Alfred Basta (Chair)
Ph.D. CPENT, LPT Master, CISM, OSCP, CRTO, CRISC, CISA, CGEIT, CASP+, CYSA.Dr. Basta is a professor of mathematics, cryptography, and information security and the CISO at LivingStones Group as well as a professional speaker on Internet security, networking, and cryptography. He is a member of many associations, including ISACA, ECE, and the Mathematical Association of America. Dr. Basta’s other publications include Computer Security and Penetration Testing, Mathematics for Information Technology, Linux Operations and Administration, and Database Security. In addition, Dr. Basta is a curriculum advisor for programming and cybersecurity programs at numerous colleges and universities.
Cristian Petrollini (Vice-Chair)
Cybersecurity professional with over 27 years of experience and expertise in technical and senior leadership management roles at national and international level mainly but not exclusively in Homeland Security, Law enforcement and Cybercrime domains in IT/OT and IoT security.
Since December 2022 in RHEA System SA is involved in cybersecurity projects and research activities in the field of new emergency sectors Space, Unmanned Aircraft System, CyberPhysical Systems, Intelligent – Interconnected – Distributed and Digital technologies, such as AI, 6G, IoT, edge and cloud computing, Critical infrastructures and the new frontiers of Cyber-Electro-Magnetic-Attacks (CEMA).
In 2023 I was elected in European Cyber Security Organisation (ECSO) WG6 with a co-chair role in the SWG6.1 with the intent of putting my knowledge and experience to achieve the main goal to coordinate the development of the European Cybersecurity Ecosystem and
support the protection of European Digital Single Market, ultimately contributing to the advancement of Europe’s digital sovereignty and strategic autonomy.
Creative, innovative and edge new technologies addicted with robust analytical & critical thinking, always in learning and knowledge sharing mode.
Amit Agarwal
Amit Agarwal is a research-oriented technology specialist in the field of telecommunications. In addition to his recently completed C|PENT certification, he holds EC-Council’s Certified Ethical Hacker (C|EH), Computer Hacking Forensic Investigator (C|HFI), and C|EH (Master) certifications and ranked in the global top 10 on the C|EH (Practical).
Jorge Gómez
Jorge Gómez is a Telecommunications Engineer with 25 years of experience in IT. He began as an IT systems administrator at HARDTRONIC for 10 years, later focusing his activity in the same company but at cybersecurity realm. During this period, he carried out consulting, auditing, pen-testing, and implementation and maintenance of cybersecurity products and services for small and medium business, great organizations and Public Administrations.
The last 4 years he has been working for the company OESIA NETWORKS, forming part of the information security office of the health service of Castilla y León in Spain, carrying out auditing, consulting, awareness and training tasks in cybersecurity to help the organization to compliance with regulations on data protection and information security, like Spanish National Security Schema (ENS) or European GDPR.
He has complemented his professional career with various certifications such as CEH, CPENT or CISSP, in addition to many others related to manufacturers of cybersecurity products.
Kamel Elsharkawi
Kamel is a seasoned professional with over 15 years of experience in ICS (Industrial Control Systems) and OT (Operational Technology) network and cybersecurity. With a strong background in Communications Engineering, Kamel has consistently demonstrated expertise in managing and safeguarding critical infrastructures.
Equipped with a B.S. degree in Communications Engineering, Kamel has acquired an impressive array of certifications, including CPENT (Certified Penetration Testing Professional), LPTM (Licensed Penetration Tester Master), and CEH (Certified Ethical Hacker). These certifications and additional technical credentials in network security and penetration testing have fortified Kamel’s skills and knowledge to address complex cyber threats.
Throughout Kamel’s professional journey, they have successfully undertaken and led numerous network and cybersecurity mega projects. Leveraging their extensive experience, Kamel has designed and implemented robust security measures to protect crucial systems and networks. Their proficiency in analyzing vulnerabilities and identifying potential risks has been instrumental in ensuring the resilience and integrity of organizations’ digital infrastructure.
Kamel’s commitment to continuous learning and staying abreast of the latest industry advancements set them apart as a dedicated cybersecurity professional.
Kumudha P
Over 12+ years of experience in Information Security and Cyberforensics. I have completed my M.Sc in Cyberforensics and Information Security for technical knowledge and an MBA in Information Security to understand the management strategies. InfoSec domain is always filled with challenges and learning new things, which is what I like about working in this domain. I truly believe in teamwork. I am always up to learning new things.
Rajivarnan Raveendradasan
As an accomplished cybersecurity professional with a wealth of experience spanning over a decade, my expertise lies in protecting sensitive information and data from malicious cyber threats. I have consistently prioritized the security of numerous individuals throughout my career.
My broad range of skills encompasses various facets of cybersecurity, including Perimeter/Infrastructure Security, Data Loss Prevention, Identity & Access Management, Mobile Security, Security Incident & Event Management, Governance Risk & Compliance, Vulnerability & Threat Management, Security Architecture, Managed Security Services, Encryption, Cyber & Digital Investigation Services, Cloud Computing, Mobile & Wireless, Core Network.
Having worked closely with major organizations across the globe in the capacity of a Penetration Testing Engineer, I possess a deep understanding of the unique cybersecurity challenges prevalent in the financial industry. Furthermore, I have gained invaluable expertise through conducting forensic investigations on APT, Incident Handling, and Disaster Recovery cases, refining my skills in digital investigation services.
My knowledge and insights in the field of cybersecurity have been showcased at prestigious events and summits, including the EC-Council Cyber Security Summit, where I delivered a compelling presentation on the topic of Hijacking Drones. Additionally, my contributions to the cybersecurity community have been acknowledged, as evidenced by my inclusion in the HackintheBox Hall of Fame.
In conclusion, my extensive experience and diverse skill set position me exceptionally well to confront any cybersecurity challenge with confidence and effectiveness.
Robert Cederberg
Robert Cederberg is a Reserve IT Officer in the Federal Armed Forces of Germany and currently serving as a web service and Linux server administrator in a cyber training facility. In a second role he is involved with a military reserve unit responsible for incident response and active cyber defense in military environments.
After Robert had completed the officer training program and his studies in Electrical Engineering and Information Technology he started his career as a software developer in an offensive cyber unit, followed by a role as a Linux server administrator after a transfer to a military intelligence unit. Thereafter he shifted his focus on cyber training as a subject matter expert for Linux, Cyber Security and active network components in a cyber training facility drilling future server administrators and network defenders.
After Robert completed his service time, he has continued his military service as a Reserve IT Officer and thereby taken over responsibilities for the development and maintenance of training platforms sustaining military cyber trainings. Alongside he is participating in military cyber excercises thereby enjoying to give red teamers a hard time.
The specific duties and responsibilities of the SC members include:
- Approve key policies governing the operation of EC-Council Certification Division.
- Assuring consistency of decision making as well as the criteria used therein.
- Serve on appeals and complaints task groups as appointed by the SC Chair.
- Promote and provide guidance to promote EC-Council certifications.
- Provide guidance regarding international initiatives supporting EC-Council certifications.
- Provide guidance to support educational initiatives related to EC-Council certifications.
- Determine areas of research required to improve EC-Council certifications.
- Serve on task forces / subcommittees as appointed by the SC Chair.