SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Chuck Brooks
 VP Government Relations & Marketing, Thought leader: Homeland
Security, Cybersecurity, BPO, Big Data, IoT. Top1% viewedprofile on
LinkedIn
Cybersecurity Marketer of the Year – Chuck Brooks
WINNER:
Chuck Brooks (Sutherland Government Solutions) – WINNER
Chuck Brooks, Thought Leadership Bio
Homeland Security, Cybersecurity, Technology & Innovation. Public/Private Partnerships,
IoT, BPO, R & D, Digital Media
Summary of Professional Experience:
Executive Management, Marketing, Thought Leadership, Government Relations (federal and
state & local), Strategic Partnering, Business Development, Writer, Speaker
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach,
Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets.
Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and
serves on Boards to several prominent public and private companies and organizations. Chuck
also advised the Bill and Melinda Gates Technology Partner network, Chuck has extensive
service in Senior Executive Management, Marketing, Government Relations, and Business
Development and worked in those capacities for three large public corporations. In government,
he served at the Department of Homeland Security as the first Director of Legislative Affairs for
the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins
University where he taught graduate level students about homeland security and Congress. He
has an MA in International relations from the University of Chicago, and a BA in Political
Science from DePauw University, and a Certificate in International Law from The Hague. Chuck
is widely published on the subjects of innovation, public/private partnerships, emerging
technologies, and issues of homeland security and cybersecurity
Summary of Experience:
* Corporate: Extensive service in Senior Executive Management, Government Relations (also
Lobbying & PAC management), External Relations, and Business Development/Sales for three
large public corporations. Managed own successful PR and Government Relations consulting
firm.
* Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald
Reagan (Voice of America). Helped "stand up" Office of Legislative Affairs at the US
Department of Homeland Security and served as the first Director of Legislative Affairs at the
Science & Technology Directorate. Served as a Senior Legislative Staff (defense & foreign
affairs, national security, business) to the late Senator Arlen Specter at the U.S. Senate.
* Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on
Linked In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined
members). Top 1% viewed profile on LinkedIn. 31,000 first degree connections, mostly
executive level. Over 2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise
areas include: homeland security, cyber security, intelligence, defense, foreign affairs, IT, R &
D, science & technology, political risk, strategic partnering, business development/sales,
government relations, legislative/budget processes, thought leadership, innovation, and social
media. (Huffington Post, Forbes, Government Security News (regular contributor) .The Hill
(featured contributor), Federal Times (featured contributor), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security
Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured
contributor), Government Technology, Biometric Update (featured contributor)
* Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course
for two years). Produced webinar on DHS & Cybersecurity for George Washington University
Chuck Brooks
Sutherland Government Solutions
11955 FreedomDrive, Suite710 | Reston, VA 20190
Charles.brooks@sutherlandglobal.com
LinkedIn: https://www.linkedin.com/in/chuckbrooks
www.sutherlandglobal.com/industries_gov.aspx
Twitter: @ChuckDBrooks
Leadership; Activities and Organizations:
 Technology Partner Advisor, Bill and Melinda Gates Foundation
 Chairman, CompTIA New and Emerging Technology Committee
 PASSCODE INFLUENCER, Christian Science Monitor
 Board of Directors, Ecrypt (public company now called Bravatek)
 Board of Advisors, Cyber Resilience Institute
 Board of Advisors CyberTECH
 Board of Advisor B2B Cybersecurity
 Member, AFCEA Cybersecurity Committee
 Member, Professional Services Council Homeland Security Task Force
 Governance Committee of the IJIS Institute (supported by DHS & DOJ)
 Board of Directors of the Safe America Foundation
 Board of Directors of the Franklin Foundation (Innovation and Stem focus)
 Board of Directors of “One World For Life” (Emergency Management focus)
 Lead Judge, the 2013 and 2014, 15 Homeland Security/Border Security Awards
(Government Security News)
 Critical Security Controls Editorial Panel, Council on Cybersecurity
 Speaker DC Cybersecurity Summit (Securing The IoT)
 Speaker CRM Summit (The Internet of Things, Cyber-Security, and Government
Readiness)
 Speaker, National Cybersecurity Institute
 Speaker, Global Cyber Threat Summit
 Speaker, Kaspersky Cyber Security Conference 2015
 Speaker, IDGA Homeland Security Week conference
 Speaker Homeland Security Professionals Conference 2015
 Speaker, Secure Cities conference 2014
 Speaker, CyberMaryland conference 2014/15
 Speaker, National Press Club, Global Business News events 2014/15
 Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review
co-sponsor)
 Member, TechAmerica, the Cybersecurity Committee and Cybersecurity Legislative
Subcommittees, and Emerging Technology Committee
 Member, National Association of Manufacturers (NAM) Information Security Task
Force
 Washington Executive, Member MARCOM Committee (Marketing and
Communications)
 ACT-IAC Planning Committee
 Member, AFCEA
 Member Professional Services Council
o Member Potomac Officers Club
o Advisor/Influencer, Safe Cities Asia
o Regional Representative 2011, Davos Second World Forum “Communication on
Top”
o Former Consultant/Advisor to Rhode Schwarz ($2B privately owned company),
specializing in homeland security technologies
o Former Advisor to Intellitech International LLC, a firm advising on law
enforcement technology issues headed by two former Assistant Directors of the
FBI.
o Guest seminar lecturer on lobbying and interest groups in the national security
policy process at the National War College of the National Defense University
o Former Federal Advisory Board of AirPatrol Inc. The company provides an
intelligent enterprise mobility solution that continuously monitors mobile devices
and dynamically adapts their capabilities for the situation.
o Former Auxiliary Police Officer for the city of Arlington, Virginia.
DC Cyber Security Summit
Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors Including:
Chuck Brooks
Vice President for Government Relations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Grow ing Risk of Security Breaches as it Relates to the Internet of Things
Chuck Brooks Thought leadership expertise areas:
Areas of Expertise:
Homeland security, cyber security, business process outsourcing, digitization in government,
customer service, public/private partnerships, IT, R & D, science & technology, IoT, strategic
partnering, government relations, innovation, and social media.
Marketing Channel Experience:
 Social Media & content messaging
 Influencer engagement – in person and digital
 Web
 Media & association outlets
 Podcasts/Videocasts/Webinars
 Philanthropic
 Event Planning
 Strategic Partnering
 Washington, DC Representation
 Lobbying
 Industry Days
Issue area topics of writings/presentations/interviews/:
Customer Service
 Contact Centers
 Transaction Processing
 3-D Printing
 Big Data
 Internet of Things (IoT)
 Wearables
 Cloud Computing
 Context-aware Computing
 Artificial Intelligence
 Critical Infrastructure Protection and Information Assurance
 Cyber Security
 Data-Centers and Data-Center Consolidation
 Digital Government
 Digital Trust and Identity Integration and Management
 Digitization and Imaging
 Defined Leading Edge Technologies
 Mobility
 Outsourcing IT Services
 Sensors, Devices and Radio Frequency Identification (RFID)
 Software Development
 Virtualization
 Web Analytics
Links to Writings, Webinars, Conference Speeches, Radio
Interviews:
US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computing
NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role-
elevated-new-legislation/85934982/
Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private-
cybersecurity-alliances
The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe
http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/
4 stepsto a strong incidentresponse plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong-incident-response-
plan.html
Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-
new-era-quantu m-computing/
UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will-
thrive-with-or-without-brexitooperation
Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-career-
path-native-americans/84455826/
The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the-
rise-of-the-chief-data-officer
Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from-
the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers
The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-
blog/technology/280481-the-government-explores-artificial-intelligence
The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the-
newsroom/the-cusp-of-technological-transformation
The Globality Quotient: Cybersecurity (ChuckBrooks
Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/
Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-
Link-Will-Always-Be-the-Human-Element.html
DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge-
securing-soft-targets/82350628/
Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence
Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity-
excellence-awards/
3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially
ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and
marketing at SutherlandGlobal Services. “Anyone andeveryone is vul nerable,” he said. “The expandinginterconnectivityof our
devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often
quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst-
for-technological-progress
The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of-
awards/8
Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland-
security-priorities-watch-2016/77368604/
Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016
Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming-
millennial-workforce/
HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn-
tv/hsn-charles-brook-interview?Itemid=
The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/
7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting-
innovators-in-2016/
The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks
interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security-
government-readiness
Smart cities, the Internet of Things and the Blue Revolution: http://thehill.com/blogs/pundits-
blog/technology/254779-smart-cities-the-internet-of-things-and-the-blue-revolution
Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting-
internet-things-and-living-smart-cities/72742172/
Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does-
government-need-hardware-separated-operating-systems/121826/
Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male-
interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/
The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-
blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington
Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security
News) gsn 2014 digital yearbook of homeland security awards recipients
Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html
Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-
blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon
Solving Problems with Technology
Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
Government prioritizes digital engagement
(Computerworld) http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-explores-
wearables/#more-21
The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-
8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks
Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new-
digital-economy/#.VKriQCvF91Y
Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it
is too late) http://www.voodootec.com/author/chuckbrooks/
Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation-
commitment-key-for-govt-industry-cyber-partnerships/
Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar
DHS, FBI stepping up digitization of
Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
Internet of Things, New Frontier of Technology
Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
Wearables Bring New Sense of Fashion to Public
Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring-
new-sense-fashion-public-sector/104679/
DHS: A decade (and more) of competing
congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D
HS-decade-more-competing-congressional-oversight
Huffington Post Cybersecurity Industry Interview With Xerox's Chuck
Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital-
role-confronting-threat-pandemics-bioterrorism
"Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and-
innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036?
Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/
Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate-
partnerships-and-planning/
DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958-
dhs-s-special-partnership-with-native-americans
TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at
Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is-
back-in-the-limelight
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link
Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288-
transportation-security-back-to-the-future
Chief Data Officers in the Government – What Role Should They
Play?https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what-
role-should-they-
play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig
n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh
Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-
data-what-its-worth/#.VSLft5h0xdg
Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s
ecurity_discussi
The public/private imperative toprotect the grid by ChuckBrooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives-
innovation-DHS
“Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-
brooks
The public/private imperative toprotect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative
Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security
Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234
Tech Initerviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S
chedule_for_March_1620/
DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-Secretary-
Jeh-Johnson-revitalizes-One-DHS-vision
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
Native Americans key to border security success http://thehill.com/blogs/pundits-
blog/immigration/214494-native-americans-key-to-border-security-success
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal
Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011
Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of
Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-
webinar-evolving-role-cybersecurity-department-homeland-security
“Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet
of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html
Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners
hips/
Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk-
expo
Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234
Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi
ty+Week+2014+Conference
Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory
Strategies (Presenting)http://www.prweb.com/releases/2014/02/prweb11609927.htm
Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of
Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks-
joins-the-franklin-foundation-board-of-directors.html
Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark-
amtower
Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
How Big Data Will Revolutionize Aviation Security (ChuckBrooks
Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new
s%5D=32217
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data-
analytics/#prettyPhoto
BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-service-
innovation/
Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to
present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://gsnmagazine.com/node/41412?c=cyber_security
Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields-
exciting-innovation/
Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control-
processing-through-automation/
Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Laskyhttp://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-media-60-experts-
share-2014-predictions-0718083
Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact-
centers-for-consolidation-3-takeaways-from-the-private-sector/
Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
Interview - Global Radio Talk Show – Interviews with Business Leaders
... http://globalradiotalkshow.com/
Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in
Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape-
government-agencies/#.VjZQ1_mrTIU
Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology-
better-government-customer-service.htm
Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive-
approach-to-combat-cybercrime/
Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015-
Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf
Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
Featured Speaker; The CyberMaryland Conference - Federal Business Council,
Inc.http://www.fbcinc.com/e/cybermdconference/speakers.aspx
Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable-
devices-can-transform-contact-center-operations/
Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox:
What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html
How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1
2dcc3742b7d609543#.VSK8z5h0xdg
Listed as one of the top 50 in "Data Sciences" on
LinkedIn article http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-
popular-on-linkedin 25 Data Scientists Popular on LinkedIn Posted by Vincent Granville
Keeping Pace With a Streamlined Service Approach
http://government.blogs.xerox.com/2014/11/05/keeping-pace-streamlined-service-approach/
Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014-
beyond-nist-framework/
Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-government_0515/
CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit
y%202014%20Outline.pdf xerox | GovCon
Executivehttp://www.govconexecutive.com/%3Fs%3Dxerox
Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington,
DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive-
in-any-market-the-know-how/
----------------------------------------------------------------------------------------------------------------------------- ---------------
Chuck Brooks – Winner of 2016
Cybersecurity Excellence Awards
By American Admin -
March 25, 2016
Chuck Brooks, "Cybersecurity Marketer of the Year"
We are excited to announce that Chuck Brooks has been named the WINNER of
“Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The
Awards are an annual competition that honors individuals and companies that
demonstrate excellence, innovation and leadership in information security.
Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing
issues across all mediums. He is known for his thought leadership on cybersecurity issues
and has published on these topics in the Huffington Post, Forbes, Government Security
News (regular contributor) . The Hill (featured contributor), Federal Times (featured
contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland
Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360
(featured contributor), and Biometric Update (featured contributor). He is Vice Chair of
CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech,
Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of
Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He
has also been a featured speaker and panelist at many conferences and events.
About Chuck Brooks
Most of us know his via social media for his regular posts and may be one of his 32,000
followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for
Government Relations & Marketing for Sutherland Government Solutions. In
government, he served at the Department of Homeland Security as the first Director of
Legislative Affairs for the Science & Technology Directorate. He also spent six years on
Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct
Faculty Member at Johns Hopkins University. He has an MA from the University of
Chicago and a BA from DePauw University.
 Chuck thought leadership writings on cybersecurity have helped shape the public policy
debate as he is respected in industry, in the Federal Government, academia, and on Capitol
Hill. He also has a strong following at many of the embassies in Washington, DC
 Chuck is a pioneer in social media with a global following and has brought significant
attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter,
Facebook, FedScoop, and other social media
 Chuck brings experience from service in the public sector, academia, and with corporations.
He serves on a variety of boards, many of them philanthropic. He brings a substantive
knowledge on a broad range of cyber issues and a special expertise of cybersecurity in
government that have benefited both the not-for-profit, public, and commercial sectors.
-----------------------------------------------------------------------------
 Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
 s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government
relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital
Outre Thought Leadership, Strategic Partnering, Branding) for the Federal
a
 Charles (Chuck) Brooks serves as the Vice President for Government Relations &
Marketing for Sutherland Global Services. Chuck leads Federal and State & Local
Government relations activities. He is also responsible for the Marketing portfolio
(Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for
the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda
Gates Technology Partner network and serves on Boards to several prominent public and
private companies and organizations. Chuck has extensive service in Senior Executive
Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the
Department of Homeland Security as the first Director of Legislative Affairs for the
Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security and
Congress. He has an MA in International relations from the University of Chicago, and a
BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
 d State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates
 The poles of debate are still forming in the Digital Age. There is
no common philosophy defining what constitutes a "hawk" or a
"dove" in cyberwar. International norms for countries' behavior
on the Internet are not yet established. There's still no consensus
about the appropriate balance between personal privacy and
national security when it comes to government surveillance or
private-sector encryption. Many companies and organizations
are divided about the best defenses that will shield them from
online attacks.
 Passcode, The Christian Science Monitor's new section on
security and privacy, formed an Influencers Poll to foster debate
and discussion in this space. We regularly survey a wide swath of
in-the-know experts about the most pressing issues – and share
their answers and opinions with our readers. To form our pool of
Passcode Influencers,we gathered more than 120 experts from
across government, the private sector, research, and the privacy
advocacy community.
-----------------------------------------------------------------------------------
Navigating the four pillars of
Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically and
socially. Its architectural design is modeled after Paris and it is certainly a city of
cultural diversity and historically interesting neighborhoods. Visually, the site of the
monuments reflecting against the panoramic backdrop of the Potomac River is
memorable for both visitors and native Washingtonians alike.
It is really a city like no other city in America. Although it may be geographically
small, Washington serves as the engine of government, an anchor of global financial
policy and representation, a seat of institutionalized policymaking organizations, and
as a growing center for business, especially in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life "inside
the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain
how to navigate it and decipher how things worked. Looking back, I would like to
offer structure and pathways for others contemplating a public service career or
seeking to accomplish tangible objectives for policy and/or business purposes in the
nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches); commercial
(business, including global financial institutions; policy: (academia, think tanks and
associations/organizations); and media (old and new).
These pillars function both individually and collectively. They are intertwined and to
be effective, it is essential to understand their roles and impact on what you hope to
accomplish. Understanding and gaining experience within these pillars that comprise
the operational system of Washington takes focus and time. Success can be
realized by navigating the pillars and establishing a strategy of strategic relationship
building and connecting.
Government: There has never been any doubt that government and politics make
Washington tick. Government is not only the basis for tens of thousands of jobs in
the area, but it also serves as the fulcrum for evolving and communicating domestic
and international policies. Government is the center for laws and executive orders
overseeing all aspects of our daily life and our professions. The Pentagon,
intelligence agencies, and Department of Homeland Security are all based in
Washington because it is the epicenter of power and decision-making. Government
in Washington is by design structured as a system of check and balances. An
understanding of how the various branches of government function is essential to
influencing any regulatory outcome whether it be energy, healthcare or a national
security issue. Working on Capitol Hill is invaluable experience and connects to all
the pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington has
been transforming over the years as a commercial hub. The World Bank, Federal
Reserve, International Financial Corporation and the Chamber of Commerce are
some of the organizations headquartered in the city. Many corporations have also
relocated to the area to be near the action and position themselves for government
and commercial opportunities. Both Virginia and Maryland have established high-
tech corridors close to the city for those reasons. The international community with
their embassies and trade groups increasingly see Washington as a growing center
for commerce.
Policy: It is not only the pillars of business and government that are cogs in the
machine. Policy organizations (such as the Center for Strategic and International
Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise
Institute and the Aspen Institute) that provide issue expertise, training and solutions
are really the enabling fuel. A myriad of think tanks offer the latest insights in
domestic and global events on a regular basis. Top local universities (such as Johns
Hopkins's School of Advanced International Studies, George Washington,
Georgetown, American, George Mason, and Maryland), also promote dialogue and
informed decision-making and access. The over 6,000 associations and organization
with issue specific interests regularly outreach to key decision–makers who are part
of the public and private sector pillars. Strategic communications and thought
leadership are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to circumspect the
activities of the other three pillars. The media's role is a fundamental one; any
system of democratic government cannot operate without transparency and
oversight. In Washington, most of the country's key media outlets have
representation. Outside traditional old media, new media has become a force to
consider. Most citizens have constant access and the metrics of public opinion are
constantly pulsed. Corporate executives and government leaders use the social
media, especially LinkedIn, Facebook and Twitter as part of their work environments.
Government 2.0 and Business 2.0 are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue expertise,
contacts and gaining a holistic perspective of how Washington really works. This
experience can provide the tactical knowledge to advance your marketing efforts
and/or cause in the public/private world. There is no substitute for experience and for
building a personal network to be empowered and effective. To be successful, you
have to always keep abreast of the latest trends and be visible and helpful to your
customer. In the Washington arena, you also have to develop the qualities for
resilience and persistence as no one is always on the winning side of issues and
contracts.
Washington will always have its image challenges and be an enigma as to how it
functions, especially to those who have never experienced life inside the Beltway.
Exploring and experiencing the four pillars will bring an understanding of how to
navigate a path to success for those who come to this amazing city to make a
difference and leave a positive legacy.
----------------------------------------------------------------------------------------------------------------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
Cybersecurity expert Chuck Brooks talks about where we stand in what
many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will-
Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee, subject
matter expert to the Homeland Defense and Security Information Analysis Center,
“passcode influencer” for The Christian Science Monitor,on the Board of Advisors
for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience
Institute.
Brooks also has authored numerous articles focusing on cybersecurity,homeland
security and technology innovation for such publications as Forbes, Huffington
Post,InformationWeek,MITSloan Blog, Computerworld, Federal
Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland
Security Today,The Hill and Government Executive.
I recently got a chance to get Brooks' take on where we are today in what many
people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear manyhats and certainlyhave been focused on cybersecurity
for some time now. So tell me, who is ChuckBrooksand what is he
trying to accomplish this space?
A. You are right, over my career in government, corporate and academia,I have
worn many hats. There have been some strong common threads [of] science,
technology, national security,and legislative and executive policy in all my various
roles. Thankfully, I selected a professional vocation of government relations and
marketing that encompasses all those threads.
My passion for cybersecurity issues was first established over a decade ago during
the time I spent at the Department of HomelandSecurity’s Science and Technology
Directorate. Back then, the threats to our critical infrastructure were not as
pronounced as they are today. Of course we were just beginning to experience the
smartphone era. The field of cybersecurity has evolved exponentially along withthe
technologies, networks and connectivity that make up the cyberecosystem. And the
ecosystem is quite diverse and expansive, comprising software, hardware,
monitoring, forensics, governance and more. All these elements make it an exciting
area to explore since there is always more to learn from strategy and technology
perspectives. Also, it certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it touches
everything work- or personal-related. In both the public andprivate sectors — just
about every CIO survey — cybersecurity is the top concern. And of course, along with
data analytics, cybersecurity is a annually a budget priority of federal spending.DHS
Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the
two top priorities for the protecting the homeland.
What I want to accomplish in this space is to continue being a subject matter expert
in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic
and especially in educating others on how it can impact their lives. My advisory and
board director roles with organizations are a reflection of that interest. When I retire
(which is a long way off), I hope to join academia again in a part-time role. I spent
two years at Johns Hopkins University SAIS [School of Advanced International
Studies] teaching graduate students homeland security and foundit very fulfilling.
Q. You have one of the most active groups in LinkedInunder theheading
of the Department of Homeland Security. How has this helped both
yourself and DHS in feeling thepulse of the cybersecurity industry?
A. I do operate a half dozen groups that focus on homeland security and information
security on LinkedIn, including a few of the largest groups: “U.S.Department of
Homeland Security, DHS” “Information Technology (Homeland& National
Security)” and “Homeland Security.”
In all, these groups include about 60,000people. Among the members are a host of
well-known cybersecurity professionals who often post and comment on issues of
the day. Also, as any news on data breaches or cyberincidents occur,they are often
posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the pulse of
policy. It has also served as a great networking venue to share ideas and information
with some of the best security minds around in both the private and federal sectors.
Many senior-level executives in the federal government are on social sites such as
LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million
federal government employees who regularly use LinkedIn, includingover 65,000
from DHS. Because of the growing need for public/private-sector collaboration and
interface, being actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do for the
company?
A. Sutherland Global Services is a global provider of business processing services,
contact centers, IT service desks and management consulting serving government
and U.S. leading corporations across multiple industries,including healthcare and
insurance, technology, mortgage and loan services, finance and banking,retail,and
travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion,
[and] was listed in 2015 as one of the fastest growing private companies in America
byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and are
known for integrated services for citizen service needs and digital government. Our
cybersecurity operations at Sutherland Government Services are internal, butwe do
have a practice in customer relations management after a company or agency has
been breached. Our cybersecurity practice is led by Glenn Schoonover who has a
deep technical background. He is a former chief information security officer for the
Army and was responsible for providing network security to the Department of the
Army headquarters. He is also a former senior technology strategist for Worldwide
National Security and PublicSafety at Microsoft.
Q. I see you are active in both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the private
sector (for the most part) is driven by profit and loss. The R&D efforts, innovation
sector and skilled technical expertise in the private sector has been more robust than
in government. Industry is more agile and able to react to threat trends.
On the federal side, the landscape has really changedover the past few years. [The
U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting
mission and continues to build upon new requirements for operations and for
systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity.
Presidential and congressional directives have mandatedthat DHSplay a growing
and more primary role, especially with protecting critical infrastructure
(transportation, health, energy, finance) that is mostly owned by the private sector.
DHS has to step up its activities in assessing situational awareness,information
sharing, and resilience research and development plans with stakeholders. This has
led to a trend in public-private partnering for sharingthreat informationand in
creating standards and protocols. In both the publicand private sectors, training of
the next-generation cybersecurity technical and policy [subject matter experts] is a
major priority.
Q. To date,thereseems to be a stand-off between Apple and the federal
government when it comes to iPhone security.What are your thoughts
on this,and can thisbring aboutsome lessons learned for the
cybersecurityindustry?
A. This is the topic of the day, and it is a complicated issue relating to government
requesting a corporation to provide software to allow access to data. My thoughts
may be a bit different from some of the others in the industry. While I recognize the
importance of privacy and the dire risk of an Orwellian surveillance state,I consider
protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI
is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network
planning more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law enforcement
to cooperate in these type of instances (with proper warrants and assurances) so that
company Internet protocol can be isolated and privacy issues for the company’s
customers can be best addressed. I am quite sure Congress will be looking closely at
this case to establish legislation to create a working formula.The lesson for
cybersecurity is that there is a balance between privacy and security that has to be
constantly reviewed in accordance with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon and
zetabytes of data projected by2020,can we secure and control our
digital processes, or arewe headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on the
Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of
sensors decreases and processing power and bandwidth continue to increase. The
fact is that most of these IT networks will have some sort of an IoT-based security
breach. We could be headed for a digital train wreck if IoT security standards are not
adopted. We may have a digital train wreck even if they are adopted. Standards will
have to be developed industry by industry. Protecting a network of medical devices
in a hospital will require different sets of standards than protecting utilities with
SCADA [supervisory control and data acquisition] systems that make up the electric
grid. There are a lot of questions, including who enforces compliance? And what are
the liabilities of an IoT breach?
The real danger is that the Internet was not
built for security at its inception; it was
built for connectivity. There is some truth to
the notion that your network may someday
be betrayed by your toaster or refrigerator. One thing is for sure: the Internet of
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER LIST
OF CYBERSECURITY TECH
Things will pose many challenges to
cybersecurity and data analytics, muchof
which we have yet to contemplate.
Q. You've had theopportunity to
review many cyberdefense
technologies. Are we really finding
new solutions that can handle this
explosion of digital processes,or are
we still playing the game of catch-up
and patch-and-pray cybersecurity?
A. New solutions are continually evolving
with threats, but there will always be a need
for better encryption, biometrics, analytics
and automated network security to protect
networks and endpoints. It is a perpetual
game of cat and mouse between hackers
and protectors, and there is really no such
thing as being invulnerable.
In a sense, we are continually playing catch-
up and reacting to the last incident with
patches. The weakest link will always be the
human element. However, there are many
new interesting technologies that could
significantly impact cybersecurity in the
near future. There are technologies and
algorithms coming out of the national labs,
government, and from private-sector R&D
and startups that have the potential to be
disruptive.
Q. Any final comments? And are
there any speaking engagements or
eventsyou areparticipating in that
you would like to announce? Could
you also offer a good source for
information on the subject of
cybersecuritythat you would suggest
for our readers?
AREAS, PRIORITIES AND
EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and Public/Private
cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time” horizon
scanning and monitoring of networks
// Diagnostics and forensics (network
traffic analysis, payload analysis and
endpoint behavior analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
A. Please check my regular posts in the
media and social media, join my LinkedIn
groups and follow me on
Twitter @ChuckDBrooks. I do have some
future blogs with the National
Cybersecurity Institute on my agenda. Also,
in addition to social media, which I highly recommend, there are many excellent
outlets for cybersecurity information including theHomelandDefense and Security
Information Analysis Center. A great site that aggregated cybersecurity news daily
is The CyberWire.
Larry Karisny |
Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting
advanced cybersecurity technologies in both the public and private sectors.
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
cybersecurity workforce
// Tech foraging

Weitere ähnliche Inhalte

Was ist angesagt?

Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting InternationalChuck Brooks
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsLea Shanley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other thingsSara-Jayne Terp
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt TechnologiesChuck Brooks
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of DisinformationSara-Jayne Terp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 

Was ist angesagt? (20)

Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of Disinformation
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 

Andere mochten auch

WordCamp Sydney 2016 - Day 2 Closing Remarks
WordCamp Sydney 2016 - Day 2 Closing RemarksWordCamp Sydney 2016 - Day 2 Closing Remarks
WordCamp Sydney 2016 - Day 2 Closing RemarksWordCamp Sydney
 
Yahoo! research - 'Appetite' - the hunger for mobile media
Yahoo! research - 'Appetite' - the hunger for mobile mediaYahoo! research - 'Appetite' - the hunger for mobile media
Yahoo! research - 'Appetite' - the hunger for mobile mediaPatrick Hourihan
 
Proyeksi vektor aji santoso ( 31 ) msp
Proyeksi vektor aji santoso ( 31 ) mspProyeksi vektor aji santoso ( 31 ) msp
Proyeksi vektor aji santoso ( 31 ) msplaurisahat07
 
Financial Management & Corporate Advisory For Your Business
Financial Management & Corporate Advisory For Your BusinessFinancial Management & Corporate Advisory For Your Business
Financial Management & Corporate Advisory For Your BusinessSorin Popescu
 
Customer service careers
Customer service careersCustomer service careers
Customer service careerscrew
 
Becoming current spring_14
Becoming current spring_14Becoming current spring_14
Becoming current spring_14countrygirl3
 
How to develop a mobile app for events and conferences with little to no reso...
How to develop a mobile app for events and conferences with little to no reso...How to develop a mobile app for events and conferences with little to no reso...
How to develop a mobile app for events and conferences with little to no reso...Matthew Shoup
 
Curriculum vitae sv
Curriculum vitae svCurriculum vitae sv
Curriculum vitae svBo Ericsson
 
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...Natallia Liutsko
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyDean Shareski
 
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future Aricent
 
How effective is the combination of your main q2
How effective is the combination of your main q2How effective is the combination of your main q2
How effective is the combination of your main q2Rabbeah
 
March 2013 StartUp Health Insights Funding Report
March 2013 StartUp Health Insights Funding ReportMarch 2013 StartUp Health Insights Funding Report
March 2013 StartUp Health Insights Funding ReportStartUp Health
 
ドイツ大使館向け「事業認証申請書」
ドイツ大使館向け「事業認証申請書」ドイツ大使館向け「事業認証申請書」
ドイツ大使館向け「事業認証申請書」Naoki Miyano
 
INTERNET IN INTERACTIVE MARKETING
INTERNET IN INTERACTIVE MARKETINGINTERNET IN INTERACTIVE MARKETING
INTERNET IN INTERACTIVE MARKETINGSandeep Singh Saini
 

Andere mochten auch (20)

Hotspot
HotspotHotspot
Hotspot
 
WordCamp Sydney 2016 - Day 2 Closing Remarks
WordCamp Sydney 2016 - Day 2 Closing RemarksWordCamp Sydney 2016 - Day 2 Closing Remarks
WordCamp Sydney 2016 - Day 2 Closing Remarks
 
Yahoo! research - 'Appetite' - the hunger for mobile media
Yahoo! research - 'Appetite' - the hunger for mobile mediaYahoo! research - 'Appetite' - the hunger for mobile media
Yahoo! research - 'Appetite' - the hunger for mobile media
 
Proyeksi vektor aji santoso ( 31 ) msp
Proyeksi vektor aji santoso ( 31 ) mspProyeksi vektor aji santoso ( 31 ) msp
Proyeksi vektor aji santoso ( 31 ) msp
 
Financial Management & Corporate Advisory For Your Business
Financial Management & Corporate Advisory For Your BusinessFinancial Management & Corporate Advisory For Your Business
Financial Management & Corporate Advisory For Your Business
 
Guía sec
Guía secGuía sec
Guía sec
 
Customer service careers
Customer service careersCustomer service careers
Customer service careers
 
TENDANCES BRAND CONTENT 2015 : Just Dance présenté par Alban Dechelotte de Co...
TENDANCES BRAND CONTENT 2015 : Just Dance présenté par Alban Dechelotte de Co...TENDANCES BRAND CONTENT 2015 : Just Dance présenté par Alban Dechelotte de Co...
TENDANCES BRAND CONTENT 2015 : Just Dance présenté par Alban Dechelotte de Co...
 
Becoming current spring_14
Becoming current spring_14Becoming current spring_14
Becoming current spring_14
 
How to develop a mobile app for events and conferences with little to no reso...
How to develop a mobile app for events and conferences with little to no reso...How to develop a mobile app for events and conferences with little to no reso...
How to develop a mobile app for events and conferences with little to no reso...
 
Evolucion De La Ocmunicaion
Evolucion De La OcmunicaionEvolucion De La Ocmunicaion
Evolucion De La Ocmunicaion
 
Curriculum vitae sv
Curriculum vitae svCurriculum vitae sv
Curriculum vitae sv
 
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...
Люцко Н.М. Организационно-педагогические и правовые основы формирования незав...
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical Literacy
 
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future
Zinnov Confluence 2014: Edge of Tomorrow: Fundamental Shifts Shaping Our Future
 
How effective is the combination of your main q2
How effective is the combination of your main q2How effective is the combination of your main q2
How effective is the combination of your main q2
 
March 2013 StartUp Health Insights Funding Report
March 2013 StartUp Health Insights Funding ReportMarch 2013 StartUp Health Insights Funding Report
March 2013 StartUp Health Insights Funding Report
 
Steve job (arouba)
Steve job (arouba)Steve job (arouba)
Steve job (arouba)
 
ドイツ大使館向け「事業認証申請書」
ドイツ大使館向け「事業認証申請書」ドイツ大使館向け「事業認証申請書」
ドイツ大使館向け「事業認証申請書」
 
INTERNET IN INTERACTIVE MARKETING
INTERNET IN INTERACTIVE MARKETINGINTERNET IN INTERACTIVE MARKETING
INTERNET IN INTERACTIVE MARKETING
 

Ähnlich wie Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile

Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuck Brooks
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileChuck Brooks
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileChuck Brooks
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMChuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
BrooksGovernment Security News
BrooksGovernment Security NewsBrooksGovernment Security News
BrooksGovernment Security NewsChuck Brooks
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 

Ähnlich wie Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile (19)

Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Cybertech
CybertechCybertech
Cybertech
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMIT
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner Profile
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner Profile
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUM
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
ITSECURITY PLANET
ITSECURITY PLANETITSECURITY PLANET
ITSECURITY PLANET
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
BrooksGovernment Security News
BrooksGovernment Security NewsBrooksGovernment Security News
BrooksGovernment Security News
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 

Kürzlich hochgeladen

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile

  • 1. Chuck Brooks  VP Government Relations & Marketing, Thought leader: Homeland Security, Cybersecurity, BPO, Big Data, IoT. Top1% viewedprofile on LinkedIn Cybersecurity Marketer of the Year – Chuck Brooks WINNER: Chuck Brooks (Sutherland Government Solutions) – WINNER
  • 2. Chuck Brooks, Thought Leadership Bio Homeland Security, Cybersecurity, Technology & Innovation. Public/Private Partnerships, IoT, BPO, R & D, Digital Media Summary of Professional Experience: Executive Management, Marketing, Thought Leadership, Government Relations (federal and state & local), Strategic Partnering, Business Development, Writer, Speaker Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and serves on Boards to several prominent public and private companies and organizations. Chuck also advised the Bill and Melinda Gates Technology Partner network, Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government,
  • 3. he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity Summary of Experience: * Corporate: Extensive service in Senior Executive Management, Government Relations (also Lobbying & PAC management), External Relations, and Business Development/Sales for three large public corporations. Managed own successful PR and Government Relations consulting firm. * Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald Reagan (Voice of America). Helped "stand up" Office of Legislative Affairs at the US Department of Homeland Security and served as the first Director of Legislative Affairs at the Science & Technology Directorate. Served as a Senior Legislative Staff (defense & foreign affairs, national security, business) to the late Senator Arlen Specter at the U.S. Senate. * Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on Linked In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined members). Top 1% viewed profile on LinkedIn. 31,000 first degree connections, mostly executive level. Over 2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise areas include: homeland security, cyber security, intelligence, defense, foreign affairs, IT, R & D, science & technology, political risk, strategic partnering, business development/sales, government relations, legislative/budget processes, thought leadership, innovation, and social media. (Huffington Post, Forbes, Government Security News (regular contributor) .The Hill (featured contributor), Federal Times (featured contributor), Christian Science Monitor (Member of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor), Government Technology, Biometric Update (featured contributor) * Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course for two years). Produced webinar on DHS & Cybersecurity for George Washington University
  • 4. Chuck Brooks Sutherland Government Solutions 11955 FreedomDrive, Suite710 | Reston, VA 20190 Charles.brooks@sutherlandglobal.com LinkedIn: https://www.linkedin.com/in/chuckbrooks www.sutherlandglobal.com/industries_gov.aspx Twitter: @ChuckDBrooks Leadership; Activities and Organizations:  Technology Partner Advisor, Bill and Melinda Gates Foundation  Chairman, CompTIA New and Emerging Technology Committee  PASSCODE INFLUENCER, Christian Science Monitor  Board of Directors, Ecrypt (public company now called Bravatek)  Board of Advisors, Cyber Resilience Institute  Board of Advisors CyberTECH  Board of Advisor B2B Cybersecurity  Member, AFCEA Cybersecurity Committee  Member, Professional Services Council Homeland Security Task Force  Governance Committee of the IJIS Institute (supported by DHS & DOJ)  Board of Directors of the Safe America Foundation  Board of Directors of the Franklin Foundation (Innovation and Stem focus)  Board of Directors of “One World For Life” (Emergency Management focus)  Lead Judge, the 2013 and 2014, 15 Homeland Security/Border Security Awards (Government Security News)  Critical Security Controls Editorial Panel, Council on Cybersecurity  Speaker DC Cybersecurity Summit (Securing The IoT)  Speaker CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness)  Speaker, National Cybersecurity Institute  Speaker, Global Cyber Threat Summit  Speaker, Kaspersky Cyber Security Conference 2015  Speaker, IDGA Homeland Security Week conference  Speaker Homeland Security Professionals Conference 2015  Speaker, Secure Cities conference 2014
  • 5.  Speaker, CyberMaryland conference 2014/15  Speaker, National Press Club, Global Business News events 2014/15  Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review co-sponsor)  Member, TechAmerica, the Cybersecurity Committee and Cybersecurity Legislative Subcommittees, and Emerging Technology Committee  Member, National Association of Manufacturers (NAM) Information Security Task Force  Washington Executive, Member MARCOM Committee (Marketing and Communications)  ACT-IAC Planning Committee  Member, AFCEA  Member Professional Services Council o Member Potomac Officers Club o Advisor/Influencer, Safe Cities Asia o Regional Representative 2011, Davos Second World Forum “Communication on Top” o Former Consultant/Advisor to Rhode Schwarz ($2B privately owned company), specializing in homeland security technologies o Former Advisor to Intellitech International LLC, a firm advising on law enforcement technology issues headed by two former Assistant Directors of the FBI. o Guest seminar lecturer on lobbying and interest groups in the national security policy process at the National War College of the National Defense University o Former Federal Advisory Board of AirPatrol Inc. The company provides an intelligent enterprise mobility solution that continuously monitors mobile devices and dynamically adapts their capabilities for the situation. o Former Auxiliary Police Officer for the city of Arlington, Virginia. DC Cyber Security Summit
  • 6. Thursday, June 30, 2016 from 8:00 AM to 6:00 PM The Ritz-Carlton Tysons Corner • Learn from Security Experts & Advisors Including: Chuck Brooks Vice President for Government Relations & Marketing Sutherland Global Services Speaking on Panel 1: Protecting the Enterprise from the Grow ing Risk of Security Breaches as it Relates to the Internet of Things Chuck Brooks Thought leadership expertise areas:
  • 7. Areas of Expertise: Homeland security, cyber security, business process outsourcing, digitization in government, customer service, public/private partnerships, IT, R & D, science & technology, IoT, strategic partnering, government relations, innovation, and social media. Marketing Channel Experience:  Social Media & content messaging  Influencer engagement – in person and digital  Web  Media & association outlets  Podcasts/Videocasts/Webinars  Philanthropic  Event Planning  Strategic Partnering  Washington, DC Representation  Lobbying  Industry Days Issue area topics of writings/presentations/interviews/: Customer Service  Contact Centers  Transaction Processing  3-D Printing  Big Data  Internet of Things (IoT)  Wearables  Cloud Computing  Context-aware Computing  Artificial Intelligence  Critical Infrastructure Protection and Information Assurance  Cyber Security  Data-Centers and Data-Center Consolidation  Digital Government  Digital Trust and Identity Integration and Management  Digitization and Imaging  Defined Leading Edge Technologies  Mobility  Outsourcing IT Services  Sensors, Devices and Radio Frequency Identification (RFID)  Software Development
  • 8.  Virtualization  Web Analytics Links to Writings, Webinars, Conference Speeches, Radio Interviews:
  • 9. US must invest more in advanced computing http://thehill.com/blogs/pundits- blog/technology/291013-us-must-invest-more-in-advanced-computing NGA's Homeland panel to benefit from Governor Hutchinson’s experience, leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas- homeland-panel-benefit-hutchinsons-experience-leadership/88031784/ DHS cyber role elevated in new legislation http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role- elevated-new-legislation/85934982/ Embracing Global Public/Private Cybersecurity Alliances https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private- cybersecurity-alliances The Gender Gap in Cybersecurity Can, and Should Be, Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in- cybersecurity-can-and-should-be-closed Digital Convergence and Cybersecurity https://www.alienvault.com/blogs The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/ 4 stepsto a strong incidentresponse plan | CSO Online http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong-incident-response- plan.html Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway- new-era-quantu m-computing/ UK/US Cybersecurity Will Thrive With or Without Brexit http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will- thrive-with-or-without-brexitooperation
  • 10. Creating a Digital Career Path for Native Americans http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-career- path-native-americans/84455826/ The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the- rise-of-the-chief-data-officer Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from- the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits- blog/technology/280481-the-government-explores-artificial-intelligence The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the- newsroom/the-cusp-of-technological-transformation The Globality Quotient: Cybersecurity (ChuckBrooks Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/ Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest- Link-Will-Always-Be-the-Human-Element.html DHS's ongoing challenge: Securing soft targets by Chuck Brooks http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge- securing-soft-targets/82350628/ Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity- excellence-awards/ 3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and marketing at SutherlandGlobal Services. “Anyone andeveryone is vul nerable,” he said. “The expandinginterconnectivityof our devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns- about-external-cyber-threats/ Government R&D can be a catalyst for technological progress http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst- for-technological-progress
  • 11. The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of- awards/8 Key homeland security priorities to watch in 2016 http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland- security-priorities-watch-2016/77368604/ Seven astounding technology trends for 2016 http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016 Preparing for the Coming Millennial Workforce https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming- millennial-workforce/ HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn- tv/hsn-charles-brook-interview?Itemid= The Internet Of Things (IoT) Has Arrived – What You Should Know http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/ 7 Top Tech Trends Impacting Innovators in 2016 http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting- innovators-in-2016/ The alchemy of big data in government http://thehill.com/blogs/pundits- blog/technology/263890-the-alchemy-of-big-data-in-government Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland- security-alerts/79982178/ The Internet of Things and Cyber- Security: Government Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security- government-readiness Smart cities, the Internet of Things and the Blue Revolution: http://thehill.com/blogs/pundits- blog/technology/254779-smart-cities-the-internet-of-things-and-the-blue-revolution Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks http://www.christophergorog.com/cyber-security/cwc-cyber-1/
  • 12. Protecting the Internet of Things and living in Smart Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting- internet-things-and-living-smart-cities/72742172/ Does Government Need ‘Hardware-Separated’ Operating Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does- government-need-hardware-separated-operating-systems/121826/ Winning With Women - an interview with Chuck Brooks: https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male- interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/ The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits- blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security News) gsn 2014 digital yearbook of homeland security awards recipients Homeland Security Interview by Government Security News on Key issues for 2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits- blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon Solving Problems with Technology Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with- technology-convergence/#prettyPhoto Government prioritizes digital engagement (Computerworld) http://www.computerworld.com/article/2931835/it- transformation/government-prioritizes-digital-engagement.html Department of Homeland Security Explores Wearables http://www.wearablevalley.co/department-of-homeland-security-explores- wearables/#more-21 The OPM breach screams for action | SecurityInfoWatch.com https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF- 8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks Servicing the Internet of Things and the New Digital Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new- digital-economy/#.VKriQCvF91Y
  • 13. Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it is too late) http://www.voodootec.com/author/chuckbrooks/ Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation- commitment-key-for-govt-industry-cyber-partnerships/ Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel) https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar DHS, FBI stepping up digitization of Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI- stepping-up-digitization-records Internet of Things, New Frontier of Technology Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology- convergence/#prettyPhoto Wearables Bring New Sense of Fashion to Public Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring- new-sense-fashion-public-sector/104679/ DHS: A decade (and more) of competing congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D HS-decade-more-competing-congressional-oversight Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry- in_2_b_4620232.html?utm_source=Alert- blogger&utm_medium=email&utm_campaign=Email%2BNotifications The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital- role-confronting-threat-pandemics-bioterrorism "Why You Should Be Excited About Future Tech" (InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and- innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036? Dick Tracy and the Benefits of Virtual Government http://government.blogs.xerox.com/?s=virtual+government
  • 14. Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity- takes-center-stage-a-decade-after-the-9-11-commission-report/ Creating resilience with public/private partnerships—and planning (MIT Sloan Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate- partnerships-and-planning/ DHS’s Special Partnership with Native Americans (Indian Country News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958- dhs-s-special-partnership-with-native-americans TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8 Homeland Security is Back in the Limelight By Chuck Brooks (The Hill) http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is- back-in-the-limelight Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity- takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288- transportation-security-back-to-the-future Chief Data Officers in the Government – What Role Should They Play?https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what- role-should-they- play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big- data-what-its-worth/#.VSLft5h0xdg Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s ecurity_discussi The public/private imperative toprotect the grid by ChuckBrooks (Federal Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private- imperative-protect-grid
  • 15. How S&T drives innovation at DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives- innovation-DHS “Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck- brooks The public/private imperative toprotect the grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private- imperative-protect-grid Government Security News 2013 Homeland Security Awards (Lead Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security Week presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234 Tech Initerviews Featured on House Homeland Security Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S chedule_for_March_1620/ DHS Secretary Jeh Johnson revitalizes the 'One DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-Secretary- Jeh-Johnson-revitalizes-One-DHS-vision Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security- measures-make-for-a-different-event DHS as the Epicenter for Cybersecurity in Government (Government Security News): http://www.gsnmagazine.com/node/32882?c=cyber_security Native Americans key to border security success http://thehill.com/blogs/pundits- blog/immigration/214494-native-americans-key-to-border-security-success Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have- called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the- private-sector
  • 16. Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011 Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations- webinar-evolving-role-cybersecurity-department-homeland-security “Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet of Things; Health & Medicine; and, Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html Public/Private Partnerships (FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners hips/ Chuck Brooks presentations at Global Risk Expo in ASTANA, KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk- expo Featured Speaker:Chuck Brooks - Homeland Security Week 2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234 Featured Speaker: Homeland Security Week 2014 Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi ty+Week+2014+Conference Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/ Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek- to-accelerate-record-digitization/ The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting)http://www.prweb.com/releases/2014/02/prweb11609927.htm Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks- joins-the-franklin-foundation-board-of-directors.html Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower | Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark- amtower
  • 17. Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx How Big Data Will Revolutionize Aviation Security (ChuckBrooks Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new s%5D=32217 Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek- to-accelerate-record-digitization/ Transaction Processing is at the Root of Data Analytics http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data- analytics/#prettyPhoto BizCatalyst 360: Digital Government Yields Customer Service Innovation http://bizcatalyst360.com/digital-government-yields-customer-service- innovation/ Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security Digital Government Yields Exciting Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields- exciting-innovation/ Transforming US Border Crossing http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control- processing-through-automation/ Radio Interview: All things LinkedIn - FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Laskyhttp://www.securityinfowatch.com/article/11416172/boston-marathon-security- measures-make-for-a-different-event DHS's Special Partnership with Native Americans Homeland Security Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
  • 18. Pausing Before Tapping “Connect:” Can Privacy and Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/ The Future of Social Media (Chuck Brooks quote) http://www.business2community.com/social-media/future-social-media-60-experts- share-2014-predictions-0718083 Next Practices Institute Events - Executive Next Practices Institutehttp://www.enpinstitute.com/events/ What Government Agencies Can Learn From The Private Sector (FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact- centers-for-consolidation-3-takeaways-from-the-private-sector/ Xerox Real Business Radio Online Radio | BlogTalkRadio http://www.blogtalkradio.com/xeroxradio Interview - Global Radio Talk Show – Interviews with Business Leaders ... http://globalradiotalkshow.com/ Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have- called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the- private-sector The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm Mobile Apps Continue to Shape Government Agencies http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape- government-agencies/#.VjZQ1_mrTIU Combining Legislation and technology for Better Government Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology- better-government-customer-service.htm Radio Interview: The U.S. Needs a Proactive Approach To Combat Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive- approach-to-combat-cybercrime/
  • 19. Featured Speaker; Symposium on Homeland Security & Defense http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015- Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf Interview with Chuck Brooks The Business Edge | VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge Featured Speaker; The Counter Terrorist magazine http://www.thecounterterroristmag.com/conference/ Moderator, Technology Conference - Association for Corporate Growth http://www.acg.org/boston/technologyconference.aspx Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc.http://www.fbcinc.com/e/cybermdconference/speakers.aspx Cybersecurity 2014: Beyond the NIST framework - FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/ How Wearable Devices Can Transform Contact Center Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable- devices-can-transform-contact-center-operations/ Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox: What are your Homeland Security views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html How To Successfully Implement Social Media For Business Development In Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1 2dcc3742b7d609543#.VSK8z5h0xdg Listed as one of the top 50 in "Data Sciences" on LinkedIn article http://www.datasciencecentral.com/profiles/blogs/25-data-scientists- popular-on-linkedin 25 Data Scientists Popular on LinkedIn Posted by Vincent Granville Keeping Pace With a Streamlined Service Approach http://government.blogs.xerox.com/2014/11/05/keeping-pace-streamlined-service-approach/ Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014- beyond-nist-framework/
  • 20. Featured Speaker: Social media in Government conference http://aliconferences.com/events/social-media-in-government_0515/ CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/ CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit y%202014%20Outline.pdf xerox | GovCon Executivehttp://www.govconexecutive.com/%3Fs%3Dxerox Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington, DC Washington '14 March - Global HR Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271 Public/private partnership is key to be competitive in any market. The Know How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive- in-any-market-the-know-how/ ----------------------------------------------------------------------------------------------------------------------------- --------------- Chuck Brooks – Winner of 2016 Cybersecurity Excellence Awards By American Admin - March 25, 2016
  • 21. Chuck Brooks, "Cybersecurity Marketer of the Year" We are excited to announce that Chuck Brooks has been named the WINNER of “Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The Awards are an annual competition that honors individuals and companies that demonstrate excellence, innovation and leadership in information security. Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing issues across all mediums. He is known for his thought leadership on cybersecurity issues and has published on these topics in the Huffington Post, Forbes, Government Security News (regular contributor) . The Hill (featured contributor), Federal Times (featured contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor), and Biometric Update (featured contributor). He is Vice Chair of CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech, Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He has also been a featured speaker and panelist at many conferences and events.
  • 22. About Chuck Brooks Most of us know his via social media for his regular posts and may be one of his 32,000 followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Government Solutions. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University. He has an MA from the University of Chicago and a BA from DePauw University.  Chuck thought leadership writings on cybersecurity have helped shape the public policy debate as he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He also has a strong following at many of the embassies in Washington, DC  Chuck is a pioneer in social media with a global following and has brought significant attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter, Facebook, FedScoop, and other social media  Chuck brings experience from service in the public sector, academia, and with corporations. He serves on a variety of boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a special expertise of cybersecurity in government that have benefited both the not-for-profit, public, and commercial sectors. -----------------------------------------------------------------------------  Christian Science Monitor’s Passcode Influencers gathered from 120 experts from across government, the private sector, research, and the privacy advocacy community
  • 23.  s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outre Thought Leadership, Strategic Partnering, Branding) for the Federal a  Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates Technology Partner network and serves on Boards to several prominent public and private companies and organizations. Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity
  • 24.  d State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates  The poles of debate are still forming in the Digital Age. There is no common philosophy defining what constitutes a "hawk" or a "dove" in cyberwar. International norms for countries' behavior on the Internet are not yet established. There's still no consensus about the appropriate balance between personal privacy and national security when it comes to government surveillance or private-sector encryption. Many companies and organizations are divided about the best defenses that will shield them from online attacks.  Passcode, The Christian Science Monitor's new section on security and privacy, formed an Influencers Poll to foster debate and discussion in this space. We regularly survey a wide swath of in-the-know experts about the most pressing issues – and share their answers and opinions with our readers. To form our pool of Passcode Influencers,we gathered more than 120 experts from across government, the private sector, research, and the privacy advocacy community. ----------------------------------------------------------------------------------- Navigating the four pillars of Washington By Chuck Brooks, contributor Washington is an eclectic city. It is a metropolis that is thriving economically and socially. Its architectural design is modeled after Paris and it is certainly a city of cultural diversity and historically interesting neighborhoods. Visually, the site of the
  • 25. monuments reflecting against the panoramic backdrop of the Potomac River is memorable for both visitors and native Washingtonians alike. It is really a city like no other city in America. Although it may be geographically small, Washington serves as the engine of government, an anchor of global financial policy and representation, a seat of institutionalized policymaking organizations, and as a growing center for business, especially in high tech. When I first came to Washington, I was overwhelmed by the intensity of life "inside the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain how to navigate it and decipher how things worked. Looking back, I would like to offer structure and pathways for others contemplating a public service career or seeking to accomplish tangible objectives for policy and/or business purposes in the nation's capital. There are four pillars that comprise the foundation of the operational world of Washington: government (executive, judicial and legislative branches); commercial (business, including global financial institutions; policy: (academia, think tanks and associations/organizations); and media (old and new). These pillars function both individually and collectively. They are intertwined and to be effective, it is essential to understand their roles and impact on what you hope to accomplish. Understanding and gaining experience within these pillars that comprise the operational system of Washington takes focus and time. Success can be realized by navigating the pillars and establishing a strategy of strategic relationship building and connecting. Government: There has never been any doubt that government and politics make Washington tick. Government is not only the basis for tens of thousands of jobs in the area, but it also serves as the fulcrum for evolving and communicating domestic and international policies. Government is the center for laws and executive orders overseeing all aspects of our daily life and our professions. The Pentagon, intelligence agencies, and Department of Homeland Security are all based in Washington because it is the epicenter of power and decision-making. Government in Washington is by design structured as a system of check and balances. An understanding of how the various branches of government function is essential to influencing any regulatory outcome whether it be energy, healthcare or a national security issue. Working on Capitol Hill is invaluable experience and connects to all the pillars and is a special pedigree for mobility in one's career. Commercial: Although it is not a financial center like New York, Washington has been transforming over the years as a commercial hub. The World Bank, Federal Reserve, International Financial Corporation and the Chamber of Commerce are some of the organizations headquartered in the city. Many corporations have also relocated to the area to be near the action and position themselves for government and commercial opportunities. Both Virginia and Maryland have established high- tech corridors close to the city for those reasons. The international community with their embassies and trade groups increasingly see Washington as a growing center for commerce.
  • 26. Policy: It is not only the pillars of business and government that are cogs in the machine. Policy organizations (such as the Center for Strategic and International Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise Institute and the Aspen Institute) that provide issue expertise, training and solutions are really the enabling fuel. A myriad of think tanks offer the latest insights in domestic and global events on a regular basis. Top local universities (such as Johns Hopkins's School of Advanced International Studies, George Washington, Georgetown, American, George Mason, and Maryland), also promote dialogue and informed decision-making and access. The over 6,000 associations and organization with issue specific interests regularly outreach to key decision–makers who are part of the public and private sector pillars. Strategic communications and thought leadership are integral tools for persuasion. Media: The media are disseminators of information, with the duty to circumspect the activities of the other three pillars. The media's role is a fundamental one; any system of democratic government cannot operate without transparency and oversight. In Washington, most of the country's key media outlets have representation. Outside traditional old media, new media has become a force to consider. Most citizens have constant access and the metrics of public opinion are constantly pulsed. Corporate executives and government leaders use the social media, especially LinkedIn, Facebook and Twitter as part of their work environments. Government 2.0 and Business 2.0 are becoming the norms. Working in one or all of the pillars is helpful in terms of building issue expertise, contacts and gaining a holistic perspective of how Washington really works. This experience can provide the tactical knowledge to advance your marketing efforts and/or cause in the public/private world. There is no substitute for experience and for building a personal network to be empowered and effective. To be successful, you have to always keep abreast of the latest trends and be visible and helpful to your customer. In the Washington arena, you also have to develop the qualities for resilience and persistence as no one is always on the winning side of issues and contracts. Washington will always have its image challenges and be an enigma as to how it functions, especially to those who have never experienced life inside the Beltway. Exploring and experiencing the four pillars will bring an understanding of how to navigate a path to success for those who come to this amazing city to make a difference and leave a positive legacy. ---------------------------------------------------------------------------------------------------------------- Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element
  • 27. Cybersecurity expert Chuck Brooks talks about where we stand in what many people call the "wild, wild west" of cybersecurity. http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will- Always-Be-the-Human-Element.html BY LARRY KARISNY / MARCH 1, 20160 If you're in the cybersecurity business, you know the name Chuck Brooks. He is an advisor to the Bill and Melinda Gates Foundation Technology Partner Network, chairman of CompTIA's New and Emerging Tech Committee, subject matter expert to the Homeland Defense and Security Information Analysis Center, “passcode influencer” for The Christian Science Monitor,on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience Institute. Brooks also has authored numerous articles focusing on cybersecurity,homeland security and technology innovation for such publications as Forbes, Huffington Post,InformationWeek,MITSloan Blog, Computerworld, Federal Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland Security Today,The Hill and Government Executive. I recently got a chance to get Brooks' take on where we are today in what many people call the "wild, wild west" of cybersecurity. Here are his thoughts. Q. You wear manyhats and certainlyhave been focused on cybersecurity for some time now. So tell me, who is ChuckBrooksand what is he trying to accomplish this space? A. You are right, over my career in government, corporate and academia,I have worn many hats. There have been some strong common threads [of] science, technology, national security,and legislative and executive policy in all my various roles. Thankfully, I selected a professional vocation of government relations and marketing that encompasses all those threads. My passion for cybersecurity issues was first established over a decade ago during the time I spent at the Department of HomelandSecurity’s Science and Technology Directorate. Back then, the threats to our critical infrastructure were not as pronounced as they are today. Of course we were just beginning to experience the smartphone era. The field of cybersecurity has evolved exponentially along withthe technologies, networks and connectivity that make up the cyberecosystem. And the ecosystem is quite diverse and expansive, comprising software, hardware,
  • 28. monitoring, forensics, governance and more. All these elements make it an exciting area to explore since there is always more to learn from strategy and technology perspectives. Also, it certainly blends my common career threads. For anyone’s career focus, studying cybersecurity makes [sense] since it touches everything work- or personal-related. In both the public andprivate sectors — just about every CIO survey — cybersecurity is the top concern. And of course, along with data analytics, cybersecurity is a annually a budget priority of federal spending.DHS Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the two top priorities for the protecting the homeland. What I want to accomplish in this space is to continue being a subject matter expert in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic and especially in educating others on how it can impact their lives. My advisory and board director roles with organizations are a reflection of that interest. When I retire (which is a long way off), I hope to join academia again in a part-time role. I spent two years at Johns Hopkins University SAIS [School of Advanced International Studies] teaching graduate students homeland security and foundit very fulfilling. Q. You have one of the most active groups in LinkedInunder theheading of the Department of Homeland Security. How has this helped both yourself and DHS in feeling thepulse of the cybersecurity industry? A. I do operate a half dozen groups that focus on homeland security and information security on LinkedIn, including a few of the largest groups: “U.S.Department of Homeland Security, DHS” “Information Technology (Homeland& National Security)” and “Homeland Security.” In all, these groups include about 60,000people. Among the members are a host of well-known cybersecurity professionals who often post and comment on issues of the day. Also, as any news on data breaches or cyberincidents occur,they are often posted in the LinkedIn groups. Moderating these groups certainly keeps me updated and in tune with the pulse of policy. It has also served as a great networking venue to share ideas and information with some of the best security minds around in both the private and federal sectors. Many senior-level executives in the federal government are on social sites such as LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million federal government employees who regularly use LinkedIn, includingover 65,000 from DHS. Because of the growing need for public/private-sector collaboration and interface, being actively involved in social media makes a lot of sense.
  • 29. Q. What is Sutherland Government Relations and what do you do for the company? A. Sutherland Global Services is a global provider of business processing services, contact centers, IT service desks and management consulting serving government and U.S. leading corporations across multiple industries,including healthcare and insurance, technology, mortgage and loan services, finance and banking,retail,and travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion, [and] was listed in 2015 as one of the fastest growing private companies in America byInc. I work for the recently created Sutherland Government Solutions as VP of Government Relations and Marketing, where we are at several agencies and are known for integrated services for citizen service needs and digital government. Our cybersecurity operations at Sutherland Government Services are internal, butwe do have a practice in customer relations management after a company or agency has been breached. Our cybersecurity practice is led by Glenn Schoonover who has a deep technical background. He is a former chief information security officer for the Army and was responsible for providing network security to the Department of the Army headquarters. He is also a former senior technology strategist for Worldwide National Security and PublicSafety at Microsoft. Q. I see you are active in both the public and private sectors when it comes to cybersecurity. What are the similarities and differences between these two sectors? A. The biggest difference is that government is motivated by mission, and the private sector (for the most part) is driven by profit and loss. The R&D efforts, innovation sector and skilled technical expertise in the private sector has been more robust than in government. Industry is more agile and able to react to threat trends. On the federal side, the landscape has really changedover the past few years. [The U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting mission and continues to build upon new requirements for operations and for systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity. Presidential and congressional directives have mandatedthat DHSplay a growing and more primary role, especially with protecting critical infrastructure (transportation, health, energy, finance) that is mostly owned by the private sector. DHS has to step up its activities in assessing situational awareness,information sharing, and resilience research and development plans with stakeholders. This has led to a trend in public-private partnering for sharingthreat informationand in creating standards and protocols. In both the publicand private sectors, training of the next-generation cybersecurity technical and policy [subject matter experts] is a major priority.
  • 30. Q. To date,thereseems to be a stand-off between Apple and the federal government when it comes to iPhone security.What are your thoughts on this,and can thisbring aboutsome lessons learned for the cybersecurityindustry? A. This is the topic of the day, and it is a complicated issue relating to government requesting a corporation to provide software to allow access to data. My thoughts may be a bit different from some of the others in the industry. While I recognize the importance of privacy and the dire risk of an Orwellian surveillance state,I consider protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network planning more horrific acts? In my opinion, this is a mitigating circumstance. What should be done is to establish protocols between industry and law enforcement to cooperate in these type of instances (with proper warrants and assurances) so that company Internet protocol can be isolated and privacy issues for the company’s customers can be best addressed. I am quite sure Congress will be looking closely at this case to establish legislation to create a working formula.The lesson for cybersecurity is that there is a balance between privacy and security that has to be constantly reviewed in accordance with the threats at hand. Q. With billions of Inernet of Things devices on the near horizon and zetabytes of data projected by2020,can we secure and control our digital processes, or arewe headed for a digital train wreck? A. According to Gartner, there will be nearly 26 billion networked devices on the Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of sensors decreases and processing power and bandwidth continue to increase. The fact is that most of these IT networks will have some sort of an IoT-based security breach. We could be headed for a digital train wreck if IoT security standards are not adopted. We may have a digital train wreck even if they are adopted. Standards will have to be developed industry by industry. Protecting a network of medical devices in a hospital will require different sets of standards than protecting utilities with SCADA [supervisory control and data acquisition] systems that make up the electric grid. There are a lot of questions, including who enforces compliance? And what are the liabilities of an IoT breach? The real danger is that the Internet was not built for security at its inception; it was built for connectivity. There is some truth to the notion that your network may someday be betrayed by your toaster or refrigerator. One thing is for sure: the Internet of CYBERSECURITY EXPERT CHUCK BROOKS' MASTER LIST OF CYBERSECURITY TECH
  • 31. Things will pose many challenges to cybersecurity and data analytics, muchof which we have yet to contemplate. Q. You've had theopportunity to review many cyberdefense technologies. Are we really finding new solutions that can handle this explosion of digital processes,or are we still playing the game of catch-up and patch-and-pray cybersecurity? A. New solutions are continually evolving with threats, but there will always be a need for better encryption, biometrics, analytics and automated network security to protect networks and endpoints. It is a perpetual game of cat and mouse between hackers and protectors, and there is really no such thing as being invulnerable. In a sense, we are continually playing catch- up and reacting to the last incident with patches. The weakest link will always be the human element. However, there are many new interesting technologies that could significantly impact cybersecurity in the near future. There are technologies and algorithms coming out of the national labs, government, and from private-sector R&D and startups that have the potential to be disruptive. Q. Any final comments? And are there any speaking engagements or eventsyou areparticipating in that you would like to announce? Could you also offer a good source for information on the subject of cybersecuritythat you would suggest for our readers? AREAS, PRIORITIES AND EMERGING TRENDS Emerging Technology Areas: // Internet of Things // Wearables // Drones and robots // Artificial intelligence // Smart cities // Connected transportation // Quantum computing Priorities: // Protecting critical infrastructure through technologies and Public/Private cooperation // Better encryption and biometrics (quantum encryption, keyless authentication) // Automated network-security correcting systems (self-encrypting drives) // Technologies for “real-time” horizon scanning and monitoring of networks // Diagnostics and forensics (network traffic analysis, payload analysis and endpoint behavior analysis) // Advanced defense for framework layers (network, payload, endpoint, firewalls and antivirus) // Mobility and BYOD security // Big data // Predictive analytics // Interoperability Trends: // Informed risk management // Emergence of public/private sector partnerships // More information sharing and collaboration between the public and private sectors // Shared R & D spending
  • 32. A. Please check my regular posts in the media and social media, join my LinkedIn groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with the National Cybersecurity Institute on my agenda. Also, in addition to social media, which I highly recommend, there are many excellent outlets for cybersecurity information including theHomelandDefense and Security Information Analysis Center. A great site that aggregated cybersecurity news daily is The CyberWire. Larry Karisny | Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting advanced cybersecurity technologies in both the public and private sectors. // Increased spending for cloud computing // Consolidation of data centers // Expansion of hiring and training of cybersecurity workforce // Tech foraging