Imamura, Tomomi
Tomomi Imamura
Credentials: (She/Her)
Email: tomomi.imamura@wisc.edu
Address:
Division of Information Technology - Office of the Chief Technology Officer
Enterprise Cybersecurity Architect
Biography
Tomomi Imamura is the Enterprise Cybersecurity Architect in the Office of the Chief Technology Officer at UW-Madison. In this role, she supports institutional initiatives by designing and advancing enterprise cybersecurity architecture aligned with strategic and operational priorities. Driven by a strong commitment to serving the campus and the broader higher education community, Tomomi actively engages with national higher education cybersecurity groups to stay informed on emerging initiatives, trends, and best practices. She also contributes her expertise to collaborate efforts aimed at strengthening cybersecurity posture across higher education institutions. Tomomi holds multiple professional certifications, including Certified Information System Security Professional (CISSP), GIAC Web Application Penetration Tester (GWAPT), and GIAC Penetration Tester (GPEN). Since 2022, she has also served as a Peer Penetration Tester for REN-ISAC (Research and Education Networking Information Sharing and Analysis Center). She completed the Big Ten Academic Alliance Information Technology Leaders Program (ITLP) in 2015. Fluent in both Japanese and English, Tomomi enjoys cooking Japanese cuisine and biking in her free time.
2026 Session
Raised on Anime, Working in IT: How Japanese Anime Inspired Careers in IT and Cybersecurity
2025 Session
What’s “Unconference” And Do We Need One Here?
2024 Sessions
Cybersecurity Appscanner: New features and best practices for secure web apps
Enhancing cloud security: From basics to advanced strategies
2021 Sessions
User Groups – Combining Community and Technology in Higher Education (with Live Q&A)
checkQualys – Building Container Scanning Automation (with Live Q&A)
2020 Session
On-Demand Web Application Security Scanning with Qualys WAS API — Including Examples
2019 Session
To People Who Want To Reduce Their Server Vulnerabilities – but Can’t Get Started