{"id":2000,"date":"2016-04-11T14:28:22","date_gmt":"2016-04-11T18:28:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=2000"},"modified":"2023-11-19T16:36:24","modified_gmt":"2023-11-19T21:36:24","slug":"faculty","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/faculty\/","title":{"rendered":"ITACS MS Program Faculty"},"content":{"rendered":"<p><a href=\"https:\/\/www.linkedin.com\/in\/caswellmanderson\">Caswell Anderson<\/a><br \/>\nInformation Security Manager, Navy Federal Credit Union<br \/>\nCaswell.Anderson@temple.edu<br \/>\nCourse:\u00a0MIS 5208 Data Analytics for IT Auditors<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/lanshark\/\">William Bailey<\/a><br \/>\nSecurity, Privacy &amp; Risk Professional \u2013 SAIC (Science Applications International Corporation)<br \/>\nWilliam.Bailey<span class=\"\">@temple.edu<\/span><br \/>\nCourses: MIS 5903 Cyber Security Capstone, MIS 5211 Ethical Hacking, and MIS 5203 Systems and Infrastructure Lifecycle Management<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/orlando-barone-07153bb\">Orlando (&#8220;Lonnie&#8221;) Barone<\/a><br \/>\nPresident \u2013 Barone Associates<br \/>\nOrlando.Barone@temple.edu<br \/>\nCourses: MIS 5687 &amp; MIS 5688 Business Skills for IT Auditors 1 &amp; 2<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/ryancalefesq\">Ryan Calef<\/a><br \/>\nDirector of Regulatory Issue Management, Monitoring and Oversight &#8211; Silicon Valley Bank<br \/>\nRyan.Calef@temple.edu<br \/>\nCourse:\u00a0MIS 5208 Data Analytics for IT Auditors<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/allen-chou-42bb6a2\/\">Allen Chou<\/a><br \/>\nIT Audit and Risk Management Consultant &#8211; Robert Half<br \/>\nallen.chou@temple.edu<br \/>\nCourses: MIS5121 Enterprise Resource Planning Systems for IT Auditors; MIS 5202 IT Governance<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/esf436research\/\">Ed Ferrara<\/a><br \/>\nPrincipal \u2013 436 Research LLC<br \/>\nEferrara@temple.edu<br \/>\nCourse: MIS 5216 Organizational Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/richardyflanagan\">Richard Flanagan<\/a><br \/>\nFounder &#8211; ITACS Program, Temple University<br \/>\nryflanag@temple.edu<br \/>\nCourse:\u00a0MIS 5202 IT Governance<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/jcg1973\/\">Jose Gomez<\/a><br \/>\nTechnology Leader Core Engineering Compliance and Assurance &#8211; Wells Fargo<br \/>\n<span class=\"\">tuf82656<span class=\"\">@tem<\/span>ple.du<\/span><br \/>\nCourse: MIS 5214 Security Architecture<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/isprof\">Brian Green<\/a><br \/>\nIT Connectivity Leader Ultrasound \u2013 GE Healthcare Digital<br \/>\nBrian.Green@temple.edu<br \/>\nCourses: MIS 5215 Operating System Security and MIS 5217 Network Security<\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/dlanter\/\">David Lanter<\/a><br \/>\nITACS Program Director, Temple University<br \/>\nDavid.Lanter@temple.edu<br \/>\nCourses:\u00a0MIS 5206 Protection of IT Assets and MIS 5214 Security Architecture<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/sudhanshukairab\/\">Sudhanshu Kairab<\/a><br \/>\nSenior Vice President, Governance, Risk, &amp; Compliance &#8211; Comcast<br \/>\nskairab@gmail.com<br \/>\nCourse: MIS 5203 Systems and Infrastructure Lifecycle Management<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/wade-mackey-1054011\/\">Wade Mackey<\/a><br \/>\nRisk Technical Manager (retired) \u2013 The Vanguard Group<br \/>\nWade.Mackey@temple.edu<br \/>\nCourses: MIS 5211 Ethical Hacking, MIS 5206 Protection of Information Assets, and MIS 5203 Systems and Infrastructure Lifecycle Management<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/thu-nguyen-cisa-crma-b7196016\/\">Thu Nguyen<\/a><br \/>\nAssociate Vice President Internal Audit \u2013 Wells Fargo &amp; Co.<br \/>\nProfessorThu@temple.edu<br \/>\nCourses: MIS 5902 IT Auditing Capstone and MIS 5202 IT Governance<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/devals\">Deval Shah<\/a><br \/>\nInformation Systems Security Manager \u2013 U.S. Customs and Border Protection, Department of Homeland Security)<br \/>\nDeval.Shah@temple.edu<br \/>\nCourse: MIS 5213 Intrusion Detection and Response<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/paul-warner-a89822187\/\">Paul Warner<\/a><br \/>\nChair Cybersecurity Program \u2013 Rowan College at Burlington County<br \/>\nPaul.Warner@temple.edu<br \/>\nCourse: MIS 5216 Organizational Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/patrick-wasson-50647933\">Patrick Wasson<\/a><br \/>\nWeb Applications and Information Delivery Manager &#8211; Blank Rome LLP<br \/>\nPatrick.Wasson@temple.edu<br \/>\nCourse:\u00a0MIS 5122 Enterprise Architecture for IT Auditors<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/christievazquez\/\">Christy Vazquez<\/a><br \/>\nBusiness Technology Risk Senior Manager, Federal Reserve Board<br \/>\nChristy.Vazquez@temple.edu<br \/>\nCourse: MIS 5205 IT Service Delivery and Support<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/liang-yao-95973615\">Liang Yao<\/a><br \/>\nIT Lead Examiner at Office of the Comptroller of the Currency \u2013 U.S. Department of the Treasury<br \/>\nliang.yao@temple.edu<br \/>\nCourses: MIS 5201 IT Audit Process and MIS 5205 IT Service Delivery and Support<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Caswell Anderson Information Security Manager, Navy Federal Credit Union Caswell.Anderson@temple.edu Course:\u00a0MIS 5208 Data Analytics for IT Auditors William Bailey Security, Privacy &amp; Risk Professional \u2013 SAIC (Science Applications International Corporation) William.Bailey@temple.edu Courses: MIS 5903 Cyber Security Capstone, MIS 5211 Ethical Hacking, and MIS 5203 Systems and Infrastructure Lifecycle Management Orlando (&#8220;Lonnie&#8221;) Barone President \u2013 Barone [&hellip;]<\/p>\n","protected":false},"author":8076,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-2000","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-wg","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/2000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/8076"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=2000"}],"version-history":[{"count":47,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/2000\/revisions"}],"predecessor-version":[{"id":3839,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/2000\/revisions\/3839"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=2000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}