Cybersecurity Guide

  • Bootcamps
  • Degrees
    • Associate in Cybersecurity
    • Bachelor’s in Cybersecurity
    • Master’s in Cybersecurity
    • Graduate Certificate
    • Cybersecurity Analytics Degree
    • Computer science with cybersecurity emphasis
    • MBA in cybersecurity
    • phd in cybersecurity
    • Cybersecurity law degree
  • Online
    • Online Certificate in Cybersecurity
    • online bachelor’s in cybersecurity
    • online IT degree
    • online master’s in cybersecurity
    • Online master’s in information security
    • online phd in cybersecurity
  • CERTIFICATIONS
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Certified Information Security Systems Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Digital Forensics Certifications
    • Security+
    • CompTIA Advanced Security Practitioner (CASP+)
    • Certified Network Defender (CND)
    • OSCP
    • CRISC
    • Pen Testing
    • CTIA
    • Cryptography
    • Malware Analyst
  • CAREER GUIDES
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
  • States
    • Alabama
    • Alaska
    • Arizona
    • Arkansas
    • California
    • Colorado
    • Connecticut
    • Delaware
    • Florida
    • Georgia
    • Hawaii
    • Idaho
    • Illinois
    • Indiana
    • Iowa
    • Kansas
    • Kentucky
    • Louisiana
    • Maine
    • Maryland
    • Massachusetts
    • Michigan
    • Minnesota
    • Mississippi
    • Missouri
    • Montana
    • Nebraska
    • Nevada
    • New Hampshire
    • New Jersey
    • New Mexico
    • New York
    • North Carolina
    • North Dakota
    • Ohio
    • Oklahoma
    • Oregon
    • Pennsylvania
    • Rhode Island
    • South Carolina
    • South Dakota
    • Tennessee
    • Texas
    • Utah
    • Vermont
    • Virginia
    • Washington
    • Washington, DC
    • Wisconsin
    • West Virginia
    • Wyoming
  • Podcast
  • Resource Center
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • Cybersecurity for K-12 students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
    • DEI in Cyber
    • NIST and Small Business
  • Research
    • AI and Cybersecurity
    • Holiday Hacks
    • Jobs Report
  • Industries
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Ag Sector

Podcast episodes and expert interviews

Last updated: May 13, 2025

The cybersecurity industry is changing and evolving so fast. And good information is key to staying on top of the latest trends.

This section is dedicated to posting interviews with some of the leading cybersecurity researchers, professors, and industry insiders.

Cybersecurity Guide Podcast

Episode 60

An Interview with Eric Magidson | Central Oregon Community College

Episode 59

An Interview with Bryan Deehring | Anne Arundel Community College

Episode 58

An Interview with Kemal Akkaya | Florida International University

Episode 57

An Interview with Matthew Heath Van Horn | Embry-Riddle

Episode 56

An Interview with Kyle Kuhlers | Hawkeye Community College & Waterloo Career Center

Episode 55

An Interview with Ben Crenshaw | Work ED

Episode 54

An Interview with George Bailey | Purdue University

Episode 53

An Interview with Tabitha Senty | District 196

Episode 52

An Interview with Tasha Cornish | Cybersecurity Association

Episode 51

An interview with Richard Forno | University of Maryland, Baltimore County

Episode 50

An interview with Richard Brooks | Clemson University

Episode 49

An interview with Ricardo Calix | Purdue University Northwest

Episode 48

An interview with Dan Shoemaker | University of Detroit Mercy

Episode 47

An interview with Rebecca Passmore | Kroll & University of Arkansas at Little Rock

Episode 46

An interview with Prasad Calyam | University of Missouri

Episode 45

An interview with Eric Toler | Georgia Cyber Center

Episode 44

An interview with Sachin Shetty | Old Dominion University

Episode 43

An interview with Lee Myers | Center for Internet Security

Episode 42

An interview with Larry Clinton | Internet Security Alliance

Episode 41

An interview with Karla Carter | Bellevue University

Episode 40

An interview with Sarah Powazek | UC Berkeley

Episode 39

An interview with Ahmet Aksoy | University of Central Missouri

Episode 38

An interview with Faisal Kaleem | Metro University

Episode 37

An interview with Batyr Charyyev | University of Nevada Reno

Episode 36

An interview with Scott Shackelford | Indiana University

Episode 35

An interview with Vianey Luna | Cybersecurity bootcamps

Episode 34

An interview with Kathleen Hyde | Champlain College

Episode 33

An interview with Mark Heckman | University of San Diego

Episode 32

An interview with George Trawick | Mississippi State University

Episode 31

An interview with Marlon Buchanan | HomeTechHacker.com

Episode 30

An interview with Kevin Nolten | Cyber Innovation Center

Episode 29

An interview with Jeremy Straub

Episode 28

An interview with C. Jordan Howell

Episode 27

An interview with Dr. Shouhua Xu

Episode 26

An interview with John Petrozzelli

Episode 25

An interview with Chuck Gardner

Episode 24

An interview with Dr. Stephen Kirkman

Episode 23

An interview with Dr. Igor Khokhlov

Episode 22

An interview with Deep Ramanayke

Episode 21

An interview with Abdulbast Abushgra

Episode 20

An interview with Dr. Erald Troja

Episode 19

An interview with Seth Hamman

Episode 18

An interview with Karen Scarfone


Check out the related guide, talked about in this interview: Latest attack surface: Small business and cybersecurity.

Episode 17

An interview with Munther Abualkibash

Episode 16

An interview with Dr. Sajal Das

Episode 15

An interview with Michael Ruth

Episode 14

An interview with Dr. Thaier Hayajneh

Episode 13

An interview with Paul Warner

Episode 12

An interview with Dr. Doug Jacobson

Episode 11

An interview with Dr. Stephen Torri

Episode 10

An interview with Alex Bardas

Episode 9

An interview with Neil Rowe

Episode 8

An interview with Christopher Mitchiner

Episode 7

An interview with Dr. Terence Soule

Episode 6

An interview with Dr. Alan Stines

Episode 5

An interview with Dr. Cliff Zou

Episode 4

An interview with Dr. Tony Coulson

Episode 3

An interview with Luis Rivera

Episode 2

An interview with Dr. Garrett Whelan

Episode 1

An interview with Indrakshi Ray

Expert interviews

Barbara Endicott-Popovsky is the executive director of the Center for Information Assurance and Cybersecurity at the University of Washington. She has taught and mentored cybersecurity students in a variety of courses and formats and frequently consults with government organizations about the future of cybersecurity education. Linkedin profile

John V Franco is a professor at the College of Engineering and Applied Science at the University of Cinncinatti. He is also the director of the National Center of Academic Excellence in Cyber Operations at the University of Cincinnati.The Center is a collaborative effort between the university and local major defense contractors in order to advance training in cyber operations and cybersecurity. Linkedin profile

Glen Olson is a faculty member at Estrella Mountain Community College, which has been recognized as a National Center for Academic Excellence in Cybersecurity by the National Security Agency and the Department of Homeland Security. Linkedin profile

Raymond Albert is a Professor of Practice in Cybersecurity and the Director of Assumption College’s (soon to be Assumption University) Cybersecurity Program. LinkedIn profile.

Eugene Vasserman is an associate professor in the computer science department at Kansas State University. He also directs the university’s Center for Information and Systems Assurance. He has a wide-range of security-related research interests, but has most recently focused on medical cyber-physical systems. LinkedIn profile

Ken Dewey retired from the Air Force before entering academia. He is currently the director of the cybersecurity program at Rose State College. Dewey is also a faculty member in the computer information technology department and the principal investigator for a cybersecurity grant from the National Science Foundation. LinkedIn profile.

Tyler Flaagan is an instructor of computer and security sciences at Dakota State University. The university is recognized as a National Center for Academic Excellence in Information Assurance Education, Information Assurance Research, Cyber Operations, and most recently as a Cyber Defense Regional Resource Center. Faculty profile.

Matt Bishop is a computer science professor at UC Davis. He is also a co-director of the university’s Computer Security Laboratory and a faculty advisor to the UC Davis Cyber Security Club. Bishop wrote a textbook, now in its second edition called Computer Security: Art and Science. LinkedIn profile.

Sanjiv Bhatia is a professor and graduate director in the department of computer science at the University of Missouri, Saint Louis. One of his main research areas is in computer vision and he teaches courses on computer security. LinkedIn profile.

Hossein Sarrafzadeh is a professor of cybersecurity at St. Bonaventure University. He is also the chair of the university’s cybersecurity department and the director of the Western New York Cybersecurity Center. LinkedIn profile

Tamara Shoemaker is the director of the University Detroit Mercy’s Center for Cyber Security and Intel Studies. She is also the founder of the MCISSE CyberPatriot program. LinkedIn profile

Leslie Corbo is an assistant professor of cybersecurity and the associate director of the cybersecurity programs at Utica College. Her research areas include data privacy, cyber risk management, and malicious emails. LinkedIn profile

Stanley Mierzwa is the managing assistant director for Kean University’s Center for Cybersecurity. He also teaches courses on the foundations of cybersecurity and cyber risk management. LinkedIn profile

Nate Evans currently cybersecurity program lead at Argonne National Laboratory. Evans received his doctorate in computer engineering with a specialty in cybersecurity from Iowa State University.

Bill Mahoney is a professor of cybersecurity at the University of Nebraska Omaha. He has received numerous awards for his teaching, most recently the University of Nebraska’s Outstanding Teaching and Instructional Creativity Award. Faculty profile

Greg Gogolin is a professor of information security and intelligence at Ferris State University. Gogolin created Ferris State’s undergraduate and graduate information programs. His research interests include digital forensics, cybersecurity, and business intelligence. LinkedIn profile

Tobi West is the Department Chair of Computer Information Systems at Coastline College and teaches cybersecurity and computer networking courses. West focuses on the development of education pathways for students to achieve their goals to become cybersecurity professionals. She enjoys organizing CyberTech Girls events and GenCyber Girls camp activities for middle school and high school girls to develop their interest in cybersecurity and technology.  LinkedIn profile

George Markowsky is a professor of computer science at Missouri University of Science and Technology. LinkedIn profile

Drew Hamilton is a professor of cybersecurity and the director of the Center for Cyber Innovation at Mississippi State. LinkedIn profile

Ryan Sporrer is an instructor at Western Iowa Tech. He teaches Cyber Security & Digital Crime at the Sioux City Campus. Program profile

Tamara Schwartz is an Assistant Professor of Business Administration and Cybersecurity, a retired Air Force Officer, and an independent consultant. She is a recognized innovator with over 20 years of National Security experience. She received her BS in Industrial Engineering from Rensselaer Polytechnic Institute, her MS in Engineering Management from the University of Dayton, and her Doctorate of Business Administration from the Fox School of Business, Temple University. Her research specialty is advanced cyber strategy. Faculty profile

Wade Baker is a Collegiate Associate Professor of Integrated Security at Virginia Tech and part of the Business Information Technology faculty in the Pamplin College of Business. He teaches courses for the MBA and Master of IT programs and collaborates with internal and external parties to further the university’s growing list of cybersecurity initiatives. His research interests fall at the intersection of cybersecurity, risk management, business strategy, and data analysis. He received his Ph.D. from Virginia Tech in 2017, where his doctoral work focused on cybersecurity risk in supply chains. Faculty profile

Joe Scherrer is the Executive Director of Professional Education at the Washington University in St. Louis (WUSTL) McKelvey School of Engineering. He also serves as director of the school’s cybersecurity strategic initiative. Scherrer graduated from Washington University in 1989 with a bachelor of science in electrical engineering. Following a distinguished 24-year career as a leader and information technology and cybersecurity innovator with the US Air Force, culminating as the commander of the Air Force’s only combat-coded deployable communications wing, he retired as a colonel and returned to his hometown of St. Louis. In addition to his university duties, he is pursuing a doctor of liberal arts from University College, is an avid master’s bicycle racer, and is a certified executive leadership coach. LinkedIn profile

James Banfield is an associate professor at Eastern Michigan University. He has earned a Ph.D. in Information Assurance, an M.S. in Information Assurance, and a B.S. in Network Information Technology Administration, all from Eastern Michigan University. He teaches in the B.S. Information Assurance and Cyber Defense program. This program emphasizes the design, integration, administration, hardening, and protection of all types of computer information systems and network infrastructures in modern cyber environments. Faculty page

Ulku Clark is a professor of information systems and the Director of the Center for Cyber Defense Education at University of North Carolina Wilmington. Her research interests span information communications technologies, telecom policy, information security, IT productivity, healthcare IT, quality management and innovative education. She holds an MS in information technology and management and a Ph.D. in management science with management information systems concentration from The University of Texas at Dallas. Her publications appeared in various academic journals, such as JMIS, IEEE TEM, and IMDS. Faculty bio

Yan Solihin is the Director of the Cybersecurity and Privacy Cluster, and Charles N. Millican Chair Professor of Computer Science at the University of Central Florida. He obtained a BS in computer science from Institut Teknologi Bandung in 1995, a BS in Mathematics from Universitas Terbuka in 1995, M.A.Sc in computer engineering from Nanyang Technological University in 1997, and a Ph.D. in computer science from the University of Illinois at Urbana-Champaign (UIUC) in 2002. He is a recipient of the 2010 and 2005 IBM Faculty Partnership Award, 2004 NSF Faculty Early Career Award, and 1997 AT&T Leadership Award. He is well known for pioneering cache sharing fairness and Quality of Service (QoS), efficient counter mode memory encryption, and Bonsai Merkle Tree, which have significantly influenced Intel Cache Allocation Technology and Secure Guard eXtension (SGX)’s Memory Encryption Engine (MEE). In recognition, he received IEEE Fellow “for contributions to shared cache hierarchies and secure processors” in 2017. He is listed in the HPCA Hall of Fame and ISCA Hall of Fame. Faculty bio

Richard Harknett is a Professor of Political Science and Head of the Department, Co-Director of the Ohio Cyber Range Institute, and Chair of the Center for Cyber Strategy and Policy at the University of Cincinnati. He holds an affiliate faculty position with the School of Information Technology at U.C. and a professorial lectureship at the Diplomatic Academy Vienna, Austria, where he served as Fulbright Professor in 2001. In 2017, he served as an inaugural Fulbright Professor in cyber studies at Oxford University, U.K., and in 2016 as the first Scholar-in-Residence at United States Cyber Command and NSA. His publications and research interests focus on international relations theory and international security studies with a particular focus on cyber strategy. He also regularly advises at the U.S. government and state of Ohio levels. Full faculty bio

Prasad Calyam is an associate professor in the Department of Electrical Engineering and Computer Science at the University of Missouri-Columbia. He is the Director of the Cyber Education, Research and Infrastructure Center (Mizzou CERI) and Robert H. Buescher Faculty Fellow in the MU College of Engineering. He is also a core faculty in the University of Missouri Informatics and Data Science Institute (MUII). His research and development areas of interest include: Distributed and Cloud Computing, Cyber Security, Computer Networking, Networked-Multimedia Applications, and Advanced Cyberinfrastructure. He enjoys working with students in the Virtualization, Multimedia, and Networking (VIMAN) Lab. Calyam obtained his MS and Ph.D. degrees from Ohio State University and BE from Bangalore University. Before coming to MU in 2013, he was a Research Director at Ohio Supercomputer Center/OARnet, The Ohio State University. Faculty profile

Matthew A. Chapman is a computer science and cybersecurity professor at the University of Hawaiʻi –West Oʻahu and an experienced computer scientist serving for over twenty-four years as an officer in the U.S. Army in a variety of positions both nationally and internationally. He served combat and operational deployments in Europe, the Middle East, and Asia. Key positions held include the Chief of Cyberspace Operations for U.S. Indo-Pacific Command. He is directly responsible for excellence in teaching and the leadership and management of the Bachelor of Science in Cybersecurity and Bachelor of Applied Science degree programs. Concentrations include Cyber Operations and Information Security and Assurance (ISA). Dr. Chapman is also the Director of the UH West Oahu Cyber Security Coordination Center (UHWO CSCC) focusing on cyber workforce development. Full bio

Ralph Russo is the Tulane University School of Professional Advancement Information Technology Program Director. He is focused on keeping learning delivery and the Applied Computing curriculum on pace with cutting-edge technology, security, and industry advancement. Russo also holds the title of Professor of Practice. He created and delivered the first graduate and undergraduate cybersecurity courses at Tulane in 2011 and has taught in both the Homeland Security and Information Technology programs. Russo is a nationally recognized subject matter expert on technology in the homeland security and public safety domains. He has served in director-level leadership positions for technology/systems integration companies for over 15 years. He has also consulted for multiple federal, state, and local jurisdictions to successfully guide the development, deployment, and adoption of IT systems for security and public safety.  Faculty profile

Provost David Bolman has dedicated his career to educating technologists who will shape and better our community through the innovations they help create. As someone who cares greatly about learning, his work at The University of Advancing Technology (UAT) has had a theme of providing students with exceptional moments and growth through the skills that their professors possess as they create learning spaces. As a technologist, he has worked to create a university where the culture of innovation is celebrated. Students learn the tools, techniques, concepts, and responsibilities of applying technology in ways that lift human society. Faculty profile

Clifford Neuman is the Director of USC Center for Computer Systems Security, Associate Professor of Computer Science Practice in the USC Viterbi School of Engineering, and a Scientist at USC’s Information Sciences Institute. He received an SB degree in Computer Science and Engineering from the Massachusetts Institute of Technology in June 1985. Upon completion, he spent a year working for MIT’s Project Athena, where he was a principal designer of the Kerberos authentication system. Neuman began graduate studies in the Computer Science Department of the University of Washington in the fall of 1986, received an MS degree in 1988, and a Ph.D. in June of 1992. Faculty profile

Primary Sidebar

  • Online Programs
    • Master’s
    • Bachelor’s
    • Bootcamps & Certificates
Sponsored Ad
cybersecurityguide.org is an advertising-supported site. Clicking in this box will show you programs related to your search from schools that compensate us. This compensation does not influence our school rankings, resource guides, or other information published on this site.
  • CERTIFICATIONS
    • Azure
    • CASP+
    • CCNA
    • CEH
    • CISA
    • CISM
    • CISSP
    • CRISC
    • Cryptography
    • CTIA
    • CND
    • Forensics
    • Malware Analyst
    • OSCP
    • Pen Testing
    • Security+
  • CAREERS
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
    • Network Administrator
    • Business InfoSec Officer
    • Information Security Manager
    • Cyber Operations Specialist
  • RESOURCE CENTER
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • Cybersecurity for K-12 Students
    • Career Networking Guide
    • What is a Cyber Range?
    • Code Like a Hacker
    • Reacting to a Cyber Incident
    • Introduction to Cyber Defense
    • Cybersecurity Courses Online
    • Recommended Reading
    • Phishing Attacks
    • Cybersecurity Responsibility
    • How to Get Into Cybersecurity
    • Cyberwarfare
    • Cybersecurity Insurance
    • Job Interview Prep
    • Readiness Economy
    • Is Cyber a Good Career?
    • What is CyberCorps?
    • DEI in Cyber
    • NIST and Small Business
  • RESEARCH
    • AI and Cybersecurity
    • Holiday Hacks
    • Jobs Report
  • INDUSTRIES
    • Financial Sector
    • Insurance Sector
    • Healthcare Sector
    • Environmental Sector
    • Energy Sector
    • Government Sector
    • Transportation Sector
    • Food and Agriculture Sector
Cybersecurity Guide
  • Home
  • Campus Programs
  • About Us
  • Popular Careers
  • Online Programs
  • Terms of Use
  • Resources
  • Programs By State
  • Privacy Policy

Copyright © 2025 · Cybersecurity Guide · All Rights Reserved