• Home
  • Events
  • Quals
  • Insights
  • Book
  • More
    • Home
    • Events
    • Quals
    • Insights
    • Book
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Events
  • Quals
  • Insights
  • Book

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

Qualifications

Certifications and Competencies

Cybersecurity Leadership & Management

Certification involves directing and overseeing cybersecurity strategies, teams, and operations to protect an organization's assets, while ensuring alignment with business goals and industry best practices

Certified Information Systems Security Professional (CISSP)

ISC2

Information Systems Security Management Professional (ISSMP)

ISC2

Certified Chief Information Security Officer (CCISO)

EC-Council

Certified Information Security Manager (CISM)

ISACA


Privacy and Data Protection

Certification focuses on safeguarding personal and sensitive data by ensuring compliance with privacy laws and regulations, and implementing measures to prevent unauthorized access or misuse of information

Certified Information Privacy Manager (CIPM)

IAPP

Certified Data Privacy Solutions Engineer (CDPSE)

ISACA

Certified Pro in Healthcare Information and Management Systems (CPHIMS)

HIMSS

Certified Network Defense Architect (CNDA)

EC-Council


Risk Management, Governance, and Compliance

Certification involving identifying, assessing, and mitigating risks while ensuring adherence to regulatory requirements and implementing governance frameworks to align IT and security practices with business objectives

Certified in Risk and Information Systems Control (CRISC)

ISACA


Cloud Security & Knowledge

Certifications encompassing securing cloud environments by protecting data, applications, and infrastructure while ensuring compliance and leveraging cloud-specific security best practices

Certificate in Cloud Security Knowledge (CCSK)

CSA

Cloud+

CompTIA

Certified Cloud Practitioner

AWS

Academy Accredited Educator

AWS

Secure Cloud Professional (CSCP)

CompTIA

Cloud Admin Professional (CCAP)

CompTIA


Ethical Hacking & Incident Response

Certifications that focuses on proactively identifying vulnerabilities through authorized testing and responding to cyber threats by detecting, mitigating, and recovering from security incidents

Certified Ethical Hacker (CEH)

EC-Council

Certified Incident Handler (ECIH)

EC-Council

Junior Penetration Tester (eJPT)

eLearnSecurity

Cybersecurity Analyst (CySA)

CompTIA


Project Management

Certification in planning, organizing, and overseeing projects to ensure they are completed on time, within scope, and within budget, while meeting specific goals and objectives

Project+

CompTIA


ITIL & Service Management

Focus on aligning IT services with business needs, ensuring efficient service delivery, and continuously improving IT processes through a structured framework

ITIL 4 Foundation

AEXLOS


Foundational & General Cybersecurity

Certifications related to core foundational knowledge in cybersecurity and IT

Security+

CompTIA

Network+

CompTIA

A+

CompTIA

IT Operations Specialist (CIOS)

CompTIA

Security Analytics Professional (CSAP)

CompTIA

Secure Infrastructure Specialist (CSIS)

CompTIA

Certifications presented here are all valid and active

Advisory Board Membership

Western Governors University

Serve on the Advisory Board for WGU’s Center for Cyber Education (CCE), providing

senior executive-level guidance on the strategic direction of WGU’s cybersecurity

programs.


  • Collaborate with industry, government, and educational leaders to align WGU's cyber education offerings with evolving cybersecurity workforce needs and trends.
  • Advise on the development of degree programs and industry-relevant courses, ensuring the curriculum supports the preparation of agile cybersecurity professionals equipped to address national security threats.
  • Contribute to WGU’s designation as a National Center of Academic Excellence in Cyber Defense (CAE-CD) by ensuring adherence to Department of Homeland Security and National Security Agency (DHS/NSA) standards, promoting excellence in cyber education and training.
  • Engage in strategic planning and partnership development, fostering collaboration between WGU and external stakeholders to address cybersecurity education and workforce development initiatives.

WGU Information Security logo, blue box with white lettering

Publications

Co-Author – Development of a Taxonomy for Artificial Intelligence in Higher Education, ACI, 2024

As artificial intelligence (AI) tools become more widely used in higher  education, we must pay attention to the risks that can emerge. AI projects, whether applied in classroom learning or used for  decision-making regarding admissions, financial aid allocation, or hiring, must include attention to governance and compliance issues, regardless of the project’s scope and scale. Concerns highlighted in this work include transparency, user privacy, data confidentiality, data  integrity, and system availability, however, we note that this is a  non-exhaustive list of risks. In this paper, risk assessment is defined,  and two examples of risk management frameworks, namely the United  States National Institute of Standards and Technology Artificial Intelligence Risk Management Framework and the non-profit humanitarian effort ForHumanity’s Independent Audit of AI, Algorithmic, and  Autonomous Systems are briefly described. We identify characteristics of  AI applications that need to be assessed for vulnerabilities they may present, such as bias and discrimination. This paper aims to facilitate discussion among stakeholders about the risks that may be encountered from using AI in higher education, as well as to suggest ways  developers, decision-makers, and users can mitigate these risks. Much discussion and published literature has focused on risk management  frameworks designed for large organizations or enterprises or frameworks  that do not consider risks specific to AI. We hope that decision-makers carefully consider the risks, perform due diligence when implementing  AI applications, and create a plan for mitigating the risks. This research supports e-learning practice because students and faculty are  embracing AI applications. Leaders and decision-makers in higher education need to be proactive in protecting their varied stakeholders.  The paper asks what risks may be encountered by institutions of higher education when using AI tools and products in the classroom and for various aspects of decision-making and if published frameworks can  mitigate these risks. 

Co-Author – Use of Performance-Based Assessments in Cybersecurity Competencies, NICE, 2023

Our cloud computing solutions are designed to help you reduce costs, increase flexibility, and improve business agility. We offer a range of cloud services, including migration, deployment, and management to help you get the most from your cloud investment.

Co-Author – Closing the Gaps Between Cyber Risk Assessment Mechanisms, Federal News Radio, 2018

Current trends in military cyberspace operations point to a growing  schism between legacy IT provisioning and governance components and the  day-to-day “cybersecurity operations.” This gap results in reactionary  activity — diverting resources to address a threat without fully understanding its potential impact. By using both tools in an integrated  manner (i.e., interlocking cyber fire), cyber operators can normalize emergent cyber threats against ongoing cyber operations to weigh risk and apply appropriate resources, funding and prioritization based on mission need. 

Co-Author – Making the Grade: Hiring the Best and the Brightest..., InfoSecurity Pro Mag, 2017

Imagine if Bill Gates applied for a government job as a cybersecurity analyst. Or WhatsApp founder Jan Koum. Or Michael Karp, founder of Tumblr.


These three technology giants have changed our lives by understanding software development, coding and technology, and applying them in new ways. Yet if they applied for a cybersecurity position in the U.S. government, they would likely be rejected. Why? Because these three multibillionaires never graduated from college and thus lack a mandatory cybersecurity requirement: a four-year college degree.

Peer Reviews

Journal of Autonomous Intelligence, 2024

(eISSN: 2630-5046) is a peer-reviewed interdisciplinary  journal that publishes original research and review articles covering  all aspects of autonomous intelligence with emphasis on artificial  intelligence and robotic self-learning. The Journal seeks to disseminate  findings in the domain of autonomous intelligence by featuring the  latest advancements in the field and state-of-the-art theories,  techniques and implementations. It is aimed at bringing the scientific  discourse and discoveries to a wide international audience by being a  platform for scientists, engineers, researchers and academicians to  share, discuss and advocate new issues and developments in the diverse  spheres of autonomous intelligence. 

JAI

Journal of Infrastructure, Policy and Development, 2024

(eISSN:  2572-7931)  The Journal of Infrastructure, Policy and Development (JIPD)  is a multi-disciplinary, double-blind peer-reviewed journal dedicated  to publishing high-quality articles on infrastructure, economic  development, and public policy. The three words in the journal’s title,  "infrastructure", "development" and "policy" are core to the vision of  this journal.


With its broad scope covering  development-related issues, a novel feature of this journal is that it  covers the whole range of infrastructure, including both "hard" infrastructure and "soft"  infrastructure, where soft infrastructure is broadly defined to include  education system, healthcare system, law enforcement, financial system,  government system as well as other types of public management and  institutional arrangements.


JIPD has a target  audience consisting of academic researchers, industry professional  practitioners, and regulatory institution policymakers. It aims to  provide a reliable platform for the transfer of knowledge and to  facilitate discussions in the areas of development-related policy  initiatives and infrastructure.

JIPD
  • Home
  • Events
  • Quals
  • Insights
  • Book

M4 Consulting LLC

8401 MAYLAND DR, STE S, RICHMOND, VA 23294

Copyright © 2024 M4 Consulting LLC - All Rights Reserved.

Richmond, Virginia

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept