Joseph A. Juchniewicz is a Risk and Compliance Senior Consultant that provides high-level consulting services to customers primarily in the area of information security, including the design and implementation of security solutions, conducting security assessments, as well as assisting with the alignment of operational procedures with information security best practices. He has extensive experience in vulnerability and penetration testing, social engineering, physical security assessments, investigations, incident response, and computer forensics.
Steve Petrie has over 25 years of experience in the Information Technology field. Mr. Petrie holds a BS in Information Technology. Mr. Petrie currently holds several certifications including the EC Councils; CEH, CHFI, and ECSA, Mr. Petrie is currently employed as a Senior Security Engineer at Telos Corporation where he provides high-level technical services for the Department of Defense and various commercial entities. He has experience providing technical security assessments, physical security assessments, vulnerability and penetration testing.
Mr. Varhol has a well diversified background with many years of experience within information technology and information security. He has earned a variety of industry recognized certifications and contributes to the information security community by volunteering in different capacities. He has consulted on and performed many technical security assessments for large retailers, technology companies, manufacturers, banks, universities, and others across the United States. He is currently Security Assessment Team Lead with AlixPartners, a global management consulting firm.
Kris Thomas is a cyber risk advisor that works closely with clients to solve complex problems and provide innovative solutions. Mr. Thomas' background includes in-depth knowledge and expertise in cybersecurity principles, concepts, methods, standards, and practices through progressive technical roles leveraging Windows-based products and Federal policy implementation and monitoring.
|First Name||Last Name||Designation||Company/Organization|
|Anthony||Dayrit||Information Security Lead||AXA Technology Services|
|Dulan||Wickramasinghe||Deputy Manager – Information Security||National Development Bank PLC|
|Anjanette||Harris||Cyber Security Analyst||Alta IT Services|
|Chad||Hayes||Cyber and Mobile Security Consultant||Bryodyn Technologies LLC|
|Cheng||Hsueh||Principal Engineer||COMPAL ELECTRONICS, Inc|
|Michael||Hughes||Director & Principle IA Consultant||Teeke Consulting, UK|
|Denis||O'Callaghan||Security Consultant – Cyber Defence||NATO SHAPE, Casteau Belgium|
|Phil||Patrick||Application Security Analyst||The Juiceplus Company|
|Steven||Petrie||Enterprise Security Consultant||Telos Corporation|
|Timothy||Robinson||Cyber Capabilities Researcher||Leidos, Inc|
|Shannon||Stewart||Enterprise Security Consultant||Telos Corporation|
|Kristopher||Thomas||Cyber Security Consultant||Deloitte|
Approve key policies governing the operation of EC-Council Certification Division.
Assuring consistency of decision making as well as the criteria used therein.
Serve on appeals and complaints task groups as appointed by the SC Chair.
Promote and provide guidance to promote EC-Council certifications.
Provide guidance regarding international initiatives supporting EC-Council certifications.
Provide guidance to support educational initiatives related to EC-Council certifications.
Determine areas of research required to improve EC-Council certifications.
Serve on task forces / subcommittees as appointed by the SC Chair.
Next SC scheduled meeting: May 2019.
None of the EC-Council | Scheme Committee members are part of the management team of the International Council of E-Commerce Consultants (EC-Council) and as such, they should not be construed to be part of the Board of Directors of EC-Council.