Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Most Influential People in Security

By Diane Ritchey
secfeaturestory
December 1, 2010

Security Organizations

 

Gerry CauleyGerry Cauley,

President and CEO of the North American Electric Reliability Corporation (NERC)

 

Without question, the cyber and physical security of the North American power grids is center stage in the efforts to ensure critical infrastructure resilience in the United States and Canada. Every aspect of modern life depends on electricity, from banking and finance to transportation, from education and social services to operation of our military complex, from hospitals and public safety to communications. As President and CEO of the North American Electric Reliability Corporation (NERC), Gerry Cauley is ultimately charged with ensuring the reliability of the bulk power system (electric grid) in North America. Consequently, Cauley leads the effort to improve physical and cyber security for the bulk power system by initiating leadership, supporting security practitioners and moving the electric sector forward by addressing threats to critical infrastructure. NERC, through Cauley’s leadership, coordinates electric industry activities designed to protect the industry’s critical infrastructure from physical and cyber threats. Security is addressed in the daily operation of the electricity grid and in future planning of the grid. NERC operates the industry’s Electricity Sector Information Sharing and Analysis Center (ESISAC) under the U.S. Department of Homeland Security and Public Safety Canada. ESISAC gathers information about security-related threats and incidents, and communicates it to government authorities.

 

Dr. Lou MarcianiDr. Lou Marciani,

Director, National Center for Spectator Sports Safety and Security

 

As Director of the National Center for Spectator Sports Safety and Security (NCS4), Dr. Lou Marciani works to provide a mechanism for building sport security awareness and improving sport security policies and procedures to be prepared and to protect our sports facilities, and most importantly, fans and their families. Dr. Marciani’s vision of the NCS4 Center and Laboratory is to serve as a center focused on research, education and outreach efforts in the spectator sport industry. His goal is to develop the training tools necessary to meet the operational and technological needs of facilities and security managers at sports facilities, both public and private. His reach includes the public and private sector, from the State and Federal DHS, to the various professional and collegiate leagues to private industries. In August, Dr. Marciani conducted the First Annual National Center for Spectator Sports Safety and Security (NCS4) Conference in New Orleans. In addition, Dr. Marciani and the Center, the Department of Homeland Security and the National Association of Collegiate Directors of Athletics (NACDA) developed a Sport Event Risk Management Workshop to be conducted for more than 5,400 professional at 80 NCAA institutions. He has and continues to influence the entire safety and security business, not only the sports world but the domino effect of college campuses and federal, state and local municipalities where the precedent set by the standards in the spectator sport world influence other vertical markets. 

 

James RatleyJames Ratley,

President, Association of Certified Fraud Examiners

 

The 55,000 members of the Association of Certified Fraud Examiners (ACFE) work to reduce business fraud worldwide and to inspire public confidence in the integrity and objectivity of the profession. James D. Ratley is president of the ACFE, the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. The ACFE awards the Certified Fraud Examiner (CFE) credential to denote proven expertise in fraud prevention, detection and deterrence. Ratley began his career working in law enforcement after graduating from the University of Texas at Dallas with a bachelor’s degree in business administration. He joined the Dallas Police Department as an officer in 1971 and was assigned to several department divisions including vice, child abuse and internal affairs. He was a member of numerous department task forces that concentrated on major fraud cases. In 1986, Ratley left the police department to join Wells and Associates, a forensic accounting practice. In 1988, he was named program director for the ACFE and oversaw all aspects of the ACFE’s training and education programs. Ratley became president of the ACFE in 2006. He works to promote the ACFE to the public and other professional organizations and also continues to assist in the development of anti-fraud products and services to meet ACFE members’ needs. 

 

Hord TiptonHord Tipton,

Executive Director, International Information Systems Security Certification Consortium

 

Headquartered in the U.S. with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certifications Consortium Inc. [(ISC)2] is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. Hord Tipton is responsible for ensuring that members receive value for their dollar, and he continually strives to improve (ISC)2 programs and services to meet the needs of members. Tipton works to maintain a reputation built on trust, integrity and professionalism. Membership is an elite network of nearly 60,000 certified industry professionals worldwide. During a time when corporations and governments are cutting back on conference and seminar attendance, (ISC)2 is expanding its services to adapt, including introduction of one-day events and half-day online seminars offering continuing education credits. Also, the SecurityTALK Web channel provides a searchable multimedia library. (ISC)2 is also developing new certifications to serve changing market needs, such as the Certified Secure Software Lifecycle Professional. Tipton has the distinction of being the only CIO to ever have been ordered by a Federal Judge to disconnect 85,000 people (an entire Cabinet agency) from the Internet. It took him three years to get them reconnected to the judge’s satisfaction. The President gave him the Presidential Distinguished Service Award for his efforts. Tipton was also the first CIO to obtain the CISSP certification.

 

Think Tanks/Universities

 


Professor James P. ChandlerProfessor James P. Chandler,

President, National Intellectual Property Law Institute

 

An intellectual property law scholar for more than 20 years, James Chandler is president of the National Intellectual Property Law Institute, where he advances the study and practice and identifies emerging issues of intellectual property law in the U.S. and Canada. Chandler has compiled an enviable academic record while distinguishing himself in numerous areas of both U.S. and international law. He is emeritus professor of law at George Washington University School, chairman of the Chandler Law Firm PLLC and a professional arbitrator. The Science and Technology Section of the American Bar Association owes its founding, in part, to Chandler; and he served as a member and as section adviser of the Section Council, which addresses legal problems and complications arising from the creation of new technologies. Chandler has lent his expertise to help create the Computer Law Association of America. Chandler’s advice and counsel are sought regularly from intellectual property lawyers and professionals, judges and government representatives. Chandler is the original author of the Economic Espionage Act of 1996 and worked closely with the U.S. government to support enactment of the legislation, which makes the theft or misappropriation of a trade secret a federal crime. He is also the original author of the National Trade Secrets Act.

 

Frank J. CilluffoFrank J. Cilluffo,

Director, George Washington University Homeland Security

Policy Institute

 

Frank J. Cilluffo directs the multi-disciplinary Homeland Security Policy Institute (HSPI) at The George Washington University, where he also serves as an associate vice president. HSPI is a nonpartisan “think and do tank” that builds bridges between theory and practice to advance homeland security. Cilluffo chairs HSPI’s Ambassador Roundtable Series on International Collaboration to Combat Terrorism and Insurgencies, which has engaged more than 30 ambassadors and Cabinet-level officials in an ongoing dialogue on counterterrorism efforts. He also moderates the Institute’s Policy and Research Forum series, which has included Cabinet secretaries, including former Secretary of Homeland Security Tom Ridge as its most recent guest.  Long before the most recent wave of threats came to the fore, Cilluffo identified and warned of important gaps and shortfalls in American homeland security – including his work on jihadi radicalization in various contexts such as in prisons and over the Internet, both homegrown and overseas. This includes extensive research on how the threat has metastasized, to include al-Qaeda senior leadership and its affiliates, and likeminded terrorist organizations such as Tehrik-i-Taliban and Lashkar-e-Taiba. 

 

James A. LewisJames A. Lewis,

Center for Strategic and International Studies

 

A former tactical practitioner and current industry spokesperson, James Lewis of the Center for Strategic and International Studies (CSIS) has claimed a special place in the industry as an honest broker in depicting both the strategic and tactical cyber security challenges our country faces. He provides contemporary perspectives from multiple angles to promote understanding of trends, statistics and forecasts, and to forge potential solutions. A senior fellow at CSIS, Lewis directs the Technology and Public Policy Program. His research involves innovation and economic change, Internet policy and cyber security, space programs and intelligence reform. Before joining CSIS, he was a member of the U.S. Foreign Service and Senior Executive Service, where he worked on national security and technology-related issues. Lewis has authored numerous publications since coming to CSIS, including “Securing Cyberspace in the 44th Presidency,” which was well received across both the public and private sectors and helped guide policy making. He has had direct national-level input on such topics as cyber war thresholds, supply chain risk, Internet security, cyber workforce strategy, intellectual property protection, cyber crimes, the nation’s competitiveness, the country’s innovation challenges and the global science and technology comparative advantage. He is a well-published, highly regarded and recognized bi-partisan thought leader.


 

Dr. Graham SpanierDr. Graham Spanier,

President, Pennsylvania State University

 

As president of Pennsylvania State University for 15 years, Graham Spanier has worked to open doors of communication and understanding between academia, industry and many government agencies. In 1995 he began to work with the FBI and CIA to establish cooperative approaches to link higher education and national security, which led in 2004 to creation of the National Security Higher Education Advisory Board with Spanier as its chairman since inception. Consisting of presidents and chancellors of prominent U.S. universities, the Advisory Board fosters outreach and promotes understanding between higher education and the FBI. Spanier also serves on the National Counterintelligence Working Group and on the Board of Advisors of the Naval Postgraduate School and the Naval War College. Spanier oversees the Applied Research Laboratory at Penn State, the advanced research arm of the university that does about $200 million a year in defense-related research, which ranks Penn State as second in the nation in defense-related research. Spanier has consulted with the Secretary of Defense, the Chief of Naval Operations, military personnel leaders and others on policy matters related to defense research, personnel and other topics. He has been a keynote speaker for the FBI at seminars, speaking about national security and higher education and on topics of counterterrorism, counterintelligence and cyber security. 

 

KEYWORDS: department government organizations Homeland Security Security security associations security intelligence security metrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Previous 1 2 3 4 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • sec1210featureonedoor

    One Door at a Time

    See More
  • MarkMtrends

    New Threats Demand New Alliances

    See More
  • secweeklogo2

    Introducing: Security Week

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!