Dr. Kellep Charles
Dr. Charles specializes in information security, data privacy, Internet safety and legal issues in cybersecurity. He speaks frequently before professional, industry, academic and government groups as well as appeared on multiple media outlets about information and current event topic related to cybersecurity. Dr. Charles completed his Doctorate in Cybersecurity at Capitol Technology University with a concentration in Artificial Neural Networks (ANN) and Human Computer Interaction Security (HCISec). He also holds a Master of Science in Telecommunication Management from the University of Maryland University College and a Bachelor of Science in Computer Science from North Carolina Agriculture and Technical State University. He has served as an Adjunct Professor at Capitol Technology University in their Computer Science & Cybersecurity department. His industry certifications include Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Cisco Certified Network Associate (CCNA), Certified Information Systems Auditor (CISA), National Security Agency – INFOSEC Assessment Methodology (NSA-IAM) and Information Technology Infrastructure Library version 3 (ITILv3) to name a few. Dr. Charles served on the National Society of Black Engineers (NSBE) Alumni Extension (AE) and is also a member of the National Academies’ Forum on Cyber Resilience as well as many other government, industry, and not-for-profit advisory panels. Publications: Charles, K. (2014). Cloud Vulnerability-Scanning Options for Enterprises. USCyberSecurity Magazine (Print and Web). Charles, K. (2012). Comparing Enterprise Data Anonymization Techniques. TechTarget Magazine - http://searchsecurity.techtarget.com/tip/Comparing-enterprise-data-anonymization-techniques Charles, K., (2004). Decoy Systems: A New Player in Network Security and Computer Incident Response. International Journal of Digital Evidence. Winter 2004, Volume 2, Issue 3 Book Reviewer Bidgoli, H. (2006). Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection and Management. Volume 3. John Wiley & Sons.