Army couples needed for relationship study » Participants hold the key to improved relationships after deployment DENVER: Judy Davis is an acti... Global Association ISACA reaches 45 years and 115,... » London, UK: In 1969, the first message was sent between computers via ARPANET, the precursor o... Datum Datacentres announces fast growing cloud and... » FARNBOROUGH: Datum Datacentres has announced the official launch of the Datum Cloud Hub, the co-loca... ANIMATRONIC MANNEQUIN TO TEST PROTECTIVE EQUIPMENT » The Ministry of Defence has invested £1.1m in a new state-of-the-art robotic mannequin that will tes... Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ...

CLICK HERE TO

Advertise with Vigilance

Useful Links

SIA Logo

Guest columnists

In conceiving the idea of a Guest Columnist section we are motivated by the urgent need to find lasting solutions to the various threats to global security by relying on expertise, experience and innovations of persons, institutions and organisations we can aptly regard as custodians of global security – those persons, institutions and organisations that are actively involved in security matters and contending for the liberty of mankind.

Among such include security experts, security advisers, managing directors/chief executive officers of security companies/institutions, intelligence experts, service chiefs, security chiefs, ministers in charge of security in their various countries, secretaries of state, UN Security Council chiefs, heads of UN Peace Keeping Force around the world, NATO chiefs, serving or retired, heads of governments/ex-heads of governments, diplomats and international civil servants with responsibilities for security in and around the world, academics, researchers, etc.

To these categories of persons and representatives of security institutions and organisations throughout the world, we invite you to be our Guest Columnists. Alongside your articles, we would like you to send us your bio data and a passport sized photograph.

 

Guest columnists writing for us:

David GibsonDavid Gibson has been in the IT industry for more than fifteen years, with a breadth of experience in data governance, network management, network security, system administration, and network design.

He is currently Director of Technical Services at Varonis Systems where he oversees product marketing and positioning. As a former a technical consultant, Mr. Gibson has helped many companies design and implement enterprise network architectures, VPN solutions, enterprise security solutions, and enterprise management systems. He is a Certified Information Systems Security Professional (CISSP).

Jane GraftonJane Grafton has more than twenty years experience in domestic and international sales, marketing and business development. She came to Lieberman Software from Sun Microsystems, where she spent 12 years in field marketing management, supporting commercial accounts and federal systems integrators throughout the U.S. In this role, Mrs. Grafton created sustained demand for Sun's products and services. Prior to Sun, Mrs. Grafton sold and developed new markets for Locus Computing Corporation's UNIX software services focusing on OEMs including IBM, Dell, Compaq, Cray, Tandem and StorageTek. At Computer Associates Limited in the UK, she established a new corporate function, Third Party Marketing, by developing relationships with hardware manufacturers, distributors and management consultants. Mrs. Grafton graduated from the University of San Diego, CA in Applied Mathematics.

Mr DimitriadisChristos K. Dimitriadis

Christos K. Dimitriadis, CISA, CISM, is the chief information security officer of INTRALOT S.A, a multinational supplier of integrated gaming and transaction processing systems based in Greece, managing information security in more than 50 countries in all continents.

Dimitriadis has served ISACA as chairman of the External Relations Committee and member of the Relations Board, Academic Relations Committee, ISACA Journal Editorial Committee and Business Model for Information Security Workgroup.

Philip Lieberman

Philip Lieberman, President and CEO


Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry. In addition to his proficiency as a software engineer, Mr. Lieberman is an astute entrepreneur able to perceive shortcomings in existing products on the market, and fill those gaps with innovative solutions.

Dr Rustom KangaDr Rustom Kanga is co-founder and CEO of iOmniscient, one of the pioneers in the field of Video Analysis.

He came from the IT industry where he was a Vice President of Digital Equipment Corporation and then COMPAQ.

Jon MillsJon Mills is the managing director and general manager of SEPATON for Europe, Middle East and Africa (EMEA).  In this role he is responsible for the development and execution of sales strategy, professional services and technical support across the region.

Jon joined SEPATON in 2003 to spearhead the company’s launch in EMEA. Today he oversees SEPATON’s operations, partners and customers in Australia, France, Germany, India, Nigeria, Poland, South Africa, Sweden, Switzerland, UAE and UK.