News Stay informed about the latest enterprise technology news and product updates.

Who's Who in Infosec: Dorothy Denning

Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.

Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions...

to the industry.

Dorothy E. Denning is a Professor in the Department of Defense Analysis at the Naval Postgraduate School. She has previously taught at Georgetown University, where she was the Callahan Family Professor of Computer Science and Director of the Georgetown Institute of Information Assurance, and Purdue University. She has also worked at SRI International and Digital Equipment Corporation.

Dr. Denning has published 120 articles and four books, her most recent being Information Warfare and Security. She is an ACM Fellow and recipient of several awards, including the Augusta Ada Lovelace Award and the National Computer Systems Security Award. In November 2001, she was named a Time magazine innovator. Her leadership positions have included President of the International Association for Cryptologic Research and Chair of the National Research Council Forum on Rights and Responsibilities of Participants in Network Communities.

Dr. Denning received bachelor's and master's degrees in mathematics from the University of Michigan and a doctorate degree in computer science from Purdue University.

Her research interests include terrorism and crime, conflict and cyberspace, information warfare and security, and cryptography.

Current research authored includes:

"Is Cyber Terror Next?," in Understanding September 11 (Craig Calhoun, Paul Price and Ashley Timmer eds.), The New Press, 2002.

"Cyber Security as an Emergent Infrastructure," to appear in IT and Global Security (Robert Latham ed.), The New Press.

"Information Technology and Security," to appear in Grave New World (Michael Brown ed.), Georgetown University Press.

Read more about Dorothy's contribtions to security in this Information Security magazine feature.

Dig Deeper on Real-time network monitoring and forensics

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.