Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
1. Chuck Brooks
VP Government Relations & Marketing, Thought leader: Homeland
Security, Cybersecurity, BPO, Big Data, IoT. Top1% viewedprofile on
LinkedIn
Cybersecurity Marketer of the Year – Chuck Brooks
WINNER:
Chuck Brooks (Sutherland Government Solutions) – WINNER
2. Chuck Brooks, Thought Leadership Bio
Homeland Security, Cybersecurity, Technology & Innovation. Public/Private Partnerships,
IoT, BPO, R & D, Digital Media
Summary of Professional Experience:
Executive Management, Marketing, Thought Leadership, Government Relations (federal and
state & local), Strategic Partnering, Business Development, Writer, Speaker
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach,
Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets.
Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and
serves on Boards to several prominent public and private companies and organizations. Chuck
also advised the Bill and Melinda Gates Technology Partner network, Chuck has extensive
service in Senior Executive Management, Marketing, Government Relations, and Business
Development and worked in those capacities for three large public corporations. In government,
3. he served at the Department of Homeland Security as the first Director of Legislative Affairs for
the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins
University where he taught graduate level students about homeland security and Congress. He
has an MA in International relations from the University of Chicago, and a BA in Political
Science from DePauw University, and a Certificate in International Law from The Hague. Chuck
is widely published on the subjects of innovation, public/private partnerships, emerging
technologies, and issues of homeland security and cybersecurity
Summary of Experience:
* Corporate: Extensive service in Senior Executive Management, Government Relations (also
Lobbying & PAC management), External Relations, and Business Development/Sales for three
large public corporations. Managed own successful PR and Government Relations consulting
firm.
* Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald
Reagan (Voice of America). Helped "stand up" Office of Legislative Affairs at the US
Department of Homeland Security and served as the first Director of Legislative Affairs at the
Science & Technology Directorate. Served as a Senior Legislative Staff (defense & foreign
affairs, national security, business) to the late Senator Arlen Specter at the U.S. Senate.
* Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on
Linked In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined
members). Top 1% viewed profile on LinkedIn. 31,000 first degree connections, mostly
executive level. Over 2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise
areas include: homeland security, cyber security, intelligence, defense, foreign affairs, IT, R &
D, science & technology, political risk, strategic partnering, business development/sales,
government relations, legislative/budget processes, thought leadership, innovation, and social
media. (Huffington Post, Forbes, Government Security News (regular contributor) .The Hill
(featured contributor), Federal Times (featured contributor), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security
Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured
contributor), Government Technology, Biometric Update (featured contributor)
* Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course
for two years). Produced webinar on DHS & Cybersecurity for George Washington University
4. Chuck Brooks
Sutherland Government Solutions
11955 FreedomDrive, Suite710 | Reston, VA 20190
Charles.brooks@sutherlandglobal.com
LinkedIn: https://www.linkedin.com/in/chuckbrooks
www.sutherlandglobal.com/industries_gov.aspx
Twitter: @ChuckDBrooks
Leadership; Activities and Organizations:
Technology Partner Advisor, Bill and Melinda Gates Foundation
Chairman, CompTIA New and Emerging Technology Committee
PASSCODE INFLUENCER, Christian Science Monitor
Board of Directors, Ecrypt (public company now called Bravatek)
Board of Advisors, Cyber Resilience Institute
Board of Advisors CyberTECH
Board of Advisor B2B Cybersecurity
Member, AFCEA Cybersecurity Committee
Member, Professional Services Council Homeland Security Task Force
Governance Committee of the IJIS Institute (supported by DHS & DOJ)
Board of Directors of the Safe America Foundation
Board of Directors of the Franklin Foundation (Innovation and Stem focus)
Board of Directors of “One World For Life” (Emergency Management focus)
Lead Judge, the 2013 and 2014, 15 Homeland Security/Border Security Awards
(Government Security News)
Critical Security Controls Editorial Panel, Council on Cybersecurity
Speaker DC Cybersecurity Summit (Securing The IoT)
Speaker CRM Summit (The Internet of Things, Cyber-Security, and Government
Readiness)
Speaker, National Cybersecurity Institute
Speaker, Global Cyber Threat Summit
Speaker, Kaspersky Cyber Security Conference 2015
Speaker, IDGA Homeland Security Week conference
Speaker Homeland Security Professionals Conference 2015
Speaker, Secure Cities conference 2014
5. Speaker, CyberMaryland conference 2014/15
Speaker, National Press Club, Global Business News events 2014/15
Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review
co-sponsor)
Member, TechAmerica, the Cybersecurity Committee and Cybersecurity Legislative
Subcommittees, and Emerging Technology Committee
Member, National Association of Manufacturers (NAM) Information Security Task
Force
Washington Executive, Member MARCOM Committee (Marketing and
Communications)
ACT-IAC Planning Committee
Member, AFCEA
Member Professional Services Council
o Member Potomac Officers Club
o Advisor/Influencer, Safe Cities Asia
o Regional Representative 2011, Davos Second World Forum “Communication on
Top”
o Former Consultant/Advisor to Rhode Schwarz ($2B privately owned company),
specializing in homeland security technologies
o Former Advisor to Intellitech International LLC, a firm advising on law
enforcement technology issues headed by two former Assistant Directors of the
FBI.
o Guest seminar lecturer on lobbying and interest groups in the national security
policy process at the National War College of the National Defense University
o Former Federal Advisory Board of AirPatrol Inc. The company provides an
intelligent enterprise mobility solution that continuously monitors mobile devices
and dynamically adapts their capabilities for the situation.
o Former Auxiliary Police Officer for the city of Arlington, Virginia.
DC Cyber Security Summit
6. Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors Including:
Chuck Brooks
Vice President for Government Relations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Grow ing Risk of Security Breaches as it Relates to the Internet of Things
Chuck Brooks Thought leadership expertise areas:
7. Areas of Expertise:
Homeland security, cyber security, business process outsourcing, digitization in government,
customer service, public/private partnerships, IT, R & D, science & technology, IoT, strategic
partnering, government relations, innovation, and social media.
Marketing Channel Experience:
Social Media & content messaging
Influencer engagement – in person and digital
Web
Media & association outlets
Podcasts/Videocasts/Webinars
Philanthropic
Event Planning
Strategic Partnering
Washington, DC Representation
Lobbying
Industry Days
Issue area topics of writings/presentations/interviews/:
Customer Service
Contact Centers
Transaction Processing
3-D Printing
Big Data
Internet of Things (IoT)
Wearables
Cloud Computing
Context-aware Computing
Artificial Intelligence
Critical Infrastructure Protection and Information Assurance
Cyber Security
Data-Centers and Data-Center Consolidation
Digital Government
Digital Trust and Identity Integration and Management
Digitization and Imaging
Defined Leading Edge Technologies
Mobility
Outsourcing IT Services
Sensors, Devices and Radio Frequency Identification (RFID)
Software Development
8. Virtualization
Web Analytics
Links to Writings, Webinars, Conference Speeches, Radio
Interviews:
9. US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computing
NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role-
elevated-new-legislation/85934982/
Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private-
cybersecurity-alliances
The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe
http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/
4 stepsto a strong incidentresponse plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong-incident-response-
plan.html
Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-
new-era-quantu m-computing/
UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will-
thrive-with-or-without-brexitooperation
10. Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-career-
path-native-americans/84455826/
The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the-
rise-of-the-chief-data-officer
Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from-
the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers
The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-
blog/technology/280481-the-government-explores-artificial-intelligence
The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the-
newsroom/the-cusp-of-technological-transformation
The Globality Quotient: Cybersecurity (ChuckBrooks
Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/
Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-
Link-Will-Always-Be-the-Human-Element.html
DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge-
securing-soft-targets/82350628/
Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence
Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity-
excellence-awards/
3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially
ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and
marketing at SutherlandGlobal Services. “Anyone andeveryone is vul nerable,” he said. “The expandinginterconnectivityof our
devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often
quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst-
for-technological-progress
11. The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of-
awards/8
Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland-
security-priorities-watch-2016/77368604/
Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016
Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming-
millennial-workforce/
HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn-
tv/hsn-charles-brook-interview?Itemid=
The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/
7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting-
innovators-in-2016/
The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks
interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security-
government-readiness
Smart cities, the Internet of Things and the Blue Revolution: http://thehill.com/blogs/pundits-
blog/technology/254779-smart-cities-the-internet-of-things-and-the-blue-revolution
Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
12. Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting-
internet-things-and-living-smart-cities/72742172/
Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does-
government-need-hardware-separated-operating-systems/121826/
Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male-
interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/
The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-
blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington
Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security
News) gsn 2014 digital yearbook of homeland security awards recipients
Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html
Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-
blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon
Solving Problems with Technology
Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
Government prioritizes digital engagement
(Computerworld) http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-explores-
wearables/#more-21
The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-
8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks
Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new-
digital-economy/#.VKriQCvF91Y
13. Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it
is too late) http://www.voodootec.com/author/chuckbrooks/
Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation-
commitment-key-for-govt-industry-cyber-partnerships/
Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar
DHS, FBI stepping up digitization of
Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
Internet of Things, New Frontier of Technology
Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
Wearables Bring New Sense of Fashion to Public
Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring-
new-sense-fashion-public-sector/104679/
DHS: A decade (and more) of competing
congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D
HS-decade-more-competing-congressional-oversight
Huffington Post Cybersecurity Industry Interview With Xerox's Chuck
Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital-
role-confronting-threat-pandemics-bioterrorism
"Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and-
innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036?
Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
14. Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/
Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate-
partnerships-and-planning/
DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958-
dhs-s-special-partnership-with-native-americans
TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at
Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is-
back-in-the-limelight
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link
Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288-
transportation-security-back-to-the-future
Chief Data Officers in the Government – What Role Should They
Play?https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what-
role-should-they-
play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig
n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh
Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-
data-what-its-worth/#.VSLft5h0xdg
Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s
ecurity_discussi
The public/private imperative toprotect the grid by ChuckBrooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
15. How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives-
innovation-DHS
“Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-
brooks
The public/private imperative toprotect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative
Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security
Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234
Tech Initerviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S
chedule_for_March_1620/
DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-Secretary-
Jeh-Johnson-revitalizes-One-DHS-vision
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
Native Americans key to border security success http://thehill.com/blogs/pundits-
blog/immigration/214494-native-americans-key-to-border-security-success
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
16. Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal
Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011
Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of
Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-
webinar-evolving-role-cybersecurity-department-homeland-security
“Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet
of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html
Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners
hips/
Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk-
expo
Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234
Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi
ty+Week+2014+Conference
Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory
Strategies (Presenting)http://www.prweb.com/releases/2014/02/prweb11609927.htm
Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of
Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks-
joins-the-franklin-foundation-board-of-directors.html
Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark-
amtower
17. Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
How Big Data Will Revolutionize Aviation Security (ChuckBrooks
Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new
s%5D=32217
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data-
analytics/#prettyPhoto
BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-service-
innovation/
Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to
present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://gsnmagazine.com/node/41412?c=cyber_security
Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields-
exciting-innovation/
Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control-
processing-through-automation/
Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Laskyhttp://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
18. Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-media-60-experts-
share-2014-predictions-0718083
Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact-
centers-for-consolidation-3-takeaways-from-the-private-sector/
Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
Interview - Global Radio Talk Show – Interviews with Business Leaders
... http://globalradiotalkshow.com/
Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in
Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape-
government-agencies/#.VjZQ1_mrTIU
Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology-
better-government-customer-service.htm
Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive-
approach-to-combat-cybercrime/
19. Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015-
Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf
Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
Featured Speaker; The CyberMaryland Conference - Federal Business Council,
Inc.http://www.fbcinc.com/e/cybermdconference/speakers.aspx
Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable-
devices-can-transform-contact-center-operations/
Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox:
What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html
How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1
2dcc3742b7d609543#.VSK8z5h0xdg
Listed as one of the top 50 in "Data Sciences" on
LinkedIn article http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-
popular-on-linkedin 25 Data Scientists Popular on LinkedIn Posted by Vincent Granville
Keeping Pace With a Streamlined Service Approach
http://government.blogs.xerox.com/2014/11/05/keeping-pace-streamlined-service-approach/
Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014-
beyond-nist-framework/
20. Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-government_0515/
CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit
y%202014%20Outline.pdf xerox | GovCon
Executivehttp://www.govconexecutive.com/%3Fs%3Dxerox
Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington,
DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive-
in-any-market-the-know-how/
----------------------------------------------------------------------------------------------------------------------------- ---------------
Chuck Brooks – Winner of 2016
Cybersecurity Excellence Awards
By American Admin -
March 25, 2016
21. Chuck Brooks, "Cybersecurity Marketer of the Year"
We are excited to announce that Chuck Brooks has been named the WINNER of
“Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The
Awards are an annual competition that honors individuals and companies that
demonstrate excellence, innovation and leadership in information security.
Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing
issues across all mediums. He is known for his thought leadership on cybersecurity issues
and has published on these topics in the Huffington Post, Forbes, Government Security
News (regular contributor) . The Hill (featured contributor), Federal Times (featured
contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland
Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360
(featured contributor), and Biometric Update (featured contributor). He is Vice Chair of
CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech,
Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of
Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He
has also been a featured speaker and panelist at many conferences and events.
22. About Chuck Brooks
Most of us know his via social media for his regular posts and may be one of his 32,000
followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for
Government Relations & Marketing for Sutherland Government Solutions. In
government, he served at the Department of Homeland Security as the first Director of
Legislative Affairs for the Science & Technology Directorate. He also spent six years on
Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct
Faculty Member at Johns Hopkins University. He has an MA from the University of
Chicago and a BA from DePauw University.
Chuck thought leadership writings on cybersecurity have helped shape the public policy
debate as he is respected in industry, in the Federal Government, academia, and on Capitol
Hill. He also has a strong following at many of the embassies in Washington, DC
Chuck is a pioneer in social media with a global following and has brought significant
attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter,
Facebook, FedScoop, and other social media
Chuck brings experience from service in the public sector, academia, and with corporations.
He serves on a variety of boards, many of them philanthropic. He brings a substantive
knowledge on a broad range of cyber issues and a special expertise of cybersecurity in
government that have benefited both the not-for-profit, public, and commercial sectors.
-----------------------------------------------------------------------------
Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
23. s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government
relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital
Outre Thought Leadership, Strategic Partnering, Branding) for the Federal
a
Charles (Chuck) Brooks serves as the Vice President for Government Relations &
Marketing for Sutherland Global Services. Chuck leads Federal and State & Local
Government relations activities. He is also responsible for the Marketing portfolio
(Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for
the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda
Gates Technology Partner network and serves on Boards to several prominent public and
private companies and organizations. Chuck has extensive service in Senior Executive
Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the
Department of Homeland Security as the first Director of Legislative Affairs for the
Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security and
Congress. He has an MA in International relations from the University of Chicago, and a
BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
24. d State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates
The poles of debate are still forming in the Digital Age. There is
no common philosophy defining what constitutes a "hawk" or a
"dove" in cyberwar. International norms for countries' behavior
on the Internet are not yet established. There's still no consensus
about the appropriate balance between personal privacy and
national security when it comes to government surveillance or
private-sector encryption. Many companies and organizations
are divided about the best defenses that will shield them from
online attacks.
Passcode, The Christian Science Monitor's new section on
security and privacy, formed an Influencers Poll to foster debate
and discussion in this space. We regularly survey a wide swath of
in-the-know experts about the most pressing issues – and share
their answers and opinions with our readers. To form our pool of
Passcode Influencers,we gathered more than 120 experts from
across government, the private sector, research, and the privacy
advocacy community.
-----------------------------------------------------------------------------------
Navigating the four pillars of
Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically and
socially. Its architectural design is modeled after Paris and it is certainly a city of
cultural diversity and historically interesting neighborhoods. Visually, the site of the
25. monuments reflecting against the panoramic backdrop of the Potomac River is
memorable for both visitors and native Washingtonians alike.
It is really a city like no other city in America. Although it may be geographically
small, Washington serves as the engine of government, an anchor of global financial
policy and representation, a seat of institutionalized policymaking organizations, and
as a growing center for business, especially in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life "inside
the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain
how to navigate it and decipher how things worked. Looking back, I would like to
offer structure and pathways for others contemplating a public service career or
seeking to accomplish tangible objectives for policy and/or business purposes in the
nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches); commercial
(business, including global financial institutions; policy: (academia, think tanks and
associations/organizations); and media (old and new).
These pillars function both individually and collectively. They are intertwined and to
be effective, it is essential to understand their roles and impact on what you hope to
accomplish. Understanding and gaining experience within these pillars that comprise
the operational system of Washington takes focus and time. Success can be
realized by navigating the pillars and establishing a strategy of strategic relationship
building and connecting.
Government: There has never been any doubt that government and politics make
Washington tick. Government is not only the basis for tens of thousands of jobs in
the area, but it also serves as the fulcrum for evolving and communicating domestic
and international policies. Government is the center for laws and executive orders
overseeing all aspects of our daily life and our professions. The Pentagon,
intelligence agencies, and Department of Homeland Security are all based in
Washington because it is the epicenter of power and decision-making. Government
in Washington is by design structured as a system of check and balances. An
understanding of how the various branches of government function is essential to
influencing any regulatory outcome whether it be energy, healthcare or a national
security issue. Working on Capitol Hill is invaluable experience and connects to all
the pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington has
been transforming over the years as a commercial hub. The World Bank, Federal
Reserve, International Financial Corporation and the Chamber of Commerce are
some of the organizations headquartered in the city. Many corporations have also
relocated to the area to be near the action and position themselves for government
and commercial opportunities. Both Virginia and Maryland have established high-
tech corridors close to the city for those reasons. The international community with
their embassies and trade groups increasingly see Washington as a growing center
for commerce.
26. Policy: It is not only the pillars of business and government that are cogs in the
machine. Policy organizations (such as the Center for Strategic and International
Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise
Institute and the Aspen Institute) that provide issue expertise, training and solutions
are really the enabling fuel. A myriad of think tanks offer the latest insights in
domestic and global events on a regular basis. Top local universities (such as Johns
Hopkins's School of Advanced International Studies, George Washington,
Georgetown, American, George Mason, and Maryland), also promote dialogue and
informed decision-making and access. The over 6,000 associations and organization
with issue specific interests regularly outreach to key decision–makers who are part
of the public and private sector pillars. Strategic communications and thought
leadership are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to circumspect the
activities of the other three pillars. The media's role is a fundamental one; any
system of democratic government cannot operate without transparency and
oversight. In Washington, most of the country's key media outlets have
representation. Outside traditional old media, new media has become a force to
consider. Most citizens have constant access and the metrics of public opinion are
constantly pulsed. Corporate executives and government leaders use the social
media, especially LinkedIn, Facebook and Twitter as part of their work environments.
Government 2.0 and Business 2.0 are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue expertise,
contacts and gaining a holistic perspective of how Washington really works. This
experience can provide the tactical knowledge to advance your marketing efforts
and/or cause in the public/private world. There is no substitute for experience and for
building a personal network to be empowered and effective. To be successful, you
have to always keep abreast of the latest trends and be visible and helpful to your
customer. In the Washington arena, you also have to develop the qualities for
resilience and persistence as no one is always on the winning side of issues and
contracts.
Washington will always have its image challenges and be an enigma as to how it
functions, especially to those who have never experienced life inside the Beltway.
Exploring and experiencing the four pillars will bring an understanding of how to
navigate a path to success for those who come to this amazing city to make a
difference and leave a positive legacy.
----------------------------------------------------------------------------------------------------------------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
27. Cybersecurity expert Chuck Brooks talks about where we stand in what
many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will-
Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee, subject
matter expert to the Homeland Defense and Security Information Analysis Center,
“passcode influencer” for The Christian Science Monitor,on the Board of Advisors
for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience
Institute.
Brooks also has authored numerous articles focusing on cybersecurity,homeland
security and technology innovation for such publications as Forbes, Huffington
Post,InformationWeek,MITSloan Blog, Computerworld, Federal
Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland
Security Today,The Hill and Government Executive.
I recently got a chance to get Brooks' take on where we are today in what many
people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear manyhats and certainlyhave been focused on cybersecurity
for some time now. So tell me, who is ChuckBrooksand what is he
trying to accomplish this space?
A. You are right, over my career in government, corporate and academia,I have
worn many hats. There have been some strong common threads [of] science,
technology, national security,and legislative and executive policy in all my various
roles. Thankfully, I selected a professional vocation of government relations and
marketing that encompasses all those threads.
My passion for cybersecurity issues was first established over a decade ago during
the time I spent at the Department of HomelandSecurity’s Science and Technology
Directorate. Back then, the threats to our critical infrastructure were not as
pronounced as they are today. Of course we were just beginning to experience the
smartphone era. The field of cybersecurity has evolved exponentially along withthe
technologies, networks and connectivity that make up the cyberecosystem. And the
ecosystem is quite diverse and expansive, comprising software, hardware,
28. monitoring, forensics, governance and more. All these elements make it an exciting
area to explore since there is always more to learn from strategy and technology
perspectives. Also, it certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it touches
everything work- or personal-related. In both the public andprivate sectors — just
about every CIO survey — cybersecurity is the top concern. And of course, along with
data analytics, cybersecurity is a annually a budget priority of federal spending.DHS
Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the
two top priorities for the protecting the homeland.
What I want to accomplish in this space is to continue being a subject matter expert
in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic
and especially in educating others on how it can impact their lives. My advisory and
board director roles with organizations are a reflection of that interest. When I retire
(which is a long way off), I hope to join academia again in a part-time role. I spent
two years at Johns Hopkins University SAIS [School of Advanced International
Studies] teaching graduate students homeland security and foundit very fulfilling.
Q. You have one of the most active groups in LinkedInunder theheading
of the Department of Homeland Security. How has this helped both
yourself and DHS in feeling thepulse of the cybersecurity industry?
A. I do operate a half dozen groups that focus on homeland security and information
security on LinkedIn, including a few of the largest groups: “U.S.Department of
Homeland Security, DHS” “Information Technology (Homeland& National
Security)” and “Homeland Security.”
In all, these groups include about 60,000people. Among the members are a host of
well-known cybersecurity professionals who often post and comment on issues of
the day. Also, as any news on data breaches or cyberincidents occur,they are often
posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the pulse of
policy. It has also served as a great networking venue to share ideas and information
with some of the best security minds around in both the private and federal sectors.
Many senior-level executives in the federal government are on social sites such as
LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million
federal government employees who regularly use LinkedIn, includingover 65,000
from DHS. Because of the growing need for public/private-sector collaboration and
interface, being actively involved in social media makes a lot of sense.
29. Q. What is Sutherland Government Relations and what do you do for the
company?
A. Sutherland Global Services is a global provider of business processing services,
contact centers, IT service desks and management consulting serving government
and U.S. leading corporations across multiple industries,including healthcare and
insurance, technology, mortgage and loan services, finance and banking,retail,and
travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion,
[and] was listed in 2015 as one of the fastest growing private companies in America
byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and are
known for integrated services for citizen service needs and digital government. Our
cybersecurity operations at Sutherland Government Services are internal, butwe do
have a practice in customer relations management after a company or agency has
been breached. Our cybersecurity practice is led by Glenn Schoonover who has a
deep technical background. He is a former chief information security officer for the
Army and was responsible for providing network security to the Department of the
Army headquarters. He is also a former senior technology strategist for Worldwide
National Security and PublicSafety at Microsoft.
Q. I see you are active in both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the private
sector (for the most part) is driven by profit and loss. The R&D efforts, innovation
sector and skilled technical expertise in the private sector has been more robust than
in government. Industry is more agile and able to react to threat trends.
On the federal side, the landscape has really changedover the past few years. [The
U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting
mission and continues to build upon new requirements for operations and for
systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity.
Presidential and congressional directives have mandatedthat DHSplay a growing
and more primary role, especially with protecting critical infrastructure
(transportation, health, energy, finance) that is mostly owned by the private sector.
DHS has to step up its activities in assessing situational awareness,information
sharing, and resilience research and development plans with stakeholders. This has
led to a trend in public-private partnering for sharingthreat informationand in
creating standards and protocols. In both the publicand private sectors, training of
the next-generation cybersecurity technical and policy [subject matter experts] is a
major priority.
30. Q. To date,thereseems to be a stand-off between Apple and the federal
government when it comes to iPhone security.What are your thoughts
on this,and can thisbring aboutsome lessons learned for the
cybersecurityindustry?
A. This is the topic of the day, and it is a complicated issue relating to government
requesting a corporation to provide software to allow access to data. My thoughts
may be a bit different from some of the others in the industry. While I recognize the
importance of privacy and the dire risk of an Orwellian surveillance state,I consider
protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI
is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network
planning more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law enforcement
to cooperate in these type of instances (with proper warrants and assurances) so that
company Internet protocol can be isolated and privacy issues for the company’s
customers can be best addressed. I am quite sure Congress will be looking closely at
this case to establish legislation to create a working formula.The lesson for
cybersecurity is that there is a balance between privacy and security that has to be
constantly reviewed in accordance with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon and
zetabytes of data projected by2020,can we secure and control our
digital processes, or arewe headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on the
Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of
sensors decreases and processing power and bandwidth continue to increase. The
fact is that most of these IT networks will have some sort of an IoT-based security
breach. We could be headed for a digital train wreck if IoT security standards are not
adopted. We may have a digital train wreck even if they are adopted. Standards will
have to be developed industry by industry. Protecting a network of medical devices
in a hospital will require different sets of standards than protecting utilities with
SCADA [supervisory control and data acquisition] systems that make up the electric
grid. There are a lot of questions, including who enforces compliance? And what are
the liabilities of an IoT breach?
The real danger is that the Internet was not
built for security at its inception; it was
built for connectivity. There is some truth to
the notion that your network may someday
be betrayed by your toaster or refrigerator. One thing is for sure: the Internet of
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER LIST
OF CYBERSECURITY TECH
31. Things will pose many challenges to
cybersecurity and data analytics, muchof
which we have yet to contemplate.
Q. You've had theopportunity to
review many cyberdefense
technologies. Are we really finding
new solutions that can handle this
explosion of digital processes,or are
we still playing the game of catch-up
and patch-and-pray cybersecurity?
A. New solutions are continually evolving
with threats, but there will always be a need
for better encryption, biometrics, analytics
and automated network security to protect
networks and endpoints. It is a perpetual
game of cat and mouse between hackers
and protectors, and there is really no such
thing as being invulnerable.
In a sense, we are continually playing catch-
up and reacting to the last incident with
patches. The weakest link will always be the
human element. However, there are many
new interesting technologies that could
significantly impact cybersecurity in the
near future. There are technologies and
algorithms coming out of the national labs,
government, and from private-sector R&D
and startups that have the potential to be
disruptive.
Q. Any final comments? And are
there any speaking engagements or
eventsyou areparticipating in that
you would like to announce? Could
you also offer a good source for
information on the subject of
cybersecuritythat you would suggest
for our readers?
AREAS, PRIORITIES AND
EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and Public/Private
cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time” horizon
scanning and monitoring of networks
// Diagnostics and forensics (network
traffic analysis, payload analysis and
endpoint behavior analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
32. A. Please check my regular posts in the
media and social media, join my LinkedIn
groups and follow me on
Twitter @ChuckDBrooks. I do have some
future blogs with the National
Cybersecurity Institute on my agenda. Also,
in addition to social media, which I highly recommend, there are many excellent
outlets for cybersecurity information including theHomelandDefense and Security
Information Analysis Center. A great site that aggregated cybersecurity news daily
is The CyberWire.
Larry Karisny |
Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting
advanced cybersecurity technologies in both the public and private sectors.
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
cybersecurity workforce
// Tech foraging