Cyber Certification Board of Advisors

The Information Shield Cyber Certification is reviewed by a team of qualified information security and data privacy professionals with many years of real-world cyber security experience.   The Advisory Board is made up of key leaders in the area of information security, risk management, data privacy, incident response and cyber insurance.

Current Cyber Certification Advisory Board Members

Dr. Herb Mattord

Dr. Herb Mattord, Phd.Dr. Herb Mattord is a Professor at Kennesaw State University.  He is currently Associate Professor of Information Security and Assurance, Department of Information Systems, Coles College of Business.   Dr. Mattord has over 40 years of both industry and academic experience.  As the CSO of Georgia Pacific, Herb lead the worldwide adoption of information security tools and programs.   Along with is co-author, Dr. Michael Whitman, Dr. Mattord is the author of the popular Principles of Information Security series of textbooks on Information Security used around the country.  


Mark Greisiger

Mark GreisigerMark Greisiger is a pioneer in the area of cyber insurance and risk management.   As the President of NetDiligence, Mark has lead the development of software solutions and programs to manage and reduce cyber risk within the insurance industry.  Prior to joining NetDiligence, Mark spent 12 years in the insurance industry, primarily with CIGNA P&C, where he created the first generation of cyber risk insurance.  A recognized thought-leader in the area of cyber risk and insurance, he is founder of the ERiskHUB and the NetDiligence Cyber Risk Summit – the leading conference on cyber risk for the insurance industry.  Mark also co-founded the annual Cyber Claims Study, the industries’ leading source for actual cyber loss claims from insurance providers.


Ben Rothke, CISSP

Ben Rothke, CISSP, CISM, PCI-QSABen Rothke has been one of the top leaders in the information security space for over 30 years, bringing a wealth of both practical and theoretical knowledge.    Ben is a recognized speaker and author and has written over 100 articles on Cyber Security.  Among his many accomplishments, Ben also writes security and privacy book reviews for Slashdot and Security Management and is a former columnist for Information Security, Unix Review and Solutions Integrator magazines.  He published the Security Meltdown blog for CSO online and is a committee member for the Cyber Security Canon.   He is the author on one of the first books addressing cyber security awareness:  “Computer Security: 20 Things Every Employee Should Know” published by McGraw-Hill.


Jason Taule
Jason Taule, CISM

Jason Taule, CCSFP, CMC, CCISO, CISM, CGEIT, CISM, CGEIT, CRISC, CHSIII, CDPSE, CDPS, NSA-IAM. Jason Taule is a 30+ year information assurance and cybersecurity veteran who has worked in both the intelligence community and commercial sectors first consulting to Federal agencies and then serving as inside CISO and CPO both within Government and at large systems integrators like General Dynamics and CSC. 

Mr. Taule helped build the original DARPA CERT, helped develop the first computer security programs at the VA and NASA, and revised the Risk Assessment Methodology still used throughout the Federal Government.  Mr. Taule previously served as the inside CISO and VP of Standards for HITRUST, where he was responsible for developing and maintaining the Common Security Framework (CSF). Mr. Taule currently serves as the Cyber Advisory Council Chair and CISO-In-Residence, of the Maryland Innovation Center (MIC), an advanced business incubator helping companies in the greater Washington-Baltimore metroplex start and grow.  


Steve Martinson, CISSP

Steve Martinson, CISSP, CISM, PCI-QSA – Steve Martinson has over 30 years’ experience in cyber security and specializes in cyber security assessments and program validation.  He is a Senior information security consultant with GDT and has worked in senior positions at Accudate, Coalfire and AlertLogic.  Steve is a major contributor to the Cyber Certification and leads the development of the information security audit protocols.