Welcome to my website. I am involved with a number of organizations and projects. You can find out more about me at wiki.SarahCortes.is. For professional services, please go to InmanTechnologyIT.com and LinkedIn.com/in/SarahCortes. For research, please go to PrivacyResearch.is and MLAT.is.

You can contact me:

via email: scortes@ccs.neu.edu or sarah.cortes@post.harvard.edu (Optional: PGP Key: 226CCE21)
via chat: sarah@ipvtech.is (Optional: OTR Key Fingerprint: 407E6144 40622F8E 011A6D6C 67D8EB70 51F82E87)
via phone: 330-99-CYBER
via Skype: sarah_cortes
via Twitter: @SarahCortes
via LinkedIn: www.linkedin.com/in/sarahcortes

Hear my upcoming talk on cybersecurity April 2017 at IEEE Homeland Securities Technology17-Cybersecurity:
MLAT.is World Treaty Cartel Internet Overlay for Digital Traffic Analytics

Check out my latest publication from SAGE on cyberterrorism:

Sarah Cortes, Cyberterrorism. In The SAGE Encyclopedia of War: Social Science Perspectives, Ed. Paul Joseph (2016) DOI: http://dx.doi.org/10.4135/9781483359878.n174.

Sarah Cortes, Cyberterrorism. In The SAGE Encyclopedia of War: Social Science Perspectives, Ed. Paul Joseph (2016) DOI: http://dx.doi.org/10.4135/9781483359878.n174.


See my DNA Mixtures application.

Robin W. Cotton, Catherine Grgicak, Sarah Cortes, Margaret Terrill, Charlotte J. Word, DNA Mixtures, www.DNAmixtures.com. Boston University School of Medicine, Biomedical Forensic Sciences. This project was supported by Award No. 2008-DN-BX-K158 awarded by the National Institute of Justice, Office of Justice Programs, U. S. Department of Justice. Note: This application was highlighted in Executive Office of the President, President’s Council of Advisors on Science and Technology (PCAST), Report to the President: Forensic Science in Criminal Courts: Ensuring Scientific Validity of Feature-Comparison Methods, September 20, 2016. https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_forensic_science_report_final.pdf.


Past events...


In the press...

Experts: Consumer Privacy Bill of Rights may ease privacy compliance

"The proposed Consumer Privacy Bill of Rights holds the potential to help not only consumers, but businesses as well," said Sarah Cortes, a privacy researcher at Northeastern University in Boston. "In today's global marketplace, consumers outside the U.S. form a huge and growing market. Establishing that U.S. enterprises must meet a high regulatory standard in consumer privacy provides a competitive advantage for U.S. companies."


Hear my talk on privacy in Orlando, Florida, USA at NACACS, ISACA’s North America Computer Audit, Control and Security Symposium- Privacy Track
I'm speaking jointly with renowned privacy expert Rebecca Herold, the Privacy Professor.
ISACA is the International Information Systems Audit and Control Association. 


@SarahCortes, MS, PMP, CISA, is President of Inman Technology. She earned her undergraduate degree at Harvard University, and holds an M.S. from Boston University, in Computer Science, Information Security. She is a PhD candidate in the Information Assurance program at Northeastern University’s College of Computing and Information Science. As a Senior Vice President for Security, IT Audit and Disaster Recovery at Putnam Investments, a major global asset management firm and subsidiary of Marsh & McLennan, Sarah oversaw Putnam’s recovery on 9/11 when parent company Marsh & McLennan’s World Trade Center 99th floor data center was destroyed. She also supervised over 65 IT audits per year in that capacity. As a senior executive and later consultant responsible for Putnam’s and other Fortune 500 firms, Sarah managed major applications development, data center and other operations, staff and budgets.

A former analyst for the US Department of Energy, she led the National Institute for Science and Technology (NIST) Cybersecurity Working Group sub-team, as co-author of the 2014 NIST: Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, as well as the 2010 volume, that created the security and privacy laws section of the report. She served on the privacy use cases team for two years and has been a member of the NIST cybersecurity working group (CSWG) on Smart Grid privacy for five years. She has recently co-led Northeastern University Law School Legal Skills in Social Context (LSSC) Clinics on Surveillance Law, Privacy Tools, and Tor and Domestic Surveillance, Domestic Terrorism and Privacy and Anonymity Technology, as well as a 2014 MIT Co-Design Studio class at MIT Media Lab on Domestic Surveillance, Domestic Terrorism, Privacy and Anonymity Technology and Tor. She has helped draft data breach laws, and testified before the Massachusetts legislature and regulatory agencies.

In addition to her work on various industry standards bodies, Sarah serves on the IEEE (Institute of Electrical and Electronics Engineers) P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group as subcommittee lead on research and use cases.

In her work to help end domestic violence and abuse, including cyberstalking and abuse through technology, Sarah serves on the Boards of Emerge, the first Abuser Intervention Program (BIP)(Vice President and Clerk), Transition House, one of the first domestic abuse shelters, and Employers Against Domestic Violence (EADV).

Sarah is the co-author of the industry leading technical treatise, with Paul Syverson, Aaron Jaggard, Aaron Johnson (US Naval Research Laboratory, Washington, DC) and Joan Feigenbaum (Yale University), entitled “20,000 in League Under the Sea, Anonymous Communication, Trust, MLATs, and Undersea Cables,” Proceedings on Privacy Enhancing Technologies (PETS-15th International Symposium). Volume 1, Issue 1, Pages 4–24, ISSN (Online) 2299-0984, DOI: 10.1515/popets-2015-0002, April 2015. She is also the author of the industry leading legal treatise, “Legalizing Domestic Surveillance: The Role of Mutual Legal Assistance Treaties in Deanonymizing TorBrowser Technology,” in the Richmond Journal of Law and Technology, 22 Rich. J.L. & Tech. 2 (2015), http://jolt.richmond.edu/v22i1/article2.pdf.