership position as the central connector of repair solutions across the ecosystem. Prior to Fixt, Luke was a founding team member of CTS, Inc. (acquired by Paradigm Holding Solutions and CACI International Inc. for $60M), a leader in cybersecurity information assurance systems.

Ben Coverston
Ben Coverston is a Principal Technical Program Manager at Amazon

John Critchfield Jr.
SupporterJohn is Senior Security Analyst at Johnson County Kansas Department of Technology and Innovation.

Jack Daniel
SupporterThe co-founder of Security B-Sides, Jack is a security strategist for Tenable Networks. A network and security systems engineer, Jack focuses on practical information security for the small enterprise, enterprise security and the integration of emerging technologies. Jack is a noted information technology and information security community advocate serving several leadership positions in the community, including board positions on three Security BSides 501(c)(3) corporations. He is a frequent speaker on technology, security, and compliance topics; from small groups to major conferences including Shmoocon, SOURCE Boston, DEFCON, RSA, and many BSides events.

Roland Dimai
SupporterSustainable policies advisor investor&business angel Green Tec Next gen.beverage chilling,super smart&economic EV policy

Dave Dittrich
Dave Dittrich is an independent consultant and computer security researcher

Cory Durand
SupporterFurthering my talents as an IT professional with a culture that provides continuing opportunities toexpand, develop, and achieve success within areas of virtualization, security, compliance, andbusiness process alignment to an information technology framework.

Tony Ellis
SupporterTony is Chief Information Security Officer for York County, SC.

Tyler Evins
SupporterOffice Manager, Covina, CA

Rik Farrow
SupporterRik is the editor of ;login: The Usenix Magazine. Rik began working with UNIX system security in 1984 and with TCP/IP networks in 1988. He taught his first security class in 1987 and started teaching internationally the following year. He has been a consultant since 1980 and has advised both firewall and intrusion detection companies in the design of their products.
Rik has published two books, one on UNIX security and the other on system administration. He designed a five-day, hands-on class in Internet security for internal use by the Department of Defense. He wrote the “Network Defense” column for Network Magazine for over six years. Rik lives with his wife in the high desert of northern Arizona, where he continues to work and do research, and he still ventures out to teach.

Carole Fennelly
SupporterCarole is a freelance Information Security Management consultant in the Greater NYC area, with over 30 years of hands-on experience in the fields of Information Security and Technology. She has authored several industry-standard security benchmarks based on her extensive experience in operating system platforms and security practices. Carole is currently the Cyber Security Practice Lead at Sionic Advisors, a provider of strategic guidance and executive level support and services for Fortune 500 clients in the financial sector.

Robert G. Ferrell
SupporterRobert is a retired DoD Special Agent (information security, Defense Security Service)/Security Threat Assessment and Mitigation expert. He is an author, artist, musician, and all-purpose creative type who spent 25 years doing information security, systems administration, data forensics, network engineering, and IT systems design for the USGS, NBC/IBC, AMD, TRI, Texas Health Department, Gemini Software Systems, NovusWeb, and many more before becoming a full-time author in 2014.

Joel Foresman
Supporter
Brandon Frazier
Brandon Frazier is a Lead Mover, Box Truck owner operator at Self employed

John Frederickson
SupporterJohn is a systems engineer at @linode and a hacker at @Hive76.

Andrew Free
SupporterAndrew is a software engineer at Penguin Computing.

Erik Fullmer
Erik Fullmer is a Director of Marketing at HelpCloud

Jim Gettys
SupporterJim is the founder and Chief Technology Officer at Muinin.net, which is working on bringing the power of reproducible builds to software supply chain security. He is co-author/designer of the X Window System. Jim edited the HTTP/1.1 standard, through RFC 2616. He has been involved off and on in embedded Linux since 1999, both in handheld devices and home routers, where he worked on bufferbloat, and is very familiar with how today’s embedded systems are assembled.

Ted Hahn
SupporterTed Hahn is an experienced Site Reliability Engineer at TCB Technologies, INC. and has worked at Google, Facebook and Uber.

Timothy Harrison
SupporterTim is Technical Product Executive at the Center for Internet Security.

Ken Hawthorn

Howard Haynes
SupporterHoward is owner of Quantiv Networks.

Robert Hazbun
SupporterRobert is Senior Embedded Engineer / Firmware Manager at Zero Motorcycles Inc.

David Hillman
SupporterDavid is a Technology Security Consultant.

Rick Hohler
SupporterRick is a Mobile Software Architect with Sprint.

Mathias Hollstein
SupporterDirectorate Management at TRON-DELTA.ORG (NGO)

Mark Huss
SupporterMark is VP, Threat and Vulnerability at The Bancorp.

Mitchell Indelicato
SupporterStudent

Archie Jackson
SupporterInformation Security Leader (Global AVP), Genpact

Chris Jacobs
SupporterChris is a Litigation Paralegal and IT Specialist at Robert M. Geller, P.A.

Sujay Jaladi
SupporterSujay is the CISO of Harbor Inc. He’s a cybersecurity strategist with a strong technology background. He’s an expert in building cybersecurity programs and high-performance security teams for companies in various industries including technology, healthcare, financial and fintech. Assets protected varied from a few million dollars to ~$230 billion dollars.

Erkan Kahraman
SupporterErkan is Chief Security Officer at Syncron.

Samy Kamkar
SupporterSamy Kamkar is a world renowned, independent security researcher and the co-founder of Openpath Security Inc.

Luke Kapustka
Luke Kapustka is a Penetration Tester

William Knowles
SupporterWilliam Knowles is an accomplished information security analyst, evangelist, and instructor to Fortune 100 companies, U.S. Military, Local, State, and Federal Government, as well as small and medium-sized enterprises.

Mitje Kolsek
SupporterCEO at ACROS Security, Co-founder at 0patch

Oleg Kozedub
SupporterOleg is a Senior Software Engineer at OneLogin.

Ken Krauss
SupporterSystems engineering, cybersecurity, and information assurance of large scale software and dataintensive applications. Formal modeling of web applications and software. Contributor to PenTestMagazine, Hakin9 Extra, Udemy.com.

Less Lincoln
Less Lincoln is the CEO at deadmoon

Mark Loveless
SupporterMark is a security engineer and researcher, blogger and content creator.

Tom MacDonald
SupporterTom is a retired Software Engineer in Minneapolis.

Mike Manoj
SupporterMike is a Cyber Security/ Federal Regulatory Compliance Consultant.

Kenneth Mazie
SupporterI have over 25 years experience working the IT field. I have performed the roles of systems engineer, system administrator, desktop and field support for all aspects of the I.T. and telecommunications fields in both small and very large corporate environments. I am Microsoft MCSE, Novell CNE, VMware VCP certified. I also hold a Cisco CCNA which is in process of being renewed.

Donny McGhee
SupporterDonny is a Office and Marketing Manager

Eddie Moran
Eddie is an IT Support Specialist at Alternatives Federal Credit Union

Katie Moussouris
SupporterKatie is the founder and CEO of Luta Security, which specializes in helping businesses and governments work with hackers to better defend themselves from digital attacks. Katie is a noted authority on vulnerability disclosure & bug bounties. She advises companies, lawmakers, & governments on the benefits of hacking & security research to help make the internet safer for everyone.
Katie helped the US Department of Defense start the government’s first bug bounty program, called “Hack the Pentagon.” Her work for Microsoft encompassed industry-leading initiatives such as Microsoft’s bug bounty programs & Microsoft Vulnerability Research. She is a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vulnerability handling processes (30111), and secure development (27034). She is a visiting scholar with MIT Sloan School doing research on the vulnerability economy and exploit market, a New America Foundation Fellow, and Harvard Belfer Affiliate. Katie serves on the CFP review board for RSA, O’Reilly Security Conference, Shakacon, and is an advisor to the Center for Democracy and Technology.
Katie is a frequent public speaker, including the opening Keynote at Hack in the Box Amsterdam 2014, Security Analyst Summit 2014, Nordic Security Con 2013, BruCON 2012, invited speaker at Dartmouth, Harvard Business School, MIT, HitB Malaysia 2012, EWF 2012, BlackHat Abu Dhabi 2011. She has spoken at BlackHat USA 2015, 2011, 2010, and 2008, HitB 2011, GOVCERT.NL 2010, RSA2016 – 2010, SOURCE Boston, Shmoocon, Toorcon Seattle, and was the keynote speaker at ShakaCon 2008.

Markus Musser
SupporterI have been a watchmaker since 2000 and I’m currently a self-employed watchmaker living in Austria. I previously worked as a watchmaker in various jewelry stores in Austria and Switzerland. Before that I was a watch technician for Rolex After Sales Service Centre in St. Thomas, US Virgin Islands. I was also a watchmaker for IWC Schaffhausen, Branch of Richemont International SA, CH, in the departments of precision timing, chronographs, and manufacture caliber. My other qualifications include Rolex Complete Vocational Training Course in Geneva, CH, and Watchmaker Master Certification in Karlstein/ Thaya, Austria.

Bill Nestor
SupporterBill is a Senior Systems Engineer with Vanguard.

Dr. Peter Neumann
SupporterPeter has been a member of the SRI International Computer Science Laboratory since September 1971. His main research interests involve security, crypto applications, overall system survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large, applications of formal methods, and risk avoidance.

Tim O’Donoghue
SupporterTim is a Product Support Engineer.

Davi Ottenheimer
SupporterDavi is President of Flyingpenguin, a security consultancy.

David Otto

Nicholas J. Percoco
SupporterNicholas is the Chief Security Officer at Kraken Digital Asset Exchange and the founder of THOTCON.

Ken Pfeil
SupporterKen is the Chief Security Architect at TechDemocracy, LLC. He was one of the first CISO’s ever. He’s an innovative Security and risk management executive/IT veteran with experience spanning almost three decades with companies such as Microsoft, Dell, Avaya, Identix, Pioneer Investments, MFS Investments and Merrill Lynch. While at Microsoft coauthored Microsoft’s “Best Practices for Enterprise Security” whitepaper series, was a technical contributor for the MCSE Exam “Designing Security for Windows 2000″ and official course curriculum for the same. In 1998 founded “The NT Toolbox” and oversaw all operations until its acquisition by GFI Software in 2002. Subject Matter Expert for CompTIA’s Security+ certification and formerly on ISSA’s International Privacy Advisory Board covering GLBA. Performed technical vulnerability analysis for 4 years for Windows and .Net Magazine’s “Security Administrator” publication. Coauthor of the books “Hack Proofing Your Network – 2nd Edition”, “Stealing the Network – How to Own the Box”, and a contributing author of “Security Planning and Disaster Recovery” ,”Network Security – The Complete Reference”, “The Best Damn IT Security Management Book: Period” and “Network Security Assessment: From Vulnerability to Patch”.

Matt Plymire
Matt Plymire is a Owner/operator at R M Plymire & Associates

Alexander Rasekhi
SupporterAlexander is a Project Executive at Virtual Shield Systems LLC.

Vincent Rodriguez

Space Rogue
Supporter
Owen Rubel
SupporterOwen is Head API Researcher at Beapi.io.

Tommy Rydendahl
SupporterTommy is SIO at mentoriet.dk.

Dave Shackleford
SupporterDave is Principal Consultant, Voodoo Security.

Joseph Sharp
Joseph is an IT Manager at Holston Conference UMC

Scott Shui
SupporterScott is the creator of The Library Infinite, A Brave New Web Portal and author of “Speaking Computer.”

John Snigier
John Snigier is a Owner/Technician at John’s Autowheel

Jeremy Soller
SupporterJeremy is the principal engineer at System76.

Justin Stamps
SupporterJustin Stamps is a Senior Manager in Interpublic Group of Companies (IPG) IT Internal Audit Group. Prior to IPG, he spent eight and a half years at Deloitte working across a grouping of Market Offerings focusing primarily within the Advertising and Consumer Products industries. At Deloitte, he performed contract risk and compliance (CRC) services, Operational Business Cycle Controls as well as General Computing Controls testing for Sarbanes-Oxley compliance audits, process flow evaluations, pre-implementation reviews, and internal audits.

Gabriel Sterritt

Robert Stevens
SupporterRobert is CEO at Total Telecom.

Robert Taylor
SupporterRobert is IT Services Manager for Gannett.

Dustin Trammell
SupporterDustin is the Chief Executive Officer at Trammell Ventures.
His career has primarily been focused on Information Security Research & Development in the areas of vulnerability research and exploit development, reverse code engineering, and general advanced security research of technologies such as smart-cards, Voice over IP (VoIP), and covert communications. He is a Bitcoin early adopter and have experience with Bitcoin, distributed ledger, and blockchain FinTech. He is also an advocate of the bodyhacking and biohacking movements.

Dr. Johannes Ullrich
SupporterJohannes Ullrich is a Fellow at the SANS Institute where he is responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, Johannes founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry.
Prior to working for SANS, Johannes worked as a lead support engineer for a web development company and as a research physicist. Johannes holds a PhD in physics from SUNY Albany and is based in Jacksonville, Florida. His daily podcast summarizes current security news in a concise format.

Tarjei Utnes
SupporterTarjei is Analyst and Partner at Red Ocean Technology AS.

Andrew Villeneuve
SupporterWordPress security analyst and nonprofit executive working to better the lives of others through socially oriented entrepreneurship and political activism.

Maurice Volaski
SupporterMaurice is a Sysadmin at Albert Einstein College of Medicine

Chenxi Wang
SupporterChenxi is a Managing General Partner at Rain Capital and the Founder of the Jane Bond Project, an independent security research and advisory firm. She also serves on the boards of various startups and VC funds.
Previously, Chenxi was the Chief Strategy Officer at Twistlock. She is the 2016 and 2017 program Co-Chair for Security and Privacy at the Grace Hopper Conference and named by SC Magazine as a 2016 Women of Influence.
Chenxi built an illustrious career at Forrester Research, Intel Security and CipherCloud, where she wrote hard-hitting research papers and led successful strategy projects. Chenxi started her career as a professor at Carnegie Mellon University. She is a sought-after public speaker and a trusted advisor for IT executives. Wang holds a Ph.D. in computer science from the University of Virginia.

Stuart Ward
SupporterStuart is security geek, hacker, maker and open source advocate. He has experience in security, revenue management, call centres, mobile telecoms, computer systems and networks. An internationally recognised reputation within the GSM Association, ETSI, 3GPP and Tele Management Forum with regard to telecoms network expertise.

Aaron Webber
SupporterSecurity Systems Engineer at InsideSales.com

Vita Wells
Vita Wells is the founder of The Culture of Repair Project

Kyle Wiens
SupporterKyle is the CEO if iFixit.com, the online repair manual and Chairman of the Board of repair.org.

Connor Williams
Supporter
Tom Williams
Tom Williams is a Lead Consultant at BMS Security Solution

Albert Wolfkiel
SupporterAlbert is a Cyber Security Engineer with the US Navy

Chris Wysopal
SupporterChris Wysopal is Chief Technology Officer at Veracode. He oversees technology strategy and information security. Prior to co-founding Veracode in 2006 Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec.
In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress on the subjects of government security and how vulnerabilities are discovered in software.
Chris received a BS in computer and systems engineering from Rensselaer Polytechnic Institute. He is the author of The Art of Software Security Testing.
Chris is often called upon to download the latest Minecraft mods for his 6-year-old son. An avid photographer and nature-lover, Chris spends his free time hiking the many conservation trails near his home outside Boston.

Tatu Ylonen
SupporterTatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers.
Tatu is the inventor of some of the most widely used technologies in computer security and networking – SSH and SFTP – and co-author of related IETF standards; one of the early developers of IPSec, VPN and firewall technology; inventor of IETF and 3GPP-standardized NAT Traversal solutions; co-author of SPKI (Simple Public Key Infrastructure) proposals. He has been awarded 45 US patents with several US patent applications pending. Tatu authored NIST IR 7966 (best practice guidelines for SSH key-based access management) and several Internet standards (RFC 4251, 4252, 4253, 4254).
He is also an experienced entrepreneur and founded a NASDAQ OMX-listed security company (SSH Communications Security). Tatu has held various leadership roles in a public company (including CEO, CTO, and Chairman).
Tatu is currently a Visiting Scholar at the University of Helsinki, where he is working on machine learning, language understanding, and knowledge representation, as well as cybersecurity, particularly SSH key management and security of AI.

Jay Zack
SupporterIndependent technician, Camden AR

Matt Zieminski
SupporterThe Repair Association Board Member