Dr. Calvin Nobles

Cryptologic Warfare Officer - U.S. Navy


Commander Calvin Nobles enlisted in the United States Navy in 1992. Currently, he is the Deputy Assistant Chief of Staff for Intelligence and serves as Cryptologic Resource Coordinator for Expeditionary Strike Group Seven and Commander Task Force Seventy-Six.

He served at the National Security Agency/Central Security Service as the Senior Targeteer, Electronic Warfare Planner, Division Officer, and Branch Chief for Targeting Support. During this tenure, he served as the Officer-in-Charge for Cryptologic Support Team Four and the Signals Intelligence Officer for Multi-National Division-North in Tikrit, Iraq with the 101st Airborne Division. Onboard the aircraft carrier, he served as a Catapult Launch Officer, Arresting Gear Officer, Helicopter Control Officer, Branch Officer, and Division Officer. While at European Command, he was a Team Chief in the European Plans and Operations Center. He served a Deputy Head and Deputy Chief while assigned to Navy Information Operations Command Georgia and National Security Agency/Central Security Service Georgia.

His personal awards include the Meritorious Service Medal, Joint Commendation Medals, the Navy and Marine Corps Commendation Medal, the Army Commendation Medal, and the Joint Service Achievement Medal, Navy and Marine Corps Achievement Medals, and the Combat Action Ribbon. Nobles holds a doctorate in management and engineering technology with graduate degrees in military operational art and science, management and engineering technology, and aviation aerospace safety systems.


The Continuity of Failure: Admiring the Human Factors Problem in Cybersecurity

Room 202 JC Penny Conference Center

This presentation aims to emphasize the lack of scientific processes, frameworks, and models to eliminate human-enabled errors in cybersecurity. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the existing cybersecurity and information security strategies. The discourse surrounding human performance in […]

Track 2