Top of Page

(ISC)² Board of Directors

One of the many things that makes the (ISC)² community special is we have members who seek out challenges. We see that every day in our (ISC)² Board of Directors.

Elected by fellow members, our board members are (ISC)² certified like you. These leading information security professionals represent a wide range of organizations around the world. As our board members, they’re responsible for:

  • Providing strategic direction, governance and oversight for(ISC)²
  • Developing policies and procedures
  • Granting certifications
  • Enforcing the (ISC)² Code of Ethics
  • Get to Know Our Board Members Get to Know Our Board Members
    Dr. Kevin Charest

    Dr. Kevin Charest, Chairperson, CISSP (USA)
    (ISC)² Board Ethics Committee Co-Chair

    Kevin serves as the DSVP and Chief Information Security Officer for Health Care Service Corporation (HCSC) IT Security and Cyber Defense Operations for UnitedHealth Group. He is responsible for all facets of IT security for the largest member-owned healthcare company in the United States. 

    Prior to joining HCSC, Kevin led global cyber defense operations for UnitedHealth Group — the largest healthcare company in the world. He also served as the chief information security officer for the Department of Health and Services (HHS). 

    Prior to joining the U.S. federal government, Kevin served in several entrepreneurial and senior executive positions in the private sector. His leadership in technology applications, innovation, and security were instrumental to the development of numerous products and services. 

    As the board secretary for (ISC)², Kevin works across multiple industries and platforms focused on information sharing for cyber defense improvement. 

    Kevin holds a Ph.D. in Cybersecurity from Capella University. He also holds a master's degree in Business Administration from the University of West Georgia and a bachelor's degree in Computer Science from the University of Central Arkansas. 

    Kevin is a veteran of the U.S. Marine Corps and U.S. Army.

    Jennifer Minella

    Jennifer Minella, Vice Chairperson, CISSP (USA)
    (ISC)² Board Business Practices Committee Chair
    (ISC)² Board Nominations Committee Chair

    Jennifer is currently Vice President of Engineering and Consulting CISO with Carolina Advanced Digital, Inc. With more than 15 years of experience working in the technology industry, Jennifer's most recent focus is in specialized areas of infrastructure security, including:

    • Network access control (NAC) and 802.1X
    • Wireless security technologies
    • Industrial security 
    • SCADA
    Jennifer has provided strategic security consulting for government agencies, educational institutions and Fortune 100 and 500 corporations. 

    In addition to consulting and client project implementations, Jennifer is an author, contributor and trusted media resource for information security topics. 

    Jennifer was a contributing author of the (ISC)² Official CISSP Courseware v9 and a co-author of Low Tech Hacking. She is also a consulting faculty member of IANS Research, contributing author of technology publications and a trusted technical advisor to editors and journalists across the U.S.




    Greg Thompson

    Greg Thompson, Treasurer, CISSP (Canada)
    (ISC)² Board Foundation Committee Chair
    (ISC)² Board Strategy Committee Chair

    Greg is a Security and Risk executive with extensive industry experience in industries ranging from Telecommunications to the Financial Services Industry. He has held various executive Risk Management and Information Security positions including:

    • Head of Global IS Security and CISO for Manulife Financial Corporation (2000-2003)
    • VP Enterprise Security & Deputy CISO, Scotiabank (2008-2015)
    • And presently as VP Global Operational Risk, Scotiabank
    Greg has been actively involved as a volunteer with (ISC)² for more than 10 years, first serving as a member of the North American Advisory Board and as a contributing member of the Executive Writer’s Bureau. 

    This is Greg’s second term on the (ISC)² Board of Directors. He previously served between 2011 and 2014. 

    Greg also currently serves as Trustee for the Center for Internet Safety and Education (formerly the (ISC)² Foundation). 

    He is based in Toronto, Canada and is married with three children.




    Wim Remes

    Wim Remes, Secretary, CISSP (Belgium) 

    Wim is the founder of and principal consultant at NRJ Security, based in Belgium. He leverages 15+ years of security leadership experience to advise clients on reducing their risk posture by solving complex security problems and by building resiliency into their organizations.

    Wim delivers expert guidance on reducing the high cost of IT security failures, both financially and in terms of brand reputation combining his deep expertise in network security, identity management, policy design, risk assessment and penetration testing to develop innovative approaches to enterprise security.

    Before starting NRJ Security, Wim was active as Manager Global Services EMEA at Rapid7. Previously, he has worked as managing consultant at IOActive, as manager of Information Security for Ernst and Young and as a security consultant for Bull, where he gained valuable experience building security programs for enterprise class clients.

    Wim has been engaged in various infosec community initiatives such as the co-development of the Penetration Testing Execution Standard (PTES), InfosecMentors and organizing the BruCON security conference.

    Wim has been a featured speaker at international conferences such as Excaliburcon (China), Black Hat Europe, Source Boston, Source Barcelona and SecZone (Colombia).

    Wim also was a member of the (ISC)² Board of Directors from 2012 until 2014. He served as the chairperson in 2014.

    Biljana Cerin, CISSP (Croatia)

    Biljana Cerin is the Director of Ostendo Consulting, which was founded 2011 in London, U.K. and Zagreb, Croatia. The company provides information security and risk management, IT governance, and compliance related consulting services.

    Ms. Cerin has more than 17 years’ experience in leading successful projects for clients in financial, telecommunication, government, oil and gas, energy, biotechnology, higher education, and IT services sectors worldwide.

    Her primary focus is on the smooth execution of projects, deliver of high quality of services and achievement of visible results. Her professional goal is to ensure information security is seen as a business enabler when meeting legal and regulatory requirements (such as GDPR, HIPAA, GMP Annex 11, PCI DSS).

    Ms. Cerin is President of the (ISC)2 Croatia Chapter, a frequent speaker at leading international information security conferences, and the bearer of CISSP, CISA, CISM, CGEIT, CBCP and PMP professional certifications.

    Tony Cole, CISSP, SSCP (USA)

    Tony Cole is a cybersecurity expert with more than 30 years’ experience, a bachelor’s degree in computer networking and is a CISSP. He serves as FireEye’s Vice President and Global Government Chief Technology Officer. He retired from the U.S. Army where he worked in a variety of IT and security environments. He has been an advisor to Wall Street, sat on the advisory board for Secure Elements prior to its’ sale, served on U.S. President Obama’s NSTAC IoT security subcommittee, and served on the FCC CSRIC-V Council. He sits on the board for Silent Circle and is a member at-large of NASA’s Advisory Council. Mr. Cole is a former president of the ISSA-DC chapter, a recipient of the GCN Industry IT Executive of the Year, and was inducted into the Wash 100 as one of the most influential executives impacting government. He is also a volunteer at WhiteHat USA benefiting Children’s National Medical Center.

    Art Friedman

    Arthur R. Friedman, CISSP (USA)
    (ISC)² Board Awards Committee Co-Chair

    Arthur has 37 years of diversified technical, national policy, management and teaching experience in the cybersecurity field. He currently supports the Committee on National Security Systems as a senior Cybersecurity Strategist. 

    Arthur has held various technical and management positions at the National Security Agency supporting the Nuclear Command and Control mission, the development of tools and capabilities in the area of computer network defense, and systems security engineering. 

    Additionally, Arthur was detailed to the Office of the Secretary of Defense providing policy and strategic guidance for the Department’s Information Assurance Research and Technology program. 

    He also worked in the private sector for The MITRE Corporation and Booz, Allen and Hamilton as a systems security engineer. 

    Additionally, he is a Certified Information Systems Security Professional and served on both the (ISC)² Government Advisory Council for Cybersecurity and a judge for the Government Information Security Leadership Awards (GISLA) for the past 13 years. 

    Arthur is an adjunct faculty member teaching Network Security and Cybersecurity classes for Towson University. 

    He has an undergraduate degree in Mathematics from Hofstra University and graduate degrees in Business Administration from Boston University and National Security Policy from the United States Army War College. 

    Arthur retired from the U.S. Army Reserves as a Colonel with his last assignment with the United States Strategic Command responsible for planning and executing non-kinetic/cyber operations at the strategic level. 

    Arthur lives in Maryland and spends his free time sailing on the Chesapeake Bay with his wife.

    Sia Honig

    Sai Honig, CISSP, CCSP (New Zealand)
    (ISC)² Board Awards Committee Co-Chair

    Originally from the United States, Sai now resides in New Zealand. 

    Sai is a multipotentialite who has worked in differing roles in various industries. She has experience in governance, audit and operations of IT. Her industrial experience includes manufacturing, healthcare, and education. 

    Sai has volunteered for Grameen Foundation assisting their global efforts in microfinance and alternative methods of assisting those to access capital in order to improve their lives, their families and their communities. 

    Sai’s proudest moment was when her volunteer efforts were recognized with The President’s Volunteer Service Award in May 2013. 

    Moving to New Zealand in 2014, Sai has worked in a hospital system serving a mostly rural community. One project she was involved with is the implementation of a cloud-based virtual health service. 
    Sai’s interest in cloud technologies has led to her contributing a chapter on cloud governance in “The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues” and participation in writing various white papers.  

    Sai will be working as a security consultant for cloud-based accounting software company, Xero, in Wellington, New Zealand.

    Earl Crane

    Dr. Earl Crane, CISSP (USA)

    Dr. Earl Crane is the founder and CEO of Emergent Network Defense. He has advised the President of the United States as the Director for Federal Cybersecurity Policy on the White House National Security Council, Wall Street executives, and multiple Fortune 100 corporations on their cyber defensive strategies. Dr. Crane led the implementation of the Department of Homeland Security’s information security strategy, and has taught these techniques to hundreds of cybersecurity masters students and executives at Carnegie Mellon University. He was elected to the (ISC)² Board of Directors in 2017. He holds a Ph.D. from George Washington University, a Master of Science in Information System Management at Carnegie Mellon University and a Bachelor of Science in mechanical engineering at Carnegie Mellon University.


    Tiffany Olson Jones, CISSP (USA)

    Tiffany Olson Jones is the chief executive officer of Distil Networks, the leader in protecting websites, mobile apps and APIs from botnets and automated attacks. As CEO, she is responsible for all facets of the business and operations. Ms. Jones is a dynamic business executive with more than 20 years of proven business and operations experience within the information technology industry (large companies and start-ups), the White House, government and U.S. military.

    Ms. Jones graduated from the Coast Guard Academy and received her commission as a Coast Guard Officer. She currently sits on the boards of MKA Cyber and WhiteHawk, along with (ISC)². Ms. Jones is also a member of the CSIS Cyber Security Commission and speaks as a cybersecurity expert for many organizations and governments around the globe.

    Ms. Jones’ military awards include Coast Guard Officer of the Year Award, a Coast Guard Commendation Medal, two Coast Guard Achievement Medals, numerous Commandant’s Letter of Commendation Ribbons, the Coast Guard Meritorious Unit Commendation award, Coast Guard Meritorious Team Commendation award, six Special Operations Ribbons, the Sea Service Ribbon and other unit citations.

    She has two children, enjoys cooking, singing in her band and spending time with family and friends. She is also an investor of Fair Winds Brewing Company, a new microbrewery in the Northern Virginia area.

    David Kennedy

    David Kennedy, CISSP (USA)
    (ISC)² Board Strategy Committee Co-Chair

    David is founder of TrustedSec and Binary Defense Systems. Both organizations focus on the betterment of the security industry from an offense and a defense perspective. 

    David was the former CSO for Diebold Incorporated where he ran the entire infosec program. 

    David is a co-author of the book "Metasploit: The Penetration Testers Guide,” the creator of the Social-Engineer Toolkit (SET), Artillery, and a number of popular open source tools. 

    He has been interviewed by several news entities including CNN, Fox News, MSNBC, CNBC, BBC World News and Katie Couric. He is the co-host of the social-engineer podcast and on a number of additional podcasts. 

    David has testified before the U.S. Congress on two occasions about the security around government websites. 

    David is one of the founding authors of the Penetration Testing Execution Standard (PTES), a framework designed to fix the penetration testing industry. He is also the co-founder of DerbyCon, a large-scale conference in Louisville, Kentucky. 

    Prior to the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence related missions.

    Zach Tudor

    Zachary Tudor, CISSP (USA)
    (ISC)² Board Scheme Committee Co-Chair

    Zachary (Zach) is the Associate Laboratory Director of Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization. It’s a major center for national security technology development and demonstration, employing 550 scientists and engineers across $300M in programs for the: 

    • Department of Defense (DOD)
    • Department of Homeland Security (DHS)
    • The Intelligence Community
    N&HS is responsible for INL’s Nuclear Nonproliferation, Critical Infrastructure Protection, Defense Systems and Homeland Security missions that include:
    • Safeguarding and securing vulnerable nuclear material
    • Enhancing the overall security and resilience of the nation’s infrastructure
    • Providing protective system solutions and heavy manufacturing of armor for national defense
    Zach has more than 30 years of experience in IT and cyber security management, operations and incident response. 

    Past positions include Program Director in the Computer Science Laboratory at SRI International, support to the Control Systems Security Program (CSSP) and the ICS-CERT at DHS, on-site deputy, program manager for the NRO’s world-wide operational network, information security manager for OSD CIO’s Enterprise Operations Support Team and security management support for the Centers for Medicare and Medicaid Services. 

    Zach holds an M.S. in Information Systems from George Mason University concentrating in cyber security.


    Prof. Hiroshi Yasuda

    Prof. Hiroshi Yasuda, Dr.E, CISSP (Japan) 

    Hiroshi received the B.E., M.E. and Dr.E. from the University of Tokyo, Japan in 1967, 1969 and 1972 respectively. Then, he joined the Electrical Communication Laboratories of NTT in 1972. 

    After that, Hiroshi served 25 years (1972-1997) as the Vice President, Director of NTT Information and Communication Systems Laboratories at Yokosuka. He left NTT and joined The University of Tokyo. 

    Hiroshi acted as the Director of The Center for Collaborative Research (CCR) for two years (2003-2005). He is now a professor in Tokyo Denki University. His study area is applied information technology. 

    Hiroshi has been involved in works on Video Coding, Image Processing, Tele-presence, B-ISDN Network and Services, Internet and Computer Communication Applications. 

    Hiroshi has started research on DRM (Digital Rights Management), Network Security and “Kansei” (more human) communication. He is now advocating collaboration between Industries and Academia.

Corporate Governance

(ISC)²’s governance framework guides how our Board of Directors and our management oversee our nonprofit corporation. This framework is outlined in our governing documents, including the (ISC)2 Bylaws.

The (ISC)² Amended and Restated Bylaws establish fundamental principles about our members’ rights, Board operations and key governance policies.

(ISC)² Annual and Special Meeting Minutes

(ISC)² Board of Directors Frequently Asked Questions

  • Duties and Powers of the Board Duties and Powers of the Board

    What are the duties and powers of the (ISC)² Board of Directors?


    The (ISC)² Board of Directors represents our membership as a whole. Our Bylaws govern the responsibilities and activities of the organization. 

    Our Bylaws clearly state: The Board of Directors shall have the powers and duties of a board of directors pursuant to the laws of the Commonwealth of Massachusetts, and shall be responsible for the policy and governance of the Corporation. The Board shall hire, direct and oversee the CEO.

    In addition, the (ISC)² Board of Directors: 

    • Works with management to ensure that policy and strategy are set, documented and clearly understood by both the board and management.
    • Ensures that (ISC)² management is performing to a level that allows them to deliver on their objectives.
    • Ensures that the assets of the corporation are being used wisely and strategic initiatives are adequately resourced.
  • Responsibilities of the Board Responsibilities of the Board

    What are the responsibilities of the (ISC)² Board?


    The (ISC)² Board of Directors:

    • Provides overall corporate governance
    • Issues certifications to qualified candidates who have met all the necessary credential requirements
    • Reviews and approve proposed new credentials or changes to existing credentials
    • Participates on various committees, such as the Nominating Committee, Ethics Committee, Scheme Committee, Strategic Planning Committee and Scholarship Committee
    • Acts as evangelists and advocates for the organization and the (ISC)² mission
    • Adheres to the (ISC)² Code of Ethics and all other (ISC)² policies.
  • Term of Office for Board Members Term of Office for Board Members

    What is the term of office and how many terms can a Board member serve?


    Our member-elected directors serve three-year terms. Our board-appointed directors serve terms that are up to three years in length. 

    Each director serves until his or her successor is duly appointed or elected. 

    The terms are staggered. Only one-third of our directors stand for election each year. This is a best practice for nonprofit organizations. It provides continuity of leadership and stewardship. 

    A director may serve up to six years in any 10-year period. 

  • Compensation for the Board Compensation for the Board

    Do Board members get paid?

    Our board members are volunteers. They aren’t paid for their time and effort. 

    (ISC)² does pay their travel expenses to attend mandatory board meetings and committee meetings.
  • Nominating Candidates for the Board Nominating Candidates for the Board

    What is the (ISC)² Board’s nomination process?


    Early in the year, the (ISC)² Board of Directors begins looking for potential candidates. First, the Board asks various advisory councils and committees for suitable nominations. 

    Then, the Nominations Committee spends time vetting the candidates against various criteria. (See Board election process.) This process ensures that candidates:

    • Have demonstrated their abilities.
    • Have the desire to provide their time and energies to (ISC)² over an extended period of time.
    • Are likely to be productive board members.

    Is the membership notified when and how to recommend candidates for the Board or prepare a petition for candidacy?


    Yes, (ISC)² notifies its members of petition procedures and deadlines every year. 

    If you’re submitting a petition with names to go on the official ballot, it must be received at least 60 days before the election. This gives board members the time to ensure that candidates are qualified and agree to serve if elected. If these criteria are met, the candidates’ names appear on the official ballot. 

    For information about the rules, procedures and timeline for the annual election, check out our Board of Directors election details.

  • Meetings Open to Members Meetings Open to Members

    Are there regular meetings that (ISC)² members may attend?

    (ISC)² holds a meeting that’s open to all members at least once a year. Usually, it happens along with the first board meeting of the year — typically, in Florida, USA. 

    Members are notified of the meeting at least 60 days in advance of the meeting. 
  • Members Can Influence Change Members Can Influence Change

    How can (ISC)² members influence change for the organization?

    The best way is to share your input with your local chapter. Your chapter can raise your feedback or issue with the respective (ISC)² regional office. 

    The regional offices all report through the chief operating officer (COO). The COO will address the issue, if appropriate. Or, the COO may escalate it to the chief executive officer, if needed.