Mentors
Some highlights of our mentors exceptional professional track record:
Dr. Dale Cline
- Founder and CEO of CYBERShark Inc, Marlton, NJ
- Former President of the Americas, McAfee / Network Associates, NJ
- Former President and CEO of NetForensics Inc, Edison, NJ
- Former President of Global Knowledge, Morristown, NJ
Dr. Susan Cole
- CISSP, ISC2 Certification Number 309858,
- CCSK (Certificate of Cloud Security Knowledge), 2012
- C|EH (Certified Ethical Hacker)
- C|NDA (Certified Network Defense Architect)
- E|CIH (Certified Incident Handler), EC Council
- Managed and mentored 9 full-time and two part-time ISSOs within the DC region over a period of 5 years
Dr. Michael A. Silas
- JP Morgan Chase Cyber Security Data Engineer and Data Scientist
- US Government Data Scientist
Dan Reddy
- Former chair of Global Outreach and Standards Harmonization at Open Group’s Trusted Technology Provider Standard development (ISO/IEC-20243)
- Institute for Defense Analysis. Consultant for Supply Chain Assurance
- EMC Corp. Product Manager, Product Security Office, Director of Information Security and Assurance
- Certified Secure Software Lifecycle Professional
- Member of Association for Computing Machinery
Dr. Larry Feldman
- Certified Ethical Hacker
- Microsoft Certified Systems Engineer (McSE)
- Certified Information Systems Security Professional (CISSP)
- Certified SCADA Security Architect (CSSA)
- 15+ years of experience in Industrial Control System reliability and security research
- 10+ years of experience support planning, designing, and implementing organizations’ cybersecurity program strategy and risk management
- Involved in developing multi-domain risk management approaches to achieve trustworthiness of Internet of Things (IoT), Industrial IoT (IIoT), and Cyber-Physical Systems (CPS)
- Involved in developing cybersecurity guidance/standards for public and private sectors (NIST, OASIS)
Jelena Vucetic
- President and Founder of Alpha Mission, Inc.
- Former Principal Consultant of Syntek Systems Corp.
- Former President and Founder of Dynamic Telecommunications, Inc.
- Head of Software Engineering Section, Wireless Telecommunications Operations at Watkins-Johnson Corp
- AWS Practitioner and Educator Certificate
- CompTIA Cloud+ Certificate
Selected Talks and Presentation by TESU mentors
- “Automation and Artificial Intelligence (AI): The effect on future business” at Chattanooga PMI Lunch and Learn, August 2022
- “Dark Web” at PMI Baltimore Chapter 2020 Virtual Professional Development Event, Sept 2020
- Tech Careers at River Ridge Middle School’s Great American Teach In, Nov 2018
- “Dark Web” at CENTCOM’s Cybersecurity Awareness Month Event, Oct 2018
- “Security the Internet of Things (IoT)” at PMI PDE – Baltimore Conference, April 2017; cybergamut Technical Tuesday, Nov 2016; PMI Luncheon, Annapolis Junction Chapter, Dec 2016
- “A History of Risk” at PMI PDE – Baltimore Conference, April 2016
- “The Truth About Securing Your System” at cybergamut Technical Tuesday, June 2015; PMI PDE – Baltimore Conference, Apr 2015
- “Cloud Security: Considerations and Concerns” at PMI Luncheon, Annapolis Junction Chapter, March 2014; PMI PDE – Baltimore Conference, March 2014; cybergamut Technical Tuesday, Feb 2013
- “Cloud Security: Are We There Yet” at CAISSWG Meeting, Oct 2012; Grace Hopper Conference, Oct 2012; Exceptional Software’s TechTalk, Aug 2012
- Cybersecurity in the Northeast Region Symposium (TESU)
- UCONN Center for Hardware Assurance, Security and Engineering (CHASE) Conference
- Trustworthy Suppliers Framework Forum (@ NIST, (Panel Member)
- RSA Conference (NIST Cybersecurity Framework and Suppliers
Selected Publications by TESU Mentors
- K. Musa, J. Vucetic: " Secure Cloud Computing Services using Hyper Cloud Framework", Excelsior College, The Journal of Business and Technology, Vol. 4 No.1, August 2019
- Posted to https://cybersentinel.tech/blog/ 2018 - 2019
- The Importance of Continuous Monitoring; Women in Cybersecurity; CyberSurveillance; Is the Dark Web All Bad?; The Importance of PS-3 (Personnel Screening); Importance of Continuous Monitoring; Cybersecurity Stress; Mortgage Mayhem; Ethics and Technology; Technology and Privacy (co-written with Dr. Dana Hudnall)
- Dan Reddy, Institute for Defense Analyses, Securely Using Software Assurance (SwA) Tools in the Software Development Environment (co-author with David A. Wheeler), 2018
- Dan Reddy, Technovation, Special Issue on Supply Chain “Criticality Analysis and the Supply Chain: Leveraging Representational Assurance”, 2014
- Dan ReddyCrossTalk, The Journal of Defense Software Engineering, “Collaborating Across the Supply Chain to Address Taint and Counterfeit”, 2014
- NIST SP 800-221, Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio, July 2022
- NIST SP 800-221A, Information and Communications Technology (ICT) Risk Outcomes: Integrating ICT Risk Management Programs with the Enterprise 6 Risk Portfolio, July 2022
- NISTIR 8286D, Using Business Impact Analysis to Inform Risk Prioritization and Response, June 2022
- NISTIR 8286A, Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM), November 2021
- NISTIR 8170, Approaches for Federal Agencies to Use the Cybersecurity Framework, March 2020
- NIST Technical Note 2051, Cybersecurity Framework Smart Grid Profile, July 2019
- NIST SP 500-325, Fog Computing Conceptual Model, March 2018
- NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, April 2016.
- NISTIR 7756, CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model, January 2012
- NISTIR 7799, Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications, January 201