You can contact me:
via email: firstname.lastname@example.org or email@example.com (Optional: PGP Key: 226CCE21)
via chat: firstname.lastname@example.org (Optional: OTR Key Fingerprint: 407E6144 40622F8E 011A6D6C 67D8EB70 51F82E87)
via phone: 330-99-CYBER
via Skype: sarah_cortes
via Twitter: @SarahCortes
via LinkedIn: www.linkedin.com/in/sarahcortes
Check out my latest publication from SAGE on cyberterrorism:
Sarah Cortes, Cyberterrorism. In The SAGE Encyclopedia of War: Social Science Perspectives, Ed. Paul Joseph (2016) DOI: http://dx.doi.org/10.4135/9781483359878.n174.
In the press...
Hear my talk on privacy in Orlando, Florida, USA at NACACS, ISACA’s North America Computer Audit, Control and Security Symposium- Privacy Track.
I'm speaking jointly with renowned privacy expert Rebecca Herold, the Privacy Professor.
ISACA is the International Information Systems Audit and Control Association.
Biography@SarahCortes, MS, PMP, CISA, is President of Inman Technology. She earned her undergraduate degree at Harvard University, and holds an M.S. from Boston University, in Computer Science, Information Security. She is a PhD candidate in the Information Assurance program at Northeastern University’s College of Computing and Information Science. As a Senior Vice President for Security, IT Audit and Disaster Recovery at Putnam Investments, a major global asset management firm and subsidiary of Marsh & McLennan, Sarah oversaw Putnam’s recovery on 9/11 when parent company Marsh & McLennan’s World Trade Center 99th floor data center was destroyed. She also supervised over 65 IT audits per year in that capacity. As a senior executive and later consultant responsible for Putnam’s and other Fortune 500 firms, Sarah managed major applications development, data center and other operations, staff and budgets.
A former analyst for the US Department of Energy, she led the National Institute for Science and Technology (NIST) Cybersecurity Working Group sub-team, as co-author of the 2014 NIST: Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, as well as the 2010 volume, that created the security and privacy laws section of the report. She served on the privacy use cases team for two years and has been a member of the NIST cybersecurity working group (CSWG) on Smart Grid privacy for five years. She has recently co-led Northeastern University Law School Legal Skills in Social Context (LSSC) Clinics on Surveillance Law, Privacy Tools, and Tor and Domestic Surveillance, Domestic Terrorism and Privacy and Anonymity Technology, as well as a 2014 MIT Co-Design Studio class at MIT Media Lab on Domestic Surveillance, Domestic Terrorism, Privacy and Anonymity Technology and Tor. She has helped draft data breach laws, and testified before the Massachusetts legislature and regulatory agencies.
In addition to her work on various industry standards bodies, Sarah serves on the IEEE (Institute of Electrical and Electronics Engineers) P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group as subcommittee lead on research and use cases.
In her work to help end domestic violence and abuse, including cyberstalking and abuse through technology, Sarah serves on the Boards of Emerge, the first Abuser Intervention Program (BIP)(Vice President and Clerk), Transition House, one of the first domestic abuse shelters, and Employers Against Domestic Violence (EADV).
Sarah is the co-author of the industry leading technical treatise, with Paul Syverson, Aaron Jaggard, Aaron Johnson (US Naval Research Laboratory, Washington, DC) and Joan Feigenbaum (Yale University), entitled “20,000 in League Under the Sea, Anonymous Communication, Trust, MLATs, and Undersea Cables,” Proceedings on Privacy Enhancing Technologies (PETS-15th International Symposium). Volume 1, Issue 1, Pages 4–24, ISSN (Online) 2299-0984, DOI: 10.1515/popets-2015-0002, April 2015. She is also the author of the industry leading legal treatise, “Legalizing Domestic Surveillance: The Role of Mutual Legal Assistance Treaties in Deanonymizing TorBrowser Technology,” in the Richmond Journal of Law and Technology, 22 Rich. J.L. & Tech. 2 (2015), http://jolt.richmond.edu/v22i1/article2.pdf.