New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
1. Chuck Brooks
Thought Leadership Profile:
Cybersecurity, IoT. Big Data, AI,
and Emerging Tech
Chuck Brooks is a Technology Evangelist, Corporate Executive,
Speaker, Writer, Government Relations, Business Development, and
Marketing Executive. He is also a Subject Matter Expert, Advisor, and
Thought Leader in the areas of:
• Emerging Technologies, Homeland Security, Internet of Things,
Cybersecurity & Homeland Security, Cloud, Smart Cities, Business
Process Outsourcing, Design Thinking, Digitization, Digital Media,
Artificial Intelligence, Quantum Computing, Big Data, Digital
Transformation, Print, Governance & Compliance
1
2. Career Highlights:
• Chuck was recently named by
LinkedIn as a “Top Person you
should be following on Tech
issues” out of 500 million
members. He is also an
advisor to LinkedIn on
emerging Technology and
cybersecurity issues. He is a
featured SME and have his
blogs published by LinkedIn
in 2017
• Chuck is Chairman of the CompTIA New and Emerging Technologies
Committee
• Chuck has won the “Cybersecurity Marketer of the Year” at the
Cybersecurity Excellence Awards in both 2016 and 2017
• He has been the Chief Judge for the Government Security News annual
Homeland Security Awards for four years
• Chuck helped stand up the first Office of Legislative Affairs at DHS and
was the first Legislative Director of The Science & Technology
Directorate
2
3. • Chuck served as Adjunct Faculty for Two Years at Johns Hopkins
University
• Chuck was at Technology Partner Advisor to The Bill and Melinda
Gates Foundation
• Chuck received two Presidential appointments for Federal Executive
Service
3
5. It was an honor co-presenting with John Perren former Assistant Director
of the Weapons of Mass Destruction Directorate of the FBI, and LTC Scott
Appelgate, Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs
Of Staff and Dr. Frederic Lemieux Professor and Program Director, at the
National Security Threat Convergence: Violent Extremism and
Cybersecurity event at George Washington University
5
6. 5 Tech Voices You Should Be Following on
LinkedIn [List Features Chuck Brooks]
Meghan Brockmeyer
September 29, 2016
https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech-
companies/2016/5-tech-voices-you-should-be-following-on-linkedin
When you’re looking for inspiring and informative professional perspective
online, where do you go? Are there experts that keep meaningful tabs on
your industry? Or executives whose insights you turn to for fresh insights
and new ideas? If so, you already recognize the huge opportunity to
engage with, and learn from peers online.
Chuck Brooks – Security Voice and “Government Relations and
Marketing Executive, Thought Leader”
6
7. Chuck’s varied security experience is evident in what he publishes. From
aviation to public sector, government to science, his posts take on the
multifaceted aspects of cyber security as it relates to industries/verticals,
homeland issues and next-gen technology. Since he’s keen on variety,
with formats ranging from expert Q&As to content roundups, to non-tech
posts associated with topics/verticals he’s covered, his perspective truly
stands out.
Tech marketer takeaways: Chuck focuses core content on security, but
isn’t afraid to include content tangentially related to core subject matter
(e.g. a post focused on mastering the art of influence in Washington, D.C.)
which incorporates fresh/unexpected content to help keep readers
interested and foster conversation.
MEDIA Activities:
• Publications/Writings/Interviews:
Published in Huffington Post, Forbes, LinkedIn Marketing
(Featured SME on Cybersecurity and Emerging Tech)
Government Security News (featured contributor), The Hill
(featured contributor), Federal Times (Featured Contributor
on homeland security issues), Christian Science Monitor
(Member of Passcode Influencers Panel), The Hill,
Government Executive, MIT Sloan Blog, Homeland Security
Today, Cygnus Media, BizCatalyst360 (Featured
Contributor), NextGov, Alien Vault (Featured Contributor),
Government Technology, GovExec, High Performance
7
8. Counsel (Featured Contributor), Brink Risk Management
(Featured Contributor), ITSP Magazine (Featured
Contributor), Security Information Watch, Advisor and
Contributor to Cognitive World.
Chuck Brooks as Featured Speaker (partial list of events):
• National Academy of Sciences/FBI Biosecurity Meeting 2016
• USTRANSCOM Cybersecurity Roundtable 2017
• The Information Systems Security Association (ISSA) 2017
Mid Atlantic Conference
• George Washington University Cybersecurity event
• Institute of Management Consultants Conference 2016
8
9. • Critical Security Controls Editorial Panel, Council on
Cybersecurity
• DC Cybersecurity Summit (Securing The IoT) 2016, 2017
• CRM Summit (The Internet of Things, Cyber-Security, and
Government Readiness) 2016
• The Astana Economic Forum and Global Risk Expo in
Astana, Kazakhstan.
• National Cybersecurity Institute
• Webcast Host on Mobile Identity Management
• Global Cyber Threat Summit
• Cybersecurity Summit 2016, 2017
• Kaspersky Cyber Security Conference 2015
• IDGA Homeland Security Week conference
• Homeland Security Professionals Conference 2015
• Secure Cities Conference 2014
• CyberMaryland conference 2014/15,17
• National Press Club, Global Business News events
2014/15,16
• Featured Panelist on Cybersecurity, Open Innovations Forum
(MIT Technology Review co-sponsor)
• Guest seminar lecturer on lobbying and interest groups in
the national security policy process at the National War
College of the National Defense University
9
11. Activities:
Chuck serves as Chairman of CompTIA’s New and Emerging Technology
Committee, and serves on Boards to several prominent public and private
companies and organizations. He is Advisory Board Member to The Center
for Advancing Innovation Inc., a subject Matter Expert to The Homeland
Defense and Security Information Analysis Center (HDIAC), a Department of
Defense (DoD) sponsored organization through the Defense Technical
Information Center (DTIC), and Member, Electrical and Electronics
11
12. Engineers IEEE Standards Association (IEEE-SA) Virtual Reality and
Augmented Reality Working Group
He is a former Technology Partnership Advisor to the Bill and Melinda
Gates Foundation. Chuck has served in government at the Department of
Homeland Security at the Science & Technology Directorate, at Voice of
America (VOA), and also for 7 years on Capitol Hill as a Senior Advisor to
Senator Arlen Specter on technology and security issues. He is also former
Adjunct Faculty at Johns Hopkins University, and received his MA in
International Relations from the University of Chicago, B.A, in Political
Science from DePauw University, and a Certificate in International Law
from The Hague Academy of International Law, Netherlands.
12
13. Published Writings by Chuck Brooks (Partial List):
• CHUCK BROOKS, FEATURED HPC CONTRIBUTOR – ADVISER TO LINKEDIN AS
CYBERSECURITY AND EMERGING TECHNOLOGY SUBJECT MATTER EXPERT
https://highperformancecounsel.com/chuck-brooks-featured-hpc-contributor-
adviser-linkedin-cybersecurity-emerging-technology-subject-matter-expert/
• Why LinkedIn is an Indispensable Medium for Security Professionals | by Chuck
Brooks LinkedIn Marketing Blog (post has received more than a million views!)
https://business.linkedin.com/marketing-solutions/blog/marketing-for-tech-
companies/2017/why-linkedin-is-an-indispensable-medium-for-security-
professiona
• Hurricane Harvey: Special thanks to the professionals, volunteers helping others
http://www.federaltimes.com/management/leadership/2017/08/29/hurricane-
harvey-special-thanks-to-the-professionals-volunteers-helping-others-commentary/
• Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C-
Suite https://highperformancecounsel.com/expert-chuck-brooks-offers-
cybersecurity-cheat-sheet-c-suite/
• Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In
Interview https://highperformancecounsel.com/new-cybersecurity-stakes-
interview-cybersecurity-thought-leader-chuck-brooks/
13
14. • Emerging Technologies For The Public Sector by Chuck Brooks in Cognitive
World http://cognitiveworld.com/article/emerging-technologies-public-sector
• Chuck Brooks Federal News Radio Interview: New administration looks to DC
for cyber innovation
https://federalnewsradio.com/whats-working-washington/2017/05/new-
administration-looks-to-dc-for-cyber-innovation/
• Identity Theft, The Not So Hidden Scourge by Chuck Brooks
https://www.alienvault.com/blogs/security-essentials/identity-theft-the-not-
so-hidden-scourge?
bwf_dp=t&bwf_entry_id=5382&bwf_token_id=17267&bwf_token=QXuSRLGA
TE0mnNfPwfSTORzj9
• Co-Author of The #CyberAvengers Playbook; The Non-Technical, No Nonsense
Guide For Directors, Officers, and General Counsels
https://www2.fireeye.com/OFFER-WP-Legal-Playbook.html
• Blockchain for Government: A Cheat Sheet:
http://www.nextgov.com/technology-news/tech-insider/2017/07/blockchain-
government-cheat-sheet/139274/?oref=ng-HPriver
• Rising Tides And Higher Stakes. Cybersecurity Thought-Leader Chuck Brooks In
Interview https://highperformancecounsel.com/new-cybersecurity-stakes-
interview-cybersecurity-thought-leader-chuck-brooks/
• A Quick Summary of Recent Cybersecurity Trends & Developments by Chuck
Brooks https://highperformancecounsel.com/quick-summary-recent-
cybersecurity-trends-developments-businesses-law-firms-know/
• Defining and Addressing the Growing Cyber Insider
Threat https://www.alienvault.com/blogs/security-essentials/defining-and-
addressing-the-growing-cyber-insider-threat
• EXPERT BROOKS ON #CYBERSECURITY: IS WANNACRY RANSOMWARE JUST THE
WARM-UP ACT? https://highperformancecounsel.com/expert-brooks-
cybersecurity-wannacry-ransomware-just-warm-act/
• Time to streamline Congressional oversight of DHS [Commentary]
http://www.federaltimes.com/articles/time-to-streamline-congressional-
oversight-of-dhs-commentary
• 5 emerging tech key to transportation security [Commentary]
http://www.federaltimes.com/articles/5-emerging-tech-key-to-
transportation-security-commentary
14
15. • THE GAMIFICATION TREND IN #CYBERSECURITY – EXPERT CHUCK BROOKS
TALKS THROUGH THIS EMERGING SOLUTION FOR CLIENTS
HTTPS://HIGHPERFORMANCECOUNSEL.COM/GAMIFICATION-TREND-
CYBERSECURITY-EXPERT-CHUCK-BROOKS-TALKS-EMERGING-SOLUTION-
CLIENTS/
• Chuck Brooks Federal News Radio Interview: New administration looks to DC
for cyber innovation https://federalnewsradio.com/whats-working-
washington/2017/05/new-administration-looks-to-dc-for-cyber-innovation/
• Automation technologies and the changing cybersecurity
ecosystem http://gsnmagazine.com/node/48279?c=cyber_security
• Chuck Brooks, The Tech Voice You Should be following: University of Chicago
Webinar (YouTube with slide deck
presentation) https://www.youtube.com/watch?
v=3wk2uMXzS60&feature=youtu.be
• WannaCry ransomware worm attacks the world (Interview Comments by
Chuck Brooks
http://www.securityinfowatch.com/article/12334948/wannacry-ransomware-
worm-attacks-the-world
• CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING
GROWING SECURITY
CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc-
contributor-chuck-brooks-meeting-growing-security-challenges/
• The Cusp of Technological
Transformation http://cognitiveworld.com/article/cusp-technological-
transformation-0
• NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update with
ChuckBrooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-
dc05/
• Writestream Radio welcomes Cybersecurity Expert Chuck Brooks
http://www.blogtalkradio.com/writestream/2017/08/30/the-writestream-
welcomes-cybersecurity-expert-chuck-brooks#.WaasLo3XMLA.facebook
• CYBERSECURITY EXPERT & HPC CONTRIBUTOR CHUCK BROOKS ON MEETING
GROWING SECURITY
15
16. CHALLENGES https://highperformancecounsel.com/cybersecurity-expert-hpc-
contributor-chuck-brooks-meeting-growing-security-challenges/
• Chuck Brooks explains the difference between ICS and IT security http://iiot-
world.com/cybersecurity/chuck-brooks-explains-the-difference-between-ics-
and-it-security/
• RANSOMWARE IS SPREADING LIKE WORMS:ARE YOU
READY? http://www.nextgov.com/technology-news/tech-
insider/2017/05/ransomware-spreading-worms-are-you-ready/137896/?
oref=ng-channelriver
• Homeland Security wins in Trump budget, especially in cybersecurity
[Commentary] http://fifthdomain.com/2017/03/17/homeland-security-wins-
in-trump-budget-especially-in-cybersecurity-commentary/
• The cybersecurity priority for DHS in
2017 http://www.federaltimes.com/articles/the-cybersecurity-priority-for-
dhs-in-2017
• Congress had an office that gave expert tech analysis; let's bring it
back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-
an-office-that-gave-expert-tech-analysis-lets
• Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity
Expertise https://www.alienvault.com/blogs/security-essentials/recent-
attacks-demonstrate-the-urgent-need-for-c-suite-cybersecurty-expertise
• Meeting Security Challenges Through Vigilance, Readiness and
Resilience http://www.brinknews.com/?p=5052?
utm_source=BRINK+Subscribers&utm_campaign=b94043847f-
BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c
98-b94043847f-110145109
• The Priority of the Government/Industry Cybersecurity
Partnership https://www.alienvault.com/blogs/security-essentials/the-
priority-of-the-government-industry-cybersecurity-partnership
• Will Vulnerable U.S. Electric Grid Get a New Protection
Mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a-
new-protection-mandate/
16
17. • Emerging focus on cyber threats to energy
infrastructure http://www.federaltimes.com/articles/emerging-focus-on-
cyber-threats-to-energy-infrastructure
• Congress had an office that gave expert tech analysis; let's bring it
back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-
an-office-that-gave-expert-tech-analysis-lets
• Creating A Secure Smart City http://www.qognify.com/blog/creating-secure-
smart-city/
• Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity
Landscape https://www.alienvault.com/blogs/security-
essentials/safeguarding-patients-and-data-in-the-evolving-healthcare-
cybersecurity-landscape
• Technology Foraging for Cybersecurity
Solutions https://www.alienvault.com/blogs/security-essentials/technology-
foraging-for-cybersecurity-solutions
• And I Think To Myself, What A Virtual World https://itspmagazine.com/from-
the-newsroom/and-i-think-to-myself-what-a-virtual-world
• Cyber Defense in an Imperfect World, a New
Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a-
new-approach/
• How The Next Administration Will Reshape
DHS http://www.federaltimes.com/articles/how-the-next-administration-will-
reshape-dhs
• Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL
Magazine http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-
part-iv-securing-vote
• The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-
in-cybersecurity-can-and-should-be-closed
• Gen Touhill brings vision, strategy as nation’s first
CISO http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-
as-nations-first-ciso
17
18. • US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computin
• DHS cyber role elevated in new
legislation http://www.federaltimes.com/story/government/dhs/blog/2016/0
6/15/dhs-cyber-role-elevated-new-legislation/85934982/
• Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity
Landscape https://www.alienvault.com/blogs/security-
essentials/safeguarding-patients-and-data-in-the-evolving-healthcare-
cybersecurity-landscape
• Socializing Citizen Services In The Public Sector
http://bizcatalyst360.com/socializing-citizen-services-in-the-public-sector/
• Embracing Global Public/Private Cybersecurity
Alliances https://www.alienvault.com/blogs/security-essentials/embracing-
global-public-private-cybersecurity-alliances
• Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-
watch-follow-the-tech-leader/
• 4 steps to a strong incident response plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-
strong-incident-response-plan.html
• Cyber Defense in an Imperfect World, a New
Approach http://www.brinknews.com/cyber-defense-in-an-imperfect-world-a-
new-approach/
• NCF-DC1 Washington DC Cyber News Update With Chuck
Brooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/
• Ransomware Trending as Weapon of Choice for
Hackers http://www.itsecurityplanet.com/from-the-newsroom/ransomware-
trending-as-weapon-of-choice-for-hackers
• The Government Explores Artificial
Intelligence http://thehill.com/blogs/pundits-blog/technology/280481-the-
government-explores-artificial-intelligence
18
19. • DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss
-ongoing-challenge-securing-soft-targets/82350628/
• Creating a digital career path for Native
Americans http://www.federaltimes.com/story/government/dhs/blog/2016/0
5/16/creating-digital-career-path-native-americans/84455826/
• The Internet Of Things (IoT) Has Arrived – What You Should
Know http://infosecurity.ciowatercooler.co.uk/the-internet-of-things-iot-has-
arrived-what-you-should-know/
• NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership
http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
• DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-
cyber-role-elevated-new-legislation/85934982/
• Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-
public-private-cybersecurity-alliances
• The Gender Gap in Cybersecurity Can, and Should Be, Closed
http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
• Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
• The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital
Universe http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-
digital-universe/
• 4 steps to a strong incident response plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-
strong-incident-response-plan.html
• Pathway To The New Era of Quantum Computing
https://ctovision.com/2016/06/pathway-new-era-quantu m-computing/
• UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-
cooperation-will-thrive-with-or-without-brexitooperation
19
20. • Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creat
ing-digital-career-path-native-americans/84455826/
• The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-
essentials/the-rise-of-the-chief-data-officer
• Ransomware Trending as Weapon of Choice for Hackers
http://www.itsecurityplanet.com/from-the-newsroom/ransomware-trending-as-
weapon-of-choice-for-hackers
• The Government Explores Artificial Intelligence
http://thehill.com/blogs/pundits-blog/technology/280481-the-government-
explores-artificial-intelligence
• The Globality Quotient: Cybersecurity (Chuck Brooks Interviewed)
http://bizcatalyst360.com/the-global-quotient-cybersecurity/
• Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-
Cybersecurity-The-Weakest-Link-Will-Always-Be-the-Human-Element.html
• DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-
ongoing-challenge-securing-soft-targets/82350628/
• Chuck Brooks, Winner "Cybersecurity Marketer of the Year",
Cybersecurity Excellence Awards https://americansecuritytoday.com/chuck-
brooks-winner-2016-cybersecurity-excellence-awards/
• 3 of the biggest concerns about external cyber threats Phishing attacks employing
malware, especially ransomware, is a top cybersecurity concern of Chuck Brooks (@ChuckDBrooks), vice
president of government relations and marketing at Sutherland Global Services. “Anyone and everyone is
vulnerable,” he said. “The expanding interconnectivity of our devices and the Internet of Things also makes
malware a network threat. And with these kinds of phishing attacks, it is often quite difficult to find and
prosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
• Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-
can-be-a-catalyst-for-technological-progress
• The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-
yearbook-of-awards/8
• Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-
homeland-security-priorities-watch-2016/77368604/
20
21. • Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-
trends-for-2016
• Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-
coming-millennial-workforce/
• HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/pl
ayer/hsn-tv/hsn-charles-brook-interview?Itemid=
• The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-
you-should-know/
• 7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-
impacting-innovators-in-2016/
• The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
• Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck
Brooks interviewed)
http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
• The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-
cyber-security-government-readiness
• Smart cities, the Internet of Things and the Blue
Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart-
cities-the-internet-of-things-and-the-blue-revolution
• Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
• Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/p
rotecting-internet-things-and-living-smart-cities/72742172/
• Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-
insider/2015/09/does-government-need-hardware-separated-operating-
systems/121826/
21
22. • Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-
first-male-interview-with-chuck-brooks-vp-government-relations-marketing-
sutherland-global-services/
• The Four Pillars to Navigating Washington, DC (The Hill)
http://thehill.com/blogs/pundits-blog/washington-metro-news/217783-
navigating-the-four-pillars-of-Washington
• Interview with Chuck Brooks on key Homeland Security Issues for 2015
(Government Security News) gsn 2014 digital yearbook of homeland security
awards recipients
• Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-
homeland.html
• Some catalyzing technologies on the government horizon
http://thehill.com/blogs/pundits-blog/technology/238756-some-catalyzing-
technologies-on-the-government-horizon
• Solving Problems with Technology Convergence
http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
• Government prioritizes digital engagement (Computerworld)
http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
• Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-
explores-wearables/#more-21
• The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-
instant&ion=1&espv=2&ie=UTF-8#q=The+OPM+breach+screams+for+action.
+Chuck+Brooks
• Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-
of-things-new-digital-economy/#.VKriQCvF91Y
• Adopting a cooperative Global Cyber Security Framework to mitigate cyber
threats (before it is too late) http://www.voodootec.com/author/chuckbrooks/
22
23. • Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-
preparation-commitment-key-for-govt-industry-cyber-partnerships/
• Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-
seminar
• DHS, FBI stepping up digitization of Records
http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
• Internet of Things, New Frontier of Technology Convergence
http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
• Wearables Bring New Sense of Fashion to Public Sector
http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-
bring-new-sense-fashion-public-sector/104679/
• DHS: A decade (and more) of competing congressional oversight
http://www.federaltimes.com/article/20140718/BLG04/307180011/DHS-
decade-more-competing-congressional-oversight
• Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks
http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
• The DHS's vital role in confronting the threat of pandemics and bioterrorism |
Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-
DHS-s-vital-role-confronting-threat-pandemics-bioterrorism
• "Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-
insights-and-innovation/why-you-should-be-excited-about-future-tech/d/d-
id/1114036?
• Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
• Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The
9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-
cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission-report/
23
24. • Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-
publicprivate-partnerships-and-planning/
• DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-
politics/13958-dhs-s-special-partnership-with-native-americans
• TechNOW – Interview with Charles Brooks, VP, Department Homeland Security
at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
• Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-
security-is-back-in-the-limelight
• Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The
9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-
cybersecurity-takes-center-stage-a-decade-after-the-9-11-commission-
report/#tweet-link
• Transportation security: Back to the future http://thehill.com/blogs/pundits-
blog/212288-transportation-security-back-to-the-future
• Chief Data Officers in the Government – What Role Should They Play?
https://government.blogs.xerox.com/2015/02/20/chief-data-officers-
government-what-role-should-they-play/?
utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_
campaign=Corporate+Channels&CMP=SMO-
Facebook+sf36444741#.VSLkIJh0xdh
• Mining Big Data for What It’s
Worth http://government.blogs.xerox.com/2014/12/05/big-data-what-its-
worth/#.VSLft5h0xdg
• Charles Brooks to present June 26 webinar on evolving DHS role in Strategic
Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedi
n_homeland_security_discussi
• The public/private imperative to protect the grid by Chuck Brooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-
public-private-imperative-protect-grid
• How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-
S-T-drives-innovation-DHS
24
25. • “Human Factors” and Biometrics at
DHS: http://www.biometricupdate.com/author/chuck-brooks
• The public/private imperative to protect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-
public-private-imperative-protect-grid
• Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?
c=federal_agencies_legislative
• Securing the Cyber Ecosystem through Protection Projects and Planning
(Homeland Security Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?
tp_spkid=105234
• Tech Interviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homel
and_Security_Schedule_for_March_1620/
• DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/
DHS-Secretary-Jeh-Johnson-revitalizes-One-DHS-vision
• Chuck Brooks interview published in SecurityInfoWatch on the application of
lessons learned from last year's Boston Marathon bombings. "Boston
Marathon a case study in lessons learned following last year's bombing
tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-
security-measures-make-for-a-different-event
• DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
• Native Americans key to border security
success http://thehill.com/blogs/pundits-blog/immigration/214494-native-
americans-key-to-border-security-success
• Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-
hearings-have-called-attention-to-the-need-for-better-cooperation-between-
government-agencies-and-the-private-sector
• Three keys to unlocking tech treasures -- Focus on collaboration, STEM and
'foraging' (Federal Times) http://www.federaltimes.com/apps/pbcs.dll/article?
AID=2013310280011
25
26. • Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the
Department of Homeland Security by Chuck Brooks at
GWU http://cps.gwu.edu/strategic-cyber-operations-webinar-evolving-role-
cybersecurity-department-homeland-security
• “Why You Should be Excited about Future Tech”. Key topics: The digital age
and the Internet of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr
07041401.html
• Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_pr
ivate_partnerships/
• Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-
conference-global-risk-expo
• Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid
%3D105234
• Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?
id=3323&desc=Homeland+Security+Week+2014+Conference
• Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-
government/
• Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-
agencies-seek-to-accelerate-record-digitization/
• The National Press Club Hosts Global Leadership Challenges: Government and
Private Sector Leaders Share Innovation, Talent and Regulatory
Strategies (Presenting)
http://www.prweb.com/releases/2014/02/prweb11609927.htm
• Tech & Innovation thought leader Chuck Brooks joins The Franklin Foundation
Board of Directors http://www.prlog.org/12396042-tech-innovation-thought-
leader-chuck-brooks-joins-the-franklin-foundation-board-of-directors.html
• Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-
with-mark-amtower
26
27. • Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
• How Big Data Will Revolutionize Aviation Security (Chuck Brooks
Interviewed) http://www.hstoday.us/index.php?
id=483&cHash=081010&tx_ttnews%5Btt_news%5D=32217
• Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-
agencies-seek-to-accelerate-record-digitization/
• Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-
of-data-analytics/#prettyPhoto
• BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-
service-innovation/
• Government Security News: Charles Brooks, Linkedin Homeland Security
discussion leader, to present June 26 webinar on evolving DHS role in Strategic
Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security
• Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-
government-yields-exciting-innovation/
• Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-
control-processing-through-automation/
• Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-
things-LinkedIn
• Chuck Brooks interview published in SecurityInfoWatch on the application of
lessons learned from last year's Boston Marathon bombings. "Boston
Marathon a case study in lessons learned following last year's bombing
tragedy" by Steve Lasky
http://www.securityinfowatch.com/article/11416172/boston-marathon-
security-measures-make-for-a-different-event
• DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
• Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
27
28. • The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-
media-60-experts-share-2014-predictions-0718083
• Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
• What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-
agencies-eye-contact-centers-for-consolidation-3-takeaways-from-the-private-
sector/
• Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
• Interview - Global Radio Talk Show – Interviews with Business
Leaders ... http://globalradiotalkshow.com/
• Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum
Moscow http://www.gsnmagazine.com/node/33583?
c=access_control_identification
• Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-
hearings-have-called-attention-to-the-need-for-better-cooperation-between-
government-agencies-and-the-private-sector
• The National Press Club Hosts Global Leadership Challenges: Government and
Private Sector Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
• Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-
shape-government-agencies/#.VjZQ1_mrTIU
• Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-
technology-better-government-customer-service.htm
• Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-
needs-a-proactive-approach-to-combat-cybercrime/
• Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-
content/uploads/2015/03/2015-Symposium-on-Homeland-Security__Draft-
Schedule-3_30_15.pdf
28
29. • Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
• Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
• Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
• Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
• Featured Speaker; The CyberMaryland Conference - Federal Business Council,
Inc. http://www.fbcinc.com/e/cybermdconference/speakers.aspx
• Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
• How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-
trends/wearable-devices-can-transform-contact-center-operations/
• Interview: TechNOW -- with Charles Brooks, VP, Department Homeland
Security at Xerox: What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301
501.html
• How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88
310c3c0bb9a12dcc3742b7d609543#.VSK8z5h0xdg
• Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists
Popular on LinkedIn” Posted by Vincent Granville
http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-
on-linkedin
• Keeping Pace With a Streamlined Service Approach
http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-
on-linkedin
• Cybersecurity 2014: Beyond the NIST
framework http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
• Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-
government_0515/
• CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
29
30. • CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC
%20Cyber%20Security%202014%20Outline.pdf xerox | GovCon Executive
http://www.govconexecutive.com/%3Fs%3Dxerox
• Chuck Brooks, Featured Speaker at Press Club on Doing Business in
Washington, DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
• Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-
be-competitive-in-any-market-the-know-how/
References, Kudos, Recommendations:
30
32. Edward You is a Supervisory Special Agent in the FBI’s Weapons of Mass Destruction
Directorate, Biological Countermeasures Unit. Mr. You is responsible for creating programs and
activities to coordinate and improve FBI and interagency efforts to identify, assess, and respond
to biological threats or incidents. These efforts include expanding FBI outreach to the Life
Sciences community to address biosecurity. Before being promoted to the Weapons of Mass
Destruction Directorate, Mr. You was a member of the FBI Los Angeles Field Office Joint
Terrorism Task Force and served on the FBI Hazardous Evidence Response Team.
Mr. You has also been directly involved in policy-making efforts with a focus on biosecurity. He is
32
33. an active Working Group member of the National Security Council Interagency Policy Committee
on Countering Biological Threats and an Ex Officio member of the NIH National Science Advisory
Board for Biosecurity. He also serves on two committees for the National Academies of Sciences,
the Institute of Medicine’s Forum on Microbial Threats and the Committee on Science,
Technology, and Law’s Forum on Synthetic Biology
June Klein , CEO Technology & Marketing Ventures, Inc; Electronic-BoardroomTMVi(r)
Solutions; EmpowernatorJune(tm) Next Practices;
Chuck and I served as “invite-only, vetted and trusted advisors” to the Bill
and Melinda Gates Foundation - Technology Partner Network. Throughout
the 2year strategic program, Chuck was a pleasure to collaborate with
toward accelerating solutions on a range of global challenges facing the
foundation and its grantees. He was generous in sharing his articles in
prestigious publications, contacts to DC decision-makers and access to his
featured speaker and award events.
Currently, I am honored that Chuck chose me to be a manager of his
“Emerging & Futuristic Technologies LinkedIn Group”. Chuck has huge
followings on social networks and diligently responds to his thousands of
friends on focused subject matters. He is a holistic thinker grounded in
government, industry and academia leadership. I value any opportunity to
work with Chuck to team with strategic partners that can benefit from
scaling my IOT, cybersecurity, resiliency and video initiatives.
I think very highly of Chuck, both personally and professionally. This is also
evidenced by my recommending him to my UK Merchant Bank’s Virtual
Technology Cluster as a speaker and director of their Cybersecurity program
blending entrepreneurial firm innovations with Lockheed Martin’s product
development process.
I am confident that if you hire Chuck for any leadership, director, team,
award or speaking slots, he will contribute to catapulting your success and
achieving your goals. Besides his many skills, he is a very nice person as
well. Feel free to contact me if you want any further evidence.
33
34. Dexter Ingram
Senior Advisor, INTERPOL
I have had the pleasure of knowing Chuck for over 10 years, since he was at
DHS and I was on the House Select Committee on Homeland Security. He is
a consummate professional who has a deep understanding of the
issues,process, and people involved in the world of homeland security and
Law enforcement. His breadth of experience derived from working on The
Hill, in government, in academia, in industry, and with the media make him
truly unique. I most highly recommend Chuck and look forward to
continuing working together.
Holger Schulze
B2B Tech Marketing Entrepreneur | Marketing-as-a-Service
Chuck was selected "Cybersecurity Marketer of the Year" at the 2016
Cybersecurity Excellence Awards. This was quite an accomplishment as the
awards were highly competitive with hundreds of entries and Chuck was one
of the leading vote getters overall. This award reflects the information
community's recognition of Chuck's excellence in the cybersecurity and
homeland security space. I follow Chuck's prolific and informative writings
and speeches on the topics of cybersecurity, homeland security, IoT,
futurism, and emerging technologies -- many of which are re-posted in our
300,000 members Information Security Community LinkedIn Group. It a
real pleasure to endorse Chuck for his great depth of experience,
professionalism, capabilities and for his dedication to promoting cyber
security issues.
34
35. Mike Bowers
Former President of Xerox Federal, Federal Government Services Executive
& Advisor
It was a real pleasure working with Chuck at Xerox. He served us as a
thought leader on technology, BPO, homeland security and other important
issues. He has exceptional depth on complex technology issues and an
uncanny ability to rapidly write penetrating articles that were very well
received in the media and Inside The Beltway. His contacts/relationships at
DHS as well as his Rolodex of those in industry and government is second
to none and served his BD colleague well. Most of all he was a professional
and great person to work with. I give Chuck my highest recommendation.
Thomas A. Cellucci, PhD, MBA
Founder, Chairman & CEO Cellucci Associates, Inc.
It is indeed a distinct pleasure to provide this recommendation for Chuck. To
put it simply, Chuck possesses both the strategic vision and tactical
discipline to get results--period. Having said that, his keen intellect is only
matched by his genuine good nature and helpful attitude towards others. I
would recommend Chuck for any business activity he would undertake.
Herbert E. Spiegel, Ph.D,MBA
President & Chief Science Officer at Applied Science & Technology
Associates, LLC
35
36. Chuck is an excellent source of information on the national and international
scene. He is a mentor of the first order, with respect to the science and
political aspects of Homeland Security and the myriad of issues surrounding
that discipline. He is modest in his expertise and easily approachable. He is a
valuable guide, willing to share his vast experience.
Simon Szykman
Chief Technology Officer, Federal Services at Attain
Chuck and I were colleagues when we were both serving at the Department
of Homeland Security. Chuck was a pleasure to work with and is a
consummate professional with executive management and substantive issue
expertise, particularly in technologies relating to DHS. Chuck also brings a
special blend of experience to the table, having successfully served in
leadership roles in industry, as well as executive and legislative branches of
government. Chuck is a relationship builder, a "connector" of both
opportunities and people. I highly recommend Chuck and look forward to
continuing to work with him in the future.
Admiral Jay Cohen
President at JayMCohen LLC
From my Senate confirmation hearings, through two years of re-inventing
the Dept of Homeland Security Science & Technology Directorate (which
was described by the Congress in 2006 as a "rudderless ship with no one at
the helm" and in danger of the Congress rescinding $200M in FY 07),
Chuck Brooks as Director of Legislative Affairs at DHS was
INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND
Congress in making the "reformation" of DHS S&T a complete success. His
36
37. Hill/DC acumen, insight, reliability, ability to develop highly effective
congressional interaction/communications is WITHOUT PEER in my nearly
16 years dealing with senior executive branch officials, industry, academia
and the Congress. He has my strongest recommendation for executive
positions of high responsibility in government relations/ business
development. Hon. Jay M Cohen (Rear Admiral, US Navy, ret.)
George Romas
Chief Engineer, Cybersecurity at DXC Technology
Chuck spent some quality time with our small startup company. He opened a
lot of doors for us, providing introductions to potential investors and
partners, as well as well-connected individuals on the Hill. Chuck also
provided invaluable assistance in forming our company and product
strategy.
Pam Turner
Managing Director at Prime Policy Group
March 23, 2009, Pam managed Chuck directly
Chuck was among the "start-up" team at DHS, and had responsibility for a
wide range of complex issues and challenging procedural situations. His
knowledge of the issues, familiarity with the political process, attention to
detail, and his professionalism earned him the trust and respect of his
Congressional contacts, his DHS associates, and all those who sought his
counsel and help. Chuck is a "can-do" person, and I strongly recommend
him.
Timothy N. Teen
CEO & Board at InSitech, Inc
37
38. Chuck is very knowledgeable in government affairs, the military and
security sector and is a diligent executive who is great to work with.
While at the US Army's Picatinny Arsenal/ARDEC as well as with CVP, my
team worked closely with Chuck in vetting technologies and services with
applications for homeland security and defense. He has an acumen for
technology issues, strong knowledge of investment banking/due diligence
processes, and really knows his way around government bureaucracies.
He is a collaborator who is committed to building great relationship and
producing results and I most highly recommend him.
Chuck Brooks References:
* Admiral Jay Cohen (US Navy Ret), former Undersecretary of Science & Technology
and the Department of Homeland Security and former Director of Naval Research for
Department of Defense
* Hon. Michael Chertoff, former Secretary of Homeland Security
* Steven Pomerantz, Former Director of Counterterrorism for the FBI
Proposed Compensation & Equity Arrangements For
Services (for Discussion)
38
39. Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors
Including:
Chuck Brooks
Vice President for Government Relations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Growing Risk of Security Breaches as it Relates to
the Internet of Things
39
40. Meeting: BOARD ON LIFE SCIENCES and
BOARD ON CHEMICAL SCIENCES AND
TECHNOLOGY
Safeguarding the Bioeconomy III
Safeguarding the Bioeconomy III: Securing Life Sciences Data
Speaker: Charles (Chuck) Brooks serves as the Vice President for Government
Relations & Marketing for Sutherland Global Services. Chuck also serves as
Chairman of CompTIA’s New and Emerging Technology Committee, and he
serves as subject Matter Expert to The Homeland Defense and Security
Information Analysis Center (HDIAC), a Department of Defense (DOD)
sponsored organization through the Defense Technical Information Center
(DTIC). In government, he served at the Department of Homeland Security
as the first Director of Legislative Affairs for the Science & Technology
Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to
the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland
security and Congress. He has an MA in International relations from the
University of Chicago, and a BA in Political Science from DePauw University, and
a Certificate in International Law from The Hague Academy of International Law.
Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and
cybersecurity
40
41. From “Cybersecurity is Top Business Priority in 2017”
https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017
In assessing the severity of security flaws in cyberspace, I spoke with several experts in
the field.
Charles “Chuck” Brooks is the vice president for government relations and marketing
for Sutherland Government Solutions. He served at DHS as the first director of
legislative affairs for the Science and Technology Directorate. He ominously points
out:
41
42. "The reality is that the more digitally interconnected we become in our work and
personal lives, the more vulnerable we become." -- Chuck Brooks
Mr. Brooks adds: "Mitigating cyber threats will grow as a priority for business, and for
us personally, if we are to commercially function and prosper."
But how can companies successfully mitigate cyber threats?
His advice: "The C-suites and governing boards of corporations will need to invest in
better enterprise and endpoint security to prevent phishing and malware probes by
hackers. This will also require better training of executives and employees in basic
information security measures."
Chuck Brooks wins Marketer of the Year at
2017 Cybersecurity Excellence Awards
Thu, 2017-02-09 01:49 PM
Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of The New
Emerging Technologies Committee for CompTIA, was named winner of Cybersecurity Marketer of
The Year at the 2017 Cybersecurity Excellence Awards.
Brooks
42
43. The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that
demonstrate excellence, innovation and leadership in information security. The finalists and winners
were selected based on the strength of their nomination and the popular vote by members of the
Information Security Community (both ratings and comments).
“Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year category in the
2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the 350,000 member
Information Security Community on LinkedIn which organizes the awards program. “With over 450
entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in
leadership, excellence and innovation in today's cybersecurity industry.”
Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as
he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been
a force in discussing, advocating, promoting cybersecurity issues across digital media, at events, in
professional forums, and with a variety of public policy organizations.
He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies
in both the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech
People to Follow On LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and
conferences. He recently presented at a workshop sponsored by The National Academies of
Sciences, Engineering, and Medicine and the Federal Bureau of Investigation on Securing Life
Sciences Data. He recently spoke at George Washington University event about the Cyber Threat
Spectrum, will be participating soon at USTRANSCOM Senior Leader Cyber Security Roundtable.
Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology
innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT
Security Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government
Security News, and Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn
and a global following and has brought significant attention to cyber issues from his frequent posts
and commentaries. He has been involved as a judge for the past four years as a Judge for
Government Security News’ Annual Homeland Security Awards.
As a senior executive in government relations, marketing, and management, Chuck brings a unique
experience from service in the public sector, academia, and industry. He serves on a variety of
boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber
issues and a special subject matter expertise of cybersecurity and homeland security in government
that have benefited both the not-for-profit, public, and commercial sectors.
Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral
Jay Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck Brooks. as
Director of Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the
Nation AND Congress in making the "reformation" of DHS S&T a complete success. His Hill/DC
acumen, insight, reliability, ability to develop highly effective congressional
interaction/communications is WITHOUT PEER in my nearly 16 years dealing with senior executive
branch officials, industry, academia and the Congress.”
Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate
professional who has a deep understanding of the issues, process, and people involved in the world
of homeland security and Law enforcement. His breadth of experience derived from working on The
Hill, in government, in academia, in industry, and with the media make him truly unique.”
43
44. Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national
security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at
John Hopkins University where taught homeland security for two years. He has advised a multitude
of organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and
the Center for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging
Technologies Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the
Board of Advisors for CyberTech, and on the Board of Directors at Bravatek, and the Cyber
Resilience Institute. He is an advisor to R & D cybersecurity company Inzero Systems. He is a
subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC),
a Department of Defense (DoD) sponsored organization through the Defense Technical Information
Center (DTIC. Chuck also serves as a Christian Science Monitor “Passcode Influencers Panel
member” on Information Security. He has a BA from DePauw University and an MA from the
University of Chicago.
----------------------------------------------------------------------
-------
• Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
Navigating the four pillars
of Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically
and socially. Its architectural design is modeled after Paris and it is certainly a
city of cultural diversity and historically interesting neighborhoods. Visually,
the site of the monuments reflecting against the panoramic backdrop of the
Potomac River is memorable for both visitors and native Washingtonians
alike.
44
45. It is really a city like no other city in America. Although it may be
geographically small, Washington serves as the engine of government, an
anchor of global financial policy and representation, a seat of institutionalized
policymaking organizations, and as a growing center for business, especially
in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life
"inside the Beltway." I was enamored with all it had to offer ("Potomac Fever")
but uncertain how to navigate it and decipher how things worked. Looking
back, I would like to offer structure and pathways for others contemplating a
public service career or seeking to accomplish tangible objectives for policy
and/or business purposes in the nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches);
commercial (business, including global financial institutions; policy:
(academia, think tanks and associations/organizations); and media (old and
new).
These pillars function both individually and collectively. They are intertwined
and to be effective, it is essential to understand their roles and impact on
what you hope to accomplish. Understanding and gaining experience within
these pillars that comprise the operational system of Washington takes focus
and time. Success can be realized by navigating the pillars and establishing a
strategy of strategic relationship building and connecting.
Government: There has never been any doubt that government and politics
make Washington tick. Government is not only the basis for tens of
thousands of jobs in the area, but it also serves as the fulcrum for evolving
and communicating domestic and international policies. Government is the
center for laws and executive orders overseeing all aspects of our daily life
and our professions. The Pentagon, intelligence agencies, and Department of
Homeland Security are all based in Washington because it is the epicenter of
power and decision-making. Government in Washington is by design
structured as a system of check and balances. An understanding of how the
various branches of government function is essential to influencing any
regulatory outcome whether it be energy, healthcare or a national security
issue. Working on Capitol Hill is invaluable experience and connects to all the
pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington
has been transforming over the years as a commercial hub. The World Bank,
Federal Reserve, International Financial Corporation and the Chamber of
Commerce are some of the organizations headquartered in the city. Many
corporations have also relocated to the area to be near the action and
45
46. position themselves for government and commercial opportunities. Both
Virginia and Maryland have established high-tech corridors close to the city
for those reasons. The international community with their embassies and
trade groups increasingly see Washington as a growing center for commerce.
Policy: It is not only the pillars of business and government that are cogs in
the machine. Policy organizations (such as the Center for Strategic and
International Studies, the Brookings Institution, the Heritage Foundation, the
American Enterprise Institute and the Aspen Institute) that provide issue
expertise, training and solutions are really the enabling fuel. A myriad of think
tanks offer the latest insights in domestic and global events on a regular
basis. Top local universities (such as Johns Hopkins's School of Advanced
International Studies, George Washington, Georgetown, American, George
Mason, and Maryland), also promote dialogue and informed decision-making
and access. The over 6,000 associations and organization with issue specific
interests regularly outreach to key decision–makers who are part of the public
and private sector pillars. Strategic communications and thought leadership
are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to
circumspect the activities of the other three pillars. The media's role is a
fundamental one; any system of democratic government cannot operate
without transparency and oversight. In Washington, most of the country's key
media outlets have representation. Outside traditional old media, new media
has become a force to consider. Most citizens have constant access and the
metrics of public opinion are constantly pulsed. Corporate executives and
government leaders use the social media, especially LinkedIn, Facebook and
Twitter as part of their work environments. Government 2.0 and Business 2.0
are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue
expertise, contacts and gaining a holistic perspective of how Washington
really works. This experience can provide the tactical knowledge to advance
your marketing efforts and/or cause in the public/private world. There is no
substitute for experience and for building a personal network to be
empowered and effective. To be successful, you have to always keep abreast
of the latest trends and be visible and helpful to your customer. In the
Washington arena, you also have to develop the qualities for resilience and
persistence as no one is always on the winning side of issues and contracts.
Washington will always have its image challenges and be an enigma as to
how it functions, especially to those who have never experienced life inside
46
47. the Beltway. Exploring and experiencing the four pillars will bring an
understanding of how to navigate a path to success for those who come to
this amazing city to make a difference and leave a positive legacy.
-------------------------------------------------------------------------------------------------------
---------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
Cybersecurity expert Chuck Brooks talks about where we stand in
what many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-
Will-Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee,
subject matter expert to the Homeland Defense and Security Information
Analysis Center, “passcode influencer” for The Christian Science Monitor, on
the Board of Advisors for CyberTech, and on the Board of Directors at
Bravatek and the Cyber Resilience Institute.
Brooks also has authored numerous articles focusing on cybersecurity,
homeland security and technology innovation for such publications
as Forbes, Huffington Post,InformationWeek, MIT Sloan
Blog, Computerworld, Federal Times, NextGov,Government Security News,
Cygnus Security Media, Homeland Security Today, The Hill and Government
Executive.
I recently got a chance to get Brooks' take on where we are today in what
many people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear many hats and certainly have been focused on
cybersecurity for some time now. So tell me, who is Chuck Brooks
and what is he trying to accomplish this space?
47
48. A. You are right, over my career in government, corporate and academia, I
have worn many hats. There have been some strong common threads [of]
science, technology, national security, and legislative and executive policy in
all my various roles. Thankfully, I selected a professional vocation of
government relations and marketing that encompasses all those threads.
My passion for cybersecurity issues was first established over a decade ago
during the time I spent at the Department of Homeland Security’s Science and
Technology Directorate. Back then, the threats to our critical infrastructure
were not as pronounced as they are today. Of course we were just beginning to
experience the smartphone era. The field of cybersecurity has evolved
exponentially along with the technologies, networks and connectivity that
make up the cyberecosystem. And the ecosystem is quite diverse and
expansive, comprising software, hardware, monitoring, forensics, governance
and more. All these elements make it an exciting area to explore since there is
always more to learn from strategy and technology perspectives. Also, it
certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it
touches everything work- or personal-related. In both the public and private
sectors — just about every CIO survey — cybersecurity is the top concern. And
of course, along with data analytics, cybersecurity is a annually a budget
priority of federal spending. DHS Secretary Jeh Johnson recently described
cybersecurity and counterterrorism as the two top priorities for the protecting
the homeland.
What I want to accomplish in this space is to continue being a subject matter
expert in cybersecurity; I enjoy writing and speaking about the varied aspects
of the topic and especially in educating others on how it can impact their lives.
My advisory and board director roles with organizations are a reflection of
that interest. When I retire (which is a long way off), I hope to join academia
again in a part-time role. I spent two years at Johns Hopkins University SAIS
[School of Advanced International Studies] teaching graduate students
homeland security and found it very fulfilling.
Q. You have one of the most active groups in LinkedIn under the
heading of the Department of Homeland Security. How has this
helped both yourself and DHS in feeling the pulse of the
cybersecurity industry?
48
49. A. I do operate a half dozen groups that focus on homeland security and
information security on LinkedIn, including a few of the largest groups: “U.S.
Department of Homeland Security, DHS” “Information Technology
(Homeland & National Security)” and “Homeland Security.”
In all, these groups include about 60,000 people. Among the members are a
host of well-known cybersecurity professionals who often post and comment
on issues of the day. Also, as any news on data breaches or cyberincidents
occur, they are often posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the
pulse of policy. It has also served as a great networking venue to share ideas
and information with some of the best security minds around in both the
private and federal sectors. Many senior-level executives in the federal
government are on social sites such as LinkedIn, GovLoop, Facebook and
Twitter. There are an estimated 1.5 million federal government employees
who regularly use LinkedIn, including over 65,000 from DHS. Because of the
growing need for public/private-sector collaboration and interface, being
actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do
for the company?
A. Sutherland Global Services is a global provider of business processing
services, contact centers, IT service desks and management consulting serving
government and U.S. leading corporations across multiple industries,
including health care and insurance, technology, mortgage and loan services,
finance and banking, retail, and travel. Sutherland has 36,000 employees and
annual revenues of over $1.2 billion, [and] was listed in 2015 as one of the
fastest growing private companies in America byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and
are known for integrated services for citizen service needs and digital
government. Our cybersecurity operations at Sutherland Government Services
are internal, but we do have a practice in customer relations management
after a company or agency has been breached. Our cybersecurity practice is
led by Glenn Schoonover who has a deep technical background. He is a former
chief information security officer for the Army and was responsible for
providing network security to the Department of the Army headquarters. He
is also a former senior technology strategist for Worldwide National Security
and Public Safety at Microsoft.
49
50. Q. I see you are active in both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the
private sector (for the most part) is driven by profit and loss. The R&D efforts,
innovation sector and skilled technical expertise in the private sector has been
more robust than in government. Industry is more agile and able to react to
threat trends.
On the federal side, the landscape has really changed over the past few years.
[The U.S. Department of Defense], of course, has had the cybersecurity war-
fighting mission and continues to build upon new requirements for operations
and for systems. On the civilian side, DHS takes an increasingly larger role in
cybersecurity. Presidential and congressional directives have mandated that
DHS play a growing and more primary role, especially with protecting critical
infrastructure (transportation, health, energy, finance) that is mostly owned
by the private sector. DHS has to step up its activities in assessing situational
awareness, information sharing, and resilience research and development
plans with stakeholders. This has led to a trend in public-private partnering
for sharing threat information and in creating standards and protocols. In
both the public and private sectors, training of the next-generation
cybersecurity technical and policy [subject matter experts] is a major priority.
Q. To date, there seems to be a stand-off between Apple and the
federal government when it comes to iPhone security. What are
your thoughts on this, and can this bring about some lessons
learned for the cybersecurity industry?
A. This is the topic of the day, and it is a complicated issue relating to
government requesting a corporation to provide software to allow access to
data. My thoughts may be a bit different from some of the others in the
industry. While I recognize the importance of privacy and the dire risk of an
Orwellian surveillance state, I consider protecting innocent lives as a
mitigating circumstance. What if that data that the FBI is seeking on the
terrorist's encrypted phone uncovers a deeper terrorist network planning
more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law
enforcement to cooperate in these type of instances (with proper warrants and
assurances) so that company Internet protocol can be isolated and privacy
issues for the company’s customers can be best addressed. I am quite sure
Congress will be looking closely at this case to establish legislation to create a
working formula. The lesson for cybersecurity is that there is a balance
50
51. between privacy and security that has to be constantly reviewed in accordance
with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon
and zetabytes of data projected by 2020, can we secure and control
our digital processes, or are we headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on
the Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the
cost of sensors decreases and processing power and bandwidth continue to
increase. The fact is that most of these IT networks will have some sort of an
IoT-based security breach. We could be headed for a digital train wreck if IoT
security standards are not adopted. We may have a digital train wreck even if
they are adopted. Standards will have to be developed industry by industry.
Protecting a network of medical devices in a hospital will require different sets
of standards than protecting utilities with SCADA [supervisory control and
data acquisition] systems that make up the electric grid. There are a lot of
questions, including who enforces compliance? And what are the liabilities of
an IoT breach?
51
52. The real danger is that the Internet was
not built for security at its inception; it
was built for connectivity. There is some
truth to the notion that your network
may someday be betrayed by your
toaster or refrigerator. One thing is for
sure: the Internet of Things will pose
many challenges to cybersecurity and
data analytics, much of which we have
yet to contemplate.
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER
LIST OF CYBERSECURITY
TECH AREAS, PRIORITIES
AND EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and
Public/Private cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time”
horizon scanning and monitoring of
networks
// Diagnostics and forensics
(network traffic analysis, payload
analysis and endpoint behavior
analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
52
53. Q. You've had the opportunity to review many cyberdefense
technologies. Are we really finding new solutions that can handle
this explosion of digital processes, or are we still playing the game
of catch-up and patch-and-pray cybersecurity?
A. New solutions are continually evolving with threats, but there will always
be a need for better encryption, biometrics, analytics and automated network
security to protect networks and endpoints. It is a perpetual game of cat and
mouse between hackers and protectors, and there is really no such thing as
being invulnerable.
In a sense, we are continually playing catch-up and reacting to the last
incident with patches. The weakest link will always be the human element.
However, there are many new interesting technologies that could significantly
impact cybersecurity in the near future. There are technologies and
algorithms coming out of the national labs, government, and from private-
sector R&D and startups that have the potential to be disruptive.
Q. Any final comments? And are there any speaking engagements
or events you are participating in that you would like to announce?
Could you also offer a good source for information on the subject
of cybersecurity that you would suggest for our readers?
A. Please check my regular posts in the media and social media, join my
LinkedIn groups and follow me on Twitter @ChuckDBrooks. I do have some
future blogs with the National Cybersecurity Institute on my agenda. Also, in
addition to social media, which I highly recommend, there are many excellent
outlets for cybersecurity information including the Homeland Defense and
Security Information Analysis Center. A great site that aggregated
cybersecurity news daily is The CyberWire.
Larry Karisny is the director of Project Safety.org, an advisor, consultant, speaker and writer
supporting advanced cybersecurity technologies in both the public and private sectors.
53