SlideShare uma empresa Scribd logo
1 de 53
Chuck Brooks
Thought Leadership Profile:
Cybersecurity, IoT. Big Data, AI,
and Emerging Tech
Chuck Brooks is a Technology Evangelist, Corporate Executive,
Speaker, Writer, Government Relations, Business Development, and
Marketing Executive. He is also a Subject Matter Expert, Advisor, and
Thought Leader in the areas of:
• Emerging Technologies, Homeland Security, Internet of Things,
Cybersecurity & Homeland Security, Cloud, Smart Cities, Business
Process Outsourcing, Design Thinking, Digitization, Digital Media,
Artificial Intelligence, Quantum Computing, Big Data, Digital
Transformation, Print, Governance & Compliance
1
Career Highlights:
• Chuck was recently named by
LinkedIn as a “Top Person you
should be following on Tech
issues” out of 500 million
members. He is also an
advisor to LinkedIn on
emerging Technology and
cybersecurity issues. He is a
featured SME and have his
blogs published by LinkedIn
in 2017
• Chuck is Chairman of the CompTIA New and Emerging Technologies
Committee
• Chuck has won the “Cybersecurity Marketer of the Year” at the
Cybersecurity Excellence Awards in both 2016 and 2017
• He has been the Chief Judge for the Government Security News annual
Homeland Security Awards for four years
• Chuck helped stand up the first Office of Legislative Affairs at DHS and
was the first Legislative Director of The Science & Technology
Directorate
2
• Chuck served as Adjunct Faculty for Two Years at Johns Hopkins
University
• Chuck was at Technology Partner Advisor to The Bill and Melinda
Gates Foundation
• Chuck received two Presidential appointments for Federal Executive
Service
3
4
It was an honor co-presenting with John Perren former Assistant Director
of the Weapons of Mass Destruction Directorate of the FBI, and LTC Scott
Appelgate, Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs
Of Staff and Dr. Frederic Lemieux Professor and Program Director, at the
National Security Threat Convergence: Violent Extremism and
Cybersecurity event at George Washington University
5
5 Tech Voices You Should Be Following on
LinkedIn [List Features Chuck Brooks]
Meghan Brockmeyer
September 29, 2016
https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech-
companies/2016/5-tech-voices-you-should-be-following-on-linkedin
When you’re looking for inspiring and informative professional perspective
online, where do you go? Are there experts that keep meaningful tabs on
your industry? Or executives whose insights you turn to for fresh insights
and new ideas? If so, you already recognize the huge opportunity to
engage with, and learn from peers online.
Chuck Brooks – Security Voice and “Government Relations and
Marketing Executive, Thought Leader”
6
Chuck’s varied security experience is evident in what he publishes. From
aviation to public sector, government to science, his posts take on the
multifaceted aspects of cyber security as it relates to industries/verticals,
homeland issues and next-gen technology. Since he’s keen on variety,
with formats ranging from expert Q&As to content roundups, to non-tech
posts associated with topics/verticals he’s covered, his perspective truly
stands out.
Tech marketer takeaways: Chuck focuses core content on security, but
isn’t afraid to include content tangentially related to core subject matter
(e.g. a post focused on mastering the art of influence in Washington, D.C.)
which incorporates fresh/unexpected content to help keep readers
interested and foster conversation.
MEDIA Activities:
• Publications/Writings/Interviews:
Published in Huffington Post, Forbes, LinkedIn Marketing
(Featured SME on Cybersecurity and Emerging Tech)
Government Security News (featured contributor), The Hill
(featured contributor), Federal Times (Featured Contributor
on homeland security issues), Christian Science Monitor
(Member of Passcode Influencers Panel), The Hill,
Government Executive, MIT Sloan Blog, Homeland Security
Today, Cygnus Media, BizCatalyst360 (Featured
Contributor), NextGov, Alien Vault (Featured Contributor),
Government Technology, GovExec, High Performance
7
Counsel (Featured Contributor), Brink Risk Management
(Featured Contributor), ITSP Magazine (Featured
Contributor), Security Information Watch, Advisor and
Contributor to Cognitive World.
Chuck Brooks as Featured Speaker (partial list of events):
• National Academy of Sciences/FBI Biosecurity Meeting 2016
• USTRANSCOM Cybersecurity Roundtable 2017
• The Information Systems Security Association (ISSA) 2017
Mid Atlantic Conference
• George Washington University Cybersecurity event
• Institute of Management Consultants Conference 2016
8
• Critical Security Controls Editorial Panel, Council on
Cybersecurity
• DC Cybersecurity Summit (Securing The IoT) 2016, 2017
• CRM Summit (The Internet of Things, Cyber-Security, and
Government Readiness) 2016
• The Astana Economic Forum and Global Risk Expo in
Astana, Kazakhstan.
• National Cybersecurity Institute
• Webcast Host on Mobile Identity Management
• Global Cyber Threat Summit
• Cybersecurity Summit 2016, 2017
• Kaspersky Cyber Security Conference 2015
• IDGA Homeland Security Week conference
• Homeland Security Professionals Conference 2015
• Secure Cities Conference 2014
• CyberMaryland conference 2014/15,17
• National Press Club, Global Business News events
2014/15,16
• Featured Panelist on Cybersecurity, Open Innovations Forum
(MIT Technology Review co-sponsor)
• Guest seminar lecturer on lobbying and interest groups in
the national security policy process at the National War
College of the National Defense University
9
• Regional Representative 2011, Davos Second World
Economic Forum “Communication on Top”
10
Activities:
Chuck serves as Chairman of CompTIA’s New and Emerging Technology
Committee, and serves on Boards to several prominent public and private
companies and organizations. He is Advisory Board Member to The Center
for Advancing Innovation Inc., a subject Matter Expert to The Homeland
Defense and Security Information Analysis Center (HDIAC), a Department of
Defense (DoD) sponsored organization through the Defense Technical
Information Center (DTIC), and Member, Electrical and Electronics
11
Engineers IEEE Standards Association (IEEE-SA) Virtual Reality and
Augmented Reality Working Group
He is a former Technology Partnership Advisor to the Bill and Melinda
Gates Foundation. Chuck has served in government at the Department of
Homeland Security at the Science & Technology Directorate, at Voice of
America (VOA), and also for 7 years on Capitol Hill as a Senior Advisor to
Senator Arlen Specter on technology and security issues. He is also former
Adjunct Faculty at Johns Hopkins University, and received his MA in
International Relations from the University of Chicago, B.A, in Political
Science from DePauw University, and a Certificate in International Law
from The Hague Academy of International Law, Netherlands.
12
Published Writings by Chuck Brooks (Partial List):
• CHUCK BROOKS, FEATURED HPC CONTRIBUTOR – ADVISER TO LINKEDIN AS
CYBERSECURITY AND EMERGING TECHNOLOGY SUBJECT MATTER EXPERT
https://highperformancecounsel.com/chuck-brooks-featured-hpc-contributor-
adviser-linkedin-cybersecurity-emerging-technology-subject-matter-expert/
• Why LinkedIn is an Indispensable Medium for Security Professionals | by Chuck
Brooks LinkedIn Marketing Blog (post has received more than a million views!)
https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech-
companies/2017/why-linkedin-is-an-indispensable-medium-for-security-
professiona
• Hurricane Harvey: Special thanks to the professionals, volunteers helping others
http://www.federaltimes.com/management/leadership/2017/08/29/hurricane-
harvey-special-thanks-to-the-professionals-volunteers-helping-others-commentary/
• Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C-
Suite https://highperformancecounsel.com/expert-chuck-brooks-offers-
cybersecurity-cheat-sheet-c-suite/
• Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In
Interview https://highperformancecounsel.com/new-cybersecurity-stakes-
interview-cybersecurity-thought-leader-chuck-brooks/
13
• Emerging Technologies For The Public Sector by Chuck Brooks in Cognitive
World http://cognitiveworld.com/article/emerging-technologies-public-sector
• Chuck Brooks Federal News Radio Interview: New administration looks to DC
for cyber innovation
https://federalnewsradio.com/whats-working-washington/2017/05/new-
administration-looks-to-dc-for-cyber-innovation/
• Identity Theft, The Not So Hidden Scourge by Chuck Brooks
https://www.alienvault.com/blogs/security-essentials/identity-theft-the-not-
so-hidden-scourge?
bwf_dp=t&bwf_entry_id=5382&bwf_token_id=17267&bwf_token=QXuSRLGA
TE0mnNfPwfSTORzj9
• Co-Author of The #CyberAvengers Playbook; The Non-Technical, No Nonsense
Guide For Directors, Officers, and General Counsels
https://www2.fireeye.com/OFFER-WP-Legal-Playbook.html
• Blockchain for Government: A Cheat Sheet:
http://www.nextgov.com/technology-news/tech-insider/2017/07/blockchain-
government-cheat-sheet/139274/?oref=ng-HPriver
• Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In
Interview https://highperformancecounsel.com/new-cybersecurity-stakes-
interview-cybersecurity-thought-leader-chuck-brooks/
• A Quick Summary of Recent Cybersecurity Trends & Developments by Chuck
Brooks https://highperformancecounsel.com/quick-summary-recent-
cybersecurity-trends-developments-businesses-law-firms-know/
• Defining and Addressing the Growing Cyber Insider
Threat https://www.alienvault.com/blogs/security-essentials/defining-and-
addressing-the-growing-cyber-insider-threat
• EXPERT BROOKS ON #CYBERSECURITY: IS WANNACRY RANSOMWARE JUST THE
WARM-UP ACT? https://highperformancecounsel.com/expert-brooks-
cybersecurity-wannacry-ransomware-just-warm-act/
• Time to streamline Congressional oversight of DHS [Commentary]
http://www.federaltimes.com/articles/time-to-streamline-congressional-
oversight-of-dhs-commentary
• 5 emerging tech key to transportation security [Commentary]
http://www.federaltimes.com/articles/5-emerging-tech-key-to-
transportation-security-commentary
14
• THE GAMIFICATION TREND IN #CYBERSECURITY – EXPERT CHUCK BROOKS
TALKS THROUGH THIS EMERGING SOLUTION FOR CLIENTS
HTTPS://HIGHPERFORMANCECOUNSEL.COM/GAMIFICATION-TREND-
CYBERSECURITY-EXPERT-CHUCK-BROOKS-TALKS-EMERGING-SOLUTION-
CLIENTS/
• Chuck Brooks Federal News Radio Interview: New administration looks to DC
for cyber innovation https://federalnewsradio.com/whats-working-
washington/2017/05/new-administration-looks-to-dc-for-cyber-innovation/
• Automation technologies and the changing cybersecurity
ecosystem http://gsnmagazine.com/node/48279?c=cyber_security
• Chuck Brooks, The Tech Voice You Should be following: University of Chicago
Webinar (YouTube with slide deck
presentation) https://www.youtube.com/watch?
v=3wk2uMXzS60&feature=youtu.be
• WannaCry ransomware worm attacks the world (Interview Comments by
Chuck Brooks
http://www.securityinfowatch.com/article/12334948/wannacry-ransomware-
worm-attacks-the-world
• CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING
GROWING SECURITY
CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc-
contributor-chuck-brooks-meeting-growing-security-challenges/
• The Cusp of Technological
Transformation http://cognitiveworld.com/article/cusp-technological-
transformation-0
• NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update with
ChuckBrooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-
dc05/
• Writestream Radio welcomes Cybersecurity Expert Chuck Brooks
http://www.blogtalkradio.com/writestream/2017/08/30/the-writestream-
welcomes-cybersecurity-expert-chuck-brooks#.WaasLo3XMLA.facebook
• CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING
GROWING SECURITY
15
CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc-
contributor-chuck-brooks-meeting-growing-security-challenges/
• Chuck Brooks explains the difference between ICS and IT security http://iiot-
world.com/cybersecurity/chuck-brooks-explains-the-difference-between-ics-
and-it-security/
• RANSOMWARE IS SPREADING LIKE WORMS:ARE YOU
READY? http://www.nextgov.com/technology-news/tech-
insider/2017/05/ransomware-spreading-worms-are-you-ready/137896/?
oref=ng-channelriver
• Homeland Security wins in Trump budget, especially in cybersecurity
[Commentary] http://fifthdomain.com/2017/03/17/homeland-security-wins-
in-trump-budget-especially-in-cybersecurity-commentary/
• The cybersecurity priority for DHS in
2017 http://www.federaltimes.com/articles/the-cybersecurity-priority-for-
dhs-in-2017
• Congress had an office that gave expert tech analysis; let's bring it
back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-
an-office-that-gave-expert-tech-analysis-lets
• Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity
Expertise https://www.alienvault.com/blogs/security-essentials/recent-
attacks-demonstrate-the-urgent-need-for-c-suite-cybersecurty-expertise
• Meeting Security Challenges Through Vigilance, Readiness and
Resilience http://www.brinknews.com/?p=5052?
utm_source=BRINK+Subscribers&utm_campaign=b94043847f-
BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c
98-b94043847f-110145109
• The Priority of the Government/Industry Cybersecurity
Partnership https://www.alienvault.com/blogs/security-essentials/the-
priority-of-the-government-industry-cybersecurity-partnership
• Will Vulnerable U.S. Electric Grid Get a New Protection
Mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a-
new-protection-mandate/
16
• Emerging focus on cyber threats to energy
infrastructure http://www.federaltimes.com/articles/emerging-focus-on-
cyber-threats-to-energy-infrastructure
• Congress had an office that gave expert tech analysis; let's bring it
back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-
an-office-that-gave-expert-tech-analysis-lets
• Creating A Secure Smart City http://www.qognify.com/blog/creating-secure-
smart-city/
• Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity
Landscape https://www.alienvault.com/blogs/security-
essentials/safeguarding-patients-and-data-in-the-evolving-healthcare-
cybersecurity-landscape
• Technology Foraging for Cybersecurity
Solutions https://www.alienvault.com/blogs/security-essentials/technology-
foraging-for-cybersecurity-solutions
• And I Think To Myself, What A Virtual World https://itspmagazine.com/from-
the-newsroom/and-i-think-to-myself-what-a-virtual-world
• Cyber Defense in an Imperfect World, a New
Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a-
new-approach/
• How The Next Administration Will Reshape
DHS http://www.federaltimes.com/articles/how-the-next-administration-will-
reshape-dhs
• Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL
Magazine http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-
part-iv-securing-vote
• The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-
in-cybersecurity-can-and-should-be-closed
• Gen Touhill brings vision, strategy as nation’s first
CISO http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-
as-nations-first-ciso
17
• US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computin
• DHS cyber role elevated in new
legislation http://www.federaltimes.com/story/government/dhs/blog/2016/0
6/15/dhs-cyber-role-elevated-new-legislation/85934982/
• Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity
Landscape https://www.alienvault.com/blogs/security-
essentials/safeguarding-patients-and-data-in-the-evolving-healthcare-
cybersecurity-landscape
• Socializing Citizen Services In The Public Sector
http://bizcatalyst360.com/socializing-citizen-services-in-the-public-sector/
• Embracing Global Public/Private Cybersecurity
Alliances https://www.alienvault.com/blogs/security-essentials/embracing-
global-public-private-cybersecurity-alliances
• Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-
watch-follow-the-tech-leader/
• 4 steps to a strong incident response plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-
strong-incident-response-plan.html
• Cyber Defense in an Imperfect World, a New
Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a-
new-approach/
• NCF-DC1 Washington DC Cyber News Update With Chuck
Brooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/
• Ransomware Trending as Weapon of Choice for
Hackers http://www.itsecurityplanet.com/from-the-newsroom/ransomware-
trending-as-weapon-of-choice-for-hackers
• The Government Explores Artificial
Intelligence http://thehill.com/blogs/pundits-blog/technology/280481-the-
government-explores-artificial-intelligence
18
• DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss
-ongoing-challenge-securing-soft-targets/82350628/
• Creating a digital career path for Native
Americans http://www.federaltimes.com/story/government/dhs/blog/2016/0
5/16/creating-digital-career-path-native-americans/84455826/
• The Internet Of Things (IoT) Has Arrived – What You Should
Know http://infosecurity.ciowatercooler.co.uk/the-internet-of-things-iot-has-
arrived-what-you-should-know/
• NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership
http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
• DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-
cyber-role-elevated-new-legislation/85934982/
• Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-
public-private-cybersecurity-alliances
• The Gender Gap in Cybersecurity Can, and Should Be, Closed
http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
• Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
• The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital
Universe http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-
digital-universe/
• 4 steps to a strong incident response plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-
strong-incident-response-plan.html
• Pathway To The New Era of Quantum Computing
https://ctovision.com/2016/06/pathway-new-era-quantu m-computing/
• UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-
cooperation-will-thrive-with-or-without-brexitooperation
19
• Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creat
ing-digital-career-path-native-americans/84455826/
• The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-
essentials/the-rise-of-the-chief-data-officer
• Ransomware Trending as Weapon of Choice for Hackers
http://www.itsecurityplanet.com/from-the-newsroom/ransomware-trending-as-
weapon-of-choice-for-hackers
• The Government Explores Artificial Intelligence
http://thehill.com/blogs/pundits-blog/technology/280481-the-government-
explores-artificial-intelligence
• The Globality Quotient: Cybersecurity (Chuck Brooks Interviewed)
http://bizcatalyst360.com/the-global-quotient-cybersecurity/
• Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-
Cybersecurity-The-Weakest-Link-Will-Always-Be-the-Human-Element.html
• DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-
ongoing-challenge-securing-soft-targets/82350628/
• Chuck Brooks, Winner "Cybersecurity Marketer of the Year",
Cybersecurity Excellence Awards https://americansecuritytoday.com/chuck-
brooks-winner-2016-cybersecurity-excellence-awards/
• 3 of the biggest concerns about external cyber threats Phishing attacks employing
malware, especially ransomware, is a top cybersecurity concern of Chuck Brooks (@ChuckDBrooks), vice
president of government relations and marketing at Sutherland Global Services. “Anyone and everyone is
vulnerable,” he said. “The expanding interconnectivity of our devices and the Internet of Things also makes
malware a network threat. And with these kinds of phishing attacks, it is often quite difficult to find and
prosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
• Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-
can-be-a-catalyst-for-technological-progress
• The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-
yearbook-of-awards/8
• Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-
homeland-security-priorities-watch-2016/77368604/
20
• Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-
trends-for-2016
• Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-
coming-millennial-workforce/
• HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/pl
ayer/hsn-tv/hsn-charles-brook-interview?Itemid=
• The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-
you-should-know/
• 7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-
impacting-innovators-in-2016/
• The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
• Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck
Brooks interviewed)
http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
• The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-
cyber-security-government-readiness
• Smart cities, the Internet of Things and the Blue
Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart-
cities-the-internet-of-things-and-the-blue-revolution
• Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
• Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/p
rotecting-internet-things-and-living-smart-cities/72742172/
• Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-
insider/2015/09/does-government-need-hardware-separated-operating-
systems/121826/
21
• Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-
first-male-interview-with-chuck-brooks-vp-government-relations-marketing-
sutherland-global-services/
• The Four Pillars to Navigating Washington, DC (The Hill)
http://thehill.com/blogs/pundits-blog/washington-metro-news/217783-
navigating-the-four-pillars-of-Washington
• Interview with Chuck Brooks on key Homeland Security Issues for 2015
(Government Security News) gsn 2014 digital yearbook of homeland security
awards recipients
• Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-
homeland.html
• Some catalyzing technologies on the government horizon
http://thehill.com/blogs/pundits-blog/technology/238756-some-catalyzing-
technologies-on-the-government-horizon
• Solving Problems with Technology Convergence
http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
• Government prioritizes digital engagement (Computerworld)
http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
• Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-
explores-wearables/#more-21
• The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-
instant&ion=1&espv=2&ie=UTF-8#q=The+OPM+breach+screams+for+action.
+Chuck+Brooks
• Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-
of-things-new-digital-economy/#.VKriQCvF91Y
• Adopting a cooperative Global Cyber Security Framework to mitigate cyber
threats (before it is too late) http://www.voodootec.com/author/chuckbrooks/
22
• Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-
preparation-commitment-key-for-govt-industry-cyber-partnerships/
• Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-
seminar
• DHS, FBI stepping up digitization of Records
http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
• Internet of Things, New Frontier of Technology Convergence
http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
• Wearables Bring New Sense of Fashion to Public Sector
http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-
bring-new-sense-fashion-public-sector/104679/
• DHS: A decade (and more) of competing congressional oversight
http://www.federaltimes.com/article/20140718/BLG04/307180011/DHS-
decade-more-competing-congressional-oversight
• Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks
http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
• The DHS's vital role in confronting the threat of pandemics and bioterrorism |
Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-
DHS-s-vital-role-confronting-threat-pandemics-bioterrorism
• "Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-
insights-and-innovation/why-you-should-be-excited-about-future-tech/d/d-
id/1114036?
• Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
• Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The
9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-
cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission-report/
23
• Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-
publicprivate-partnerships-and-planning/
• DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-
politics/13958-dhs-s-special-partnership-with-native-americans
• TechNOW – Interview with Charles Brooks, VP, Department Homeland Security
at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
• Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-
security-is-back-in-the-limelight
• Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The
9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-
cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission-
report/#tweet-link
• Transportation security: Back to the future http://thehill.com/blogs/pundits-
blog/212288-transportation-security-back-to-the-future
• Chief Data Officers in the Government – What Role Should They Play?
https://government.blogs.xerox.com/2015/02/20/chief-data-officers-
government-what-role-should-they-play/?
utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_
campaign=Corporate+Channels&CMP=SMO-
Facebook+sf36444741#.VSLkIJh0xdh
• Mining Big Data for What It’s
Worth http://government.blogs.xerox.com/2014/12/05/big-data-what-its-
worth/#.VSLft5h0xdg
• Charles Brooks to present June 26 webinar on evolving DHS role in Strategic
Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedi
n_homeland_security_discussi
• The public/private imperative to protect the grid by Chuck Brooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-
public-private-imperative-protect-grid
• How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-
S-T-drives-innovation-DHS
24
• “Human Factors” and Biometrics at
DHS: http://www.biometricupdate.com/author/chuck-brooks
• The public/private imperative to protect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-
public-private-imperative-protect-grid
• Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?
c=federal_agencies_legislative
• Securing the Cyber Ecosystem through Protection Projects and Planning
(Homeland Security Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?
tp_spkid=105234
• Tech Interviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homel
and_Security_Schedule_for_March_1620/
• DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/
DHS-Secretary-Jeh-Johnson-revitalizes-One-DHS-vision
• Chuck Brooks interview published in SecurityInfoWatch on the application of
lessons learned from last year's Boston Marathon bombings. "Boston
Marathon a case study in lessons learned following last year's bombing
tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-
security-measures-make-for-a-different-event
• DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
• Native Americans key to border security
success http://thehill.com/blogs/pundits-blog/immigration/214494-native-
americans-key-to-border-security-success
• Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-
hearings-have-called-attention-to-the-need-for-better-cooperation-between-
government-agencies-and-the-private-sector
• Three keys to unlocking tech treasures -- Focus on collaboration, STEM and
'foraging' (Federal Times) http://www.federaltimes.com/apps/pbcs.dll/article?
AID=2013310280011
25
• Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the
Department of Homeland Security by Chuck Brooks at
GWU http://cps.gwu.edu/strategic-cyber-operations-webinar-evolving-role-
cybersecurity-department-homeland-security
• “Why You Should be Excited about Future Tech”. Key topics: The digital age
and the Internet of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr
07041401.html
• Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_pr
ivate_partnerships/
• Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-
conference-global-risk-expo
• Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid
%3D105234
• Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?
id=3323&desc=Homeland+Security+Week+2014+Conference
• Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-
government/
• Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-
agencies-seek-to-accelerate-record-digitization/
• The National Press Club Hosts Global Leadership Challenges: Government and
Private Sector Leaders Share Innovation, Talent and Regulatory
Strategies (Presenting)
http://www.prweb.com/releases/2014/02/prweb11609927.htm
• Tech & Innovation thought leader Chuck Brooks joins The Franklin Foundation
Board of Directors http://www.prlog.org/12396042-tech-innovation-thought-
leader-chuck-brooks-joins-the-franklin-foundation-board-of-directors.html
• Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-
with-mark-amtower
26
• Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
• How Big Data Will Revolutionize Aviation Security (Chuck Brooks
Interviewed) http://www.hstoday.us/index.php?
id=483&cHash=081010&tx_ttnews%5Btt_news%5D=32217
• Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-
agencies-seek-to-accelerate-record-digitization/
• Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-
of-data-analytics/#prettyPhoto
• BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-
service-innovation/
• Government Security News: Charles Brooks, Linkedin Homeland Security
discussion leader, to present June 26 webinar on evolving DHS role in Strategic
Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security
• Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-
government-yields-exciting-innovation/
• Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-
control-processing-through-automation/
• Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-
things-LinkedIn
• Chuck Brooks interview published in SecurityInfoWatch on the application of
lessons learned from last year's Boston Marathon bombings. "Boston
Marathon a case study in lessons learned following last year's bombing
tragedy" by Steve Lasky
http://www.securityinfowatch.com/article/11416172/boston-marathon-
security-measures-make-for-a-different-event
• DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
• Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
27
• The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-
media-60-experts-share-2014-predictions-0718083
• Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
• What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-
agencies-eye-contact-centers-for-consolidation-3-takeaways-from-the-private-
sector/
• Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
• Interview - Global Radio Talk Show – Interviews with Business
Leaders ... http://globalradiotalkshow.com/
• Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum
Moscow http://www.gsnmagazine.com/node/33583?
c=access_control_identification
• Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-
hearings-have-called-attention-to-the-need-for-better-cooperation-between-
government-agencies-and-the-private-sector
• The National Press Club Hosts Global Leadership Challenges: Government and
Private Sector Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
• Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-
shape-government-agencies/#.VjZQ1_mrTIU
• Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-
technology-better-government-customer-service.htm
• Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-
needs-a-proactive-approach-to-combat-cybercrime/
• Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-
content/uploads/2015/03/2015-Symposium-on-Homeland-Security__Draft-
Schedule-3_30_15.pdf
28
• Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
• Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
• Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
• Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
• Featured Speaker; The CyberMaryland Conference - Federal Business Council,
Inc. http://www.fbcinc.com/e/cybermdconference/speakers.aspx
• Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
• How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-
trends/wearable-devices-can-transform-contact-center-operations/
• Interview: TechNOW -- with Charles Brooks, VP, Department Homeland
Security at Xerox: What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301
501.html
• How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88
310c3c0bb9a12dcc3742b7d609543#.VSK8z5h0xdg
• Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists
Popular on LinkedIn” Posted by Vincent Granville
http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-
on-linkedin
• Keeping Pace With a Streamlined Service Approach
http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-
on-linkedin
• Cybersecurity 2014: Beyond the NIST
framework http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
• Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-
government_0515/
• CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
29
• CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC
%20Cyber%20Security%202014%20Outline.pdf xerox | GovCon Executive
http://www.govconexecutive.com/%3Fs%3Dxerox
• Chuck Brooks, Featured Speaker at Press Club on Doing Business in
Washington, DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
• Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-
be-competitive-in-any-market-the-know-how/
References, Kudos, Recommendations:
30
31
Edward You is a Supervisory Special Agent in the FBI’s Weapons of Mass Destruction
Directorate, Biological Countermeasures Unit. Mr. You is responsible for creating programs and
activities to coordinate and improve FBI and interagency efforts to identify, assess, and respond
to biological threats or incidents. These efforts include expanding FBI outreach to the Life
Sciences community to address biosecurity. Before being promoted to the Weapons of Mass
Destruction Directorate, Mr. You was a member of the FBI Los Angeles Field Office Joint
Terrorism Task Force and served on the FBI Hazardous Evidence Response Team.
Mr. You has also been directly involved in policy-making efforts with a focus on biosecurity. He is
32
an active Working Group member of the National Security Council Interagency Policy Committee
on Countering Biological Threats and an Ex Officio member of the NIH National Science Advisory
Board for Biosecurity. He also serves on two committees for the National Academies of Sciences,
the Institute of Medicine’s Forum on Microbial Threats and the Committee on Science,
Technology, and Law’s Forum on Synthetic Biology
June Klein , CEO Technology & Marketing Ventures, Inc; Electronic-BoardroomTMVi(r)
Solutions; EmpowernatorJune(tm) Next Practices;
Chuck and I served as “invite-only, vetted and trusted advisors” to the Bill
and Melinda Gates Foundation - Technology Partner Network. Throughout
the 2year strategic program, Chuck was a pleasure to collaborate with
toward accelerating solutions on a range of global challenges facing the
foundation and its grantees. He was generous in sharing his articles in
prestigious publications, contacts to DC decision-makers and access to his
featured speaker and award events.
Currently, I am honored that Chuck chose me to be a manager of his
“Emerging & Futuristic Technologies LinkedIn Group”. Chuck has huge
followings on social networks and diligently responds to his thousands of
friends on focused subject matters. He is a holistic thinker grounded in
government, industry and academia leadership. I value any opportunity to
work with Chuck to team with strategic partners that can benefit from
scaling my IOT, cybersecurity, resiliency and video initiatives.
I think very highly of Chuck, both personally and professionally. This is also
evidenced by my recommending him to my UK Merchant Bank’s Virtual
Technology Cluster as a speaker and director of their Cybersecurity program
blending entrepreneurial firm innovations with Lockheed Martin’s product
development process.
I am confident that if you hire Chuck for any leadership, director, team,
award or speaking slots, he will contribute to catapulting your success and
achieving your goals. Besides his many skills, he is a very nice person as
well. Feel free to contact me if you want any further evidence.
33
Dexter Ingram
Senior Advisor, INTERPOL
I have had the pleasure of knowing Chuck for over 10 years, since he was at
DHS and I was on the House Select Committee on Homeland Security. He is
a consummate professional who has a deep understanding of the
issues,process, and people involved in the world of homeland security and
Law enforcement. His breadth of experience derived from working on The
Hill, in government, in academia, in industry, and with the media make him
truly unique. I most highly recommend Chuck and look forward to
continuing working together.
Holger Schulze
B2B Tech Marketing Entrepreneur | Marketing-as-a-Service
Chuck was selected "Cybersecurity Marketer of the Year" at the 2016
Cybersecurity Excellence Awards. This was quite an accomplishment as the
awards were highly competitive with hundreds of entries and Chuck was one
of the leading vote getters overall. This award reflects the information
community's recognition of Chuck's excellence in the cybersecurity and
homeland security space. I follow Chuck's prolific and informative writings
and speeches on the topics of cybersecurity, homeland security, IoT,
futurism, and emerging technologies -- many of which are re-posted in our
300,000 members Information Security Community LinkedIn Group. It a
real pleasure to endorse Chuck for his great depth of experience,
professionalism, capabilities and for his dedication to promoting cyber
security issues.
34
Mike Bowers
Former President of Xerox Federal, Federal Government Services Executive
& Advisor
It was a real pleasure working with Chuck at Xerox. He served us as a
thought leader on technology, BPO, homeland security and other important
issues. He has exceptional depth on complex technology issues and an
uncanny ability to rapidly write penetrating articles that were very well
received in the media and Inside The Beltway. His contacts/relationships at
DHS as well as his Rolodex of those in industry and government is second
to none and served his BD colleague well. Most of all he was a professional
and great person to work with. I give Chuck my highest recommendation.
Thomas A. Cellucci, PhD, MBA
Founder, Chairman & CEO Cellucci Associates, Inc.
It is indeed a distinct pleasure to provide this recommendation for Chuck. To
put it simply, Chuck possesses both the strategic vision and tactical
discipline to get results--period. Having said that, his keen intellect is only
matched by his genuine good nature and helpful attitude towards others. I
would recommend Chuck for any business activity he would undertake.
Herbert E. Spiegel, Ph.D,MBA
President & Chief Science Officer at Applied Science & Technology
Associates, LLC
35
Chuck is an excellent source of information on the national and international
scene. He is a mentor of the first order, with respect to the science and
political aspects of Homeland Security and the myriad of issues surrounding
that discipline. He is modest in his expertise and easily approachable. He is a
valuable guide, willing to share his vast experience.
Simon Szykman
Chief Technology Officer, Federal Services at Attain
Chuck and I were colleagues when we were both serving at the Department
of Homeland Security. Chuck was a pleasure to work with and is a
consummate professional with executive management and substantive issue
expertise, particularly in technologies relating to DHS. Chuck also brings a
special blend of experience to the table, having successfully served in
leadership roles in industry, as well as executive and legislative branches of
government. Chuck is a relationship builder, a "connector" of both
opportunities and people. I highly recommend Chuck and look forward to
continuing to work with him in the future.
Admiral Jay Cohen
President at JayMCohen LLC
From my Senate confirmation hearings, through two years of re-inventing
the Dept of Homeland Security Science & Technology Directorate (which
was described by the Congress in 2006 as a "rudderless ship with no one at
the helm" and in danger of the Congress rescinding $200M in FY 07),
Chuck Brooks as Director of Legislative Affairs at DHS was
INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND
Congress in making the "reformation" of DHS S&T a complete success. His
36
Hill/DC acumen, insight, reliability, ability to develop highly effective
congressional interaction/communications is WITHOUT PEER in my nearly
16 years dealing with senior executive branch officials, industry, academia
and the Congress. He has my strongest recommendation for executive
positions of high responsibility in government relations/ business
development. Hon. Jay M Cohen (Rear Admiral, US Navy, ret.)
George Romas
Chief Engineer, Cybersecurity at DXC Technology
Chuck spent some quality time with our small startup company. He opened a
lot of doors for us, providing introductions to potential investors and
partners, as well as well-connected individuals on the Hill. Chuck also
provided invaluable assistance in forming our company and product
strategy.
Pam Turner
Managing Director at Prime Policy Group
March 23, 2009, Pam managed Chuck directly
Chuck was among the "start-up" team at DHS, and had responsibility for a
wide range of complex issues and challenging procedural situations. His
knowledge of the issues, familiarity with the political process, attention to
detail, and his professionalism earned him the trust and respect of his
Congressional contacts, his DHS associates, and all those who sought his
counsel and help. Chuck is a "can-do" person, and I strongly recommend
him.
Timothy N. Teen
CEO & Board at InSitech, Inc
37
Chuck is very knowledgeable in government affairs, the military and
security sector and is a diligent executive who is great to work with.
While at the US Army's Picatinny Arsenal/ARDEC as well as with CVP, my
team worked closely with Chuck in vetting technologies and services with
applications for homeland security and defense. He has an acumen for
technology issues, strong knowledge of investment banking/due diligence
processes, and really knows his way around government bureaucracies.
He is a collaborator who is committed to building great relationship and
producing results and I most highly recommend him.
Chuck Brooks References:
* Admiral Jay Cohen (US Navy Ret), former Undersecretary of Science & Technology
and the Department of Homeland Security and former Director of Naval Research for
Department of Defense
* Hon. Michael Chertoff, former Secretary of Homeland Security
* Steven Pomerantz, Former Director of Counterterrorism for the FBI
Proposed Compensation & Equity Arrangements For
Services (for Discussion)
38
Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors
Including:
Chuck Brooks
Vice President for Government Relations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Growing Risk of Security Breaches as it Relates to
the Internet of Things
39
Meeting: BOARD ON LIFE SCIENCES and
BOARD ON CHEMICAL SCIENCES AND
TECHNOLOGY
Safeguarding the Bioeconomy III
Safeguarding the Bioeconomy III: Securing Life Sciences Data
Speaker: Charles (Chuck) Brooks serves as the Vice President for Government
Relations & Marketing for Sutherland Global Services. Chuck also serves as
Chairman of CompTIA’s New and Emerging Technology Committee, and he
serves as subject Matter Expert to The Homeland Defense and Security
Information Analysis Center (HDIAC), a Department of Defense (DOD)
sponsored organization through the Defense Technical Information Center
(DTIC). In government, he served at the Department of Homeland Security
as the first Director of Legislative Affairs for the Science & Technology
Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to
the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland
security and Congress. He has an MA in International relations from the
University of Chicago, and a BA in Political Science from DePauw University, and
a Certificate in International Law from The Hague Academy of International Law.
Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and
cybersecurity
40
From “Cybersecurity is Top Business Priority in 2017”
https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017
In assessing the severity of security flaws in cyberspace, I spoke with several experts in
the field.
Charles “Chuck” Brooks is the vice president for government relations and marketing
for Sutherland Government Solutions. He served at DHS as the first director of
legislative affairs for the Science and Technology Directorate. He ominously points
out:
41
"The reality is that the more digitally interconnected we become in our work and
personal lives, the more vulnerable we become." -- Chuck Brooks
Mr. Brooks adds: "Mitigating cyber threats will grow as a priority for business, and for
us personally, if we are to commercially function and prosper."
But how can companies successfully mitigate cyber threats?
His advice: "The C-suites and governing boards of corporations will need to invest in
better enterprise and endpoint security to prevent phishing and malware probes by
hackers. This will also require better training of executives and employees in basic
information security measures."
Chuck Brooks wins Marketer of the Year at
2017 Cybersecurity Excellence Awards
Thu, 2017-02-09 01:49 PM
Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of The New
Emerging Technologies Committee for CompTIA, was named winner of Cybersecurity Marketer of
The Year at the 2017 Cybersecurity Excellence Awards.
Brooks
42
The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that
demonstrate excellence, innovation and leadership in information security. The finalists and winners
were selected based on the strength of their nomination and the popular vote by members of the
Information Security Community (both ratings and comments).
“Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year category in the
2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the 350,000 member
Information Security Community on LinkedIn which organizes the awards program. “With over 450
entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in
leadership, excellence and innovation in today's cybersecurity industry.”
Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as
he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been
a force in discussing, advocating, promoting cybersecurity issues across digital media, at events, in
professional forums, and with a variety of public policy organizations.
He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies
in both the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech
People to Follow On LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and
conferences. He recently presented at a workshop sponsored by The National Academies of
Sciences, Engineering, and Medicine and the Federal Bureau of Investigation on Securing Life
Sciences Data. He recently spoke at George Washington University event about the Cyber Threat
Spectrum, will be participating soon at USTRANSCOM Senior Leader Cyber Security Roundtable.
Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology
innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT
Security Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government
Security News, and Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn
and a global following and has brought significant attention to cyber issues from his frequent posts
and commentaries. He has been involved as a judge for the past four years as a Judge for
Government Security News’ Annual Homeland Security Awards.
As a senior executive in government relations, marketing, and management, Chuck brings a unique
experience from service in the public sector, academia, and industry. He serves on a variety of
boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber
issues and a special subject matter expertise of cybersecurity and homeland security in government
that have benefited both the not-for-profit, public, and commercial sectors.
Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral
Jay Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck Brooks. as
Director of Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the
Nation AND Congress in making the "reformation" of DHS S&T a complete success. His Hill/DC
acumen, insight, reliability, ability to develop highly effective congressional
interaction/communications is WITHOUT PEER in my nearly 16 years dealing with senior executive
branch officials, industry, academia and the Congress.”
Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate
professional who has a deep understanding of the issues, process, and people involved in the world
of homeland security and Law enforcement. His breadth of experience derived from working on The
Hill, in government, in academia, in industry, and with the media make him truly unique.”
43
Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national
security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at
John Hopkins University where taught homeland security for two years. He has advised a multitude
of organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and
the Center for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging
Technologies Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the
Board of Advisors for CyberTech, and on the Board of Directors at Bravatek, and the Cyber
Resilience Institute. He is an advisor to R & D cybersecurity company Inzero Systems. He is a
subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC),
a Department of Defense (DoD) sponsored organization through the Defense Technical Information
Center (DTIC. Chuck also serves as a Christian Science Monitor “Passcode Influencers Panel
member” on Information Security. He has a BA from DePauw University and an MA from the
University of Chicago.
----------------------------------------------------------------------
-------
• Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
Navigating the four pillars
of Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically
and socially. Its architectural design is modeled after Paris and it is certainly a
city of cultural diversity and historically interesting neighborhoods. Visually,
the site of the monuments reflecting against the panoramic backdrop of the
Potomac River is memorable for both visitors and native Washingtonians
alike.
44
It is really a city like no other city in America. Although it may be
geographically small, Washington serves as the engine of government, an
anchor of global financial policy and representation, a seat of institutionalized
policymaking organizations, and as a growing center for business, especially
in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life
"inside the Beltway." I was enamored with all it had to offer ("Potomac Fever")
but uncertain how to navigate it and decipher how things worked. Looking
back, I would like to offer structure and pathways for others contemplating a
public service career or seeking to accomplish tangible objectives for policy
and/or business purposes in the nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches);
commercial (business, including global financial institutions; policy:
(academia, think tanks and associations/organizations); and media (old and
new).
These pillars function both individually and collectively. They are intertwined
and to be effective, it is essential to understand their roles and impact on
what you hope to accomplish. Understanding and gaining experience within
these pillars that comprise the operational system of Washington takes focus
and time. Success can be realized by navigating the pillars and establishing a
strategy of strategic relationship building and connecting.
Government: There has never been any doubt that government and politics
make Washington tick. Government is not only the basis for tens of
thousands of jobs in the area, but it also serves as the fulcrum for evolving
and communicating domestic and international policies. Government is the
center for laws and executive orders overseeing all aspects of our daily life
and our professions. The Pentagon, intelligence agencies, and Department of
Homeland Security are all based in Washington because it is the epicenter of
power and decision-making. Government in Washington is by design
structured as a system of check and balances. An understanding of how the
various branches of government function is essential to influencing any
regulatory outcome whether it be energy, healthcare or a national security
issue. Working on Capitol Hill is invaluable experience and connects to all the
pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington
has been transforming over the years as a commercial hub. The World Bank,
Federal Reserve, International Financial Corporation and the Chamber of
Commerce are some of the organizations headquartered in the city. Many
corporations have also relocated to the area to be near the action and
45
position themselves for government and commercial opportunities. Both
Virginia and Maryland have established high-tech corridors close to the city
for those reasons. The international community with their embassies and
trade groups increasingly see Washington as a growing center for commerce.
Policy: It is not only the pillars of business and government that are cogs in
the machine. Policy organizations (such as the Center for Strategic and
International Studies, the Brookings Institution, the Heritage Foundation, the
American Enterprise Institute and the Aspen Institute) that provide issue
expertise, training and solutions are really the enabling fuel. A myriad of think
tanks offer the latest insights in domestic and global events on a regular
basis. Top local universities (such as Johns Hopkins's School of Advanced
International Studies, George Washington, Georgetown, American, George
Mason, and Maryland), also promote dialogue and informed decision-making
and access. The over 6,000 associations and organization with issue specific
interests regularly outreach to key decision–makers who are part of the public
and private sector pillars. Strategic communications and thought leadership
are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to
circumspect the activities of the other three pillars. The media's role is a
fundamental one; any system of democratic government cannot operate
without transparency and oversight. In Washington, most of the country's key
media outlets have representation. Outside traditional old media, new media
has become a force to consider. Most citizens have constant access and the
metrics of public opinion are constantly pulsed. Corporate executives and
government leaders use the social media, especially LinkedIn, Facebook and
Twitter as part of their work environments. Government 2.0 and Business 2.0
are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue
expertise, contacts and gaining a holistic perspective of how Washington
really works. This experience can provide the tactical knowledge to advance
your marketing efforts and/or cause in the public/private world. There is no
substitute for experience and for building a personal network to be
empowered and effective. To be successful, you have to always keep abreast
of the latest trends and be visible and helpful to your customer. In the
Washington arena, you also have to develop the qualities for resilience and
persistence as no one is always on the winning side of issues and contracts.
Washington will always have its image challenges and be an enigma as to
how it functions, especially to those who have never experienced life inside
46
the Beltway. Exploring and experiencing the four pillars will bring an
understanding of how to navigate a path to success for those who come to
this amazing city to make a difference and leave a positive legacy.
-------------------------------------------------------------------------------------------------------
---------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
Cybersecurity expert Chuck Brooks talks about where we stand in
what many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-
Will-Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee,
subject matter expert to the Homeland Defense and Security Information
Analysis Center, “passcode influencer” for The Christian Science Monitor, on
the Board of Advisors for CyberTech, and on the Board of Directors at
Bravatek and the Cyber Resilience Institute.
Brooks also has authored numerous articles focusing on cybersecurity,
homeland security and technology innovation for such publications
as Forbes, Huffington Post,InformationWeek, MIT Sloan
Blog, Computerworld, Federal Times, NextGov,Government Security News,
Cygnus Security Media, Homeland Security Today, The Hill and Government
Executive.
I recently got a chance to get Brooks' take on where we are today in what
many people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear many hats and certainly have been focused on
cybersecurity for some time now. So tell me, who is Chuck Brooks
and what is he trying to accomplish this space?
47
A. You are right, over my career in government, corporate and academia, I
have worn many hats. There have been some strong common threads [of]
science, technology, national security, and legislative and executive policy in
all my various roles. Thankfully, I selected a professional vocation of
government relations and marketing that encompasses all those threads.
My passion for cybersecurity issues was first established over a decade ago
during the time I spent at the Department of Homeland Security’s Science and
Technology Directorate. Back then, the threats to our critical infrastructure
were not as pronounced as they are today. Of course we were just beginning to
experience the smartphone era. The field of cybersecurity has evolved
exponentially along with the technologies, networks and connectivity that
make up the cyberecosystem. And the ecosystem is quite diverse and
expansive, comprising software, hardware, monitoring, forensics, governance
and more. All these elements make it an exciting area to explore since there is
always more to learn from strategy and technology perspectives. Also, it
certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it
touches everything work- or personal-related. In both the public and private
sectors — just about every CIO survey — cybersecurity is the top concern. And
of course, along with data analytics, cybersecurity is a annually a budget
priority of federal spending. DHS Secretary Jeh Johnson recently described
cybersecurity and counterterrorism as the two top priorities for the protecting
the homeland.
What I want to accomplish in this space is to continue being a subject matter
expert in cybersecurity; I enjoy writing and speaking about the varied aspects
of the topic and especially in educating others on how it can impact their lives.
My advisory and board director roles with organizations are a reflection of
that interest. When I retire (which is a long way off), I hope to join academia
again in a part-time role. I spent two years at Johns Hopkins University SAIS
[School of Advanced International Studies] teaching graduate students
homeland security and found it very fulfilling.
Q. You have one of the most active groups in LinkedIn under the
heading of the Department of Homeland Security. How has this
helped both yourself and DHS in feeling the pulse of the
cybersecurity industry?
48
A. I do operate a half dozen groups that focus on homeland security and
information security on LinkedIn, including a few of the largest groups: “U.S.
Department of Homeland Security, DHS” “Information Technology
(Homeland & National Security)” and “Homeland Security.”
In all, these groups include about 60,000 people. Among the members are a
host of well-known cybersecurity professionals who often post and comment
on issues of the day. Also, as any news on data breaches or cyberincidents
occur, they are often posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the
pulse of policy. It has also served as a great networking venue to share ideas
and information with some of the best security minds around in both the
private and federal sectors. Many senior-level executives in the federal
government are on social sites such as LinkedIn, GovLoop, Facebook and
Twitter. There are an estimated 1.5 million federal government employees
who regularly use LinkedIn, including over 65,000 from DHS. Because of the
growing need for public/private-sector collaboration and interface, being
actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do
for the company?
A. Sutherland Global Services is a global provider of business processing
services, contact centers, IT service desks and management consulting serving
government and U.S. leading corporations across multiple industries,
including health care and insurance, technology, mortgage and loan services,
finance and banking, retail, and travel. Sutherland has 36,000 employees and
annual revenues of over $1.2 billion, [and] was listed in 2015 as one of the
fastest growing private companies in America byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and
are known for integrated services for citizen service needs and digital
government. Our cybersecurity operations at Sutherland Government Services
are internal, but we do have a practice in customer relations management
after a company or agency has been breached. Our cybersecurity practice is
led by Glenn Schoonover who has a deep technical background. He is a former
chief information security officer for the Army and was responsible for
providing network security to the Department of the Army headquarters. He
is also a former senior technology strategist for Worldwide National Security
and Public Safety at Microsoft.
49
Q. I see you are active in both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the
private sector (for the most part) is driven by profit and loss. The R&D efforts,
innovation sector and skilled technical expertise in the private sector has been
more robust than in government. Industry is more agile and able to react to
threat trends.
On the federal side, the landscape has really changed over the past few years.
[The U.S. Department of Defense], of course, has had the cybersecurity war-
fighting mission and continues to build upon new requirements for operations
and for systems. On the civilian side, DHS takes an increasingly larger role in
cybersecurity. Presidential and congressional directives have mandated that
DHS play a growing and more primary role, especially with protecting critical
infrastructure (transportation, health, energy, finance) that is mostly owned
by the private sector. DHS has to step up its activities in assessing situational
awareness, information sharing, and resilience research and development
plans with stakeholders. This has led to a trend in public-private partnering
for sharing threat information and in creating standards and protocols. In
both the public and private sectors, training of the next-generation
cybersecurity technical and policy [subject matter experts] is a major priority.
Q. To date, there seems to be a stand-off between Apple and the
federal government when it comes to iPhone security. What are
your thoughts on this, and can this bring about some lessons
learned for the cybersecurity industry?
A. This is the topic of the day, and it is a complicated issue relating to
government requesting a corporation to provide software to allow access to
data. My thoughts may be a bit different from some of the others in the
industry. While I recognize the importance of privacy and the dire risk of an
Orwellian surveillance state, I consider protecting innocent lives as a
mitigating circumstance. What if that data that the FBI is seeking on the
terrorist's encrypted phone uncovers a deeper terrorist network planning
more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law
enforcement to cooperate in these type of instances (with proper warrants and
assurances) so that company Internet protocol can be isolated and privacy
issues for the company’s customers can be best addressed. I am quite sure
Congress will be looking closely at this case to establish legislation to create a
working formula. The lesson for cybersecurity is that there is a balance
50
between privacy and security that has to be constantly reviewed in accordance
with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon
and zetabytes of data projected by 2020, can we secure and control
our digital processes, or are we headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on
the Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the
cost of sensors decreases and processing power and bandwidth continue to
increase. The fact is that most of these IT networks will have some sort of an
IoT-based security breach. We could be headed for a digital train wreck if IoT
security standards are not adopted. We may have a digital train wreck even if
they are adopted. Standards will have to be developed industry by industry.
Protecting a network of medical devices in a hospital will require different sets
of standards than protecting utilities with SCADA [supervisory control and
data acquisition] systems that make up the electric grid. There are a lot of
questions, including who enforces compliance? And what are the liabilities of
an IoT breach?
51
The real danger is that the Internet was
not built for security at its inception; it
was built for connectivity. There is some
truth to the notion that your network
may someday be betrayed by your
toaster or refrigerator. One thing is for
sure: the Internet of Things will pose
many challenges to cybersecurity and
data analytics, much of which we have
yet to contemplate.
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER
LIST OF CYBERSECURITY
TECH AREAS, PRIORITIES
AND EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and
Public/Private cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time”
horizon scanning and monitoring of
networks
// Diagnostics and forensics
(network traffic analysis, payload
analysis and endpoint behavior
analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
52
Q. You've had the opportunity to review many cyberdefense
technologies. Are we really finding new solutions that can handle
this explosion of digital processes, or are we still playing the game
of catch-up and patch-and-pray cybersecurity?
A. New solutions are continually evolving with threats, but there will always
be a need for better encryption, biometrics, analytics and automated network
security to protect networks and endpoints. It is a perpetual game of cat and
mouse between hackers and protectors, and there is really no such thing as
being invulnerable.
In a sense, we are continually playing catch-up and reacting to the last
incident with patches. The weakest link will always be the human element.
However, there are many new interesting technologies that could significantly
impact cybersecurity in the near future. There are technologies and
algorithms coming out of the national labs, government, and from private-
sector R&D and startups that have the potential to be disruptive.
Q. Any final comments? And are there any speaking engagements
or events you are participating in that you would like to announce?
Could you also offer a good source for information on the subject
of cybersecurity that you would suggest for our readers?
A. Please check my regular posts in the media and social media, join my
LinkedIn groups and follow me on Twitter @ChuckDBrooks. I do have some
future blogs with the National Cybersecurity Institute on my agenda. Also, in
addition to social media, which I highly recommend, there are many excellent
outlets for cybersecurity information including the Homeland Defense and
Security Information Analysis Center. A great site that aggregated
cybersecurity news daily is The CyberWire.
Larry Karisny is the director of Project Safety.org, an advisor, consultant, speaker and writer
supporting advanced cybersecurity technologies in both the public and private sectors.
53

Mais conteúdo relacionado

Mais procurados

Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Chuck Brooks
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt TechnologiesChuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 

Mais procurados (20)

Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
Chuck Brooks Profile: Homeland Security, Cybersecurity, Emerging Technologies...
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
интернет
интернетинтернет
интернет
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 

Semelhante a Chuck Brooks profile on cybersecurity, homeland security, and emerging tech

Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuck Brooks
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Michael Brito | Zeno Group
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Virtual government engagement technologies
Virtual government engagement technologiesVirtual government engagement technologies
Virtual government engagement technologiesChuck Brooks
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 

Semelhante a Chuck Brooks profile on cybersecurity, homeland security, and emerging tech (20)

Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
 
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMIT
 
ITSECURITY PLANET
ITSECURITY PLANETITSECURITY PLANET
ITSECURITY PLANET
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Virtual government engagement technologies
Virtual government engagement technologiesVirtual government engagement technologies
Virtual government engagement technologies
 
Cybertech
CybertechCybertech
Cybertech
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 

Mais de Chuck Brooks

Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
HDIAC Information Sheet
HDIAC Information SheetHDIAC Information Sheet
HDIAC Information SheetChuck Brooks
 

Mais de Chuck Brooks (7)

Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 
HDIAC Information Sheet
HDIAC Information SheetHDIAC Information Sheet
HDIAC Information Sheet
 
Brooks18
Brooks18Brooks18
Brooks18
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 

Último

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Chuck Brooks profile on cybersecurity, homeland security, and emerging tech

  • 1. Chuck Brooks Thought Leadership Profile: Cybersecurity, IoT. Big Data, AI, and Emerging Tech Chuck Brooks is a Technology Evangelist, Corporate Executive, Speaker, Writer, Government Relations, Business Development, and Marketing Executive. He is also a Subject Matter Expert, Advisor, and Thought Leader in the areas of: • Emerging Technologies, Homeland Security, Internet of Things, Cybersecurity & Homeland Security, Cloud, Smart Cities, Business Process Outsourcing, Design Thinking, Digitization, Digital Media, Artificial Intelligence, Quantum Computing, Big Data, Digital Transformation, Print, Governance & Compliance 1
  • 2. Career Highlights: • Chuck was recently named by LinkedIn as a “Top Person you should be following on Tech issues” out of 500 million members. He is also an advisor to LinkedIn on emerging Technology and cybersecurity issues. He is a featured SME and have his blogs published by LinkedIn in 2017 • Chuck is Chairman of the CompTIA New and Emerging Technologies Committee • Chuck has won the “Cybersecurity Marketer of the Year” at the Cybersecurity Excellence Awards in both 2016 and 2017 • He has been the Chief Judge for the Government Security News annual Homeland Security Awards for four years • Chuck helped stand up the first Office of Legislative Affairs at DHS and was the first Legislative Director of The Science & Technology Directorate 2
  • 3. • Chuck served as Adjunct Faculty for Two Years at Johns Hopkins University • Chuck was at Technology Partner Advisor to The Bill and Melinda Gates Foundation • Chuck received two Presidential appointments for Federal Executive Service 3
  • 4. 4
  • 5. It was an honor co-presenting with John Perren former Assistant Director of the Weapons of Mass Destruction Directorate of the FBI, and LTC Scott Appelgate, Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs Of Staff and Dr. Frederic Lemieux Professor and Program Director, at the National Security Threat Convergence: Violent Extremism and Cybersecurity event at George Washington University 5
  • 6. 5 Tech Voices You Should Be Following on LinkedIn [List Features Chuck Brooks] Meghan Brockmeyer September 29, 2016 https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech- companies/2016/5-tech-voices-you-should-be-following-on-linkedin When you’re looking for inspiring and informative professional perspective online, where do you go? Are there experts that keep meaningful tabs on your industry? Or executives whose insights you turn to for fresh insights and new ideas? If so, you already recognize the huge opportunity to engage with, and learn from peers online. Chuck Brooks – Security Voice and “Government Relations and Marketing Executive, Thought Leader” 6
  • 7. Chuck’s varied security experience is evident in what he publishes. From aviation to public sector, government to science, his posts take on the multifaceted aspects of cyber security as it relates to industries/verticals, homeland issues and next-gen technology. Since he’s keen on variety, with formats ranging from expert Q&As to content roundups, to non-tech posts associated with topics/verticals he’s covered, his perspective truly stands out. Tech marketer takeaways: Chuck focuses core content on security, but isn’t afraid to include content tangentially related to core subject matter (e.g. a post focused on mastering the art of influence in Washington, D.C.) which incorporates fresh/unexpected content to help keep readers interested and foster conversation. MEDIA Activities: • Publications/Writings/Interviews: Published in Huffington Post, Forbes, LinkedIn Marketing (Featured SME on Cybersecurity and Emerging Tech) Government Security News (featured contributor), The Hill (featured contributor), Federal Times (Featured Contributor on homeland security issues), Christian Science Monitor (Member of Passcode Influencers Panel), The Hill, Government Executive, MIT Sloan Blog, Homeland Security Today, Cygnus Media, BizCatalyst360 (Featured Contributor), NextGov, Alien Vault (Featured Contributor), Government Technology, GovExec, High Performance 7
  • 8. Counsel (Featured Contributor), Brink Risk Management (Featured Contributor), ITSP Magazine (Featured Contributor), Security Information Watch, Advisor and Contributor to Cognitive World. Chuck Brooks as Featured Speaker (partial list of events): • National Academy of Sciences/FBI Biosecurity Meeting 2016 • USTRANSCOM Cybersecurity Roundtable 2017 • The Information Systems Security Association (ISSA) 2017 Mid Atlantic Conference • George Washington University Cybersecurity event • Institute of Management Consultants Conference 2016 8
  • 9. • Critical Security Controls Editorial Panel, Council on Cybersecurity • DC Cybersecurity Summit (Securing The IoT) 2016, 2017 • CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness) 2016 • The Astana Economic Forum and Global Risk Expo in Astana, Kazakhstan. • National Cybersecurity Institute • Webcast Host on Mobile Identity Management • Global Cyber Threat Summit • Cybersecurity Summit 2016, 2017 • Kaspersky Cyber Security Conference 2015 • IDGA Homeland Security Week conference • Homeland Security Professionals Conference 2015 • Secure Cities Conference 2014 • CyberMaryland conference 2014/15,17 • National Press Club, Global Business News events 2014/15,16 • Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review co-sponsor) • Guest seminar lecturer on lobbying and interest groups in the national security policy process at the National War College of the National Defense University 9
  • 10. • Regional Representative 2011, Davos Second World Economic Forum “Communication on Top” 10
  • 11. Activities: Chuck serves as Chairman of CompTIA’s New and Emerging Technology Committee, and serves on Boards to several prominent public and private companies and organizations. He is Advisory Board Member to The Center for Advancing Innovation Inc., a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC), and Member, Electrical and Electronics 11
  • 12. Engineers IEEE Standards Association (IEEE-SA) Virtual Reality and Augmented Reality Working Group He is a former Technology Partnership Advisor to the Bill and Melinda Gates Foundation. Chuck has served in government at the Department of Homeland Security at the Science & Technology Directorate, at Voice of America (VOA), and also for 7 years on Capitol Hill as a Senior Advisor to Senator Arlen Specter on technology and security issues. He is also former Adjunct Faculty at Johns Hopkins University, and received his MA in International Relations from the University of Chicago, B.A, in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law, Netherlands. 12
  • 13. Published Writings by Chuck Brooks (Partial List): • CHUCK BROOKS, FEATURED HPC CONTRIBUTOR – ADVISER TO LINKEDIN AS CYBERSECURITY AND EMERGING TECHNOLOGY SUBJECT MATTER EXPERT https://highperformancecounsel.com/chuck-brooks-featured-hpc-contributor- adviser-linkedin-cybersecurity-emerging-technology-subject-matter-expert/ • Why LinkedIn is an Indispensable Medium for Security Professionals | by Chuck Brooks LinkedIn Marketing Blog (post has received more than a million views!) https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech- companies/2017/why-linkedin-is-an-indispensable-medium-for-security- professiona • Hurricane Harvey: Special thanks to the professionals, volunteers helping others http://www.federaltimes.com/management/leadership/2017/08/29/hurricane- harvey-special-thanks-to-the-professionals-volunteers-helping-others-commentary/ • Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C- Suite https://highperformancecounsel.com/expert-chuck-brooks-offers- cybersecurity-cheat-sheet-c-suite/ • Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In Interview https://highperformancecounsel.com/new-cybersecurity-stakes- interview-cybersecurity-thought-leader-chuck-brooks/ 13
  • 14. • Emerging Technologies For The Public Sector by Chuck Brooks in Cognitive World http://cognitiveworld.com/article/emerging-technologies-public-sector • Chuck Brooks Federal News Radio Interview: New administration looks to DC for cyber innovation https://federalnewsradio.com/whats-working-washington/2017/05/new- administration-looks-to-dc-for-cyber-innovation/ • Identity Theft, The Not So Hidden Scourge by Chuck Brooks https://www.alienvault.com/blogs/security-essentials/identity-theft-the-not- so-hidden-scourge? bwf_dp=t&bwf_entry_id=5382&bwf_token_id=17267&bwf_token=QXuSRLGA TE0mnNfPwfSTORzj9 • Co-Author of The #CyberAvengers Playbook; The Non-Technical, No Nonsense Guide For Directors, Officers, and General Counsels https://www2.fireeye.com/OFFER-WP-Legal-Playbook.html • Blockchain for Government: A Cheat Sheet: http://www.nextgov.com/technology-news/tech-insider/2017/07/blockchain- government-cheat-sheet/139274/?oref=ng-HPriver • Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In Interview https://highperformancecounsel.com/new-cybersecurity-stakes- interview-cybersecurity-thought-leader-chuck-brooks/ • A Quick Summary of Recent Cybersecurity Trends & Developments by Chuck Brooks https://highperformancecounsel.com/quick-summary-recent- cybersecurity-trends-developments-businesses-law-firms-know/ • Defining and Addressing the Growing Cyber Insider Threat https://www.alienvault.com/blogs/security-essentials/defining-and- addressing-the-growing-cyber-insider-threat • EXPERT BROOKS ON #CYBERSECURITY: IS WANNACRY RANSOMWARE JUST THE WARM-UP ACT? https://highperformancecounsel.com/expert-brooks- cybersecurity-wannacry-ransomware-just-warm-act/ • Time to streamline Congressional oversight of DHS [Commentary] http://www.federaltimes.com/articles/time-to-streamline-congressional- oversight-of-dhs-commentary • 5 emerging tech key to transportation security [Commentary] http://www.federaltimes.com/articles/5-emerging-tech-key-to- transportation-security-commentary 14
  • 15. • THE GAMIFICATION TREND IN #CYBERSECURITY – EXPERT CHUCK BROOKS TALKS THROUGH THIS EMERGING SOLUTION FOR CLIENTS HTTPS://HIGHPERFORMANCECOUNSEL.COM/GAMIFICATION-TREND- CYBERSECURITY-EXPERT-CHUCK-BROOKS-TALKS-EMERGING-SOLUTION- CLIENTS/ • Chuck Brooks Federal News Radio Interview: New administration looks to DC for cyber innovation https://federalnewsradio.com/whats-working- washington/2017/05/new-administration-looks-to-dc-for-cyber-innovation/ • Automation technologies and the changing cybersecurity ecosystem http://gsnmagazine.com/node/48279?c=cyber_security • Chuck Brooks, The Tech Voice You Should be following: University of Chicago Webinar (YouTube with slide deck presentation) https://www.youtube.com/watch? v=3wk2uMXzS60&feature=youtu.be • WannaCry ransomware worm attacks the world (Interview Comments by Chuck Brooks http://www.securityinfowatch.com/article/12334948/wannacry-ransomware- worm-attacks-the-world • CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING GROWING SECURITY CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc- contributor-chuck-brooks-meeting-growing-security-challenges/ • The Cusp of Technological Transformation http://cognitiveworld.com/article/cusp-technological- transformation-0 • NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update with ChuckBrooks http://www.logiccentralonline.com/new-cyber-frontier/ncf- dc05/ • Writestream Radio welcomes Cybersecurity Expert Chuck Brooks http://www.blogtalkradio.com/writestream/2017/08/30/the-writestream- welcomes-cybersecurity-expert-chuck-brooks#.WaasLo3XMLA.facebook • CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING GROWING SECURITY 15
  • 16. CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc- contributor-chuck-brooks-meeting-growing-security-challenges/ • Chuck Brooks explains the difference between ICS and IT security http://iiot- world.com/cybersecurity/chuck-brooks-explains-the-difference-between-ics- and-it-security/ • RANSOMWARE IS SPREADING LIKE WORMS:ARE YOU READY? http://www.nextgov.com/technology-news/tech- insider/2017/05/ransomware-spreading-worms-are-you-ready/137896/? oref=ng-channelriver • Homeland Security wins in Trump budget, especially in cybersecurity [Commentary] http://fifthdomain.com/2017/03/17/homeland-security-wins- in-trump-budget-especially-in-cybersecurity-commentary/ • The cybersecurity priority for DHS in 2017 http://www.federaltimes.com/articles/the-cybersecurity-priority-for- dhs-in-2017 • Congress had an office that gave expert tech analysis; let's bring it back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had- an-office-that-gave-expert-tech-analysis-lets • Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise https://www.alienvault.com/blogs/security-essentials/recent- attacks-demonstrate-the-urgent-need-for-c-suite-cybersecurty-expertise • Meeting Security Challenges Through Vigilance, Readiness and Resilience http://www.brinknews.com/?p=5052? utm_source=BRINK+Subscribers&utm_campaign=b94043847f- BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c 98-b94043847f-110145109 • The Priority of the Government/Industry Cybersecurity Partnership https://www.alienvault.com/blogs/security-essentials/the- priority-of-the-government-industry-cybersecurity-partnership • Will Vulnerable U.S. Electric Grid Get a New Protection Mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a- new-protection-mandate/ 16
  • 17. • Emerging focus on cyber threats to energy infrastructure http://www.federaltimes.com/articles/emerging-focus-on- cyber-threats-to-energy-infrastructure • Congress had an office that gave expert tech analysis; let's bring it back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had- an-office-that-gave-expert-tech-analysis-lets • Creating A Secure Smart City http://www.qognify.com/blog/creating-secure- smart-city/ • Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape https://www.alienvault.com/blogs/security- essentials/safeguarding-patients-and-data-in-the-evolving-healthcare- cybersecurity-landscape • Technology Foraging for Cybersecurity Solutions https://www.alienvault.com/blogs/security-essentials/technology- foraging-for-cybersecurity-solutions • And I Think To Myself, What A Virtual World https://itspmagazine.com/from- the-newsroom/and-i-think-to-myself-what-a-virtual-world • Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a- new-approach/ • How The Next Administration Will Reshape DHS http://www.federaltimes.com/articles/how-the-next-administration-will- reshape-dhs • Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL Magazine http://www.afcea.org/content/?q=Article-elections-risk-cyberspace- part-iv-securing-vote • The Gender Gap in Cybersecurity Can, and Should Be, Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap- in-cybersecurity-can-and-should-be-closed • Gen Touhill brings vision, strategy as nation’s first CISO http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy- as-nations-first-ciso 17
  • 18. • US must invest more in advanced computing http://thehill.com/blogs/pundits- blog/technology/291013-us-must-invest-more-in-advanced-computin • DHS cyber role elevated in new legislation http://www.federaltimes.com/story/government/dhs/blog/2016/0 6/15/dhs-cyber-role-elevated-new-legislation/85934982/ • Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape https://www.alienvault.com/blogs/security- essentials/safeguarding-patients-and-data-in-the-evolving-healthcare- cybersecurity-landscape • Socializing Citizen Services In The Public Sector http://bizcatalyst360.com/socializing-citizen-services-in-the-public-sector/ • Embracing Global Public/Private Cybersecurity Alliances https://www.alienvault.com/blogs/security-essentials/embracing- global-public-private-cybersecurity-alliances • Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future- watch-follow-the-tech-leader/ • 4 steps to a strong incident response plan | CSO Online http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a- strong-incident-response-plan.html • Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a- new-approach/ • NCF-DC1 Washington DC Cyber News Update With Chuck Brooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/ • Ransomware Trending as Weapon of Choice for Hackers http://www.itsecurityplanet.com/from-the-newsroom/ransomware- trending-as-weapon-of-choice-for-hackers • The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-blog/technology/280481-the- government-explores-artificial-intelligence 18
  • 19. • DHS's ongoing challenge: Securing soft targets by Chuck Brooks http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss -ongoing-challenge-securing-soft-targets/82350628/ • Creating a digital career path for Native Americans http://www.federaltimes.com/story/government/dhs/blog/2016/0 5/16/creating-digital-career-path-native-americans/84455826/ • The Internet Of Things (IoT) Has Arrived – What You Should Know http://infosecurity.ciowatercooler.co.uk/the-internet-of-things-iot-has- arrived-what-you-should-know/ • NGA's Homeland panel to benefit from Governor Hutchinson’s experience, leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas- homeland-panel-benefit-hutchinsons-experience-leadership/88031784/ • DHS cyber role elevated in new legislation http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs- cyber-role-elevated-new-legislation/85934982/ • Embracing Global Public/Private Cybersecurity Alliances https://www.alienvault.com/blogs/security-essentials/embracing-global- public-private-cybersecurity-alliances • The Gender Gap in Cybersecurity Can, and Should Be, Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in- cybersecurity-can-and-should-be-closed • Digital Convergence and Cybersecurity https://www.alienvault.com/blogs • The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe http://bizcatalyst360.com/cybersecurity-hacked-again-women-in- digital-universe/ • 4 steps to a strong incident response plan | CSO Online http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a- strong-incident-response-plan.html • Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-new-era-quantu m-computing/ • UK/US Cybersecurity Will Thrive With or Without Brexit http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity- cooperation-will-thrive-with-or-without-brexitooperation 19
  • 20. • Creating a Digital Career Path for Native Americans http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creat ing-digital-career-path-native-americans/84455826/ • The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security- essentials/the-rise-of-the-chief-data-officer • Ransomware Trending as Weapon of Choice for Hackers http://www.itsecurityplanet.com/from-the-newsroom/ransomware-trending-as- weapon-of-choice-for-hackers • The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-blog/technology/280481-the-government- explores-artificial-intelligence • The Globality Quotient: Cybersecurity (Chuck Brooks Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/ • Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element http://www.govtech.com/dc/articles/Chuck-Brooks-on- Cybersecurity-The-Weakest-Link-Will-Always-Be-the-Human-Element.html • DHS's ongoing challenge: Securing soft targets by Chuck Brooks http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss- ongoing-challenge-securing-soft-targets/82350628/ • Chuck Brooks, Winner "Cybersecurity Marketer of the Year", Cybersecurity Excellence Awards https://americansecuritytoday.com/chuck- brooks-winner-2016-cybersecurity-excellence-awards/ • 3 of the biggest concerns about external cyber threats Phishing attacks employing malware, especially ransomware, is a top cybersecurity concern of Chuck Brooks (@ChuckDBrooks), vice president of government relations and marketing at Sutherland Global Services. “Anyone and everyone is vulnerable,” he said. “The expanding interconnectivity of our devices and the Internet of Things also makes malware a network threat. And with these kinds of phishing attacks, it is often quite difficult to find and prosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns- about-external-cyber-threats/ • Government R&D can be a catalyst for technological progress http://thehill.com/blogs/pundits-blog/technology/267944-government-rd- can-be-a-catalyst-for-technological-progress • The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital- yearbook-of-awards/8 • Key homeland security priorities to watch in 2016 http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key- homeland-security-priorities-watch-2016/77368604/ 20
  • 21. • Seven astounding technology trends for 2016 http://www.securityinfowatch.com/article/12151224/seven-top-technology- trends-for-2016 • Preparing for the Coming Millennial Workforce https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing- coming-millennial-workforce/ • HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland Security http://homelandsecuritynet.com/component/contushdvideoshare/pl ayer/hsn-tv/hsn-charles-brook-interview?Itemid= • The Internet Of Things (IoT) Has Arrived – What You Should Know http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what- you-should-know/ • 7 Top Tech Trends Impacting Innovators in 2016 http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends- impacting-innovators-in-2016/ • The alchemy of big data in government http://thehill.com/blogs/pundits- blog/technology/263890-the-alchemy-of-big-data-in-government • Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland- security-alerts/79982178/ • The Internet of Things and Cyber- Security: Government Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and- cyber-security-government-readiness • Smart cities, the Internet of Things and the Blue Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart- cities-the-internet-of-things-and-the-blue-revolution • Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks http://www.christophergorog.com/cyber-security/cwc-cyber-1/ • Protecting the Internet of Things and living in Smart Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/p rotecting-internet-things-and-living-smart-cities/72742172/ • Does Government Need ‘Hardware-Separated’ Operating Systems?: http://www.nextgov.com/technology-news/tech- insider/2015/09/does-government-need-hardware-separated-operating- systems/121826/ 21
  • 22. • Winning With Women - an interview with Chuck Brooks: https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday- first-male-interview-with-chuck-brooks-vp-government-relations-marketing- sutherland-global-services/ • The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-blog/washington-metro-news/217783- navigating-the-four-pillars-of-Washington • Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security News) gsn 2014 digital yearbook of homeland security awards recipients • Homeland Security Interview by Government Security News on Key issues for 2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of- homeland.html • Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-blog/technology/238756-some-catalyzing- technologies-on-the-government-horizon • Solving Problems with Technology Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with- technology-convergence/#prettyPhoto • Government prioritizes digital engagement (Computerworld) http://www.computerworld.com/article/2931835/it- transformation/government-prioritizes-digital-engagement.html • Department of Homeland Security Explores Wearables http://www.wearablevalley.co/department-of-homeland-security- explores-wearables/#more-21 • The OPM breach screams for action | SecurityInfoWatch.com https://www.google.com/webhp?sourceid=chrome- instant&ion=1&espv=2&ie=UTF-8#q=The+OPM+breach+screams+for+action. +Chuck+Brooks • Servicing the Internet of Things and the New Digital Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet- of-things-new-digital-economy/#.VKriQCvF91Y • Adopting a cooperative Global Cyber Security Framework to mitigate cyber threats (before it is too late) http://www.voodootec.com/author/chuckbrooks/ 22
  • 23. • Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks- preparation-commitment-key-for-govt-industry-cyber-partnerships/ • Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel) https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement- seminar • DHS, FBI stepping up digitization of Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI- stepping-up-digitization-records • Internet of Things, New Frontier of Technology Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology- convergence/#prettyPhoto • Wearables Bring New Sense of Fashion to Public Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables- bring-new-sense-fashion-public-sector/104679/ • DHS: A decade (and more) of competing congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/DHS- decade-more-competing-congressional-oversight • Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry- in_2_b_4620232.html?utm_source=Alert- blogger&utm_medium=email&utm_campaign=Email%2BNotifications • The DHS's vital role in confronting the threat of pandemics and bioterrorism | Federal Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The- DHS-s-vital-role-confronting-threat-pandemics-bioterrorism • "Why You Should Be Excited About Future Tech" (InformationWeek) http://www.informationweek.com/strategic-cio/executive- insights-and-innovation/why-you-should-be-excited-about-future-tech/d/d- id/1114036? • Dick Tracy and the Benefits of Virtual Government http://government.blogs.xerox.com/?s=virtual+government • Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure- cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission-report/ 23
  • 24. • Creating resilience with public/private partnerships—and planning (MIT Sloan Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with- publicprivate-partnerships-and-planning/ • DHS’s Special Partnership with Native Americans (Indian Country News) http://www.indiancountrynews.com/index.php/news/26-mainstream- politics/13958-dhs-s-special-partnership-with-native-americans • TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8 • Homeland Security is Back in the Limelight By Chuck Brooks (The Hill) http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland- security-is-back-in-the-limelight • Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure- cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission- report/#tweet-link • Transportation security: Back to the future http://thehill.com/blogs/pundits- blog/212288-transportation-security-back-to-the-future • Chief Data Officers in the Government – What Role Should They Play? https://government.blogs.xerox.com/2015/02/20/chief-data-officers- government-what-role-should-they-play/? utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_ campaign=Corporate+Channels&CMP=SMO- Facebook+sf36444741#.VSLkIJh0xdh • Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-data-what-its- worth/#.VSLft5h0xdg • Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedi n_homeland_security_discussi • The public/private imperative to protect the grid by Chuck Brooks (Federal Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The- public-private-imperative-protect-grid • How S&T drives innovation at DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How- S-T-drives-innovation-DHS 24
  • 25. • “Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-brooks • The public/private imperative to protect the grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The- public-private-imperative-protect-grid • Government Security News 2013 Homeland Security Awards (Lead Judge) http://www.gsnmagazine.com/node/39332? c=federal_agencies_legislative • Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security Week presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx? tp_spkid=105234 • Tech Interviews Featured on House Homeland Security Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homel and_Security_Schedule_for_March_1620/ • DHS Secretary Jeh Johnson revitalizes the 'One DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/ DHS-Secretary-Jeh-Johnson-revitalizes-One-DHS-vision • Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon- security-measures-make-for-a-different-event • DHS as the Epicenter for Cybersecurity in Government (Government Security News): http://www.gsnmagazine.com/node/32882?c=cyber_security • Native Americans key to border security success http://thehill.com/blogs/pundits-blog/immigration/214494-native- americans-key-to-border-security-success • Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional- hearings-have-called-attention-to-the-need-for-better-cooperation-between- government-agencies-and-the-private-sector • Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal Times) http://www.federaltimes.com/apps/pbcs.dll/article? AID=2013310280011 25
  • 26. • Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-webinar-evolving-role- cybersecurity-department-homeland-security • “Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet of Things; Health & Medicine; and, Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr 07041401.html • Public/Private Partnerships (FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_pr ivate_partnerships/ • Chuck Brooks presentations at Global Risk Expo in ASTANA, KAZAKHSTAN http://astanaforum.org/2014/events/international-expo- conference-global-risk-expo • Featured Speaker:Chuck Brooks - Homeland Security Week 2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid %3D105234 • Featured Speaker: Homeland Security Week 2014 Conference https://www.asdevents.com/event_speakers.asp? id=3323&desc=Homeland+Security+Week+2014+Conference • Using Social Media to Link In to Government: http://bizcatalyst360.com/linking- government/ • Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt- agencies-seek-to-accelerate-record-digitization/ • The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm • Tech & Innovation thought leader Chuck Brooks joins The Franklin Foundation Board of Directors http://www.prlog.org/12396042-tech-innovation-thought- leader-chuck-brooks-joins-the-franklin-foundation-board-of-directors.html • Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower | Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy- with-mark-amtower 26
  • 27. • Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx • How Big Data Will Revolutionize Aviation Security (Chuck Brooks Interviewed) http://www.hstoday.us/index.php? id=483&cHash=081010&tx_ttnews%5Btt_news%5D=32217 • Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt- agencies-seek-to-accelerate-record-digitization/ • Transaction Processing is at the Root of Data Analytics http://government.blogs.xerox.com/2014/06/11/transaction-processing-root- of-data-analytics/#prettyPhoto • BizCatalyst 360: Digital Government Yields Customer Service Innovation http://bizcatalyst360.com/digital-government-yields-customer- service-innovation/ • Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security • Digital Government Yields Exciting Innovation http://government.blogs.xerox.com/2014/05/28/digital- government-yields-exciting-innovation/ • Transforming US Border Crossing http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border- control-processing-through-automation/ • Radio Interview: All things LinkedIn - FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All- things-LinkedIn • Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon- security-measures-make-for-a-different-event • DHS's Special Partnership with Native Americans Homeland Security Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12 • Pausing Before Tapping “Connect:” Can Privacy and Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/ 27
  • 28. • The Future of Social Media (Chuck Brooks quote) http://www.business2community.com/social-media/future-social- media-60-experts-share-2014-predictions-0718083 • Next Practices Institute Events - Executive Next Practices Institutehttp://www.enpinstitute.com/events/ • What Government Agencies Can Learn From The Private Sector (FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government- agencies-eye-contact-centers-for-consolidation-3-takeaways-from-the-private- sector/ • Xerox Real Business Radio Online Radio | BlogTalkRadio http://www.blogtalkradio.com/xeroxradio • Interview - Global Radio Talk Show – Interviews with Business Leaders ... http://globalradiotalkshow.com/ • Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum Moscow http://www.gsnmagazine.com/node/33583? c=access_control_identification • Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional- hearings-have-called-attention-to-the-need-for-better-cooperation-between- government-agencies-and-the-private-sector • The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm • Mobile Apps Continue to Shape Government Agencies http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to- shape-government-agencies/#.VjZQ1_mrTIU • Combining Legislation and technology for Better Government Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation- technology-better-government-customer-service.htm • Radio Interview: The U.S. Needs a Proactive Approach To Combat Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s- needs-a-proactive-approach-to-combat-cybercrime/ • Featured Speaker; Symposium on Homeland Security & Defense http://symposiumonhomelandsecurity.com/wp- content/uploads/2015/03/2015-Symposium-on-Homeland-Security__Draft- Schedule-3_30_15.pdf 28
  • 29. • Interview with Chuck Brooks The Business Edge | VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge • Featured Speaker; The Counter Terrorist magazine http://www.thecounterterroristmag.com/conference/ • Moderator, Technology Conference - Association for Corporate Growth http://www.acg.org/boston/technologyconference.aspx • Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx • Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc. http://www.fbcinc.com/e/cybermdconference/speakers.aspx • Cybersecurity 2014: Beyond the NIST framework - FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/ • How Wearable Devices Can Transform Contact Center Operations http://www.customerexperiencereport.com/strategy-and- trends/wearable-devices-can-transform-contact-center-operations/ • Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox: What are your Homeland Security views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301 501.html • How To Successfully Implement Social Media For Business Development In Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88 310c3c0bb9a12dcc3742b7d609543#.VSK8z5h0xdg • Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists Popular on LinkedIn” Posted by Vincent Granville http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular- on-linkedin • Keeping Pace With a Streamlined Service Approach http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular- on-linkedin • Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/ • Featured Speaker: Social media in Government conference http://aliconferences.com/events/social-media-in- government_0515/ • CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/ 29
  • 30. • CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC %20Cyber%20Security%202014%20Outline.pdf xerox | GovCon Executive http://www.govconexecutive.com/%3Fs%3Dxerox • Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington, DC Washington '14 March - Global HR Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271 • Public/private partnership is key to be competitive in any market. The Know How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to- be-competitive-in-any-market-the-know-how/ References, Kudos, Recommendations: 30
  • 31. 31
  • 32. Edward You is a Supervisory Special Agent in the FBI’s Weapons of Mass Destruction Directorate, Biological Countermeasures Unit. Mr. You is responsible for creating programs and activities to coordinate and improve FBI and interagency efforts to identify, assess, and respond to biological threats or incidents. These efforts include expanding FBI outreach to the Life Sciences community to address biosecurity. Before being promoted to the Weapons of Mass Destruction Directorate, Mr. You was a member of the FBI Los Angeles Field Office Joint Terrorism Task Force and served on the FBI Hazardous Evidence Response Team. Mr. You has also been directly involved in policy-making efforts with a focus on biosecurity. He is 32
  • 33. an active Working Group member of the National Security Council Interagency Policy Committee on Countering Biological Threats and an Ex Officio member of the NIH National Science Advisory Board for Biosecurity. He also serves on two committees for the National Academies of Sciences, the Institute of Medicine’s Forum on Microbial Threats and the Committee on Science, Technology, and Law’s Forum on Synthetic Biology June Klein , CEO Technology & Marketing Ventures, Inc; Electronic-BoardroomTMVi(r) Solutions; EmpowernatorJune(tm) Next Practices; Chuck and I served as “invite-only, vetted and trusted advisors” to the Bill and Melinda Gates Foundation - Technology Partner Network. Throughout the 2year strategic program, Chuck was a pleasure to collaborate with toward accelerating solutions on a range of global challenges facing the foundation and its grantees. He was generous in sharing his articles in prestigious publications, contacts to DC decision-makers and access to his featured speaker and award events. Currently, I am honored that Chuck chose me to be a manager of his “Emerging & Futuristic Technologies LinkedIn Group”. Chuck has huge followings on social networks and diligently responds to his thousands of friends on focused subject matters. He is a holistic thinker grounded in government, industry and academia leadership. I value any opportunity to work with Chuck to team with strategic partners that can benefit from scaling my IOT, cybersecurity, resiliency and video initiatives. I think very highly of Chuck, both personally and professionally. This is also evidenced by my recommending him to my UK Merchant Bank’s Virtual Technology Cluster as a speaker and director of their Cybersecurity program blending entrepreneurial firm innovations with Lockheed Martin’s product development process. I am confident that if you hire Chuck for any leadership, director, team, award or speaking slots, he will contribute to catapulting your success and achieving your goals. Besides his many skills, he is a very nice person as well. Feel free to contact me if you want any further evidence. 33
  • 34. Dexter Ingram Senior Advisor, INTERPOL I have had the pleasure of knowing Chuck for over 10 years, since he was at DHS and I was on the House Select Committee on Homeland Security. He is a consummate professional who has a deep understanding of the issues,process, and people involved in the world of homeland security and Law enforcement. His breadth of experience derived from working on The Hill, in government, in academia, in industry, and with the media make him truly unique. I most highly recommend Chuck and look forward to continuing working together. Holger Schulze B2B Tech Marketing Entrepreneur | Marketing-as-a-Service Chuck was selected "Cybersecurity Marketer of the Year" at the 2016 Cybersecurity Excellence Awards. This was quite an accomplishment as the awards were highly competitive with hundreds of entries and Chuck was one of the leading vote getters overall. This award reflects the information community's recognition of Chuck's excellence in the cybersecurity and homeland security space. I follow Chuck's prolific and informative writings and speeches on the topics of cybersecurity, homeland security, IoT, futurism, and emerging technologies -- many of which are re-posted in our 300,000 members Information Security Community LinkedIn Group. It a real pleasure to endorse Chuck for his great depth of experience, professionalism, capabilities and for his dedication to promoting cyber security issues. 34
  • 35. Mike Bowers Former President of Xerox Federal, Federal Government Services Executive & Advisor It was a real pleasure working with Chuck at Xerox. He served us as a thought leader on technology, BPO, homeland security and other important issues. He has exceptional depth on complex technology issues and an uncanny ability to rapidly write penetrating articles that were very well received in the media and Inside The Beltway. His contacts/relationships at DHS as well as his Rolodex of those in industry and government is second to none and served his BD colleague well. Most of all he was a professional and great person to work with. I give Chuck my highest recommendation. Thomas A. Cellucci, PhD, MBA Founder, Chairman & CEO Cellucci Associates, Inc. It is indeed a distinct pleasure to provide this recommendation for Chuck. To put it simply, Chuck possesses both the strategic vision and tactical discipline to get results--period. Having said that, his keen intellect is only matched by his genuine good nature and helpful attitude towards others. I would recommend Chuck for any business activity he would undertake. Herbert E. Spiegel, Ph.D,MBA President & Chief Science Officer at Applied Science & Technology Associates, LLC 35
  • 36. Chuck is an excellent source of information on the national and international scene. He is a mentor of the first order, with respect to the science and political aspects of Homeland Security and the myriad of issues surrounding that discipline. He is modest in his expertise and easily approachable. He is a valuable guide, willing to share his vast experience. Simon Szykman Chief Technology Officer, Federal Services at Attain Chuck and I were colleagues when we were both serving at the Department of Homeland Security. Chuck was a pleasure to work with and is a consummate professional with executive management and substantive issue expertise, particularly in technologies relating to DHS. Chuck also brings a special blend of experience to the table, having successfully served in leadership roles in industry, as well as executive and legislative branches of government. Chuck is a relationship builder, a "connector" of both opportunities and people. I highly recommend Chuck and look forward to continuing to work with him in the future. Admiral Jay Cohen President at JayMCohen LLC From my Senate confirmation hearings, through two years of re-inventing the Dept of Homeland Security Science & Technology Directorate (which was described by the Congress in 2006 as a "rudderless ship with no one at the helm" and in danger of the Congress rescinding $200M in FY 07), Chuck Brooks as Director of Legislative Affairs at DHS was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress in making the "reformation" of DHS S&T a complete success. His 36
  • 37. Hill/DC acumen, insight, reliability, ability to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16 years dealing with senior executive branch officials, industry, academia and the Congress. He has my strongest recommendation for executive positions of high responsibility in government relations/ business development. Hon. Jay M Cohen (Rear Admiral, US Navy, ret.) George Romas Chief Engineer, Cybersecurity at DXC Technology Chuck spent some quality time with our small startup company. He opened a lot of doors for us, providing introductions to potential investors and partners, as well as well-connected individuals on the Hill. Chuck also provided invaluable assistance in forming our company and product strategy. Pam Turner Managing Director at Prime Policy Group March 23, 2009, Pam managed Chuck directly Chuck was among the "start-up" team at DHS, and had responsibility for a wide range of complex issues and challenging procedural situations. His knowledge of the issues, familiarity with the political process, attention to detail, and his professionalism earned him the trust and respect of his Congressional contacts, his DHS associates, and all those who sought his counsel and help. Chuck is a "can-do" person, and I strongly recommend him. Timothy N. Teen CEO & Board at InSitech, Inc 37
  • 38. Chuck is very knowledgeable in government affairs, the military and security sector and is a diligent executive who is great to work with. While at the US Army's Picatinny Arsenal/ARDEC as well as with CVP, my team worked closely with Chuck in vetting technologies and services with applications for homeland security and defense. He has an acumen for technology issues, strong knowledge of investment banking/due diligence processes, and really knows his way around government bureaucracies. He is a collaborator who is committed to building great relationship and producing results and I most highly recommend him. Chuck Brooks References: * Admiral Jay Cohen (US Navy Ret), former Undersecretary of Science & Technology and the Department of Homeland Security and former Director of Naval Research for Department of Defense * Hon. Michael Chertoff, former Secretary of Homeland Security * Steven Pomerantz, Former Director of Counterterrorism for the FBI Proposed Compensation & Equity Arrangements For Services (for Discussion) 38
  • 39. Thursday, June 30, 2016 from 8:00 AM to 6:00 PM The Ritz-Carlton Tysons Corner • Learn from Security Experts & Advisors Including: Chuck Brooks Vice President for Government Relations & Marketing Sutherland Global Services Speaking on Panel 1: Protecting the Enterprise from the Growing Risk of Security Breaches as it Relates to the Internet of Things 39
  • 40. Meeting: BOARD ON LIFE SCIENCES and BOARD ON CHEMICAL SCIENCES AND TECHNOLOGY Safeguarding the Bioeconomy III Safeguarding the Bioeconomy III: Securing Life Sciences Data Speaker: Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and he serves as subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DOD) sponsored organization through the Defense Technical Information Center (DTIC). In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity 40
  • 41. From “Cybersecurity is Top Business Priority in 2017” https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017 In assessing the severity of security flaws in cyberspace, I spoke with several experts in the field. Charles “Chuck” Brooks is the vice president for government relations and marketing for Sutherland Government Solutions. He served at DHS as the first director of legislative affairs for the Science and Technology Directorate. He ominously points out: 41
  • 42. "The reality is that the more digitally interconnected we become in our work and personal lives, the more vulnerable we become." -- Chuck Brooks Mr. Brooks adds: "Mitigating cyber threats will grow as a priority for business, and for us personally, if we are to commercially function and prosper." But how can companies successfully mitigate cyber threats? His advice: "The C-suites and governing boards of corporations will need to invest in better enterprise and endpoint security to prevent phishing and malware probes by hackers. This will also require better training of executives and employees in basic information security measures." Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards Thu, 2017-02-09 01:49 PM Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of The New Emerging Technologies Committee for CompTIA, was named winner of Cybersecurity Marketer of The Year at the 2017 Cybersecurity Excellence Awards. Brooks 42
  • 43. The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security. The finalists and winners were selected based on the strength of their nomination and the popular vote by members of the Information Security Community (both ratings and comments). “Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year category in the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the 350,000 member Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence and innovation in today's cybersecurity industry.” Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been a force in discussing, advocating, promoting cybersecurity issues across digital media, at events, in professional forums, and with a variety of public policy organizations. He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies in both the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech People to Follow On LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and conferences. He recently presented at a workshop sponsored by The National Academies of Sciences, Engineering, and Medicine and the Federal Bureau of Investigation on Securing Life Sciences Data. He recently spoke at George Washington University event about the Cyber Threat Spectrum, will be participating soon at USTRANSCOM Senior Leader Cyber Security Roundtable. Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT Security Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government Security News, and Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn and a global following and has brought significant attention to cyber issues from his frequent posts and commentaries. He has been involved as a judge for the past four years as a Judge for Government Security News’ Annual Homeland Security Awards. As a senior executive in government relations, marketing, and management, Chuck brings a unique experience from service in the public sector, academia, and industry. He serves on a variety of boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a special subject matter expertise of cybersecurity and homeland security in government that have benefited both the not-for-profit, public, and commercial sectors. Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral Jay Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck Brooks. as Director of Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress in making the "reformation" of DHS S&T a complete success. His Hill/DC acumen, insight, reliability, ability to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16 years dealing with senior executive branch officials, industry, academia and the Congress.” Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate professional who has a deep understanding of the issues, process, and people involved in the world of homeland security and Law enforcement. His breadth of experience derived from working on The Hill, in government, in academia, in industry, and with the media make him truly unique.” 43
  • 44. Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at John Hopkins University where taught homeland security for two years. He has advised a multitude of organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and the Center for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging Technologies Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek, and the Cyber Resilience Institute. He is an advisor to R & D cybersecurity company Inzero Systems. He is a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC. Chuck also serves as a Christian Science Monitor “Passcode Influencers Panel member” on Information Security. He has a BA from DePauw University and an MA from the University of Chicago. ---------------------------------------------------------------------- ------- • Christian Science Monitor’s Passcode Influencers gathered from 120 experts from across government, the private sector, research, and the privacy advocacy community Navigating the four pillars of Washington By Chuck Brooks, contributor Washington is an eclectic city. It is a metropolis that is thriving economically and socially. Its architectural design is modeled after Paris and it is certainly a city of cultural diversity and historically interesting neighborhoods. Visually, the site of the monuments reflecting against the panoramic backdrop of the Potomac River is memorable for both visitors and native Washingtonians alike. 44
  • 45. It is really a city like no other city in America. Although it may be geographically small, Washington serves as the engine of government, an anchor of global financial policy and representation, a seat of institutionalized policymaking organizations, and as a growing center for business, especially in high tech. When I first came to Washington, I was overwhelmed by the intensity of life "inside the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain how to navigate it and decipher how things worked. Looking back, I would like to offer structure and pathways for others contemplating a public service career or seeking to accomplish tangible objectives for policy and/or business purposes in the nation's capital. There are four pillars that comprise the foundation of the operational world of Washington: government (executive, judicial and legislative branches); commercial (business, including global financial institutions; policy: (academia, think tanks and associations/organizations); and media (old and new). These pillars function both individually and collectively. They are intertwined and to be effective, it is essential to understand their roles and impact on what you hope to accomplish. Understanding and gaining experience within these pillars that comprise the operational system of Washington takes focus and time. Success can be realized by navigating the pillars and establishing a strategy of strategic relationship building and connecting. Government: There has never been any doubt that government and politics make Washington tick. Government is not only the basis for tens of thousands of jobs in the area, but it also serves as the fulcrum for evolving and communicating domestic and international policies. Government is the center for laws and executive orders overseeing all aspects of our daily life and our professions. The Pentagon, intelligence agencies, and Department of Homeland Security are all based in Washington because it is the epicenter of power and decision-making. Government in Washington is by design structured as a system of check and balances. An understanding of how the various branches of government function is essential to influencing any regulatory outcome whether it be energy, healthcare or a national security issue. Working on Capitol Hill is invaluable experience and connects to all the pillars and is a special pedigree for mobility in one's career. Commercial: Although it is not a financial center like New York, Washington has been transforming over the years as a commercial hub. The World Bank, Federal Reserve, International Financial Corporation and the Chamber of Commerce are some of the organizations headquartered in the city. Many corporations have also relocated to the area to be near the action and 45
  • 46. position themselves for government and commercial opportunities. Both Virginia and Maryland have established high-tech corridors close to the city for those reasons. The international community with their embassies and trade groups increasingly see Washington as a growing center for commerce. Policy: It is not only the pillars of business and government that are cogs in the machine. Policy organizations (such as the Center for Strategic and International Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise Institute and the Aspen Institute) that provide issue expertise, training and solutions are really the enabling fuel. A myriad of think tanks offer the latest insights in domestic and global events on a regular basis. Top local universities (such as Johns Hopkins's School of Advanced International Studies, George Washington, Georgetown, American, George Mason, and Maryland), also promote dialogue and informed decision-making and access. The over 6,000 associations and organization with issue specific interests regularly outreach to key decision–makers who are part of the public and private sector pillars. Strategic communications and thought leadership are integral tools for persuasion. Media: The media are disseminators of information, with the duty to circumspect the activities of the other three pillars. The media's role is a fundamental one; any system of democratic government cannot operate without transparency and oversight. In Washington, most of the country's key media outlets have representation. Outside traditional old media, new media has become a force to consider. Most citizens have constant access and the metrics of public opinion are constantly pulsed. Corporate executives and government leaders use the social media, especially LinkedIn, Facebook and Twitter as part of their work environments. Government 2.0 and Business 2.0 are becoming the norms. Working in one or all of the pillars is helpful in terms of building issue expertise, contacts and gaining a holistic perspective of how Washington really works. This experience can provide the tactical knowledge to advance your marketing efforts and/or cause in the public/private world. There is no substitute for experience and for building a personal network to be empowered and effective. To be successful, you have to always keep abreast of the latest trends and be visible and helpful to your customer. In the Washington arena, you also have to develop the qualities for resilience and persistence as no one is always on the winning side of issues and contracts. Washington will always have its image challenges and be an enigma as to how it functions, especially to those who have never experienced life inside 46
  • 47. the Beltway. Exploring and experiencing the four pillars will bring an understanding of how to navigate a path to success for those who come to this amazing city to make a difference and leave a positive legacy. ------------------------------------------------------------------------------------------------------- --------- Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element Cybersecurity expert Chuck Brooks talks about where we stand in what many people call the "wild, wild west" of cybersecurity. http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link- Will-Always-Be-the-Human-Element.html BY LARRY KARISNY / MARCH 1, 20160 If you're in the cybersecurity business, you know the name Chuck Brooks. He is an advisor to the Bill and Melinda Gates Foundation Technology Partner Network, chairman of CompTIA's New and Emerging Tech Committee, subject matter expert to the Homeland Defense and Security Information Analysis Center, “passcode influencer” for The Christian Science Monitor, on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience Institute. Brooks also has authored numerous articles focusing on cybersecurity, homeland security and technology innovation for such publications as Forbes, Huffington Post,InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov,Government Security News, Cygnus Security Media, Homeland Security Today, The Hill and Government Executive. I recently got a chance to get Brooks' take on where we are today in what many people call the "wild, wild west" of cybersecurity. Here are his thoughts. Q. You wear many hats and certainly have been focused on cybersecurity for some time now. So tell me, who is Chuck Brooks and what is he trying to accomplish this space? 47
  • 48. A. You are right, over my career in government, corporate and academia, I have worn many hats. There have been some strong common threads [of] science, technology, national security, and legislative and executive policy in all my various roles. Thankfully, I selected a professional vocation of government relations and marketing that encompasses all those threads. My passion for cybersecurity issues was first established over a decade ago during the time I spent at the Department of Homeland Security’s Science and Technology Directorate. Back then, the threats to our critical infrastructure were not as pronounced as they are today. Of course we were just beginning to experience the smartphone era. The field of cybersecurity has evolved exponentially along with the technologies, networks and connectivity that make up the cyberecosystem. And the ecosystem is quite diverse and expansive, comprising software, hardware, monitoring, forensics, governance and more. All these elements make it an exciting area to explore since there is always more to learn from strategy and technology perspectives. Also, it certainly blends my common career threads. For anyone’s career focus, studying cybersecurity makes [sense] since it touches everything work- or personal-related. In both the public and private sectors — just about every CIO survey — cybersecurity is the top concern. And of course, along with data analytics, cybersecurity is a annually a budget priority of federal spending. DHS Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the two top priorities for the protecting the homeland. What I want to accomplish in this space is to continue being a subject matter expert in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic and especially in educating others on how it can impact their lives. My advisory and board director roles with organizations are a reflection of that interest. When I retire (which is a long way off), I hope to join academia again in a part-time role. I spent two years at Johns Hopkins University SAIS [School of Advanced International Studies] teaching graduate students homeland security and found it very fulfilling. Q. You have one of the most active groups in LinkedIn under the heading of the Department of Homeland Security. How has this helped both yourself and DHS in feeling the pulse of the cybersecurity industry? 48
  • 49. A. I do operate a half dozen groups that focus on homeland security and information security on LinkedIn, including a few of the largest groups: “U.S. Department of Homeland Security, DHS” “Information Technology (Homeland & National Security)” and “Homeland Security.” In all, these groups include about 60,000 people. Among the members are a host of well-known cybersecurity professionals who often post and comment on issues of the day. Also, as any news on data breaches or cyberincidents occur, they are often posted in the LinkedIn groups. Moderating these groups certainly keeps me updated and in tune with the pulse of policy. It has also served as a great networking venue to share ideas and information with some of the best security minds around in both the private and federal sectors. Many senior-level executives in the federal government are on social sites such as LinkedIn, GovLoop, Facebook and Twitter. There are an estimated 1.5 million federal government employees who regularly use LinkedIn, including over 65,000 from DHS. Because of the growing need for public/private-sector collaboration and interface, being actively involved in social media makes a lot of sense. Q. What is Sutherland Government Relations and what do you do for the company? A. Sutherland Global Services is a global provider of business processing services, contact centers, IT service desks and management consulting serving government and U.S. leading corporations across multiple industries, including health care and insurance, technology, mortgage and loan services, finance and banking, retail, and travel. Sutherland has 36,000 employees and annual revenues of over $1.2 billion, [and] was listed in 2015 as one of the fastest growing private companies in America byInc. I work for the recently created Sutherland Government Solutions as VP of Government Relations and Marketing, where we are at several agencies and are known for integrated services for citizen service needs and digital government. Our cybersecurity operations at Sutherland Government Services are internal, but we do have a practice in customer relations management after a company or agency has been breached. Our cybersecurity practice is led by Glenn Schoonover who has a deep technical background. He is a former chief information security officer for the Army and was responsible for providing network security to the Department of the Army headquarters. He is also a former senior technology strategist for Worldwide National Security and Public Safety at Microsoft. 49
  • 50. Q. I see you are active in both the public and private sectors when it comes to cybersecurity. What are the similarities and differences between these two sectors? A. The biggest difference is that government is motivated by mission, and the private sector (for the most part) is driven by profit and loss. The R&D efforts, innovation sector and skilled technical expertise in the private sector has been more robust than in government. Industry is more agile and able to react to threat trends. On the federal side, the landscape has really changed over the past few years. [The U.S. Department of Defense], of course, has had the cybersecurity war- fighting mission and continues to build upon new requirements for operations and for systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity. Presidential and congressional directives have mandated that DHS play a growing and more primary role, especially with protecting critical infrastructure (transportation, health, energy, finance) that is mostly owned by the private sector. DHS has to step up its activities in assessing situational awareness, information sharing, and resilience research and development plans with stakeholders. This has led to a trend in public-private partnering for sharing threat information and in creating standards and protocols. In both the public and private sectors, training of the next-generation cybersecurity technical and policy [subject matter experts] is a major priority. Q. To date, there seems to be a stand-off between Apple and the federal government when it comes to iPhone security. What are your thoughts on this, and can this bring about some lessons learned for the cybersecurity industry? A. This is the topic of the day, and it is a complicated issue relating to government requesting a corporation to provide software to allow access to data. My thoughts may be a bit different from some of the others in the industry. While I recognize the importance of privacy and the dire risk of an Orwellian surveillance state, I consider protecting innocent lives as a mitigating circumstance. What if that data that the FBI is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network planning more horrific acts? In my opinion, this is a mitigating circumstance. What should be done is to establish protocols between industry and law enforcement to cooperate in these type of instances (with proper warrants and assurances) so that company Internet protocol can be isolated and privacy issues for the company’s customers can be best addressed. I am quite sure Congress will be looking closely at this case to establish legislation to create a working formula. The lesson for cybersecurity is that there is a balance 50
  • 51. between privacy and security that has to be constantly reviewed in accordance with the threats at hand. Q. With billions of Inernet of Things devices on the near horizon and zetabytes of data projected by 2020, can we secure and control our digital processes, or are we headed for a digital train wreck? A. According to Gartner, there will be nearly 26 billion networked devices on the Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of sensors decreases and processing power and bandwidth continue to increase. The fact is that most of these IT networks will have some sort of an IoT-based security breach. We could be headed for a digital train wreck if IoT security standards are not adopted. We may have a digital train wreck even if they are adopted. Standards will have to be developed industry by industry. Protecting a network of medical devices in a hospital will require different sets of standards than protecting utilities with SCADA [supervisory control and data acquisition] systems that make up the electric grid. There are a lot of questions, including who enforces compliance? And what are the liabilities of an IoT breach? 51
  • 52. The real danger is that the Internet was not built for security at its inception; it was built for connectivity. There is some truth to the notion that your network may someday be betrayed by your toaster or refrigerator. One thing is for sure: the Internet of Things will pose many challenges to cybersecurity and data analytics, much of which we have yet to contemplate. CYBERSECURITY EXPERT CHUCK BROOKS' MASTER LIST OF CYBERSECURITY TECH AREAS, PRIORITIES AND EMERGING TRENDS Emerging Technology Areas: // Internet of Things // Wearables // Drones and robots // Artificial intelligence // Smart cities // Connected transportation // Quantum computing Priorities: // Protecting critical infrastructure through technologies and Public/Private cooperation // Better encryption and biometrics (quantum encryption, keyless authentication) // Automated network-security correcting systems (self-encrypting drives) // Technologies for “real-time” horizon scanning and monitoring of networks // Diagnostics and forensics (network traffic analysis, payload analysis and endpoint behavior analysis) // Advanced defense for framework layers (network, payload, endpoint, firewalls and antivirus) // Mobility and BYOD security // Big data // Predictive analytics // Interoperability Trends: // Informed risk management // Emergence of public/private sector partnerships // More information sharing and collaboration between the public and private sectors // Shared R & D spending // Increased spending for cloud computing // Consolidation of data centers // Expansion of hiring and training of 52
  • 53. Q. You've had the opportunity to review many cyberdefense technologies. Are we really finding new solutions that can handle this explosion of digital processes, or are we still playing the game of catch-up and patch-and-pray cybersecurity? A. New solutions are continually evolving with threats, but there will always be a need for better encryption, biometrics, analytics and automated network security to protect networks and endpoints. It is a perpetual game of cat and mouse between hackers and protectors, and there is really no such thing as being invulnerable. In a sense, we are continually playing catch-up and reacting to the last incident with patches. The weakest link will always be the human element. However, there are many new interesting technologies that could significantly impact cybersecurity in the near future. There are technologies and algorithms coming out of the national labs, government, and from private- sector R&D and startups that have the potential to be disruptive. Q. Any final comments? And are there any speaking engagements or events you are participating in that you would like to announce? Could you also offer a good source for information on the subject of cybersecurity that you would suggest for our readers? A. Please check my regular posts in the media and social media, join my LinkedIn groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with the National Cybersecurity Institute on my agenda. Also, in addition to social media, which I highly recommend, there are many excellent outlets for cybersecurity information including the Homeland Defense and Security Information Analysis Center. A great site that aggregated cybersecurity news daily is The CyberWire. Larry Karisny is the director of Project Safety.org, an advisor, consultant, speaker and writer supporting advanced cybersecurity technologies in both the public and private sectors. 53