Cloud Architect, CTO of tamCloud
Mike is the co-founder and CTO of tamCloud – a leading provider that offer hosted virtual desktops (not based on VMware or Citrix), servers, storage, and other cloud services worldwide.
Mike is also an advisor to the Board of Directors of various companies he finds innovative, including ATS whose “security products are a paradigm shift in the otherwise corrupt world of security; where one has to wonder if such products are either intentionally designed not to work or are so ineptly architected that they perpetuate the very problems an entire industry around them, allegedly exists to solve”.
Mike holds numerous industry certifications such as the prestigious Cisco Certified Internetwork Expert (CCIE# 7226), Cisco Technology Solutions Specialist (TSS), Linux LPIC1 certification, HP Master Accredited Systems Engineer (MASE), Trend Micro Certified Security Expert (TCSE), Microsoft Certified Systems Engineer (MCSE), VMware Sales Professional (VSP), VMware Technical Sales Professional (VTSP), VMware Certified Professional 3/4/5 (VCP #26676), Hitachi Sales Qualified Professional (HDS-SQP), EMC SE Accreditation 2010 (EMC-SEA), EMC Technology Architect (EMC-TA) RSA – CSE/SecurID, CSE/enVision, CSE/DLP, Compellent – CCIP, CCSA, Riverbed Certified Solutions Professional (RCSP), Quest Software vWorkSpace Certified Administrator, Nexenta CNA (#3019566), Nexenta CNSP (#7031053) and has a Juris Doctor (J.D.) degree in law from California Southern University.
Curtis K. S. Levinson
CDP, CISSP-CAP, CBCP, MBCP, CCSK
Private Consultancy and United States Cyber Defense Advisor to NATO
Mr. Levinson has over 25 years of focused experience in Cyber Security and Information Assurance. He is a highly experienced advisor, risk assessor and technology architect specializing in all phases of the security engineering process including regulatory compliance, policy formulation, cyber attribution and forensics, risk analysis, network/system hardening and resilience, implementation, testing, certification and accreditation, operations, training and managing the security of information and telecommunications systems in a wide variety of environments.
Mr. Levinson is a frequent consultant, author and lecturer, within the United States and internationally, on a variety of topics related to secure technology, telecommunications, regulatory compliance, counter-terrorism and homeland security. He is an adjunct lecturer for many graduate programs in cyber security and counter-terrorism and a member of the Capitol Technology University Board of Trustees.
Mr. Levinson’s professional certifications include: Master Business Continuity Planner, Certified Data Professional, Certified Information Systems Security Professional, Certified Business Continuity Planner and Certified Homeland Security Professional. He is a graduate of the American University in Washington, DC and the London School of Economics in London, England. He has also completed post graduate course-work at the National War College, Columbia University, and the Wharton School of Business.
Chief Executive Officer of Vir2us
Ed is presently the Chief Executive Officer of Vir2us, Inc. Ed is a recognized expert in next-generation cyber security and secure computing. He is one of the chief architects of the patented Vir2us Immunity technology.
From 2002 to 2008 Ed was a Managing Partner of Marin International, a global venture and consulting firm with a technology R&D practice. Clients included the labs of top R&D firms such as British Telecom, Philips, Nokia, Telstra and other global technology companies.
From 1997 to 2002, Ed was the Founder and an executive at QuantumShift, a technology and services business in the enterprise software and SAS space. During his tenure at QuantumShift, the company grew to over $25MM in annual sales and attracted venture financing from the Mayfield Fund, Texas Pacific Group, Thomas Weisel Partners, and others.
From 1988 to 1996 Ed was Founder and CEO of MTC Companies. MTC had record industry growth and profitability until its acquisition by NetSource International in 1996. Wtih less than $100K invested capital, MTC achieved global brand recognition, over $100 million in annual revenue, and a pre-IPO valuation of $380 million.
From 1983 to 1988 Ed headed up the technology team in the start-up of Centex Telemanagement. Centex was funded by Sierra Ventures. Called “the darling of Wall Street” by Forbes magazine, Centex had one of the most successful public offerings of the 1980s. Centex was aquired by Metro Fiber Systems in 1992.
From 1974 to 1983 Ed was intrumental in the start up of Digital Telephone Systems as a Systems and Network Design Engineer. The company achieved over $100 million in annual revenue and was acquired by Fortune 50 company Harris Corporation.
Lt. Col. (ret) William Hagestad II
Expert on the Chinese Army & Government Information Warfare
LtCol Hagestad is an internationally recognized & respected authority on the People’s Republic of China’s use of computer and information network systems as a weapon. He has spoken on 6 continents and continues as an internationally recognized subject matter expert on China’s hegemony in the information age.
In 2012, LtCol Hagestad’s first book “21stCentury Chinese Cyber Warfare” debuted. In 2013 he published another seminal work about the People’s Republic of China’s Cyber Activities “Operation Middle Kingdom: China’s Use of Computers & Networks as a Weapon System”. In 2014 LtCol Hagestad published both “Chinese Information Warfare Doctrine Development 1994 – 2014”; and, “China’s Plans for Winning Information Confrontation: Important Chinese Information Warfare Articles 信息對抗- Information Confrontation”.
LtCol Hagestad provides current cyber threat assessments to international defense, intelligence and law enforcement entities. He speaks both domestically and internationally on strategic information security threats Chinese Cyber Threat.
LtCol Hagestad’s education includes a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese, University of Minnesota. He earned a Master of Science in Military Strategy from the US Marine Corps Command & Staff College in 2002. He holds a Master of Science in Security Technologies from the College of Science & Engineering, University of Minnesota and a Master of Science in the Management of Technology from the Technological Leadership Institute, University of Minnesota.
Academic Qualifications: MS in Security Technology, University of Minnesota; MS in Management of Technology, University of Minnesota; BA in Mandarin Chinese, Literary Chinese & Modern Japanese, University of Minnesota
Areas of Expertise: Information Security, Cyber Warfare from China, Russia, Iran.
Co-Founder and President, Blue Tech Inc
Mr. Stone has helped guide Blue Tech Inc as an IT systems-integrator for Fortune 500 companies and the US Government. Blue Tech currently provides networks, infrastructure build-outs, Video Teleconferencing, Storage as a Service and Cyber Security implementations. Blue Tech is currently hosting a cyber-security test bed that is being used to test new cyber security applications for OEM’s and clients.
Blue Tech currently holds the following US Government GWAC and IDIQ contracts; NASA SEWP V (three contracts), DHS First Source II (three contracts), US Air Force NetCents II COTS, National Institute of Health CIO-CS, and US Navy Space and Weapons SPAWAR COTS (two contracts).
Blue Tech is an ISO-9001:2008 certified company and has been listed in the Inc 500 and Inc 5000 for the past 10 years. Blue Tech currently provides services on several classified DoD projects.
Mr. Stone’s educational and professional background include: Graduated from Yale University 1975 with a B.S. in Engineering and Computer Science. After graduation from Yale, Mr. Stone was accepted into CIA’s Foreign Intelligence and Para-Military Officer programs and was assigned to CIA’s Directorate of Operations. Mr. Stone served overseas as a case officer for CIA in India, Nepal, the Persian Gulf and southern Europe.
After leaving CIA, Mr. Stone helped found Blue Tech in 1982.
Dr. Mehrdad S. Sharbaf
Chair IEEE Coastal Los Angeles Section
Chair CLAS IEEE Computer Society Chapter College of Business Administration Department Finance/Computer Information Systems Applied Information Management Systems
Mehrdad Sharbaf is the founder of Sharbaf & Associates. His consulting firm is specializing in Enterprise Network Design, Business Intelligence Information Security, Total Quality Information Security Management,Information Systems Security, Network Security, and Strategy Management Technology and Innovation. Also he is an adjunct professor at Loyola Marymount University, and California State University , Dominquez Hills, and Northridge. Mehrdad ‘s background included more than fifteen year’s experience in industry and academic environments, focusing on system integration, reengineering information processing, hardware infrastructure, information security, total quality information security management, business intelligence information security, designing information technology, perform systems-level trade studies, design review preparation and system testing, consulting, researching, teaching, and training.
Academically, Mehrdad studied at the level of the Master of Science in Electrical Engineering discipline emphasizing in computer communications networking, and he studied in information systems discipline at Ph.D. level. He has gained more than 20 years of teaching experience at various educational institutions such as UCLA Extension, Loyola Marymount University (LMU), CSUDH, CSUN, CSULB, and CSULA, . Prior to establishing his consulting business, Mehrdad spent more than 11 years as a senior staff at Teledyne Electronics Technologies. At Teledyne he received a corporate award for reengineering information process within manufacturing environment to achieve business objectives. He is an active senior member of IEEE Society, ACM professional member, and chair of IEEE CLAS Computer Society. He has authored three publications in the quantum cryptography topic. His research interests are in computer systems security, computer communications networking, quantum information networks, quantum cryptography, and quantum information processing.
Google Scholar- https://scholar.google.com/citations?user=5hZnkZEAAAAJ&hl=en