Imamura, Tomomi
Tomomi Imamura
Credentials: (She/Her)
Email: julie.v.johnson@wisc.edu
Address:
Division of Information Technology - Office of the Chief Technology Officer
Enterprise Cybersecurity Architect
Biography
Tomomi Imamura is the Enterprise Cybersecurity Architect at the Office of Chief Technology Officer at UW-Madison. Her role focuses on assisting with strategic efforts in architecting enterprise cybersecurity infrastructure for institutional projects. To support her strong desire to serve the campus and higher education community, she engages with national higher education community groups to learn about strategic cybersecurity initiatives and best practices from around the country. She also offers her expertise in cybersecurity in higher education community to help improve cybersecurity posture in higher education. Before her current role, she led the Security Testing and Cyber Defense team at the Office of Cybersecurity at UW-Madison. She led the team that supports campus cybersecurity services such as vulnerability management, endpoint protection, network firewall security consultation, data loss prevention, and penetration testing. Tomomi is a Certified Information System Security Professional (CISSP), GIAC Web Application Penetration Tester (GWAPT) and Network Penetration Tester (GPEN). She also holds AWS Certified Cloud Practitioner and AWS Certified Solutions Architect Associate certifications. She completed the Big Ten Academic Alliance Information Technology Leaders Program (ITLP) in 2015. She is fluent in both Japanese and English. In her free time, she loves to cook Japanese food and enjoy biking.
2024 Sessions
Cybersecurity Appscanner: New features and best practices for secure web apps
Enhancing cloud security: From basics to advanced strategies
2021 Sessions
User Groups – Combining Community and Technology in Higher Education (with Live Q&A)
checkQualys – Building Container Scanning Automation (with Live Q&A)
2020 Session
On-Demand Web Application Security Scanning with Qualys WAS API — Including Examples
2019 Session
To People Who Want To Reduce Their Server Vulnerabilities – but Can’t Get Started