Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

CISA names 23 members to new Cybersecurity Advisory Committee

business-people-freepik1170.jpg
December 2, 2021

Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), announced the appointment of the first 23 members of the Agency’s new Cybersecurity Advisory Committee, a group that will advise and provide recommendations to the Director on policies, programs, planning and training to enhance the nation’s cyber defense.


“We’re at a pivotal moment in our history — one that demands we think anew about ensuring the security and resilience of our digital infrastructure in the face of increasingly sophisticated cyber threats. That’s why I couldn’t be more pleased that some of our nation’s best thinkers have agreed to join our Cybersecurity Advisory Committee,” said CISA Director Jen Easterly. “I look forward to partnering with these distinguished leaders from across the industry, academia, and government to tackle some of the most pressing issues of our time.”


The Committee will examine and make recommendations on various topics collectively aimed at strengthening CISA and more broadly reshaping the cyber ecosystem to favor defense. These topics include growing the cyber workforce; reducing systemic risk to national critical functions, igniting the power of the Hacker community to help defend the nation, combating misinformation and disinformation impacting the security of critical infrastructure; and transforming public-private partnership into true operational collaboration.


The members appointed today are some of the nation’s leading experts on cybersecurity, technology, risk management, privacy, and resilience. They bring a diverse set of experiences and perspectives and will impanel a set of subcommittees focused on addressing key focus areas, including the topics highlighted above. In addition to the members noted below, Director Easterly has asked National Cyber Director Chris Inglis to join her in establishing the Advisory Committee and setting its core objectives and priorities.


The members of the Committee are:

  • Mr. Steve Adler, Mayor, City of Austin, Texas
  • Ms. Marene Allison, Chief Information Security Officer, Johnson & Johnson
  • Ms. Lori Beer, Chief Information Officer, JPMorgan Chase
  • Mr. Robert Chesney, James A. Baker III Chair in the Rule of Law and World Affairs, University of Texas School of Law
  • Mr. Thomas Fanning, Chairman, President and CEO, Southern Company
  • Ms. Vijaya Gadde, Legal, Public Policy & Trust and Safety Lead, Twitter
  • Dr. Patrick Gallagher, Chancellor, University of Pittsburg
  • Mr. Ronald Green, Executive Vice President and Chief Security Officer, Mastercard
  • Ms. Niloofar Razi Howe, Board Member, Tenable
  • Mr. Kevin Mandia, Chief Executive Officer, Mandiant
  • Mr. Jeff Moss, President, DEF CON Communications
  • Ms. Nuala O’Connor, Senior Vice President & Chief Counsel, Digital Citizenship, Walmart
  • Ms. Nicole Perlroth, Cybersecurity Journalist
  • Mr. Matthew Prince, Chief Executive Officer, Cloudflare
  • Mr. Ted Schlein, General Partner, Kleiner Perkins; and Caufield & Byers
  • Mr. Stephen Schmidt, Chief Information Security Officer, Amazon Web Services
  • Ms. Suzanne Spaulding, Senior Advisor for Homeland Security, CSIS
  • Mr. Alex Stamos, Partner, Krebs Stamos Group
  • Dr. Kate Starbird, Associate Professor, Human Centered Design & Engineering, University of Washington
  • Mr. George Stathakopoulos, Vice President of Corporate Information Security, Apple
  • Brigadier General Alicia Tate-Nadeau (ARNG-Ret.), Director, Illinois Emergency Management Agency
  • Ms. Nicole Wong, Principal, NWong Strategies
  • Mr. Chris Young, Executive Vice President of Business Development, Strategy, and Ventures, Microsoft


The CISA Cybersecurity Advisory Committee will hold its first meeting on December 10, 2021, where Members will be sworn in, discuss their scope of work, and develop a plan for tackling key areas of focus. Due to COVID restrictions, members of the media and public may attend virtually. 

Members of the media and public that wish to attend virtually need to RSVP to CISA_CybersecurityAdvisoryCommittee@cisa.dhs.gov by December 8, 2021.

For more information about the CISA Cybersecurity Advisory Committee and the biographies of Committee members, visit cisa.gov/cisa-cybersecurity-advisory-committee.

KEYWORDS: cyber security data management enterprise resilience privacy risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-graphic

    13 new members join CISA's Cybersecurity Advisory Committee

    See More
  • airplane

    New members of Aviation Security Advisory Committee announced by TSA

    See More
  • Airplane

    TSA Announces New Members of Aviation Security Advisory Committee

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • September 23, 2025

    From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

    ON DEMAND: When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing