Ransomware Simulations, LinkedIn, 2025
Cloud Provider Security Platforms, LinkedIn, 2025
Role of the Chief Security Officer, LinkedIn, 2024
Role of Corporate Communications During a Cyber Breach, LinkedIn, 2024
Five Part Zero Trust Series, LinkedIn, 2024
Business Continuity Plans, LinkedIn, 2024
Developing Markets for Nascent Technologies, LinkedIn, 2024
Using Machine Learning Techniques to Predict Phishing Websites, Kennesaw State University · Oct 12, 2022
An Analysis of the 2022 SEC Cybersecurity Disclosure Rules, Atlanta, 2022.
Blind Certificate Authorities, Kennesaw State University · Oct 4, 2022
Investigating Cyberviolence Against Women, Kennesaw State University · Sep 16, 2022
The Societal Effects of Cyberviolence on Women, Kennesaw State University · Sep 6, 2022
Maintaining Evidence During a Digital Forensic Investigation, Kennesaw State University · Aug 10, 2022
Cyber Defense-in-Depth Approaches, Kennesaw State University · Jul 27, 2022
The Importance of Digital Forensic Evidence Validation, Kennesaw State University · Jul 9, 2022
Cyber Kill Chain Deficiencies, Kennesaw State University · Jul 1, 2022
Cloud Security, Confidentially, and Integrity, Kennesaw State University · Mar 31, 2022
Mobile Security, Confidentially, and Integrity, Kennesaw State University · Mar 12, 2022
The Limits of Routine Activities Theory in Explaining Cybercrime and Victimization, Kennesaw State University · Jul 1, 2020
South Africa - Risks and OpportunitiesSouth Africa - Risks and Opportunities, Georgia State MBA Program · Jun 1, 2015
Prevailing Practices in Risk Reporting, Atlanta, GA · Aug 1, 2014
Prevailing Practices in Project Risk, Atlanta, GA · Apr 1, 2014