Experts
The Georgia Cyber Center is available to find the right expert that fits the need of your story. Our resident partners possess a wealth of knowledge in their respective areas and are considered experts in their field.
Email us at gacybernews@augusta.edu to set up an interview with one of our experts today.
TOM BARNES
Vice President, Strategy Cyber Operations
Parsons Corporation
Expertise in: Military Cyberspace Operations | Intelligence Operations and Collections | Electronic Warfare | Military and Community Relations | Fort Gordon
TOM CLARK
Executive Director
CSRA Alliance for Fort Gordon
Expertise in: Military and Community Relations | Networking | Fort Gordon | Cyber Education Connections
STEVE FOSTER
Special Agent in Charge
Georgia Cyber Crime Center
Expertise in: Cybercrime Investigations | Multi-Agency Collaborations | Public Outreach
BRIAN W. GOODMAN
Deputy Program Manager - ARCYBER Cyberspace Operations Support
Perspecta Corporation
Expertise in: SIGINT/CYBER Support to Military Operations | Intelligence and Collection Management | Intelligence Community | Cryptologic History | Fort Gordon
ZACH HODGES
Vice President, Chief Operations Officer
Cyber Security Solutions
Expertise in: Cybersecurity Maturity Model Certification (CMMC) | Regulatory Compliance | Risk Management Framework (RMF) | Security Operations Center (SOC) as a Service | Combat Communications
CHARLES KICKLIGHTER
Assistant Special Agent in Charge
Georgia Cyber Crime Center
Expertise in: Digital Forensics | Online Child Exploitation | Cybercrime Investigations
KEN RECTOR
Director, Augusta Account Manager
BAE Systems
Expertise in: Military Intelligence Collection | Analysis and Production | Cyberspace Operations | Electronic Warfare | Special Operations | Military and Community Relations | Fort Gordon
SARAH REES
Director, e1337 Training
Georgia Cyber Center
Expertise in: Information Assurance | Satellite Communications | VOIP | Network Administration | Computer Security
ERIC TOLER
Executive Director
Georgia Cyber Center
Expertise in: Military Cyberspace Operations | Intelligence Collection | Exploitation and Analysis | Foreign Threats to the U.S. | National Security Strategy