词条 | James Ryan (cyber security) |
释义 |
| name = James Ryan | image = | image_size = | birth_date = 1974 | birth_place = Anchorage, Alaska | nationality = American |spouse= Kidist Tekle | children= 3 | birth_name = | known_for = cyber security, trust frameworks, cyber defense | education = Bachelor of Science in Electrical Engineering, Master of Science in Electrical Engineering | alma_mater = Virginia Tech | occupation = Entrepreneur, public speaker, trainer, consultant | years_active = | awards = | website = {{url| http://cybersecuritysummit.org/speakers/james-ryan/ |cybersecuritysummit.org/speakers/james-ryan/ /}} }}James Ryan (born in 1974, Anchorage, Alaska) is an American entrepreneur in cyber security. He is the co-founder and managing partner of Litmus Logic, a security firm. Ryan's contributions to the cyber security industry are known through The Economist[1] and The History Channel.[2][1][2] LifeRyan was born in Anchorage, Alaska in 1974. He holds a Bachelor and Master of Science in Electrical Engineering from Virginia Tech. Ryan currently resides in Northern Virginia with his wife Kidist, and three children. As a motivational trainer, Ryan was included in the book “Lifting the Curtain: the disgrace we call urban high school education”.[3] CareerRyan is the founder and Managing Partner since 2002, of Litmus Logic, LLC, a boutique firm that provides expertise in security and privacy, cyber defense, trust strategies and Internet technologies. He serves as Chief Strategy Officer for the Cyber Security Summit,[4] and the Minnesota Innovation Lab, a State-level economic development organization.[5] Ryan was one of the experts who contributed to The Economics of Digital Identity, a 2015 technical report published by The Economist Intelligence Unit.[6][7] From 1993 to 1997, he was a software engineer at TRW; from 1997 to 1998, a system engineer at Lockheed Martin; from 1998 to 1999, a security and network expert at Lucent Technologies (now Alcatel-Lucent); from 1999 to 2002, a principal consultant and security and network expert at Predictive Systems. Ryan who has knowledge in cyber security and trust framework, consults with governments, defense and financial institutions, software and Cloud providers,[8][9] The United States Department of Defense (DoD) and civil agencies.[10][11] He spoke at the United States Department of Defense Cyber Crime conference, Robotics Alley,[12] the Cyber Security Summit[4] and Security360.[13] Topics of his speeches included success with cyber security, Public key infrastructure (PKI), Internet of Things, cyber security for robotics and artificial intelligence, and National Strategy for Trusted Identities in Cyberspace. WorksRyan has collaborated with NASA and Electronic Data Systems (EDS) in creating the Identity Credential and Access Management (ICAM) segment architecture, the Personal Identity Verification – Interoperable (PIV-I) trust framework, a new approach to access control that uses Public Key Infrastructure (PKI).[6] He was featured together with Oliver North in the History Channel program “America’s Book of Secrets: The Pentagon” in March 2012.[14][15] References1. ^{{cite web |url=http://www.csbj.com/2013/08/15/turning-the-cyber-stalemate-into-action/ |title=Turning the cyber stalemate into action |publisher=The Colorado Springs Business Journal |accessdate=27 February 2017}} 2. ^{{cite web |url=https://www.imdb.com/title/tt2323845/fullcredits/ |title=America's Book of Secrets (TV Series):The Pentagon (2012) - Full Cast & Crew |publisher=IMDb |accessdate=27 February 2017}} 3. ^{{cite web |url= https://liftingthecurtainoneducation.wordpress.com/2014/11/20/honoring-24-of-our-teachers-by-selecting-them-to-be-included-in-the-2nd-edition-of-lifting-the-curtain-the-disgrace-we-call-urban-high-school-education/ |title=Honoring 24 of our teachers by selecting them to be included in the 2nd edition of "Lifting the Curtain: the disgrace we call urban high school education" |publisher=Lifting The Curtain of Education |date= |accessdate=27 February 2017}} 4. ^1 {{cite web |url=http://cybersecuritysummit.org/speakers/james-ryan/ |title=James Ryan |publisher= Cyber Security Summit |date=October 12, 2016 |accessdate=27 February 2017}} 5. ^{{cite web |url=http://www.itworld.com/article/2874794/the-internet-of-robotic-things-secure-harmless-helpers-or-vulnerable-vicious-foes.html |title=The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes? |publisher=IT World (IDG) |date=January 23, 2015 |accessdate=27 February 2017}} 6. ^1 2 {{cite web |url=https://www.eiuperspectives.economist.com/sites/default/files/EconomicsDigitalIdentity.pdf |title=Economics Digital Identity |publisher=The Economist |date=October 12, 2016 |accessdate=27 February 2017}} 7. ^{{cite web |url=http://www.cybersecuritybusiness.com/cybercrime/realities-of-todays-digital-economy/ |title=Realities of today’s digital economy |publisher=Cyber Security Business |date=7 October 2016 |accessdate=27 February 2017}} 8. ^{{cite web |url=http://www.cso.com.au/article/564661/internet-robotic-things-secure-harmless-helpers-vulnerable-vicious-foes/ |title=The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes? |publisher=CSO |date=January 24, 2015 |accessdate=27 February 2017}} 9. ^{{cite web |url=http://www.zdnet.com/article/robot-security-making-sure-machines-dont-become-the-latest-big-threat/ |title=Robot security: Making sure machines don't become the latest big threat |publisher=ZDNet |date=October 12, 2016 |accessdate=27 February 2017}} 10. ^{{cite web |url=http://www.c4isrnet.com/story/military-tech/it/2015/02/20/securing-commercial-cloud/23738771/ |title=Solving commercial cloud's security puzzle |publisher=C4ISRNET |date=20 February 2015 |accessdate=27 February 2017}} 11. ^{{cite web |url=https://sputniknews.com/analysis/201504211021158515/ |title=Cyberattacks on Pentagon Supply Chain Difficult to Counter |publisher= |date=April 21, 2015 |accessdate=27 February 2017}} 12. ^{{cite web |url=http://roboticsalley.org/speakers/james-ryan/ |title=Speakers – James Ryan |publisher=Robotics Alley |date=February 28, 2017 |accessdate=7 March 2017}} 13. ^{{cite web |url=https://secure360.org/schedule/iot-hope-from-hacking-hearts/ |title=IoT Hope From Hacking Hearts |publisher= |date=May 13, 2015 |accessdate=27 February 2017}} 14. ^1 {{cite web |url=http://historytv.pl/shows/americas-book-of-secrets/videos/americas-book-of-secrets-the-pentagon |title=America's Book Of Secrets - The Pentagon |publisher=The History Channel |date=October 12, 2016 |accessdate=27 February 2017}} 15. ^{{cite web |url=https://m.imdb.com/title/tt2323845/fullcredits/cast?ref_=m_tt_cl_sc |title= America’s Book of Secrets: The Pentagon - Cast |publisher=IMDb |date=2012 |accessdate=27 February 2017}} External links
7 : 1974 births|Living people|Businesspeople from Anchorage, Alaska|American technology company founders|American technology chief executives|People associated with computer security|Virginia Tech alumni |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。