
Debra Baker
Debra Baker is a seasoned cybersecurity leader with over 30 years of experience, including a distinguished career in the U.S. Air Force and roles at IBM and Cisco. As the CEO of TrustedCISO, she provides expert guidance in strategic cybersecurity, risk management, and compliance.
Debra helps organizations tackle complex frameworks such as SOC 2, ISO 27001, CMMC, FedRAMP, StateRAMP, and NIST. Her book, A CISO Guide to Cyber Resilience, has been recognized by Help Net Security as one of the top 10 books that every security leader should read.
She is recognized in Women Know Cyber: 150 Fascinating Females Fighting Cybercrime by Cybersecurity Ventures.

Diego Felipe Padilla
Cybersecurity Automation Engineer with over 15 years of hands-on experience in IT and cybersecurity operations, specializing in SOAR automation, incident response, and threat detection engineering. Proficient in designing, developing, and maintaining advanced automation frameworks that enhance SOC efficiency and response accuracy.
Expert in Cortex XSOAR/XSIAM, Python scripting, API integrations, and custom playbook development, with a proven ability to connect diverse systems such as SIEM, EDR, threat intelligence platforms, and firewalls. Skilled in leveraging RESTful APIs, JSON processing, and data normalization techniques to automate complex workflows and orchestrate security tools at scale.
Holds a Master’s degree in Cybersecurity and is a Certified Information Systems Security Professional (CISSP), demonstrating a strong foundation in security governance, risk management, and technical controls. Experienced in implementing detection logic, incident enrichment, and automated containment actions aligned with organizational security frameworks.
Combines deep technical expertise with a results-driven mindset, continuously improving operational resilience and reducing MTTR through intelligent automation. Passionate about advancing security operations by integrating technology, process, and innovation to achieve measurable cybersecurity maturity.

Luca Berton
Luca Berton is a cloud-native engineering leader and author focused on building secure, high-availability platforms across AWS, Azure, and GCP with Kubernetes, Ansible, Terraform, and modern MLOps. At Dell Technologies, he has delivered AI/ML and infrastructure programs including multi-tenant GPU orchestration on OpenShift AI, automated disaster recovery for tens of thousands of VMware workloads, and ESG analytics solutions supporting SMEs.
Previously, as Vice President of Infrastructure at JPMorgan Chase, he led large-scale deployments—spanning CI/CD, Kubernetes, and Terraform—that improved efficiency and reduced costs meaningfully. Earlier at Red Hat, he developed cloud testing frameworks at scale and contributed to security remediation content widely adopted by customers.
A six-time technical author and instructor, Luca has published books on AI, Kubernetes, Ansible, VMware, and Red Hat Enterprise Linux, and teaches cloud and MLOps courses with leading education platforms. Certified RHCSA, LFCE, AWS, and Cisco architect, he emphasizes resilient, compliant (SOC 2/ISO 27001) systems and practical automation that helps teams move faster with confidence. Based in Amsterdam, he is also the creator of the “Ansible & Terraform Pilot” community and an active open-source advocate.

Nilson Sangy Jr.
Nilson Sangy Jr. is a Cybersecurity Expert, with more than 17 years of experience in cybersecurity within the Federal Police and the Brazilian Army, he has developed deep expertise in digital forensics, incident response, malware analysis, and cyber threat intelligence.
Nilson holds a Master’s Degree in Computer Engineering from the Aeronautics Institute of Technology (ITA) and a Postgraduate Degree in Malware Analysis from the University of Alcalá, Spain. Throughout his career, he has led and conducted complex investigations involving ransomware, intrusions, and large-scale data breaches against national institutions.
He is an Instructor and Member of the EC-Council Advisory Board, where he teaches CHFI, ECIH, and CND certifications, as well as a Lecturer in Blue Team and Network Security at Strong Security Brazil and the National Police Academy. As the creator of the KTFE (KnowTree Forensic Examiner) course, he contributes to the development of digital forensics education in Latin America.
Nilson also led the Brazilian Federal Police team to first place in the 2024 International Cyber League (CTF) in Spain, reflecting his ongoing commitment to excellence, technical leadership, and innovation in cyber defense.

Sougata Pal
I’m an Enterprise Security Architect and ISMS expert with more than 17 years of experience designing and securing enterprise-scale cloud ecosystems across AWS, Azure, and GCP. My work sits at the convergence of zero-trust architecture, cloud security, and post-quantum cryptography—helping organizations future-proof their infrastructures against next-generation threats.
With my extensive knowledge and experience in Computer and Information Systems Security/Assurance, I bridge academic research with hands-on implementation to guide enterprises through cryptographic transition planning, quantum-safe architecture design, and compliance transformation aligned with ISO 27001, SOC 2, and GDPR. I specialize in embedding quantum-resilient encryption models and AI-driven security analytics into enterprise systems, ensuring confidentiality, integrity, and performance coexist in high-velocity cloud environments.
Beyond architecture, I serve as an Advisory Group Member at EC-Council and a technical reviewer for different publishing houses, contributing to the evolution of global cybersecurity education. My publications and patent work in network science, federated learning, and secure API validation extend my focus on resilience, privacy, and cryptographic agility.
My mission is clear: to help organizations build quantum-ready, zero-trust ecosystems that sustain digital trust through the next wave of technological disruption.

Tabish Ali
Tabish Ali is an accomplished Cybersecurity and AI Security leader with over 17 years of experience across Saudi Arabia, Pakistan, and Malaysia. His expertise spans Offensive Security, Cybersecurity Consulting, and AI-driven Security Solutions. Specializing in cybersecurity strategy, policy development, and adversarial operations, he has led advanced Red Teaming, Penetration Testing, Adversary Emulation, and Threat Hunting initiatives, helping organizations fortify their defenses against sophisticated threats and APTs.
A recognized expert in offensive and adversarial security, Tabish has uncovered critical zero-day vulnerabilities and conducted complex exploit development across networks, web applications, and APIs. His expertise further includes Network Security Architecture, ISO 27001 Implementation, SOC Maturity Assessments, SAP Security, IT Audits, and Risk Management.
At the intersection of AI and cybersecurity, he leverages Generative AI, LLMs, and adversarial AI for threat intelligence, anomaly detection, and predictive defense strategies—pioneering the shift toward intelligent, proactive cyber resilience. His research and vulnerability disclosures have been globally acknowledged by leading organizations including Kaspersky, Oracle, AT&T, Adobe, Sony, HP, SAP, Amazon, Apple, and Checkpoint.
Tabish’s leadership and advocacy for ethical hacking and secure AI adoption have made him a frequent speaker at global conferences. His accolades include Best Male Cyber Expert Finalist (EU Cyber Awards 2023), Ethical Hacker of the Year Finalist (2016, USA), and recognition as an EC-Council SME, PECB Certified Trainer, and Microsoft Charter Member. He currently leads DEFCON Karachi, empowering Pakistan’s cybersecurity community through collaboration, mentorship, and innovation.
The specific duties and responsibilities of the members include:
- Review course content during commissioning and release to provide strategic, high-level feedback.
- Identify curriculum gaps by suggesting additional topics aligned with industry trends.
- Provide high-level input on learning objectives and assessment strategies during initial review.
- Evaluate overall effectiveness of delivery methods during the final review stage.
- Represent diverse stakeholder perspectives during key review checkpoints.
- Advise on new learning or program initiatives based on industry expertise.
- Ensure program alignment with applicable compliance and accreditation requirements.
- Analyze learner performance data at crucial stages to offer strategic improvement insights.
- Approve key policies related to learning program development when required.
- Review appeals and complaints, if any are received.
- Provide guidance to support EC-Council educational and certification initiatives.
- Identify and promptly disclose any real or potential conflicts of interest.
- Maintain confidentiality of Advisory Group membership and refrain from public disclosure.