Competition Judges

The 2020 panel of expert judges represent companies Merck, EY Consulting, Cisco, Exostar and Securonix. Teams will be judged on creativity, methods, impact, Q&A and overall delivery.


Michael Davis 

Michael Davis is a Principal in EY Advisory Services practice with more than 17 years of information technology experience focusing on Cybersecurity, IT operations, enterprise transformations and analytics. Michael has been a trusted advisor to executives in Fortune 500 companies guiding and directing their Enterprise Transformations. He is a thought leader in the area of Cybersecurity. He is passionate in motivating cross-discipline teams to deliver business and technology solutions to our clients. Michael is the current technology leader for EY’s Cyber Health and Wellness Industry Team where is leads the Medical Device Cyber Security Solution offering and various Identity Management initiatives.


Michael Sukkarieh

Michael is a Director at Merck leading a team of cyber security professionals, software engineers, computer, data scientists, and visualization experts providing Security Analytics and Information services for Merck’s IT Risk Management function. Michael’s responsibilities include designing, deploying and managing the Information Security Analytics ecosystem and data derived cyber security threat intelligence program for the Cyber Security Fusion Center.

Michael has a unique background in technology and mathematics and holds a BS in computer and Mathematics, a Master’s degree in Expert Systems, an MBA in finance, and most recently a graduate certificate in data science from Harvard University. Michael is CISSP certified and a board member of Rutgers University Cyber Security Program.


Preston D. Macon

Preston is a Cyber Security Specialist for Cisco Inc., and has been supporting Healthcare and Fortune 100 accounts for the past 14 years in this capacity. Preston joined Cisco in 1995 and has had multiple roles with Cisco, having been a Systems Engineer Manager for 8 years, and a Systems Engineer for 3 years.

Prior to joining Cisco, Preston was a Network Architect and Assistant Vice President for Scudder, Stevens & Clark, a Manhattan based financial services firm for 5 years; and as a Network Engineer and Computer Programmer for Value Added Reseller Driver-Harris Systems for 7 years. Preston was VP of Development for Factronics, a family run business with his father, focused on factory automation systems, for several years. Preston graduated from Fairleigh Dickinson University in 1984 with a BS in Computer Science, and became a CISSP in 2005.


Sethu Raman

Sethu Raman is Director-Risk Management at Merck & Co., Inc. Sethu has experience in building and implementing solutions and frameworks that mitigate high risks, balance information protection and promote business agility. He has expertise in developing security, risk and compliance frameworks that manage risk across medium to large scale enterprise programs. Sethu has 17 years of experience in Information Technology with a solid base in Risk management, security, Application development, SDLC process excellence and Third Party Risk Management.


Terry Rice

Terry Rice is the Vice President, IT Risk Management and Security, and Chief Information Security Officer (CISO) at Merck. In this role, he is responsible for the IT organization’s risk management and cybersecurity program including IT policy, information security engineering, identity and access management engineering, threat intelligence, security incident response and eDiscovery. Terry holds a Bachelor of Science degree from the United States Military Academy at West Point and Master of Science degree from George Washington University.


Nancy Malady

Nancy is Account Director in the NY Metro area at Securonix, working with F1000 clients in the NY/NJ area. She has been involved with security software and solutions for 20 years, including Cyber Security, Behavior Analytics, Social Media Monitoring, with knowledge around PCI, MSSP, HIPAA and other security regulations.


Tom Johnson

Tom Johnson has over 30 years of experience leading business development, guiding process improvement, managing technology deployment, and directing program teams in the Life Science, Healthcare, and Aerospace and Defense industries.  Over the past 10 years he was responsible for Exostar’s Life Sciences product portfolio. He currently serves as Senior Director of Life Sciences Business Solutions at Exostar.  In this role, Mr. Johnson leads the company’s business development and support initiatives for life science organizations in need of identity management, secure collaboration, risk management, or supply chain management solutions.  Exostar’s life sciences community network includes half of the world’s largest pharma companies, serving 250,000 individuals working in thousands of manufacturing, contract research organization, laboratory, and academic organizations worldwide.  Mr. Johnson holds a BS in Industrial Engineering from The Georgia Institute of Technology.


Martha S.H. VanDriel

Martha VanDriel is the Director for IT Risk Management Policy at Merck, where she is responsible for cybersecurity policy, regulatory change management, and cybersecurity control monitoring, compliance, and enforcement.Prior to joining Merck, she retired as a U.S. Army Colonel, serving as the Director for Cyber Mission Force Readiness at the U.S. Office of the Secretary of Defense. Martha also taught International Relations at West Point and led the rapid multi-year build of the U.S. Army’s Cyber Mission Force teams. Sheholds a B.S. degree from the U.S. Military Academy at West Point, as well as an M.A. in National Security Studies from UNC- Chapel Hill.


Perris Kusilek

Perris Kusilek is the Manager in the Advisory Services practice of Ernst & Young LLP.  Perris has experience in cyber security, and is focused on data protection, including security engineering, data classification and high value asset identification. Perris has helped organizations with data protection technology implementations, designing and implementing data classification schemes and policies, data discovery and advanced malware detection technologies, and developing information security strategic improvement roadmaps.