June 7, 2017 6:31:36 pm Panelists – Cybersecurity Power Breakfast 2017 Holly Watkins By BizWest Staff Rick Robinson Offering Manager Encryption and Key Management Rick Robinson comes from a diverse background of architecture, development, and deployment of new products and services that employ cryptography in one form or another. He has numerous patents in the area of cryptography and computer security and helped customers in the financial, health, retail, manufacturing, and government sectors. Rick has been an active proponent of cryptography for business – applying standards-based cryptography, key management, PKI, and secure protocols to help business stay competitive in the ever-changing world of data security. Dr. Stephen Hayne Professor, Computer Information Systems Dpt. Dr. Hayne’s research interests lie mainly in collaborative technologies, security, knowledge management, and "big" data analytics. Much of his research is rooted in the desire to use innovative technology to solve real problems. To this end he has implemented tools to assist groups in communication and decision-making, i.e. shared drawing, group brainstorming, concurrent issue surfacing and consolidation, intrusion outlier detection classification and visualization. He has applied this technology to support decision making during crisis situations. His other research interests lie with social networks, distributed systems, software engineering, auctions (reputation and pricing effects) and reputation effects of feedback. Holly Watkins Dave Dufour Senior Director Engineering and Cybersecurity Mr. Dufour is a leader in the computer security and threat analytics industry spending much of his time designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. His experience with machine learning, contextual analytics, big data, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes, identifying bad actors and the use of predictive algorithms for pre-attack determination. Mr.Dufour also spends time speaking on topics pertaining to threat analytics, theoretical security systems design and works to move the security industry to a more automated, predictive architecture. Dan Domagala Technology Strategist From PC support intern to CIO, Dan has been in the technology arena for 30 years and counting. He has programmed applications, architected systems, and designed secure data warehouses for oil & gas, hospitality, telecommunications, and education entities. Dan has led IT teams both large and small, from governmental entities to multi-national conglomerates to entrepreneurial startups. In his role as a technology strategist and IT advisor, Dan guides organizations on the effective use of technology to accomplish business goals. Facebook LinkedIn Threads Email Print Categories: Cybersecurity Cybersecurity Events Events Multimedia