fbpx Cybersecurity Faculty | Chestnut Hill College Skip to content Skip to navigation
Menu

Cybersecurity Faculty

Cybersecurity Faculty

B.J.'s photo

William (B.J.) Cunningham, Ph.D.

Dean of the School of Graduate Studies
St. Joseph Hall, 3rd Floor, Room 374
215-248-7120

Dr. Cunningham is a political scientist with expertise in political violence, terrorism, and conflict resolution. He earned an MA in political science at American University and an MLitt in political studies at the University of Auckland.  His Ph.D. from George Mason University is in conflict analysis and resolution with a focus on resolving political violence with non-violent means.  Dr. Cunningham published two book chapters on terrorism for the Defense Threat Reduction Agency (DTRA) and he worked on a joint project of the National Defense University and George Mason University on creating the Conceptual Model of Counterterrorist Operations... more

Headshot of Pamela

Pamela King, M.S.

Center for Data and Society
Instructor of Digital Forensics
St. Joseph Hall, Room 8
215-248-7145

Pamela King worked for nearly 20 years in law enforcement as a civilian specialist in digital forensics and cybersecurity for a federal program providing investigative support and information sharing regionally to state and local law enforcement agencies.  While working in law enforcement, she produced tactical and strategic intelligence analysis for law enforcement and supported active high technology investigations by extracting evidence from digital media and computers.  She conducted numerous professional training seminars in cybercrime and digital forensics for state, local, federal, tribal, international, and military police.  She was employed by the Federal Bureau of Investigations (FBI) for the Computer Analysis and Response Team (CART) assigned to the NJRCFL (New Jersey Regional Computer Forensics Laboratory).  Following this, she worked in private industry doing cyber investigations, digital forensics, and e-discovery for over a decade.  During her career, she was also the manager of several IT departments and was responsible for cybersecurity infrastructure, standard operating procedures, audits and assessment.

She began teaching at various colleges as an adjunct for courses in digital forensics, computer science, cybersecurity and criminal justice beginning in 2007. In 2014, she began working as a full time faculty instructor at CHC in the Computer Science and Information Technology Department in the Center of Data & Society.  She teaches, advises students, and manages programs for the School of Undergraduate Studies Digital Forensics and Cybersecurity (BS) degree programs, and the School of Graduate Studies Cybersecurity (MS) degree program. 

Jordan L. Fisher

Jordan L. Fischer is co-founder and managing partner of XPAN Law Group, LLC, a Women-Owned boutique law firm. She focuses her practice on international data privacy and cybersecurity and cross-border data management, with a special emphasis in European Union data privacy regulations and the General Data Protection Regulation (GDPR). Jordan has extensive experience in the intersection of law and technology. With a global perspective, Jordan works with clients to create cost-effective and business-oriented approaches to cybersecurity and data privacy compliance. Jordan also counsels clients on cross-border data management, including the complexities of discovery in international litigation.

Additionally, Jordan is a Teaching Professor of Law at the Thomas R. Kline School of Law, where she focuses her research on data privacy and cybersecurity, exploring the convergence of the law and technology, and researching the practical implications of regional data protection regulations within a backdrop of the global economy. Jordan currently serves as the Vice-Chair for the Pennsylvania Bar Association’s Cybersecurity and Data Privacy Committee. Jordan is also a board member of Women Owned Law, an organization that supports women entrepreneurs in the law, and a board of trustee member of West Chester Friend’s School.

George M. Frazier, M.Ed., CISSP, GCIH, GSNA

George Frazier has served as a director of technology and information systems for over 20 years.  Presently, he is the Director of Information Systems at Lower Merion School District in Ardmore, Pennsylvania. In this position, he implemented the Center for Information Security 20 Critical Security Controls and co-authored security, compliance, and privacy policies. Frazier has taught as an adjunct professor for over 15 years, teaching face-to-face, hybrid, and fully online courses ranging from foundational technology to leadership and cybersecurity. He is a certified PDE Supervisor of Curriculum and Instruction and a certified Instructional Technology Specialist. He holds a M.S. in Computers and Technology in Education.  He is a Certified Information Systems Security Professional (CISSP) and GIAC Certified Incident Handler (GCIH) and System and Network Auditor (GSNA).  Before starting his career in information technology and cybersecurity, George Frazier served in the United States Marine Corps from 1988 to 1998, where he achieved the rank of Major.

Brian J. Halpin, J.D.

Brian J. Halpin, J.D. is the Senior Vice President of Forensics & Technology for Capsicum Group, LLC. In this position, he manages and conducts digital forensics, data recovery, and eDiscovery examinations. He is a former FBI Special Agent and Acting Director of the New Jersey Regional Computer Forensic Laboratory (NJRCFL). He was previously a Director of Cyber Security and Information Security at a larger healthcare insurance company, where he managed enterprise threat and risk intelligence analysis processes, systems, and personnel. He has also taught computer forensics as an adjunct professor at Drexel University. He earned his Juris Doctorate at Temple University School of Law.

Carl W. Herberger, CISSP CISM

Carl W. Herberger, CISSP CISM is the Global General Manager & Vice Present of Security Solutions for Radware, Inc., where he is responsible for all business attributes of Radware’s global $190M+ security business. He was previously the Vice President of Security & Compliance for Evolve IP, LLC, as well as the CEO and Co-Founder of Allied InfoSecurity, Inc., among other high-level positions. He was the Chief of Electronic Warfare Support in the United States Air Force between 1996 and 1998, and was previously an Electronic Warfare Officer for the B-52H Bomber. He is considered a foremost expert on the problems and solutions surrounding cyber-attacks. He earned his MBA in Finance in 1998 from Auburn University.

Ken Pyle

Ken Pyle is a partner and chief information security officer of DFDR Consulting. He has specialized in information security, computer forensics, enterprise virtualization, and network engineering. Ken has an extensive background in network penetration and remediation, compliance, and secure design. Prior to joining DFDR, he served as a security and network engineer for several information technology companies and as the IT director/security engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors, and other highly secure facilities on issues of information security, computer forensics, and secure network design. Ken has lectured on information security and has published several white papers on subjects including public information gathering via social networking and social engineering. Ken was a featured speaker at the 2014, 2013 and 2012 Wolters Kluwer CCH User Conference, lecturing on “Information Security and Defending the Enterprise” and “Anatomy of a Cyber Attack.” Ken is a regular lecturer and presenter on information security and has presented for several accounting associations and professional organizations, including Prime Global, RBMA, and AGN. Ken is also a subject matter expert for information security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. He was also recognized as a “40 under 40” by South Jersey Business People in 2015. He holds numerous security and technology certifications from companies such as Guidance Software, EC-Council, Cisco, VMware, CompTIA, and AccessData. Ken has published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on cybersecurity, forensics and secure design.

Ken's certifications include: CISSP, HCISPP, ECSAv8, CEHv8, OSCP, OSWP, EnCE, Sec+