Dr. Jason Edwards, DM, CISSP, CRISC
San Antonio, Texas, United States
72K followers
500+ connections
About
Dr. Jason Edwards is a distinguished cybersecurity leader, advisor, and educator with…
Articles by Dr. Jason
Activity
-
I knew this drone thing was going to get out of hand :)
I knew this drone thing was going to get out of hand :)
Shared by Dr. Jason Edwards, DM, CISSP, CRISC
Experience
Education
-
University of Phoenix
-
The University of Phoenix's Doctor of Management in Information Systems and Technology (DM/IST) program is an advanced course focused on leadership in information systems and technology. It blends theoretical knowledge with applied research, covering data analytics, IT governance, system development, and cybersecurity.
My DM/IST program dissertation centered on regulatory cybersecurity assurance testing within large financial institutions. It entailed a detailed analysis of Federal…The University of Phoenix's Doctor of Management in Information Systems and Technology (DM/IST) program is an advanced course focused on leadership in information systems and technology. It blends theoretical knowledge with applied research, covering data analytics, IT governance, system development, and cybersecurity.
My DM/IST program dissertation centered on regulatory cybersecurity assurance testing within large financial institutions. It entailed a detailed analysis of Federal Financial Institutions Examination Council (FFIEC) regulations and how they guide the cybersecurity practices of financial entities. I evaluated the alignment of cybersecurity measures with regulatory requirements, aiming to bolster cybersecurity assurance practices. This enriched my understanding and practical expertise in managing information systems and cybersecurity within regulatory frameworks and honed my capabilities in providing thought leadership in these essential domains. -
-
Capella University’s Master’s in Information Technology program is an innovative and comprehensive course designed for professionals seeking to elevate their expertise in the ever-evolving IT landscape. The program offers a blend of theoretical knowledge and practical skills, catering to various specializations within IT, including networking, cybersecurity, data analytics, and project management.
As a part of the program, students engage in rigorous, industry-relevant and academically…Capella University’s Master’s in Information Technology program is an innovative and comprehensive course designed for professionals seeking to elevate their expertise in the ever-evolving IT landscape. The program offers a blend of theoretical knowledge and practical skills, catering to various specializations within IT, including networking, cybersecurity, data analytics, and project management.
As a part of the program, students engage in rigorous, industry-relevant and academically robust coursework. The curriculum emphasizes problem-solving, critical thinking, and applying IT principles to real-world challenges. Through simulations, case studies, and hands-on projects, students are equipped with the skills to navigate complex IT environments.
Graduates of Capella University’s Master’s in Information Technology program are well-prepared to assume leadership roles in IT, steering technology initiatives and innovations in organizations of diverse scales and industries. -
-
Capella University's Bachelor's in Information Technology program is a comprehensive and well-structured educational path that serves as a launchpad for those aspiring to build careers in the expansive field of information technology.
At the core of the program is the development of technical competencies in areas such as networking, cybersecurity, data management, and software development. Alongside this, students are introduced to systems analysis, IT project management, and quality…Capella University's Bachelor's in Information Technology program is a comprehensive and well-structured educational path that serves as a launchpad for those aspiring to build careers in the expansive field of information technology.
At the core of the program is the development of technical competencies in areas such as networking, cybersecurity, data management, and software development. Alongside this, students are introduced to systems analysis, IT project management, and quality assurance, which are crucial for effectively implementing and managing technology solutions.
Furthermore, the program takes into consideration the rapidly evolving nature of the IT field and imparts not just specific technical skills but also nurtures an aptitude for continuous learning and adaptability. -
-
The U.S. Army's FA53 course, or the Information Systems Management Course, is an essential program for officers seeking to specialize in cybersecurity within the military domain. This comprehensive course encompasses a variety of crucial topics. Network Operations form the backbone of the curriculum, providing officers with insights into the design, management, and security of military networks.
Cybersecurity is another central pillar, covering information assurance, risk management…The U.S. Army's FA53 course, or the Information Systems Management Course, is an essential program for officers seeking to specialize in cybersecurity within the military domain. This comprehensive course encompasses a variety of crucial topics. Network Operations form the backbone of the curriculum, providing officers with insights into the design, management, and security of military networks.
Cybersecurity is another central pillar, covering information assurance, risk management frameworks, defense strategies, and response to cyber incidents. Information Management Policy and Technology Integration delve into the policies governing the use of information technology. Additionally, the course addresses topics such as Systems Engineering, Project Management, and IT Governance, ensuring that officers are adept at overseeing complex IT projects and implementing technology solutions in a strategic manner. -
-
The Defense Language Institute Foreign Language Center in Monterey is a premier institution where military personnel undergo rigorous language training. In the Vietnamese course, students engage in an intensive program encompassing reading, writing, listening, and speaking skills. Notably, cultural understanding is also emphasized. Through the guidance of native speakers, language labs, and practical exercises, students are prepared for various military assignments that require linguistic…
The Defense Language Institute Foreign Language Center in Monterey is a premier institution where military personnel undergo rigorous language training. In the Vietnamese course, students engage in an intensive program encompassing reading, writing, listening, and speaking skills. Notably, cultural understanding is also emphasized. Through the guidance of native speakers, language labs, and practical exercises, students are prepared for various military assignments that require linguistic skills. Graduating with honors signifies exceptional proficiency and a deep grasp of the language and cultural sensitivities, reflecting dedication and commitment to excellence in a highly challenging program. This equips graduates for roles in intelligence, diplomacy, and humanitarian missions involving Vietnamese language contexts.
Licenses & Certifications
Publications
-
Darwin the Cyber Beagle: Bytes and Barks in Cyberspace
BMC
Join Darwin, a curious Beagle, on a thrilling journey into Cyberspace in this enchanting children's book. When Darwin finds an old modem, he is transported to a vibrant digital world where he meets Bit, a friendly bot. As he explores the city of Cyberspace, Darwin learns about the vital elements of the digital world - from avatars to bugs and from firewalls to virus monsters. Facing off against the fearsome Virus Monster, Darwin uses his newfound skills and dogged determination to protect the…
Join Darwin, a curious Beagle, on a thrilling journey into Cyberspace in this enchanting children's book. When Darwin finds an old modem, he is transported to a vibrant digital world where he meets Bit, a friendly bot. As he explores the city of Cyberspace, Darwin learns about the vital elements of the digital world - from avatars to bugs and from firewalls to virus monsters. Facing off against the fearsome Virus Monster, Darwin uses his newfound skills and dogged determination to protect the city, proving that he's more than just a beagle - a brave hero of the digital realm.
Experience the world of Cyberspace like never before with Darwin, the Cyber Beagle. As he navigates through challenges, makes new friends, and faces off against fearsome foes, young readers will be captivated by his adventures. With its blend of adventure, humor, and valuable lessons about online safety, this book is a must-have for every young reader's collection.
All profits from this book will be donated to the Beagle Freedom Project; check them out and their awesome mission: bfp.org -
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
Wiley
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals.
A…A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals.
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find:
Clear, jargon-free language for both beginning and advanced readers
Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover
Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields. -
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls
Apress
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.
The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS)…This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.
The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world. -
The Cybersecurity Guide to Governance, Risk, and Compliance
Wiley
Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of…
Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management.
The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more.Other authorsSee publication -
Mastering Cybersecurity: Strategies, Technologies, and Best Practices
Apress
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies.
Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting…The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies.
Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world.
The book also dives deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application.
Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like AI and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready. -
The Comprehensive Guide to Cybersecurity Careers: A Professional’s Roadmap for the Digital Security Age
JRoss
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity professionals. This guide delves deep into the ever-changing cybersecurity landscape, providing insights into the diverse career paths within the industry. From technical roles like security analysts to strategic positions in policy development, this book covers a broad spectrum of opportunities in the field. It highlights the importance of staying ahead in the cybersecurity…
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity professionals. This guide delves deep into the ever-changing cybersecurity landscape, providing insights into the diverse career paths within the industry. From technical roles like security analysts to strategic positions in policy development, this book covers a broad spectrum of opportunities in the field. It highlights the importance of staying ahead in the cybersecurity arms race, emphasizing continuous learning and adaptation to face advanced threats. The guide also offers practical advice on essential skills, understanding industry trends, and the impact of high-profile cyber incidents.
This book is more than a mere information source; it's a dynamic tool that evolves with the field and its readers. It encourages active engagement and contribution to the cybersecurity community. With its focus on building professional networks, navigating the hiring process, and strategies for career advancement, The Comprehensive Guide to Cybersecurity Careers is an invaluable asset for anyone aiming to forge a successful and impactful career in cybersecurity. Whether starting fresh or seeking to enhance existing expertise, this guide is an indispensable companion in the journey through the complex world of digital security. -
The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices
JRoss
This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate the complex cybersecurity talent landscape. It illuminates the nuances of various cybersecurity roles, providing a deep understanding of the skills and challenges inherent in these positions. These best practices extend beyond traditional recruitment methods, advocating for innovative tactics such as leveraging educational partnerships, social media, and…
This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate the complex cybersecurity talent landscape. It illuminates the nuances of various cybersecurity roles, providing a deep understanding of the skills and challenges inherent in these positions. These best practices extend beyond traditional recruitment methods, advocating for innovative tactics such as leveraging educational partnerships, social media, and community engagement to attract top talent in a competitive market. Additionally, The Comprehensive Guide to Cybersecurity Hiring emphasizes strategies for retention, highlighting the importance of developing a diverse and inclusive workplace, fostering continuous professional development, and creating an engaging work environment.
This guide also delves into the crucial legal and ethical considerations in hiring to ensure compliance with regulations and ethical standards. For HR professionals, it serves as a vital tool to align recruitment with the specific needs of cybersecurity teams, thereby enhancing the integration of new hires. It provides insights into HR challenges for cybersecurity leaders and how to promote a collaborative approach to build a resilient cybersecurity workforce. The Comprehensive Guide to Cybersecurity Hiring is more than a book; it's a strategic asset for securing your organization's digital future by empowering you with the knowledge to attract, develop, and retain the right cybersecurity talent. -
The Pros and Cons of Paying Ransomware
US Cybersecurity Magazine
Ransomware is one of the most prolific cybersecurity threats that businesses face. A combination of a virus and a worm, combined with numerous social engineering techniques, have made it a billion-dollar industry for criminals across the planet. Ransomware is a common and fast-growing industry made even worse through modern franchising by more extensive and more successful groups. The combination of easy and widespread systems to deliver malware and anonymous payment channels provided by…
Ransomware is one of the most prolific cybersecurity threats that businesses face. A combination of a virus and a worm, combined with numerous social engineering techniques, have made it a billion-dollar industry for criminals across the planet. Ransomware is a common and fast-growing industry made even worse through modern franchising by more extensive and more successful groups. The combination of easy and widespread systems to deliver malware and anonymous payment channels provided by digital currency has made ransomware relatively low risk for criminals.
Other authorsSee publication -
Ransomware: The King of Evolution
United States Cybersecurity Magazine
The concept of ransomware is not new – not even for this century. Rather, it’s an old crime that has evolved with the advent of the computer age and the need to conduct business online. Ransom crimes (i.e. holding something of value hostage) have been around for thousands of years. But now, with the introduction of technology, they are perpetrated with much more ease and anonymity than ever before (they can literally be conducted from the basement of a criminal’s home). Ransomware has a dense…
The concept of ransomware is not new – not even for this century. Rather, it’s an old crime that has evolved with the advent of the computer age and the need to conduct business online. Ransom crimes (i.e. holding something of value hostage) have been around for thousands of years. But now, with the introduction of technology, they are perpetrated with much more ease and anonymity than ever before (they can literally be conducted from the basement of a criminal’s home). Ransomware has a dense history and evolution. Therefore, it is important for businesses to understand how they can protect themselves from such attacks.
Other authorsSee publication -
Orange is Not the New Black Hat
US Cybersecurity Magazine
As a cyber professional, the perks that come with working for a large company are many – new equipment, latest technology, big salary, and free soda, to name a few. However, one perk a company cannot offer, regardless of size, is a get out of jail free card for violations of the law. Just take a look at some of the statistics from 2016 – almost half of the companies that were convicted of a felony offense had an employee who was convicted of the same felony.
Other authorsSee publication -
Keynote Speaker & Workshop Speaker
NG Financial Services Technology Summit (Denver, Colorado)
On the 13-15 May 2019 at the wonderful Omni Interlocken in Colorado, our North American NG Financial Services Technology Summit will bring together a host of senior financial services decision-makers and business leaders to discuss the most pressing challenges – and opportunities – in the fast-moving financial services sector.
The summit looks at a number of key themes, including innovation; banking breakthrough; payments made here, there, everywhere and dominating data; and reaching for…On the 13-15 May 2019 at the wonderful Omni Interlocken in Colorado, our North American NG Financial Services Technology Summit will bring together a host of senior financial services decision-makers and business leaders to discuss the most pressing challenges – and opportunities – in the fast-moving financial services sector.
The summit looks at a number of key themes, including innovation; banking breakthrough; payments made here, there, everywhere and dominating data; and reaching for the cloud: IT, compliance and fraud protection.
From case studies lifting the lid on operations inside best-in-class organizations, to workshops and collaborative sessions that focused on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to attendees’ specific needs, our summits provide executives with everything they needed to implement their key projects more effectively. -
Speaker - Board Reporting for Strategic CISOs
SecureWorld Dallas 2019
SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Presented on briefing the board of directors on cyber.
Other authorsSee publication -
Speaker - Legal Compliance with IAM
Know 2019, Las Vegas
Spoke on legal and compliance requirements for IAM and the Cybersecurity controls that should be implemented.
Other authorsSee publication -
US Cybersecurity Magazine - Fall 2018
US Cybersecurity Magazine
While U.S. regulators typically issue cybersecurity guidance instead of strict cybersecurity regulations, the New York Department of Financial Services (NYDFS) broke the mold by issuing the most comprehensive and prescriptive state cybersecurity regulation (23 NYCRR 500) the United States (arguably the world) has ever seen. NY’s regulation, unlike previous federal and state cybersecurity guidance, sets out specific practices and policies, notably, deployment of encryption and multi-factor…
While U.S. regulators typically issue cybersecurity guidance instead of strict cybersecurity regulations, the New York Department of Financial Services (NYDFS) broke the mold by issuing the most comprehensive and prescriptive state cybersecurity regulation (23 NYCRR 500) the United States (arguably the world) has ever seen. NY’s regulation, unlike previous federal and state cybersecurity guidance, sets out specific practices and policies, notably, deployment of encryption and multi-factor authentication, designation of a Chief Information Security Officer (CISO) and the monitoring of insider threats.
Other authorsSee publication -
Speaker - CFAA and Legal Compliance
Bsides DFW 2018
Presented with Griffin Weaver on the legal and technical aspects of understanding the CFAA and avoiding missteps that could lead to prosecution.
Other authorsSee publication -
Speaker - Cyber Panel on Regulatory Compliance
CyberHub Atlanta 2018
Join 200's C-Suite executives for a day of practical and operational information sharing. The incident response TableTop Exercise led by global experts will simulate how to handle a cyber incident when it happens in your organization. Each participant will be leaving with a cyber incident playbook.
-
Speaker - Cybersecurity Legal and Regulatory Compliance
Texas Cyber Summit 2018
Legal and Regulatory Cyber Compliance Presenting legal and compliance topics relevant for today’s cybersecurity professionals. This presentation will include discussions of current laws including NYDFS 500, NAIC Model Laws, GLBA and various topics from the FFIEC among others.
Additional topics will include meeting regulatory requirements for risk assessments and a presentation of the various cybersecurity testing models for financial institutions such as the FFIEC CAT. Recent successful…Legal and Regulatory Cyber Compliance Presenting legal and compliance topics relevant for today’s cybersecurity professionals. This presentation will include discussions of current laws including NYDFS 500, NAIC Model Laws, GLBA and various topics from the FFIEC among others.
Additional topics will include meeting regulatory requirements for risk assessments and a presentation of the various cybersecurity testing models for financial institutions such as the FFIEC CAT. Recent successful cyber-attacks have led the various federal and state legislative bodies to start increasing their regulation over the cybersecurity industry by including new requirements in new laws and regulations that cyber professionals should be aware of. The presenters will also discuss the best use of cyber security legal compliance in raising cyber awareness of executives who may not normally face heightened cyber compliance requirements. Finally, the presentation will be followed by a Q&A Session with the speakers who are experienced in regulatory cyber law and compliance.
Other authorsSee publication -
Army Green Book
AUSA
Guest Photographer, Army OCS
-
Army Monopoly Game
2000
Guest Photographer, Army OCS piece.
Projects
-
Course Development - Masters in Cybersecurity
I was the lead designer for the program. In total, I have developed more than a dozen courses at the Masters and several more at the Bachelors level.
-
NYU CISO Course - Subject Matter Expert | Developer
-
The CISO Program is an immersive 9-month course designed to arm participants with the essential skills for steering information security strategies. Through a blend of live sessions, video lectures, and weekly assignments, it delves into three core modules: CISO Leadership, Information Security & Cyber Risk Management, and New & Emerging Technologies. Participants learn about crafting security strategies, communicating risks, building IT security teams, and managing partnerships. The course…
The CISO Program is an immersive 9-month course designed to arm participants with the essential skills for steering information security strategies. Through a blend of live sessions, video lectures, and weekly assignments, it delves into three core modules: CISO Leadership, Information Security & Cyber Risk Management, and New & Emerging Technologies. Participants learn about crafting security strategies, communicating risks, building IT security teams, and managing partnerships. The course also covers IT risk fundamentals, frameworks, cyber regulations, data privacy, and cloud security. Industry practitioners offer guest lectures, and the CISO Circle provides networking and mentoring with an expert advisory board. Participants receive personalized guidance from a success coach to align learning with career goals. Perfect for aspiring CISOs seeking comprehensive and practical knowledge.
Honors & Awards
-
Bronze Star Medal
MG Robert Caslen
To all who shall see these presents, greeting: this is to certify that the President of the United States of America, authorized by executive order, 24 August 1962 has awarded the Bronze Star Medal to Captain Jason Edwards.
For:
Exceptionally meritorious service while conducting combat operations during Operation Iraqi Freedom. Captain Edwards’ actions contributed immeasurably to the success of building a free and democratic nation for the citizens of Iraq and to the efforts to win…To all who shall see these presents, greeting: this is to certify that the President of the United States of America, authorized by executive order, 24 August 1962 has awarded the Bronze Star Medal to Captain Jason Edwards.
For:
Exceptionally meritorious service while conducting combat operations during Operation Iraqi Freedom. Captain Edwards’ actions contributed immeasurably to the success of building a free and democratic nation for the citizens of Iraq and to the efforts to win the global war on terrorism. Captain Edwards’ professionalism and commitment to excellence reflect great credit upon him, 2nd Heavy Brigade Combat Team (2nd Brigade, 1st Cavalry Division), 25th Infantry Division, Multinational Division-North, and the United States Army.
From 6 January 2009 to 10 January 2010
Given under my hand in the city of Washington this 5th day of September 2009, Secretary of the Army & Robert l. Caslen, jr., Major General, US Army, Commander, Task Force Lightning
-
Defense Meritorius Service Medal
MG. Zannie O. Smith
The Defense Meritorious Service Medal (DMSM) is an award bestowed upon members of the United States military by the United States Department of Defense. In the order of precedence of the United States Armed Forces, it is worn between the Purple Heart and the Meritorious Service Medal. The medal is awarded in the name of the Secretary of Defense to members of the Armed Forces who, while serving in a joint activity, distinguish themselves by non-combat outstanding achievement or meritorious…
The Defense Meritorious Service Medal (DMSM) is an award bestowed upon members of the United States military by the United States Department of Defense. In the order of precedence of the United States Armed Forces, it is worn between the Purple Heart and the Meritorious Service Medal. The medal is awarded in the name of the Secretary of Defense to members of the Armed Forces who, while serving in a joint activity, distinguish themselves by non-combat outstanding achievement or meritorious service
Languages
-
English
Native or bilingual proficiency
-
Vietnamese
Limited working proficiency
Organizations
-
Institute of Internal Auditors (IIA)
-
- PresentEstablished in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Lake Mary, Florida, USA. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
-
Information Systems Security Association (ISSA)
-
- PresentISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth…
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
-
ISACA
Member
- PresentWith more than 95,000 constituents in more than 160 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance. Founded in 1969, ISACA® sponsors international conferences, publishes the ISACA® Journal, and develops international information systems auditing and control standards.
-
Army Signal Corps Regimental Association
Life Member
- PresentThe Signal Corps Regimental Association, or SCRA, is a private, nonprofit organization that provides an opportunity for all active, reserve, and national guard, officers, warrant officers, enlisted members and civilians, as well as any former members of the Signal Corps to aid in preserving for posterity the proud heritage of the U.S. Army Signal Corps Regiment, and Signal units throughout the world. Through direct financial support, the association will work to enhance the Regiment’s ability…
The Signal Corps Regimental Association, or SCRA, is a private, nonprofit organization that provides an opportunity for all active, reserve, and national guard, officers, warrant officers, enlisted members and civilians, as well as any former members of the Signal Corps to aid in preserving for posterity the proud heritage of the U.S. Army Signal Corps Regiment, and Signal units throughout the world. Through direct financial support, the association will work to enhance the Regiment’s ability to recruit officers and warrant officers, recognize our Regiment’s NCO leaders during their NCOES, and contribute to events that encourage the community of our Regiment. The Association will also work to ensure the lessons of history and proud traditions of the Signal Regiment are not forgotten.
-
ISC2
CISSP
- Present(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 138,000 certified members strong, we empower professionals who touch every aspect of information security.
-
Association of the United States Army
Life Member
- PresentThe Association of the United States Army is a nonprofit educational and professional development association serving America’s Total Army, our Soldiers, Army civilians, and their families; our industry partners, and supporters of a strong national defense. AUSA provides a voice for the Army, supports the Soldier, and honors those who have served in order to advance the security of the nation.
-
Veterans of Foreign Wars
Life Member
- PresentThe Veterans of Foreign Wars of the United States is a nonprofit veterans service organization comprised of eligible veterans and military service members from the active, guard and reserve forces. We trace our roots back to 1899 when veterans of the Spanish-American War (1898) and the Philippine Insurrection (1899-1902) founded local organizations to secure rights and benefits for their service. Many arrived home wounded or sick. There was no medical care or veterans' pension for them, and…
The Veterans of Foreign Wars of the United States is a nonprofit veterans service organization comprised of eligible veterans and military service members from the active, guard and reserve forces. We trace our roots back to 1899 when veterans of the Spanish-American War (1898) and the Philippine Insurrection (1899-1902) founded local organizations to secure rights and benefits for their service. Many arrived home wounded or sick. There was no medical care or veterans' pension for them, and they were left to care for themselves. In their misery, some of these veterans banded together and formed organizations that would eventually band together and become known as the Veterans of Foreign Wars of the United States. After chapters were formed in Ohio, Colorado and Pennsylvania, the movement quickly gained momentum. Today, membership stands at nearly 1.7 million members of the VFW and its Auxiliary.
Recommendations received
28 people have recommended Dr. Jason
Join now to viewMore activity by Dr. Jason
-
December 17th, 2024, marks the 121st anniversary of the Wright brothers' first powered flight, which forever changed the world. On this day in 1903,…
December 17th, 2024, marks the 121st anniversary of the Wright brothers' first powered flight, which forever changed the world. On this day in 1903,…
Shared by Dr. Jason Edwards, DM, CISSP, CRISC
-
⚔️ As we wrap up the CIS 18 Controls, the final two are CIS Control 17: Incident Response Management and CIS Control 18: Penetration Testing. These…
⚔️ As we wrap up the CIS 18 Controls, the final two are CIS Control 17: Incident Response Management and CIS Control 18: Penetration Testing. These…
Shared by Dr. Jason Edwards, DM, CISSP, CRISC
-
Darwin the Cyber Beagle’s digital journey is now available as an audiobook! Kids can listen in as Darwin sniffs out cyber clues, battles the…
Darwin the Cyber Beagle’s digital journey is now available as an audiobook! Kids can listen in as Darwin sniffs out cyber clues, battles the…
Shared by Dr. Jason Edwards, DM, CISSP, CRISC
-
On December 16th, 2024, we commemorate the 80th anniversary of the Battle of the Bulge, one of the most significant and largest battles the United…
On December 16th, 2024, we commemorate the 80th anniversary of the Battle of the Bulge, one of the most significant and largest battles the United…
Shared by Dr. Jason Edwards, DM, CISSP, CRISC
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More