15 E. FIFTH ST. SUITE 1800 • Tulsa, Oklahoma 74103

Phone (918) 856-5337 • E-mail gavin.manes@avansic.com

Gavin W. Manes, Ph.D.

Education AND Certifications

 

Ph.D. in Computer Science, University of Tulsa, Oklahoma, 2004
M.S. in Computer Science, University of Tulsa, Oklahoma, 2002
B.S. in Computer Science, University of Tulsa, Oklahoma, 2000

Federal Information Security Certifications:

Committee on Nation Security Systems Certificates. NSTISSI No. 4011: Information Systems Security Professional, 4012: Designated Approving Authority, 4013: Administration in Information Systems Security, 4014: Information Systems Security Officer and 4015: Systems Certifier.

Certified Information Systems Security Professional (CISSP).

Digital Forensics Certified Practitioner (DFCP) from the Digital Forensics Certification Board.

Licensed Private Investigator in the State of Oklahoma, Louisiana, and Texas.

Areas of specialization

 

Digital forensics, electronic discovery, information assurance, converged networks, network security, telecommunications security, Signaling System 7, cyber law, critical infrastructure protection, intrusion detection.

ACADEMIC Experence

 

2000 - 2008                     The University of Tulsa                                     Tulsa, Oklahoma

Courses Instructed and Co-Instructed

n  Electronic Discovery and Digital Evidence – course creator and instructor, fall 2006 - 2007.

n  Telecommunications Security – course creator and instructor, spring 2005.

n  Computer Organization and Assembler – course instructor, spring 2005.

n  Critical Infrastructure Protection – course creator and instructor, fall 2004.

n  Advanced Computer Forensics – course creator and instructor, including course projects and eight published research papers, spring 2004.

n  Computer and Network Forensics – curriculum, lecture and project development - Tulsa Police Department, Oklahoma State Bureau of Investigation and NASA OIG projects, 2001 - 2002.

n  Secure System Administration and Certification: system certification project development, 2002.

n  Network Security – curriculum, lecture and project development, 2000-2002.

n  Electronic Commerce – project management and stewardship - designing implementing and documenting a project for a multi-university setting, 1999-2003.

 

2004 - 2008                     The University of Tulsa                                     Tulsa, Oklahoma

Research Assistant Professor, Institute for Information Security (iSec)

n  Facility Security Officer (FSO) for U.S. Government Classified Research Efforts:

The University of Tulsa Industrial Security Office. Design, coordination, construction and renovation of 6500 sq ft facility for post doc research and specialized classrooms.

Created university classified research program and facilities including:

DCID 6/9 compliant Secure Compartmentalized Information Facility (SCIF).

NISPOM compliant faculty for Top Secret Level safeguarding.

Acting Information System Security Manager and COMSEC Custodian.

Conference Creator and Coordinator for “Tulsa Area Industrial Security Awareness Council (ISAC)” a seminar which provided high quality education and training at an affordable cost to government contractors working in the U.S. Government classified area.

Defense Security Service “Superior” inspection rating.

n  Manage graduate and undergraduate research personnel and programs:

Conference Creator and Coordinator – “Fundamentals of Cyber Crimes” lectures and hands-on laboratories for federal, state, and local law enforcement personnel.

Project Manager – “Defending Public Telephone Networks Against Cyber Terrorist Attacks,” sponsored by Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT).

Project Manager – “Vulnerability Analysis Tools and Attack Managements Systems for Converged Networks,” sponsored by the National Institute of Standards and Technology.

n  Develop and implement center enhancements:

Formation of the Tulsa Digital Forensics Center (TDFC) with relocation of the Oklahoma State Bureau of Investigation’s Tulsa offices and a United States Secret Service’s task force to the University of Tulsa CIS Annex and home of the TDFC. Design and implementation of the TDFC; including two storage area networks, both Ethernet and Fiber channel investigation networks, monitored access control evidence rooms and of TDFC forensic technologies, policies, and procedures.

Created Computer Forensics Partnerships: Tulsa Police Department Cyber Crimes Unit, Oklahoma State Bureau of Investigation, the Williams Companies, Internal Revenue Service, United States Secret Service, NASA OIG, NIST, OHTCC, DoD Computer Forensic Lab.

Facilitated Industrial IA Partnerships: Paraben Corporation, AccessData, Tektronix, CISCO Systems, Williams Energy, McLeodUSA.

 

2000 - 2004                     The University of Tulsa                                     Tulsa, Oklahoma

Principal Research Scientist, Center for Information Security (CIS)

n  Manage graduate and undergraduate research personnel and programs:

Conference Creator and Coordinator – “Tulsa ILook 8.0 Seminar” lectures and hands-on laboratories for federal, state, and local Oklahoma law enforcement personnel.

Project Manager – University of Tulsa Cyber Corps Program: National Science Foundation Federal Cyber Service Initiative and Department of Defense Information Assurance Scholarship Program.

Project Manager – “Defending Public Telephone Networks Against Cyber Terrorist Attacks,” sponsored by Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT).

Project Manager – “Vulnerability Analysis Tools and Attack Managements Systems for Converged Networks,” sponsored by the National Institute of Standards and Technology.

Project Manager – “Combating Terrorism: IP Network Intrusion Detection and Forensics,” sponsored by the Institute for Security Technology Studies at Dartmouth College.

n  Develop and implement infrastructure enhancements

Center for Information Security Annex (CIS Annex). Administrative oversight on construction of office and lab space (5000 sq ft) for University of Tulsa Cyber Corps Program.

Tulsa Police Department Cyber Crimes Unit. Relocation to the University of Tulsa CIS Annex; construction of evidence room and overhaul of forensic technologies and procedures.

CIS Research and Instructional Facilities: $2.5 million infrastructure for CIS in five major research labs and server rooms and over 50 research, faculty and student offices.

Professional Experence

 

2004 - Present                  Avansic, Inc. (Digital Forensics Professionals)    Tulsa, Oklahoma

Chief Executive Officer

n  Established and incorporated Avansic, Inc. (Digital Forensics Professionals) in 2004

Hired all staff including case managers, e-discovery specialists, forensics examiners, evidence custodians, sales team, marketing, management, and researchers.

Established secure forensics laboratory space with state of the art forensics workstations, secure evidence storage, and advanced access control systems.

Established ESI processing workflow and implemented distributed processing to enhance e-discovery efficiency.

Located and closed a major round of private equity funding to grow Avansic in to new markets.

Overses Avansic’s expansion into new geographic markets and service offerings.

Manages and participates in a team of experts delivering opinions, sworn statements and testimony.

n  Continuing Legal Education (CLE)

Created, presented, and moderated over seven hours of CLE curriculum on Electronic Discovery and Digital Forensics. Topics include: Electronically Stored Information (ESI) Forensics and E-Discovery, ESI: Focus on Data Preservation, ESI: Review and Production Strategy, ESI: Focus on Ethics, Bring Your Own Device, E-Discovery and Security, and Hot Topics in E-Discovery. Presented at dozens of seminars, bar associations, meetings and conferences.

Select list includes: Oklahoma Electronic Discovery Summit – Midwest City OK, Tulsa County Bar – Tulsa OK, Robert J. Turner American Inn of Court – Oklahoma City OK, Hudson-Hall-Wheaton American Inn of Court – Tulsa OK, Council Oak/Johnson-Sontag American Inn of Court – Tulsa OK, The University of Tulsa Law School – Tulsa OK, Oklahoma Association of Defense Counsel (OADC) – Austin TX, Tulsa County Bar Association – Tulsa OK, and over a hundred private law firms.

n  Provide Expert Testimony

Journal Articles

 

[1]    G. Manes, I. Campbell. “Production Is the Part You Do Not Want to Get Wrong: 6 Common Review & Production Issues and How to Fix Them,” NALS @Law, Winter 2014-2015.

[2]    G. Manes, T. O’Connor. “Predictive Coding is Not a Magic Wand,” Executive Counsel, Sept/Oct 2012.

[3]    G. Manes. “Information Security on the Social Media Frontier,” Peer to Peer (a publication of the International Legal Technology Association), September 2012. 

[4]    G. Manes, T.O’Connor. “Remote Collection,” LegalTech (an ALM publication), July 2012.  

[5]    G. Manes, T. O’Connor. “Consumer Devices, E-Discovery, and Security,” Legal Tech (an ALM publication), May 2012.

[6]    G. Manes. “E-Discovery Search Strategies: Crafting Keyword Lists,” St. Louis Lawyer (a publication of the Bar Association of Metropolitan St. Louis), May 2011.

[7]    G. Manes. “Litigation First Steps: Secure E-Evidence,” The Business Owner Journal, December 2010.

[8]    G. Manes. “Electronically Stored Information: A Primer on E-Discovery and Digital Forensics,” Accounts: A Publication of the Council of Petroleum Accountants Societies, Summer 2010.

[9]    G.Manes, E.Downing. “What Security Professionals Need to Know About Digital Evidence,” Information Security Journal: A Global Perspective, Vol. 19, No. 3, Summer 2010.

[10]  G. Manes, E. Downing, “Electronically Stored Information: Ethics and Considerations,” Oklahoma Bar Journal, December 2009.

[11]  G. Manes, J. Johnson, J. Gillespie, E. Downing, M. Harvey, “Backup Tape Forensics is Here to Stay,” Digital Forensics Magazine, Vol. 1, No. 1, November 2009.

[12]  G. Manes, E. Downing, “Electronic Information Used in Litigation,” Information Systems Security Association (ISSA) Journal, Vol. 7, No. 5, May 2009.

[13]  G. Manes, E. Downing, "Overview of Licensing and Legal Issues for Digital Forensics Investigators," IEEE Security and Privacy, Vol. 7, No. 2, March/April 2009.

[14]  J. Daily, N. Singleton, E. Downing, G. Manes, “The Forensics Aspects of Event Data Recorders,” to Journal of Digital Forensics, Security and the Law, Spring 2008.

[15]  J. Johnson, M. Harvey, E. Downing, A. Barclay, J. Hale, G. Manes, “Issues and Techniques for Redacting PDF Files,” Journal of Digital Forensic Practice, Taylor & Francis, Philadelphia, PA, 2008.

[16]  G. Manes, “Digital Forensics in the Twenty First Century,” The Forensics Examiner, The Official Peer-Reviewed Journal of the American College of Forensics Examiners, Vol. 16, Num. 4, Winter 2007.

[17]  G. Manes, D. Schulte, S. Guenther, S. Shenoi, “NetGlean: A methodology for distributed network security scanning,” The Journal of Network and Systems Management, Kluwer Academic/Plenum Publishers, Norwell, Massachusetts, 2005.

[18]  J. Dawkins, K. Clark, G. Manes, M. Papa, “A Framework for unified network security management: Identifying and tracking security threats on converged networks,” The Journal of Network and Systems Management, Kluwer Academic/Plenum Publishers, Norwell, Massachusetts, 2005.

Book Chapters

 

[19]  J. Daily, N. Singleton, G. Manes, “Automobile Event Data Recorder Forensics,” Advances in Digital Forensics IV, P. Craiger, S. Shenoi (Eds.), Springer, Norwell, MA, 2008.

[20]  J. Daily, N. Singleton, B. Downing, G. Manes, “Light Vehicle Event Data Recorder Forensics,” to appear in Advances in Computing and Information Sciences and Engineering, Springer, Norwell, MA, 2008.

[21]  A. Barclay, L. Watson, D. Greer, J. Hale, G. Manes, “Tokens for Use in Redacting Digital Information from Electronic Devices,” Advances in Digital Forensics III, P. Craiger, S. Shenoi (Eds.), Springer, Norwell, MA, 2007.

[22]  S. Seier, D. Greer, G. Manes, “Linking Individuals to Digital Information,” Advances in Digital Forensics II, M. Olivier, S. Shenoi (Eds.), Springer, Norwell, MA, 2006.

[23]  K. Straka, G. Manes, “Techniques for Passive Detection of NAT Routers and Counting Their Clients,” Advances in Digital Forensics II, M. Olivier, S. Shenoi (Eds.), Springer, Norwell, MA, 2006.

[24]  A. Meehan, T. Moore, S. Shenoi, G. Manes, “Forensics Analysis of Telecommunications Networks,” in Advanced in Digital Forensics, M. Pollitt, S. Shenoi (Eds.), Springer, Norwell, MA, 2005.

[25]  C. Swenson, S. Shenoi, G. Manes, “Imaging and Analysis of GSM Sim Cards,” in Advances in Digital Forensics, M. Pollitt, S. Shenoi (Eds.), Springer, Norwell, MA, 2005.

[26]  S. Piper, M. Davis, S. Shenoi, G. Manes, “Detecting Misuse of Reserved Portions of the Ext2 File System,” in Advances in Digital Forensics, M. Pollitt, S. Shenoi (Eds.), Springer, Norwell, MA, 2005.

[27]  M. Davis, S. Shenoi, G. Manes, “A Digital Evidence Custodian Model,” in Advances in Digital Forensics, M. Pollitt, S. Shenoi (Eds.), Springer, Norwell, MA, 2005.

[28]  P. Gershteyn, M. Davis, S. Shenoi, G. Manes, “Extracting Digital Evidence from BIOS Chips,” in Advances in Digital Forensics, M. Pollitt, S. Shenoi (Eds.), Springer, Norwell, MA, 2005.

[29]  J. Novotny, G. Manes, S. Shenoi, “Remote computer fingerprinting for cyber crime investigations,” Advances in Data and Applications Security, S. De Capitani di Vimercati, I. Ray, I. Ray (Eds.), Springer, Norwell, MA, 2004.

[30]  G. Lorenz, J. Keller, G. Manes, J. Hale, S. Shenoi, “Public telephone network (PTN) vulnerabilities,” Advances in Data and Applications Security, M. Oliver and D. Spooner (Eds.), Kluwer, Boston Massachusetts, pp. 151-166, 2002.

Papers and Proceedings

 

 

[31]  “How to Use Analytics to Increase E-Discovery Efficiency.” Published in the Arkansas ALA newsletter, Winter 2015.

[32]  “Don’t Be Scared of Analytics and Forensics: How to Use These Tools in E-Discovery.” Published in The Collaborator (newsletter of the ARMA San Antonio Chapter), August 2015.

[33]  “What is Reasonably Accessible?” Published in the NALS Docket, October 2015.

[34]  “Hot Topics in 2015.” Published in The Arkansas Lawyer (a publication of the Arkansas Bar Association), Spring 2015.

[35]  “Hot Topics in 2015.” Published in The Collaborator (newsletter of the ARMA San Antonio Chapter), April 2015

[36]  “Hot Topics in 2015.” Published in The Verdict (a publication of the Tennessee chapter of NALS), March 2015.

[37]  “Hot Topics in 2015.” Published in the Dallas Paralegal Association Newsletter, March 2015.

[38]  “Hot Topics in 2015.” Published in the Kansas City Paralegal Association Newsletter, March 2015.

[39]  “Spooked by Encryption? How to Use it in Your Law Practice and E-Discovery.” Published in The Verdict (a publication of the Tennessee chapter of NALS), November 2014.

[40]  “6 Common Review and Production Issues.” Published in @Law, a national publication of NALS (the Association for Legal Professionals), Winter 2014.

[41]  “Digital Forensics Case Studies.” Published in the proceedings for the ABA Labor & Employment Section’s 8th Annual Section Conference, for panel “Ethics in the Age of Technology,” November 2014.

[42]  “Bring Your Own Device.” Published in the proceedings for the ABA Labor & Employment Section’s 8th Annual Section Conference, for panel “Ethics in the Age of Technology,” November 2014.

[43]  “6 Common Review and Production Issues.” Published in The Collaborator (newsletter of the ARMA San Antonio Chapter), September 2014.

[44]  “You Still Need Forensics, Even in a World of E-Discovery.” Published in The Collaborator (newsletter of the ARMA San Antonio Chapter), June 2014.

[45]  “You Still Need Forensics, Even in a World of E-Discovery.” Published in the Missouri Briefcase (a publication of NALS Missouri), June 2014.

[46]  “Concept, Privilege and Plaintiff Review: Oh My!” Published in the Arkansas ALA newsletter, Spring 2014.

[47]  “Concept, Privilege and Plaintiff Review: Oh My!” Published in the Cowtown Reporter (a publication of the Fort Worth Paralegal Association), Spring 2014.

[48]  “Digital Forensics Case Studies,” “Concept, Privilege, and Plaintiff Review,” and “Why You Shouldn’t Trust the Metadata.” Published in the proceedings for the ABA Labor & Employment’s National Symposium on Technology and Labor and Employment Law, for panel “Investigation Completed – Now Can You Actually Use What You Got?” April 2014.

[49]  “Forensics 101.” Published in the proceedings for the ABA Labor & Employment’s National Symposium on Technology and Labor and Employment Law, for panel “Workplace Investigations: Tech How To and How Not To,” April 2014.

[50]  “Concept, Privilege and Plaintiff Review: Oh My!” Published in the MPAlert! (a publication of the Missouri Paralegal Association), March 2014.

[51]  “Concept, Privilege and Plaintiff Review: Oh My!” Published in the Missouri Briefcase (a publication of NALS Missouri), March 2014.

[52]  G. Manes. “Managing the E-Discovery Process and Making the Business Case for E-Discovery,” Publication in Proceedings of the 8th Annual Sedona Conference Institute: EDiscovery in a New Era, March 2014.

[53]  “7 Things All Law Firms (and Their IT Staff) Need to Know about HIPAA.” Published in The Collaborator (a publication of ARMA San Antonio Chapter), February 2014.

[54]  “7 Things All Law Firms (and Their IT Staff) Need to Know about HIPAA.” Published in the Missouri Briefcase (a publication of NALS of Missouri), January 2014.

[55]  “7 Things All Law Firms (and Their IT Staff) Need to Know about HIPAA.” Published in The Verdict (a publication of the Tennessee chapter of NALS), January 2014.

[56]  “7 Things All Law Firms (and Their IT Staff) Need to Know about HIPAA.” Published in The Cowtown Reporter (a publication of the Fort Worth Paralegal Association), February 2014.

[57]  “Why Not All Litigation Holds are the Same” with Michael Cole, J.D. Published in On the Record (a publication of the Dallas Area Paralegal Association), August 2013.

[58]  “Why Not All Litigation Holds are the Same” with Michael Cole, J.D. Published in the Burden of Proof (a publication of the Houston Metropolitan Paralegal Association), July 2013.

[59]  “Why Not All Litigation Holds are the Same” with Michael Cole, J.D. Published in The Verdict (a publication of the Tennessee chapter of NALS), July 2013.

[60]  “Bring Your Own Device: A Technical Perspective.” Published in On The Record (a publication of the Dallas Area Paralegal Association), April 2013.

[61]  “Waving the Predictive Coding Magic Wand” Published in @Law (NALS national magazine), March 2013.

[62]  “Getting the Most out of Your iPad” Published in @Law (NALS national magazine), Winter 2012.

[63]  “Does Your Attorney Suffer from Technophobia?” with Carl Morrison. Published in @Law (NALS national magazine), June 2012.

[64]  “Protecting Corporate Intellectual Property from the Inside” with Tom O’Connor. Published on InsideCounsel.com’s Outside Experts, April 27th, 2012.

[65]  “Attorneys Beware: The Danger of Storing Information in the Cloud” with Tom O’Connor. Published on InsideCounsel.com’s Outside Experts, April 6th, 2012.

[66]  “Shifting Review Strategy Midstream? Online Review to the Rescue!” Published in the Verdict (a publication of the Tennessee chapter of NALS), March 2012. 

[67]  “Shifting Review Strategy Midstream? Online Review to the Rescue!” Published in the NALS Docket, March 2012.

[68]  “Why E-Discovery Pricing is So Complicated.” Published in The Verdict (a publication of the Tennessee chapter of NALS), November 2011.

[69]  “Pay Now or Pay Later: Budgeting for E-Discovery.” Published in the Cowtown Reporter (a publication of the Fort Worth Paralegal Association), September/October 2011; The Verdict (a publication of the Tennessee chapter of NALS), August 2011.

[70]  “When You Shouldn’t Trust the Metadata.” Published in The Verdict (a publication of the Tennessee chapter of NALS), July 2011; Arkansas Association of Legal Assistants Newsletter, August 2011.

[71]  “Cloud Computing and the Legal Profession.” Published in The Verdict (a publication of the Tennessee chapter of NALS), May 2011.

[72]  “How to Protect Yourself, Your Children, and Your Business on Social Media.” Published in The Verdict (a publication of the Tennessee Chapter of NALS), March 2011; The Profile (a publication of the Mississippi Legal Professionals Association), April 2011.

[73]  “Past and Future E-Discovery: Themes of 2010 and Resolutions for 2011.” Published in @Law (NALS national magazine, electronic version), January 2011.

[74]  “E-Discovery Searching Strategies.” Published in The Defender (a publication of the Harris County Texas Criminal Lawyers Association), November 2010; On the Record (a publication of the Dallas Area Paralegal Association), December 2010; Highlights (a publication of the Houston Association of Legal Professionals), January/February 2011.

[75]  “Email Threading in E-Discovery,” On the Record (a publication of the Dallas Area Paralegal Association), October 2010.

[76]  “Metadata: E-Discovery Processing, Litigation, and Loadfile Creation,” On the Record (a publication of the Dallas Area Paralegals Association, August 1, 2010.

[77]  "Oklahoma's Civil Procedure Discovery Code Changes to Acknowledging Digital Information," The Tulsa Lawyer (a publication of the Tulsa County Bar Association), Tulsa, OK, June 2010.

[78]  “How to Choose an E-Discovery Vendor,” The Addendum (a publication of the Alabama State Bar Association), Montgomery, AL, June 2010.  

[79]  “Privilege Email Communications and Corporate Computers: Is It Private?” @Law (a publication of NALS, the Association for Legal Professionals), Tulsa, OK, Summer 2010.

[80]  “What is E-Discovery,” National Business Institute, Tulsa, OK, November 11, 2009.

[81]  “How to Choose an E-Discovery Vendor”, A’La Carte (Publication of the New Orleans Chapter of Legal Administrators), Winter 2009.

[82]  “Modern Online Review Tool: Document Review Anywhere, Anytime,” Oklahoma Briefcase (a publication of the Oklahoma County Bar Association), September 2009.

[83]  “Digital Forensics and E-Discovery: An Overview”, National Business Institute, National Teleconference, June 3, 2009.

[84]  G. Manes, E. Downing, L. Watson, “A Digital Forensics Primer,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08), December 9, 2008.

[85]  “Keeping Up with E-Discovery,” National Business Institute, Tulsa, OK and Oklahoma City, OK, November 13-14, 2008.

[86]  “Obtaining Data in Various Formats,” National Business Institute, Oklahoma City, OK, April 16, 2008.

[87]  “Conducting Forensic Analysis Under The New Rules,” National Business Institute, Tulsa, OK, November 28, 2007.

[88]  G. Manes, L. Watson, E. Downing, A. Barclay, D. Greer, J. Hale, “A Framework for Redacting Digital Information from Electronic Devices,” Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop, West Point, New York, June 20-22, 2007.

[89]  G. Manes, E. Downing, L. Watson, C. Thrutchley, “New Federal Rules And Digital Evidence,” Proceedings of the ADFSL 2007 Conference on Digital Forensics, Security and Law, Arlington, Virginia, April 18-20, 2007.

[90]  G. Manes, L. Watson, A. Barclay, D. Greer, J. Hale, “Towards Redaction of Digital Information from Electronic Devices,” Proceedings of the ADFSL 2007 Conference on Digital Forensics, Security and Law, Arlington, Virginia, April 18-20, 2007.

[91]  D. Greer, J. Mulenex, J. Hale, G. Manes, “Education for Cyber Crime Investigators,” ADFSL 2007 Conference on Digital Forensics, Security and Law, Arlington, Virginia, April 18-20, 2007.

[92]  “Wireless Internet and Wireless Content Provider Liability,” Prepared for Oklahoma House of Representatives, January 2005.

[93]  A. Meehan, G. Manes, S. Shenoi, “Network Convergence: Security Themes and Issues,” GlobeCom 2004 W07: Voice over IP: Challenges and Solutions, Dallas, Texas, December 2004.

[94]  G. Manes, A. Meehan, S. Shenoi, “Securing Telecommunications Networks,” Proceedings of the SPIE Defense and Security Symposium Conference on Sensors, Command, Control, Communications, And Intelligence (C3I) Technologies For Homeland Security And Homeland Defense (Vol. 5403), Orlando, Florida, April 2004.

[95]  G. Manes, A. Meehan, S. Shenoi, “Combating Threats to Emergency Communications Services,” Proceedings of the SPIE Defense and Security Symposium Conference on Sensors, Command, Control, Communications, And Intelligence (C3I) Technologies For Homeland Security And Homeland Defense (Vol. 5403), Orlando, Florida, April 2004.

[96]  T. Kosloff, T. Moore, J. Keller, G. Manes, S. Shenoi, “Attacks on Public Telephone Networks: Technologies and Challenges,” Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 5071), Orlando, Florida, April 2003.

[97]  G. Manes, J. Dawkins, J. Hale, S. Shenoi, “Identifying & Tracking Attacks on Networks: C3I Displays & Related Technologies,” Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 5071), Orlando, Florida, April 2003.

[98]  “Securing America’s Public Telephone Networks,” Prepared for Inet Technologies, Inc., September 20, 2003.

[99]  T. Kosloff, T. Moore, J. Keller, G. Manes, S. Shenoi, “SS7 Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection,” Proceedings of the ACM Symposium on the Scientific Aspects of Cyber Terrorism at the 9th ACM Conference on Computer And Communications Security, Washington, D.C., November 2002.

[100]      T. Moore, T. Kosloff, J. Keller, G. Manes, S. Shenoi, “Signaling System 7 (SS7) Network Security,” Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Tulsa, OK, August 4-7, 2002.

[101]      B. Skaggs, B. Blackburn, G. Manes, S. Shenoi, “Network Vulnerability Analysis,” Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Tulsa, OK, August 4-7, 2002.

[102]      G. Manes, D. Schulte, T. Kosloff, B. Enochs, S. Shenoi, “Technology for State and Local Computer Crime Investigations,” Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 4708), Orlando, Florida, April 2002.

[103]      J. Novotny, A. Meehan, D. Schulte, G. Manes, S. Shenoi, “Evidence Acquisition Tools for Cyber Sex Crimes Investigations,” Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 4708), Orlando, Florida, April 2002.

[104]      J. Novotny, G. Manes, G. Lorenz, S. Cribbs, B. Enochs, J. Hale & S. Shenoi, “An Agent Architecture for Intrusion Detection and Response,” Proceedings of the International Conference on Intelligent Agents Web Technologies and Internet Commerce, Las Vegas, Nevada, 2001.

[105]      A. Meehan, G. Manes, L. Davis, J. Hale, S. Shenoi, “Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation,” Proceedings of the Second annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, New York, June 5-6, 2001.

[106]      G. Lorenz, T. Moore, G. Manes, J. Hale, S. Shenoi, “Securing SS7 Telecommunications Networks,” Proceedings of the Second annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, New York, June 5-6, 2001.

[107]      G. Lorenz, G. Manes, J. Hale, D. Marks, K. Davis, S. Shenoi, “Characterization of Attacks on Public Telephone Networks,” Proceedings of the SPIE International Symposia on Law Enforcement Technologies, Boston, Massachusetts, November 5-8, 2000.

[108]      S. Magill, B. Enochs, D. Schulte, C. Campbell, G. Manes and J. Hale, “A Digital Economy Simulator,” Proceedings of the Fifth Joint Conference on Information Sciences, Atlantic City, New Jersey, February 27-March 3, 2000.

[109]      G. Lorenz, S. Cribbs, G. Manes, P. Carpenter, N. Bostick and S. Shenoi, “Architecture and Implementation of a Search Engine with Mobile Persistent Agents,” Proceedings of the Fourth Joint Conference on Information Sciences, Research Triangle Park, North Carolina, October 23-28, 1998.

Congressional Testimony

 

[110]      J. Hale, N. Davis, J. Arrowood, and G. Manes, “P2P Fear and Loathing: Operational Hazards of File Trading Networks,” prepared for and read as hearing testimony in “Peer-to-Peer Piracy on University Campuses,” before the Subcommittee on Courts, the Internet, and Intellectual Property of the Committee on the Judiciary House of Representatives, One Hundred Eighth Congress, First Session (Serial No. 2), Washington D.C. February 26, 2003.

[111]      J. Hale, N. Davis, J. Arrowood, and G. Manes, “P2P Fear and Loathing: Operational Hazards of File Trading Networks,” prepared for and read as hearing testimony in “Piracy of Intellectual Property on Peer-to-Peer Networks,” before the Subcommittee on Courts, the Internet, and Intellectual Property of the Committee on the Judiciary House of Representatives, One Hundred Seventh Congress, Second Session (Serial No. 103), Washington D.C. September 26, 2002.

Dissertation / Thesis

 

[112]      G. Manes, “Detecting Attacks on Telecommunication Networks,” Ph.D. Dissertation, Computer Science, University of Tulsa, Tulsa Oklahoma, 2004. (sequestered)

[113]      G. Manes, “Novel Approaches for Network Scanning and Security Applications,” MS Thesis, Computer Science, University of Tulsa, Tulsa Oklahoma, 2002.

Patents

 

[114]      G. Manes, N. Singleton, J. Daily, “Automobile Event Data Recorder,” Patent Pending.

[115]      G. Manes, L. Watson, J. Hale, “CryptoStore (Near Real-Time Encryption),” Patent Pending.

[116]      G. Manes, L. Watson, J. Hale, D. Greer, A. Barclay, “Redaction of Digital Information From An Electronic Device,” Patent Pending.

[117]      J. Hale and G. Manes, “A Method to Inhibit the Identification and Retrieval of Proprietary Media Via Automated Search Engines Utilized in Association with Computer Communications Networks,” United States Patent 6,732,180, May 4, 2004.

 

Invited Talks

 

[1]    “Cybersecurity: It’s Not Just About Big Law Anymore,” 9th Annual Labor and Employment Law Conference, Labor & Employment Section of the ABA, Philadelphia PA, November 6th, 2015.

[2]    “Hot Topics in E-Discovery,” Accounting and Financial Women’s Alliance, Tulsa OK, November 17th, 2015.

[3]    “Hot Topics in E-Discovery,” New Orleans Paralegal Association Meeting, New Orleans LA, September 16th, 2015.

[4]    “Prevent a Mess in Your Kitchen: Four View on the Use of Forensics and Analytics in Your Next E-Discovery Project,” SoCal E-Discovery and Information Governance Retreat, San Diego CA, August 3rd, 2015.

[5]    “Advanced E-Discovery Strategies for Paralegals,” Institute of Paralegal Education at the National Business Institute, National Webcast, June 30th, 2015.

[6]    “Securing Law Firm Data: When the Advice Givers Need Advice,” 9th Annual Institute on E-Discovery: Practical Solutions for Dealing with ESI, New York NY, May 15th, 2015.

[7]    “E-Discovery and Encryption,” Tulsa Chapter of the Oklahoma Society of CPAs, Tulsa OK, May 13th, 2015.

[8]    “Digital Forensics and E-Discovery,” Arkansas Bar Association, Little Rock AR, May 7th, 2015.

[9]    “Building a Trade Secrets Case: Preparing for Preliminary Injunction Hearing,” 2015 ABA National Symposium on Technology in Labor and Employment Law, San Francisco CA, March 15th, 2015.

[10]  “Hacking, Data Security and How You Can Protect Your Information,” Petroleum Accountants Society of Oklahoma, Tulsa OK, January 20th, 2015.

[11]  “Everything You Don’t Know About E-Discovery But Wish You Did,” National Business Institute, Oklahoma City OK, December 17th, 2015. 

[12]  “Digital Forensics in a World of E-Discovery,” Oklahoma Bar Association Webinar, November 19th, 2014.

[13]  “E-Discovery Under Pressure,” Fort Worth Paralegal Association, Fort Worth TX, November 13th, 2014.

[14]  “Ethics in the Age of Technology,” Panel Discussion, 8th Annual ABA Section of Labor and Employment Law Conference, Los Angeles CA, November 7th, 2014.

[15]  “Is Your Data Safe?” Greenhill School Alumni Association, Dallas TX, October 24th, 2014.

[16]  “Going Global: E-Discovery,” Houston Corporate Paralegal Association, Houston TX, October 16th, 2014.

[17]  “Best Practices in E-Discovery,” Oklahoma Bar Association, Webinar, October 8th, 2014.

[18]  “Modern Technology and Document Review,” Panel Discussion, New Orleans Paralegal Association, New Orleans LA, October 3rd, 2014.

[19]  “Hot Topics in E-Discovery,” Oklahoma Bar Association, Webinar, September 17th, 2014.

[20]  “Bring Your Own Device,” IMA Tulsa Chapter (Association of Accounts and Financial Professionals in Business), Tulsa OK, September 16th, 2014.

[21]  “E-Discovery and Digital Forensics: Government Subpoena and Civil Litigation,” 9th Annual Oklahoma IT Symposium, August 21st, 2014.

[22]  “Modern Document Review,” New Orleans Bar Association CLE Series, New Orleans, LA, August 15th, 2014.

[23]  “ESI: Focus on Review and Production,” Tulsa Area Paralegal Association, Tulsa OK, August 13th, 2014.

[24]  “The NSA (likely) is Watching You – Privacy and Data Security and the Rise of Cyber Theft,” Section of Labor and Employment Law at the 2014 ABA Annual Meeting, Boston, MA, August 7th, 2014.

[25]  “Why You Still Need Digital Forensics in a World of E-Discovery,” NALS National Webinar, July 24th, 2014.

[26]  “Data Types, Loading Data, Exporting & Producing Data,” Organization of Legal Professionals’ Litigation Support Project Management Certificate Program, National Webinar, July 14th, 2014.

[27]  “E-Discovery Collections and Digital Forensics,” Organization of Legal Professionals’ Litigation Support Project Management Certificate Program, National Webinar, July 9th, 2014.

[28]  “E-Discovery and Human Resources,” Gulf Coast Symposium on HR Issues, Houston, TX, May 14th, 2014.

[29]  “E-Discovery and Employment Litigation,” Oklahoma Human Resources State Conference and Expo, Tulsa, Oklahoma, May 8th, 2014.

[30]  “Workplace Investigations: Tech How To and How Not To,” National Symposium on Technology in the Practice and Workplace, ABA Labor & Employment Section, New York City, May 1st, 2014.

[31]  “Managing the E-Discovery Process and Making the Business Case for E-Discovery” and “E-Discovery Under Pressure,” 8th Annual Sedona Conference Institute: EDiscovery in a New Era, Houston, TX, March 13th, 2014.

[32]  “Focus on the Ethics of ESI,” NALS Professional Development & Education National Conference, Tulsa, OK, February 28th, 2014.

[33]  “A Forensic Tour of Portable Devices and the Secrets They Reveal,” American Bar Association 7th Annual Labor & Employment Conference, New Orleans, LA, November 7th, 2013.

[34]  “Hot Topics in E-Discovery” and “ESI: Focus on Ethics,” Tulsa County Bar Association, Tulsa, OK, October 31st, 2013.

[35]  “Best Practices in Using and Securing Modern Technology in Your Legal Practice and E-Discovery,” New Orleans Labor & Employment Law Seminar, New Orleans, LA, October 25th, 2013.

[36]  “Best Practices in Using and Securing Modern Technology in Your Legal Practice and in Litigation as In-House Counsel,” Association of Corporate Counsel New Orleans Chapter, New Orleans, LA, October 10th, 2013.

[37]  “Benefits and Dangers of Using Portable Devices,” New Orleans Bar Association CLE Series, New Orleans, LA, August 2nd, 2013.

[38]  “Hot Topics in E-Discovery” and “ESI: Focus on Ethics,” Russell-Blass-Walker American Inns of Court, Gulfport, Mississippi, July 30th, 2013.

[39]  “Hot Topics in E-Discovery,” Oklahoma Judicial Conference, Oklahoma City, OK, July 17th, 2013.  

[40]  “Panel Discussion: Mobile and Trackable – A Forensic Tour of Portable Devices and the Secrets They Reveal,” National Symposium on Technology in the Practice and Workplace, ABA Labor & Employment Section, Berkeley, CA, April 22nd 2013.

[41]  “Panel Discussion: Moral Turpitude – By Virtue or by Vice,” New Orleans Bar Association Bench & Bar Conference, Biloxi, MS April 20th 2013.

[42]  “E-Discovery for Corporate Paralegals,” Houston Corporate Paralegal Association, Houston, TX April 10th 2013.

[43]  “Panel Discussion: Dual-Use Dilemma – Discovery of Personal Data Sources,” 7th Annual National Institute on E-Discovery, ABA Litigation Section, New York, New York, April 5th 2013.

[44]  “ESI: Review & Production Strategy,” ILTA St. Louis Chapter, St. Louis MO, February 7th, 2013.

[45]  “Hot Topics in E-Discovery,” Hudson-Hall-Wheaton Inns of Court, Tulsa, OK, January 29th 2013.

[46]  “Social Media & E-Discovery,” W. Lee Johnson Inns of Court, Tulsa, OK, January 24th, 2013.

[47]   “Privilege in Corporate Email,” Association of Records Managers and Administrators (ARMA), San Antonio Chapter, San Antonio, TX, January 15th 2013.

[48]  “ESI: Focus on Review and Production Strategy,” New Orleans Bar Association’s Procrastinator’s Program, New Orleans, LA, December 20th, 2012.

[49]  “Panel: Protecting Your E-Discovery Work Product,” Carmel Valley E-Discovery Retreat, Carmel Valley, CA, July 23rd, 2012.

[50]  “Collecting from the Cloud,” Access Data User’s Conference, Las Vegas, NV, May 9th, 2012.

[51]  “Internet Anonymous,” Oklahoma Bar Association’s Stolen Innocence: the Faces of Child Exploitation in Schools, Oklahoma City, OK, April 19th, 2012.

[52]  “E-Discovery and Digital Forensics for Environmental Attorneys,” Dallas Bar Association Environmental Law Section, Dallas Texas, February 23rd, 2012.

[53]  “Cloud Computing for the Legal Profession,” Organization of Legal Professionals, National Webinar, February 21st, 2012. 

[54]  “How to Protect Yourself, Your Children, and Your Business on Social Media,” State Bar of Texas Paralegal Division, Fort Worth Texas, February 8th, 2012.

[55]  “How to Protect Yourself, Your Children, and Your Business on Social Media,” AWC OKC Chapter, Oklahoma City, January 10th, 2012.

[56]   “E-Discovery for Medical Malpractice Lawsuits,” Tulsa County Bar Association, Tulsa OK December 1st, 2011.

[57]  “Entrepreneurship in the 21st Century,” Global Entrepreneurship Week at Rogers State University, November 14th, 2011.

[58]  “E-Discovery and Digital Forensics: An Overview,” Association of Certified Fraud Examiners, Tulsa Chapter, Tulsa OK November 4th 2011.

[59]  “What IT Should Know About E-Discovery,” Innotech, Oklahoma City OK, November 3rd, 2011.

[60]  “Digital Forensics,” Women in E-Discovery St. Louis Chapter, St. Louis Missouri, October 27th, 2011.

[61]  “Macintosh Forensics” and “Dropbox Forensics,” Computer Forensics Show, San Francisco CA, October 18th, 2011.

[62]  “Protecting Privacy for Yourself and Your Business,” Association for Women in Communications National Conference, Tulsa OK, October 15th 2011.

[63]  “How to Protect Yourself, Your Business, and Your Children on Social Media,” Petroleum Accountants Society of Tulsa, New Professionals Committee, Tulsa OK, October 11th, 2011.

[64]  “If Hackers Don’t Kill You, Litigation Will” and “E-Discovery Readiness: How Legal Decisions Affect IT and Vice Versa,” TechX 2011 Conference and Expo, Baton Rouge LA, October 5th & 6th 2011.

[65]  “Controlling ESI Costs,” Women in E-Discovery Austin Chapter, Austin TX, September 15th, 2011.

[66]  “When You Shouldn’t Trust the Metadata,” Organization of Legal Professionals National Webinar, September 13th, 2011.

[67]  “ESI: Extended Overview” and “ESI: Ethics and Considerations,” Alabama Association of Paralegals, Orange Beach AL, August 27th, 2011.

[68]  “What You Need to Know About IT and E-Discovery,” Russell-Blass-Walker American Inns of Court, Gulfport Mississippi, July 19th, 2011.

[69]  “ESI: E-Discovery and Digital Forensics,” Greenhill School Alumni Association Meeting, Dallas, TX July 15th, 2011.

[70]  “How to Make Your Data Defensible,” Houston Corporate Paralegal Association, Houston TX, July 13th, 2011.

[71]  “ESI: E-Discovery and Digital Forensics,” Association of Corporate Counsel New Orleans Chapter, New Orleans LA, June 17th, 2011.

[72]  “ESI: E-Discovery and Digital Forensics,” ILTA New Orleans chapter, New Orleans LA, June 16th, 2011.

[73]  “Cloud Computing for the Legal Profession,” NALS National Webinar, June 9th 2011.

[74]  “How to Prepare for Litigation: E-Discovery Readiness,” Innotech, Dallas TX, May 19th, 2011.

[75]  “E-Discovery and Human Resources,” Human Resource Management Association, Louisiana Chapter, New Orleans LA, May 18th, 2011.

[76]  “Digital Forensics Primer” and “ESI: Ethics in E-Discovery,” St. Louis Paralegal Association, St. Louis Missouri, May 17th, 2011.

[77]  “How to Protect Yourself, Your Business, and Your Children on Social Media” and “ESI: Focus on Preservation,” NALS of Missouri Annual Meeting, Chesterfield Missouri, April 29th, 2011.

[78]  “ESI: E-Discovery and Digital Forensics,” Tulsa Area Paralegal Association, Tulsa OK, March 26th, 2011.

[79]  “E-Discovery Readiness,” Women’s Society of CPAs, Tulsa, OK March 24th, 2011.

[80]  “ESI Processing: Current Issues,” ILTA St. Louis Chapter, St. Louis Missouri, February 8th, 2011.

[81]  “ESI: Extended Overview” and “ESI: Focus on Ethics,” Arkansas Bar Association’s Mid-Year Meeting, Memphis Tennessee, January 28th 2011.

[82]  “Digital Forensics,” Women in E-Discovery St. Louis Chapter, St. Louis, Missouri, January 27th, 2011.

[83]  “Complex Litigation and ESI Tools,” New Orleans Bar Association Procrastination CLE, New Orleans, LA, December 15th, 2010.

[84]  “Email Processing and Production,” Oklahoma Employment Lawyer’s Association monthly meeting, Oklahoma City, OK, December 3rd, 2010.

[85]  “ESI: Focus on Data Collection,” Tulsa County Bar Association’s ESI Symposium, Tulsa, OK, November 12th, 2010.

[86]  “How to Prepare for Litigation: E-Discovery Readiness,” Innotech Oklahoma Conference, Oklahoma City, OK November 10th, 2010.

[87]  “ESI: E-Discovery and Digital Forensics,” ILTA Houston Chapter, Houston TX, October 28th, 2010.

[88]  “ESI: Focus on Data Preservation,” Oklahoma Bar Association, Appellate Practice Section, Tulsa OK (and Oklahoma City by webinar), October 26th, 2010.

[89]  “Controlling ESI Costs,” NALS 59th Annual Education Conference and National Forum, Branson, MO, October 22, 2010.

[90]  “E-Discovery Readiness” and “Digital Redaction,” Oklahoma Office of State Finance, 6th Annual Cybersecurity Seminar, Oklahoma City, October 19, 2010.

[91]  “ESI: E-Discovery and Digital Forensics,” National Webinar, NALS, October 7, 2010.

[92]  “Hot Topics in E-Discovery,” Panel Discussion, Texas Lawyer’s E-Discovery Roundtable, Dallas, TX, September 22, 2010.

[93]  “Computer Fraud and E-Discovery Readiness,” Institute of Management Accountants Regional Conference, Springfield, MO, September 16, 2010.

[94]  “ESI and Ethics for Paralegals and Attorneys,” Baton Rouge Bar Association Annual Conference, Baton Rouge, LA, September 8, 2010.

[95]  “Electronically Stored Information: E-Discovery and Digital Forensics,” Keynote Speaker, Texas Regional Infrastructure Security Conference, Grapevine, TX, July 19, 2010.

[96]  “ESI: E-Discovery and Digital Forensics,” Dallas Bar Association – Computer Law Section, Dallas, TX, June 28, 2010.

[97]  “E-Discovery and Digital Forensics,” Arkansas Bar Association – Best of CLE, Little Rock, AR, June 21, 2010.

[98]  “Easing the Burden of E-Discovery,” Association of Corporate Counsel – New Orleans Chapter, New Orleans, LA, June 11, 2010.

[99]  “ESI: Digital Forensics and E-Discovery,” Dallas-Ft. Worth Litigation Support Management Association, Dallas, TX, May 11, 2010.

[100]      “ESI: Digital Forensics and E-Discovery,” Judge William R. Overton American Inn of Court, Little Rock, AR, April 20, 2010.

[101]      “Computers in Domestic Violence Cases,” Coordinated Community Response to Stalking, Oklahoma City, OK, April 13, 2010.

[102]      “ESI: Focus on Processing and Metadata,” NALS Professional Development Conference, March 13, 2010.

[103]      “ESI: E-Discovery and Digital Forensics,” International Legal Technology Association - New Orleans Chapter, February 25, 2010.

[104]      “Reducing the Costs of Forensics through Records and Information Management,” Department of Defense Cyber Crime Conference, St. Louis, MO, January 27, 2010.

[105]      “Backup Tape Forensics,” Department of Defense Cyber Crime Conference, St. Louis, MO, January 27, 2010.

[106]      “Digital Forensics and E-Discovery: An Overview”, IEEE Tulsa Section, Tulsa, OK, November 10, 2009.

[107]      “Digital Redaction for Government Agencies,” Computer Security Institute Conference, Washington D.C., October 28, 2009.

[108]      “Legal Weapons of the Future” Panel Discussion, Techno Forensics Conference at the National Institute for Standards and Technology (NIST), Gaithersburg MD, October 27, 2009.

[109]       “Digital Forensics Primer: Civil vs. Criminal Forensics,” American College of Forensics Examiners Institute Annual Conference, Las Vegas, NV, October 15, 2009.

[110]      Keynote Speaker - “Redaction: What You Don’t Know Can Hurt You,” National Association of Legal Secretaries, Irvine CA, October 9, 2009.

[111]       “Electronically Stored Information: Issues and Processes,” Certified Fraud Examiners, Tulsa, OK, September 25, 2009.

[112]      “Digital Forensics and E-Discovery: An Overview”, Association of Records Managers and Administrators, Tulsa, OK, September 15, 2009.

[113]      “Digital Forensics and E-Discovery: An Overview”, Institute of Management Accountants, Tulsa OK, August 18, 2009.

[114]      “The Role of Digital Data in Legal Proceedings,” Information Security Audit Control Association, Tulsa, OK, June 23, 2009.

[115]      “Issues with Converting Digital Forensics Output to EDD Input,” Computer Forensics Show, Washington D.C., April 28, 2009.

[116]      “Digital Forensics and E-Discovery: An Overview,” Central Oklahoma Association of Legal Assistants, Oklahoma City, OK, April 24, 2009.

[117]      “Digital Forensics and E-Discovery: An Overview,” Comanche County Bar Association, Lawton, OK, April 15, 2009.

[118]       “E-Discovery for Insurance Adjustors,” 10th Annual Spring Insurance Update, Dallas TX, April 3, 2009.

[119]      “Digital Forensics and E-Discovery: An Overview”, Oklahoma Bar Association Family Law Section, Oklahoma City, OK, March 13, 2009

[120]      “Civil vs. Criminal Forensics,” U.S. Department of Defense Cyber Crime Conference, St. Louis, MI, January 29, 2009.

[121]      “RAID Reconstruction: A Tutorial,” U.S. Department of Defense Cyber Crime Conference, St. Louis, MI, January 29, 2009.

[122]      “Redaction: A Method to Clean and Return Media with Contraband Material,” HTCIA, Atlantic City, NJ, October 20, 2008.

[123]      “Panel: Information Technology Security,” Third KPM Symposium, Tulsa, OK August 20, 2008.

[124]      “Forensics in Oklahoma,” Certificate in Paralegal Studies and Legal Nurse Consulting Program Faculty, Tulsa, OK, August 13, 2008.

[125]      “Our Digital Forensics Business,” Entrepreneurs of Tulsa, Tulsa, OK June 24, 2008.

[126]      “Security & Digital Forensics,” NCURA Region V 2008, Oklahoma City, OK, May 6, 2008.

[127]      “Redacting Information from Digital Devices,” Computer and Enterprise Investigations Conference (CEIC 2008), Lake Las Vegas, NV, April 30, 2008.

[128]      Keynote Speaker - “Cyber Security and Digital Forensics,” Second Annual Oklahoma Computing Conference, Tulsa, OK, March 7, 2008.

[129]      “Preservation, Production, and Digital Forensics,” Institute of Internal Auditors, Tulsa OK, February 26 2008.

[130]      “Comparing Civil & Criminal Digital Forensics,” The Computer Forensics Show, Washington D.C., February 6, 2008.

[131]      Panelist - “Risky Business,” Oklahoma Business Ethics Consortium (OkEthics), Tulsa, OK, January 24, 2008.

[132]      “Digital Forensics:  Applications for Professionals,” ASIS International Tulsa Chapter, Tulsa, OK, December 8, 2007.

[133]       “Digital Forensics:  Applications for Professionals,” Oklahoma Infragard, Tulsa, OK, November 14, 2007.

[134]      “Digital Forensics:  Applications for the Legal Professional,” 2007 Winter Judicial Conference, Oklahoma City, OK, November 6, 2007.

[135]      “ECM: E-Discovery in the Modern Business Landscape,” AIIM of Oklahoma, Tulsa, OK, October 24, 2007.

[136]       “Digital Forensics,” American College of Forensic Examiners Institute of Forensic Science (ACFEI) – 2007 National Conference, Kansas City, MO, October 4-6, 2007.

[137]      Best Individual Presentation, “Digital Forensics:  Applications for the Legal Professional,” Federal Court House - Inns of Court, Tulsa, OK, September 20, 2007.

[138]      “Where is My Search Warrant: Comparing Civil and Criminal Digital Forensics,” High Technology Crime Investigation Association (HTCIA) - 2007 International Training Conference & Exposition, August 27-29, 2007.

[139]      “Digital Forensics in the Rapidly Changing Technology World,” Oklahoma Association of Defense Counsel (OADC) - 2007 Summer Meeting, Horseshoe Bay, TX, June 21-23, 2007.

[140]      “Applications for Preservation and Production in our Digital World,” Information Technology Management Council Meeting, Department of the Interior, Washington D.C., November 16, 2006.

[141]      “Digital Forensics: Key Applications for Employers and HR Leaders,” Employment Law & Practices Seminar, Tulsa Area Human Resources Association, Tulsa, OK, November 2, 2006.

[142]      “Digital Forensics: Applications for Professionals,” Tulsa TechFest, Tulsa, OK, October 14, 2006.

[143]      “Secure Oklahoma: IT Security and Disaster Management Panel Discussion,” the IT Summit, Tulsa, OK, October 11, 2006.

[144]      Featured Speaker “Digital Forensics: Applications for Professionals,” Association of System Managers, Tulsa, OK, September 6, 2006.

[145]      “Digital Forensics: Applications for IT Audit and Security Professionals,” IS Audit and Control Association (ISACA) & Information Security Association of America (ISSA), Tulsa, OK, August 15, 2006.

[146]      “Linking Individuals to Digital Information,” American College of Forensics Examiners National Conference, Orlando, FL, September 22-23, 2006.

[147]      Keynote Speaker, “Digital Forensics: Insight into the Digital Life of your Business,” Tulsa Community College, Cyber Security Conference, Tulsa, OK, March 3, 2006.

[148]      “Digital Forensics Applications for Investigators,” World Investigators Conference, Las Vegas, NV, September 23, 2005.

[149]      “Digital Forensics Applications for Investigators,” Oklahoma Private Investigators Association Tulsa Seminar, May 20-21, 2005.

[150]      “Countering the Threats to America’s Public Communications Networks; Now and in the Future,” National Safety Information Exchange (NSIE), Tampa Bay, FL, January 11, 2004.

[151]      “Network Convergence: Security Themes and Issues,” British Telecom's Worldwide Network Management Centre, Oswestry, United Kingdom, December 13, 2004.

[152]      “Forensic Analysis of Telecommunications Networks,” Digital Forensics Working Group, Johns Hopkins University, Columbia, MD, August 9, 2004.

[153]      “Imaging and Analysis of GSM SIM Cards,” Digital Forensics Working Group, Johns Hopkins University, Columbia, MD, August 9, 2004.

[154]      “A Research Agenda for Converged Network Security: Telecommunications Infrastructure Protection,” I3P Consortium Meeting, Pacific Northwest National Laboratory, Richland, WA, June 14-18 2004.

[155]      “Telecommunications and Forensics Research Efforts; a Proposal for Future Collaboration,” Sandia National Laboratories, Albuquerque, New Mexico, May 13-14, 2004.

[156]      “Telecommunications Over IP: the Future of VoIP, SS7oIP and SIP protocols,” Prepared for British Telecom and National Infrastructure Security Co-ordination Centre (UK), April 2004.

[157]      “Combating Threats to America’s Emergency Communications Services,” Director of Research Information Evaluation Division, National Security Agency, Tulsa, OK April 15-16, 2004.

[158]      “Working with Local Law Enforcement,” Computer Forensics Educators Working Group, IRS Computer Forensics Laboratory, Alexandria, Virginia, November 7-8, 2003.

[159]      “Securing 911 Systems and the Government Emergency Telecommunications Service (GETS),” presented at the National Security Council, The White House, Washington, DC, October 16, 2003.

[160]      “A Research Agenda for Telecommunications Security,” presented at the National Institute of Standards and Technology (NIST), Gaithersburg, Maryland, October 16, 2003.

[161]      “Countering the Threats to America’s Public Telephone Networks,” presented at the Office of the Deputy Under Secretary of Defense for Advanced Systems and Concepts, Interoperability and Network Centric Warfare, Pentagon, Washington, DC, October 15, 2003.

[162]      “Strategies for Securing SS7-VoIP Interconnected Networks,” presented at DARPA, Arlington, Virginia, October 15, 2003.

[163]      “A Research Agenda for Telecommunications Security,” presented at the Department of Homeland Security (NCS/DISA), Arlington, Virginia, September 12, 2003.

[164]      “Countering the Threats to America’s Public Telephone Networks,” presented at the National Defense University, Fort Leslie McNair, Washington, DC, September 11, 2003.

[165]      “A Research Agenda for Telecommunications Security,” presented at the INFOSEC Research Council Meeting, DARPA, Arlington, Virginia, September 11, 2003.

[166]      “Wireless Networks – The Technology, Security, and Forensics,” Electronic Crimes Program 2003 Continuing Professional Education Seminar, Internal Revenue Service, Tulsa, Oklahoma, July 28-31, 2003.

[167]      “Email Headers, Traceroute, and Internet Trace Evidence,” Electronic Crimes Program 2003 Continuing Professional Education Seminar, Internal Revenue Service, Tulsa, Oklahoma, July 28-31, 2003.

[168]      “Computer Forensics Laboratory Projects,” Computer Forensics Educators Working Group, Department of Defense Computer Forensics Lab, Linthicum, Maryland, June 23-24, 2003.

[169]      “An Intense Project and Laboratory Oriented IA Curriculum,” Colloquium for Information Systems Security Education, Washington D.C., June 2, 2003.

[170]      “Overview of Computer Forensics as a field,” University of Idaho Workshop on Computer Forensics, University of Idaho, Moscow, Idaho, September 23-25, 2002.

[171]      “Defending Public Telephone Networks,” SIEC Telecom Conference, National Security Information Exchange, September 18, 2002.

[172]      “Computer Forensics, Digital Evidence, Evidence: Network Collection and Discovery,” ASM Computer Security Seminar University of Tulsa, March 6, 2002.

[173]      “Computer Forensics, Evidence Collection, Discovery, and Handling, Computer Forensics Tools,” Williams Energy Group, Tulsa Oklahoma, September 26, 2001.

[174]      “Computer Network Forensics, an Introduction for IT Managers,” Current issues in telecommunications, University of Oklahoma, September 19, 2001.

Professional memberships

 

American Academy of Forensics Science, 2005 – Present.

American College of Forensic Examiners Institute (ACFEI), 2005 – Present.

Association of Computing Machinery, 1996 – Present.

Boy Scouts of America, Eagle Scout, 1983 – Present.

Entrepreneurs of Tulsa, 2005 – Present.

FIRST Robotics, 2000 – 2006.

High Tech Criminal Investigation Association (HTCIA), 2001 – Present.

Honor Society of Phi Kappa Phi, 2002 – Present.

Industrial Security Awareness Council (ISAC), 2005 – 2008.

Information Security Association of America (ISSA), 2004 – Present.

InfraGard, 2004 – Present.

Institute of Electrical and Electronics Engineers (IEEE), 2004 – Present.

International Information Systems Forensics Association (IISFA), 2004 – Present.

Service

 

Member, Board of Directors, ISSA Tulsa Chapter, 2013-present.

Member, ABA Technology in the Practice and Workplace Committee, 2013-present.

Reviewer, Information Security Journal: A Global Perspective, 2010-2011.

Coach, Mayor’s Entrepreneurial Spirit Award, 2009 – 2011.

Member, Small Business Council, Tulsa Metro Chamber, 2008 – 2010.

Reviewer, Digital Forensics Magazine, 2009.

Reviewer, Journal of Digital Forensics Practice, 2009.

Reviewer, IEEE Security & Privacy, 2008.

Reviewer, Journal of Digital Forensics, Security and Law, 2008.

Board of Directors, Internship Tulsa Habitat for Humanity, 2008.

Organizing Committee, Tulsa TechFest 2006 – 2007.

Member, Tulsa Technology Center Cyber Security and Cyber Forensics Advisory Committee, 2006 – Present.

“Tips for Keeping Kids Safe Online,” a curriculum in combination with a donated brochure and presentation titled “Dangers of the Internet: How safe are your children?” promotes opened communication between adults and youth about the potential dangers of Internet. This curriculum has been delivered in dozens of presentations at schools, parents associations, and community organizations, 2006 – Present.

DACUM Panel member, Computer Forensics DACUM, Texas State Technical College Waco, Austin, TX, October 31 – November 1, 2005.

Member, Tulsa Chamber of Commerce, Education Committee 2005 – 2009.

Member, Tulsa’s Young Professionals (TYPros), Colleges & Universities Crew and Business Development 2005 – 2008.

Participant, Joint Research Project: Securing Current and Future Telecommunications Infrastructures: A Research Agenda, National Infrastructure Security Co-ordination Centre, Thames House, London, United Kingdom, December 15-16, 2004.

Vice Chair, Founding Member, International Federation for Information Processing Working Group 11.9 Digital Forensics, 2004 – 2008.

Founding Member, Digital Forensics Working Group (formally CFEWG), 2002 – 2008.

Reviewer, “Journal of Network and Systems Management,” September 2003.

United Way Online Auction Campaign, technical manager and administrator, 2001 – 2009.

Reviewer, “Workshop on Trusted Computing Paradigms,” May 2002.

Participant, Forensics Academic Curriculum Summit, West Virginia University, Pittsburg, Pennsylvania, September 19-20, 2002.

Participant, Institute for Information Infrastructure Protection (I3P), Telecommunications Requirements Identification Workshop, The RAND Corporation, Arlington, VA, July 29-30 2002.

Research Member, Investigative Research for Infrastructure Assurance (IRIA) Group, Institute for Security Technology Studies, George Mason University, Fairfax Virginia, March 19, 2001.

Participant, AIA Student/Faculty Cyber Summit, Air Force Air Intelligence Agency, Kelly Air Force Base, Texas, August 14-16 2000.