Expert in Software, Security
Expert is widely credited with providing one of the first technical descriptions of a technique now known as "phishing" to gain access to systems and personal information.
Expert has given presentations, written publications, and consulted with major corporations in areas concerning system security.
Expert may consult nationally and internationally, and is also local to the following cities: Indianapolis, Indiana - Muncie, Indiana - Anderson, Indiana - Columbus, Ohio - Cincinnati, Ohio - Dayton, Ohio - Springfield, Ohio - Hamilton, Ohio - Lexington, Kentucky - Louisville, Kentucky
|Year: 1983||Degree: BS||Subject: Systems Analysis||Institution: Miami University|
|Year: 1989||Degree: MBA||Subject: Management||Institution: University of Cincinnati|
|Years: 1998 to Present||Employer: Undisclosed||Title: VP||Department: Software Development||Responsibilities: He is a founder, owner and leader of a software development team, focusing on developing software for the health care, government, and banking industry.|
|Years: 1983 to 1998||Employer: Hewlett-Packard||Title: Technical Consulting Manager / Consultant||Department: Professional Services||Responsibilities: He managed a nationwide team of consultants and software engineers, who focused on assisting in the software implementation and support at some of America's largest corporations.|
|Expert Witness Experience|
|He acted as an expert witness in a trial regarding the security of a website which stored student papers. His role was to examine the security of the website, and to provide an expert opinion of risks and holes in the security of the system, as well as to provide technical support for a party to the suit.|
|Training / Seminars|
|He has delivered presentation at national and regional conferences of users groups, regarding security and artificial intelligence.|
|He makes recommendations regularly to clients regarding appropriate technology purchases for servers, PCs, and networking equipment.|
|He is widely credited with one of the first technical descriptions and publications mentioning a hacking technique now referred to as "phishing".|