Josh Domangue serves Independent Security Evaluators (ISE) as Associate Security Analyst. At ISE, Mr. Domangue works on various projects involving application security, network security, and reverse engineering. As one of the main organizers of the SOHOpelessly Broken CTF at IoT Village, Mr. Domangue has continued to improve the IoT hacking challenges and overall quality of the contest. Outside of work, he enjoys participating in security competitions, particularly CTFs. He also organizes and presents lectures at various venues on a wide range of topics within the field of information security.
Matthew Green, PhD, Assistant Professor, Department of Computer Science, Johns Hopkins University
Matthew Green is an Assistant Professor at the Johns Hopkins Information Security Institute. His research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map-based cryptography. Dr. Green is one of the creators of the Zerocash protocol, which is used by the ZCash cryptocurrency. He was formerly a partner in Independent Security Evaluators, a custom security evaluation and design consultancy and currently consults independently. From 1999-2003, he served as a senior technical staff member at AT&T Laboratories/Research in Florham Park, NJ.
Dr. Green’s research focus is in the area of applied cryptography. His recent work includes developing privacy-preserving cryptographic protocols for implementing anonymous electronic cash and identification. He has also developed protocols that allow users to access databases without revealing which data they’re accessing. Additionally, he has been working on new automation techniques to assist in the design and deployment of advanced cryptographic protocols.
Dr. Green also works in the area of cryptographic engineering. This work involves understanding the practical aspects of cryptographic systems, implementing cryptographic protocols, and in some cases reverse-engineering deployed systems. He teaches an introductory course on this subject. Additionally, he has designed several cryptographic tools, including Charm, a framework for rapidly prototyping cryptosystems, and a Functional Encryption library that provides implementations of several new Attribute Based Encryption schemes.
David has spent thirty years in the medical device marketplace combined with twenty years in diverse areas of wireless and mobility technologies.
Core expertise is from software development and device integration to include all phases of wireless from licensed and unlicensed both in the indoor and outdoor space. This domain knowledge space has been gained with Fortune 50 and international companies and has included both hands on design, implementation, and solution deployments on a global level.
Educational background includes an undergraduate degree in chemistry and advanced masters and doctoral research studies in biochemistry coupled with business education as an officer in the Air Force.
B.S. Northern Illinois University
Erik D. Jones is a technology professional with more than 25 years of experience in information technology and software engineering. He is currently Chief Executive Officer of Jacobian Engineering, an information security firm that he founded along with his partner, Brian Jones, 12 years ago. The company enables customers to outsource security and IT and provides products and services for compliance certification, risk and audit assessment, forensics, DevOps, and cloud management. Supporting clients from the healthcare industry to startups, Jacobian operates a 24/7 network and security operations center out of its Omaha, Nebraska office. Jacobian Engineering is headquartered in Oakland, CA.
Erik holds several information security certifications from (ISC)2, Stanford University, HITRUST, and SANS Institute and actively participates in the security community.
Drew Ogle is Team Lead at Independent Security Evaluators. He has 15+ years of industry experience in system design, application and network testing, applied cryptography and information retrieval.
Paul Otto understands the regulatory environment surrounding privacy and cybersecurity risk management and incident response. Leveraging his technical background and capabilities in computer science and engineering, Paul brings insight to clients as a compliance counselor who understands hardware, software, and technological innovation.
Paul works with legal counsel and security officers throughout the lifecycle of cybersecurity risk management and incident response. Because many organizations have limited in-house cybersecurity legal capacity, Paul embraces the role of outside counsel by working alongside executive and information security teams to manage risk, oversee corporate governance, and help identify and capitalize on risk-reducing opportunities for enhanced data protection.
Paul’s cybersecurity legal representation includes organizations across a wide range of industries, primarily in the life sciences and healthcare sectors. Whether it is cloud computing, mobile technology, critical infrastructure, the Internet of Things, or any number of technology-related areas, Paul regularly advises clients on compliance with various privacy and cybersecurity laws, regulations, and standards.
Charles (Chuck) Parker is Global Lead for Healthcare at Beyond Limits. With more than 20 years of Healthcare IT experience, he has led several research and for-profit initiatives. Most recently as a lead for Beyond Limits, a commercial startup bringing forward application of NASA developed Artificial Intelligence for application in healthcare across a spectrum of consumer and provider initiatives. Prior, he served as the Executive Director of the Continua Health Alliance – a membership-driven company focused on developing an eco-system of interoperable personal health devices – Chuck has been active in leading the industry in the Personal Connected Health area for the past 6 years.
Mr. Parker has collaborated internationally with governments, payers, providers and vendors. Through working with Standards bodies and industry experts, he has worked to instill standards built upon international criteria from IEEE, HL7, Bluetooth, USB, and others. In 2012, Denmark and Singapore began collaborating with Continua to require all personal connected health devices used in their national telemedicine programs were Continua Certified to ensure convenient and secure collection, communication and access to personal health data for its citizens.
Mr. Parker’s experiences include healthcare technology, policy, regulation, and the strategic design of evaluation and measurement strategies. He has led national programs for practice transformation and has served on national and international committees for assessing adoption requirements.
Mr. Parker holds a Master of Science degree in Healthcare Informatics from Northeastern University. He earned his BA in Communication Studies and Business Management at Texas Tech University in Lubbock.
Susan Ramonat is Founder and CEO of Spiritus Partners, a cloud-based software company disrupting post-market surveillance and adverse event management in healthcare by combining proven enterprise-class technologies with advances in analytics and blockchain/DLT. Susan has over 25 years of experience in sales, product development, corporate development, and operational risk management in the heavily regulated financial services industry. A frequent speaker at industry conferences and universities about blockchain, IoT, and cybersecurity, she also serves on the Industrial Advisory Board of Engineering Science at Loyola University Chicago. Susan was raised in Bethlehem, PA and graduated magna cum laude from Princeton University.
Michael Robkin, MBA, is co-founder and President Xelnt Healthcare, Inc. Mike was PI on a research grant from the US Army on Medical Device Cybersecurity. He was formerly the most senior Enterprise Architect for NationalCare Delivery systems at Kaiser Permanente, and a founding board member of the Continua Health Alliance. Mike previously co-chaired the first FDA (CDRH) Workshop on Medical Device Interoperability: Achieving Safety and Effectiveness.
Shahid N. Shah is an internationally recognized and influential cybersecurity and risk management expert. He is a technology strategy consultant to many federal agencies and winner of Federal Computer Week’s coveted “Fed 100″ award for his work on the government’s largest secure collaboration space. Shahid has lead or participated in numerous cybersecurity risk assessments, threat assessments, risk management, penetration testing, and overall systems quality efforts in multiple government agencies as well as medical devices, insurance, and health IT sectors over the past 18 years. He’s served as Chief Architect (contractor) for BFELoB and OMB secure collaboration platforms and was responsible for strategy as well as implementation leadership of the government’s largest cross-agency identity management solution focused on multifactor auth/authz and identity assurance. Shahid has helped guide numerous projects through FISMA compliance and FedRAMP certifications as well as helped architect some of the systems within which FedRAMP content submitted by registrants are safely stored. He’s also helped AHIP with cybersecurity strategy development for its member insurers and is the author of the “Cybersecurity Risks” and “Conducting Digital Health Risk Assessments” chapters of the 2015 edition of “Insurance and Risk Management Strategies for Physicians and Advisors” book.
Shankar Somasundaram is currently the CEO of Asimily. Asimily is a data driven, non-invasive medical device monitoring solution for healthcare providers and medical device manufacturers solving for asset management, risk, cybersecurity and operational use cases.
Previously Shankar led the Internet of Things business unit at Symantec. In this role, he oversaw the Enterprise Internet of Things business unit that focused for multiple verticals, including Healthcare, Industrial Control Systems (manufacturing, utilities, etc.) and Facilities (buildings) . Before that Shankar was part of the business and corporate development teams driving deals in the enterprise storage and security space. Prior to joining Symantec, Shankar held engineering, strategy and product management roles at companies like Qualcomm, InterDigital and British Telecom. Shankar also established and operated startups in enterprise software and security arenas and holds 50+ granted patents across networking and security.
Joseph Ternullo, JD, MPH has focused the past 20 years of his career on healthcare. Joe is well known for his 17 years as the associate director of Partners HealthCare’s Center for Connected Health. He founded and chaired for 10 years the Connected Health Symposium, a two-day international conference with a prominent patient engagement focus. He was a co-founder of the Continua Health Alliance, a standards and interoperability organization. Joe has served on two federal advisory committees, including the US Department of Health & Human Service’s American Health Information Communities Chronic Care Workgroup. Joe has authored several publications focused on healthcare technology and served on several international and domestic boards. Most recently, he led a health technology start-up that established an exploratory US presence. Joe holds degrees from Boston College, Bentley University, Boston University School of Law and Harvard T.H. Chan School of Public Health.
Kevin Thomas serves elite security research and consulting firm Independent Security Evaluators in many capacities, including notably as a key member of the IoT Village organizing team. He has a Bachelor’s degree in Financial Economics with a minor in Entrepreneurship from the University of Maryland, Baltimore County. An avid traveler who has visited more countries than he can count, Mr. Thomas is fluent in multiple languages, including English, Hindi, and Malayalam, and is also proficient in Spanish and Latin.
Sr. Technical Staff Member
IBM Master Inventor
Chief Architect, Infrastructure Security, IBM Security
Ron Williams is the principal architect of the X-Force Exchange, a cloud deployed and DevOps delivered security service. He is a subject matter expert in threat intelligence, network application and security, and identity governance. As a product architect, Ron has designed and developed application & network security products including global web security architecture for the Global 100. He is an inventor with patents granted in the fields of authentication, authorization, audit, web application security, network intrusion detection and protection, and security in software defined networks.
With over 25 years experience in information technology, software development, and security architecture, Ron has a track record of delivering innovative products and solutions to healthcare, finance, and retail market segments by focusing on the achievement of business-driven security objectives in the simplest way possible.
- Conceived, designed, and led development and deployment of X-Force Exchange, IBM’s cloud based threat intelligence collaboration and sharing platform.
- Web based solution and deployment security architectures for global enterprises in Finance, Healthcare, Retail, and the Government.
- Fast assessment of organization effectiveness against defined organizational and program objectives.
Ron is currently the Chief Architect, Threat Protection and Intelligence IBM Security, and Principal Architect of the X-Force Exchange, IBM’s Threat Intelligence Portal and Sharing Platform. Ron leads a global engineering team to deliver customer focused value through IBM Design Thinking, innovative implementation, and agile development practice.