Rick Robinson
Offering Manager
Encryption and Key Management
Rick Robinson comes from a diverse background of architecture, development, and
deployment of new products and services that employ cryptography in one form or
another. He has numerous patents in the area of cryptography and computer security
and helped customers in the financial, health, retail, manufacturing, and government
sectors. Rick has been an active proponent of cryptography for business – applying
standards-based cryptography, key management, PKI, and secure protocols to help
business stay competitive in the ever-changing world of data security.
Dr. Stephen Hayne
Professor, Computer Information Systems Dpt.
Dr. Hayne’s research interests lie mainly in collaborative technologies, security, knowledge management, and "big" data analytics. Much of his research is rooted in the desire to use innovative technology to solve real problems. To this end he has implemented tools to assist groups in communication and decision-making, i.e. shared drawing, group brainstorming, concurrent issue surfacing and consolidation, intrusion outlier detection classification and visualization. He has applied this technology to support decision making during crisis situations. His other research interests lie with social networks, distributed systems, software engineering, auctions (reputation and pricing effects) and reputation effects of feedback.
Holly Watkins
Dave Dufour
Senior Director Engineering and Cybersecurity
Mr. Dufour is a leader in the computer security and threat analytics industry spending much of his time designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. His experience with machine learning, contextual analytics, big data, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes, identifying bad actors and the use of predictive algorithms for pre-attack determination. Mr.Dufour also spends time speaking on topics pertaining to threat analytics, theoretical security systems design and works to move the security industry to a more automated, predictive architecture.
Dan Domagala
Technology Strategist
From PC support intern to CIO, Dan has been in the technology arena for 30 years and counting. He has programmed applications, architected systems, and designed secure data warehouses for oil & gas, hospitality, telecommunications, and education entities.
Dan has led IT teams both large and small, from governmental entities to multi-national conglomerates to entrepreneurial startups. In his role as a technology strategist and IT advisor, Dan guides organizations on the effective use of technology to accomplish business goals.
Rick Robinson
Offering Manager
Encryption and Key Management
Rick Robinson comes from a diverse background of architecture, development, and
deployment of new products and services that employ cryptography in one form or
another. He has numerous patents in the area of cryptography and computer security
and helped customers in the financial, health, retail, manufacturing, and government
sectors. Rick has been an active proponent of cryptography for business – applying
standards-based cryptography, key management, PKI, and secure protocols to help
business stay competitive in the ever-changing world of data security.
Dr. Stephen Hayne
Professor, Computer Information Systems Dpt.
Dr. Hayne’s research interests lie mainly in collaborative technologies, security, knowledge management, and "big" data analytics. Much of his research is rooted in the desire to use innovative technology to solve real problems. To this end he has implemented tools to assist groups in communication and decision-making, i.e. shared drawing, group brainstorming, concurrent issue surfacing and consolidation, intrusion outlier detection classification and visualization. He has applied this technology to support decision making during crisis situations. His other research interests lie with social networks, distributed systems, software engineering, auctions (reputation and pricing effects) and reputation effects of feedback.
Holly Watkins
Dave Dufour
Senior Director Engineering and Cybersecurity
Mr. Dufour is a leader in the computer security and threat analytics industry spending much of his time designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. His experience with machine learning, contextual analytics, big data, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes, identifying bad actors and the use of predictive algorithms for pre-attack determination. Mr.Dufour also spends time speaking on topics pertaining to threat analytics, theoretical security systems design and works to move the security industry to a more automated, predictive architecture.
Dan Domagala
Technology Strategist
From PC support intern to CIO, Dan has been in the technology arena for 30 years and counting. He has programmed applications, architected systems, and designed secure data warehouses for oil & gas, hospitality, telecommunications, and education entities.
Dan has led IT teams both large and small, from governmental entities to multi-national conglomerates to entrepreneurial startups. In his role as a technology strategist and IT advisor, Dan guides organizations on the effective use of technology to accomplish business goals.