SlideShare a Scribd company logo
1 of 41
Chuck Brooks
Subject MatterExpert & Thought leader:
 Cybersecurity& Homeland Security
 Emerging Technologies:Smart Cities, Artificial Intelligence, Quantum
Computing, Big Data, and Internet of Things
 Government Relations & Marketing:“How to do business in
WashingtonDC”
Chuck Brooks Named by LinkedIn as the #2 Person you
should be following on Tech issues out of 500 million
members
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for
Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach,
Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets.
Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and
serves on Boards to several prominent public and private companies and organizations. He is a
subject Matter Expert to The Homeland Defense and Security Information Analysis Center
(HDIAC), a Department of Defense (DoD) sponsored organization through the Defense
Technical Information Center (DTIC). Chuck also advised the Bill and Melinda Gates Technology
Partner network, Chuck has extensive service in Senior Executive Management, Marketing,
Government Relations, and Business Development and worked in those capacities for three
large public corporations. In government, he served at the Department of Homeland Security as
the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent
six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty
Member at Johns Hopkins University where he taught graduate level students about homeland
security and Congress. He has an MA in International relations from the University of Chicago,
and a BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
Summary of Experience:
* Corporate: Extensive service in Senior Executive Management, Government Relations (also
Lobbying & PAC management), External Relations, and Business Development/Sales for three
large public corporations. Managed own successful PR and Government Relations consulting
firm.
* Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald Reagan (Voice
of America). Helped "stand up" Office of Legislative Affairs at the US Department of Homeland
Security and served as the first Director of Legislative Affairs at the Science & Technology
Directorate. Served as a Senior Legislative Staff (defense & foreign affairs, national security,
business) to the late Senator Arlen Specter at the U.S. Senate.
* Affiliations:
 Former Technology Partner Advisor, Bill and Melinda Gates Foundation
 Chairman, CompTIA New and Emerging Technology Committee
 PASSCODE INFLUENCER, Christian Science Monitor
 He is a subject Matter Expert to The Homeland Defense and Security Information
Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization
through the Defense Technical Information Center (DTIC)
 Advisory Board, Center for Advancing innovation
 Board of Directors, Ecrypt (public company now called Bravatek)
 Board of Advisors, Cyber Resilience Institute
 Board of Advisors CyberTECH
 Board of Advisor B2B Cybersecurity
 Member, Institute of Electrical and Electronics Engineers IEEE Standards Association
(IEEE-SA) to participate in their Virtual Reality and Augmented Reality Working Group.
 AFCEA Cybersecurity Committee
 Member, Professional Services Council Homeland Security Task Force
 Governance Committee of the IJIS Institute (supported by DHS & DOJ)
 Board of Directors of the Safe America Foundation
 Board of Directors of the Franklin Foundation (Innovation and Stem focus)
 Board of Directors of “One World For Life” (Emergency Management focus)
 Lead Judge, the 2013 and 2014, 2015, and 2016 Homeland Security/Border Security
Awards (Government Security News)
* Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on Linked
In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined members). Top
1% viewed profile on LinkedIn. 32,000 first degree connections, mostly executive level. Over
2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise areas include:
homeland security, cyber security, intelligence, defense, foreign affairs, IT, R & D, science &
technology, political risk, strategic partnering, business development/sales, government
relations, legislative/budget processes, thought leadership, innovation, and social media.
(Huffington Post, Forbes, Government Security News (regular contributor) .The Hill (featured
contributor), Federal Times (featured contributor), Christian Science Monitor (Member of
Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today,
Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor),
Government Technology, Biometric Update (featured contributor)
* Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course
for two years). Produced webinar on DHS & Cybersecurity for George Washington University
 Cybersecurity Marketer of the Year 2016,17 – Chuck Brooks
Chuck Brooks (Sutherland Government Solutions) – WINNER
From the Official LinkedIn Marketing Blog:
“5 Tech VoicesYou Should Be Following on LinkedIn”
https://lnkd.in/b9GwGBs
Chuck Brooks – Security Voice and “Government Relations and
Marketing Executive, Thought Leader”
Chuck’s varied security experience is evident in what he publishes.
From aviation to public sector, government to science, his posts take on
the multifaceted aspects of cyber security as it relates to
industries/verticals, homeland issues and next-gen technology. Since he’s
keen on variety, with formats ranging from expert Q&As to content
roundups, to non-tech posts associated with topics/verticals he’s covered,
his perspective truly stands out.
Tech marketer takeaways: Chuck focuses core content on security, but
isn’t afraid to include content tangentially related to core subject matter
(e.g. a post focused on mastering the art of influence in Washington, D.C.)
which incorporates fresh/unexpected content to help keep readers
interested and foster conversation.
Chuck Brooks named chairman of CompTIA New and Emerging
Technologies Committee
Thu, 2017-04-20 10:03 AM
CompTIA’s New and Emerging Technologies (NET) Committee announced today
that Chuck Brooks, vice president of Sutherland Government Solutions, will serve
as the 2017 chairman of the New and Emerging Technologies Committee.
CompTIA’s NET Committee addresses the impacts of big data and data analytics,
cloud, mobility, artificial intelligence, supercomputing, digital government, smart
cities, and the Internet of Things. Founded last year, it has a mission that brings
together the brightest technological minds in the industry to help address the
current and future emerging technology policy landscape. The committee is
currently involved in advocating for legislation that focuses on smart cities and
communities.
Brooks serves as vice president for government relations and marketing for Sutherland Global Services.
Chuck was recently cited as one of the top five people to follow on technology issues by LinkedIn. He served
Brooks
at the Department of Homeland Security as the first director of legislative affairs for the Science and
Technology Directorate and also spent six years on Capitol Hill as a senior advisor to the late Senator Arlen
Specter. Chuck also advised the Bill and Melinda Gates Technology Partner Network and serves on the board
of several technology innovation organizations. He was an adjunct faculty member at Johns Hopkins
University, has an M.A. in international relations from the University of Chicago, and a B.A. in political
science from DePauw University. Chuck is widely published on the subjects of innovation, public and private
partnerships, emerging technologies, and issues of homeland security and cybersecurity.
Source:https://www.comptia.org/about-us/newsroom/blog/comptia-
blog/2017/04/13/comptia-new-and-emerging-tech-committee-names-chuck-brooks-chairman
Chuck Brooks as FeaturedSpeaker (partial list of events):
 National Academy of Sciences/FBI Biosecurity Meeting 2016
 USTRANSCOM Cybersecurity Roundtable 2017
 The InformationSystemsSecurityAssociation(ISSA) 2017 Mid AtlanticConference
 George Washington UniversityCybersecurityevent
 Institute of Management Consultants Conference 2016
 Critical Security Controls Editorial Panel, Council on Cybersecurity
 DC Cybersecurity Summit (Securing The IoT) 2016
 CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness) 2016
 National Cybersecurity Institute
 Global Cyber Threat Summit
 Kaspersky Cyber Security Conference 2015
 IDGA Homeland Security Week conference
 Homeland Security Professionals Conference 2015
 Secure Cities conference 2014
 CyberMaryland conference 2014/15
 National Press Club, Global Business News events 2014/15
 Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review
co-sponsor)
Issue areatopics of writings/presentations/interviews/:
 Cybersecurity
 Homeland Security
 Emerging Technologies
 Transaction Processing
 3-D Printing
 Big Data
 Internet of Things (IoT)
 Wearables
 Cloud Computing
 Context-aware Computing
 Artificial Intelligence
 Critical Infrastructure Protection and Information Assurance
 Data-Centers and Data-Center Consolidation
 Digital Government
 Digital Trust and Identity Integration and Management
 Digitization and Imaging
 Defined Leading Edge Technologies
 Mobility
 Outsourcing IT Services
 Contact Centers
 Sensors, Devices and Radio Frequency Identification (RFID)
 Software Development
 Virtualization
 Web Analytics
Example Speech Topics: “The Cybersecurity Threat to You and
Your Business”, “UnderstandingCybersecurity”, “New
Technologiesand Strategies for Ensuring Physicaland
Cybersecurity”, “The Dawn of a New Technological Era”,How to
Do Business In Washington, DC”, “How to Use Social Mediato
Brand, Market, and Win Business”
Links to Writings, Webinars, Conference Speeches, Radio
Interviews:
5 Tech Voices You Should Be Following on LinkedIn https://business.linkedin.com/marketing-
solutions/blog/marketing-for-tech-companies/2016/5-tech-voices-you-should-be-following-
on-linkedin
Meeting Security Challenges Through Vigilance, Readiness and Resilience
http://www.brinknews.com/?p=5052?utm_source=BRINK+Subscribers&utm_campaign=b9404
3847f-BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c98-
b94043847f-110145109
Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C-Suite
https://highperformancecounsel.com/expert-chuck-brooks-offers-cybersecurity-cheat-sheet-c-
suite/
Defining and Addressing the Growing Cyber Insider Threat
https://www.alienvault.com/blogs/security-essentials/defining-and-addressing-the-growing-
cyber-insider-threat
Automation technologies and the changing cybersecurity
ecosystem http://gsnmagazine.com/node/48279?c=cyber_security
NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update with
ChuckBrooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc05/
ChuckBrooksexplainsthedifferencebetweenICSandITsecurity
http://iiot-world.com/cybersecurity/chuck-brooks-explains-the-difference-between-ics-and-it-
security/
Homeland Security wins in Trump budget, especially in cybersecurity [Commentary]
http://fifthdomain.com/2017/03/17/homeland-security-wins-in-trump-budget-especially-in-
cybersecurity-commentary/
The cybersecurity priority for DHS in 2017 http://www.federaltimes.com/articles/the-cybersecurity-
priority-for-dhs-in-2017
Congress had an office that gave expert tech analysis; let's bring it back
http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-an-office-that-gave-
expert-tech-analysis-lets
Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise
https://www.alienvault.com/blogs/security-essentials/recent-attacks-demonstrate-the-urgent-need-
for-c-suite-cybersecurty-expertise
Will Vulnerable U.S. Electric Grid Get a New Protection
mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a-new-protection-
mandate/
Creating A Secure Smart City http://www.qognify.com/blog/creating-secure-smart-city/
Alarming Cybersecurity Stats You Should Know by Chuck Brooks
http://insights.tridentcybersecurity.com/post/102e12n/alarming-cybersecurity-stats-you-
should-know-by-chuck-brooks
And I Think To Myself, What A Virtual World https://itspmagazine.com/from-the-
newsroom/and-i-think-to-myself-what-a-virtual-world
CHUCK BROOKS:THEIIOTPOTENTIALCYBERTHREATSCONSEQUENCES HTTP://WWW.IIOT-
WORLD.COM/CYBERSECURITY/CHUCK-BROOKS-THE-IIOT-POTENTIAL-CYBER-THREATS-CONSEQUENCES/
Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber-
defense-in-an-imperfect-world-a-new-approach/
Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL Magazine
http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-part-iv-securing-vote
US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computing
Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-watch-follow-the-tech-
leader/
Gen Touhill brings vision, strategy as nation’s first CISO
http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-as-nations-first-ciso
The Emerging Trend of Gamification in Cybersecurity
https://www.alienvault.com/blogs/security-essentials/the-emerging-trend-of-gamification-in-
cybersecurity
Emerging Focus on Cyber Threats to the Energy Infrastructure
http://www.federaltimes.com/articles/emerging-focus-on-cyber-threats-to-energy-infrastructure
Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape
https://www.alienvault.com/blogs/security-essentials/safeguarding-patients-and-data-in-
the-evolving-healthcare-cybersecurity-landscape
How The Next Administration WillReshape DHS
http://www.federaltimes.com/articles/how-the-next-administration-will-reshape-dhs
Socializing Citizen Services In The Public Sector http://bizcatalyst360.com/socializing-citizen-
services-in-the-public-sector/
NCF-DC1 Washington DC Cyber News Update With Chuck Brooks
http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/
NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role-
elevated-new-legislation/85934982/
Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private-
cybersecurity-alliances
The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
Are There Potential Intelligent Neighbors On Planets Close To Earth (And Beyond)?
http://bizcatalyst360.com/are-there-potential-intelligent-neighbors-on-planets-close-to-earth-
and-beyond/
The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe
http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/
4 stepsto a strong incidentresponse plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong-
incident-response-plan.html
Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-
new-era-quantu m-computing/
UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will-
thrive-with-or-without-brexitooperation
Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-
career-path-native-americans/84455826/
The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the-
rise-of-the-chief-data-officer
Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from-
the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers
The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-
blog/technology/280481-the-government-explores-artificial-intelligence
The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the-
newsroom/the-cusp-of-technological-transformation
The Globality Quotient: Cybersecurity (ChuckBrooks
Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/
Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-
Link-Will-Always-Be-the-Human-Element.html
DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge-
securing-soft-targets/82350628/
Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence
Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity-
excellence-awards/
3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially
ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and
marketing at SutherlandGlobal Services. “Anyone andeveryone is vulnerable,” he said. “The expandinginterconnectivityof our
devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often
quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst-
for-technological-progress
The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of-
awards/8
Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland-
security-priorities-watch-2016/77368604/
Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016
Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming-
millennial-workforce/
HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn-
tv/hsn-charles-brook-interview?Itemid=
The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/
7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting-
innovators-in-2016/
The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks
interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security-
government-readiness
Smart cities, the Internet of Things and the Blue
Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart-cities-the-
internet-of-things-and-the-blue-revolution
Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting-
internet-things-and-living-smart-cities/72742172/
Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does-
government-need-hardware-separated-operating-systems/121826/
Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male-
interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/
The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-
blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington
Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security
News) gsn 2014 digital yearbook of homeland security awards recipients
Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html
Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-
blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon
Solving Problems with Technology
Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
Government prioritizes digital engagement
(Computerworld) http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-explores-
wearables/#more-21
The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-
8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks
Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new-
digital-economy/#.VKriQCvF91Y
Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it
is too late) http://www.voodootec.com/author/chuckbrooks/
Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation-
commitment-key-for-govt-industry-cyber-partnerships/
Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar
DHS, FBI stepping up digitization of
Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
Internet of Things, New Frontier of Technology
Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
Wearables Bring New Sense of Fashion to Public
Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring-
new-sense-fashion-public-sector/104679/
DHS: A decade (and more) of competing
congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D
HS-decade-more-competing-congressional-oversight
Huffington Post Cybersecurity Industry Interview With Xerox's Chuck
Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital-
role-confronting-threat-pandemics-bioterrorism
"Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and-
innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036?
Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/
Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate-
partnerships-and-planning/
DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958-
dhs-s-special-partnership-with-native-americans
TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at
Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is-
back-in-the-limelight
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link
Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288-
transportation-security-back-to-the-future
Chief Data Officers in the Government – What Role Should They Play?
https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what-role-
should-they-
play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig
n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh
Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-
data-what-its-worth/#.VSLft5h0xdg
Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s
ecurity_discussi
The public/private imperative toprotect the grid by ChuckBrooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives-
innovation-DHS
“Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-
brooks
The public/private imperative toprotect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative
Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security
Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234
Tech Interviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S
chedule_for_March_1620/
DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-
Secretary-Jeh-Johnson-revitalizes-One-DHS-vision
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
Native Americans key to border security success http://thehill.com/blogs/pundits-
blog/immigration/214494-native-americans-key-to-border-security-success
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal
Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011
Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of
Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-
webinar-evolving-role-cybersecurity-department-homeland-security
“Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet
of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html
Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners
hips/
Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk-
expo
Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234
Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi
ty+Week+2014+Conference
Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies (Presenting)
http://www.prweb.com/releases/2014/02/prweb11609927.htm
Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of
Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks-
joins-the-franklin-foundation-board-of-directors.html
Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark-
amtower
Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
How Big Data Will Revolutionize Aviation Security (ChuckBrooks
Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new
s%5D=32217
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data-
analytics/#prettyPhoto
BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-service-
innovation/
Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to
present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://gsnmagazine.com/node/41412?c=cyber_security
Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields-
exciting-innovation/
Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control-
processing-through-automation/
Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve Lasky
http://www.securityinfowatch.com/article/11416172/boston-marathon-security-measures-
make-for-a-different-event
DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-media-60-experts-
share-2014-predictions-0718083
Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact-
centers-for-consolidation-3-takeaways-from-the-private-sector/
Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
Interview - Global Radio Talk Show – Interviews with Business Leaders
... http://globalradiotalkshow.com/
Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in
Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape-
government-agencies/#.VjZQ1_mrTIU
Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology-
better-government-customer-service.htm
Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive-
approach-to-combat-cybercrime/
Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015-
Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf
Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc.
http://www.fbcinc.com/e/cybermdconference/speakers.aspx
Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable-
devices-can-transform-contact-center-operations/
Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox:
What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html
How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1
2dcc3742b7d609543#.VSK8z5h0xdg
Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists Popularon
LinkedIn” Posted by Vincent Granville http://www.datasciencecentral.com/profiles/blogs/25-
data-scientists-popular-on-linkedin
Keeping Pace With a Streamlined Service
Approach http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-on-
linkedin
Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014-
beyond-nist-framework/
Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-government_0515/
CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit
y%202014%20Outline.pdf xerox | GovCon Executive
http://www.govconexecutive.com/%3Fs%3Dxerox
Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington,
DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive-
in-any-market-the-know-how/
It was an honor co-presenting with John Perren former Assistant Director of the
Weapons of Mass Destruction Directorate of the FBI, and LTC Scott Appelgate,
Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs Of Staff and Dr.
Frederic Lemieux Professor and Program Director, at the National Security Threat
Convergence: Violent Extremism and Cybersecurity event at George Washington
University
Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors Including:
Chuck Brooks
Vice President for GovernmentRelations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Growing Risk of Security Breaches as it Relatesto the
Internet of Things
Meeting: BOARD ON LIFE SCIENCES and
BOARD ON CHEMICAL SCIENCESAND
TECHNOLOGY
Safeguarding the BioeconomyIII
Safeguarding the Bioeconomy III: Securing Life Sciences Data
Speaker: Charles (Chuck) Brooks serves as the Vice President for Government
Relations & Marketing for Sutherland Global Services. Chuck also serves as
Chairman of CompTIA’s New and Emerging Technology Committee, and he
serves as subject Matter Expert to The Homeland Defense and Security
Information Analysis Center (HDIAC), a Department of Defense (DOD)
sponsored organization through the Defense Technical Information Center
(DTIC). In government, he served at the Department of Homeland Security
as the first Director of Legislative Affairs for the Science & Technology
Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to
the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security
and Congress. He has an MA in International relations from the University of Chicago,
and a BA in Political Science from DePauw University, and a Certificate in International
Law from The Hague Academy of International Law. Chuck is widely published on the
subjects of innovation, public/private partnerships, emerging technologies, and issues of
homeland security and cybersecurity
From “Cybersecurity is Top Business Priority in 2017”
https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017
In assessing the severity of security flaws in cyberspace, I spoke with several experts in the
field.
Charles “Chuck” Brooks is the vice president for government relations and marketing for
Sutherland Government Solutions. He served at DHS as the first director of legislative affairs
for the Science and Technology Directorate. He ominously points out:
"The reality is that the more digitally interconnected we become in our work and personal
lives, the more vulnerable we become." -- Chuck Brooks
Mr. Brooks adds: "Mitigating cyberthreats will grow as a priority for business, and for us
personally, if we are to commercially function and prosper."
But how can companies successfully mitigate cyberthreats?
His advice: "The C-suites and governing boards of corporations will need to invest in better
enterprise and endpoint security toprevent phishing and malware probes by hackers. This
will also require better training of executives and employees in basic information security
measures."
Chuck Brooks wins Marketer of the Year at 2017
Cybersecurity Excellence Awards
Thu, 2017-02-09 01:49 PM
Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of
The New Emerging Technologies Committee for CompTIA, was named winner of
Cybersecurity Marketer of The Year at the 2017 Cybersecurity Excellence Awards.
The 2017 Cybersecurity Excellence Awards recognize companies, products and
individuals that demonstrate excellence, innovation and leadership in information
security. The finalists and winners were selected based on the strength of their
nomination and the popular vote by members of the Information Security
Community (both ratings and comments).
“Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year
category in the 2017 Cybersecurity Excellence Awards,” said Holger Schulze,
founder of the 350,000 member Information Security Community on LinkedIn which
organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners
and finalists reflect the very best in leadership, excellence and innovation in today's cybersecurity industry.”
Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as he is
respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been a force in
discussing, advocating, promoting cybersecurity issues across digital media, at events, in professio nal
forums, and with a variety of public policy organizations.
He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies in both
the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech Pe ople to Follow On
LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and conferences. He recently
presented at a workshop sponsored by The National Academies of Sciences, Engineering, and Medicine and
Brooks
the Federal Bureau of Investigation on Securing Life Sciences Data. He recently spoke at George Washington
University event about the Cyber Threat Spectrum, will be participating soon at USTRANSCOM Senior Leader
Cyber Security Roundtable.
Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology
innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT Security
Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government Security News, and
Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn and a global following and
has brought significant attention to cyber issues from his frequent posts and commentaries. He has been
involved as a judge for the past four years as a Judge for Government Security News’ Annual Homeland
Security Awards.
As a senior executive in government relations, marketing, and management, Chuck brings a unique
experience from service in the public sector, academia, and industry. He serves on a v ariety of boards,
many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a
special subject matter expertise of cybersecurity and homeland security in government that have benefited
both the not-for-profit, public, and commercial sectors.
Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral Jay
Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck Brooks. as Director of
Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress
in making the "reformation" of DHS S&T a complete success. His Hill/DC acumen, insight, reliability, ability
to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16
years dealing with senior executive branch officials, industry, academia and the Congress.”
Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate professional
who has a deep understanding of the issues, process, and people involved in the world of homeland security
and Law enforcement. His breadth of experience derived from working on The Hill, in government, in
academia, in industry, and with the media make him truly unique.”
Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national
security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at John
Hopkins University where taught homeland security for two years. He has advised a multitude of
organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and the Center
for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging Technologies
Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the Board of Advisors for
CyberTech, and on the Board of Directors at Bravatek, and the Cyber Resilience Institute. He is an advisor to
R & D cybersecurity company Inzero Systems. He is a subject Matter Expert to The Homeland Defense and
Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization
through the Defense Technical Information Center (DTIC. Chuck also serves as a Christian Science Monitor
“Passcode Influencers Panel member” on Information Security. He has a BA from DePauw University and an
MA from the University of Chicago.
----------------------------------------------------------------------------------------------------------------------------- ---------------
Chuck Brooks – Winner of 2016
Cybersecurity Excellence Awards
By American Admin -
March 25, 2016
Chuck Brooks, "Cybersecurity Marketer of the Year"
We are excited to announce that Chuck Brooks has been named the WINNER of
“Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The
Awards are an annual competition that honors individuals and companies that
demonstrate excellence, innovation and leadership in information security.
Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing
issues across all mediums. He is known for his thought leadership on cybersecurity issues
and has published on these topics in the Huffington Post, Forbes, Government Security
News (regular contributor) . The Hill (featured contributor), Federal Times (featured
contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland
Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360
(featured contributor), and Biometric Update (featured contributor). He is Vice Chair of
CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech,
Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of
Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He
has also been a featured speaker and panelist at many conferences and events.
About Chuck Brooks
Most of us know his via social media for his regular posts and may be one of his 32,000
followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for
Government Relations & Marketing for Sutherland Government Solutions. In
government, he served at the Department of Homeland Security as the first Director of
Legislative Affairs for the Science & Technology Directorate. He also spent six years on
Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct
Faculty Member at Johns Hopkins University. He has an MA from the University of
Chicago and a BA from DePauw University.
 Chuck thought leadership writings on cybersecurity have helped shape the public policy
debate as he is respected in industry, in the Federal Government, academia, and on Capitol
Hill. He also has a strong following at many of the embassies in Washington, DC
 Chuck is a pioneer in social media with a global following and has brought significant
attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter,
Facebook, FedScoop, and other social media
 Chuck brings experience from service in the public sector, academia, and with corporations.
He serves on a variety of boards, many of them philanthropic. He brings a substantive
knowledge on a broad range of cyber issues and a special expertise of cybersecurity in
government that have benefited both the not-for-profit, public, and commercial sectors.
-----------------------------------------------------------------------------
 Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
 s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government
relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital
Outre Thought Leadership, Strategic Partnering, Branding) for the Federal
a
 Charles (Chuck) Brooks serves as the Vice President for Government Relations &
Marketing for Sutherland Global Services. Chuck leads Federal and State & Local
Government relations activities. He is also responsible for the Marketing portfolio
(Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for
the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda
Gates Technology Partner network and serves on Boards to several prominent public and
private companies and organizations. Chuck has extensive service in Senior Executive
Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the
Department of Homeland Security as the first Director of Legislative Affairs for the
Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security and
Congress. He has an MA in International relations from the University of Chicago, and a
BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates
 The poles of debate are still forming in the Digital Age. There is
no common philosophy defining what constitutes a "hawk" or a
"dove" in cyberwar. International norms for countries' behavior
on the Internet are not yet established. There's still no consensus
about the appropriate balance between personal privacy and
national security when it comes to government surveillance or
private-sector encryption. Many companies and organizations
are divided about the best defenses that will shield them from
online attacks.
 Passcode, The Christian Science Monitor's new section on
security and privacy, formed an Influencers Poll to foster debate
and discussion in this space. We regularly survey a wide swath of
in-the-know experts about the most pressing issues – and share
their answers and opinions with our readers. To form our pool of
Passcode Influencers,we gathered more than 120 experts from
across government, the private sector, research, and the privacy
advocacy community.
-----------------------------------------------------------------------------------
Navigating the four pillars of
Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically and
socially. Its architectural design is modeled after Paris and it is certainly a city of
cultural diversity and historically interesting neighborhoods. Visually, the site of the
monuments reflecting against the panoramic backdrop of the Potomac River is
memorable for both visitors and native Washingtonians alike.
It is really a city like no other city in America. Although it may be geographically
small, Washington serves as the engine of government, an anchor of global financial
policy and representation, a seat of institutionalized policymaking organizations, and
as a growing center for business, especially in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life "inside
the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain
how to navigate it and decipher how things worked. Looking back, I would like to
offer structure and pathways for others contemplating a public service career or
seeking to accomplish tangible objectives for policy and/or business purposes in the
nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches); commercial
(business, including global financial institutions; policy: (academia, think tanks and
associations/organizations); and media (old and new).
These pillars function both individually and collectively. They are intertwined and to
be effective, it is essential to understand their roles and impact on what you hope to
accomplish. Understanding and gaining experience within these pillars that comprise
the operational system of Washington takes focus and time. Success can be
realized by navigating the pillars and establishing a strategy of strategic relationship
building and connecting.
Government: There has never been any doubt that government and politics make
Washington tick. Government is not only the basis for tens of thousands of jobs in
the area, but it also serves as the fulcrum for evolving and communicating domestic
and international policies. Government is the center for laws and executive orders
overseeing all aspects of our daily life and our professions. The Pentagon,
intelligence agencies, and Department of Homeland Security are all based in
Washington because it is the epicenter of power and decision-making. Government
in Washington is by design structured as a system of check and balances. An
understanding of how the various branches of government function is essential to
influencing any regulatory outcome whether it be energy, healthcare or a national
security issue. Working on Capitol Hill is invaluable experience and connects to all
the pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington has
been transforming over the years as a commercial hub. The World Bank, Federal
Reserve, International Financial Corporation and the Chamber of Commerce are
some of the organizations headquartered in the city. Many corporations have also
relocated to the area to be near the action and position themselves for government
and commercial opportunities. Both Virginia and Maryland have established high-
tech corridors close to the city for those reasons. The international community with
their embassies and trade groups increasingly see Washington as a growing center
for commerce.
Policy: It is not only the pillars of business and government that are cogs in the
machine. Policy organizations (such as the Center for Strategic and International
Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise
Institute and the Aspen Institute) that provide issue expertise, training and solutions
are really the enabling fuel. A myriad of think tanks offer the latest insights in
domestic and global events on a regular basis. Top local universities (such as Johns
Hopkins's School of Advanced International Studies, George Washington,
Georgetown, American, George Mason, and Maryland), also promote dialogue and
informed decision-making and access. The over 6,000 associations and organization
with issue specific interests regularly outreach to key decision–makers who are part
of the public and private sector pillars. Strategic communications and thought
leadership are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to circumspect the
activities of the other three pillars. The media's role is a fundamental one; any
system of democratic government cannot operate without transparency and
oversight. In Washington, most of the country's key media outlets have
representation. Outside traditional old media, new media has become a force to
consider. Most citizens have constant access and the metrics of public opinion are
constantly pulsed. Corporate executives and government leaders use the social
media, especially LinkedIn, Facebook and Twitter as part of their work environments.
Government 2.0 and Business 2.0 are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue expertise,
contacts and gaining a holistic perspective of how Washington really works. This
experience can provide the tactical knowledge to advance your marketing efforts
and/or cause in the public/private world. There is no substitute for experience and for
building a personal network to be empowered and effective. To be successful, you
have to always keep abreast of the latest trends and be visible and helpful to your
customer. In the Washington arena, you also have to develop the qualities for
resilience and persistence as no one is always on the winning side of issues and
contracts.
Washington will always have its image challenges and be an enigma as to how it
functions, especially to those who have never experienced life inside the Beltway.
Exploring and experiencing the four pillars will bring an understanding of how to
navigate a path to success for those who come to this amazing city to make a
difference and leave a positive legacy.
----------------------------------------------------------------------------------------------------------------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
Cybersecurity expert Chuck Brooks talks about where we stand in what
many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will-
Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee, subject
matter expert to the Homeland Defense and Security Information Analysis Center,
“passcode influencer” for The Christian Science Monitor,on the Board of Advisors
for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience
Institute.
Brooks also has authored numerous articles focusing on cybersecurity,homeland
security and technology innovation for such publications as Forbes, Huffington
Post,InformationWeek,MITSloan Blog, Computerworld, Federal
Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland
Security Today,The Hill and Government Executive.
I recently got a chance to get Brooks' take on where we are today in what many
people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear manyhats and certainlyhave been focused on cybersecurity
for some time now. So tell me, who is ChuckBrooksand what is he
trying to accomplish this space?
A. You are right, over my career in government, corporate and academia,I have
worn many hats. There have been some strong common threads [of] science,
technology, national security,and legislative and executive policy in all my various
roles. Thankfully, I selected a professional vocation of government relations and
marketing that encompasses all those threads.
My passion for cybersecurity issues was first established over a decade ago during
the time I spent at the Department of HomelandSecurity’s Science and Technology
Directorate. Back then, the threats to our critical infrastructure were not as
pronounced as they are today. Of course we were just beginning to experience the
smartphone era. The field of cybersecurity has evolved exponentially along withthe
technologies, networks and connectivity that make up the cyberecosystem. And the
ecosystem is quite diverse and expansive, comprising software, hardware,
monitoring, forensics, governance and more. All these elements make it an exciting
area to explore since there is always more to learn from strategy and technology
perspectives. Also, it certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it touches
everything work- or personal-related. In both the public andprivate sectors — just
about every CIO survey — cybersecurity is the top concern. And of course, along with
data analytics, cybersecurity is a annually a budget priority of federal spending.DHS
Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the
two top priorities for the protecting the homeland.
What I want to accomplish in this space is to continue being a subject matter expert
in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic
and especially in educating others on how it can impact their lives. My advisory and
board director roles with organizations are a reflection of that interest. When I retire
(which is a long way off), I hope to join academia again in a part-time role. I spent
two years at Johns Hopkins University SAIS [School of Advanced International
Studies] teaching graduate students homeland security and foundit very fulfilling.
Q. You have one of the most active groups in LinkedInunder theheading
of the Department of Homeland Security. How has this helped both
yourself and DHS in feeling thepulse of the cybersecurity industry?
A. I do operate a half dozen groups that focus on homeland security and information
security on LinkedIn, including a few of the largest groups: “U.S.Department of
Homeland Security, DHS” “Information Technology (Homeland& National
Security)” and “Homeland Security.”
In all, these groups include about 60,000people. Among the members are a host of
well-known cybersecurity professionals who often post and comment on issues of
the day. Also, as any news on data breaches or cyberincidents occur,they are often
posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the pulse of
policy. It has also served as a great networking venue to share ideas and information
with some of the best security minds around in both the private and federal sectors.
Many senior-level executives in the federal government are on social sites such as
LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million
federal government employees who regularly use LinkedIn, includingover 65,000
from DHS. Because of the growing need for public/private-sector collaboration and
interface, being actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do for the
company?
A. Sutherland Global Services is a global provider of business processing services,
contact centers, IT service desks and management consulting serving government
and U.S. leading corporations across multiple industries,including healthcare and
insurance, technology, mortgage and loan services, finance and banking,retail,and
travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion,
[and] was listed in 2015 as one of the fastest growing private companies in America
byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and are
known for integrated services for citizen service needs and digital government. Our
cybersecurity operations at Sutherland Government Services are internal, butwe do
have a practice in customer relations management after a company or agency has
been breached. Our cybersecurity practice is led by Glenn Schoonover who has a
deep technical background. He is a former chief information security officer for the
Army and was responsible for providing network security to the Department of the
Army headquarters. He is also a former senior technology strategist for Worldwide
National Security and PublicSafety at Microsoft.
Q. I see you are activein both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the private
sector (for the most part) is driven by profit and loss. The R&D efforts, innovation
sector and skilled technical expertise in the private sector has been more robust than
in government. Industry is more agile and able to react to threat trends.
On the federal side, the landscape has really changedover the past few years. [The
U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting
mission and continues to build upon new requirements for operations and for
systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity.
Presidential and congressional directives have mandatedthat DHSplay a growing
and more primary role, especially with protecting critical infrastructure
(transportation, health, energy, finance) that is mostly owned by the private sector.
DHS has to step up its activities in assessing situational awareness,information
sharing, and resilience research and development plans with stakeholders. This has
led to a trend in public-private partnering for sharingthreat informationand in
creating standards and protocols. In both the publicand private sectors, training of
the next-generation cybersecurity technical and policy [subject matter experts] is a
major priority.
Q. To date,thereseems to be a stand-off between Apple and the federal
government when it comes to iPhone security.What are your thoughts
on this,and can thisbring aboutsome lessons learned for the
cybersecurityindustry?
A. This is the topic of the day, and it is a complicated issue relating to government
requesting a corporation to provide software to allow access to data. My thoughts
may be a bit different from some of the others in the industry. While I recognize the
importance of privacy and the dire risk of an Orwellian surveillance state,I consider
protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI
is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network
planning more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law enforcement
to cooperate in these type of instances (with proper warrants and assurances) so that
company Internet protocol can be isolated and privacy issues for the company’s
customers can be best addressed. I am quite sure Congress will be looking closely at
this case to establish legislation to create a working formula.The lesson for
cybersecurity is that there is a balance between privacy and security that has to be
constantly reviewed in accordance with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon and
zetabytes of data projected by2020,can we secure and control our
digital processes, or arewe headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on the
Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of
sensors decreases and processing power and bandwidth continue to increase. The
fact is that most of these IT networks will have some sort of an IoT-based security
breach. We could be headed for a digital train wreck if IoT security standards are not
adopted. We may have a digital train wreck even if they are adopted. Standards will
have to be developed industry by industry. Protecting a network of medical devices
in a hospital will require different sets of standards than protecting utilities with
SCADA [supervisory control and data acquisition] systems that make up the electric
grid. There are a lot of questions, including who enforces compliance? And what are
the liabilities of an IoT breach?
The real danger is that the Internet was not
built for security at its inception; it was
built for connectivity. There is some truth to
the notion that your network may someday
be betrayed by your toaster or refrigerator.
One thing is for sure: the Internet of Things
will pose many challenges to cybersecurity
and data analytics, much of which we have
yet to contemplate.
Q. You've had theopportunity to
review many cyberdefense
technologies. Are we really finding
new solutions that can handle this
explosion of digital processes,or are
we still playing the game of catch-up
and patch-and-pray cybersecurity?
A. New solutions are continually evolving
with threats, but there will always be a need
for better encryption, biometrics, analytics
and automated network security to protect
networks and endpoints. It is a perpetual
game of cat and mouse between hackers
and protectors, and there is really no such
thing as being invulnerable.
In a sense, we are continually playing catch-
up and reacting to the last incident with
patches. The weakest link will always be the
human element. However, there are many
new interesting technologies that could
significantly impact cybersecurity in the
near future. There are technologies and
algorithms coming out of the national labs,
government, and from private-sector R&D
and startups that have the potential to be
disruptive.
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER LIST
OF CYBERSECURITY TECH
AREAS, PRIORITIES AND
EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and Public/Private
cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time” horizon
scanning and monitoring of networks
// Diagnostics and forensics (network
traffic analysis, payload analysis and
endpoint behavior analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
Q. Any final comments? And are
there any speaking engagements or
eventsyou areparticipating in that
you would like to announce? Could
you also offer a good source for
information on the subject of
cybersecuritythat you would suggest
for our readers?
A. Please check my regular posts in the
media and social media, join my LinkedIn
groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with
the National Cybersecurity Institute on my agenda. Also, in addition to social media,
which I highly recommend, there are many excellent outlets for cybersecurity
information includingthe Homeland Defense and Security Information Analysis
Center. A great site that aggregated cybersecurity news daily is The CyberWire.
Larry Karisny |
Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting
advanced cybersecurity technologies in both the public and private sectors.
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
cybersecurity workforce
// Tech foraging
Find out what next for Cybersecurity after the elections, Chuck brings some great insight on the new
administrations and what they are focusing on. It was refreshing to hear that the Trump administration
seems to be proposing to support critical infrastructure advancement with federal funding. Hear Chuck t
about some long overdue needs in our nation’s Critical Infrastructure.
This is a great show you will not want to miss.
Chuck Brooks profile on cybersecurity, homeland security, and emerging technologies

More Related Content

What's hot

Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Chuck Brooks
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
BrooksGovernment Security News
BrooksGovernment Security NewsBrooksGovernment Security News
BrooksGovernment Security NewsChuck Brooks
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileChuck Brooks
 

What's hot (19)

CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
Collected 2018 writings, speeches,activities in Cybersecurity, Risk Managemen...
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Cybertech
CybertechCybertech
Cybertech
 
computerworld
computerworldcomputerworld
computerworld
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
BrooksGovernment Security News
BrooksGovernment Security NewsBrooksGovernment Security News
BrooksGovernment Security News
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner Profile
 

Similar to Chuck Brooks profile on cybersecurity, homeland security, and emerging technologies

Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt TechnologiesChuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMChuck Brooks
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting InternationalChuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileChuck Brooks
 

Similar to Chuck Brooks profile on cybersecurity, homeland security, and emerging technologies (14)

Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
GOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUMGOVERNMENT CYBERSECURITY FORUM
GOVERNMENT CYBERSECURITY FORUM
 
ChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMITChuckBrooksCYBERSECURITYSUMMIT
ChuckBrooksCYBERSECURITYSUMMIT
 
ITSECURITY PLANET
ITSECURITY PLANETITSECURITY PLANET
ITSECURITY PLANET
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
CBDB2BCYBER
CBDB2BCYBERCBDB2BCYBER
CBDB2BCYBER
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 
computerworld
computerworldcomputerworld
computerworld
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner Profile
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Chuck Brooks profile on cybersecurity, homeland security, and emerging technologies

  • 1. Chuck Brooks Subject MatterExpert & Thought leader:  Cybersecurity& Homeland Security  Emerging Technologies:Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things  Government Relations & Marketing:“How to do business in WashingtonDC” Chuck Brooks Named by LinkedIn as the #2 Person you should be following on Tech issues out of 500 million members Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and serves on Boards to several prominent public and private companies and organizations. He is a
  • 2. subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC). Chuck also advised the Bill and Melinda Gates Technology Partner network, Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity Summary of Experience: * Corporate: Extensive service in Senior Executive Management, Government Relations (also Lobbying & PAC management), External Relations, and Business Development/Sales for three large public corporations. Managed own successful PR and Government Relations consulting firm. * Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald Reagan (Voice of America). Helped "stand up" Office of Legislative Affairs at the US Department of Homeland Security and served as the first Director of Legislative Affairs at the Science & Technology Directorate. Served as a Senior Legislative Staff (defense & foreign affairs, national security, business) to the late Senator Arlen Specter at the U.S. Senate. * Affiliations:  Former Technology Partner Advisor, Bill and Melinda Gates Foundation  Chairman, CompTIA New and Emerging Technology Committee  PASSCODE INFLUENCER, Christian Science Monitor  He is a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC)  Advisory Board, Center for Advancing innovation  Board of Directors, Ecrypt (public company now called Bravatek)  Board of Advisors, Cyber Resilience Institute  Board of Advisors CyberTECH  Board of Advisor B2B Cybersecurity  Member, Institute of Electrical and Electronics Engineers IEEE Standards Association (IEEE-SA) to participate in their Virtual Reality and Augmented Reality Working Group.  AFCEA Cybersecurity Committee
  • 3.  Member, Professional Services Council Homeland Security Task Force  Governance Committee of the IJIS Institute (supported by DHS & DOJ)  Board of Directors of the Safe America Foundation  Board of Directors of the Franklin Foundation (Innovation and Stem focus)  Board of Directors of “One World For Life” (Emergency Management focus)  Lead Judge, the 2013 and 2014, 2015, and 2016 Homeland Security/Border Security Awards (Government Security News) * Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on Linked In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined members). Top 1% viewed profile on LinkedIn. 32,000 first degree connections, mostly executive level. Over 2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise areas include: homeland security, cyber security, intelligence, defense, foreign affairs, IT, R & D, science & technology, political risk, strategic partnering, business development/sales, government relations, legislative/budget processes, thought leadership, innovation, and social media. (Huffington Post, Forbes, Government Security News (regular contributor) .The Hill (featured contributor), Federal Times (featured contributor), Christian Science Monitor (Member of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor), Government Technology, Biometric Update (featured contributor) * Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course for two years). Produced webinar on DHS & Cybersecurity for George Washington University  Cybersecurity Marketer of the Year 2016,17 – Chuck Brooks Chuck Brooks (Sutherland Government Solutions) – WINNER
  • 4. From the Official LinkedIn Marketing Blog: “5 Tech VoicesYou Should Be Following on LinkedIn” https://lnkd.in/b9GwGBs Chuck Brooks – Security Voice and “Government Relations and Marketing Executive, Thought Leader” Chuck’s varied security experience is evident in what he publishes. From aviation to public sector, government to science, his posts take on the multifaceted aspects of cyber security as it relates to industries/verticals, homeland issues and next-gen technology. Since he’s keen on variety, with formats ranging from expert Q&As to content roundups, to non-tech posts associated with topics/verticals he’s covered, his perspective truly stands out. Tech marketer takeaways: Chuck focuses core content on security, but isn’t afraid to include content tangentially related to core subject matter (e.g. a post focused on mastering the art of influence in Washington, D.C.)
  • 5. which incorporates fresh/unexpected content to help keep readers interested and foster conversation. Chuck Brooks named chairman of CompTIA New and Emerging Technologies Committee Thu, 2017-04-20 10:03 AM CompTIA’s New and Emerging Technologies (NET) Committee announced today that Chuck Brooks, vice president of Sutherland Government Solutions, will serve as the 2017 chairman of the New and Emerging Technologies Committee. CompTIA’s NET Committee addresses the impacts of big data and data analytics, cloud, mobility, artificial intelligence, supercomputing, digital government, smart cities, and the Internet of Things. Founded last year, it has a mission that brings together the brightest technological minds in the industry to help address the current and future emerging technology policy landscape. The committee is currently involved in advocating for legislation that focuses on smart cities and communities. Brooks serves as vice president for government relations and marketing for Sutherland Global Services. Chuck was recently cited as one of the top five people to follow on technology issues by LinkedIn. He served Brooks
  • 6. at the Department of Homeland Security as the first director of legislative affairs for the Science and Technology Directorate and also spent six years on Capitol Hill as a senior advisor to the late Senator Arlen Specter. Chuck also advised the Bill and Melinda Gates Technology Partner Network and serves on the board of several technology innovation organizations. He was an adjunct faculty member at Johns Hopkins University, has an M.A. in international relations from the University of Chicago, and a B.A. in political science from DePauw University. Chuck is widely published on the subjects of innovation, public and private partnerships, emerging technologies, and issues of homeland security and cybersecurity. Source:https://www.comptia.org/about-us/newsroom/blog/comptia- blog/2017/04/13/comptia-new-and-emerging-tech-committee-names-chuck-brooks-chairman Chuck Brooks as FeaturedSpeaker (partial list of events):  National Academy of Sciences/FBI Biosecurity Meeting 2016  USTRANSCOM Cybersecurity Roundtable 2017  The InformationSystemsSecurityAssociation(ISSA) 2017 Mid AtlanticConference  George Washington UniversityCybersecurityevent  Institute of Management Consultants Conference 2016  Critical Security Controls Editorial Panel, Council on Cybersecurity  DC Cybersecurity Summit (Securing The IoT) 2016  CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness) 2016  National Cybersecurity Institute  Global Cyber Threat Summit  Kaspersky Cyber Security Conference 2015  IDGA Homeland Security Week conference  Homeland Security Professionals Conference 2015  Secure Cities conference 2014  CyberMaryland conference 2014/15  National Press Club, Global Business News events 2014/15  Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review co-sponsor) Issue areatopics of writings/presentations/interviews/:  Cybersecurity  Homeland Security  Emerging Technologies  Transaction Processing  3-D Printing  Big Data  Internet of Things (IoT)  Wearables  Cloud Computing  Context-aware Computing
  • 7.  Artificial Intelligence  Critical Infrastructure Protection and Information Assurance  Data-Centers and Data-Center Consolidation  Digital Government  Digital Trust and Identity Integration and Management  Digitization and Imaging  Defined Leading Edge Technologies  Mobility  Outsourcing IT Services  Contact Centers  Sensors, Devices and Radio Frequency Identification (RFID)  Software Development  Virtualization  Web Analytics Example Speech Topics: “The Cybersecurity Threat to You and Your Business”, “UnderstandingCybersecurity”, “New Technologiesand Strategies for Ensuring Physicaland Cybersecurity”, “The Dawn of a New Technological Era”,How to Do Business In Washington, DC”, “How to Use Social Mediato Brand, Market, and Win Business” Links to Writings, Webinars, Conference Speeches, Radio Interviews: 5 Tech Voices You Should Be Following on LinkedIn https://business.linkedin.com/marketing- solutions/blog/marketing-for-tech-companies/2016/5-tech-voices-you-should-be-following- on-linkedin Meeting Security Challenges Through Vigilance, Readiness and Resilience http://www.brinknews.com/?p=5052?utm_source=BRINK+Subscribers&utm_campaign=b9404 3847f-BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c98- b94043847f-110145109
  • 8. Expert Chuck Brooks Offers A Cybersecurity “Cheat Sheet” For The C-Suite https://highperformancecounsel.com/expert-chuck-brooks-offers-cybersecurity-cheat-sheet-c- suite/ Defining and Addressing the Growing Cyber Insider Threat https://www.alienvault.com/blogs/security-essentials/defining-and-addressing-the-growing- cyber-insider-threat Automation technologies and the changing cybersecurity ecosystem http://gsnmagazine.com/node/48279?c=cyber_security NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update with ChuckBrooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc05/ ChuckBrooksexplainsthedifferencebetweenICSandITsecurity http://iiot-world.com/cybersecurity/chuck-brooks-explains-the-difference-between-ics-and-it- security/ Homeland Security wins in Trump budget, especially in cybersecurity [Commentary] http://fifthdomain.com/2017/03/17/homeland-security-wins-in-trump-budget-especially-in- cybersecurity-commentary/ The cybersecurity priority for DHS in 2017 http://www.federaltimes.com/articles/the-cybersecurity- priority-for-dhs-in-2017 Congress had an office that gave expert tech analysis; let's bring it back http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-an-office-that-gave- expert-tech-analysis-lets Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise https://www.alienvault.com/blogs/security-essentials/recent-attacks-demonstrate-the-urgent-need- for-c-suite-cybersecurty-expertise Will Vulnerable U.S. Electric Grid Get a New Protection mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a-new-protection- mandate/ Creating A Secure Smart City http://www.qognify.com/blog/creating-secure-smart-city/
  • 9. Alarming Cybersecurity Stats You Should Know by Chuck Brooks http://insights.tridentcybersecurity.com/post/102e12n/alarming-cybersecurity-stats-you- should-know-by-chuck-brooks And I Think To Myself, What A Virtual World https://itspmagazine.com/from-the- newsroom/and-i-think-to-myself-what-a-virtual-world CHUCK BROOKS:THEIIOTPOTENTIALCYBERTHREATSCONSEQUENCES HTTP://WWW.IIOT- WORLD.COM/CYBERSECURITY/CHUCK-BROOKS-THE-IIOT-POTENTIAL-CYBER-THREATS-CONSEQUENCES/ Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber- defense-in-an-imperfect-world-a-new-approach/ Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL Magazine http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-part-iv-securing-vote US must invest more in advanced computing http://thehill.com/blogs/pundits- blog/technology/291013-us-must-invest-more-in-advanced-computing Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-watch-follow-the-tech- leader/ Gen Touhill brings vision, strategy as nation’s first CISO http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-as-nations-first-ciso The Emerging Trend of Gamification in Cybersecurity https://www.alienvault.com/blogs/security-essentials/the-emerging-trend-of-gamification-in- cybersecurity Emerging Focus on Cyber Threats to the Energy Infrastructure http://www.federaltimes.com/articles/emerging-focus-on-cyber-threats-to-energy-infrastructure
  • 10. Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape https://www.alienvault.com/blogs/security-essentials/safeguarding-patients-and-data-in- the-evolving-healthcare-cybersecurity-landscape How The Next Administration WillReshape DHS http://www.federaltimes.com/articles/how-the-next-administration-will-reshape-dhs Socializing Citizen Services In The Public Sector http://bizcatalyst360.com/socializing-citizen- services-in-the-public-sector/ NCF-DC1 Washington DC Cyber News Update With Chuck Brooks http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/ NGA's Homeland panel to benefit from Governor Hutchinson’s experience, leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas- homeland-panel-benefit-hutchinsons-experience-leadership/88031784/ DHS cyber role elevated in new legislation http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role- elevated-new-legislation/85934982/ Embracing Global Public/Private Cybersecurity Alliances https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private- cybersecurity-alliances The Gender Gap in Cybersecurity Can, and Should Be, Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in- cybersecurity-can-and-should-be-closed Digital Convergence and Cybersecurity https://www.alienvault.com/blogs Are There Potential Intelligent Neighbors On Planets Close To Earth (And Beyond)? http://bizcatalyst360.com/are-there-potential-intelligent-neighbors-on-planets-close-to-earth- and-beyond/
  • 11. The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/ 4 stepsto a strong incidentresponse plan | CSO Online http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong- incident-response-plan.html Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway- new-era-quantu m-computing/ UK/US Cybersecurity Will Thrive With or Without Brexit http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will- thrive-with-or-without-brexitooperation Creating a Digital Career Path for Native Americans http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital- career-path-native-americans/84455826/ The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the- rise-of-the-chief-data-officer Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from- the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits- blog/technology/280481-the-government-explores-artificial-intelligence The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the- newsroom/the-cusp-of-technological-transformation The Globality Quotient: Cybersecurity (ChuckBrooks Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/ Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest- Link-Will-Always-Be-the-Human-Element.html DHS's ongoing challenge: Securing soft targets by Chuck Brooks http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge- securing-soft-targets/82350628/ Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity- excellence-awards/
  • 12. 3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and marketing at SutherlandGlobal Services. “Anyone andeveryone is vulnerable,” he said. “The expandinginterconnectivityof our devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns- about-external-cyber-threats/ Government R&D can be a catalyst for technological progress http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst- for-technological-progress The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of- awards/8 Key homeland security priorities to watch in 2016 http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland- security-priorities-watch-2016/77368604/ Seven astounding technology trends for 2016 http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016 Preparing for the Coming Millennial Workforce https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming- millennial-workforce/ HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn- tv/hsn-charles-brook-interview?Itemid= The Internet Of Things (IoT) Has Arrived – What You Should Know http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/ 7 Top Tech Trends Impacting Innovators in 2016 http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting- innovators-in-2016/ The alchemy of big data in government http://thehill.com/blogs/pundits- blog/technology/263890-the-alchemy-of-big-data-in-government Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland- security-alerts/79982178/
  • 13. The Internet of Things and Cyber- Security: Government Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security- government-readiness Smart cities, the Internet of Things and the Blue Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart-cities-the- internet-of-things-and-the-blue-revolution Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks http://www.christophergorog.com/cyber-security/cwc-cyber-1/ Protecting the Internet of Things and living in Smart Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting- internet-things-and-living-smart-cities/72742172/ Does Government Need ‘Hardware-Separated’ Operating Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does- government-need-hardware-separated-operating-systems/121826/ Winning With Women - an interview with Chuck Brooks: https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male- interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/ The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits- blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security News) gsn 2014 digital yearbook of homeland security awards recipients Homeland Security Interview by Government Security News on Key issues for 2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits- blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon Solving Problems with Technology Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with- technology-convergence/#prettyPhoto Government prioritizes digital engagement (Computerworld) http://www.computerworld.com/article/2931835/it- transformation/government-prioritizes-digital-engagement.html
  • 14. Department of Homeland Security Explores Wearables http://www.wearablevalley.co/department-of-homeland-security-explores- wearables/#more-21 The OPM breach screams for action | SecurityInfoWatch.com https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF- 8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks Servicing the Internet of Things and the New Digital Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new- digital-economy/#.VKriQCvF91Y Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it is too late) http://www.voodootec.com/author/chuckbrooks/ Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation- commitment-key-for-govt-industry-cyber-partnerships/ Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel) https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar DHS, FBI stepping up digitization of Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI- stepping-up-digitization-records Internet of Things, New Frontier of Technology Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology- convergence/#prettyPhoto Wearables Bring New Sense of Fashion to Public Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring- new-sense-fashion-public-sector/104679/ DHS: A decade (and more) of competing congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D HS-decade-more-competing-congressional-oversight Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry- in_2_b_4620232.html?utm_source=Alert- blogger&utm_medium=email&utm_campaign=Email%2BNotifications
  • 15. The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital- role-confronting-threat-pandemics-bioterrorism "Why You Should Be Excited About Future Tech" (InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and- innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036? Dick Tracy and the Benefits of Virtual Government http://government.blogs.xerox.com/?s=virtual+government Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity- takes-center-stage-a-decade-after-the-9-11-commission-report/ Creating resilience with public/private partnerships—and planning (MIT Sloan Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate- partnerships-and-planning/ DHS’s Special Partnership with Native Americans (Indian Country News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958- dhs-s-special-partnership-with-native-americans TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8 Homeland Security is Back in the Limelight By Chuck Brooks (The Hill) http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is- back-in-the-limelight Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity- takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288- transportation-security-back-to-the-future Chief Data Officers in the Government – What Role Should They Play? https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what-role- should-they- play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh
  • 16. Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big- data-what-its-worth/#.VSLft5h0xdg Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s ecurity_discussi The public/private imperative toprotect the grid by ChuckBrooks (Federal Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private- imperative-protect-grid How S&T drives innovation at DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives- innovation-DHS “Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck- brooks The public/private imperative toprotect the grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private- imperative-protect-grid Government Security News 2013 Homeland Security Awards (Lead Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security Week presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234 Tech Interviews Featured on House Homeland Security Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S chedule_for_March_1620/ DHS Secretary Jeh Johnson revitalizes the 'One DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS- Secretary-Jeh-Johnson-revitalizes-One-DHS-vision Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security- measures-make-for-a-different-event
  • 17. DHS as the Epicenter for Cybersecurity in Government (Government Security News): http://www.gsnmagazine.com/node/32882?c=cyber_security Native Americans key to border security success http://thehill.com/blogs/pundits- blog/immigration/214494-native-americans-key-to-border-security-success Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have- called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the- private-sector Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011 Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations- webinar-evolving-role-cybersecurity-department-homeland-security “Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet of Things; Health & Medicine; and, Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html Public/Private Partnerships (FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners hips/ Chuck Brooks presentations at Global Risk Expo in ASTANA, KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk- expo Featured Speaker:Chuck Brooks - Homeland Security Week 2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234 Featured Speaker: Homeland Security Week 2014 Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi ty+Week+2014+Conference Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/ Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek- to-accelerate-record-digitization/
  • 18. The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks- joins-the-franklin-foundation-board-of-directors.html Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower | Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark- amtower Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx How Big Data Will Revolutionize Aviation Security (ChuckBrooks Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new s%5D=32217 Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek- to-accelerate-record-digitization/ Transaction Processing is at the Root of Data Analytics http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data- analytics/#prettyPhoto BizCatalyst 360: Digital Government Yields Customer Service Innovation http://bizcatalyst360.com/digital-government-yields-customer-service- innovation/ Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security Digital Government Yields Exciting Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields- exciting-innovation/ Transforming US Border Crossing http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control- processing-through-automation/
  • 19. Radio Interview: All things LinkedIn - FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-measures- make-for-a-different-event DHS's Special Partnership with Native Americans Homeland Security Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12 Pausing Before Tapping “Connect:” Can Privacy and Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/ The Future of Social Media (Chuck Brooks quote) http://www.business2community.com/social-media/future-social-media-60-experts- share-2014-predictions-0718083 Next Practices Institute Events - Executive Next Practices Institutehttp://www.enpinstitute.com/events/ What Government Agencies Can Learn From The Private Sector (FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact- centers-for-consolidation-3-takeaways-from-the-private-sector/ Xerox Real Business Radio Online Radio | BlogTalkRadio http://www.blogtalkradio.com/xeroxradio Interview - Global Radio Talk Show – Interviews with Business Leaders ... http://globalradiotalkshow.com/ Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have- called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the- private-sector The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies (Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
  • 20. Mobile Apps Continue to Shape Government Agencies http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape- government-agencies/#.VjZQ1_mrTIU Combining Legislation and technology for Better Government Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology- better-government-customer-service.htm Radio Interview: The U.S. Needs a Proactive Approach To Combat Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive- approach-to-combat-cybercrime/ Featured Speaker; Symposium on Homeland Security & Defense http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015- Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf Interview with Chuck Brooks The Business Edge | VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge Featured Speaker; The Counter Terrorist magazine http://www.thecounterterroristmag.com/conference/ Moderator, Technology Conference - Association for Corporate Growth http://www.acg.org/boston/technologyconference.aspx Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc. http://www.fbcinc.com/e/cybermdconference/speakers.aspx Cybersecurity 2014: Beyond the NIST framework - FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/ How Wearable Devices Can Transform Contact Center Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable- devices-can-transform-contact-center-operations/ Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox: What are your Homeland Security views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html
  • 21. How To Successfully Implement Social Media For Business Development In Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1 2dcc3742b7d609543#.VSK8z5h0xdg Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists Popularon LinkedIn” Posted by Vincent Granville http://www.datasciencecentral.com/profiles/blogs/25- data-scientists-popular-on-linkedin Keeping Pace With a Streamlined Service Approach http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-on- linkedin Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014- beyond-nist-framework/ Featured Speaker: Social media in Government conference http://aliconferences.com/events/social-media-in-government_0515/ CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/ CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit y%202014%20Outline.pdf xerox | GovCon Executive http://www.govconexecutive.com/%3Fs%3Dxerox Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington, DC Washington '14 March - Global HR Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271 Public/private partnership is key to be competitive in any market. The Know How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive- in-any-market-the-know-how/
  • 22. It was an honor co-presenting with John Perren former Assistant Director of the Weapons of Mass Destruction Directorate of the FBI, and LTC Scott Appelgate, Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs Of Staff and Dr. Frederic Lemieux Professor and Program Director, at the National Security Threat Convergence: Violent Extremism and Cybersecurity event at George Washington University
  • 23. Thursday, June 30, 2016 from 8:00 AM to 6:00 PM The Ritz-Carlton Tysons Corner • Learn from Security Experts & Advisors Including: Chuck Brooks Vice President for GovernmentRelations & Marketing Sutherland Global Services Speaking on Panel 1: Protecting the Enterprise from the Growing Risk of Security Breaches as it Relatesto the Internet of Things
  • 24. Meeting: BOARD ON LIFE SCIENCES and BOARD ON CHEMICAL SCIENCESAND TECHNOLOGY Safeguarding the BioeconomyIII Safeguarding the Bioeconomy III: Securing Life Sciences Data Speaker: Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and he serves as subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DOD) sponsored organization through the Defense Technical Information Center (DTIC). In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity
  • 25. From “Cybersecurity is Top Business Priority in 2017” https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017 In assessing the severity of security flaws in cyberspace, I spoke with several experts in the field. Charles “Chuck” Brooks is the vice president for government relations and marketing for Sutherland Government Solutions. He served at DHS as the first director of legislative affairs for the Science and Technology Directorate. He ominously points out: "The reality is that the more digitally interconnected we become in our work and personal lives, the more vulnerable we become." -- Chuck Brooks Mr. Brooks adds: "Mitigating cyberthreats will grow as a priority for business, and for us personally, if we are to commercially function and prosper."
  • 26. But how can companies successfully mitigate cyberthreats? His advice: "The C-suites and governing boards of corporations will need to invest in better enterprise and endpoint security toprevent phishing and malware probes by hackers. This will also require better training of executives and employees in basic information security measures." Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards Thu, 2017-02-09 01:49 PM Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of The New Emerging Technologies Committee for CompTIA, was named winner of Cybersecurity Marketer of The Year at the 2017 Cybersecurity Excellence Awards. The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security. The finalists and winners were selected based on the strength of their nomination and the popular vote by members of the Information Security Community (both ratings and comments). “Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year category in the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the 350,000 member Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence and innovation in today's cybersecurity industry.” Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been a force in discussing, advocating, promoting cybersecurity issues across digital media, at events, in professio nal forums, and with a variety of public policy organizations. He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies in both the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech Pe ople to Follow On LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and conferences. He recently presented at a workshop sponsored by The National Academies of Sciences, Engineering, and Medicine and Brooks
  • 27. the Federal Bureau of Investigation on Securing Life Sciences Data. He recently spoke at George Washington University event about the Cyber Threat Spectrum, will be participating soon at USTRANSCOM Senior Leader Cyber Security Roundtable. Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT Security Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government Security News, and Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn and a global following and has brought significant attention to cyber issues from his frequent posts and commentaries. He has been involved as a judge for the past four years as a Judge for Government Security News’ Annual Homeland Security Awards. As a senior executive in government relations, marketing, and management, Chuck brings a unique experience from service in the public sector, academia, and industry. He serves on a v ariety of boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a special subject matter expertise of cybersecurity and homeland security in government that have benefited both the not-for-profit, public, and commercial sectors. Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral Jay Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck Brooks. as Director of Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress in making the "reformation" of DHS S&T a complete success. His Hill/DC acumen, insight, reliability, ability to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16 years dealing with senior executive branch officials, industry, academia and the Congress.” Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate professional who has a deep understanding of the issues, process, and people involved in the world of homeland security and Law enforcement. His breadth of experience derived from working on The Hill, in government, in academia, in industry, and with the media make him truly unique.” Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at John Hopkins University where taught homeland security for two years. He has advised a multitude of organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and the Center for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging Technologies Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek, and the Cyber Resilience Institute. He is an advisor to R & D cybersecurity company Inzero Systems. He is a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC. Chuck also serves as a Christian Science Monitor “Passcode Influencers Panel member” on Information Security. He has a BA from DePauw University and an MA from the University of Chicago. ----------------------------------------------------------------------------------------------------------------------------- ---------------
  • 28. Chuck Brooks – Winner of 2016 Cybersecurity Excellence Awards By American Admin - March 25, 2016 Chuck Brooks, "Cybersecurity Marketer of the Year" We are excited to announce that Chuck Brooks has been named the WINNER of “Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The Awards are an annual competition that honors individuals and companies that demonstrate excellence, innovation and leadership in information security. Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing issues across all mediums. He is known for his thought leadership on cybersecurity issues and has published on these topics in the Huffington Post, Forbes, Government Security News (regular contributor) . The Hill (featured contributor), Federal Times (featured contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland
  • 29. Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor), and Biometric Update (featured contributor). He is Vice Chair of CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech, Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He has also been a featured speaker and panelist at many conferences and events. About Chuck Brooks Most of us know his via social media for his regular posts and may be one of his 32,000 followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Government Solutions. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University. He has an MA from the University of Chicago and a BA from DePauw University.  Chuck thought leadership writings on cybersecurity have helped shape the public policy debate as he is respected in industry, in the Federal Government, academia, and on Capitol Hill. He also has a strong following at many of the embassies in Washington, DC  Chuck is a pioneer in social media with a global following and has brought significant attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter, Facebook, FedScoop, and other social media  Chuck brings experience from service in the public sector, academia, and with corporations. He serves on a variety of boards, many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a special expertise of cybersecurity in government that have benefited both the not-for-profit, public, and commercial sectors.
  • 30. -----------------------------------------------------------------------------  Christian Science Monitor’s Passcode Influencers gathered from 120 experts from across government, the private sector, research, and the privacy advocacy community  s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outre Thought Leadership, Strategic Partnering, Branding) for the Federal a  Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates Technology Partner network and serves on Boards to several prominent public and private companies and organizations. Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the
  • 31. Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates  The poles of debate are still forming in the Digital Age. There is no common philosophy defining what constitutes a "hawk" or a "dove" in cyberwar. International norms for countries' behavior on the Internet are not yet established. There's still no consensus about the appropriate balance between personal privacy and national security when it comes to government surveillance or private-sector encryption. Many companies and organizations are divided about the best defenses that will shield them from online attacks.  Passcode, The Christian Science Monitor's new section on security and privacy, formed an Influencers Poll to foster debate and discussion in this space. We regularly survey a wide swath of in-the-know experts about the most pressing issues – and share their answers and opinions with our readers. To form our pool of Passcode Influencers,we gathered more than 120 experts from across government, the private sector, research, and the privacy advocacy community. -----------------------------------------------------------------------------------
  • 32. Navigating the four pillars of Washington By Chuck Brooks, contributor Washington is an eclectic city. It is a metropolis that is thriving economically and socially. Its architectural design is modeled after Paris and it is certainly a city of cultural diversity and historically interesting neighborhoods. Visually, the site of the monuments reflecting against the panoramic backdrop of the Potomac River is memorable for both visitors and native Washingtonians alike. It is really a city like no other city in America. Although it may be geographically small, Washington serves as the engine of government, an anchor of global financial policy and representation, a seat of institutionalized policymaking organizations, and as a growing center for business, especially in high tech. When I first came to Washington, I was overwhelmed by the intensity of life "inside the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain how to navigate it and decipher how things worked. Looking back, I would like to offer structure and pathways for others contemplating a public service career or seeking to accomplish tangible objectives for policy and/or business purposes in the nation's capital. There are four pillars that comprise the foundation of the operational world of Washington: government (executive, judicial and legislative branches); commercial (business, including global financial institutions; policy: (academia, think tanks and associations/organizations); and media (old and new). These pillars function both individually and collectively. They are intertwined and to be effective, it is essential to understand their roles and impact on what you hope to accomplish. Understanding and gaining experience within these pillars that comprise the operational system of Washington takes focus and time. Success can be realized by navigating the pillars and establishing a strategy of strategic relationship building and connecting. Government: There has never been any doubt that government and politics make Washington tick. Government is not only the basis for tens of thousands of jobs in the area, but it also serves as the fulcrum for evolving and communicating domestic and international policies. Government is the center for laws and executive orders overseeing all aspects of our daily life and our professions. The Pentagon, intelligence agencies, and Department of Homeland Security are all based in Washington because it is the epicenter of power and decision-making. Government in Washington is by design structured as a system of check and balances. An understanding of how the various branches of government function is essential to influencing any regulatory outcome whether it be energy, healthcare or a national security issue. Working on Capitol Hill is invaluable experience and connects to all the pillars and is a special pedigree for mobility in one's career.
  • 33. Commercial: Although it is not a financial center like New York, Washington has been transforming over the years as a commercial hub. The World Bank, Federal Reserve, International Financial Corporation and the Chamber of Commerce are some of the organizations headquartered in the city. Many corporations have also relocated to the area to be near the action and position themselves for government and commercial opportunities. Both Virginia and Maryland have established high- tech corridors close to the city for those reasons. The international community with their embassies and trade groups increasingly see Washington as a growing center for commerce. Policy: It is not only the pillars of business and government that are cogs in the machine. Policy organizations (such as the Center for Strategic and International Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise Institute and the Aspen Institute) that provide issue expertise, training and solutions are really the enabling fuel. A myriad of think tanks offer the latest insights in domestic and global events on a regular basis. Top local universities (such as Johns Hopkins's School of Advanced International Studies, George Washington, Georgetown, American, George Mason, and Maryland), also promote dialogue and informed decision-making and access. The over 6,000 associations and organization with issue specific interests regularly outreach to key decision–makers who are part of the public and private sector pillars. Strategic communications and thought leadership are integral tools for persuasion. Media: The media are disseminators of information, with the duty to circumspect the activities of the other three pillars. The media's role is a fundamental one; any system of democratic government cannot operate without transparency and oversight. In Washington, most of the country's key media outlets have representation. Outside traditional old media, new media has become a force to consider. Most citizens have constant access and the metrics of public opinion are constantly pulsed. Corporate executives and government leaders use the social media, especially LinkedIn, Facebook and Twitter as part of their work environments. Government 2.0 and Business 2.0 are becoming the norms. Working in one or all of the pillars is helpful in terms of building issue expertise, contacts and gaining a holistic perspective of how Washington really works. This experience can provide the tactical knowledge to advance your marketing efforts and/or cause in the public/private world. There is no substitute for experience and for building a personal network to be empowered and effective. To be successful, you have to always keep abreast of the latest trends and be visible and helpful to your customer. In the Washington arena, you also have to develop the qualities for resilience and persistence as no one is always on the winning side of issues and contracts. Washington will always have its image challenges and be an enigma as to how it functions, especially to those who have never experienced life inside the Beltway. Exploring and experiencing the four pillars will bring an understanding of how to navigate a path to success for those who come to this amazing city to make a difference and leave a positive legacy.
  • 34. ---------------------------------------------------------------------------------------------------------------- Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element Cybersecurity expert Chuck Brooks talks about where we stand in what many people call the "wild, wild west" of cybersecurity. http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will- Always-Be-the-Human-Element.html BY LARRY KARISNY / MARCH 1, 20160 If you're in the cybersecurity business, you know the name Chuck Brooks. He is an advisor to the Bill and Melinda Gates Foundation Technology Partner Network, chairman of CompTIA's New and Emerging Tech Committee, subject matter expert to the Homeland Defense and Security Information Analysis Center, “passcode influencer” for The Christian Science Monitor,on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience Institute. Brooks also has authored numerous articles focusing on cybersecurity,homeland security and technology innovation for such publications as Forbes, Huffington Post,InformationWeek,MITSloan Blog, Computerworld, Federal Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland Security Today,The Hill and Government Executive. I recently got a chance to get Brooks' take on where we are today in what many people call the "wild, wild west" of cybersecurity. Here are his thoughts. Q. You wear manyhats and certainlyhave been focused on cybersecurity for some time now. So tell me, who is ChuckBrooksand what is he trying to accomplish this space? A. You are right, over my career in government, corporate and academia,I have worn many hats. There have been some strong common threads [of] science, technology, national security,and legislative and executive policy in all my various roles. Thankfully, I selected a professional vocation of government relations and marketing that encompasses all those threads.
  • 35. My passion for cybersecurity issues was first established over a decade ago during the time I spent at the Department of HomelandSecurity’s Science and Technology Directorate. Back then, the threats to our critical infrastructure were not as pronounced as they are today. Of course we were just beginning to experience the smartphone era. The field of cybersecurity has evolved exponentially along withthe technologies, networks and connectivity that make up the cyberecosystem. And the ecosystem is quite diverse and expansive, comprising software, hardware, monitoring, forensics, governance and more. All these elements make it an exciting area to explore since there is always more to learn from strategy and technology perspectives. Also, it certainly blends my common career threads. For anyone’s career focus, studying cybersecurity makes [sense] since it touches everything work- or personal-related. In both the public andprivate sectors — just about every CIO survey — cybersecurity is the top concern. And of course, along with data analytics, cybersecurity is a annually a budget priority of federal spending.DHS Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the two top priorities for the protecting the homeland. What I want to accomplish in this space is to continue being a subject matter expert in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic and especially in educating others on how it can impact their lives. My advisory and board director roles with organizations are a reflection of that interest. When I retire (which is a long way off), I hope to join academia again in a part-time role. I spent two years at Johns Hopkins University SAIS [School of Advanced International Studies] teaching graduate students homeland security and foundit very fulfilling. Q. You have one of the most active groups in LinkedInunder theheading of the Department of Homeland Security. How has this helped both yourself and DHS in feeling thepulse of the cybersecurity industry? A. I do operate a half dozen groups that focus on homeland security and information security on LinkedIn, including a few of the largest groups: “U.S.Department of Homeland Security, DHS” “Information Technology (Homeland& National Security)” and “Homeland Security.” In all, these groups include about 60,000people. Among the members are a host of well-known cybersecurity professionals who often post and comment on issues of the day. Also, as any news on data breaches or cyberincidents occur,they are often posted in the LinkedIn groups. Moderating these groups certainly keeps me updated and in tune with the pulse of policy. It has also served as a great networking venue to share ideas and information
  • 36. with some of the best security minds around in both the private and federal sectors. Many senior-level executives in the federal government are on social sites such as LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million federal government employees who regularly use LinkedIn, includingover 65,000 from DHS. Because of the growing need for public/private-sector collaboration and interface, being actively involved in social media makes a lot of sense. Q. What is Sutherland Government Relations and what do you do for the company? A. Sutherland Global Services is a global provider of business processing services, contact centers, IT service desks and management consulting serving government and U.S. leading corporations across multiple industries,including healthcare and insurance, technology, mortgage and loan services, finance and banking,retail,and travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion, [and] was listed in 2015 as one of the fastest growing private companies in America byInc. I work for the recently created Sutherland Government Solutions as VP of Government Relations and Marketing, where we are at several agencies and are known for integrated services for citizen service needs and digital government. Our cybersecurity operations at Sutherland Government Services are internal, butwe do have a practice in customer relations management after a company or agency has been breached. Our cybersecurity practice is led by Glenn Schoonover who has a deep technical background. He is a former chief information security officer for the Army and was responsible for providing network security to the Department of the Army headquarters. He is also a former senior technology strategist for Worldwide National Security and PublicSafety at Microsoft. Q. I see you are activein both the public and private sectors when it comes to cybersecurity. What are the similarities and differences between these two sectors? A. The biggest difference is that government is motivated by mission, and the private sector (for the most part) is driven by profit and loss. The R&D efforts, innovation sector and skilled technical expertise in the private sector has been more robust than in government. Industry is more agile and able to react to threat trends. On the federal side, the landscape has really changedover the past few years. [The U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting mission and continues to build upon new requirements for operations and for systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity. Presidential and congressional directives have mandatedthat DHSplay a growing and more primary role, especially with protecting critical infrastructure
  • 37. (transportation, health, energy, finance) that is mostly owned by the private sector. DHS has to step up its activities in assessing situational awareness,information sharing, and resilience research and development plans with stakeholders. This has led to a trend in public-private partnering for sharingthreat informationand in creating standards and protocols. In both the publicand private sectors, training of the next-generation cybersecurity technical and policy [subject matter experts] is a major priority. Q. To date,thereseems to be a stand-off between Apple and the federal government when it comes to iPhone security.What are your thoughts on this,and can thisbring aboutsome lessons learned for the cybersecurityindustry? A. This is the topic of the day, and it is a complicated issue relating to government requesting a corporation to provide software to allow access to data. My thoughts may be a bit different from some of the others in the industry. While I recognize the importance of privacy and the dire risk of an Orwellian surveillance state,I consider protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network planning more horrific acts? In my opinion, this is a mitigating circumstance. What should be done is to establish protocols between industry and law enforcement to cooperate in these type of instances (with proper warrants and assurances) so that company Internet protocol can be isolated and privacy issues for the company’s customers can be best addressed. I am quite sure Congress will be looking closely at this case to establish legislation to create a working formula.The lesson for cybersecurity is that there is a balance between privacy and security that has to be constantly reviewed in accordance with the threats at hand. Q. With billions of Inernet of Things devices on the near horizon and zetabytes of data projected by2020,can we secure and control our digital processes, or arewe headed for a digital train wreck? A. According to Gartner, there will be nearly 26 billion networked devices on the Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of sensors decreases and processing power and bandwidth continue to increase. The fact is that most of these IT networks will have some sort of an IoT-based security breach. We could be headed for a digital train wreck if IoT security standards are not adopted. We may have a digital train wreck even if they are adopted. Standards will have to be developed industry by industry. Protecting a network of medical devices in a hospital will require different sets of standards than protecting utilities with SCADA [supervisory control and data acquisition] systems that make up the electric grid. There are a lot of questions, including who enforces compliance? And what are the liabilities of an IoT breach?
  • 38. The real danger is that the Internet was not built for security at its inception; it was built for connectivity. There is some truth to the notion that your network may someday be betrayed by your toaster or refrigerator. One thing is for sure: the Internet of Things will pose many challenges to cybersecurity and data analytics, much of which we have yet to contemplate. Q. You've had theopportunity to review many cyberdefense technologies. Are we really finding new solutions that can handle this explosion of digital processes,or are we still playing the game of catch-up and patch-and-pray cybersecurity? A. New solutions are continually evolving with threats, but there will always be a need for better encryption, biometrics, analytics and automated network security to protect networks and endpoints. It is a perpetual game of cat and mouse between hackers and protectors, and there is really no such thing as being invulnerable. In a sense, we are continually playing catch- up and reacting to the last incident with patches. The weakest link will always be the human element. However, there are many new interesting technologies that could significantly impact cybersecurity in the near future. There are technologies and algorithms coming out of the national labs, government, and from private-sector R&D and startups that have the potential to be disruptive. CYBERSECURITY EXPERT CHUCK BROOKS' MASTER LIST OF CYBERSECURITY TECH AREAS, PRIORITIES AND EMERGING TRENDS Emerging Technology Areas: // Internet of Things // Wearables // Drones and robots // Artificial intelligence // Smart cities // Connected transportation // Quantum computing Priorities: // Protecting critical infrastructure through technologies and Public/Private cooperation // Better encryption and biometrics (quantum encryption, keyless authentication) // Automated network-security correcting systems (self-encrypting drives) // Technologies for “real-time” horizon scanning and monitoring of networks // Diagnostics and forensics (network traffic analysis, payload analysis and endpoint behavior analysis) // Advanced defense for framework layers (network, payload, endpoint, firewalls and antivirus) // Mobility and BYOD security // Big data // Predictive analytics // Interoperability Trends: // Informed risk management // Emergence of public/private sector partnerships
  • 39. Q. Any final comments? And are there any speaking engagements or eventsyou areparticipating in that you would like to announce? Could you also offer a good source for information on the subject of cybersecuritythat you would suggest for our readers? A. Please check my regular posts in the media and social media, join my LinkedIn groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with the National Cybersecurity Institute on my agenda. Also, in addition to social media, which I highly recommend, there are many excellent outlets for cybersecurity information includingthe Homeland Defense and Security Information Analysis Center. A great site that aggregated cybersecurity news daily is The CyberWire. Larry Karisny | Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting advanced cybersecurity technologies in both the public and private sectors. // More information sharing and collaboration between the public and private sectors // Shared R & D spending // Increased spending for cloud computing // Consolidation of data centers // Expansion of hiring and training of cybersecurity workforce // Tech foraging
  • 40. Find out what next for Cybersecurity after the elections, Chuck brings some great insight on the new administrations and what they are focusing on. It was refreshing to hear that the Trump administration seems to be proposing to support critical infrastructure advancement with federal funding. Hear Chuck t about some long overdue needs in our nation’s Critical Infrastructure. This is a great show you will not want to miss.