Our Authors

Cyber Protection Magazine works with many distinguished experts and professionals.

We are always looking for contributors to Cyber Protection Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?

Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!

We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:

CISO and VP Managed Security Services at 

Tim Bandos, CISSP, CISA, CEH is CISO and VP Managed Security Services at Digital Guardian and an expert in incident response and threat hunting. He has over 15 years of experience in the cybersecurity world and has a wealth of practical knowledge gained from tracking and hunting advanced threats that targeted stealing highly sensitive data. A majority of his career was spent working at a Fortune 100 company where he built an Incident Response organization and he now runs Digital Guardian’s global Security Operation Center for Managed Detection & Response.

Vice President Cyber Security at 

Tim Bandos, CISSP, CISA is Vice President of Cybersecurity at Digital Guardian and an expert in incident response and threat hunting. He has over 15 years of experience in the cybersecurity realm at a Fortune 100 company with a heavy focus on Internal Controls, Incident Response & Threat Intelligence. At this global manufacturer, he built and managed the company’s incident response team. Tim has a wealth of practical knowledge gained from tracking and hunting advanced threats targeted at stealing highly sensitive data.

Vice President Global Market Strategy at 
Global Head of Encryption Products at 
Security Architect at 

Tom Madsen has been active in the cybersecurity industry for more than 20 years. Tom graduated from the University of Aalborg and covered several technical roles in security during his professional career. He is certified as CISSP, CISA, CISM, CGEIT, CRISK and CSSLP, and has published the book “The Art of War for Cybersecurity”. Currently Tom holds the position of Security Architect at ATEA in Denmark.

Cybersecurity Risk Management and Compliance at 

As Drata’s Senior Manager, Cybersecurity Risk Management & Compliance, Troy Fine advises customers on building sound cybersecurity risk management programs while meeting security complaints requirements. Fine is a CPA, CISA, CISSP and CMMC Provisional Assessor and a Registered Practitioner, whose areas of expertise include GRC, SOC 2 audits, SOC 2+ examinations, CMMC, NIST 800-171, NIST 800-53, Sarbanes-Oxley Section 404 compliance, HITRUST assessments, HIPAA assessments, ISO 27001 assessments and third-party risk management assessments. Prior to Drata, he served as Senior Manager of IT Risk Advisory Services at Schneider Downs.

Director Product Management at 

Vinay Purohit is Director of Product Management at Sectigo, a leading provider of automated digital identity management and web security solutions. With more than 20 years of software development and managing cybersecurity products, Vinay leads the company’s innovations around PKI, DevOps, Mobile, and Cloud security. Before Sectigo, he was with Entrust and Nokia Software. He has an Engineering degree in computer science.

Wade Ellery is the Senior Technical Evangelist and IAM Consultant at Radiant Logic. Wade has thirty years of experience in enterprise IT direct and channel software, and professional services, sales and management. Wade has worked in pivotal roles in major corporations, startups, and market leaders across North America and Europe.   He has in-depth knowledge and experience in analyzing, designing, integrating, and deploying enterprise IAM, IGA, PAM, ZTA, Cloud services, risk and compliance solutions and addressing IT security challenges. Wade has consulted on some of the largest identity management solutions deployed across Federal and Commercial clients.