|  Publications (Books)  2014 Hayes, D, A Practical Guide to Computer Forensics Investigations, Pearson IT Certification. 2013 Hayes, D.,et al, Skills for Success with Mac Office 2011, Prentice Hall.
		  2010 Hayes, D., & Townsend, K, Skills for Success with Access 2010 Comprehensive, Upper Saddle River: Prentice Hall.
    	  2008 Hayes, D. R. The efficacy of project retrospectives on organizational process improvement initiatives in software development. New York, NY: ETD Collection for Pace University.
	 	  Publications (Peer-Reviewed Articles) 
		2011 Hayes, D.R., et al., The Impact of Project Retrospectives on Process Improvement Initiatives: A Case Study, LISAT. Farmingdale: IEEE.
		2010 Hayes, D. R., Qureshi, S., & Reddy, V. The Impact of Microsoft's Windows 7 on Computer Forensics Examinations. LISAT. Farmingdale: IEEE.
		2009 Hayes, D. R. & Qureshi, S. Implications of Microsoft Vista Operating System for Computer Forensics Investigations. LISAT. Farmingdale: IEEE. 
		2009 Coppola, J., Thomas, B., Marta, J., Hayes, D., Forman, L., & Robinson, J. Cognitive Assessment: An Analysis of Elderly Cognition in an Intergenerational Computing Program. The Michael L. Gargano 7th Annual Research Day . White Plains: Pace University.
	    2008 Hayes, D.& Qureshi, S. Microsoft Vista: Serious Challenges for Digital Investigations. Pace Student and Faculty Research Day. White Plains: Pace University.
	    2008 Hayes, D. R., & Qureshi, S.A Framework for Computer Forensics Investigations Involving Microsoft Vista. LISAT. Farmingdale: IEEE. 
     	 2008 Coppola, J., Feather-Gannon, S., Hayes, D., Kline, R., & Mosley, P. Civic Engagement through Computing Technology. In First-Year Civic Engagement: Sound Foundations for College, Citizenship and Democracy.  New York: New York Times. 
		2006 Hayes, D. R. Strategic Initiatives for E-Branding. IADIS International Conference e-Society (pp. 183-186). Dublin: IADIS. 
     	2006 Hayes, D. R., Hill, J., Mannette-Wright, A., & Wong,H.Team Project Patterns for College Students. PLoP '06. Portland: ACM.
     	 Publications (Research Report) 
	    2014 ACCA, Skimming the Surface: How Skimmer Fraud Had Become A Global Epidemic. Publications (Media Articles) 
	 2014 Recorded Future, How Pace University is Building the Next Generation of Cyber Security Analysts2014 American Banker, Small Banks Should Team Up to Fight Cyberattacks2014 The Hill, Why America may be the future bastion of virtual currencies2013 American Banker, Compromise Needed on U.S. EMV Adoption Plan2013 The Hill, Op-Ed: Apple’s missed opportunities for alliances with government and academia2013 The Hill, Op-Ed: US warns of rising threat of cyber attacks to national and economic security2013 The Hill, Op-Ed: First lesson of Superstorm Sandy: Improve communication2013 The Hill, Op-Ed: New standards needed to protect patients from computer viruses in medical devices2012 The Hill, Op-Ed: Investigative report on ZTE, Huawei is unprecedented in its accusations2012 The Hill, Op-Ed: Congress must pass effective privacy legislation to protect our children2012 The Hill, Op-Ed: Seeking answers on Facebook IPO calamity2012 Computer Graphics World, Facebook IPO, cgw.com2012 The Hill, Op-Ed: US must protect privacy better.2012 Corporate Compliance Insights, Proposed EU Privacy Legislation Likely To Seriously Impact U.S. Companies,     corporatecomplianceinsights.com2011 Corporate Compliance Insights, The Impact On Corporate Compliance of India’s New Data Privacy Rules,corporatecomplianceinsights.com2011 Westchester County Business Journal, War in the mobile device industry.2011 Nieman Watchdog, 8 questions about online privacy, niemanwatchdog.org2011 Corporate Compliance Insights, Protecting Data and Risk Management: Lessons Learned from WikiLeaks and ‘Anonymous’,corporatecomplianceinsights.com News Media (Television & Radio)  
	    2015	Al Jazeera, Silk Road trial raises privacy questions2014	Fox 26 KNPN, 'High-tech pickpockets' raise concerns2014	NTD (New Tang Dynasty Television), ICANN 2013 The Street,  Android Gains Ground on iPhone.   2013 WWL AM870,  Computer Hackers.   2013 Fox Business,  A Growing Threat- A Growing Career.   2012 Bloomberg TV,  Smartphone Espionage: How Big Is The Threat?   2011 Forensic News Radio, Bin Laden cache shines a light on forensics, Federal Drive. 2011 Fox News, GPS Dangers and Shrinking Brains. 2011 WCHE 1520AM, IBM’s Watson on Jeopardy, Raffaele Report  News Media (Newspapers & Magazines)  
		 2015	The Wall Street Journal, Morgan Stanley Fires Employee Over Client-Data Leak2015	Irish Independent, North Korea 'not responsible for leak of Sony movies', independent.ie2014	SC Magazine, U.S. spy program targeting Americans' mobile phones, report says2014	SC Magazine, Safe tether: Wearables2014	New York Post, US fast cash for European crooks2014	Investor’s Business Daily, Google In EU Must Remove Personal Links On Request2014	Epoch Times, ICANN Holds Public Comment Period as it Transitions to ‘Multi Stakeholder’ Oversight2014	Washington Post, Heartbleed could harm a variety of systems2014	University Business, Keeping cyber attacks at bay2014	Newsweek, Why Ukraine Hasn’t Sparked a Big Cyberwar, So Far 2013 Daily News (NY),  A-Wrist-OCRAT: Samsung hope $299 'smartwatch' is face of future.   2013 USA Today,  Microsoft-Nokia reboot eyes mobile wave.   2013 SC Magazine,  Indian computer authorities to investigate what led to $45 million ATM heist.   2013 The Washington Post,  Speedy gang stole $45M worldwide through ATMs after hacking.   2013 The Guardian (UK),  Apple stock wits onworries about iPhone demand   2013 The Guardian (UK),  Apple sees profits fall for the first time in a decade but cash pile rises to $145bn   2013 New York Post,  Masters focus on cyber-security puts IT students on the front line of defense   2013 SC Magazine,  Suspect everything: Advanced threats in the network.  2013 Wall Street Journal,  Cyber Experts Warn Companies Not to be ' Low-Hanging Fruit'.   2012 Reserve Magazine,  Cyber Fraud: Project Your Assets Online.   2012 Orland Sentinel,  Lake sheriff hackers reveal flaws in police computers.   2012 Washington Post,  Winners and losers from DOJ suit against Apple,  publishers.  2011 Forensic Magazine,CSI Cell Phone. 2011 The Chronicle of Higher Education,From Homeric Writings to Cellphone Forensics, Some Favorite Online Resourses. 2011 Westchester County Business Journal,War in the mobile device industry.2011 The Times (London), Google deal declares war on Apple; Page 
		flexes his muscles with gamble on Motorola.2011 Westchester County Business Journal, War in 
						the mobile device industry. 2011 USA Today, Google buys Motorola Mobility to 'supercharge' Android OS.2011 Data Center Management, Forensics: Staying Ahead of Hackers, afcom.com2011 Baltimore Sun, Rise of the machines.2011 New York Post, Geeks fear humans are in ‘Jeopardy’.2011 Investor’s Business Daily, IBM’s Watson Aims Far Beyond ‘Jeopardy’ Matchup.2011 Government Executive, TRENDS Service Interrupted,GovernmentExecutive.com2010 Aviation Week & Space Technology, Cyberworld Spies.2010 Flint Journal, WikiLeaks controversy prompts concerns over troops’ access to electronic communication while overseas, mlive.com  News Media  (Online)  
	2015	Nextgov, Who’s Got the Chops to Run a Transatlantic Cyberspy Cell?, nextgov.com2015	CNBC, Why the Silk Road trial should matter to non-criminals, cnbc.com2015	Law360, Obama's Data Breach Plan Great On Paper But That May Be All, law360.com2015	China Daily, China will say 'Hello Moto' again soon, chinadaily.com.cn2015	International Business Times, Morgan Stanley Fires Financial Adviser For Stealing Client Data, ibtimes.com2015	The Korea Times, FBI director confident North Korea was behind cyberattack despite skepticism, koreatimesus.com2015	ABC News, Security Experts Doubt North Korea Hacked Sony, abcnews.go.com2014	The Daily Beast, Obama Could Hit China to Punish North Korea, thedailybeast.com2014	U.S. News, 'The Interview' and the Reckoning, usnews.com2014	Institutional Investor, Deals of the Year 2014: Facebook’s Data-Driven Takeover of WhatsApp, institutionalinvestor.com2014	TechNewsWorld, US Marshals Have Their Own Cellphone Data Slurpfest, technewsworld.com2014	Voice of America, Russia Plays Big Role in Cyber Spying, Hacking, voanews.com2014	MarketWatch, 10 most annoying Facebook users, marketwatch.com2014	Bloomberg, Only Congress Can Crack Apple's Spy-Proof IPhones, businessweek.com2014	International Business Times, As China Awaits The iPhone 6, Samsung Could Gain A Regional Advantage, ibtimes.com2014	eCommerce Times, Will the Beats Go On?, ecommercetimes.com2014	TechNewsWorld, Snowden Blows NSA's MonsterMind, technewsworld.com2014	eCommerce Times, Yahoo, Google Team Up to Fight Email Snoops, ecommercetimes.com2014	University Business, UBTech 2014: Innovation Everywhere, universitybusiness.com2014	MarketWatch, Your company’s IT department is watching you, marketwatch.com2014	Foreign Policy, How Europe Became Ground Zero in the Battle for the Right to be Forgotten, foreignpolicy.com2014	eCommerce Times, EU Court Hands Google a Missing Links Quandary, ecommercetimes.com2014	The West Australian, Google EU data case raises censorship fears, thewest.com.au2014	Voice of America, Russia-Ukraine Crisis Could Trigger Cyber War, voanews.com2014	MarketWatch, Facebook tackles its most annoying posts, marketwatch.com2014	CNN, IRS: File your taxes now, ignore Heartbleed bug, money.cnn.com2014	TechNewsWorld, XP Users Have a Bad Headache Coming On, technewsworld.com2014	USA Today, Battle for Bitcoin: Will it survive?, usatoday.com2014	Wall Street & Technology, After the Mt. Gox Collapse, Wall Street is Wary of Bitcoin, wallstreetandtech.com2014	USA Today, Bitcoin exchange Mt. Gox goes offline amid turmoil, usatoday.com2014	MarketWatch, How to spot credit-card skimmers, marketwatch.com2014	accountingToday, Skimmer Fraud on the Rise, accountingtoday.com2014 Market Watch,  Talk is dead; long live WhatsApp, marketwatch.com.2014 Smart Planet,  The U.S. is a credit fraud wonderland, smartplanet.com.2014 TechNewsWorld,  Mac Birthday Video Stars iPhone, technewsworld.com.2014 eCommerce Times,  Apple, Samsung Plan Mediation Meetup, ecommercetimes.com.2013 eCommerce Times,  Microsoft Honcho Tapped to Clean Up healthcare Mess, ecommercetimes.com.2013 eCommerce Times,  Is Bitcoin Buddling Over? ,  ecommercetimes.com.2013 Tech News World,  iPhone 5c Lures Android Users to Apple, technewsworld.com.2013 The Street,  Snark-Nado: What Happened with JP Morgan's Epic Twitter Fail,  thestreet.com.2013 Apple Magazine,  Apple stock wilts on Worries About iPhone Demand,  applemagazine.com.2013 Market Watch,  How IPO will change Twitter,  marketwatch.com.2013 Computer World,  Microsoft's mobile fate rests on  Nokia deal, computerworld.com.2013 University Business,  Cyberattacks on the rise in higher education, universitybusiness.com.2013 TechNewsWorld,  RSA Warns Customers Off Suspected NSA-Tainted Crypto Tools, technewsworld.com.2013 Information Week,  Twitter Prepares IPO, Fackbook Pain In Mind, informationweek.com.2013 TechNewsWorld,  Samsung Draws a Big 'Meh' for Clunky, Pricey Galaxy Gear Smartwatch,  technewsworld.com.2013 Time,  'Hail Mary' Nokia Deal: Too Little, Too Late?, business.time.com.2013 ABC News,  In Nokia Acquision, Microsoft Tries to Catch Up, abcnews.go.com.2013 Computer World,  With Microsoft-Nokia deal, Stephen Elop is sitting pretty,  computerworld.com.2013 TechNewsWorld,  IBM Creates Software Ecosystem for Thinking Chip,  technewsworld.com.2013 Compliance Week,  Is Your Confidential Data Safe in the Hands of Regulators, complianceweek.com.2013 CreditUnionTimes,  Threat of the Week: ATM Traps on the Comeback trail,  cutimes.com.2013 MarketWatch,  Who's bigger snoop: the NSA or your boss? , marketwatch.com.2013 Law360,  NY Fraud threat Could Prompt Action on Smartphone Theft, law360.com.2013 MarketWatch,  Los Alamos Surfs Its Own Quantum Internet for 2 Years, marketwatch.com.2013 Huffington Post,  Cities Call for Smartphone 'Kill Switch' To Curb Thefts,  huffingtonpost.com.2013 eCommerce Times,  Fackbook revs Its Mobile Ad Engine in Q1,  ecommercetimes.com.2013 Financial Times,  Microsoft beats Apple in the credit ratings league,  ft.com.2013 Market Watch,  Will iPhone still exist when Apple bonds mature?,  marketwatch.com.2013 Silicon Valley Business Journal, advice for Tim Cook: What Apple must do to avoid another down quarter, bizjournals.com.2013 Venture Beat, Apple stock up $18 in prelude to todays's earning release, venturebeat.com.2013 Advanced Trading,  Bracing for Apple's Earnings Report, Academics React to Stock's Falling Price,advancetrading.com.<2013Venture Beat,  Apple: earnings, stock price, innovation ... and what the company needs to do now, venturebeat.com.2013 TechNews World,  Sharks Circle Struggling Dell, technewsworld.com.2013 MarketWatch,  Will makeover cure 'Facebook fatigue'?,  marketwatch.com.2013 TechNewsWorld,  IE 10: It's Not Just for windows 8 Anymore, technewsworld.com.2013 Investor's Business Daily,  Google Said Close To Antitrust settlement With Europe, investors.com.2013 Investor's Business Daily,  Internet Blackout In The U.S. A Near Impossibility, investors.com.2012 Pc Magazines,  Expert: U.S.-China Cyber Saber Rattling Could Prompt Trade War, pcmag.com.2012 CIO,  Getting Forensics Data Off Smartphones,Tablets Can Be Tough,Experts Say, cio.com.2012 Digital Trends,  State of the Web: U.S. condemns Huawei and ZTE for spying on us while spying on us, digitaltrends.com.2012 E-Commerce Times,  House C'tee's 'Don't Buy From Huawei' Report May Fall on Deaf Ears, ecommercetimes.com.2012 Global Association of Risk Professionals,,  Cyberinsurance: Products Mature but still Underused, garp.org, garp.org.<2012 Read Write Web,  Investors & Advertisers Drives Facebook Deeper Into Privacy Quaagmire, readwriteweb.com.2012 TechNewsWorld,  Facebook Fiasco a Bigger Lesson for IPOs Than Early-Stage Starups, technewsworld.com.2012 TechNewsWorld,  Researchers Remotely Hijack Drones on the  Cheap, technewsworld.com.2012 Bloomberg, Morgan Stanley Faces ServiceNow IPO Test After Facebook, bloomberg.com.2012 TechNewsWorld,  US Cybercounterterrorism Team takes on al-Qaida , technewsworld.com.2012 Info security , The US vs. China: a very Civil (Cyber) War, infosecurity-magazine.com.2012 TechNewsWorld, The shell Game of Privacy, technewsworld.com.2012 SCI-TECH Today, Market Weighs in on Facebook's Value; Privacy Challenges Ahead, sci-tech-today.com.2012 Investor's Business Daily,  Zynga, LinkedIn Shares Tumble On Weak Facebook Debut, investors.com.2012 TechNewsWorld, Class Action Suit Looks to Squeeze Facebook for $15B, technewsworld.com.2012 ALJAZEERA,  Facebook Fails to set stock market alight, aljazeera.com.2012 Jakarta Globe,  Facebook falls flat in market debut, jakartaglobe.com.2012 Nextgov,  Contracting Agency For Bailout Watchdog botched IT Forensics Acquisition, nextgov.com.2012 TechNewsWorld,  Researchers Leap Into Quantum Networking,technewsworld.com.2012	TechNewsWorld, IBM Plans Massive Computer System to Digest Big Telescope Data, technewsworld.com2012	E-Commerce Times, Yahoo Hops on the Do-Not-Track Train, ecommercetimes.com2012	TechNewsWorld , Google Gets Going With Go, technewsworld.com2012	TechNewsWorld , Iceland Has the Hots for FOSS, technewsworld.com2012	TechNewsWorld, The Privacy Shell Game, Part 2, technewsworld.com2012	TechNewsWorld, The Privacy Shell Game, Part 1, technewsworld.com2012	The Daily Caller, White House follows EU’s lead with new Internet ‘rules of the road’, dailycaller.com2012	E-Commerce Times, Google Unfazed by AGs' Furrowed Brows, ecommercetimes.com2012	Forbes, President Obama's Consumer Privacy Bill of Rights, forbes.com2012	Government Technology, White House Releases ‘Privacy Bill of Rights’ for Consumers, govtech.com2012	TechNewsWorld, Is Anonymous Plotting a Power Play?, technewsworld.com2012	TechNewsWorld, Senate Bill Would Give DHS a Cybersecurity Whip, technewsworld.com2012	The Street, 3 Security Stocks Benefiting From Hack Attacks, thestreet.com2012	internet evolution, Twitter's Clever Censorship Policy, internetevolution.com2012	TechNewsWorld, Twitter Builds a Better Gagger, technewsworld.com2012	TechNewsWorld, Quantum Tech Could Secure the Cloud Through 'Blind' Data Processing, technewsworld.com2012	TechNewsWorld, Google Makes Search Really, Really Personal, technewsworld.com2011 internet evolution, EU May Mandate the 'Right to be Forgotten', internetrevolution.com.2011 TechNewsWorld, America's PerilousPatchwork of Privacy Laws, technewsworld.com.2011 MacNewsWorld,  Applemania Strikes Again as iPod 2 Bedazzles the iCrowd, macnewsworld.com.2011 MSNBC,  How IBM's Watson will make money, cosmiclog.msnbc.msn.com2011 TechNewsWorld, Watson Graduates From Game Contestant to Physical Assistant, technewsworld.com.2011 Seattle Weekly,  IBM Supercomputer Watson Destorys Ken Jennings,Brad Rutter--Ready Now to Become Doctor/Car Mechanic/Counterterrorism Exports, blogs.seattleweekly.com.2011 The New Yorker, What Would Watson's Victory Mean?, newyorker.com/online/blogs.2011	TechNewsWorld,Chamber Raid: Hackers Target US Commerce Lobby,technewsworld.com.2011	internet Evolution,Of Twitter Bots, Putin, & US Elections,internetevolution.com.2011	TechNewsWorld,FBI May Be Gathering String on Carrier IQ,technewsworld.com.2011	internet Evolution,Us Fears Chinese Malware Hidden in Imports,internetevolution.com.2011	SmartMoney,For Angie's List and Yelp, IPOs May Bring Conflict,blogs.smartmoney.com.2011	Nextgov,futures regulators want smartphone hacking device,nextgov.com.2011	Wall Street & Technology,Apple's iPad Market Share Takes A Serious, Surprising, Tumble,wallstreetandtech.com.2011	TechNewsWorld,Can an Anti-Child Porn Bill Go Too Far?,technewsworld.com.2011	CNBC,Ten Years After 9/11,America's Safety Still in Doubt,CNBC.com.2011	Corporate Compliance Insights,The Impact On Corporate Compliance of India's New Data Privacy Rules, corporatecomplianceinsights.com.2011	The Huffington Post, Why Google Wants To Buy Motorola Mobility, huffingtonpost.com.2011	WIRED, Google + Motorola = Android Intellectual Property Shark Repellant, wired.com2011 CNBC, Ten Years After 9/11, America’s Safety Still in Doubt, CNBC.com2011 MarketWatch, U.S. stocks rally on deal news, Google to buy Motorola Mobility in its biggest 
						acquisition to date,marketwatch.com2011 TechNewsWorld, The UK Riots, RIM and the Price of Privacy, technewsworld.com.2011	National Journal Group, Cellphone may have signaled Bin Laden’s location, nextgov.com 2011	Corporate Compliance Insights, The Impact On Corporate Compliance of India’s New Data Privacy Rules, corporatecomplianceinsights.com2011	Daily Finance, The Truth About Identity Theft Protection Services, dailyfinance.com.2011	Forbes, Dear Valued Customer, The Real reason Your Email Address is Out in the Wild is This,blogs.forbe.com2011	Tech News World, The Chinese Government’s Gremlins in Google’s Works,technewsworld.com2011	Tech News World, Lawyers Smack Sony’s Hand as It Reaches for Hotz’s Hard Drive, technewsworld.com2011	Internet evolution, EU May Mandate the ‘Right to Be forgotten’,internetrevolution.com2011 Tech News World, Americas Perilous Patchwork of Privacy Laws, technewsworld.com2011 	Nieman Watch Dog, 8 questions about online privacy, niemanwatchdog.org2011 	Mac NewsWorld, Applemania Strikes Again as iPad2 Bedazzles the iCrowd, macnewsworld.com2011	MSNBC, How IBM’s Watson will make money, cosmiclog.msnbc.msn.com2011 	TechNewsWorld, Watson Graduates From Game Contestant to Physician Assistant,technewsworld.com2011	The New Yorker, What Would Watson’s Victory Mean?, newyorker.com/online/blogs2011	Internet evolution, The Myth of Browser-Based ‘Do Not Track’, internetevolution.com2011	TechNewsWorld, Firefox Do-Not-Track Feature Seen as Toothless, 
						technewsworld.com2011	Computer World, 2011 Outlook: Better than 2010 and really wild,computerworld.com2011 Seattle Weekly,IBM Supercomputer Watson Destroys Ken Jennings, Brad Rutter-Ready Now to become Doctor/Car Mechanic/Counterterrorism Expert, blogs.seattleweekly.com2011	TechNewsWorld, Anonymous on UK Arrests: This Means War, technewsworld.com2011 Corporate Compliance Insights, Protecting Data and Risk Management:Lessons learned from Wikileaks and'Anonymous', corporatecomplianceinsights.com2010	CNN, Obama’s cybersecurity initiative mired in ‘shortfalls’, audit says,CNN.com2010	Fox News, Feds Slow in Protecting Computer Networks from Cyber-Threats, Study Finds, FoxNews.com2010	Aerospace Daily & Defense Report, Insiders May Create More Cyber Leaks Than Hackers.2010 	eWeek, WikiLeaks Disclosures Prompt Defense Department Ban on USB Devices,eWeek.com2010	eWeek, WikiLeaks Anonymous Force Change to Federal Government’s Security Approach,eWeek.com2010	TechNewsWorld, Military Gives External Media Devices Marching Orders, technewsworld.com2010	TechNewsWorld, Wikileaks Wrangling May Be Escalating Into Cyberwar, technewsworld.com2010	SearchCIO, Post-WikiLeaks computer security measures include hired hackers, itknowledgeexchange.techtarget.2010	National Journal Group, Inconsistent policies trip up efforts to track terrorist finances, NextGov.com2010	FrontLine Defence News, Revolutionary changes may hit how GIs email home,frontline-canada.com2010	eComTechnology, The Pentagon’s new restrictions on removable media and file transfers,ecomtech.biz2008	Crains New York Business, Schools plug into digital lifestyle of students,CrainsNewYork.com  Presentations & Workshops (Selected) 
	 2014	Invited Speaker, Skimming the Surface, HTCIA International Conference, Austin, TX.2014	Invited Speaker, Keeping Cyber Attacks at Bay, UBTech Conference, Mirage, Las Vegas.2014	Workshop Host, Mobile Forensics Workshop, Pace University, New York, NY.2014	Presentation: Computer Forensics Machine, New York Police Department.2014	Presentation: Mobile Forensics Investigations, Polisen, Stockholm County Police, United States Department of State.2014	Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.2014	Mock Class: Mobile Forensics - Using Smartphones to Catch Criminals, Pace University, New York, NY.2014	Invited Speaker, Privacy is Dead and It’s Not the NSA’s Fault, Harrah’s, Atlantic City.2014	Invited Speaker, What to do when you have been breached, Pace Global Center for Governance, Reporting, and Regulation, New York, NY.2014	Invited Speaker, Skimmer Scams, ACCA USA.2013	Invited Speaker, What to do when hackers attack you, New York Law School, New York, NY.2013	Presentation, Cybersecurity Initiatives, Congressman Peter King, Massapequa Park, NY.2013	Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.2013	Host, Women of the HTCIA, HTCIA Northeast Chapter, Pace University, New York, NY.2013	Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.2013	Host & Speaker, Information Assurance & Cloud Computing, Chinese Ministry of Industry and Information Technology, Pace University, New York, NY.2013	Invited Speaker, Mobile Forensics Workshop, Community Colleges, Pace University, White Plains, NY.2013	Invited Speaker, Course Technology, Big Brother is Watching You, NYU, New York, NY.2013	Invited Speaker, Thinking Like An Investigator, Pace Computer Club, New York, NY.2013	Invited Speaker, Harvard Business Review, After an Attack: Protecting Your Data, Your Customer and Your Reputation, Webinar.2013	Invited Speaker, HTCIA Connecticut Chapter, Skimmer Fraud, Quinnipiac University, CT.2013	Invited Online Lecturer, Android Forensic Investigations, University College Dublin.2012	Panelist, Cybercrime Symposium, Pace University, New York, NY.2012	Workshop Host, Mobile Forensics Workshop, Pace University, Pleasantville, NY.2012	Workshop Host, Mobile Forensics Workshop, Pace University, New York, NY.2012	Invited Speaker,HTCIA Northeast Chapter, Fourth Amendment and Digital Forensics, MetLife, Queens, NY.2012	Invited Speaker,InfraGard TV, Network Security Breaches, Online.2012	Panel Moderator, Pace University Criminal Justice Society Panel Discussion on Implications of SOPA/PIPA, Pace University, New York, NY.2012	Judge, High School Computer Forensics Symposium, Pace University, New York, NY.2011	Invited Speaker, Open House, Computer Forensics Studies, Pace University, New York, NY.2011	Invited Speaker, High School for Criminal Justice, Computer Forensics High School Program, Pace University, NY.2011	Workshop Host,Career Shadowing Day for St. Anthony’s High School,Pace University, New York, NY.2011	Invited Speaker, InfraGard TV, Trends in Computer Crime, Online.2011	Workshop Host,SICI Computer Forensics Workshop, Pace University, Pleasantville, NY.2011	Invited Speaker, InfraGard TV, Trends in Computer Crime, Online.2011	Judge, High School Computer Forensics Symposium, Pace University, New York, NY.2011	Invited Speaker, MetTel Presentation on Network Forensics, New York, NY.2011	Panelist,Westchester County Association, Cyber Fraud on the Rise, Tarrytown, NY.2011	Invited Speaker, Tech Talk on Threats to Our National Security, Pace University, New York, NY2011	Panelist, Mobile Safety, Pace University, New York, NY.2010	Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Online Reconnaissance in Computer Forensics, Intrepid Air & Space Museum, NY.2010	Invited Speaker, InfraGard TV, Computer Forensics, Online.2010	Judge, High School Computer Forensics Symposium, Pace University, New York, NY.2009	Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Introduction to Computer Forensics, Towson University, MD.2009	Judge, High School Computer Forensics Symposium, Pace University, New York, NY.2008	Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Developing a Computer Forensics Curriculum, Mohegan Sun, CT.2008	Judge, High School Computer Forensics Symposium, Pace University, New York, NY. 
 |