Becky Bace Mentoring Program
The mentors who have volunteered their time for our TTP mentoring program have a wealth of experience that spans the private, government, and academic sectors. PIs seeking services will submit an application and be directed to the most appropriate channel for advice.
Read more about Becky Bace here.
David BalensonDavid Balenson is a senior computer scientist in the Computer Science Laboratory at SRI International. With more than 35 years of experience, he works to drive programs and organizations to research, develop, test, evaluate, and transition innovative solutions to challenging cybersecurity needs. He provides technical and programmatic support to the Department of Homeland Security Science and Technology Directorate. Balenson previously served as Senior Professional Staff at the Johns Hopkins University Applied Physics Laboratory, Division Manager for SPARTA’s Security Research Division, and a Director at McAfee Research. Balenson holds bachelor’s and master’s degrees in Computer Science from the University of Maryland. |
|
Mark CummingsMark Cummings, Ph.D. has worked in a broad range of roles in industry and academic organizations; is widely published; and holds an MBA in Communications Management from Wharton, and a Ph.D. in Information Systems from Tohoku Imperial University in Japan. Currently, at Orchestral Networks, he is the inventor of the patented technology behind the company’s ON1 and ON-Secure products. His Information Security background includes the system to secure the links between the US Federal Reserve and the Federal Reserve Member Banks; the first security architecture for Chemical Bank; security for the first Shared ATM network Plus; and top secret US security clearance while working on the commercial portion of the Tracking and Data Relay Satellite System. At Stanford Research Institute he started the Pocket Intelligence Program that was the first to identify the move to what became Smart Phones. |
|
Jeff ManJeff Man is a respected Information Security expert, advisor, and evangelist. He has over 34 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. Earlier in his career, Jeff held security research, management and product development roles with NSA, the DoD and private-sector enterprises and was part of the first penetration testing "red team" at NSA. For the past twenty years, Jeff has been a pen tester, security architect, consultant, QSA, and strategist providing consulting and advisory services to many of the nation's best known brands. |
|
Richard MarshallRichard Marshall is a retired lawyer from the National Security Agency’s Office of the General Counsel. He is a business consultant on Cyber legal and policy issues. He is CEO of SETI, a software development company; CEO of Cinturion Group, an international fiber-optic and subsea cable company; and serves as Corporate Counsel for Data on Acid, a cybersecurity international enterprise. |
|
Dan MasseyDr. Dan Massey is a Professor of Computer Science at the University of Colorado Boulder. Prior to joining CU Boulder, Dan was a Program Manager in the Cyber Security Division, Science and Technology Directorate, U.S. Department of Homeland Security (DHS). At DHS, he developed and managed several programs including SBIR efforts as well the Cyber Physical Systems (CPSSEC) program that focused on cyber security for automobiles, medical devices, building controls, and the Distributed Denial of Service Defense (DDoSD). He has more than 25 years of research and management experience and is the author of over 100 peer reviewed publications. |
|
Chris ShenefielChris Shenefiel has worked as a consultant for a small Nuclear Power inspection company and at AT&T Solutions. He has also worked in product development and marketing for Amteva Technologies (acquired by Cisco), Motorola and AT&T. In his nearly 20 years of engineering, product management and marketing experience, he has learned excellence in product development (SEI-CMM, Six Sigma) and has been through significant market transitions, like the breakup of AT&T, the transition from PBX's to IP Telephony, and the rise of cybersecurity. He is currently at Cisco and is pleased to be working with a team of Cisco leaders (Fellows, Distinguished Engineers) with vast experience and industry influence as they define and execute a research plan to improve security for Cisco and the internet industry as a whole. |
|
Angelos StavrouDr. Angelos Stavrou is founder of Kryptowire, Professor at George Mason University, and Director of the Center for Assurance Research and Engineering (CARE) at GMU. Stavrou has served as PI on research awards from NSF, DARPA, IARPA, DHS, AFOSR, ARO, ONR; he is an active member of NIST's Mobile Security team, and has written more than 90 peer-reviewed conference and journal articles. Stavrou received his M.Sc. in Electrical Engineering, M.Phil. and Ph.D. (with distinction) in Computer Science all from Columbia University. He also holds an M.Sc. in theoretical Computer Science from University of Athens, and a B.Sc. in Physics with distinction from University of Patras, Greece. Stavrou is Associate Editor of IEEE Transactions on Reliability and IET Journal on Information Security. In July 2017, Dr. Stavrou and Kryptowire received the DHS Cyber Security Division’s "Significant Government Impact Award" for their efforts to analyze mobile applications. He is a NIST guest researcher, a member of the ACM and USENIX, and a senior IEEE member. |
|
Caroline WongCaroline Wong is the Vice President of Security Strategy at Cobalt. Her close and practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. She is a well-known thought leader on the topic of security metrics and has been featured at industry conferences including RSA (USA and Europe), IT Web Summit (South Africa), OWASP AppSec, Metricon, the Executive Women’s Forum, ISC2, and the Information Security Forum. Caroline received a 2010 Women of Influence Award in the One to Watch category and authored the popular textbook Security Metrics: A Beginner’s Guide, published by McGraw-Hill in 2011. She graduated from U.C. Berkeley with a B.S. in Electrical Engineering and Computer Sciences. |
|
Jeehye YunJeehye Yun is CEO and founder of RedShred, which uses machine learning and natural language processing to help businesses find revenue. Over 3 million US businesses source federal, state and local opportunities to fight for their slice of a $2T award pie. She has built an IT services firm specializing in software development, open source and proprietary content management systems with clients such as National Geographic, NGC TV/Fox and the USMC. Prior to that she was Director of Computing at the University of Maryland Institute for Advanced Computer Studies (UMIACS) and managed cybersecurity at the University of Maryland, Baltimore County. |