Top of Page

(ISC)² Board of Directors

One of the many things that makes the (ISC)² community special is we have members who seek out challenges. We see that every day in our (ISC)² Board of Directors.

Elected by fellow members, our board members are (ISC)² certified like you. These leading information security professionals represent a wide range of organizations around the world. As our board members, they’re responsible for:

  • Providing strategic direction, governance and oversight for (ISC)²
  • Developing policies and procedures
  • Granting certifications
  • Enforcing the (ISC)² Code of Ethics
  • Get to Know Our Board Members Get to Know Our Board Members
    Dr. Kevin Charest

    Dr. Kevin Charest, Chairperson, CISSP (USA)

    Dr. Kevin Charest serves as the divisional senior vice president and chief information security officer for Health Care Service Corporation. He is responsible for all aspects of IT security operations across HCSC’s five plan states, including actively monitoring and mitigating current cyberthreats and overseeing the governance, risk and compliance program.

    Dr. Charest comes to HCSC from UnitedHealth Group, where he served as the VP of IT security and cyber defense operations. Prior to joining UnitedHealth Group, he served as the chief information security officer for the U.S. Department of Health and Human Services (HHS) and was directly responsible for the HHS cybersecurity technology portfolio.

    Prior to joining the federal government, Dr. Charest served in a number of entrepreneurial and senior executive positions in the private sector. His leadership in technology applications, innovation and security were instrumental to the development of numerous products and services.

    Dr. Charest currently serves as a board chair for (ISC)², the largest international information security certifying body in the world. Additionally, he works across multiple industries and platforms focused on information sharing for cyber defense improvement broadly.

    Dr. Charest holds a Ph.D. in Cybersecurity from Capella University. He also holds a master’s degree in Business Administration from the University of West Georgia and a bachelor’s degree in Computer Science from the University of Central Arkansas. He is also a veteran of the United States Marine Corps and the U.S. Army.

    Jennifer Minella

    Jennifer Minella, Vice Chairperson, CISSP (USA)
    (ISC)² Board Business Practices Committee Chair

    Jennifer is currently Vice President of Engineering and Consulting CISO with Carolina Advanced Digital, Inc. With more than 15 years of experience working in the technology industry, Jennifer's most recent focus is in specialized areas of infrastructure security, including:

    • Network access control (NAC) and 802.1X
    • Wireless security technologies
    • Industrial security 
    • SCADA
    Jennifer has provided strategic security consulting for government agencies, educational institutions and Fortune 100 and 500 corporations. 

    In addition to consulting and client project implementations, Jennifer is an author, contributor and trusted media resource for information security topics. 

    Jennifer was a contributing author of the (ISC)² Official CISSP Courseware v9 and a co-author of Low Tech Hacking. She is also a consulting faculty member of IANS Research, contributing author of technology publications and a trusted technical advisor to editors and journalists across the U.S.




    Greg Thompson

    Greg Thompson, Treasurer, CISSP (Canada)
    (ISC)² Board Foundation Committee Chair
    (ISC)² Board Audit and Compensation Committee Chair

    Greg is a Security and Risk executive with extensive industry experience in industries ranging from Telecommunications to the Financial Services Industry. He has held various executive Risk Management and Information Security positions including:

    • Head of Global IS Security and CISO for Manulife Financial Corporation (2000-2003)
    • VP Enterprise Security & Deputy CISO, Scotiabank (2008-2015)
    • And presently as VP Global Operational Risk, Scotiabank
    Greg has been actively involved as a volunteer with (ISC)² for more than 10 years, first serving as a member of the North American Advisory Board and as a contributing member of the Executive Writer’s Bureau. 

    This is Greg’s second term on the (ISC)² Board of Directors. He previously served between 2011 and 2014. 

    Greg also currently serves as Trustee for the Center for Internet Safety and Education (formerly the (ISC)² Foundation). 

    He is based in Toronto, Canada and is married with three children.




    Wim Remes

    Wim Remes, Secretary, CISSP (Belgium) 
    (ISC)² Board Strategy Committee Chair
    (ISC)² Board Ethics Committee Chair
    (ISC)² Board By-Laws Committee Chair

    Wim is the founder of and principal consultant at NRJ Security, based in Belgium. He leverages 15+ years of security leadership experience to advise clients on reducing their risk posture by solving complex security problems and by building resiliency into their organizations.

    Wim delivers expert guidance on reducing the high cost of IT security failures, both financially and in terms of brand reputation combining his deep expertise in network security, identity management, policy design, risk assessment and penetration testing to develop innovative approaches to enterprise security.

    Before starting NRJ Security, Wim was active as Manager Global Services EMEA at Rapid7. Previously, he has worked as managing consultant at IOActive, as manager of Information Security for Ernst and Young and as a security consultant for Bull, where he gained valuable experience building security programs for enterprise class clients.

    Wim has been engaged in various infosec community initiatives such as the co-development of the Penetration Testing Execution Standard (PTES), InfosecMentors and organizing the BruCON security conference.

    Wim has been a featured speaker at international conferences such as Excaliburcon (China), Black Hat Europe, Source Boston, Source Barcelona and SecZone (Colombia).

    Wim also was a member of the (ISC)² Board of Directors from 2012 until 2014. He served as the chairperson in 2014.

    Biljana Cerin, CISSP (Croatia)

    Biljana Cerin is the Director of Ostendo Consulting, which was founded 2011 in London, U.K. and Zagreb, Croatia. The company provides information security and risk management, IT governance, and compliance related consulting services.

    Biljana has extensive experience in leading successful information security projects for clients in financial, telecommunication, government, oil and gas, energy, biotechnology, higher education, and IT services sectors worldwide.

    Her primary focus is achievement of visible results for the client organizations and ensuring information security is seen as a business enabler when meeting legal and regulatory requirements (such as GDPR, HIPAA, GMP Annex 11, PCI DSS).

    Biljana is President of the (ISC)² Croatia Chapter, a frequent speaker at leading international information security conferences, and the bearer of CISSP, CIPP/E, CISA, CISM, CGEIT, CBCP and PMP professional certifications. She strives towards engaging young professionals, especially women, in information security field during early stages of their careers and establishing a stronger connection between the professional community and educational institutions.

    Tony Cole, CISSP, SSCP (USA)

    Tony Cole is a cybersecurity expert with more than 30 years’ experience, a bachelor’s degree in computer networking and holds his CISSP certification. Today, he serves as Attivo Networks Chief Technology Officer. Prior to joining Attivo Networks, Mr. Cole served in a number of executive roles at FireEye, McAfee, and Symantec. He’s retired from the U.S. Army and was an early advisor to Wall Street on the cybersecurity market. Mr. Cole is on the Board of Silent Circle, serves on the NASA Advisory Council and on the (ISC)² Board of Directors. He’s also a former president of ISSA-DC.

    Art Friedman

    Arthur R. Friedman, CISSP (USA)
    (ISC)² Board Awards Committee Chair

    Arthur has 37 years of diversified technical, national policy, management and teaching experience in the cybersecurity field. He currently supports the Committee on National Security Systems as a senior Cybersecurity Strategist. 

    Arthur has held various technical and management positions at the National Security Agency supporting the Nuclear Command and Control mission, the development of tools and capabilities in the area of computer network defense, and systems security engineering. 

    Additionally, Arthur was detailed to the Office of the Secretary of Defense providing policy and strategic guidance for the Department’s Information Assurance Research and Technology program. 

    He also worked in the private sector for The MITRE Corporation and Booz, Allen and Hamilton as a systems security engineer. 

    Additionally, he is a Certified Information Systems Security Professional and served on both the (ISC)² Government Advisory Council for Cybersecurity and a judge for the Government Information Security Leadership Awards (GISLA) for the past 13 years. 

    Arthur is an adjunct faculty member teaching Network Security and Cybersecurity classes for Towson University. 

    He has an undergraduate degree in Mathematics from Hofstra University and graduate degrees in Business Administration from Boston University and National Security Policy from the United States Army War College. 

    Arthur retired from the U.S. Army Reserves as a Colonel with his last assignment with the United States Strategic Command responsible for planning and executing non-kinetic/cyber operations at the strategic level. 

    Arthur lives in Maryland and spends his free time sailing on the Chesapeake Bay with his wife.

    Sia Honig

    Sai Honig, CISSP, CCSP (New Zealand)

    Originally from the United States, Sai now resides in New Zealand. 

    Sai is a multipotentialite who has worked in differing roles in various industries. She has experience in governance, audit and operations of IT. Her industrial experience includes manufacturing, healthcare, and education. 

    Sai has volunteered for Grameen Foundation assisting their global efforts in microfinance and alternative methods of assisting those to access capital in order to improve their lives, their families and their communities. 

    Sai’s proudest moment was when her volunteer efforts were recognized with The President’s Volunteer Service Award in May 2013. 

    Moving to New Zealand in 2014, Sai has worked in a hospital system serving a mostly rural community. One project she was involved with is the implementation of a cloud-based virtual health service. 
    Sai’s interest in cloud technologies has led to her contributing a chapter on cloud governance in “The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues” and participation in writing various white papers.  

    Sai will be working as a security consultant for cloud-based accounting software company, Xero, in Wellington, New Zealand.

    Earl Crane

    Dr. Earl Crane, CISSP (USA)

    Dr. Earl Crane is a cybersecurity executive and trusted advisor to public and private sector organizations, helping them to manage their strategy, risk and cybersecurity programs. He is a prominent cybersecurity veteran, having worked at early security startups, the White House, the financial sector and other Fortune 100s, and co-founded Emergynt, a digital risk management platform based on his Ph.D. research. He holds a Ph.D. from George Washington University, and a Masters of information system management and B.S. in mechanical engineering from Carnegie Mellon University.


    Tiffany Olson Kleemann, CISSP (USA)

    Tiffany Olson Kleemann is the chief executive officer of Distil Networks, the leader in protecting websites, mobile apps and APIs from botnets and automated attacks. As CEO, she is responsible for all facets of the business and operations. Mrs. Kleemann is a dynamic business executive with more than 20 years of proven business and operations experience within the information technology industry (large companies and start-ups), the White House, government and U.S. military.

    Mrs. Kleemann graduated from the Coast Guard Academy and received her commission as a Coast Guard Officer. She currently sits on the boards of MKA Cyber and WhiteHawk, along with (ISC)². Mrs. Kleemann is also a member of the CSIS Cyber Security Commission and speaks as a cybersecurity expert for many organizations and governments around the globe.

    Mrs. JKleemann’ military awards include Coast Guard Officer of the Year Award, a Coast Guard Commendation Medal, two Coast Guard Achievement Medals, numerous Commandant’s Letter of Commendation Ribbons, the Coast Guard Meritorious Unit Commendation award, Coast Guard Meritorious Team Commendation award, six Special Operations Ribbons, the Sea Service Ribbon and other unit citations.

    She has two children, enjoys cooking, singing in her band and spending time with family and friends. She is also an investor of Fair Winds Brewing Company, a new microbrewery in the Northern Virginia area.

    David Kennedy

    David Kennedy, CISSP (USA)
    (ISC)² Board Strategy Committee Co-Chair

    David is founder of TrustedSec and Binary Defense Systems. Both organizations focus on the betterment of the security industry from an offense and a defense perspective. 

    David was the former CSO for Diebold Incorporated where he ran the entire infosec program. 

    David is a co-author of the book "Metasploit: The Penetration Testers Guide,” the creator of the Social-Engineer Toolkit (SET), Artillery, and a number of popular open source tools. 

    He has been interviewed by several news entities including CNN, Fox News, MSNBC, CNBC, BBC World News and Katie Couric. He is the co-host of the social-engineer podcast and on a number of additional podcasts. 

    David has testified before the U.S. Congress on two occasions about the security around government websites. 

    David is one of the founding authors of the Penetration Testing Execution Standard (PTES), a framework designed to fix the penetration testing industry. He is also the co-founder of DerbyCon, a large-scale conference in Louisville, Kentucky. 

    Prior to the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence related missions.

    Zach Tudor

    Zachary Tudor, CISSP (USA)
    (ISC)² Board Nominations Committee Chair

    Zachary (Zach) is the Associate Laboratory Director of Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization. It’s a major center for national security technology development and demonstration, employing 550 scientists and engineers across $300M in programs for the: 

    • Department of Defense (DOD)
    • Department of Homeland Security (DHS)
    • The Intelligence Community
    N&HS is responsible for INL’s Nuclear Nonproliferation, Critical Infrastructure Protection, Defense Systems and Homeland Security missions that include:
    • Safeguarding and securing vulnerable nuclear material
    • Enhancing the overall security and resilience of the nation’s infrastructure
    • Providing protective system solutions and heavy manufacturing of armor for national defense
    Zach has more than 30 years of experience in IT and cyber security management, operations and incident response. 

    Past positions include Program Director in the Computer Science Laboratory at SRI International, support to the Control Systems Security Program (CSSP) and the ICS-CERT at DHS, on-site deputy, program manager for the NRO’s world-wide operational network, information security manager for OSD CIO’s Enterprise Operations Support Team and security management support for the Centers for Medicare and Medicaid Services. 

    Zach holds an M.S. in Information Systems from George Mason University concentrating in cyber security.


    Prof. Hiroshi Yasuda

    Prof. Hiroshi Yasuda, Dr.E, CISSP (Japan) 

    Hiroshi received the B.E., M.E. and Dr.E. from the University of Tokyo, Japan in 1967, 1969 and 1972 respectively. Then, he joined the Electrical Communication Laboratories of NTT in 1972. 

    After that, Hiroshi served 25 years (1972-1997) as the Vice President, Director of NTT Information and Communication Systems Laboratories at Yokosuka. He left NTT and joined The University of Tokyo. 

    Hiroshi acted as the Director of The Center for Collaborative Research (CCR) for two years (2003-2005). He is now a professor in Tokyo Denki University. His study area is applied information technology. 

    Hiroshi has been involved in works on Video Coding, Image Processing, Tele-presence, B-ISDN Network and Services, Internet and Computer Communication Applications. 

    Hiroshi has started research on DRM (Digital Rights Management), Network Security and “Kansei” (more human) communication. He is now advocating collaboration between Industries and Academia.

Corporate Governance

(ISC)²’s governance framework guides how our Board of Directors and our management oversee our nonprofit corporation. This framework is outlined in our governing documents, including the (ISC)2 Bylaws.

The (ISC)² Amended and Restated Bylaws establish fundamental principles about our members’ rights, Board operations and key governance policies.

(ISC)² Annual and Special Meeting Minutes

(ISC)² Board of Directors Frequently Asked Questions

  • Duties and Powers of the Board Duties and Powers of the Board

    What are the duties and powers of the (ISC)² Board of Directors?


    The (ISC)² Board of Directors represents our membership as a whole. Our Bylaws govern the responsibilities and activities of the organization. 

    Our Bylaws clearly state: The Board of Directors shall have the powers and duties of a board of directors pursuant to the laws of the Commonwealth of Massachusetts, and shall be responsible for the policy and governance of the Corporation. The Board shall hire, direct and oversee the CEO.

    In addition, the (ISC)² Board of Directors: 

    • Works with management to ensure that policy and strategy are set, documented and clearly understood by both the board and management.
    • Ensures that (ISC)² management is performing to a level that allows them to deliver on their objectives.
    • Ensures that the assets of the corporation are being used wisely and strategic initiatives are adequately resourced.
  • Responsibilities of the Board Responsibilities of the Board

    What are the responsibilities of the (ISC)² Board?


    The (ISC)² Board of Directors:

    • Provides overall corporate governance
    • Issues certifications to qualified candidates who have met all the necessary credential requirements
    • Reviews and approve proposed new credentials or changes to existing credentials
    • Participates on various committees, such as the Nominating Committee, Ethics Committee, Scheme Committee, Strategic Planning Committee and Scholarship Committee
    • Acts as evangelists and advocates for the organization and the (ISC)² mission
    • Adheres to the (ISC)² Code of Ethics and all other (ISC)² policies.
  • Term of Office for Board Members Term of Office for Board Members

    What is the term of office and how many terms can a Board member serve?


    Our member-elected directors serve three-year terms. Our board-appointed directors serve terms that are up to three years in length. 

    Each director serves until his or her successor is duly appointed or elected. 

    The terms are staggered. Only one-third of our directors stand for election each year. This is a best practice for nonprofit organizations. It provides continuity of leadership and stewardship. 

    A director may serve up to six years in any 10-year period. 

  • Compensation for the Board Compensation for the Board

    Do Board members get paid?

    Our board members are volunteers. They aren’t paid for their time and effort. 

    (ISC)² does pay their travel expenses to attend mandatory board meetings and committee meetings.
  • Nominating Candidates for the Board Nominating Candidates for the Board

    What is the (ISC)² Board’s nomination process?


    Early in the year, the (ISC)² Board of Directors begins looking for potential candidates. First, the Board asks various advisory councils and committees for suitable nominations. 

    Then, the Nominations Committee spends time vetting the candidates against various criteria. (See Board election process.) This process ensures that candidates:

    • Have demonstrated their abilities.
    • Have the desire to provide their time and energies to (ISC)² over an extended period of time.
    • Are likely to be productive board members.

    Is the membership notified when and how to recommend candidates for the Board or prepare a petition for candidacy?


    Yes, (ISC)² notifies its members of petition procedures and deadlines every year. 

    If you’re submitting a petition with names to go on the official ballot, it must be received at least 60 days before the election. This gives board members the time to ensure that candidates are qualified and agree to serve if elected. If these criteria are met, the candidates’ names appear on the official ballot. 

    For information about the rules, procedures and timeline for the annual election, check out our Board of Directors election details.

  • Meetings Open to Members Meetings Open to Members

    Are there regular meetings that (ISC)² members may attend?

    (ISC)² holds a meeting that’s open to all members at least once a year. Usually, it happens along with the first board meeting of the year — typically, in Florida, USA. 

    Members are notified of the meeting at least 60 days in advance of the meeting. 
  • Members Can Influence Change Members Can Influence Change

    How can (ISC)² members influence change for the organization?

    The best way is to share your input with your local chapter. Your chapter can raise your feedback or issue with the respective (ISC)² regional office. 

    The regional offices all report through the chief operating officer (COO). The COO will address the issue, if appropriate. Or, the COO may escalate it to the chief executive officer, if needed.