Highlights of Chuck Brooks thought leadership writings, articles, and speeches on topics of cybersecurity, homeland security and emerging technologies.
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
Chuck Brooks; Subject Matter Expert & Thought leader:
• Cybersecurity & Homeland Security
• Emerging Technologies: Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things
• Government Relations & Marketing
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
Speaker and Writer and Leadership profile of Chuck Brooks on Emerging Technologies, Cybersecurity,Artificial Intelligence, and perspectives on contemporary issues of the day
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks
From LinkedIn's Marketing Blog: Chuck Brooks – Security Voice and “Government Relations and Marketing Executive, Thought Leader”
Chuck’s varied security experience is evident in what he publishes. From aviation to public sector, government to science, his posts take on the multifaceted aspects of cyber security as it relates to industries/verticals, homeland issues and next-gen technology. Since he’s keen on variety, with formats ranging from expert Q&As to content roundups, to non-tech posts associated with topics/verticals he’s covered, his perspective truly stands out.
Tech marketer takeaways: Chuck focuses core content on security, but isn’t afraid to include content tangentially related to core subject matter (e.g. a post focused on mastering the art of influence in Washington, D.C.) which incorporates fresh/unexpected content to help keep readers interested and foster conversation.
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
Summary of writing, speaking, management and leadership activities of Chuck Brooks, Vice President of Sutherland Government Solution on Homeland Security, Cybersecurity, emerging technologies, IoT, Government Relations, and Thought Leadership
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
Chuck Brooks; Subject Matter Expert & Thought leader:
• Cybersecurity & Homeland Security
• Emerging Technologies: Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things
• Government Relations & Marketing
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
Speaker and Writer and Leadership profile of Chuck Brooks on Emerging Technologies, Cybersecurity,Artificial Intelligence, and perspectives on contemporary issues of the day
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks
From LinkedIn's Marketing Blog: Chuck Brooks – Security Voice and “Government Relations and Marketing Executive, Thought Leader”
Chuck’s varied security experience is evident in what he publishes. From aviation to public sector, government to science, his posts take on the multifaceted aspects of cyber security as it relates to industries/verticals, homeland issues and next-gen technology. Since he’s keen on variety, with formats ranging from expert Q&As to content roundups, to non-tech posts associated with topics/verticals he’s covered, his perspective truly stands out.
Tech marketer takeaways: Chuck focuses core content on security, but isn’t afraid to include content tangentially related to core subject matter (e.g. a post focused on mastering the art of influence in Washington, D.C.) which incorporates fresh/unexpected content to help keep readers interested and foster conversation.
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
Summary of writing, speaking, management and leadership activities of Chuck Brooks, Vice President of Sutherland Government Solution on Homeland Security, Cybersecurity, emerging technologies, IoT, Government Relations, and Thought Leadership
Compilation of selected articles, interviews, speeches, and media by emerging technology, cybersecurity, and homeland security evangelist, Chuck Brooks
Booz Allen Hamilton created the Field Guide to Data Science to help organizations and missions understand how to make use of data as a resource. The Second Edition of the Field Guide, updated with new features and content, delivers our latest insights in a fast-changing field. http://bit.ly/1O78U42
在這個資料科學蔚為風潮的年代,身為一個對新技術充滿好奇的攻城獅,自然會想要擴充自己的武器庫,學習嶄新的資料分析工具;而 R 語言,一個由統計學家專門為了資料探索與分析所開發的腳本語言,具有龐大的開源社群支持以及琳瑯滿目、數以萬計的各式套件,正是當今學習資料科學相關工具的首選。
然而,R 語言的設計邏輯與一般的程式語言不同,工程師們過去學習程式語言的經驗,往往造成學習 R 語言的障礙,本課程將從 R 語言的基礎開始,讓同學們從課堂講解以及互動式上機課程中,得以徹底理解 R 語言的核心概念與精要,學習如何利用 R 語言問資料問題,並且從資料分析的角度撰寫效率良好同時具有高度可讀性的 R 語言代碼。
Compilation of selected articles, interviews, speeches, and media by emerging technology, cybersecurity, and homeland security evangelist, Chuck Brooks
Booz Allen Hamilton created the Field Guide to Data Science to help organizations and missions understand how to make use of data as a resource. The Second Edition of the Field Guide, updated with new features and content, delivers our latest insights in a fast-changing field. http://bit.ly/1O78U42
在這個資料科學蔚為風潮的年代,身為一個對新技術充滿好奇的攻城獅,自然會想要擴充自己的武器庫,學習嶄新的資料分析工具;而 R 語言,一個由統計學家專門為了資料探索與分析所開發的腳本語言,具有龐大的開源社群支持以及琳瑯滿目、數以萬計的各式套件,正是當今學習資料科學相關工具的首選。
然而,R 語言的設計邏輯與一般的程式語言不同,工程師們過去學習程式語言的經驗,往往造成學習 R 語言的障礙,本課程將從 R 語言的基礎開始,讓同學們從課堂講解以及互動式上機課程中,得以徹底理解 R 語言的核心概念與精要,學習如何利用 R 語言問資料問題,並且從資料分析的角度撰寫效率良好同時具有高度可讀性的 R 語言代碼。
Utilizzare un sistema automatizzato di email marketing non è difficile e nemmeno complicato, ma permette di ottenere grandi risultati.
Maggiore coinvolgimento dei clienti, aumento delle vendite, aumento delle conversioni, migliore assistenza, maggiore partecipazione agli eventi che organizzi, certezza nella personalizzazione dei gusti e delle preferenze dei tuoi clienti, insomma minori costi di gestione con maggiori risultati.
Finding Useful Plugins: How To Extend WordPress Past a Simple BlogMeagan Hanes
Plugins are what lets WordPress power so much of the web – all kinds of customizability in only a few clicks! Let’s talk about the WordPress Plugin ecosystem, learn how to identify good plugins from bad ones, and compare paid versus free plugins. I’ll also share my top list of awesome plugins to push WordPress way past a simple blog.
Hosting For Your Startup, Side Project, or Big Dollar App - Minnebar 12Keith Resar
Learn how to effectively plan your hosting, whether on IaaS, PaaS, or something in between. Using three of my apps as example use cases we answer the "build vs. buy" question.
Minnebar 12 presentation.
DrupalGov 2017: Testing any day: guide to end to end test driven Drupal projectsVladimir Roudakov
Do you get notified if some crucial functionality on your website was changed or broken?
Is automated testing part of your daily routine or deployment process?
If not, then you are risking of losing parts of your website or even entire project.
Testing is no longer developers realm and everybody should get involved and get the benefits of test driven development.
In this session we will cover:
- basics of end-to-end testing
- test reports and who should receive them
- Automated testing best practices
- How clients can benefit from automated testing
This session is aimed for
- everyone who is interested in getting daily reports on how healthy their project is
- Teams who would like to improve communication internally and externally by means of test reports
- Project managers and developers interested in collecting data about their project over time
http://drupalgov.org/events/drupalgov-canberra-2017/testing-any-day-guide-end-end-test-driven-drupal-projects
The cyber security job is everyone's business including the Board of Directors, even without a cyber security degree. Recent cyber security news proves that. According to several studies, Boards are getting it wrong and are leaving cyber awareness and risk management in the hands of the CEO, CISO, CTOs and cyber security companies. In a sense they are abdicating their responsibility to the shareholders. This slideshare proposes 7 questions every board should be asking their company executives abour IT security. They're not necessarily all encompassing and don't take the place of real cybersecurity training, but will drive the discussion to better and more complete understanding of strategic risk. Questions cover the basics of cyber security training, cyber policies, who briefs and when at board meetings. Thanks.
New Business Owner Website Questions, What Makes a Lead Generation Website Go...Humberto Valle MBA
Are you starting a new business? Do you have a small local business and considering getting a website designed for lead generation? This video answers questions like What is marketing, what is SEO? How do I know if a website is designed well? Wether you have an HVAC or Plumbing business or a retail store, you want to get more clients and Unthink Digital Marketing can help. www.unthink.me
Gamification of professional development for health care professionalsDave Walton
A short description of an idea for gamifying continuing professional development for healthcare providers. Created as a requirement for the Udemy course 'Designing Gamification' Level 2.
As of March 21, the total number of breaches captured in the 2017 ITRC Breach Report totals 353, an increase of 56.2 percent over last year's record pace for the same time period (226).
Chuck Brooks, thought leadership on Homeland Security & Cybersecurity, and Em...Chuck Brooks
Summary of writing, speaking, management and leadership activities of Chuck Brooks, Vice President of Sutherland Government Solution on Homeland Security, Cybersecurity, emerging technologies, IoT, Government Relations, and Thought Leadership
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
Chuck D. BROOKS, President of Brooks Consulting International
Mr. Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles.
In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck has been a featured speaker at dozens of conferences and webinars (Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity). and has published more than 200 articles and blogs on cybersecurity, homeland security and technology issues. His writings have appeared on AT&T, IBM, Microsoft, General Dynamics, Xerox, Cylance, Checkpoint, and many other blogs.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Chuck brooks profile on cybersecurity, homeland security, and emerging technologies
1. Chuck Brooks
Subject MatterExpert & Thought leader:
Cybersecurity& Homeland Security
Emerging Technologies:Smart Cities, Artificial Intelligence, Quantum
Computing, Big Data, and Internet of Things
Government Relations & Marketing:“How to do business in
WashingtonDC”
Named by LinkedIn as the #2 Personyou should be following on Tech
issues out of 450 million members
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for
Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach,
Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets.
Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and
serves on Boards to several prominent public and private companies and organizations. He is a
subject Matter Expert to The Homeland Defense and Security Information Analysis Center
(HDIAC), a Department of Defense (DoD) sponsored organization through the Defense
2. Technical Information Center (DTIC). Chuck also advised the Bill and Melinda Gates Technology
Partner network, Chuck has extensive service in Senior Executive Management, Marketing,
Government Relations, and Business Development and worked in those capacities for three
large public corporations. In government, he served at the Department of Homeland Security as
the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent
six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty
Member at Johns Hopkins University where he taught graduate level students about homeland
security and Congress. He has an MA in International relations from the University of Chicago,
and a BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
Summary of Experience:
* Corporate: Extensive service in Senior Executive Management, Government Relations (also
Lobbying & PAC management), External Relations, and Business Development/Sales for three
large public corporations. Managed own successful PR and Government Relations consulting
firm.
* Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald Reagan (Voice
of America). Helped "stand up" Office of Legislative Affairs at the US Department of Homeland
Security and served as the first Director of Legislative Affairs at the Science & Technology
Directorate. Served as a Senior Legislative Staff (defense & foreign affairs, national security,
business) to the late Senator Arlen Specter at the U.S. Senate.
* Affiliations:
Former Technology Partner Advisor, Bill and Melinda Gates Foundation
Chairman, CompTIA New and Emerging Technology Committee
PASSCODE INFLUENCER, Christian Science Monitor
He is a subject Matter Expert to The Homeland Defense and Security Information
Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization
through the Defense Technical Information Center (DTIC)
Advisory Board, Center for Advancing innovation
Board of Directors, Ecrypt (public company now called Bravatek)
Board of Advisors, Cyber Resilience Institute
Board of Advisors CyberTECH
Board of Advisor B2B Cybersecurity
Member, AFCEA Cybersecurity Committee
Member, Professional Services Council Homeland Security Task Force
Governance Committee of the IJIS Institute (supported by DHS & DOJ)
Board of Directors of the Safe America Foundation
Board of Directors of the Franklin Foundation (Innovation and Stem focus)
3. Board of Directors of “One World For Life” (Emergency Management focus)
Lead Judge, the 2013 and 2014, 2015, and 2016 Homeland Security/Border Security
Awards (Government Security News)
* Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on Linked
In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined members). Top
1% viewed profile on LinkedIn. 32,000 first degree connections, mostly executive level. Over
2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise areas include:
homeland security, cyber security, intelligence, defense, foreign affairs, IT, R & D, science &
technology, political risk, strategic partnering, business development/sales, government
relations, legislative/budget processes, thought leadership, innovation, and social media.
(Huffington Post, Forbes, Government Security News (regular contributor) .The Hill (featured
contributor), Federal Times (featured contributor), Christian Science Monitor (Member of
Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today,
Cygnus Media, IDGA website (contributing writer), BizCatalyst360 (featured contributor),
Government Technology, Biometric Update (featured contributor)
* Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course
for two years). Produced webinar on DHS & Cybersecurity for George Washington University
Cybersecurity Marketer of the Year 2016,17 – Chuck Brooks
Chuck Brooks (Sutherland Government Solutions) – WINNER
4. From the Official LinkedIn Marketing Blog:
“5 Tech VoicesYou Should Be Following on LinkedIn”
https://lnkd.in/b9GwGBs
Chuck Brooks – Security Voice and “Government Relations and
Marketing Executive, Thought Leader”
Chuck’s varied security experience is evident in what he publishes.
From aviation to public sector, government to science, his posts take on
the multifaceted aspects of cyber security as it relates to
industries/verticals, homeland issues and next-gen technology. Since he’s
keen on variety, with formats ranging from expert Q&As to content
roundups, to non-tech posts associated with topics/verticals he’s covered,
his perspective truly stands out.
Tech marketer takeaways: Chuck focuses core content on security, but
isn’t afraid to include content tangentially related to core subject matter
(e.g. a post focused on mastering the art of influence in Washington, D.C.)
5. which incorporates fresh/unexpected content to help keep readers
interested and foster conversation.
Featured Speaker:
National Academy of Sciences/FBI Biosecurity Meeting 2016
USTRANSCOM Cybersecurity Roundtable 2017
The InformationSystemsSecurityAssociation(ISSA) 2017 Mid Atlantic Conference
George WashingtonUniversityCybersecurityevent
Institute of Management Consultants Conference 2016
Critical Security Controls Editorial Panel, Council on Cybersecurity
DC Cybersecurity Summit (Securing The IoT) 2016
CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness) 2016
National Cybersecurity Institute
6. Global Cyber Threat Summit
Kaspersky Cyber Security Conference 2015
IDGA Homeland Security Week conference
Homeland Security Professionals Conference 2015
Secure Cities conference 2014
CyberMaryland conference 2014/15
National Press Club, Global Business News events 2014/15
Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review
co-sponsor)
Issue areatopics of writings/presentations/interviews/:
Cybersecurity
Homeland Security
Emerging Technologies
Transaction Processing
3-D Printing
Big Data
Internet of Things (IoT)
Wearables
Cloud Computing
Context-aware Computing
Artificial Intelligence
Critical Infrastructure Protection and Information Assurance
Data-Centers and Data-Center Consolidation
Digital Government
Digital Trust and Identity Integration and Management
Digitization and Imaging
Defined Leading Edge Technologies
Mobility
Outsourcing IT Services
Contact Centers
Sensors, Devices and Radio Frequency Identification (RFID)
Software Development
Virtualization
Web Analytics
Example Speech Topics: “The Cybersecurity Threat to You and
Your Business”, “UnderstandingCybersecurity”, “New
Technologiesand Strategies for Ensuring Physicaland
7. Cybersecurity”, “The Dawn of a New Technological Era”,How to
Do Business In Washington, DC”, “How to Use Social Mediato
Brand, Market, and Win Business”
Links to Writings, Webinars, Conference Speeches, Radio
Interviews:
5 Tech Voices You Should Be Following on LinkedIn https://business.linkedin.com/marketing-
solutions/blog/marketing-for-tech-companies/2016/5-tech-voices-you-should-be-following-
on-linkedin
Meeting Security Challenges Through Vigilance, Readiness and Resilience
http://www.brinknews.com/?p=5052?utm_source=BRINK+Subscribers&utm_campaign=b9404
3847f-BRINK_Daily_Insights_28_02_17&utm_medium=email&utm_term=0_c3639d7c98-
b94043847f-110145109
Homeland Security wins in Trump budget, especially in cybersecurity [Commentary]
http://fifthdomain.com/2017/03/17/homeland-security-wins-in-trump-budget-especially-in-
cybersecurity-commentary/
The cybersecurity priority for DHS in 2017 http://www.federaltimes.com/articles/the-cybersecurity-
priority-for-dhs-in-2017
Congress had an office that gave expert tech analysis; let's bring it back
http://thehill.com/blogs/pundits-blog/technology/306426-congress-had-an-office-that-gave-
expert-tech-analysis-lets
Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise
https://www.alienvault.com/blogs/security-essentials/recent-attacks-demonstrate-the-urgent-need-
for-c-suite-cybersecurty-expertise
Will Vulnerable U.S. Electric Grid Get a New Protection
mandate? http://www.brinknews.com/will-vulnerable-u-s-electric-grid-get-a-new-protection-
mandate/
8. Creating A Secure Smart City http://www.qognify.com/blog/creating-secure-smart-city/
Alarming Cybersecurity Stats You Should Know by Chuck Brooks
http://insights.tridentcybersecurity.com/post/102e12n/alarming-cybersecurity-stats-you-
should-know-by-chuck-brooks
And I Think To Myself, What A Virtual World https://itspmagazine.com/from-the-
newsroom/and-i-think-to-myself-what-a-virtual-world
CHUCK BROOKS:THEIIOTPOTENTIALCYBERTHREATSCONSEQUENCES HTTP://WWW.IIOT-
WORLD.COM/CYBERSECURITY/CHUCK-BROOKS-THE-IIOT-POTENTIAL-CYBER-THREATS-CONSEQUENCES/
Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber-
defense-in-an-imperfect-world-a-new-approach/
Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL Magazine
http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-part-iv-securing-vote
US must invest more in advanced computing http://thehill.com/blogs/pundits-
blog/technology/291013-us-must-invest-more-in-advanced-computing
Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-watch-follow-the-tech-
leader/
Gen Touhill brings vision, strategy as nation’s first CISO
http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-as-nations-first-ciso
The Emerging Trend of Gamification in Cybersecurity
https://www.alienvault.com/blogs/security-essentials/the-emerging-trend-of-gamification-in-
cybersecurity
Emerging Focus on Cyber Threats to the Energy Infrastructure
http://www.federaltimes.com/articles/emerging-focus-on-cyber-threats-to-energy-infrastructure
9. Safeguarding Patients and Data In The Evolving Healthcare Cybersecurity Landscape
https://www.alienvault.com/blogs/security-essentials/safeguarding-patients-and-data-in-
the-evolving-healthcare-cybersecurity-landscape
How The Next Administration WillReshape DHS
http://www.federaltimes.com/articles/how-the-next-administration-will-reshape-dhs
Socializing Citizen Services In The Public Sector http://bizcatalyst360.com/socializing-citizen-
services-in-the-public-sector/
NCF-DC1 Washington DC Cyber News Update With Chuck Brooks
http://www.logiccentralonline.com/new-cyber-frontier/ncf-dc1/
NGA's Homeland panel to benefit from Governor Hutchinson’s experience,
leadership http://www.federaltimes.com/story/government/dhs/blog/2016/08/10/ngas-
homeland-panel-benefit-hutchinsons-experience-leadership/88031784/
DHS cyber role elevated in new legislation
http://www.federaltimes.com/story/government/dhs/blog/2016/06/15/dhs-cyber-role-
elevated-new-legislation/85934982/
Embracing Global Public/Private Cybersecurity Alliances
https://www.alienvault.com/blogs/security-essentials/embracing-global-public-private-
cybersecurity-alliances
The Gender Gap in Cybersecurity Can, and Should Be,
Closed http://www.itsecurityplanet.com/from-the-newsroom/the-gender-gap-in-
cybersecurity-can-and-should-be-closed
Digital Convergence and Cybersecurity https://www.alienvault.com/blogs
Are There Potential Intelligent Neighbors On Planets Close To Earth (And Beyond)?
http://bizcatalyst360.com/are-there-potential-intelligent-neighbors-on-planets-close-to-earth-
and-beyond/
10. The Globality Quotient: Cybersecurity. “Hacked Again” & Women in Digital Universe
http://bizcatalyst360.com/cybersecurity-hacked-again-women-in-digital-universe/
4 stepsto a strong incidentresponse plan | CSO Online
http://www.csoonline.com/article/3104203/techology-business/4-steps-to-a-strong-
incident-response-plan.html
Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-
new-era-quantu m-computing/
UK/US Cybersecurity Will Thrive With or Without Brexit
http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will-
thrive-with-or-without-brexitooperation
Creating a Digital Career Path for Native Americans
http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-
career-path-native-americans/84455826/
The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the-
rise-of-the-chief-data-officer
Ransomware Trending as Weapon of Choice for Hackershttp://www.itsecurityplanet.com/from-
the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers
The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-
blog/technology/280481-the-government-explores-artificial-intelligence
The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the-
newsroom/the-cusp-of-technological-transformation
The Globality Quotient: Cybersecurity (ChuckBrooks
Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/
Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human
Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-
Link-Will-Always-Be-the-Human-Element.html
DHS's ongoing challenge: Securing soft targets by Chuck Brooks
http://www.federaltimes.com/story/government/dhs/blog/2016/03/28/dhss-ongoing-challenge-
securing-soft-targets/82350628/
Chuck Brooks, Winner "Cybersecurity Marketerof the Year", Cybersecurity Excellence
Awards https://americansecuritytoday.com/chuck-brooks-winner-2016-cybersecurity-
excellence-awards/
11. 3 of the biggest concerns about external cyberthreats Phishing attacks employingmalware,especially
ransomware, is a topcybersecurityconcernof ChuckBrooks (@ChuckDBrooks), vice president of government relations and
marketing at SutherlandGlobal Services. “Anyone andeveryone is vulnerable,” he said. “The expandinginterconnectivityof our
devices andthe Internet of Things alsomakesmalware a network threat. Andwiththese kinds of phishing attacks, it is often
quite difficult to findandprosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
Government R&D can be a catalyst for technological progress
http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst-
for-technological-progress
The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
https://www.yumpu.com/en/document/view/55008535/the-gsn-2015-digital-yearbook-of-
awards/8
Key homeland security priorities to watch in 2016
http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland-
security-priorities-watch-2016/77368604/
Seven astounding technology trends for 2016
http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016
Preparing for the Coming Millennial Workforce
https://www.careersingovernment.com/tools/gov-talk/career-advice/preparing-coming-
millennial-workforce/
HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland
Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn-
tv/hsn-charles-brook-interview?Itemid=
The Internet Of Things (IoT) Has Arrived – What You Should Know
http://wavefrontonwireless.com/the-internet-of-things-iot-has-arrived-what-you-should-know/
7 Top Tech Trends Impacting Innovators in 2016
http://www.innovationexcellence.com/blog/2015/12/26/7-top-tech-trends-impacting-
innovators-in-2016/
The alchemy of big data in government http://thehill.com/blogs/pundits-
blog/technology/263890-the-alchemy-of-big-data-in-government
Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks
interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
security-alerts/79982178/
12. The Internet of Things and Cyber- Security: Government
Readiness https://www.peerlyst.com/blog-post/the-internet-of-things-and-cyber-security-
government-readiness
Smart cities, the Internet of Things and the Blue
Revolution: http://thehill.com/blogs/pundits-blog/technology/254779-smart-cities-the-
internet-of-things-and-the-blue-revolution
Christopher Gorog - CWC Cyber – Conversation with Chuck Brooks
http://www.christophergorog.com/cyber-security/cwc-cyber-1/
Protecting the Internet of Things and living in Smart
Cities: http://www.federaltimes.com/story/government/dhs/blog/2015/09/24/protecting-
internet-things-and-living-smart-cities/72742172/
Does Government Need ‘Hardware-Separated’ Operating
Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does-
government-need-hardware-separated-operating-systems/121826/
Winning With Women - an interview with Chuck Brooks:
https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male-
interview-with-chuck-brooks-vp-government-relations-marketing-sutherland-global-services/
The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-
blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington
Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security
News) gsn 2014 digital yearbook of homeland security awards recipients
Homeland Security Interview by Government Security News on Key issues for
2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html
Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-
blog/technology/238756-some-catalyzing-technologies-on-the-government-horizon
Solving Problems with Technology
Convergence http://government.blogs.xerox.com/2015/04/02/solving-problems-with-
technology-convergence/#prettyPhoto
Government prioritizes digital engagement
(Computerworld) http://www.computerworld.com/article/2931835/it-
transformation/government-prioritizes-digital-engagement.html
13. Department of Homeland Security Explores
Wearables http://www.wearablevalley.co/department-of-homeland-security-explores-
wearables/#more-21
The OPM breach screams for action | SecurityInfoWatch.com
https://www.google.com/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-
8#q=The+OPM+breach+screams+for+action.+Chuck+Brooks
Servicing the Internet of Things and the New Digital
Economy http://government.blogs.xerox.com/2014/11/21/servicing-internet-of-things-new-
digital-economy/#.VKriQCvF91Y
Adopting a cooperative Global Cyber Security Framework to mitigate cyberthreats (before it
is too late) http://www.voodootec.com/author/chuckbrooks/
Xerox’s Chuck Brooks: Preparation, Commitment Key for Govt-Industry Cyber
Partnerships http://blog.executivebiz.com/2015/01/xeroxs-chuck-brooks-preparation-
commitment-key-for-govt-industry-cyber-partnerships/
Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel)
https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar
DHS, FBI stepping up digitization of
Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-
stepping-up-digitization-records
Internet of Things, New Frontier of Technology
Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-
convergence/#prettyPhoto
Wearables Bring New Sense of Fashion to Public
Sector http://www.nextgov.com/technology-news/tech-insider/2015/02/wearables-bring-
new-sense-fashion-public-sector/104679/
DHS: A decade (and more) of competing
congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/D
HS-decade-more-competing-congressional-oversight
Huffington Post Cybersecurity Industry Interview With Xerox's Chuck
Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
in_2_b_4620232.html?utm_source=Alert-
blogger&utm_medium=email&utm_campaign=Email%2BNotifications
14. The DHS's vital role in confronting the threat of pandemics and bioterrorism |Federal
Times http://www.federaltimes.com/article/20141104/BLG04/311040018/The-DHS-s-vital-
role-confronting-threat-pandemics-bioterrorism
"Why You Should Be Excited About Future Tech"
(InformationWeek) http://www.informationweek.com/strategic-cio/executive-insights-and-
innovation/why-you-should-be-excited-about-future-tech/d/d-id/1114036?
Dick Tracy and the Benefits of Virtual Government
http://government.blogs.xerox.com/?s=virtual+government
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/
Creating resilience with public/private partnerships—and planning (MIT Sloan
Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate-
partnerships-and-planning/
DHS’s Special Partnership with Native Americans (Indian Country
News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958-
dhs-s-special-partnership-with-native-americans
TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at
Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
Homeland Security is Back in the Limelight By Chuck Brooks (The Hill)
http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is-
back-in-the-limelight
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Report http://www.counciloncybersecurity.org/articles/critical-infrastructure-cybersecurity-
takes-center-stage-a-decade-after-the-9-11-commission-report/#tweet-link
Transportation security: Back to the future http://thehill.com/blogs/pundits-blog/212288-
transportation-security-back-to-the-future
Chief Data Officers in the Government – What Role Should They Play?
https://government.blogs.xerox.com/2015/02/20/chief-data-officers-government-what-role-
should-they-
play/?utm_content=sf36444741&utm_medium=spredfast&utm_source=twitter&utm_campaig
n=Corporate+Channels&CMP=SMO-Facebook+sf36444741#.VSLkIJh0xdh
15. Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-
data-what-its-worth/#.VSLft5h0xdg
Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s
ecurity_discussi
The public/private imperative toprotect the grid by ChuckBrooks (Federal
Times) http://www.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
How S&T drives innovation at
DHS" http://www.federaltimes.com/article/20140423/BLG04/304230005/How-S-T-drives-
innovation-DHS
“Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-
brooks
The public/private imperative toprotect the
grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-
imperative-protect-grid
Government Security News 2013 Homeland Security Awards (Lead
Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative
Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security
Week
presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234
Tech Interviews Featured on House Homeland Security
Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S
chedule_for_March_1620/
DHS Secretary Jeh Johnson revitalizes the 'One
DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-
Secretary-Jeh-Johnson-revitalizes-One-DHS-vision
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve
Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-
measures-make-for-a-different-event
16. DHS as the Epicenter for Cybersecurity in Government (Government Security
News): http://www.gsnmagazine.com/node/32882?c=cyber_security
Native Americans key to border security success http://thehill.com/blogs/pundits-
blog/immigration/214494-native-americans-key-to-border-security-success
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
Three keys to unlocking tech treasures -- Focus on collaboration, STEM and 'foraging' (Federal
Times) http://www.federaltimes.com/apps/pbcs.dll/article?AID=2013310280011
Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of
Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-
webinar-evolving-role-cybersecurity-department-homeland-security
“Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet
of Things; Health & Medicine; and,
Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html
Public/Private Partnerships
(FORBES): http://www.forbes.com/sites/xerox/2013/08/12/successful_public_private_partners
hips/
Chuck Brooks presentations at Global Risk Expo in ASTANA,
KAZAKHSTAN http://astanaforum.org/2014/events/international-expo-conference-global-risk-
expo
Featured Speaker:Chuck Brooks - Homeland Security Week
2015 http://www.homelandsecurityweek.com/SpeakerInfo.aspx%3Ftp_spkid%3D105234
Featured Speaker: Homeland Security Week 2014
Conference https://www.asdevents.com/event_speakers.asp?id=3323&desc=Homeland+Securi
ty+Week+2014+Conference
Using Social Media to Link In to Government: http://bizcatalyst360.com/linking-government/
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
17. The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies (Presenting)
http://www.prweb.com/releases/2014/02/prweb11609927.htm
Tech & Innovation thought leader ChuckBrooks joins The Franklin Foundation Board of
Directors http://www.prlog.org/12396042-tech-innovation-thought-leader-chuck-brooks-
joins-the-franklin-foundation-board-of-directors.html
Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower |
Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark-
amtower
Featured Speaker: 4th Annual Human Cyber
Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
How Big Data Will Revolutionize Aviation Security (ChuckBrooks
Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_new
s%5D=32217
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record
Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
Transaction Processing is at the Root of Data Analytics
http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data-
analytics/#prettyPhoto
BizCatalyst 360: Digital Government Yields Customer Service
Innovation http://bizcatalyst360.com/digital-government-yields-customer-service-
innovation/
Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to
present June 26 webinar on evolving DHS role in Strategic Cyber
Operations http://gsnmagazine.com/node/41412?c=cyber_security
Digital Government Yields Exciting
Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields-
exciting-innovation/
Transforming US Border Crossing
http://government.blogs.xerox.com/2014/05/21/transforming-u-s-border-control-
processing-through-automation/
18. Radio Interview: All things LinkedIn -
FederalNewsRadio.com http://www.federalnewsradio.com/239/3691601/All-things-LinkedIn
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve Lasky
http://www.securityinfowatch.com/article/11416172/boston-marathon-security-measures-
make-for-a-different-event
DHS's Special Partnership with Native Americans Homeland Security
Today http://www.nxtbook.com/nxtbooks/kmd/hst_201310/#/12
Pausing Before Tapping “Connect:” Can Privacy and
Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
The Future of Social Media (Chuck Brooks
quote) http://www.business2community.com/social-media/future-social-media-60-experts-
share-2014-predictions-0718083
Next Practices Institute Events - Executive Next Practices
Institutehttp://www.enpinstitute.com/events/
What Government Agencies Can Learn From The Private Sector
(FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact-
centers-for-consolidation-3-takeaways-from-the-private-sector/
Xerox Real Business Radio Online Radio | BlogTalkRadio
http://www.blogtalkradio.com/xeroxradio
Interview - Global Radio Talk Show – Interviews with Business Leaders
... http://globalradiotalkshow.com/
Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in
Moscow http://www.gsnmagazine.com/node/33583?c=access_control_identification
Government cyber security programs mandated to go commercial (Cygnus
Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-
called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector
Leaders Share Innovation, Talent and Regulatory Strategies
(Presenting) http://www.prweb.com/releases/2014/02/prweb11609927.htm
19. Mobile Apps Continue to Shape Government Agencies
http://government.blogs.xerox.com/2014/10/15/mobile-apps-continue-to-shape-
government-agencies/#.VjZQ1_mrTIU
Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology-
better-government-customer-service.htm
Radio Interview: The U.S. Needs a Proactive Approach To Combat
Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive-
approach-to-combat-cybercrime/
Featured Speaker; Symposium on Homeland Security & Defense
http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015-
Symposium-on-Homeland-Security__Draft-Schedule-3_30_15.pdf
Interview with Chuck Brooks The Business Edge |
VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
Featured Speaker; The Counter Terrorist
magazine http://www.thecounterterroristmag.com/conference/
Moderator, Technology Conference - Association for Corporate
Growth http://www.acg.org/boston/technologyconference.aspx
Featured Speaker: 4th Annual Human Cyber Forensics
Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc.
http://www.fbcinc.com/e/cybermdconference/speakers.aspx
Cybersecurity 2014: Beyond the NIST framework -
FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
How Wearable Devices Can Transform Contact Center
Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable-
devices-can-transform-contact-center-operations/
Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox:
What are your Homeland Security
views? http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr01301501.html
20. How To Successfully Implement Social Media For Business Development In
Government https://howtomeasuresocialmediaingo2015.sched.org/event/c88310c3c0bb9a1
2dcc3742b7d609543#.VSK8z5h0xdg
Listed as one of the top 50 in "Data Sciences" on LinkedIn “25 Data Scientists Popularon
LinkedIn” Posted by Vincent Granville http://www.datasciencecentral.com/profiles/blogs/25-
data-scientists-popular-on-linkedin
Keeping Pace With a Streamlined Service
Approach http://www.datasciencecentral.com/profiles/blogs/25-data-scientists-popular-on-
linkedin
Cybersecurity 2014: Beyond the NIST framework http://fedscoop.com/cybersecurity-2014-
beyond-nist-framework/
Featured Speaker: Social media in Government
conference http://aliconferences.com/events/social-media-in-government_0515/
CyberTECH Network | Advisors http://cybertechnetwork.org/advisors/
CYBER CRIME & IDENTITY THEFT IN A GLOBAL BUSINESS
ENVIRONMENT http://www.ctcbiz.org/upcoming/flyers/cyber2014/CTC%20Cyber%20Securit
y%202014%20Outline.pdf xerox | GovCon Executive
http://www.govconexecutive.com/%3Fs%3Dxerox
Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington,
DC Washington '14 March - Global HR
Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
Public/private partnership is key to be competitive in any market. The Know
How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive-
in-any-market-the-know-how/
21. It was an honor co-presenting with John Perren former Assistant Director of the
Weapons of Mass Destruction Directorate of the FBI, and LTC Scott Appelgate,
Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs Of Staff and Dr.
Frederic Lemieux Professor and Program Director, at the National Security Threat
Convergence: Violent Extremism and Cybersecurity event at George Washington
University
22. Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner •
Learn from Security Experts & Advisors Including:
Chuck Brooks
Vice President for GovernmentRelations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise
from the Growing Risk of Security Breaches as it Relatesto the
Internet of Things
23. Meeting: BOARD ON LIFE SCIENCES and
BOARD ON CHEMICAL SCIENCESAND
TECHNOLOGY
Safeguarding the BioeconomyIII
Safeguarding the Bioeconomy III: Securing Life Sciences Data
Speaker: Charles (Chuck) Brooks serves as the Vice President for Government
Relations & Marketing for Sutherland Global Services. Chuck also serves as
Chairman of CompTIA’s New and Emerging Technology Committee, and he
serves as subject Matter Expert to The Homeland Defense and Security
Information Analysis Center (HDIAC), a Department of Defense (DOD)
sponsored organization through the Defense Technical Information Center
(DTIC). In government, he served at the Department of Homeland Security
as the first Director of Legislative Affairs for the Science & Technology
Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to
the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security
and Congress. He has an MA in International relations from the University of Chicago,
and a BA in Political Science from DePauw University, and a Certificate in International
Law from The Hague Academy of International Law. Chuck is widely published on the
subjects of innovation, public/private partnerships, emerging technologies, and issues of
homeland security and cybersecurity
24. From “Cybersecurity is Top Business Priority in 2017”
https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017
In assessing the severity of security flaws in cyberspace, I spoke with several experts in the
field.
Charles “Chuck” Brooks is the vice president for government relations and marketing for
Sutherland Government Solutions. He served at DHS as the first director of legislative affairs
for the Science and Technology Directorate. He ominously points out:
"The reality is that the more digitally interconnected we become in our work and personal
lives, the more vulnerable we become." -- Chuck Brooks
Mr. Brooks adds: "Mitigating cyberthreats will grow as a priority for business, and for us
personally, if we are to commercially function and prosper."
25. But how can companies successfully mitigate cyberthreats?
His advice: "The C-suites and governing boards of corporations will need to invest in better
enterprise and endpoint security toprevent phishing and malware probes by hackers. This
will also require better training of executives and employees in basic information security
measures."
Chuck Brooks wins Marketer of the Year at 2017
Cybersecurity Excellence Awards
Thu, 2017-02-09 01:49 PM
Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of
The New Emerging Technologies Committee for CompTIA, was named winner of
Cybersecurity Marketer of The Year at the 2017 Cybersecurity Excellence Awards.
The 2017 Cybersecurity Excellence Awards recognize companies, products and
individuals that demonstrate excellence, innovation and leadership in information
security. The finalists and winners were selected based on the strength of their
nomination and the popular vote by members of the Information Security
Community (both ratings and comments).
“Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year
category in the 2017 Cybersecurity Excellence Awards,” said Holger Schulze,
founder of the 350,000 member Information Security Community on LinkedIn which
organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners
and finalists reflect the very best in leadership, excellence and innovation in today's cybersecurity industry.”
Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as he is
respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been a force in
discussing, advocating, promoting cybersecurity issues across digital media, at events, in professional
forums, and with a variety of public policy organizations.
He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies in both
the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech People to Follow On
LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and conferences. He recently
presented at a workshop sponsored by The National Academies of Sciences, Engineering, and Medicine and
Brooks
26. the Federal Bureau of Investigation on Securing Life Sciences Data. He recently spoke at George Washington
University event about the Cyber Threat Spectrum, will be participating soon at USTRANSCOM Senior Leader
Cyber Security Roundtable.
Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology
innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT Security
Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government Security News, and
Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn and a global following and
has brought significant attention to cyber issues from his frequent posts and commentaries. He has been
involved as a judge for the past four years as a Judge for Government Security News’ Annual Homeland
Security Awards.
As a senior executive in government relations, marketing, and management, Chuck brings a unique
experience from service in the public sector, academia, and industry. He serves on a variety of boards,
many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a
special subject matter expertise of cybersecurity and homeland security in government that have benefited
both the not-for-profit, public, and commercial sectors.
Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral Jay
Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck B rooks. as Director of
Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress
in making the "reformation" of DHS S&T a complete success. His Hill/DC acumen, insight, reliability, ability
to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16
years dealing with senior executive branch officials, industry, academia and the Congress.”
Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate professional
who has a deep understanding of the issues, process, and people involved in the world of homeland security
and Law enforcement. His breadth of experience derived from working on The Hill, in government, in
academia, in industry, and with the media make him truly unique.”
Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national
security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at John
Hopkins University where taught homeland security for two years. He has advised a multitude of
organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and the Center
for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging Technologies
Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the Board of Advisors for
CyberTech, and on the Board of Directors at Bravatek, and the Cyber Resilience Institute. He is an advisor to
R & D cybersecurity company Inzero Systems. He is a subject Matter Expert to The Homeland Defense and
Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization
through the Defense Technical Information Center (DTIC. Chuck also serves as a Christian Science Monitor
“Passcode Influencers Panel member” on Information Security. He has a BA from DePauw University and an
MA from the University of Chicago.
--------------------------------------------------------------------------------------------------------------------------------------------
27. Chuck Brooks – Winner of 2016
Cybersecurity Excellence Awards
By American Admin -
March 25, 2016
Chuck Brooks, "Cybersecurity Marketer of the Year"
We are excited to announce that Chuck Brooks has been named the WINNER of
“Cybersecurity Marketer of the Year” in the 2016 Cybersecurity Excellence Awards. The
Awards are an annual competition that honors individuals and companies that
demonstrate excellence, innovation and leadership in information security.
Chuck has been a force in discussing, advocating, promoting cybersecurity and marketing
issues across all mediums. He is known for his thought leadership on cybersecurity issues
and has published on these topics in the Huffington Post, Forbes, Government Security
News (regular contributor) . The Hill (featured contributor), Federal Times (featured
contributor), AFCEA Signal Magazine (columnist), Christian Science Monitor (Member
of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland
28. Security Today, Cygnus Media, IDGA website (contributing writer), BizCatalyst360
(featured contributor), and Biometric Update (featured contributor). He is Vice Chair of
CompTIA’s New and Emerging Technologies Committee, an Advisor to Cybertech,
Inzero Systems, B2B Cybersecurity, Cyber Resilience Institute, on the Board of
Bravatek, and is an a technology Partner advisor to the Bill and Melinda Foundation. He
has also been a featured speaker and panelist at many conferences and events.
About Chuck Brooks
Most of us know his via social media for his regular posts and may be one of his 32,000
followers on LinkedIn. Charles (Chuck) Brooks serves as the Vice President for
Government Relations & Marketing for Sutherland Government Solutions. In
government, he served at the Department of Homeland Security as the first Director of
Legislative Affairs for the Science & Technology Directorate. He also spent six years on
Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered
foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct
Faculty Member at Johns Hopkins University. He has an MA from the University of
Chicago and a BA from DePauw University.
Chuck thought leadership writings on cybersecurity have helped shape the public policy
debate as he is respected in industry, in the Federal Government, academia, and on Capitol
Hill. He also has a strong following at many of the embassies in Washington, DC
Chuck is a pioneer in social media with a global following and has brought significant
attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter,
Facebook, FedScoop, and other social media
Chuck brings experience from service in the public sector, academia, and with corporations.
He serves on a variety of boards, many of them philanthropic. He brings a substantive
knowledge on a broad range of cyber issues and a special expertise of cybersecurity in
government that have benefited both the not-for-profit, public, and commercial sectors.
29. -----------------------------------------------------------------------------
Christian Science Monitor’s Passcode
Influencers gathered from 120 experts from across
government, the private sector, research, and the privacy
advocacy community
s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government
relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital
Outre Thought Leadership, Strategic Partnering, Branding) for the Federal
a
Charles (Chuck) Brooks serves as the Vice President for Government Relations &
Marketing for Sutherland Global Services. Chuck leads Federal and State & Local
Government relations activities. He is also responsible for the Marketing portfolio
(Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for
the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda
Gates Technology Partner network and serves on Boards to several prominent public and
private companies and organizations. Chuck has extensive service in Senior Executive
Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the
Department of Homeland Security as the first Director of Legislative Affairs for the
30. Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security and
Congress. He has an MA in International relations from the University of Chicago, and a
BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates
The poles of debate are still forming in the Digital Age. There is
no common philosophy defining what constitutes a "hawk" or a
"dove" in cyberwar. International norms for countries' behavior
on the Internet are not yet established. There's still no consensus
about the appropriate balance between personal privacy and
national security when it comes to government surveillance or
private-sector encryption. Many companies and organizations
are divided about the best defenses that will shield them from
online attacks.
Passcode, The Christian Science Monitor's new section on
security and privacy, formed an Influencers Poll to foster debate
and discussion in this space. We regularly survey a wide swath of
in-the-know experts about the most pressing issues – and share
their answers and opinions with our readers. To form our pool of
Passcode Influencers,we gathered more than 120 experts from
across government, the private sector, research, and the privacy
advocacy community.
-----------------------------------------------------------------------------------
31. Navigating the four pillars of
Washington
By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically and
socially. Its architectural design is modeled after Paris and it is certainly a city of
cultural diversity and historically interesting neighborhoods. Visually, the site of the
monuments reflecting against the panoramic backdrop of the Potomac River is
memorable for both visitors and native Washingtonians alike.
It is really a city like no other city in America. Although it may be geographically
small, Washington serves as the engine of government, an anchor of global financial
policy and representation, a seat of institutionalized policymaking organizations, and
as a growing center for business, especially in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life "inside
the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain
how to navigate it and decipher how things worked. Looking back, I would like to
offer structure and pathways for others contemplating a public service career or
seeking to accomplish tangible objectives for policy and/or business purposes in the
nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches); commercial
(business, including global financial institutions; policy: (academia, think tanks and
associations/organizations); and media (old and new).
These pillars function both individually and collectively. They are intertwined and to
be effective, it is essential to understand their roles and impact on what you hope to
accomplish. Understanding and gaining experience within these pillars that comprise
the operational system of Washington takes focus and time. Success can be
realized by navigating the pillars and establishing a strategy of strategic relationship
building and connecting.
Government: There has never been any doubt that government and politics make
Washington tick. Government is not only the basis for tens of thousands of jobs in
the area, but it also serves as the fulcrum for evolving and communicating domestic
and international policies. Government is the center for laws and executive orders
overseeing all aspects of our daily life and our professions. The Pentagon,
intelligence agencies, and Department of Homeland Security are all based in
Washington because it is the epicenter of power and decision-making. Government
in Washington is by design structured as a system of check and balances. An
understanding of how the various branches of government function is essential to
influencing any regulatory outcome whether it be energy, healthcare or a national
security issue. Working on Capitol Hill is invaluable experience and connects to all
the pillars and is a special pedigree for mobility in one's career.
32. Commercial: Although it is not a financial center like New York, Washington has
been transforming over the years as a commercial hub. The World Bank, Federal
Reserve, International Financial Corporation and the Chamber of Commerce are
some of the organizations headquartered in the city. Many corporations have also
relocated to the area to be near the action and position themselves for government
and commercial opportunities. Both Virginia and Maryland have established high-
tech corridors close to the city for those reasons. The international community with
their embassies and trade groups increasingly see Washington as a growing center
for commerce.
Policy: It is not only the pillars of business and government that are cogs in the
machine. Policy organizations (such as the Center for Strategic and International
Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise
Institute and the Aspen Institute) that provide issue expertise, training and solutions
are really the enabling fuel. A myriad of think tanks offer the latest insights in
domestic and global events on a regular basis. Top local universities (such as Johns
Hopkins's School of Advanced International Studies, George Washington,
Georgetown, American, George Mason, and Maryland), also promote dialogue and
informed decision-making and access. The over 6,000 associations and organization
with issue specific interests regularly outreach to key decision–makers who are part
of the public and private sector pillars. Strategic communications and thought
leadership are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to circumspect the
activities of the other three pillars. The media's role is a fundamental one; any
system of democratic government cannot operate without transparency and
oversight. In Washington, most of the country's key media outlets have
representation. Outside traditional old media, new media has become a force to
consider. Most citizens have constant access and the metrics of public opinion are
constantly pulsed. Corporate executives and government leaders use the social
media, especially LinkedIn, Facebook and Twitter as part of their work environments.
Government 2.0 and Business 2.0 are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue expertise,
contacts and gaining a holistic perspective of how Washington really works. This
experience can provide the tactical knowledge to advance your marketing efforts
and/or cause in the public/private world. There is no substitute for experience and for
building a personal network to be empowered and effective. To be successful, you
have to always keep abreast of the latest trends and be visible and helpful to your
customer. In the Washington arena, you also have to develop the qualities for
resilience and persistence as no one is always on the winning side of issues and
contracts.
Washington will always have its image challenges and be an enigma as to how it
functions, especially to those who have never experienced life inside the Beltway.
Exploring and experiencing the four pillars will bring an understanding of how to
navigate a path to success for those who come to this amazing city to make a
difference and leave a positive legacy.
33. ----------------------------------------------------------------------------------------------------------------
Chuck Brooks on Cybersecurity: The
Weakest Link Will Always Be the Human
Element
Cybersecurity expert Chuck Brooks talks about where we stand in what
many people call the "wild, wild west" of cybersecurity.
http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will-
Always-Be-the-Human-Element.html
BY LARRY KARISNY / MARCH 1, 20160
If you're in the cybersecurity business, you know the name Chuck Brooks.
He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee, subject
matter expert to the Homeland Defense and Security Information Analysis Center,
“passcode influencer” for The Christian Science Monitor,on the Board of Advisors
for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience
Institute.
Brooks also has authored numerous articles focusing on cybersecurity,homeland
security and technology innovation for such publications as Forbes, Huffington
Post,InformationWeek,MITSloan Blog, Computerworld, Federal
Times, NextGov,GovernmentSecurity News, Cygnus Security Media, Homeland
Security Today,The Hill and Government Executive.
I recently got a chance to get Brooks' take on where we are today in what many
people call the "wild, wild west" of cybersecurity. Here are his thoughts.
Q. You wear manyhats and certainlyhave been focused on cybersecurity
for some time now. So tell me, who is ChuckBrooksand what is he
trying to accomplish this space?
A. You are right, over my career in government, corporate and academia,I have
worn many hats. There have been some strong common threads [of] science,
technology, national security,and legislative and executive policy in all my various
roles. Thankfully, I selected a professional vocation of government relations and
marketing that encompasses all those threads.
34. My passion for cybersecurity issues was first established over a decade ago during
the time I spent at the Department of HomelandSecurity’s Science and Technology
Directorate. Back then, the threats to our critical infrastructure were not as
pronounced as they are today. Of course we were just beginning to experience the
smartphone era. The field of cybersecurity has evolved exponentially along withthe
technologies, networks and connectivity that make up the cyberecosystem. And the
ecosystem is quite diverse and expansive, comprising software, hardware,
monitoring, forensics, governance and more. All these elements make it an exciting
area to explore since there is always more to learn from strategy and technology
perspectives. Also, it certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it touches
everything work- or personal-related. In both the public andprivate sectors — just
about every CIO survey — cybersecurity is the top concern. And of course, along with
data analytics, cybersecurity is a annually a budget priority of federal spending.DHS
Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the
two top priorities for the protecting the homeland.
What I want to accomplish in this space is to continue being a subject matter expert
in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic
and especially in educating others on how it can impact their lives. My advisory and
board director roles with organizations are a reflection of that interest. When I retire
(which is a long way off), I hope to join academia again in a part-time role. I spent
two years at Johns Hopkins University SAIS [School of Advanced International
Studies] teaching graduate students homeland security and foundit very fulfilling.
Q. You have one of the most active groups in LinkedInunder theheading
of the Department of Homeland Security. How has this helped both
yourself and DHS in feeling thepulse of the cybersecurity industry?
A. I do operate a half dozen groups that focus on homeland security and information
security on LinkedIn, including a few of the largest groups: “U.S.Department of
Homeland Security, DHS” “Information Technology (Homeland& National
Security)” and “Homeland Security.”
In all, these groups include about 60,000people. Among the members are a host of
well-known cybersecurity professionals who often post and comment on issues of
the day. Also, as any news on data breaches or cyberincidents occur,they are often
posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the pulse of
policy. It has also served as a great networking venue to share ideas and information
35. with some of the best security minds around in both the private and federal sectors.
Many senior-level executives in the federal government are on social sites such as
LinkedIn, GovLoop, Facebook and Twitter.There are an estimated 1.5 million
federal government employees who regularly use LinkedIn, includingover 65,000
from DHS. Because of the growing need for public/private-sector collaboration and
interface, being actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do for the
company?
A. Sutherland Global Services is a global provider of business processing services,
contact centers, IT service desks and management consulting serving government
and U.S. leading corporations across multiple industries,including healthcare and
insurance, technology, mortgage and loan services, finance and banking,retail,and
travel. Sutherland has 36,000employees and annual revenues of over $1.2 billion,
[and] was listed in 2015 as one of the fastest growing private companies in America
byInc.
I work for the recently created Sutherland Government Solutions as VP of
Government Relations and Marketing, where we are at several agencies and are
known for integrated services for citizen service needs and digital government. Our
cybersecurity operations at Sutherland Government Services are internal, butwe do
have a practice in customer relations management after a company or agency has
been breached. Our cybersecurity practice is led by Glenn Schoonover who has a
deep technical background. He is a former chief information security officer for the
Army and was responsible for providing network security to the Department of the
Army headquarters. He is also a former senior technology strategist for Worldwide
National Security and PublicSafety at Microsoft.
Q. I see you are activein both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the private
sector (for the most part) is driven by profit and loss. The R&D efforts, innovation
sector and skilled technical expertise in the private sector has been more robust than
in government. Industry is more agile and able to react to threat trends.
On the federal side, the landscape has really changedover the past few years. [The
U.S. Departmentof Defense], of course, has had the cybersecurity war-fighting
mission and continues to build upon new requirements for operations and for
systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity.
Presidential and congressional directives have mandatedthat DHSplay a growing
and more primary role, especially with protecting critical infrastructure
36. (transportation, health, energy, finance) that is mostly owned by the private sector.
DHS has to step up its activities in assessing situational awareness,information
sharing, and resilience research and development plans with stakeholders. This has
led to a trend in public-private partnering for sharingthreat informationand in
creating standards and protocols. In both the publicand private sectors, training of
the next-generation cybersecurity technical and policy [subject matter experts] is a
major priority.
Q. To date,thereseems to be a stand-off between Apple and the federal
government when it comes to iPhone security.What are your thoughts
on this,and can thisbring aboutsome lessons learned for the
cybersecurityindustry?
A. This is the topic of the day, and it is a complicated issue relating to government
requesting a corporation to provide software to allow access to data. My thoughts
may be a bit different from some of the others in the industry. While I recognize the
importance of privacy and the dire risk of an Orwellian surveillance state,I consider
protecting innocent lives as a mitigating circumstance.What if that data thatthe FBI
is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network
planning more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law enforcement
to cooperate in these type of instances (with proper warrants and assurances) so that
company Internet protocol can be isolated and privacy issues for the company’s
customers can be best addressed. I am quite sure Congress will be looking closely at
this case to establish legislation to create a working formula.The lesson for
cybersecurity is that there is a balance between privacy and security that has to be
constantly reviewed in accordance with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon and
zetabytes of data projected by2020,can we secure and control our
digital processes, or arewe headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on the
Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of
sensors decreases and processing power and bandwidth continue to increase. The
fact is that most of these IT networks will have some sort of an IoT-based security
breach. We could be headed for a digital train wreck if IoT security standards are not
adopted. We may have a digital train wreck even if they are adopted. Standards will
have to be developed industry by industry. Protecting a network of medical devices
in a hospital will require different sets of standards than protecting utilities with
SCADA [supervisory control and data acquisition] systems that make up the electric
grid. There are a lot of questions, including who enforces compliance? And what are
the liabilities of an IoT breach?
37. The real danger is that the Internet was not
built for security at its inception; it was
built for connectivity. There is some truth to
the notion that your network may someday
be betrayed by your toaster or refrigerator.
One thing is for sure: the Internet of Things
will pose many challenges to cybersecurity
and data analytics, much of which we have
yet to contemplate.
Q. You've had theopportunity to
review many cyberdefense
technologies. Are we really finding
new solutions that can handle this
explosion of digital processes,or are
we still playing the game of catch-up
and patch-and-pray cybersecurity?
A. New solutions are continually evolving
with threats, but there will always be a need
for better encryption, biometrics, analytics
and automated network security to protect
networks and endpoints. It is a perpetual
game of cat and mouse between hackers
and protectors, and there is really no such
thing as being invulnerable.
In a sense, we are continually playing catch-
up and reacting to the last incident with
patches. The weakest link will always be the
human element. However, there are many
new interesting technologies that could
significantly impact cybersecurity in the
near future. There are technologies and
algorithms coming out of the national labs,
government, and from private-sector R&D
and startups that have the potential to be
disruptive.
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER LIST
OF CYBERSECURITY TECH
AREAS, PRIORITIES AND
EMERGING TRENDS
Emerging Technology Areas:
// Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and Public/Private
cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time” horizon
scanning and monitoring of networks
// Diagnostics and forensics (network
traffic analysis, payload analysis and
endpoint behavior analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
38. Q. Any final comments? And are
there any speaking engagements or
eventsyou areparticipating in that
you would like to announce? Could
you also offer a good source for
information on the subject of
cybersecuritythat you would suggest
for our readers?
A. Please check my regular posts in the
media and social media, join my LinkedIn
groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with
the National Cybersecurity Institute on my agenda. Also, in addition to social media,
which I highly recommend, there are many excellent outlets for cybersecurity
information includingthe Homeland Defense and Security Information Analysis
Center. A great site that aggregated cybersecurity news daily is The CyberWire.
Larry Karisny |
Larry Karisny is the directorof Project Safety.org, an advisor, consultant, speaker and writersupporting
advanced cybersecurity technologies in both the public and private sectors.
// More information sharing and
collaboration between the public and
private sectors
// Shared R & D spending
// Increased spending for cloud
computing
// Consolidation of data centers
// Expansion of hiring and training of
cybersecurity workforce
// Tech foraging
39. Find out what next for Cybersecurity after the elections, Chuck brings some great insight on the new
administrations and what they are focusing on. It was refreshing to hear that the Trump administration
seems to be proposing to support critical infrastructure advancement with federal funding. Hear Chuck t
about some long overdue needs in our nation’s Critical Infrastructure.
This is a great show you will not want to miss.