Publications (Books)

  • 2014 Hayes, D, A Practical Guide to Computer Forensics Investigations, Pearson IT Certification.
  • 2013 Hayes, D.,et al, Skills for Success with Mac Office 2011, Prentice Hall.
  • 2010 Hayes, D., & Townsend, K, Skills for Success with Access 2010 Comprehensive, Upper Saddle River: Prentice Hall.
  • 2008 Hayes, D. R. The efficacy of project retrospectives on organizational process improvement initiatives in software development. New York, NY: ETD Collection for Pace University.

Publications (Peer-Reviewed Articles)

  • 2011 Hayes, D.R., et al., The Impact of Project Retrospectives on Process Improvement Initiatives: A Case Study, LISAT. Farmingdale: IEEE.
  • 2010 Hayes, D. R., Qureshi, S., & Reddy, V. The Impact of Microsoft's Windows 7 on Computer Forensics Examinations. LISAT. Farmingdale: IEEE.
  • 2009 Hayes, D. R. & Qureshi, S. Implications of Microsoft Vista Operating System for Computer Forensics Investigations. LISAT. Farmingdale: IEEE.
  • 2009 Coppola, J., Thomas, B., Marta, J., Hayes, D., Forman, L., & Robinson, J. Cognitive Assessment: An Analysis of Elderly Cognition in an Intergenerational Computing Program. The Michael L. Gargano 7th Annual Research Day . White Plains: Pace University.
  • 2008 Hayes, D.& Qureshi, S. Microsoft Vista: Serious Challenges for Digital Investigations. Pace Student and Faculty Research Day. White Plains: Pace University.
  • 2008 Hayes, D. R., & Qureshi, S.A Framework for Computer Forensics Investigations Involving Microsoft Vista. LISAT. Farmingdale: IEEE.
  • 2008 Coppola, J., Feather-Gannon, S., Hayes, D., Kline, R., & Mosley, P. Civic Engagement through Computing Technology. In First-Year Civic Engagement: Sound Foundations for College, Citizenship and Democracy. New York: New York Times.
  • 2006 Hayes, D. R. Strategic Initiatives for E-Branding. IADIS International Conference e-Society (pp. 183-186). Dublin: IADIS.
  • 2006 Hayes, D. R., Hill, J., Mannette-Wright, A., & Wong,H.Team Project Patterns for College Students. PLoP '06. Portland: ACM.

Publications (Research Report)

  • 2014 ACCA, Skimming the Surface: How Skimmer Fraud Had Become A Global Epidemic.

Publications (Media Articles)

  • 2014 Recorded Future, How Pace University is Building the Next Generation of Cyber Security Analysts
  • 2014 American Banker, Small Banks Should Team Up to Fight Cyberattacks
  • 2014 The Hill, Why America may be the future bastion of virtual currencies
  • 2013 American Banker, Compromise Needed on U.S. EMV Adoption Plan
  • 2013 The Hill, Op-Ed: Apple’s missed opportunities for alliances with government and academia
  • 2013 The Hill, Op-Ed: US warns of rising threat of cyber attacks to national and economic security
  • 2013 The Hill, Op-Ed: First lesson of Superstorm Sandy: Improve communication
  • 2013 The Hill, Op-Ed: New standards needed to protect patients from computer viruses in medical devices
  • 2012 The Hill, Op-Ed: Investigative report on ZTE, Huawei is unprecedented in its accusations
  • 2012 The Hill, Op-Ed: Congress must pass effective privacy legislation to protect our children
  • 2012 The Hill, Op-Ed: Seeking answers on Facebook IPO calamity
  • 2012 Computer Graphics World, Facebook IPO, cgw.com
  • 2012 The Hill, Op-Ed: US must protect privacy better.
  • 2012 Corporate Compliance Insights, Proposed EU Privacy Legislation Likely To Seriously Impact U.S. Companies, corporatecomplianceinsights.com
  • 2011 Corporate Compliance Insights, The Impact On Corporate Compliance of India’s New Data Privacy Rules,corporatecomplianceinsights.com
  • 2011 Westchester County Business Journal, War in the mobile device industry.
  • 2011 Nieman Watchdog, 8 questions about online privacy, niemanwatchdog.org
  • 2011 Corporate Compliance Insights, Protecting Data and Risk Management: Lessons Learned from WikiLeaks and ‘Anonymous’,corporatecomplianceinsights.com

News Media (Television & Radio)

  • 2015 Al Jazeera, Silk Road trial raises privacy questions
  • 2014 Fox 26 KNPN, 'High-tech pickpockets' raise concerns
  • 2014 NTD (New Tang Dynasty Television), ICANN
  • 2013 The Street, Android Gains Ground on iPhone.
  • 2013 WWL AM870, Computer Hackers.
  • 2013 Fox Business, A Growing Threat- A Growing Career.
  • 2012 Bloomberg TV, Smartphone Espionage: How Big Is The Threat?
  • 2011 Forensic News Radio, Bin Laden cache shines a light on forensics, Federal Drive.
  • 2011 Fox News, GPS Dangers and Shrinking Brains.
  • 2011 WCHE 1520AM, IBM’s Watson on Jeopardy, Raffaele Report

News Media (Newspapers & Magazines)

  • 2015 The Wall Street Journal, Morgan Stanley Fires Employee Over Client-Data Leak
  • 2015 Irish Independent, North Korea 'not responsible for leak of Sony movies', independent.ie
  • 2014 SC Magazine, U.S. spy program targeting Americans' mobile phones, report says
  • 2014 SC Magazine, Safe tether: Wearables
  • 2014 New York Post, US fast cash for European crooks
  • 2014 Investor’s Business Daily, Google In EU Must Remove Personal Links On Request
  • 2014 Epoch Times, ICANN Holds Public Comment Period as it Transitions to ‘Multi Stakeholder’ Oversight
  • 2014 Washington Post, Heartbleed could harm a variety of systems
  • 2014 University Business, Keeping cyber attacks at bay
  • 2014 Newsweek, Why Ukraine Hasn’t Sparked a Big Cyberwar, So Far
  • 2013 Daily News (NY), A-Wrist-OCRAT: Samsung hope $299 'smartwatch' is face of future.
  • 2013 USA Today, Microsoft-Nokia reboot eyes mobile wave.
  • 2013 SC Magazine, Indian computer authorities to investigate what led to $45 million ATM heist.
  • 2013 The Washington Post, Speedy gang stole $45M worldwide through ATMs after hacking.
  • 2013 The Guardian (UK), Apple stock wits onworries about iPhone demand
  • 2013 The Guardian (UK), Apple sees profits fall for the first time in a decade but cash pile rises to $145bn
  • 2013 New York Post, Masters focus on cyber-security puts IT students on the front line of defense
  • 2013 SC Magazine, Suspect everything: Advanced threats in the network.
  • 2013 Wall Street Journal, Cyber Experts Warn Companies Not to be ' Low-Hanging Fruit'.
  • 2012 Reserve Magazine, Cyber Fraud: Project Your Assets Online.
  • 2012 Orland Sentinel, Lake sheriff hackers reveal flaws in police computers.
  • 2012 Washington Post, Winners and losers from DOJ suit against Apple, publishers.
  • 2011 Forensic Magazine,CSI Cell Phone.
  • 2011 The Chronicle of Higher Education,From Homeric Writings to Cellphone Forensics, Some Favorite Online Resourses.
  • 2011 Westchester County Business Journal,War in the mobile device industry.
  • 2011 The Times (London), Google deal declares war on Apple; Page flexes his muscles with gamble on Motorola.
  • 2011 Westchester County Business Journal, War in the mobile device industry.
  • 2011 USA Today, Google buys Motorola Mobility to 'supercharge' Android OS.
  • 2011 Data Center Management, Forensics: Staying Ahead of Hackers, afcom.com
  • 2011 Baltimore Sun, Rise of the machines.
  • 2011 New York Post, Geeks fear humans are in ‘Jeopardy’.
  • 2011 Investor’s Business Daily, IBM’s Watson Aims Far Beyond ‘Jeopardy’ Matchup.
  • 2011 Government Executive, TRENDS Service Interrupted,GovernmentExecutive.com
  • 2010 Aviation Week & Space Technology, Cyberworld Spies.
  • 2010 Flint Journal, WikiLeaks controversy prompts concerns over troops’ access to electronic communication while overseas, mlive.com

News Media  (Online)

  • 2015 Nextgov, Who’s Got the Chops to Run a Transatlantic Cyberspy Cell?, nextgov.com
  • 2015 CNBC, Why the Silk Road trial should matter to non-criminals, cnbc.com
  • 2015 Law360, Obama's Data Breach Plan Great On Paper But That May Be All, law360.com
  • 2015 China Daily, China will say 'Hello Moto' again soon, chinadaily.com.cn
  • 2015 International Business Times, Morgan Stanley Fires Financial Adviser For Stealing Client Data, ibtimes.com
  • 2015 The Korea Times, FBI director confident North Korea was behind cyberattack despite skepticism, koreatimesus.com
  • 2015 ABC News, Security Experts Doubt North Korea Hacked Sony, abcnews.go.com
  • 2014 The Daily Beast, Obama Could Hit China to Punish North Korea, thedailybeast.com
  • 2014 U.S. News, 'The Interview' and the Reckoning, usnews.com
  • 2014 Institutional Investor, Deals of the Year 2014: Facebook’s Data-Driven Takeover of WhatsApp, institutionalinvestor.com
  • 2014 TechNewsWorld, US Marshals Have Their Own Cellphone Data Slurpfest, technewsworld.com
  • 2014 Voice of America, Russia Plays Big Role in Cyber Spying, Hacking, voanews.com
  • 2014 MarketWatch, 10 most annoying Facebook users, marketwatch.com
  • 2014 Bloomberg, Only Congress Can Crack Apple's Spy-Proof IPhones, businessweek.com
  • 2014 International Business Times, As China Awaits The iPhone 6, Samsung Could Gain A Regional Advantage, ibtimes.com
  • 2014 eCommerce Times, Will the Beats Go On?, ecommercetimes.com
  • 2014 TechNewsWorld, Snowden Blows NSA's MonsterMind, technewsworld.com
  • 2014 eCommerce Times, Yahoo, Google Team Up to Fight Email Snoops, ecommercetimes.com
  • 2014 University Business, UBTech 2014: Innovation Everywhere, universitybusiness.com
  • 2014 MarketWatch, Your company’s IT department is watching you, marketwatch.com
  • 2014 Foreign Policy, How Europe Became Ground Zero in the Battle for the Right to be Forgotten, foreignpolicy.com
  • 2014 eCommerce Times, EU Court Hands Google a Missing Links Quandary, ecommercetimes.com
  • 2014 The West Australian, Google EU data case raises censorship fears, thewest.com.au
  • 2014 Voice of America, Russia-Ukraine Crisis Could Trigger Cyber War, voanews.com
  • 2014 MarketWatch, Facebook tackles its most annoying posts, marketwatch.com
  • 2014 CNN, IRS: File your taxes now, ignore Heartbleed bug, money.cnn.com
  • 2014 TechNewsWorld, XP Users Have a Bad Headache Coming On, technewsworld.com
  • 2014 USA Today, Battle for Bitcoin: Will it survive?, usatoday.com
  • 2014 Wall Street & Technology, After the Mt. Gox Collapse, Wall Street is Wary of Bitcoin, wallstreetandtech.com
  • 2014 USA Today, Bitcoin exchange Mt. Gox goes offline amid turmoil, usatoday.com
  • 2014 MarketWatch, How to spot credit-card skimmers, marketwatch.com
  • 2014 accountingToday, Skimmer Fraud on the Rise, accountingtoday.com
  • 2014 Market Watch, Talk is dead; long live WhatsApp, marketwatch.com.
  • 2014 Smart Planet, The U.S. is a credit fraud wonderland, smartplanet.com.
  • 2014 TechNewsWorld, Mac Birthday Video Stars iPhone, technewsworld.com.
  • 2014 eCommerce Times, Apple, Samsung Plan Mediation Meetup, ecommercetimes.com.
  • 2013 eCommerce Times, Microsoft Honcho Tapped to Clean Up healthcare Mess, ecommercetimes.com.
  • 2013 eCommerce Times, Is Bitcoin Buddling Over? , ecommercetimes.com.
  • 2013 Tech News World, iPhone 5c Lures Android Users to Apple, technewsworld.com.
  • 2013 The Street, Snark-Nado: What Happened with JP Morgan's Epic Twitter Fail, thestreet.com.
  • 2013 Apple Magazine, Apple stock wilts on Worries About iPhone Demand, applemagazine.com.
  • 2013 Market Watch, How IPO will change Twitter, marketwatch.com.
  • 2013 Computer World, Microsoft's mobile fate rests on Nokia deal, computerworld.com.
  • 2013 University Business, Cyberattacks on the rise in higher education, universitybusiness.com.
  • 2013 TechNewsWorld, RSA Warns Customers Off Suspected NSA-Tainted Crypto Tools, technewsworld.com.
  • 2013 Information Week, Twitter Prepares IPO, Fackbook Pain In Mind, informationweek.com.
  • 2013 TechNewsWorld, Samsung Draws a Big 'Meh' for Clunky, Pricey Galaxy Gear Smartwatch, technewsworld.com.
  • 2013 Time, 'Hail Mary' Nokia Deal: Too Little, Too Late?, business.time.com.
  • 2013 ABC News, In Nokia Acquision, Microsoft Tries to Catch Up, abcnews.go.com.
  • 2013 Computer World, With Microsoft-Nokia deal, Stephen Elop is sitting pretty, computerworld.com.
  • 2013 TechNewsWorld, IBM Creates Software Ecosystem for Thinking Chip, technewsworld.com.
  • 2013 Compliance Week, Is Your Confidential Data Safe in the Hands of Regulators, complianceweek.com.
  • 2013 CreditUnionTimes, Threat of the Week: ATM Traps on the Comeback trail, cutimes.com.
  • 2013 MarketWatch, Who's bigger snoop: the NSA or your boss? , marketwatch.com.
  • 2013 Law360, NY Fraud threat Could Prompt Action on Smartphone Theft, law360.com.
  • 2013 MarketWatch, Los Alamos Surfs Its Own Quantum Internet for 2 Years, marketwatch.com.
  • 2013 Huffington Post, Cities Call for Smartphone 'Kill Switch' To Curb Thefts, huffingtonpost.com.
  • 2013 eCommerce Times, Fackbook revs Its Mobile Ad Engine in Q1, ecommercetimes.com.
  • 2013 Financial Times, Microsoft beats Apple in the credit ratings league, ft.com.
  • 2013 Market Watch, Will iPhone still exist when Apple bonds mature?, marketwatch.com.
  • 2013 Silicon Valley Business Journal, advice for Tim Cook: What Apple must do to avoid another down quarter, bizjournals.com.
  • 2013 Venture Beat, Apple stock up $18 in prelude to todays's earning release, venturebeat.com.
  • 2013 Advanced Trading, Bracing for Apple's Earnings Report, Academics React to Stock's Falling Price,advancetrading.com.<
  • 2013Venture Beat, Apple: earnings, stock price, innovation ... and what the company needs to do now, venturebeat.com.
  • 2013 TechNews World, Sharks Circle Struggling Dell, technewsworld.com.
  • 2013 MarketWatch, Will makeover cure 'Facebook fatigue'?, marketwatch.com.
  • 2013 TechNewsWorld, IE 10: It's Not Just for windows 8 Anymore, technewsworld.com.
  • 2013 Investor's Business Daily, Google Said Close To Antitrust settlement With Europe, investors.com.
  • 2013 Investor's Business Daily, Internet Blackout In The U.S. A Near Impossibility, investors.com.
  • 2012 Pc Magazines, Expert: U.S.-China Cyber Saber Rattling Could Prompt Trade War, pcmag.com.
  • 2012 CIO, Getting Forensics Data Off Smartphones,Tablets Can Be Tough,Experts Say, cio.com.
  • 2012 Digital Trends, State of the Web: U.S. condemns Huawei and ZTE for spying on us while spying on us, digitaltrends.com.
  • 2012 E-Commerce Times, House C'tee's 'Don't Buy From Huawei' Report May Fall on Deaf Ears, ecommercetimes.com.
  • 2012 Global Association of Risk Professionals,, Cyberinsurance: Products Mature but still Underused, garp.org, garp.org.<
  • 2012 Read Write Web, Investors & Advertisers Drives Facebook Deeper Into Privacy Quaagmire, readwriteweb.com.
  • 2012 TechNewsWorld, Facebook Fiasco a Bigger Lesson for IPOs Than Early-Stage Starups, technewsworld.com.
  • 2012 TechNewsWorld, Researchers Remotely Hijack Drones on the Cheap, technewsworld.com.
  • 2012 Bloomberg, Morgan Stanley Faces ServiceNow IPO Test After Facebook, bloomberg.com.
  • 2012 TechNewsWorld, US Cybercounterterrorism Team takes on al-Qaida , technewsworld.com.
  • 2012 Info security , The US vs. China: a very Civil (Cyber) War, infosecurity-magazine.com.
  • 2012 TechNewsWorld, The shell Game of Privacy, technewsworld.com.
  • 2012 SCI-TECH Today, Market Weighs in on Facebook's Value; Privacy Challenges Ahead, sci-tech-today.com.
  • 2012 Investor's Business Daily, Zynga, LinkedIn Shares Tumble On Weak Facebook Debut, investors.com.
  • 2012 TechNewsWorld, Class Action Suit Looks to Squeeze Facebook for $15B, technewsworld.com.
  • 2012 ALJAZEERA, Facebook Fails to set stock market alight, aljazeera.com.
  • 2012 Jakarta Globe, Facebook falls flat in market debut, jakartaglobe.com.
  • 2012 Nextgov, Contracting Agency For Bailout Watchdog botched IT Forensics Acquisition, nextgov.com.
  • 2012 TechNewsWorld, Researchers Leap Into Quantum Networking,technewsworld.com.
  • 2012 TechNewsWorld, IBM Plans Massive Computer System to Digest Big Telescope Data, technewsworld.com
  • 2012 E-Commerce Times, Yahoo Hops on the Do-Not-Track Train, ecommercetimes.com
  • 2012 TechNewsWorld , Google Gets Going With Go, technewsworld.com
  • 2012 TechNewsWorld , Iceland Has the Hots for FOSS, technewsworld.com
  • 2012 TechNewsWorld, The Privacy Shell Game, Part 2, technewsworld.com
  • 2012 TechNewsWorld, The Privacy Shell Game, Part 1, technewsworld.com
  • 2012 The Daily Caller, White House follows EU’s lead with new Internet ‘rules of the road’, dailycaller.com
  • 2012 E-Commerce Times, Google Unfazed by AGs' Furrowed Brows, ecommercetimes.com
  • 2012 Forbes, President Obama's Consumer Privacy Bill of Rights, forbes.com
  • 2012 Government Technology, White House Releases ‘Privacy Bill of Rights’ for Consumers, govtech.com
  • 2012 TechNewsWorld, Is Anonymous Plotting a Power Play?, technewsworld.com
  • 2012 TechNewsWorld, Senate Bill Would Give DHS a Cybersecurity Whip, technewsworld.com
  • 2012 The Street, 3 Security Stocks Benefiting From Hack Attacks, thestreet.com
  • 2012 internet evolution, Twitter's Clever Censorship Policy, internetevolution.com
  • 2012 TechNewsWorld, Twitter Builds a Better Gagger, technewsworld.com
  • 2012 TechNewsWorld, Quantum Tech Could Secure the Cloud Through 'Blind' Data Processing, technewsworld.com
  • 2012 TechNewsWorld, Google Makes Search Really, Really Personal, technewsworld.com
  • 2011 internet evolution, EU May Mandate the 'Right to be Forgotten', internetrevolution.com.
  • 2011 TechNewsWorld, America's PerilousPatchwork of Privacy Laws, technewsworld.com.
  • 2011 MacNewsWorld, Applemania Strikes Again as iPod 2 Bedazzles the iCrowd, macnewsworld.com.
  • 2011 MSNBC, How IBM's Watson will make money, cosmiclog.msnbc.msn.com
  • 2011 TechNewsWorld, Watson Graduates From Game Contestant to Physical Assistant, technewsworld.com.
  • 2011 Seattle Weekly, IBM Supercomputer Watson Destorys Ken Jennings,Brad Rutter--Ready Now to Become Doctor/Car Mechanic/Counterterrorism Exports, blogs.seattleweekly.com.
  • 2011 The New Yorker, What Would Watson's Victory Mean?, newyorker.com/online/blogs.
  • 2011 TechNewsWorld,Chamber Raid: Hackers Target US Commerce Lobby,technewsworld.com.
  • 2011 internet Evolution,Of Twitter Bots, Putin, & US Elections,internetevolution.com.
  • 2011 TechNewsWorld,FBI May Be Gathering String on Carrier IQ,technewsworld.com.
  • 2011 internet Evolution,Us Fears Chinese Malware Hidden in Imports,internetevolution.com.
  • 2011 SmartMoney,For Angie's List and Yelp, IPOs May Bring Conflict,blogs.smartmoney.com.
  • 2011 Nextgov,futures regulators want smartphone hacking device,nextgov.com.
  • 2011 Wall Street & Technology,Apple's iPad Market Share Takes A Serious, Surprising, Tumble,wallstreetandtech.com.
  • 2011 TechNewsWorld,Can an Anti-Child Porn Bill Go Too Far?,technewsworld.com.
  • 2011 CNBC,Ten Years After 9/11,America's Safety Still in Doubt,CNBC.com.
  • 2011 Corporate Compliance Insights,The Impact On Corporate Compliance of India's New Data Privacy Rules, corporatecomplianceinsights.com.
  • 2011 The Huffington Post, Why Google Wants To Buy Motorola Mobility, huffingtonpost.com.
  • 2011 WIRED, Google + Motorola = Android Intellectual Property Shark Repellant, wired.com
  • 2011 CNBC, Ten Years After 9/11, America’s Safety Still in Doubt, CNBC.com
  • 2011 MarketWatch, U.S. stocks rally on deal news, Google to buy Motorola Mobility in its biggest acquisition to date,marketwatch.com
  • 2011 TechNewsWorld, The UK Riots, RIM and the Price of Privacy, technewsworld.com.
  • 2011 National Journal Group, Cellphone may have signaled Bin Laden’s location, nextgov.com
  • 2011 Corporate Compliance Insights, The Impact On Corporate Compliance of India’s New Data Privacy Rules, corporatecomplianceinsights.com
  • 2011 Daily Finance, The Truth About Identity Theft Protection Services, dailyfinance.com.
  • 2011 Forbes, Dear Valued Customer, The Real reason Your Email Address is Out in the Wild is This,blogs.forbe.com
  • 2011 Tech News World, The Chinese Government’s Gremlins in Google’s Works,technewsworld.com
  • 2011 Tech News World, Lawyers Smack Sony’s Hand as It Reaches for Hotz’s Hard Drive, technewsworld.com
  • 2011 Internet evolution, EU May Mandate the ‘Right to Be forgotten’,internetrevolution.com
  • 2011 Tech News World, Americas Perilous Patchwork of Privacy Laws, technewsworld.com
  • 2011 Nieman Watch Dog, 8 questions about online privacy, niemanwatchdog.org
  • 2011 Mac NewsWorld, Applemania Strikes Again as iPad2 Bedazzles the iCrowd, macnewsworld.com
  • 2011 MSNBC, How IBM’s Watson will make money, cosmiclog.msnbc.msn.com
  • 2011 TechNewsWorld, Watson Graduates From Game Contestant to Physician Assistant,technewsworld.com
  • 2011 The New Yorker, What Would Watson’s Victory Mean?, newyorker.com/online/blogs
  • 2011 Internet evolution, The Myth of Browser-Based ‘Do Not Track’, internetevolution.com
  • 2011 TechNewsWorld, Firefox Do-Not-Track Feature Seen as Toothless, technewsworld.com
  • 2011 Computer World, 2011 Outlook: Better than 2010 and really wild,computerworld.com
  • 2011 Seattle Weekly,IBM Supercomputer Watson Destroys Ken Jennings, Brad Rutter-Ready Now to become Doctor/Car Mechanic/Counterterrorism Expert, blogs.seattleweekly.com
  • 2011 TechNewsWorld, Anonymous on UK Arrests: This Means War, technewsworld.com
  • 2011 Corporate Compliance Insights, Protecting Data and Risk Management:Lessons learned from Wikileaks and'Anonymous', corporatecomplianceinsights.com
  • 2010 CNN, Obama’s cybersecurity initiative mired in ‘shortfalls’, audit says,CNN.com
  • 2010 Fox News, Feds Slow in Protecting Computer Networks from Cyber-Threats, Study Finds, FoxNews.com
  • 2010 Aerospace Daily & Defense Report, Insiders May Create More Cyber Leaks Than Hackers.
  • 2010 eWeek, WikiLeaks Disclosures Prompt Defense Department Ban on USB Devices,eWeek.com
  • 2010 eWeek, WikiLeaks Anonymous Force Change to Federal Government’s Security Approach,eWeek.com
  • 2010 TechNewsWorld, Military Gives External Media Devices Marching Orders, technewsworld.com
  • 2010 TechNewsWorld, Wikileaks Wrangling May Be Escalating Into Cyberwar, technewsworld.com
  • 2010 SearchCIO, Post-WikiLeaks computer security measures include hired hackers, itknowledgeexchange.techtarget.
  • 2010 National Journal Group, Inconsistent policies trip up efforts to track terrorist finances, NextGov.com
  • 2010 FrontLine Defence News, Revolutionary changes may hit how GIs email home,frontline-canada.com
  • 2010 eComTechnology, The Pentagon’s new restrictions on removable media and file transfers,ecomtech.biz
  • 2008 Crains New York Business, Schools plug into digital lifestyle of students,CrainsNewYork.com

Presentations & Workshops (Selected)

  • 2014 Invited Speaker, Skimming the Surface, HTCIA International Conference, Austin, TX.
  • 2014 Invited Speaker, Keeping Cyber Attacks at Bay, UBTech Conference, Mirage, Las Vegas.
  • 2014 Workshop Host, Mobile Forensics Workshop, Pace University, New York, NY.
  • 2014 Presentation: Computer Forensics Machine, New York Police Department.
  • 2014 Presentation: Mobile Forensics Investigations, Polisen, Stockholm County Police, United States Department of State.
  • 2014 Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.
  • 2014 Mock Class: Mobile Forensics - Using Smartphones to Catch Criminals, Pace University, New York, NY.
  • 2014 Invited Speaker, Privacy is Dead and It’s Not the NSA’s Fault, Harrah’s, Atlantic City.
  • 2014 Invited Speaker, What to do when you have been breached, Pace Global Center for Governance, Reporting, and Regulation, New York, NY.
  • 2014 Invited Speaker, Skimmer Scams, ACCA USA.
  • 2013 Invited Speaker, What to do when hackers attack you, New York Law School, New York, NY.
  • 2013 Presentation, Cybersecurity Initiatives, Congressman Peter King, Massapequa Park, NY.
  • 2013 Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.
  • 2013 Host, Women of the HTCIA, HTCIA Northeast Chapter, Pace University, New York, NY.
  • 2013 Invited Speaker, What to do when your data has been breached, Certified Compliance and Regulatory Professional Certification, Pace University, New York, NY.
  • 2013 Host & Speaker, Information Assurance & Cloud Computing, Chinese Ministry of Industry and Information Technology, Pace University, New York, NY.
  • 2013 Invited Speaker, Mobile Forensics Workshop, Community Colleges, Pace University, White Plains, NY.
  • 2013 Invited Speaker, Course Technology, Big Brother is Watching You, NYU, New York, NY.
  • 2013 Invited Speaker, Thinking Like An Investigator, Pace Computer Club, New York, NY.
  • 2013 Invited Speaker, Harvard Business Review, After an Attack: Protecting Your Data, Your Customer and Your Reputation, Webinar.
  • 2013 Invited Speaker, HTCIA Connecticut Chapter, Skimmer Fraud, Quinnipiac University, CT.
  • 2013 Invited Online Lecturer, Android Forensic Investigations, University College Dublin.
  • 2012 Panelist, Cybercrime Symposium, Pace University, New York, NY.
  • 2012 Workshop Host, Mobile Forensics Workshop, Pace University, Pleasantville, NY.
  • 2012 Workshop Host, Mobile Forensics Workshop, Pace University, New York, NY.
  • 2012 Invited Speaker,HTCIA Northeast Chapter, Fourth Amendment and Digital Forensics, MetLife, Queens, NY.
  • 2012 Invited Speaker,InfraGard TV, Network Security Breaches, Online.
  • 2012 Panel Moderator, Pace University Criminal Justice Society Panel Discussion on Implications of SOPA/PIPA, Pace University, New York, NY.
  • 2012 Judge, High School Computer Forensics Symposium, Pace University, New York, NY.
  • 2011 Invited Speaker, Open House, Computer Forensics Studies, Pace University, New York, NY.
  • 2011 Invited Speaker, High School for Criminal Justice, Computer Forensics High School Program, Pace University, NY.
  • 2011 Workshop Host,Career Shadowing Day for St. Anthony’s High School,Pace University, New York, NY.
  • 2011 Invited Speaker, InfraGard TV, Trends in Computer Crime, Online.
  • 2011 Workshop Host,SICI Computer Forensics Workshop, Pace University, Pleasantville, NY.
  • 2011 Invited Speaker, InfraGard TV, Trends in Computer Crime, Online.
  • 2011 Judge, High School Computer Forensics Symposium, Pace University, New York, NY.
  • 2011 Invited Speaker, MetTel Presentation on Network Forensics, New York, NY.
  • 2011 Panelist,Westchester County Association, Cyber Fraud on the Rise, Tarrytown, NY.
  • 2011 Invited Speaker, Tech Talk on Threats to Our National Security, Pace University, New York, NY
  • 2011 Panelist, Mobile Safety, Pace University, New York, NY.
  • 2010 Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Online Reconnaissance in Computer Forensics, Intrepid Air & Space Museum, NY.
  • 2010 Invited Speaker, InfraGard TV, Computer Forensics, Online.
  • 2010 Judge, High School Computer Forensics Symposium, Pace University, New York, NY.
  • 2009 Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Introduction to Computer Forensics, Towson University, MD.
  • 2009 Judge, High School Computer Forensics Symposium, Pace University, New York, NY.
  • 2008 Invited Speaker, Prentice Hall Information Technology Symposium for Educators, Developing a Computer Forensics Curriculum, Mohegan Sun, CT.
  • 2008 Judge, High School Computer Forensics Symposium, Pace University, New York, NY.

 
Home
Education
Teaching
Publications/Media
Awards
Groups

 

Contact

Pace University
Seidenberg School
of CSIS
163 William Street,
Room: #204
New York,
NY 10038
(212) 346-1005