Dr. Arthur Conklin, Associate Professor
Department of Information and Logistics Technology, College of Technology
-
Areas of expertise
- Information security in industrial control systems
- Systems engineering perspectives of computer security
- Secure software engineering
- Information assurance curriculum and instruction
-
Awards
- UH Service Excellence Award, May 12, 2016
-
Publications
- Conklin, Wm. Arthur; “Control Systems Personnel are from Mars; IT Personnel are from Venus”, International Journal of Critical Infrastructure Protection, Fall 2011, DOI 10.1016/j.ijcip.2011.06.004
- Conklin, Wm. Arthur, McLeod, Alexander; “Information Security Foundations for the Interoperability of Electronic Health Records”, International Journal of Healthcare Technology and Management, Volume 11, Number 1-2 / 2010, Pages 104 – 112.
- Nancy R. Mead, et. al; “Making the Business Case for Software Assurance” Special Report, CERT Program, April 2009, CMU/SEI-2009-SR-001, http://www.sei.cmu.edu
- Conklin, Wm. Arthur; McLeod, Alexander, “Introducing the Information Technology Security Essential Body of Knowledge Framework”, Journal of Information Privacy and Security, Vol 5, Issue 2, 2009 Pages 27 - 41.
- Conklin, Wm. Arthur, “Information Security and Small Business”, Visual Communications Journal, Fall 2008.
- Shoemaker, Dan; Conklin, Art, “Finding a Vendor You Can Trust in the Global Marketplace”, Build Security In, US Department of Homeland Security, National Cyber Security Division; Retrieved 2008-08-14, from https://buildsecurityin.us-cert.gov/daisy/bsi/articles/bestpractices/acquisition/1058-BSI.html
- White, G., Conklin, A., “The appropriate use of force-on-force cyberexercises”, Security & Privacy Magazine, IEEE, Volume: 2, Issue: 4, July-Aug. 2004 Pages: 33 – 37
-
Patents
Not available
-
Funded Research
- Conklin, Wm. Arthur (PI), UH sub on BAHEP Wagner-Peyser Grant, $85,000, Feb 2014
- Conklin, Wm. Arthur (PI), University of Houston Faculty Development Improvement Program grant, TEPM Writing Center Project, $24,932, May 2011.
- Conklin, Wm. Arthur (PI), University of Houston Research Grant, SCADA Laboratory Setup, $350,000, September 2010
- Cline, Ray (PI), Conklin, Wm. Arthur (SP), Department of Energy, Smart Grid Energy Training Coalition, response to DE-FOA-0000152, $2.5million over 3 years, July 2010.
- Conklin, Wm. Arthur (PI), Department of Energy, National Energy Sector Cyber Security Office Research (NESCOR), $237,000 over 3 years, August 2010.
- Conklin, Wm. Arthur, Heidar Malki (PI for CoT), Texas Workforce Commission, Meeting Industries’ Critical Workforce Needs Bay Area Houston Economic Partnership – Aerospace Project (build Information Assurance Curriculum) (w/ M. Gibson), $100,824 out of $252K CoT total award, (co-PI for IA curriculum dev piece), April 2007- March 2009
-
Curriculum Vitae
Wm. Arthur Conklin, Ph.D.
waconklin@uh.edu
- Academic Training
Ph.D. Business Administration - Information Systems, 2006
The University of Texas at San Antonio
Dissertation: “Computer Security Behaviors of Home PC Users: A Diffusion of Innovation
Approach”
Electrical Engineer (Space Systems Engineering), 1991
Naval Postgraduate School, Monterey CA
Master of Business Administration (Information Systems), 1999
The University of Texas at San Antonio
Master of Science Electrical Engineering (Space Systems Engineering), 1991
Naval Postgraduate School, Monterey CA
Bachelor of Arts (Biology), 1982
Washington University in St. Louis
- Summary of Work Experience
2012-Present, Associate Professor, University of Houston, College of Technology,
Department of Information, Logistics Technology
2010-Present, Director, Center for Information Security Research and Education, University
of Houston, College of Technology
1998-Present, Principal, Wass House, Inc., Houston, TX
2006-2012, Assistant Professor, University of Houston, College of Technology,
Department of Information, Logistics Technology
2005-2006, Technical Director, Center for Infrastructure Assurance and Security, The
University of Texas at San Antonio
2004-2006, Research Assistant Professor, Center for Infrastructure Assurance and
Security, The University of Texas at San Antonio
2002-2004, Research Scientist III, Center for Infrastructure Assurance and Security, The
University of Texas at San Antonio
1998-2004, Senior Lecturer, Adjunct Faculty, The University of Texas at San Antonio,
College of Business, Information Systems Department
1999-2002, Senior Systems Analyst: USAA, San Antonio, TX
1997-1999, Quality Systems Manager: Harris Corporation, San Antonio, TX
1994-1997, Plant Manager: Standard Industries, San Antonio, TX
1992-1994, Director of Quality, Evans Container, Harvey, LA
1991-1992, Sales Representative, Nalco Chemical Company, Tulsa, OK
1982-1991, Surface Warfare Officer, US Navy, Engineering Duty Officer
Conklin CV, 1/6/2015
2
- Classes Taught
University of Houston
CIS 2337 Introduction to Organizational Security*
CIS 3337 Secure Application Design*
CIS 3351 Intrusion Detection and Incident Response*
CIS 6321 Introduction to Information Systems Security*
CIS 6322 Secure Enterprise Computing*
CIS 6323 Applied Cryptography and Information Systems Security*
CIS 6324 Information Systems Security Risk Assessment*
CIS 6337 Digital Forensics*
CIS 6347 Adv. Digital Forensics*
CIS 6357 Control Systems Security*
CIS 6358 Secure Software Design*
CIS 6359 Penetration Testing*
CIS 6397 Strategic Information Security*
University of Texas at San Antonio
IS 3063 Database Management for Information Systems
IS 3413/IS 4123 Introduction to Telecommunication for Business
IS 4063 Advanced Topics in Information Systems
IS 4143 Wide Area Networks
IS 4163 Advanced Programming Concepts*
IS 4463 Secure Electronic Commerce*
IS 4953 SS-IS: Software Development*
IS 4953 SS-IS: Secure Software Design*
IS 5143 Information Technology*
IS 5193 Software Engineering Management*
IS 5203 Telecommunication Systems*
IS 6103 Information Systems Design and Implementation*
IS 6203 Data Communication and Network Management
IS 6423 Secure Software Design*
IS 6503 Principles of Database Management
IS 6603 Computer Security and Control*
IS 6703 Advanced Business Information Systems*
IS 6973 Software Engineering*
IS 6973 Special Topics in IS
*denotes class where I was lead instructor/designed class.
UH is an NSA/DHS certified Center of Academic Excellence in Information Assurance
Education (CAEIAE) with courseware certified to CNSSI Standards 4011, 4014E, 4016E
UTSA is an NSA/DHS certified Center of Academic Excellence in Information Assurance
Education (CAEIAE)
- Research Interests
Information Security in Industrial Control Systems (SCADA)
Systems Engineering Perspectives of Computer Security
Authentication Systems
Information Asymmetry and Security
Secure Software Engineering
Information Assurance Curriculum and Instruction
Conklin CV, 1/6/2015
3
- Refereed Publications
Conklin, Wm. Arthur; “Control Systems Personnel are from Mars; IT Personnel are from Venus”,
International Journal of Critical Infrastructure Protection, Fall 2011, DOI
10.1016/j.ijcip.2011.06.004
Conklin, Wm. Arthur, McLeod, Alexander; “Information Security Foundations for the
Interoperability of Electronic Health Records”, International Journal of Healthcare Technology
and Management, Volume 11, Number 1-2 / 2010, Pages 104 – 112.
Nancy R. Mead, et. al; “Making the Business Case for Software Assurance” Special Report,
CERT Program, April 2009, CMU/SEI-2009-SR-001, http://www.sei.cmu.edu
Conklin, Wm. Arthur; McLeod, Alexander, “Introducing the Information Technology Security
Essential Body of Knowledge Framework”, Journal of Information Privacy and Security, Vol 5,
Issue 2, 2009 Pages 27 - 41.
Conklin, Wm. Arthur, “Information Security and Small Business”, Visual Communications
Journal, Fall 2008.
Shoemaker, Dan; Conklin, Art, “Finding a Vendor You Can Trust in the Global Marketplace”,
Build Security In, US Department of Homeland Security, National Cyber Security Division;
Retrieved 2008-08-14, from https://buildsecurityin.us-cert.gov/daisy/bsi/articles/bestpractices/acquisition/1058-BSI.html
White, G., Conklin, A., “The appropriate use of force-on-force cyberexercises”,
Security & Privacy Magazine, IEEE, Volume: 2, Issue: 4, July-Aug. 2004 Pages: 33 – 37
- Book Chapters and Other Publications (* - blind reviewed)
Security+ Certification All-in-One Exam Guide, Wm. Arthur Conklin, Gregory B. White, Chuck
Cothren and Dwayne Williams, Fourth Edition, McGraw Hill, 2014, 600 pages, Lead Author.
Computer Security Lab Manual, Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur
Conklin, Fourth Edition, McGraw Hill Technology Education, 2014, 360 pages.
CSSLP Certification All-in-One Exam Guide, Wm. Arthur Conklin, Dan Shoemaker, First Edition,
McGraw Hill Technology Education, December 2013, 650 pages, Lead Author
CASP CompTIA Advanced Security Practitioner Certification Study Guide (Exam CAS-001),
Wm. Arthur Conklin, First Edition, McGraw Hill Technology Education, December 2011, 710
pages, Lead Author
Principles of Computer Security: Security+ and Beyond, Wm. Arthur Conklin, Gregory B. White,
Chuck Cothren and Dwayne Williams, Third Edition, McGraw Hill Technology Education,
November 2011, 730 pages, Lead Author
Security+ Certification All-in-One Exam Guide, Wm. Arthur Conklin, Gregory B. White, Chuck
Cothren and Dwayne Williams, Third Edition, McGraw Hill, October 2011, 600 pages, Lead
Author.
Conklin CV, 1/6/2015
4
Cybersecurity: The Essential Body of Knowledge, Dan Shoemaker, Wm. Arthur Conklin, First
Edition, Delmar Cengage Learning, June 2011, 512 pages.
Computer Security Lab Manual, Vincent Nestler, Wm. Arthur Conklin, Greg White, Second
Edition, McGraw Hill Technology Education, 2010, 400 pages, lead author of on-line resources.
Principles of Computer Security: Security+ and Beyond, Second Edition, McGraw Hill
Technology Education, December 2009, 730 pages, Lead Author
Security+ Certification All-in-One Exam Guide, Second Edition, McGraw Hill, 2008, 592 pages,
Lead Author.
*Threat Modeling and Secure Software Engineering Process. Chapter XXXVI, In Jatinder N. D.
Gupta & S. K. Sharma (Eds.), Handbook of Research on Information Security and Assurance:
Information Science Reference, August 2008
Security+ Certification All-in-One Exam Guide, First Edition, Osbourne-McGraw Hill, 2003, 592
pages.
Principles of Computer Security: Security+ and Beyond, McGraw Hill Technology Education,
2004, 800 pages, Lead Author
Computer Security Lab Manual, McGraw Hill Technology Education, 2005, 400 pages, lead
author of on-line resources.
- Conference Proceedings (* - blind reviewed)
*Conklin, Wm. Arthur; State-based Network Isolation for Critical Infrastructure Systems Security,
Proceedings of the 48th Annual Hawaii International Conference on System Sciences, January
2015.
*Conklin, Wm Arthur; Developing Employable Information Security Workforce Knowledge Skills
and Abilities, Proceedings of the ATMAE 2014 Conference, St. Louis, MO, November 2014.
*Conklin, Wm. Arthur; Cline, Raymond; Roosa, Tiffany; Re-engineering Cybersecurity Education
in the US: An Analysis of the Critical Factors, Proceedings of the 47th Annual Hawaii
International Conference on System Sciences, January 2014.
*Roosa, Tiffany; Conklin, William Arthur; Cassler, Dan; The Changing Face of Technology
Education: Shovel Ready Education, Proceedings of the ATMAE 2013 Conference, New
Orleans, LA, November 20-23, 2013.
Conklin, Wm Arthur; Network Architecture: Important Role in Securing Control Systems,
Industrial Control Systems Joint Working Group (ICSJWG), Gaithersburg, MD, November 11-
13, 2013
*Conklin, Wm. Arthur; Dietrich, Glenn, What the Graduate Needs to Know about Operational
Information Security, Proceedings of the Eighteenth Americas Conference on Information
Systems, Seattle, WA, August 9-12, 2012.
Conklin, Wm. Arthur; A New Paradigm for Industrial Control Systems Operational Security,
Industrial Control Systems Joint Working Group (ICSJWG), Savannah, GA, May 7-9, 2012
Conklin CV, 1/6/2015
5
*Conklin, Wm. Arthur; Pollet, Jonathan; Cumings, Joe; Design of a SCADA Laboratory to
Support IT Classes, Proceedings of the 15th Annual Colloquium for Information Systems
Security Education, Fairborn, OH, June 13-15, 2011,.
*Conklin, Wm. Arthur; Conklin, Susan; Haque, Ikram; Towards Designing Electronic Health
Record Systems: Value of the Long Tail, Proceedings of the Southwest Region Decision
Sciences Institute Conference, Houston, TX, March 2011.
*Conklin, Wm. Arthur; Software Assurance: The Need for Definitions, Proceedings of the 44th
Annual Hawaii International Conference on System Sciences, January 2011.
*Young, D. K., Conklin, W. A., Dietrich, G.; Re-examining the Information Systems Security
Problem from a Systems Theory Perspective, Proceedings of the Sixteenth Americas
Conference on Information Systems, Lima, Peru, August 12-15, 2010.
*Conklin, Wm. Arthur, Emergency Communications Using the Web: Matching Media Richness
to the Situation, Proceedings of the 43th Annual Hawaii International Conference on System
Sciences, January 2010.
*Conklin, Wm. Arthur; Information Security Foundations for Electronic Medical Records,
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, CA,
6-9 August 2009.
*Conklin, Wm. Arthur, “Security in Cyber-Physical Systems”, Workshop on Future Directions in
Cyber-physical Systems Security, Newark, NJ, July 22-24, 2009
Conklin, Wm. Arthur, McLeod, Alexander; “Examining the Information Technology Security
Essential Body of Knowledge”, Proceedings of the 8th Annual Security Conference, Las Vegas,
April 2009.
*Rich, Eliot, Conklin, Wm. Arthur; “Using Systems Models to Improve Information Security
Management”, System Dynamics Winter Conference, Texas A&M University, College Station,
Texas, January 9-10, 2009.
*Conklin, Wm. Arthur; “Information Sharing and Emergency Services: An Examination using
Information Security Principles”, 2008 Americas Conference on Information Systems, 14-17
August 2008, Toronto, ON.
*Conklin, Wm. Arthur; Dietrich, Glenn, “Systems Theory Model for Information Security”,
Proceedings of the 41th Annual Hawaii International Conference on System Sciences, January
2008.
*Conklin, Wm. Arthur, “Why FISMA Falls Short: The need for security metrics”, Proceedings of
the Second Annual Workshop on Information Security and Privacy – WISP 2007, (SIGSEC preICIS),
Montreal, Canada, December 2007.
*Conklin, Wm. Arthur, “The Design Of an Information Security Practicum Course”, Proceedings
of the 2007 International Academy for Information Management - (SIGED pre-ICIS), Montreal,
Canada, December 2007.
Conklin CV, 1/6/2015
6
*Conklin, Wm. Arthur; Jensen, Bradley; “Entity Data Model as a Mistake Proofing Mechanism”,
Academic Days Conference on Business Applications, Relational Databases, and Security,
November 2007.
Conklin, Wm. Arthur, “Why FISMA Doesn’t Work”, GFirst Conference, Orlando, FL, June 2007.
Conklin, Wm. Arthur; “Passwords aren’t Broken:The Authentication System is”, Proceedings of
the 6th Annual Security Conference, Las Vegas, April 2007.
*Conklin, Art; Perry, David, “End user behavior and Internet security”, RSA2007, San Francisco,
CA, February 2007
*Conklin, Art; Dietrich, Glenn; “Secure Software Engineering: A New Paradigm”, Proceedings of
the 40th Annual Hawaii International Conference on System Sciences, January 2007.
*Conklin, Art; “Barriers to Adoption of e-Government”, Proceedings of the 40th Annual Hawaii
International Conference on System Sciences, January 2007.
*Conklin, W. A., “Bottom-Up meets Top-Down: A New Paradigm for Software Engineering
Instruction”, Proceedings of the 10th Annual Colloquium for Information Systems Security
Education, June 5-8, 2006, University of Maryland University College, Adelphi, Maryland, ISBN:
1-933510-98-6, Pages 131-136
*White, Greg; Conklin, Art; “e-Government and Cyber Security: The Role of Cyber Security
Exercises”, Proceedings of the 39th Annual Hawaii International Conference on System
Sciences, 4-7 January 2006, Pages 79-87.
*Conklin, Art; “Cyber Defense Competitions and Information Security Education: An Active
Learning Solution for a Capstone Course”, Proceedings of the 39th Annual Hawaii International
Conference on System Sciences, 4-7 January 2006, Pages 220-225.
Conklin, A.; “The Use of a Collegiate Cyber Defense Competition in Information Security
Education”, 2005 INFORMATION SECURITY CURRICULUM DEVELOPMENT Conference
(InfoSecCD 2005) September 23-24, 2005 Kennesaw State University, Georgia
*Conklin, A., Dietrich, G.; “Modeling End User Behavior to Secure a PC in an Unmanaged
Environment”, 2005 Americas Conference on Information Systems, 11-14 August 2005, Omaha,
NE.
*Conklin, A., Dietrich, G.; “Secure Software Design Principles: A Systems Approach”, 2005
Americas Conference on Information Systems, 11-14 August 2005, Omaha, NE.
*Conklin, A., White, G.; “Graduate Level Assessment Course: A Model for Safe Vulnerability
Assessment”, Proceedings of the 9th Annual Colloquium for Information Systems Security
Education, 6-9 June 2005, Georgia Institute of Technology, Atlanta, Georgia, ISBN: 1-933510-
99-4, Pages 109-114.
*Conklin, A., Dietrich, G., Walz, D., “Password-based authentication: a system perspective”;
Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004., 5-
8 Jan. 2004 Pages:170 – 179 (nominated for best paper)
Conklin CV, 1/6/2015
7
- Work in Progress/Under Review
Conklin, Wm. Arthur; Young, Diana K.; Dietrich, Glenn; Emphasizing Security Within Systems
Development Processes, European Journal of Information Systems.
- Research Funding
Conklin, Wm. Arthur (PI), UH sub on BAHEP Wagner-Peyser Grant, $85,000, Feb 2014
Conklin, Wm. Arthur (PI), University of Houston Faculty Development Improvement Program
grant, TEPM Writing Center Project, $24,932, May 2011.
Conklin, Wm. Arthur (PI), University of Houston Research Grant, SCADA Laboratory Setup,
$350,000, September 2010
Cline, Ray (PI), Conklin, Wm. Arthur (SP), Department of Energy, Smart Grid Energy Training
Coalition, response to DE-FOA-0000152, $2.5million over 3 years, July 2010.
Conklin, Wm. Arthur (PI), Department of Energy, National Energy Sector Cyber Security Office
Research (NESCOR), $237,000 over 3 years, August 2010.
Conklin, Wm. Arthur, Heidar Malki (PI for CoT), Texas Workforce Commission, Meeting
Industries’ Critical Workforce Needs Bay Area Houston Economic Partnership – Aerospace
Project (build Information Assurance Curriculum) (w/ M. Gibson), $100,824 out of $252K CoT
total award, (co-PI for IA curriculum dev piece), April 2007- March 2009
- Service
Service to Department
Program Coordinator for Information Systems Security Program 2011 – present
Chair, Academic Search Committee, ISTE tenure track position, Fall 2007
Member, Academic Search Committee, ISTE non-tenure track position, Spring 2007
Service to College
Director, Center for Information Security Research and Education (CISRE), 2010 –
present
Chair, Graduate Academic Council, Fall 2007 – 2011, Spring 2013 – present
Member Deans Advisory Committee, 2012-2013, 2014-2015 Academic Years.
Assisted in preparation of documents to create the Center for Information Security
Research and Education (CISRE)
Application for coursework certification for NSA recognition of ITEC6324 (CNSS 4016E)
Application for NSA Center of Academic Excellence in Information Assurance Education
Service to Profession/Academic Discipline
Co-Chair, DoD/DHS Software Assurance Forum, Workforce Education and Training Working
Group, 2009 – present (Member, 2006 – present)
Conklin CV, 1/6/2015
8
Mini-Track Chair, Hawaii International Conference on System Sciences (HICSS),
E-Government track, Information Security Minitrack, 2005 – present
Chair, NSA/DHS committee on CAEIAE redesignation scoring, Summer/Fall 2011.
Member, Education and Training Working Group, Department of Homeland Security Industrial
Control Systems Joint Working Group, (DHS ICSJWG)
Reviewer of Committee on National Security System Standards (CNSS) Information Assurance
Standards update for the National Initiative in Cybersecurity Education (NICE)
Academic Coordinator, BlackHat USA 2009, 2010 and DefCon 17, 18
Academic Coordinator, Hacker Halted 2010
Associate Editor, International Conference on Information Systems (ICIS) 2009
Mini-Track Chair, Americas Conference on Information Systems (AMCIS), Software Assurance
mini-track, 2011
Co-Chair, Information security research and applications Track, SAC 2010
Co-Chair, 12th Annual Colloquium for Information Systems Security Education (CISSE)
Friend of the board for National Academy of Sciences, Transportation Research Board, ABE
Critical Infrastructures. 2006-2007
Participant, NSF workshop, Bridging the Cyber, Physical and Social Worlds, organized by
Missouri University of Science and Technology, The Great Plains Network, Kansas City, MO,
May 27-28, 2009
Article Reviewer:
European Conference on Information Systems ECIS 2014
IFIP WG 11.10 International Conference on Critical Infrastructure Protection 2013
Behaviour & Information Technology 2009, 2010, 2011
Management Information Systems Quarterly (MISQ) 2008 special edition for security
Journal Information System Security (JISSEC) 2008
International Conference on Information Systems (ICIS) 2002, 2004, 2005, 2007, 2008
Americas Conference on Information Systems(AMCIS) 2005, 2007, 2008, 2011
Hawaii International Conference on System Sciences (HICSS) 2003-2011
6th Annual Security Conference 2007
8th Annual Security Conference 2009
WISP pre-ICIS SIGSEC Workshop 2007
IAIM pre-ICIS SIGED Workshop 2007
Colloquium for Information Systems Security Education (CISSE) 2004 – 2011
IEEE Computer 2005
InfoSecCD 2005 Kennesaw State University
Digital Forensics Research Workshop 2004, 2005
Conklin CV, 1/6/2015
9
Invitational Events:
Panel Member, Cybersecurity Education, Training, and Pipeline, Professionalizing the
Nation’s Cybersecurity Workforce:Criteria for Future Decision-Making, The National
Academies, Held in San Antonio, TX, March 27, 2013
Panel Moderator, Seventh Annual IFIP WG 11.10 International Conference on Critical
Infrastructure Protection, Washington, DC, March 18-20, 2013
Panel Moderator, SANS North American SCADA Summit, Orlando, FL, February 2013
Panel Moderator, Cyber Security Operations Centers, Acting not Reacting, Executive
Symposium, Washington, DC, September 2011
Invited Speaker, Anti-Phishing Working Group eCrime Researchers Summit, Fix the
User: An Approach to System Security Education, October 2010
Invited Speaker, DHS Industrial Control Systems Joint Working Group ICSJWG,
Lessons Learned in IT: The Role of DHS Essential Body of Knowledge (EBK) and ICS,
October 2010
Invited Speaker, AFCEA, San Antonio, Compliance v. Security, February 2010
Mini-Keynote, Role of Academia in Software Assurance, DOD/DHS Software Assurance
Forum, November 2009
Invited Attendee, 2004 Digital Forensics Research Workshop,
NSF Workshop on “Exploring a National Cyber Security Exercise for Colleges and
Universities”, February 27-28, 2004.
DHS sponsored events
Official Photographer 2014 National Collegiate Cyber Defense Competition
Orange Team Leader 2013 National Collegiate Cyber Defense Competition
Academic Coordinator National Collegiate Cyber Defense Competition
White Team 2009 National Collegiate Cyber Defense Competition
White Team 2008 National Collegiate Cyber Defense Competition
White Team 2007 National Collegiate Cyber Defense Competition
White Team Coordinator 2006 National Collegiate Cyber Defense Competition
Red Team Leader, 2009 Texas Regional Collegiate Cyber Defense Competition
White Team/ Team Facilitator 2008 Texas Regional Collegiate Cyber Defense
Competition
Chief Judge, 2007 Texas Regional Collegiate Cyber Defense Competition
White Team Member 2006 Texas Regional Collegiate Cyber Defense Competition
White Team Coordinator 2005 Texas Regional Collegiate Cyber Defense Competition
Local Presentations
Secure World Houston, (2012, April), SCADA Security: How Hard Can it Really be?,
Conference speaker at industry based security conference.
Secure World Houston, (2011, April), Trends in Information Security, Conference
speaker at industry based security conference.
Secure World Houston, (2010, February), Black Belt for Security, Conference speaker at
industry based security conference.
Secure World Houston, (2009, April), Systems Thinking and INFOSEC Decision Making,
Conference speaker at industry based security conference.
Conklin CV, 1/6/2015
10
ISSA San Antonio, (2008, December) presented seminar on Using the Internet for
communication to mass populations during natural disasters.
ISSA CISSP study group, (2008, July), presented seminar on Cyber Law and
Regulation.
Houston Production Manager’s Association (HPMA), (2008, April), Information Security
and Small Business, presented to lunch meeting of professional organization
Texas Regional Infrastructure Security Conference(TRISC), (2008, April) San Antonio,
Conference speaker, Role of the Federal government in the securing of cyberspace.
Secure World Houston, (2008, April), Systems Thinking and INFOSEC Decision Making,
Conference speaker at industry based security conference.
RSA Conference, (2008, April), San Francisco, CA, Birds of a Feather session, software
assurance, chaired a table on secure code principles for industry members.
ISSA Gulf Coast Chapter, (2007, January), Computer Security Behaviors of Home PC
Users: A Diffusion of Innovation Approach, speaker for Professional Society meeting,
NASA
ISSA Houston, (2006, October), Computer Security Behaviors of Home PC Users: A
Diffusion of Innovation Approach, speaker for Professional Society meeting
- Other
Wass House, Inc.
Software Development, custom medical software, University Hospital System,
San Antonio, TX 1998 - 2005
Software Development, Object Oriented Programming, Harcourt Education, San
Antonio, TX, 2004-2005
Software Development, Secure Coding, L-3 Corporation, Oklahoma City, OK,
2008
Program Development, Critical Infrastructure Education Program, Microsoft
Corp., Seattle, WA, 2010
Personal
Fellow, ISSA, 2013
Fellow, National Board of Information Security Examiners, 2011
Chair, Academic Advisory Board, EC-Council, MSS University Offering, 2010
Senior Advisor, National Software Assurance Repository (NSAR) project, DoD funded research
project at the University of Detroit – Mercy, 2009-2010.
Members AITP, AIS, ACM, IEEE, ISACA, DSI, ATMAE
Senior Member ASQ
Member Epsilon Pi Tau, the International Honor Society for Technology Professionals
Conklin CV, 1/6/2015
11
Member Infragard, Houston Chapter
Helped re-establish student AITP chapter at UH (sponsor Fall 2007-Spring 2008)
Nominations/Election Chair, ISACA Houston Chapter 2008 Annual General Meeting
ISACA Houston Chapter Academic Liaison 2007-2009
Team member of the winning team Digital Forensics Challenge 2004
IAM, IEM Certifications, National Security Agency
SANS GICSP Global Industrial Cyber Security Professional
CompTIA Security+, CASP certifications
ISC2 CISSP, CSSLP certifications
IEEE CSDP certification
ISACA CRISC certification
Licensed Private Investigator, State of Texas
Digital Forensics Certified Practitioner Certificate #2010-212-152 Digital Forensics Certification
Board
Expert Witness, Digital Forensics and e-discovery, State of Texas
Jeff Russo
v.
M-I L.L.C. d/b/a M-I SWACO
v.
National Oilwell Varco, L.P.,
Cause No. 2014-18432, In the 189th District Court of Harris County, Texas.
Corey Small and Terrance Hudson
v.
Robbins & Myers, Inc., Robbins & Myers Energy Systems, Inc., and Robbins & Myers Energy
Systems L.P.
United States District Court for the Southern District of Texas Houston Division,
Civil Action No. 4:12-cv-00029
Enbridge Energy Partners, L.P., et al.
v.
Stupp Corporation, et al
District Court of Harris County, Texas 269 Judicial Court, Cause No. 2008-13773
Guardianship of Lenny Charles Katz, an Incapacitated Person
Jerold B. Katz, Guardian of Lenny C. Katz, et al
v.
Robert M. Gross, et al
Probate Court Number One (1) of Harris County, Texas, Cause No. 224,239-401
Richard Dale Johnston
v.
International Plant Services LLC
American Arbitration Association, No. 70 166 00364 09
-
Contact information