Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementTop Cybersecurity Leaders

SPECIAL REPORT

Dr. Bryan Stoker — Top Cybersecurity Leaders 2026

The Art of Defense

By Rachelle Blair-Frasier, Editor in Chief
Dr. Bryan Stoker
Background Image / Tetiana Voitenko / iStock / Getty Images Plus via Getty Images. Bio image courtesy of Stoker
March 3, 2026

When considering cybersecurity and martial arts, one might think they don’t have a lot in common, however both require involved levels of discipline and resilience in order to succeed and rise to the challenges presented. This is something Dr. Bryan Stoker knows all too well.

Stoker, a Third-Degree Taekwondo Black Belt, Second-Degree Choi Kwang Do Black Belt and First-Degree Ninjutsu Black Belt, has utilized his years of martial arts training throughout his equally impressive security career.

Stoker currently serves as the Chief Technology Officer at Dispersive Holdings, Inc. (Dispersive), where he leads the company’s technology strategy and innovation focused on advanced network security and cyber resilience. Prior to joining Dispersive in 2025, Stoker spent more than four decades at the National Security Agency (NSA), where he served in multiple senior roles across operations, cybersecurity, and enterprise technology.

During his time as Senior Electrical Engineer and Technical Director in several organizations within the NSA, Stoker led the development and deployment of dozens of major intelligence and cybersecurity systems, including SIGINT signal processing and geolocation platforms, wireless vulnerability assessments and AI-driven technology transitions.

Prior to Dispersive, Stoker also served three years as Technical Director of USCYBERCOM J2. There he architected a global secure networking framework designed to be quantum-resistant and resilient across both low-bandwidth and high-capacity environments.

“The kind of discipline that it takes to reach your goals is basically what I think of as ‘bulldog tenacity’,” Stoker says. “You just bite into it, and you don't let go until you accomplish it, and that's what I did.”

Taking Chances

Stoker was studying Electronics Engineering at North Carolina State University when he happened upon a posting on a bulletin board announcing the National Security Agency was going to be conducting interviews. Stoker was intrigued and decided to take a chance.

You have to have that discipline, that refusal to give up. It is extremely important if you're going to actually accomplish anything.

“I thought, oh that would be cool … I’ll get to learn all the James Bond stuff,” he recalls with a laugh. That chance turned into 41-years with the NSA.

Throughout his career, Stoker has gained invaluable experience including a master’s degree in electrical engineering and a doctorate in business as well as a deep expertise in applied cryptography, large-scale systems engineering, and operational cybersecurity. During his time in the government, Stoker says he and his teams were able to accomplish a lot of things that they were told couldn’t be done.

“It was kind of my specialty,” he recalls. “I don't even remember how many briefings I would be giving where someone would say ‘that's not possible, that can't be done’ and I would say ‘this is actually an informational briefing because I already did it. ’You have to have that discipline, that refusal to give up. It is extremely important if you're going to actually accomplish anything.”

Among his many achievements, Stoker created the CRYSTALVISTA (CV) initiative, a cross-agency innovation program for secure communications and data obfuscation, which won a Joint Capability Technology Demonstration (JCTD) from the Office of the Secretary of Defense.

“With CRYSTALVISTA, almost every aspect of it fundamentally changes the approach on how you do cybersecurity,” he says.

Now retired from the NSA, Stoker says he’s excited to be embarking on a new chapter in his cybersecurity career outside of the government and inside the industry. Looking back on his career, Stoker offers some insights to those looking to get into the industry. At Dispersive, Stoker says the mission feels like the natural extension of both his martial arts discipline and his government career.

“In martial arts, you don’t wait to be hit. You position yourself so the strike never lands cleanly. Networking should be the same way,” Stoker says. “Instead of assuming the network is safe, you design it to survive attack. That’s what drew me to Dispersive. It’s not incremental improvement. It’s a fundamentally different approach.”

“In my opinion, there's two things you really need to do: learn networking and how they operate — not just technology, not just IT — you need to know some of the theoretical aspects of the packet communications and things. Then you also need to branch out and learn about the things that would affect the security of those kinds of things.”


Security’s Top Cybersecurity Leaders 2026
KEYWORDS: Chief Information Security Officer (CISO) enterprise security NSA security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Brian Harrell

    Brian Harrell — Top Cybersecurity Leaders 2026

    See More
  • Jay Gonzales — Top Cybersecurity Leaders 2025

    Jay Gonzales — Top Cybersecurity Leaders 2025

    See More
  • Jason Lau — Top Cybersecurity Leaders 2025

    Jason Lau — Top Cybersecurity Leaders 2025

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing