You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Chuck Brooks
President at Brooks Consulting International
Washington, D.C., United States
NAMED BY THOMSON REUTERS AS A “TOP 50 SOCIAL INFLUENCER IN RISK, COMPLIANCE.” NAMED BY IFSEC “#2 GLOBAL CYBERSECURITY INFLUENCER. TWO-TIME PRESIDENTIAL APPOINTEE. CORPORATE EXECUTIVE ROLES; GENERAL DYNAMICS, XEROX, SRA, RAPISCAN. THOUGHT LEADER, INFLUENCER, BRAND AMBASSADOR. 62k LINKEDIN FOLLOWERS, 12k TWITTER, 5k FACEBOOK. LEADERSHIP IN GOVERNMENT RELATIONS, MARKETING, BUSINESS DEVELOPMENT, AND STRATEGY
*Named Top Person To Follow on Tech by LinkedIn. Thought Leader, Influencer, Brand Ambassador.
*Adjunct Faculty at Georgetown University. Former Adjunct Faculty Johns Hopkins
* Marketing, Government Relations, Business Development, Strategic Partnerships, Corporate Growth Strategist
* Blogger and event speaker for AT&T, IBM, Blackberry/Cylance, Xerox, General Dynamics, Tripwire, others
*Received Presidential Appointments for Executive Service by two U.S. Presidents
*Helped "stand up" Office of Legislative at DHS. Served as first Director of Legislative Affairs at the DHS Science & Technology Directorate
*Served as Senior Legislative Staff (foreign affairs, security, tech) to Senator Arlen Specter, U.S. Senate
*Named Cybersecurity Marketer of the Year and Top Cybersecurity SME to Follow
* Contributor to FORBES on Technology and Cybersecurity topics
* Former Technology Partner Advisor at Bill and Melinda Gates Foundation
*EC-Council Global Advisory Board
* MIT Technology Review Advisory Panelist
* Cyber Start Up Observatory Hall of Fame
* Program Chair Quantum Security Alliance
* Judge Homeland Security Awards
* Advisory Boards (Cybersecurity, Emerging Technology, Risk Management)
* Project Management, and Marketing Certifications
* Former Auxiliary Police Officer
* Former competive powerlifter
THOUGHT LEADER, INFLUENCER, TECHNOLOGY EVANGELIST; Featured Writer/Speaker/Blogger: areas: homeland security, cyber security, CBRNE, artificial intelligence (AI), Internet of Things (IoT), science & technology, public/private partnerships, Risk Management, blockchain, innovation. Published in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov, Government Security News, Cygnus Security Media, Homeland Security Today (Visiting Editor), The Hill, Biometric Update, Bizcatalyst360, IT Security Planet, Christian Science Monitor. Published 180 + articles *
INDUSTRY EXECUTIVE: former Vice President for Homeland Security, Xerox; Former Vice President of Government Relations, SRA; Former Vice President R&D Rapiscan
* Co-leader of two top Homeland Security Groups on LinkedIn. Run 15 other business, tech LI groups
Available For: Authoring, Consulting, Influencing, Speaking Travels From: Washington,DC
Chuck Brooks
Points
Academic
55
Author
162
Influencer
971
Speaker
51
Entrepreneur
25
Total
1264
Points based upon Thinkers360 patent-pending algorithm.
Disruptive Tech & Org Change
Georgetown University
August 26, 2020
This course explores the impact of disruptive technological innovation on organizations and their ability to adapt to change. More precisely, students learn how to detect and anticipate disruptive technologies and their potential impact on organizational culture, processes, and strategies. The course places an emphasis on understanding organizational values, processes, resources, and migration capabilities. Upon completion of the course, students will be able to identify and apply sustainable solutions to accommodate disruptive innovations and capabilities to cope with organizational and industry changes.
Course #: MPCR-600-01
CRN: 38191
Format: On-campus
Instructor: Brooks, C.
Dates: Aug 26 – Dec 18, 2020
Class Meetings:
Mon 5:20 PM - 7:50 PM, Online, Room REMOTE
Cybersecurity Trends & Statistics For 2023; What You Need To Know
Forbes
March 05, 2023
While cybersecurity capabilities and awareness seem to be improving, unfortunately the threat and sophistication of cyber-attacks are matching that progress.
Quantum Tech Needed To Secure Critical Data From Quantum Decryption
Forbes
January 19, 2023
The quantum computing decryption threat will be here soon enough, and it is time for businesses, organizations and governments to protect their data for that inevitability
4 Mind-Boggling Technology Advances In Store For 2023
Forbes
December 13, 2022
2022 was a transformative year for technological innovation and digital transformation. The trend will continue as the pace of innovation and development of potentially disruptive emerging technologies exponentially increases every year. The question arises, what lies ahead for tech for us to learn and experience in 2023?
Cybersecurity and Business Computing Performance -- Out of the Box for 2023!
Linkedin
December 07, 2022
As we approach 2023, I was excited to upgrade my home office computing capabilities with a Dell Latitude 5430 laptop fortified with the Intel vPro platform. Because of my role in running a consulting firm, teaching graduate courses at a prominent university, and my passion for globally evangelizing cybersecurity in public forums, this was an easy choice for me to make.
A Cybersecurity Primer for The C-Suite, SMBS, and Organizations
LinkedIn
November 17, 2022
In this issue of Security & Tech Insights we explore strategies, policies, tools, and advice to better fortify cybersecurity for companies (and home offices).
Tags: Cybersecurity, Risk Management, Security, National Security
For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats
Forbes
October 02, 2022
As we begin Cybersecurity Awareness month, it is incumbent for all of us to be more wary than usual by the scary stats surrounding an increasingly sophisticated and lethal cyber threat landscape.
Emerging Tech On The Horizon
Security & Tech Insights
August 26, 2022
Welcome to the 10th edition of Security and Insights newsletter. In this edition topics of quantum, artificial intelligence, nanotech, and others are explored, including how they relate to security concerns. Thanks for reading and sharing! Best, Chuck Brooks
Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment
HS Today.US
August 12, 2022
Prevention and preparedness begin with discovering the knowns and unknowns in the code that is the backbone of the array of applications and operating networks.
Tags: Cybersecurity, Risk Management, Security, National Security
The Quantum Era Is Arriving, And It Will Be Transformational !
Forbes
July 20, 2022
The quantum era is arriving, and it will be transformational ! It is important to understand some of the basics, quantum computing, quantum sensing, quantum encryption, quantum IoT, and ultimately our quantum future
IntelvPro Means Business by now including the 12th Gen Intel Core processor To Meet Growing Cyber-Threats
LinkedIn
July 06, 2022
Recently, Intel introduced the Intel vPro with 12th Generation Intel Core processors to significantly enhance both business performance and security. With many new features needed for business to success in a rapidly changing and risky digital world, Intel vPro means business.
Public/Private Partnerships and Cybersecurity
Security & Tech Insights
May 27, 2022
This issue is focused on the importance of public private partnerships (PPP) and cybersecurity. PPPS have become a hot topic in cybersecurity and with government. It is a mission now being prioritized by CISA DHS.
A Cybersecurity Risk Management Strategy for the C-Suite
HS Today US
May 11, 2022
There is rarely a day that goes by when we do not hear of a cyber breach. Often the target is small and medium companies, and the result of a cyber-attack can mean loss of operations or even going out of business.
The Importance of Marketing Cybersecurity on LinkedIn And Other Social Mediums
Cyber Theory
May 11, 2022
Several years back, LinkedIn asked me to pen a blog on the perspectives of using social media and an outreach medium as a security practitioner. The blog was titled, “Why LinkedIn is an Indispensable Medium for Security Professionals,” and it garnered much attention. The theme of my writing was that LinkedIn had become part of the fabric of how I (and a majority of my security world peers) communicate, operate and conduct business.
Cyber Security Risk Management
LinkedIn
May 05, 2022
In this issue of the Security & Tech Insights newsletter we examine key elements of cybersecurity risk management, including new mandates to adhere to a Zero Trust Strategy. Thank you for reading and sharing. Also, kindly follow me on LinkedIn (6) Chuck Brooks | LinkedIn and Twitter @ChuckDBrooks for posts and articles on cybersecurity, emerging tech, and digital transformation. -- Chuck
The Internet of Things and Cybersecurity
LinkedIn
April 17, 2022
Welcome to the 5th edition of the Security & Tech Insights newsletter. In this issue we explore the implications of cyber-securing the Internet of Things, which is quite a challenge. Thank you for reading and please alert others you may know who might be interested in a free subscription. Thanks and Best regards, Chuck Brooks
The Intel vPro Platform Enterprise for Windows with Built-in Intel Hardware Shield Can Detect and Mitigate the Threat of Ransomware
LinkedIn
April 14, 2022
In the past few years, the deployment of ransomware has become a preferred method of cyber-attack by hackers. Most ransomware breaches begin with a phishing email or through a Remote Desktop Protocol (RDP) compromise. The rise in attacks is the result of the transformation to remote work and because many business networks and users do not use secure browsing practices. Many targeted businesses often lack the in-house cybersecurity expertise, understanding of the threats, and do not have many of the security tools necessary to help thwart attacks.
The Urgency To Cyber-Secure Space Assets
Forbes
February 27, 2022
Our reliance on space, and especially satellites, for communications, security, intelligence, and commerce has exponentially grown with digital transformation. Unfortunately, so have the risks, as a result, the need to prioritize cybersecurity around space assets is urgent.
Hi readers, this Security and Tech insights newsletter issue focuses on the urgency for cyber hygiene in an increasingly risk digital landscape. Also, please be sure to see the section on upcoming events of interest in cybersecurity.
PROTECTING CRITICAL INFRASTRUCTURE
LinkedIn
January 31, 2022
Dear Readers, welcome to the third edition of Security & Tech Insights Newsletter. In this issue, the focus is on protecting critical infrastructure, both from digital and physical threats. In addition, I have added a section on upcoming events and items of special interest at the end of the newsletter as so much is happening in security and cybersecurity in 2022! Thanks for subscribing and please follow me on LinkedIn and Twitter. Thanks and Stay Safe, Best Chuck
M&A Trending In Cybersecurity Industry Vertical For 2022
AT&T Business
January 28, 2022
Nowadays you need a scorecard to keep track of the monthly acquisitions and mergers in the cybersecurity industry. Mergers and acquisition (M&A) of products, capabilities, and companies has become a common strategy for business and market growth. Even through the Covid19 pandemic, trends in acquisition and consolidation of information security oriented companies remained quite strong. In fact, the volume of U.S. cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. Please see graphic from S&P Global Market Intelligence.
Tags: Cybersecurity, Leadership, Mergers and Acquisitions
Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats
Forbes
January 21, 2022
Last year I wrote two FORBES articles* that highlighted some of the more significant cyber statistics associated with our expanding digital ecosystem. In retrospect, 2021 was a very trying year for cybersecurity in so many areas.
NEW YEAR PREDICTIONS -- EMERGING TECH & CYBERSECURITY
LinkedIn
December 27, 2021
We are approaching 2022 and rather than ponder the immediate future, I want to explore what may beckon in the ecosystem of disruptive technologies a decade from now. We are in the initial stages of an era of rapid and technological change that will witness regeneration of body parts, new cures for diseases, augmented reality, artificial intelligence, human/computer interface, autonomous vehicles, advanced robotics, flying cars, quantum computing, and connected smart cities. Exciting times may be ahead.
Welcome To 2032: A Merged Physical/Digital World
Forbes
December 18, 2021
We are approaching 2022 and rather than ponder the immediate future, I want to explore what may beckon in the ecosystem of disruptive technologies a decade from now. We are in the initial stages of an era of rapid and technological change that will witness regeneration of body parts, new cures for diseases, augmented reality, artificial intelligence, human/computer interface, autonomous vehicles, advanced robotics, flying cars, quantum computing, and connected smart cities. Exciting times may be ahead.
Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats
AT&T Business
December 07, 2021
In 2020, I published an AT&T blog called “Top Cybersecurity Trends & Predictions for 2020’” 2021 Cybersecurity Trends and Insights | AT&T Cybersecurity (att.com) In the article I had forecasted that cybersecurity would become even more of a strategic priority for companies as the cost, sophistication, and lethality of breaches would continue to rise. Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, auomating phishing, and finding new deceptive paths for infiltrating malware.
Bolstering Cybersecurity Risk Management With SBOMS
Forbes
November 01, 2021
Cybersecurity is about risk mitigation, understanding the threats and fortifying gaps in networks and devices. Companies and organizations cannot fully protect digital assets unless they know what software applications you have connected to enterprise networks and devices. With the growth of supply chain attacks, and record number of breaches both to corporations and government agencies, there are efforts underway for more transparency, and accountability of such assets. One initiative is the call for a “Software Bill of Materials” (SBOM).
MORE Alarming Cybersecurity Stats For 2021 !
LinkedIn
October 24, 2021
Earlier this year I wrote a FORBES article called “Alarming Cybersecurity Stats: What You Need To Know For 2021.” Alarming Cybersecurity Stats: What You Need To Know For 2021 (forbes.com) It included an assortment of stats on the increase in threats to our digital wellness as companies, governments, and consumers. The article was based on the backdrop of a spate of high-profile cyber-attacks such as Solar Winds, and Colonial Pipeline and had painted a dire assessment of the 2021 first half status of the cyber-threat ecosystem. Now we have reached the second half of 2021. Just when we thought it could not get much worse from a cybersecurity stat perspective, it did.
The Security Challenge Of Protecting Smart Cities
Forbes
October 10, 2021
As we continue to move forward in the Industry 4.0 era of greater connectivity between the physical and digital, the promise and development of smart cities become a more likely vision. While the term may have differing definitions, the term “smart city” usually connotes creating a public/private infrastructure to orchestrate the integration of transportation, energy, water resources, waste collections, smart-building technologies, and security technologies and services in a central location.
The Cyber-Hygiene Mantra
US Cybersecurity Magazine
October 04, 2021
National Cybersecurity Awareness Month is a good time for everyone to review the importance of the basics of defending their data and devices from cyber-attackers. Cyber-hygiene is a starting point to build those fortifications.
Three Key Artificial Intelligence Applications For Cybersecurity by Chuck Brooks and Dr. Frederic Lemieux
Forbes
September 24, 2021
We are at the doorstep of a new era of smart technology and cybersecurity is already a testing ground. The cybersecurity industry is increasingly impacted by the deployment of solutions supported by artificial intelligence
Cyber “Whack-a-Mole” is a $10 Trillion a Year Hit for Shareholders and Management
Skytop Strategies
September 07, 2021
In the past several years, the world has changed and has become more perilous for corporate leaders. A new era of exponential digital connectivity catalyzed by the covid pandemic has changed the security paradigm. The growing and sophisticated cyber threat actors include various criminal enterprises, loosely affiliated hackers, and adversarial nation states. Every company is now a reachable target, and every company, large or small, has operations, brand, reputation, and revenue pipelines that are potentially at risk from a breach.
Ransomware on a Rampage; a New Wake-Up Call
Forbes
August 21, 2021
The rampage of Ransomware is a wake-up call. We live in an increasingly hyper-connected world that impacts all aspects of our lives. Managing and protecting data is a security imperative for every industry and organization.
A Roadmap On The Geopolitical Impact Of Emerging Technologies By Chuck Brooks And Dr. David Bray
Forbes
July 27, 2021
Earlier this summer, the Atlantic Council’s GeoTech Center published a new bipartisan report of Commission on the Geopolitical Impacts of New Technologies and Data (www.atlanticcouncil.org/geotechreport). Fourteen months in the making, the bipartisan recommendations highlight that the technological revolution is advancing at such speed and enormity that it is reshaping both societies globally and the geopolitical landscape.
A Risk Management Cybersecurity Imperative For State, Local & Tribal Governments
Forbes
July 21, 2021
The cyber-attack using the SolarWinds vulnerability raised alarms throughout the federal government as many agency networks data were presumably compromised. The extent of the damage from Solar Winds (and other recent breaches) are still being investigated and mitigated. The cyber breach not only impacted federal systems, but also state, local, and Tribal governments (SLTG) and data bases. The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), posted on its website that, the SolarWinds hacking campaign was “impacting enterprise networks across federal, SLTG governments, as well as critical infrastructure entities and other private sector organizations.”
The Chief Data Officers Growing Importance In Digital Transformation of Government
GovconWire
June 03, 2021
GovCon Expert Chuck Brooks, a highly esteemed leader to the cybersecurity and government contracting (GovCon) sectors as well as an influential member of Executive Mosaic’s GovCon Expert program, has released his latest article with the program.
Tags: Digital Transformation, Emerging Technology, GovTech
4 Beckoning Cyber-Threat Challenges
Forbes
May 09, 2021
My most recent FORBES article focused on 3 big trends impacting the cybersecurity ecosystem. They included, the expanding cyber-attack surface, the use of ransomware as a cyber weapon of choice by hackers, and the growing ICS, OT/IT Cyber-Threat convergence. All the elements of that article apply to this analysis of the myriad of cyber-threat trends & challenges we are currently or will be soon facing. The following observations on 4 beckoning cyber-threat challenges are another affirmation that mitigating cyber-threats is a societal imperative and cybersecurity has become indispensable to securing our digital future.
GovCon Expert Chuck Brooks: Top Cybersecurity Trends Impacting GovCon Industry - GovCon Wire
GovconWire
April 27, 2021
For this article, GovCon Expert Brooks has summarized the most significant trends in cyber that are impacting the federal landscape and government this year. Some of the trends he mentions include cybersecurity innovation, training, the impact of emerging technologies, the cyber-threat landscape, the defense of our nation’s critical infrastructure, supply chains and other aspects.
3 Key Cybersecurity Trends To Know For 2021 (and On ...)
Forbes
April 12, 2021
Most business ventures rely on lessons learned to improve outcomes. They analyze what they did right or wrong to fill gaps and adapt strategies is often a barometer of future success. The cybersecurity industry needs to follow this heuristic model. In 2021 we are already facing a variety of cyber-attacks and look to lessons learned to close cyber vulnerabilities. Three trends to focus on include 1) the expanding cyber-attack surface (remote work, IoT supply chain), 2) Ransomware as a cyber weapon of choice, 3) threats to critical infrastructure via ICS, OT/IT cyber-threat convergence.
The Emerging Paths Of Quantum Computing
Forbes
March 21, 2021
The world of computing has witnessed seismic advancements since the invention of the electronic calculator in the 1960s. The past few years in information processing have been especially transformational. What were once thought of as science fiction fantasies are now technological realties. Classical computing has become more exponentially faster and more capable and our enabling devices smaller and more adaptable.
Four Emerging Technology Areas Impacting Industry 4.0: Advanced Computing, Artificial intelligence, Big Data & Materials Science
Cognitive World
March 09, 2021
Tags: AI, Big Data, Emerging Technology, Quantum Computing
Alarming Cybersecurity Stats: What You Need To Know For 2021
Forbes
March 02, 2021
The year 2020 broke all records when it came to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals. In addition, the sophistication of threats increased from the application of emerging technologies such as machine learning, artificial intelligence, and 5G, and especially from greater tactical cooperation among hacker groups and state actors. The recent Solar Winds attack, among others, highlighted both the threat and sophistication of those realities.
Combining Three Pillars Of Cybersecurity
Forbes
February 18, 2021
Our digital world is under assault, and we need to urgently upgrade our defenses. In the past couple of years, the digital attack surface has vastly expanded from a move to remote work, from more people coming online, and from more interconnectivity of PCs and smart devices around the globe. Simultaneously, criminal enterprises and state actors have taken advantage of the lack of visibility and security administration. They are sharing resources and tactics over Dark Web forums and are growing more sophisticated and capable of using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks.
Priority of Protecting Digital Critical Infrastructure Will Grow in 2021
CIP Association
January 16, 2021
In 2021 we will be facing a new and more sophisticated array of physical security and cybersecurity challenges that pose significant risk to global critical infrastructure (CI). A difficult challenge will be keeping up with the increasing sophistication of cyber threats and the expanding digital attack surfaces.
A Cybersecurity Checklist For 2021: 6 Ways To Help You Protect Yourself In Coming Year
Forbes
December 26, 2020
2020 has been a perilous challenge for everyone across the globe. It was the year of the virus, from both a biological and a digital perspective.
We were unexpectedly infected by Covid19, a deadly and disruptive virus that changed our way of living. Thankfully, great strides are being made in therapeutics, and vaccines are on the way. The unexpected happened in 2020, and it served as an urgent wake-up call on the need for better pandemic preparedness.
GovCon Expert Chuck Brooks: Better Cybersecurity on 2021 Urgent Wish List for U.S. Government
GovCon Wire
December 22, 2020
GovCon Expert Chuck Brooks has published his latest article as a member of Executive Mosaic’s GovCon Expert program on Tuesday.
In his latest piece, Chuck Brooks discussed the most recent cyber breaches that have impacted federal agencies and the dire need to prevent future breaches and potential consequences of not prioritizing cybersecurity in 2021. He also mentioned the potential impact of the Cybersecurity Maturity Model Certification (CMMC) program and other issues surrounding our nation’s supply chain management heading into the new year.
Law Firms Should Tap Into External Cybersecurity Expertise By Chuck Brooks
High Performance Counsel
November 23, 2020
The topic of cybersecurity has not a specialized area of expertise at most law firms, internally or for clients. Of course there are some exceptions to that statement in the larger legal community, especially related to compliance and insurance issues. It is not surprising that law firms lack expertise as the leadership at law firms mirrors the leadership in the corporate world where cybersecurity has been traditionally considered an afterthought. In today’s changing digital ecosystem, law firms can no longer afford to remain disconnected from the reality of breaches and cyber-threats.
GovCon Expert Chuck Brooks: Fast Tracking Our Tech Future With Government
Govconwire
November 11, 2020
The development and procurement of emerging technologies is being institutionalized throughout government, particularly in national security areas. There are a variety of new initiatives and programs that have been created to ensure that the United States is prepared for a new era of technology leadership. If you are interested in transformative technologies, it is an exciting time to follow what is happening both in industry and in government
5G Is Here: Get Ready for the Cybersecurity Battles of Tomorrow
HS Today
November 04, 2020
The worldwide rollout of 5G will create innumerable benefits for the enterprise business community and the U.S. economy. Advanced 5G and wireless networks will bring a huge selection of benefits, including higher traffic capacities, lower latency, and increased reliability. It will empower millions by broadband connectedness. It will impact commercial verticals such as retail, health, and financial by enabling processing and analytics in real time. In essence, 5G will function as a data superhighway
Protecting Space-Based Assets from Cyber Threats
Homeland Security Today
October 17, 2020
Last August, the Air Force and DOD’s Defense Digital Service ran a competition intended to spur interest in aerospace cybersecurity. The challenge was called “Hack-A-Sat” and hackers were able to take control of a satellite. While it was a controlled event, the hackers demonstrated why protecting space-based assets from cyberthreats needs to be a new priority.
Creating An Internal Cybersecurity Hub Inside Your Company
Forbes
September 18, 2020
In 2019 more than 16 billion records were exposed through data breaches. This trend has continued in the first quarter of 2020 and so far, it has been one of the worst in data breach history. It is logical to say that in our era of increasing digital connectivity, every company’s operations, brand, reputation, and revenue pipelines can be directly threatened by cyber-attacks and breaches.
The Merging Of Human And Machine. Two Frontiers Of Emerging Technologies
Forbes
August 27, 2020
An amazing aspect of living in The Fourth Industrial Era is that we are at a new inflection point in bringing emerging technologies to life. We are in an era of scientific breakthroughs that will change the way of life as we currently know it. While there are many technological areas of fascination for me, the meshing of biology with machine is one of the most intriguing. It fuses many elements of technologies especially artificial intelligence and pervasive computing. I have highlighted two frontiers of “mind-bending” developments that are on the horizon, Neuromorphic technologies, and human-machine biology.
Tags: Digital Transformation, Emerging Technology, Innovation
GovCon Expert Chuck Brooks: Security by Design Needed to Safeguard Energy Infrastructure From Cyber Attacks
GovconWire
July 06, 2020
Chuck Brooks, a GovCon Expert and president of Brooks Consulting International, virtually addressed the G20 forum Sunday, July 5, on energy systems cybersecurity during the Workshop on Energy Security and Markets Stability.
Brooks told G20 member countries that cyber attacks are always evolving when it comes to capabilities and tactics and that state actors, “hackavists” and other attackers homing in on energy critical infrastructure “have become more “technologically sophisticated.”
“The scale and frequency of attacks are alarming,” he said. “Adversaries have gained a deeper knowledge of control systems and how they can be attacked and can employ weaponized malware.”
Brooks noted that connectivity driven by the adoption of industrial internet of things and operational technology has further expanded the attack surface and that energy infrastructure operators should implement “security by design” to counter cyber threats.
“Protecting critical energy infrastructure from cyber attacks requires security by design. It necessitates building Agile systems with operational cyber-fusion to be able to monitor, recognize and respond to emerging threats,” he said.
The G20 is an international forum for economic cooperation and is chaired by Saudi Arabia this year. Member countries account for approximately 80 percent of the world’s economic output, 75 percent of international trade and two-thirds of the world population.
Tags: Cybersecurity, Digital Disruption, Emerging Technology
The Cybersecurity Imperative of Protecting Critical Infrastructure
Cyber Theory
July 03, 2020
The 2020 World Economic Forum’s Global Risks Report listed cyberattacks on critical infrastructure as a top concern. WEF noted that “attacks on critical infrastructure have become the new normal across sectors such as energy, healthcare, and transportation.”
Tags: Cybersecurity, Business Strategy, Legal and IP
GovCon Expert Chuck Brooks: New Government Technology Initiatives To Stir Innovation
GovCon Wire
June 17, 2020
Investment in technology research is an integral part of the journey as we embark on the 4th industrial era. Government is recognizing the imperative to stir technological innovation and new initiatives that are now coming to the forefront.
ADDRESSING SECURITY, HEALTH, AND COMMERCIAL CHALLENGES VIA AUGMENTED & MIXED REALITY GLASSES
Bizcatalyst 360°
June 17, 2020
Iam pleased to present the second blog in a series of interviews with companies introducing interesting and potentially disruptive emerging technologies that impact the new era of Industry 4.0. Today we explore product innovations in augmented and mixed reality technologies (AR/MR) glasses and software with Nick Cherukuri of the company ThirdEye.
Tags: Digital Transformation, Digital Disruption, Emerging Technology
A POTENTIAL MEDICAL TECHNOLOGY PARADIGM SHIFT –COMBATING DANGEROUS BACTERIA, FUNGUS, AND VIRUSES
Bizcatalyst 360°
June 10, 2020
We are currently in the midst of one of the world’s biggest challenges and threats, mitigation of the Covid19 virus. An unprecedented level of medical research and development is being directed toward therapeutic and prophylactic treatments for the pandemic. As we test and explore, scientists are discovering that there may already be available technology solutions that can make a difference in helping quell the effects of pandemics. In my series of blogs examining the impact of emerging and disruptive technologies, I was fortunate to interview Dr. Brian Huber on an available “over the counter” product that may prevent and neutralize the most dangerous bacteria’s and viruses threatening mankind today, including Covid19.
HPC PRESENTS A CYBERSECURITY CHEAT SHEET FOR GENERAL COUNSEL AND THE C-SUITE BY LEADING CYBER EXPERT CHUCK BROOKS
High Performance Councel
May 22, 2020
The Covid19 pandemic has awakened the globe to our era of global connectivity and has also exposed our vulnerabilities in cyberspace. As we have transitioned to remote work on our home on secured portals, devices, and personal Wi-Fi, we have become more of a target to cybercrime.
According to Barracuda networks, The number of coronavirus COVID-19-related email attacks has increased by 667 per cent since the end of February. And between March 1 and March 23, Barracuda researchers detected 467,825 spear phishing email attacks, and 9,116 of those detections were related to COVID-19.
A passport to data-centric protection and privacy
IBM
May 21, 2020
Author Chuck Brooks discussed the emerging data privacy and protection landscape with IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia. Over the next two blog posts, we’ll learn what he discovered and what IBM is doing to tackle these new challenges.
Tags: Cybersecurity, Digital Disruption, Data Center, Security
6 Tips for Employees to Work From Home Securely
Cybersecurity Collaborative
May 21, 2020
The world is becoming digital, unfortunately much faster as we isolate ourselves on our computers at home sheltering from the COVID-19 virus. As we work remote on our home on secured portals, devices, and personal Wi-Fi, we have become more vulnerable to cybercrime. Microsoft had estimated that by 2020 over 4 billion people will be online, many in remote work environments. That number is far, far larger because of the consequences of the COVID-19 virus.
Public and Private Sector Partnerships Addressing COVID-19 Are A Model for Cybersecurity by Chuck Brooks
Cybertheory
May 13, 2020
A silver lining of the current Covid-19 pandemic has been the cooperation of industry and government who have been working closely together to bring solutions that alleviate supply shortages, and cultivate treatments to combat the lethal virus. Not since World War II have we witnessed such a monumental effort of companies adapting their manufacturing lines to build emergency medical products, and collaboratively work with public sector on the greater mission. This Covid-19 working model of addressing threats via Public Private Partnerships (PPPs) should be replicated to help meet the challenges of cyber-securing our digital world.
3 Digital Realities Arising From The Covid19 Pandemic (By Chuck Brooks in FORBES)
Forbes
April 28, 2020
The Covid19 pandemic has brought misery to most of the world. Unlike the 1918 Spanish Flu pandemic we do have a better ability to surveil the virus ecosystem and process lessons learned through our digital technologies. There are many lessons still to learn, but three digital realities can guide our future outlook.
Tags: Cybersecurity, Digital Transformation, COVID19
Chuck Brooks: Government Focused on Securing the Cyber Supply Chain
GOVCON
April 28, 2020
Supply chain cyber-attacks can be perpetrated from nation state adversaries, espionage operators, criminals or hackavists. Their goals are to breach contractors, systems, companies and suppliers via the weakest links in the chain. This is often done through taking advantage of poor security practices of suppliers, embedding compromised (or counterfeit) hardware and software, or from insider threats within networks.
Sheltering At Home, A Day In The Life In The COVID-19 Pandemic (FORBES)
FORBES
April 10, 2020
For many people, the situation in Washington DC resembles the theme of the classic movie Ground Hog day, repetition of the same activities over and over each day. After all, sheltering at home can be limiting. Still we must move ahead and adapt to the new challenges of sheltering at home and getting through each day of the pandemic.
4 Reasons Why Gamification Will Transform the Cybersecurity Industry
CyberSecurity Collaborative
January 31, 2020
When sitting down to write this article we wanted to share HOW gamification benefits the cybersecurity industry, but also WHY it can work effectively. The “why” question in its most simple term is that gamification touches on human needs. Most of us studied Maslow’s Hierarchy of Needs in our Psychology 101 classes so this is going to resonate.
A passport to data-centric protection and privacy, pt 2
IBM
January 15, 2020
From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.
A passport to data-centric protection and privacy
IBM
January 08, 2020
Author Chuck Brooks discussed the emerging data privacy and protection landscape with IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia. Over the next two blog posts, we’ll learn what he discovered and what IBM is doing to tackle these new challenges.
Top Cybersecurity trends & predictions for 2020
Cibersecurity
December 17, 2019
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a quick list of what me may expect in the 2020.
Cybersecurity will become even more of a strategic priority for companies as the cost, sophistication, and lethality of breaches continue to rise.
The advent of emerging and fused technologies 5G, IoT (and Industrial IoT) will pose significant operational and regulatory challenges. Companies and agencies will look to automation and orchestration technologies such as machine learning, deep learning, artificial intelligence, and other analytic tools to mitigate gaps on ubiquitous platforms.
Quantum Trends And The Internet of Things
Forbes
December 05, 2019
As a new decade approaches, we are in a state of technological flux across many spectrums. One area to take note of is quantum computing. We are starting to evolve beyond classical computing into a new data era called quantum computing. It is envisioned that quantum computing (still in a development stage) will accelerate us into the future by impacting the landscape of artificial intelligence and data analytics. The quantum computing power and speed will help us solve some of the biggest and most complex challenges we face as humans.
Risk Management And Black Swan Events
FORBES
October 18, 2019
Black Swans bring challenges to risk management, especially in our rapidly transforming technological landscape. However, those transformative changes in emerging technology add to the ability to analytically forecast and try to mitigate Black Swan events.us on
Discovering Applications and Potential of The Internet of Things
IIOT-WORLD
September 11, 2019
We have entered a new era of scientific breakthroughs and technological applications that will change life as we know it. Accelerated technological development is transforming our civilization. The pace of innovation is growing so rapidly that it is becoming exponential as each year passes. Futurist Dr. Michio Kaku characterizes this blazing technological shift as moving from the “age of discovery” to the “age of mastery.
Government, An Integral Partner For Exploring Artificial Intelligence
Forbes
June 14, 2019
On June 24, an upcoming conference will explore the implications of artificial intelligence (AI) in the public sectors. AI World Government will gather leaders across government, industry and academia to discuss the challenges and potential solutions of AI in automating our expanding digital world. The event is described as “a comprehensive three-day forum to educate and inform public sector agencies on the strategic and tactical benefits of deploying AI and cognitive technologies.”
How Data-Centric Security Solutions Thwart Insider Threats
Today.us
May 01, 2019
Thwarting insider threats is one of the most difficult challenges for companies, organizations, and governments. In fact, behind phishing, it is most often ranked as one of the top cybersecurity challenges by CISOs and CIOs. According to PwC’s Audit Committee Update on Insider Threat, 44 percent of data breaches are attributable to insiders and 80 percent of attacks are committed during work hours on company-issued software.
The New Techno-Fusion: The Merging Of Technologies Impacting Our Future
FORBES
February 26, 2019
The process of systems integration (SI) functionally links together infrastructure, computing systems, and applications. SI can allow for economies of scale, streamlined manufacturing, and better efficiency and innovation through combined research and development.
Protecting Energy Critical Infrastructure a Key Challenge for DHS
Homeland Security Today
February 16, 2019
Protecting our critical infrastructure from both cyber and physical threats will be a key challenge for 2019 and the years following. The Department of Homeland Security (DHS) describes critical infrastructure as “the physical and cyber systems and assets that are so vital to the United States that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety.”
Personal Recollections – With Dr. J. Allen Hynek Of ‘Project Blue Book’
Bizcatalyst 360°
January 26, 2019
Starting in January, the History Channel will premiere Project Blue Book, a series based on unidentified flying object (UFOs) cases that were inspired by the work of the late Dr. J. Allen Hynek. Dr. Hynek was an American astronomer, professor, and ufologist.
HISTORY’s upcoming new drama series ‘Project Blue Book’ is based on the true, top-secret investigations into Unidentified Flying Objects (UFOs) and related phenomena conducted by the United States Air Force from 1952 to 1969.
The CyberAvengers: 5 Tips To Improve Your Cybersecurity Posture In 2019
ITSP MAGAZINE
January 23, 2019
So here we are in early 2019, looking back at 2018 which was arguably an IT and network security dumpster fire. There were breaches of epic proportions, and breaches of trust and confidence. But 2017 was no better, ending with the aftermath of the Equifax breach, which affected approximately 143 million customers.
Which leaves us with the question of whether we whine, moan and complain about the past — or do something to change the cybersecurity game in 2019, to change the paradigm of pain and suffering. We suggest that the latter is much more beneficial, as it has the potential for good things to happen.
Here are 5 things you can do in the next few weeks to have a better cyber 2019:
The Imperative to Address Security Concerns of the Rapidly Evolving Internet of Things
The State of Security
January 20, 2019
The Internet of Things (IoT) broadly refers to devices and equipment that are readable, recognizable, locatable, addressable and/or controllable via the internet. This includes everything from edge computing devices to home appliances, from wearable technology to cars. IoT represents the melding of the physical world and the digital worked, as sensors are not costly and wireless access is now ubiquitous.
These days, if a device can be turned on, it can most likely be connected to the internet. Because of this, data can be shared quickly across a multitude of objects and devices, thereby increasing the rate of communications.
HSToday Visiting Editor Brooks to Serve as Mentor to USAF Technology Accelerator Program
HSTODAY.US
January 15, 2019
Chuck Brooks was recently selected to serve as a mentor to the Techstars Autonomous Technology Accelerator with the U.S. Air Force. Techstars is a mentor-driven program to encourage innovation and rapid prototyping of cutting-edge products.
The Techstars Autonomous Technology Accelerator with the U.S. Air Force, held in Boston Q1 2018, was an experiment by the Air Force in establishing closer ties to the most innovative early startup companies with commercially viable products that the Air Force found compelling.
Why Computer Passwords Are Still a Problem in 2019
Nextgov
January 11, 2019
There was a recent article before the holiday break on the complexity of computer passwords. The top “worst” password for 2018 was “123456.” Close behind in second place was “password.” They were also in first and second place in 2017. Slightly more complex was “123456789,” in third place in 2018, with the one-character shorter version, “12345678” just behind in fourth place. You get the gist.
Passwords are one of the critical problems in cybersecurity today. They are too easy to guess. They are too easy to break. All a hacker needs is your user ID (say, e.g. notsodifficult@password.com) and he or she can be off to the races in a matter of minutes invading your employee email account. Likely he also will be able to raid many of your other online accounts (like shopping, online gaming and streaming video) because you thought your lame password was so tricky that it was worthy of reusing in your 10 other accounts. The technical term for what happens here is an account takeover. In this case times 10. Re-using a lame password is problem one.
Four Emerging Technology Areas That Will Help Define Our World In 2019
FORBES
December 26, 2018
2018 was surely a transformative year for technological innovation. We saw early development of ambient computing, quantum teleportation, cloaks of invisibility, genomics advancements and even robocops. Granted we're not flying around in our own cars like the Jetsons did yet, but we're closer. In 2019 we will continue on the transformation path and expand even more into adopting cutting edge immersive technologies
Four Emerging Technology Areas That Will Help Define Our World In 2019
FORBES
December 24, 2018
2018 was surely a transformative year for technological innovation. We saw early development of ambient computing, quantum teleportation, cloaks of invisibility, genomics advancements and even robocops. Granted we're not flying around in our own cars like the Jetsons did yet, but we're closer. In 2019 we will continue on the transformation path and expand even more into adopting cutting edge immersive technologies. What's ahead for the coming year? I envision four emerging technology areas that will significantly impact our lives in 2019.
Five Ways Artificial Intelligence Can Facilitate Public Safety Now
Homeland Security Today
October 31, 2018
We are privileged to live in the Golden Age of data. Head-spinning technological advances allow us to gain greater data-driven insights than ever before. To truly leverage our ability to use this new data, however, we need to make sure our thinking about how to best use this data keeps pace with its availability.
DHS State, Local, Tribal and Territorial Cybersecurity Task Force Tackles Preparedness, Mitigation
Homeland Security
October 30, 2018
Recent high-profile attacks by malicious state and non-state actors against both commercial interests and government elections, which play a vital role in our democratic process, have created a renewed sense of urgency to better understand and protect critical operations. In the past few years cybersecurity has come to the forefront and is now considered a critical issue for local governments, particularly now that the current threat environment has moved from stateside hackers to sophisticated nation-state sponsored actors
PERSPECTIVE: Honor Native Americans’ Security Contributions with More Cyber Training
Homeland Security Today
October 07, 2018
Native American contributions to U.S. national security have been largely unheralded. Native Americans have served in the U.S. Armed Forces in every major military conflict since the Revolutionary War. Twenty-eight Native Americans have the earned the Medal of Honor, the nation’s highest decoration for military valor. The Navajo Code Talkers of World War II played an amazing role in helping the U.S. and allies achieve victory. Today over 24,000 Native Americans serve in the Armed Forces and have the highest per capita rate of military service of any ethnic group protecting the homeland. And more than 150,000 veterans self-identify as American Indian or Alaska Native.
Israel: Accelerating Global Cybersecurity Innovation
Cyberstartup Observatory
October 01, 2018
Last year, Tom Bossert, former White House homeland security and counterterrorism adviser, disclosed the new partnership to combat cyberattacks during remarks at an annual cybersecurity conference in Tel Aviv.
“These high-level meetings represent the first step in strengthening bilateral ties on cyber issues following President Trump’s visit to Israel,” Bossert said at Cyber Week 2017, according to Reuters. “The agility Israel has in developing solutions will innovate cyber defenses that we can test here and bring back to America,” the White House aide continued. “Perfect security may not be achievable but we have within our reach a safer and more secure Internet.”
A Scoville Heat Scale For Measuring Cybersecurity
Forbes
September 05, 2018
The Scoville Scale is a measurement chart used to rate the heat of peppers or other spicy foods. It can also can have a useful application for measuring cybersecurity threats. Cyber-threats are also red hot as the human attack surface is projected to reach over 6 billion people by 2022. In addition, cyber-crime damage costs are estimated to reach $6 trillion annually by 2021. The cybersecurity firm RiskIQ states that every minute approximately 1,861 people fall victim to cyber-attacks, while some $1.14 million is stolen. In recognition of these alarming stats, perhaps it would be useful to categorize cyber-threats in a similar scale to the hot peppers we consume.
On The Future Horizon: Cybersecurity, Homeland Security, IoT, Big Data, AI, Emerging Tech by Chuck Brooks
On The Future Horizon: Cybersecurity, Homeland Security, IoT, Big Data, AI, Emerging Tech by Chuck Brooks
July 15, 2018
Recent publications on emerging technologies and cybersecurity by Chuck Brooks
Catalyzing Innovation via Centers, Labs, and Foundries
Forbes
July 11, 2018
The cornerstone of collaboration is based on knowledge transfer; sharing of research tools, methodologies and findings; and sometimes combining mutual funding resources to meet shortfalls necessary to build prototypes and commercialize technologies.
Avatars, Bots, And AI – Emerging Tech For Digital Government
Bizcatalyst 360°
June 05, 2018
In a new era of fiscal belt-tightening, the combination of technological innovation and transformational digital processes in customer engagement has become a specialized mission for many government agencies.
Government agencies are faced with the challenge to keep pace with rising expectations from the public to deliver the same level of service received in the private sector or, better. Consequently, federal agencies have integrated service metrics from commercial best practices and are looking for companies with industry customer relations experience to model their outreach programs. They are recognizing that industry metrics, based on proven consistency, efficiency, and quality of services, allows for a more predictable allocation of capital resources. It also translates to lower cost for federal agencies combined with deeper and more flexible insights into data for improved citizen engagement.
Tags: AI, Digital Transformation, Emerging Technology
PERSPECTIVE: Leadership Role Suits DHS in Cybersecurity Evolution
Homeland Security Today
May 29, 2018
Last month the Department of Homeland Security (DHS) unveiled its new cybersecurity strategy. DHS characterizes the strategy as providing “the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.”
WASHINGTON POST TAPS CYBERSECURITY EXPERT CHUCK BROOKS '79 FOR 'THE NETWORK:\'
DePauw University
May 21, 2018
Chuck Brooks, a 1979 graduate of DePauw University, has been selected by the Washington Post to be a part of "The Network:\," composed of "some of the most influential people in cybersecurity."
Brooks is among "a group of high-level digital security experts from across government, the private sector and security research community invited by the Post to vote in surveys on the most pressing issues in the field ... They include members of Congress and the Trump administration, the country’s top security researchers and senior leaders at companies as varied as Facebook, General Motors and Visa."
A CYBERSECURITY ACTION LIST FOR LAW FIRMS
LinkedIn
May 10, 2018
There is a congruency with the legal community’s mission of preparedness and the practice of cybersecurity. A primary requirement of the legal profession is to obtain data and explore evidence, access the implications of that evidence, and prepare accordingly to protect and serve the client.
Cybersecurity, Is there Light at the End of The Tunnel in 2018?
AT&T Business
May 09, 2018
2017 was certainly a challenging year for cybersecurity. The volume of data breaches continued to climb from the already alarming experiences of previous years. The sophistication and intensity of cyberattacks from social engineering, ransomware, and DDOS attacks also experienced exponential growth. The question remains, what should we expect (or fear) in 2018?
Artificial intelligence and machine learning hot topics at RSA 2018
ITSP Magazine
April 12, 2018
I am excited about attending the RSA 2018 Conference next week. RSA has been the annual preeminent forum for learning about trends and developments in the cybersecurity ecosystem.
This year, artificial intelligence (AI) and machine learning have emerged as hot topics for the conference. And justifiably so. In 2017, Artificial intelligence (AI) and Machine Learning were major focus areas of VC investments (over $12B). Many of those investments included aspects correlating to information security.
The Science of Cybersecurity - An Interview with Chuck Brooks
LinkedIn
April 03, 2018
The current state is a scary one. Constant breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce. Our banking accounts, credit cards, and financial daily activities are interconnected.
Chuck Brooks appointed to Adjunct Faculty at Master
LinkedIn
March 15, 2018
Chuck Brooks was recently appointed to be Adjunct Faculty at Master's in Applied Intelligence Program at Georgetown University School of Continuing Studies.
Using LinkedIn As A Marketing Fulcrum For Emerging Technologies In 2018
LinkedIn
February 10, 2018
2018 has started and accompanying this new year will be more disruption from emerging technologies. The impact surrounding the ecosystem of technology are clearly reshaping our world in business, science, and the conduct of our daily lives.
CYBER SECURING CRYPTO CURRENCIES
LinkedIn
January 10, 2018
Recently it was disclosed that almost 4,700 bitcoins crypto currency valued at $64m were stolen by hackers who broke into Slovenian-based bitcoin mining marketplace called NiceHash.
A 2018 Cybersecurity "Cheat Sheet" For The C-Suite
LinkedIn
January 01, 2018
2018 has arrived and it is time for executive management to review how they can best fortify against data breaches as cyber-threats as the new year unfolds.
Emerging Technologies and the Cyber Threat
AlienVault
December 13, 2017
Cybersecurity is at a tipping point, the sheer volume of breaches, attacks, and threats has become overwhelming. Juniper Research, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.
7 Emerging Tech Trends For 2018
LinkedIn
December 05, 2017
2017 was certainly a epic year for technological innovation and digital transformation. But we have only recently entered the era of the Fourth Industrial Revolution and 2018 promises to see more exponential changes.
CYBERSECURITY: A QUICK SUMMARY OF RECENT TRENDS & DEVELOPMENTS
LinkedIn
September 22, 2017
According to market research firm Gartner, global spending on information security is expected to reach nearly $87 billion in 2017 — an increase of around 7 per cent over 2016 – and is expected to top $113 billion by 2020. Also according to Gartner, by 2020, 40 percent of all managed security service (MSS) contracts will be bundled with other security services and broader IT outsourcing (ITO) projects, up from 20 percent today.
"RISING TIDES AND HIGHER STAKES" HIGH PERFORMANCE COUNSEL INTERVIEWS CYBERSECURITY THOUGHT-LEADER CHUCK BROOKS
LinkedIn
August 26, 2017
We live in world of algorithms; x’s and o’s. Our digital world is ripe for access and compromise by those who want do harm from just a laptop and server. A myriad of recent breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce.
The Imperative of Critical Infrastructure Protection - Cyber and Physical (articles/blogs by Chuck Brooks)
LinkedIn
August 03, 2017
Recently, the Kentucky Office of Homeland Security hosted an exercise simulating attacks on the power grid and government computer networks. Participants included law enforcement, first responders, and private sector representatives engaged in health and security.
CHUCK BROOKS, NOW ADVISOR TO LINKEDIN MARKETING AS CYBERSECURITY AND EMERGING TECHNOLOGY SUBJECT MATTER EXPERT
LinkedIn
July 22, 2017
We are pleased to announce that Chuck Brooks, who is HIGH PERFORMANCE COUNSEL’s featured Contributor on cybersecurity issues, has been working directly with the LinkedIn Team as a security (Cyber, Homeland) and emerging technologies (IoT, Big Data, Artificial Intelligence, Cloud, BlockChain) Subject Matter Expert/Advisor for content in marketing.
The #CyberAvengers are a group of salty and experienced professionals who have decided to work together to help keep this nation and its data safe and secure.
Identity Theft, the Not So Hidden Scourge
AlienVault
July 05, 2017
Per a recent study released by Javelin Strategy & Research, identity fraud hit a record high in 2016 targeting 15.4 Million U.S. Victims and with hacker/fraudsters netting around $16 billion dollars. Those findings are not so shocking, as breaches from companies, government, and untold individual accounts are becoming an unfortunate norm.
Thought Leadership -- Evangelizing The Future
LinkedIn
June 14, 2017
Digital technologies and connectivity have transformed the way the world works. The cyber medium has transformed our lives including how we communicate, and how we do business. Social media platforms, and especially, LinkedIn, have led to a new paradigm for thought leadership as a catalyst for productivity and achievement in industry and government.
The Special 2-Way Relationship with Man's Best Friend (Dogs)
LinkedIn
March 29, 2017
The old adage that Dogs are man's best friend (and women's) really rings true. Dogs have a long and special relationship with humans since they were domesticated as pets tens of thousands of years ago according to the latest archeological estimates.
Interview of Chuck Brooks, Judge of GSN Homeland Security Awards, on Key Homeland Security, Cybersecurity, and Technology Issues for 2017
LinkedIn
March 03, 2017
It was my real pleasure. Each year I am more and more impressed with the capabilities of the company submissions for best solutions.
Alarming Cybersecurity Stats You Should Know
LinkedIn
February 20, 2017
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. It is clear that companies and individuals are playing games of catch up from a growing array of cyber adversaries.
DHS, NIST Release Security Guidelines for IoT Devices
LinkedIn
January 26, 2017
The Department of Homeland Security (DHS) and National Institute of Standards and Technology (NIST) released new security guidelines last week for the Internet of Things (IoT) after a massive distributed denial-of-service attack targeted these devices and shutdown many popular websites like Twitter and Etsy last month.
Chuck Brooks Selected As Winner of "Cybersecurity Marketer of The Year"? at the 2017 Cybersecurity Excellence Awards
LinkedIn
January 17, 2017
The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security.
Emerging Technologies to watch (a resource guide)
LinkedIn
December 18, 2016
A few years back, The McKinsey Global Institute published an informative analysis that comprehensively examined the economic impact of global technology trends.
Designed and teaching course at Georgetown on Disruptive Technologies
George Town University
July 01, 2020
Chuck Brooks a globally recognized thought leader and evangelist for Cybersecurity. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to FORBES. He has also been featured author in technology and cybersecurity blogs by IBM, AT&T, Cylance, and many others.
Brooks Consulting International
Brooks Consulting International
January 01, 2020
Founder at Brooks Consulting International
Brooks Consulting International is a Government Relations & Marketing firm providing Digital Branding & Subject Matter Expertise, Advise, & Thought Leadership
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award.
ONCON
July 08, 2019
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award. The list was selected by distinguished judges from Fortune 500 corporations and associations across the globe. The OnCon Icon Award recognize icons in the categories of marketing, human resources, and legal (corporate counsel). Nominees were voted on by leading professionals within each job function or industry to establish a true non-biased or non-conflicted winner.
Please vote for Chuck on at this site: https://www.onconferences.com/votemarketing
THANKS!
Top 30 Cybersecurity Experts You Should Follow In 2021
Cybersecurity Ventures
December 07, 2020
When we surround ourselves with individuals smarter than us, we can channel their talents for innovation and insights hoping for some to rub off on us. When I’m not writing and presenting on cybersecurity, I run a wireless security business so I feel fortunate to be able to cross-pollinate with many cybersecurity rock stars who also happen to possess great minds.
Cyber Startup Observatory -- Interview with Chuck Brooks
Cyber Startup Observatory
December 20, 2018
Interview with Chuck Brooks who iis the Principal Market Growth Strategist – Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. Chuck is also an Adjunct Faculty member at Georgetown University in their Applied Intelligence and Cybersecurity Programs. LinkedIn named Chuck as “a Top Tech Person To Follow” and he has been widely published on cybersecurity and emerging technology topics in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, Homeland Security Today (Visiting Editor), and many other publications. Chuck helped “stand up” Office of Legislative Affairs at the US Department of Homeland Security and served as first Director of Legislative Affairs at the DHS Science & Technology Directorate. He has an MA in International Relations from the University of Chicago and a BA in Political Science form DePauw University.
Tags: Cybersecurity, GovTech, International Relations
3 Keynotes
The Urgency of Protecting Critical Infrastructure from both digital and physical threats
Global Cybersecurity Association (GCA)
November 18, 2021
Protecting our critical infrastructure from both cyber and physical threats will be a
key challenge in 2021 and the years following as already evidenced by attacks on
pipelines, power, and water treatment plants. What are the most pressing
challenges and how can critical infrastructure be better protected from threats?
Why Is Cybersecurity at a Crossroads?
Secure World
December 20, 2021
At our most recent virtual conference, SecureWorld West Coast, Chuck Brooks presented the closing keynote, discussing why cybersecurity is at a crossroads as we head into 2022.
Here are some key thoughts from our fireside chat with Brooks.
Renew cyber hygiene strategies for 2022
Cyber Series
December 06, 2021
We asked the leading cybersecurity expert – Chuck Brooks (one of the top 5 Cybersecurity Exec to Watch, top leader and influencer in “who’s who in cybersecurity“ named by Onalytica and top cybersecurity expert in Thinkers360) to throw some light on the significance of cyber hygiene.
Chuck Brooks - Cyber Insights for 2021
Buzzsprout
January 10, 2021
Chuck is a great guest to join us as we kick off 2021!
Chuck Brooks is a true "cyber influencer" who has managed to retire into fulltime career from Homeland Security into teaching at Georgetown University as well as writing for Forbes.
We discuss a wide variety of topics that pose a threat in 2021 to both enterprise as well as service providers. Multifactor authentication, threat actors, new cyber warfare environment, many different directions we could have taken with this one.
Chuck Brooks: Security by Design Needed to Safeguard Energy Infrastructure From Cyber Attacks
GocConWire
July 07, 2020
Chuck Brooks President Brooks Consulting
Chuck Brooks, a GovCon expert and president of Brooks Consulting International, virtually addressed the G20 forum Sunday, July 5, on energy systems cybersecurity during the Workshop on Energy Security and Markets Stability.
AI, the Economy’s Backbone | Chuck Brooks | Engati Engage
Engati
June 17, 2020
In the current digital era, Chuck Brooks reveals that technology defines who we are and what we do and AI will be the backbone of the Economy. We also discuss the emergence of digital in Customer Service and the growth of the remote economy.
Thought Leader and Influencer Interview with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University
Thinkers360
June 09, 2020
Thinkers360 interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University.
Tags: Cybersecurity, Digital Transformation, Marketing
Security concerns with work from home?
Netsync
June 08, 2020
Watch Chuck Brooks, named one of the Top 5 Tech People to follow on LinkedIn, discuss with Netsync’s Mark Lynd ways to remain digitally safe during the COVID-19 pandemic. While many businesses, especially smaller ones, were caught off guard and unprepared for the rapid move to remote working, Chuck discusses ways to catch up and implement policies for employees working from home, especially relating to the use of WiFi.
Former General Dynamics Exec Chuck Brooks Creates GovCon-Focused Consulting Firm
Executive Mosaic
May 20, 2020
Chuck Brooks, a more than three-decade professional in the government contracting industry, has established a firm focused on government relations and marketing named Brooks Consulting International where he will also serve as president.
Made for the Moment #6 - Data Infringement & Free Speech (ft. Cybersecurity Expert Chuck Brooks)
YouTube
April 29, 2020
Made for the Moment is a podcast by Jason Dodier of Alpha Struxure and Jaret Grossman of JARBLY discussing world events through unique topics of interest and interesting guests. Our guest today is Chuck Brooks is a global cybersecurity expert who is rated one of the Top 5 technology experts to follow on LinkedIn with over 59k followers and is also a Forbes contributor.
Joe Coughlin and Chuck Brooks discuss cyber security
YouTube
June 27, 2019
Recently at IndEx 2019, Joe Coughlin and Chuck Brooks got together to discuss cyber security. Joe is the CEO of Corporate Risk Solutions, a risk advisory firm. He spoke with Chuck, who is Principal Market Growth Strategist for General Dynamics Missions Systems. Find out more about recent developments in cybercrime that have experts worried, what companies are doing for their own cyber security, and much more in this interview.
The IFSEC 2 Global Cyber Security Influencer for 2018
Voice America
January 28, 2019
The Principal Market Growth Strategist for General Dynamics Mission Systems for Cybersecurity, and the IFSEC #2 Global Cyber Security Influencer for 2018, Mr. Chuck Brooks, joins Episode #69 of Task Force 7 Radio to talk all things Cyber Security. Brooks explains the challenges from transitioning from the public sector to the private sector, what his thoughts are on the militarization of cyber security, and the difference between roles in cyber security in the public sector vs. the private sector. Brooks also talks about how emerging threats are affecting businesses, how companies are combating the threats around IoT, Cloud, Mobile, and Third Party risks, and how new technologies being deployed as mitigating controls are introducing new threats into the environment. Brooks also gives his thoughts on the talent crisis and provides career advice to professionals seeking to enter the Cyber Security field.
What keeps Chuck Brooks up at night?
YouTube
June 07, 2018
Each week from his Zero Day Studios, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. This week, Chuck Brooks offers an expert perspective.
Chuck Brooks is Principal Market Growth Strategist of Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. LinkedIn named Chuck Brooks as one of “The Top 5 Tech People to Follow on LinkedIn” out of their 550 million members. Chuck has served at The Department of Homeland Security as the first Legislative Director of The Science & Technology Directorate. Chuck is an Adjunct Faculty member at Georgetown University in their Applied Intelligence Program and has an MA in International relations from the University of Chicago and a BA in Political Science from DePauw University.
Tags: Cybersecurity, Emerging Technology, International Relations
New administration looks to DC for cyber innovation
Federal News Radio
May 12, 2017
The new administration has promised to focus on cybersecurity and artificial intelligence and will be looking to the Washington, D.C. region for new breakthroughs in technology.
Balancing security + gov cloud innovation
Meetup
October 28, 2020
The proliferation of data combined with the speed of advancing technology bring complex challenges to government’s ability to protect itself from evolving cyberthreats while striving to accelerate cloud innovation.
Industry 4.0 and Cybersecurity 2.0 –- Opportunities & Challenges -- IIoT World Days.
IIoT World
August 17, 2020
The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.
In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.
TIC Consortium Panel: Emerging Tech for Hybrid Warfare
eventbrite
May 23, 2018
Come and join TIC Consortium in its second event in Old Town Alexandria on May 23rd at 2pm for a panel discussion about emerging technologies and considerations for hybrid warfare.
Wars of the future will only be more complex. Consider the following scenario: China pressures US firms to censor Chinese individuals. Meanwhile, the EU also wants hate speech removed in 24 hours. This is all while a California lawmaker argues that strong encryption online aids human trafficking.
What will all of these political and cultural pressures mean for the future of cyber defense and attack? What are the emerging technologies, ethical considerations and policy initiatives that should be pursued? How should companies be positioning and teaming in order to provide the best products and services for the next conflict?
Talking Cloud with special guest Chuck Brooks
PodBean
October 04, 2020
After our summer time off, we are kicking off the fall with an amazing guest, Chuck Brooks. Among being named as a Top 50 Social Influencer in Risk & Compliance by Thomson Reuters, Chuck is a member of the staff at Georgetown University. He has had an unbelievable career spanning both Government and commercial roles including being asked by Tom Ridge to start a Cyber Security division within DHS and previously working for the late, great US Senator, Arlen Specter. (A special 'Thank You' to Karen Firkser for introducing me to Chuck!)
Emerging Cybersecurity Technologies
SecureWorld
August 04, 2020
In this episode, we are speaking with cybersecurity and technology influencer Chuck Brooks about emerging technologies that can help you defend your organization in cyberspace. Brooks covers everything from the future of quantum computing and the encryption debate to China in tech, election cybersec
COVID-19 Impact on Cybersecurity
The Cyber Resilience Institute
June 18, 2020
Christopher Gorog from the New Cyber Frontier podcast has a conversation with Chuck Brooks, one of the “Top 5 people to follow LinkedIn,” Adjunct Professor at Georgetown, and founder of Brooks Consulting International. They discuss the recent impact of the COVID-19 crisis on the cybersecurity community. Listen and join in on the conversation!
GET YOURSELF READY for the DIGITAL ERA… 5th INDUSTRIAL REVOLUTION
Global Business News
January 26, 2020
CHUCK BROOKS
“Real-world AI threats in cybersecurity aren’t science fiction”
Named “Top Tech Person To Follow” by LinkedIn – Technology and Cybersecurity Evangelist – FORBES Contributor – Georgetown University Adjunct Faculty – Corporate Executive, Brand Ambassador, Thought Leader, Influencer
Tags: Cybersecurity, Digital Transformation, Emerging Technology
InSecurity Podcast: Chuck Brooks on the Future of AI and Cybersecurity
Blackberry
July 16, 2019
What if I told you that chatbots will power 85 percent of customer service by 2020?
McKinsey Global Institute did a study that found 20% of C-level executives claim to be using machine learning and/or artificial intelligence (AI) as a core part of their business.
Our friends at IDC proclaimed that global spending on cognitive and AI systems is expected to reach $57.6 billion in 2021. And finally - as if we aren’t already tired of hearing about the IT skills gap - Forbes recently announced that the number of jobs requiring AI skills has grown 450% since 2013.
Tags: Cybersecurity, Digital Transformation, IoT, Security
Trends in cyber, Emerging tech, and how to protect business
Global business news
February 20, 2019
Role includes helping drive market strategy for existing and new market segments in public and private sectors.
He also leads market and emerging research trends and also define product inception, go-to-market strategy, competitor analyses, and strategic partnering opportunities.
He assists in product/portfolio strategies, brand strategy. M & A, and sales enablement processes.
Embedded with McKinsey & Co for 8 week special project on market trends.
Seyfarth and NY Metro InfraGard Present: Lunch with America’s Cybersecurity Influencers
Seyfarth
October 06, 2021
Join Seyfarth and NY Metro InfraGard on Wednesday October 6th, 2021 at 1 pm ET for an exclusive presentation on the importance of carrying out the cybersecurity basics, an often overlooked yet critical issue required to strength your cybersecurity posture and resiliency. Despite some well-meaning intentions from both government and the private sector, attacks continue to cause havoc in America on a daily basis, whether through malware, ransomware, social engineering, or a combination of all the above. Join some of the most important cyber and information security influencers on the Internet today on how carrying out the cybersecurity basics can make a significant difference in securing your organization and strengthening our country. We look forward to your participation.
RaCE: Resilience and Collaboration Extended
Al-Iktissad Wal-Aamal Group
February 03, 2021
The UAE Banks Federation and Al-Iktissad Wal-Aamal CO. are organizing RaCE, a 2-day Cybersecurity webinar on the 3rd & 4th of February 2021, focusing on best practices in data privacy and protection as businesses shift to a hybrid working environment.
Remote working has added further challenges to cybersecurity teams who are facing an increase in the frequency and intensity of cyber-attacks targeting remote workers and customers alike. Ensuring that employees and clients are well informed and protected against such attacks has become a primary requirement to maintain data protection and prevent losses.
As such, the webinar will discuss:
Protecting Data in an Era of Increased Cyber Risk
Data Privacy in a Complex Regulatory Framework
Cyber threats; The Dark Side\drawbacks of Digital Transformation
Managing a Cyber Pandemic
RaCE will bring together renowned cybersecurity experts from the UAE and abroad to present trending cyber-attacks in the financial sector and means of maintaining cyber-immunity against them.
Tags: Cloud, Cybersecurity, Digital Transformation
2020 Cyber Innovators Summit
The Cyber Institute
October 30, 2020
The Cyber Institute has gathered together some of the brightest minds in cybersecurity to discuss (virtually) the dynamic challenges of infosec, new approaches towards structuring security infrastructures, and predictions for this upcoming decade. Join leaders of SentinelOne, McAfee, Norwest, Check Point, and other innovators during this forum. The 2020 Summit has been sponsored by Active Cypher, developer of file-centric protection against malicious and unintentional data loss.
Session 8 (3:00 PM PST): Future Threat Panel - Ashwin Ram, Mathew Rosenquist, & Chuck Brooks.
Our speakers will discuss future threats on the horizon and effective responses they see. IT organizations are far too often worried about protecting against yesterday's vulnerability and not focusing on future.
October Cyber Bytes Networking Event: Election Security
Cyber Bytes Foundation
October 29, 2020
Join us for our next Cyber Bytes Networking Event on Election Security. The virtual event is set to take place on Thursday, October 29, 2020 at 3 pm. Register today.
CISO's View: Emerging Technologies Impacting the IAM Landscape
CyberEd.io
June 23, 2020
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies that impact Identity and Access Management that can help us navigate the increasingly malicious cyber threat landscape. Join cybersecurity thought leader Chuck Brooks for an overview of these cutting-edge technologies, including:
AL/ML
Big Data: Real-time Analytics and Predictive Analytics
Biometrics and Authentication Technologies
Social Media Platforms Are Helping Shape Business Success
Thinkers360
October 18, 2021
Social media has transformed the way people interact and conduct business both in the public and private sector. The Covid19 pandemic, combined economic factors, have led to the emergence of remote work and hybrid environments and different ways of doing commerce. The move away from business lunches, live events, and meetings has propelled digital platforms into becoming a main fulcrum for communications and branding. Those social platforms have especially impacted components of business development, sales, government relations, and marketing and are helping shape pathways to success.
Many users enjoy social mediums because they control the content, and it is non-invasive. Also, it can be perpetually shared. Social media has become a platform to communicate who we are and what we do. Platforms such as LinkedIn, Twitter, and Instagram, have now become a daily means for sharing content, building networks, and reaching targeted markets. Thought leadership on meaningful topics is of timely interest to everyone and the use of subject matter experts and influencers have become a primary means for brand amplification via articles, blogs, podcasts, and online events.
Today, most senior-level executives on both the public and private sectors have LinkedIn profiles, including administrators, CEOs, CTO, CIOS and their numbers are increasing. They often use it as a conduit for 1) Branding 2) Socializing/Networking; 2) Basic Intelligence; 3) Events: and 4) Strategic Partnering/Marketing.
Branding: the trend of digital brand amplification began to grow at the beginning of the outset of the pandemic. Because of the lack of in person meetings, many companies, new & old, large & small, sought to be more visible and recognized for the unique viability for branding on social media platforms. Companies were and are seeking quality and interesting content that helps enable them to be able to connect with peers and clients. A benefit of social media digital marketing and brand amplification is that it can be very cost-effective, repetitive, and can generate revenue and build positive reputations. A good written message, video or graphic can have a long shelf-life and be shared widely across various social media platforms. Influencers have also become part of the branding mix; expertise bring credibility and attention and many companies have expanded strategies that use influencers and thought leaders who can augment company marketing and sales.
Socializing/networking: social media is in its essence “social.” It is an outlet for networking and connecting with people who share your interests, goals, and professional paths. A platform like LinkedIn, Facebook, Instagram, and Twitter are useful for reconnecting to people you have worked with in past jobs, friends, and alumni of universities, and colleges. In particular, the service encourages you to join professional and hobby interest groups where you can post articles and engage in discussion with group members. I am a big proponent of LinkedIn for networking where I have over 73,000 followers, especially with targeted groups. For example, I have management roles in several of the largest and most influential homeland security groups on LinkedIn. Another key area of group ownership and involvement for me on LinkedIn is with cybersecurity and emerging technology groups where I find the readership are exceptionally informed and active. Also, as a “foodie”, I created the “DC Foodies” LinkedIn group to reach out to others in the greater Washington, DC area that may have a passion for food, wine, and restaurants. On LinkedIn there is a group for almost every subject from healthcare, governing, martial arts, Space, to quantum physics.
Basic Intelligence: Another function of social media is that it provides you with working biographies of members. Whenever I have a meeting with someone new, I can usually find their profile on LinkedIn and see where they worked, what schools they attended and who we know in common. Also, by following the posts in groups, I can view the latest news from a variety of sources on a topic of interest. Also, almost all federal agencies and public entities have their own profiles (and often groups) on LinkedIn that make the basic intel process quick and easy.
Events: There is no better place to go to find out who is hosting what than on social media. This includes LinkedIn, Twitter, Instagram, Facebook in the event domain. Since most publications are intertwined between print and digital media, social media outlets are a fulcrum for seeing what activities are happening in personal or business areas of interest daily.
Strategic Partnering/Marketing: social media is really the Holy Grail for strategic partnering and marketing. Messaging is immediate, perpetual, and cost-effective. It is also much targeted and will allow you to focus communications to audiences, both individual and groups that may have an interest in your offerings and services. For those who are specifically focused on the federal market, LinkedIn is an especially good resource for finding teaming members and potentially partners to pursue opportunities. By being active on LinkedIn, companies can often find you and reach out for help in areas that may be mutually beneficial. As government encourages diverse and multiple partners to work together on programs, the importance of having a strong stable of networked partners is becoming more of a premium.
We are still only in the early era of social media. It will continue to grow and be fused into all aspects of our lives, especially with the growth of augmented reality and emerging communication technologies. Social media vehicles like LinkedIn already have great utility in the workplace both in the corporate world and in government. Linked and other social media platforms are already shaping communications. “Linking in” and being active on social media platforms have become more of an imperative than a choice for those who want to thrive in a digital world.
Chuck Brooks, President of Brooks Consulting International, and Adjunct Faculty at Georgetown University, is a Technology Evangelist, Corporate Executive, Speaker, Writer, Government Relations, Business Development, and Marketing Executive. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated, as a “Top 50 Global Influencer in Risk, Compliance,” by Thomson Reuters, “Best of The Word in Security” by CISO Platform, and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was also named “Best in The World in Security” by CISO Platform, one of the “Top 5 Executives to Follow on Cybersecurity” by Executive Mosaic, and as a “Top Leader in Cybersecurity and Emerging Technologies” by Thinkers360. Chuck was named by Oncon in 2019 “Top Global Top 50 Marketer” by his peers across industry.
Chuck also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. He is a featured contributor to Thinkers360
“Innovation Foraging” on Social Digital Mediums
Thinkers360
May 17, 2021
In the science, technology worlds, there is a category referred to as “technology foraging,” or the searching for smart ideas and emerging technologies that may exist already in research institutions of found in patents to fill gaps and offer new solutions. Technology foraging has been an engine for the technological transformation now taking place in society. It has served as a catalyst for discoveries of many products brought to the marketplace.
The foraging process is often conducted in research centers by national labs, universities, and in government & corporate innovation hubs. It has expanded commensurately with the rapid pace of innovation in our new era of exponential digital transformation where humans and computing devices are intertwined, and data is more accessible. Please see my article Technology Foraging for Cybersecurity SolutionsTechnology Foraging for Cybersecurity Solutions | AT&T Cybersecurity (att.com)
Digital transformation combined with tech foraging of the 4th Industrial Era has led to significant jumps in innovation of technologies. This includes, for example, emerging tech such as big data, artificial intelligence, IoT, smart cities, 5G wireless, virtual & augmented reality, nanotechnologies, robotics, self-driving cars, 3-D Printing, cybersecurity, quantum computing, predictive data analytics, Biometrics and wearables, self-healing materials, bioinformatics, genetic engineering, and a new world of medical applications.
The digital transformation It has also impacted communication mediums, especially social media where research, ideas, analyses, and opinions are cultivated by open sharing and interaction. The networking and information sharing on digital mediums can be viewed as a foraging process. The pace of digital expansion and change is happening so rapidly that it can be quite overwhelming just to try to keep up. But social media does offer a pathway to do so via innovation foraging and collaborative information sharing.
For example, my career passion revolves around searching and reading about topics in cybersecurity. Using social media, I can keep abreast of the latest news and events. A case in point is the recent Colonial Pipeline breach. Almost immediately after happened, detailed descriptions of the breach and surrounding issues such as ransomware were posted on LinkedIn, Twitter, and other digital mediums. There was a potpourri of expert perspectives available, including posts on technical analyses, and posts on geopolitical and economic implications. Forging through posts you can also develop your own knowledge to explore remedies and policy frameworks that may apply digital impact to your own professional or business circumstances.
From my perspective as cyber security & technology strategist, the extensive resources of LinkedIn combined with their supporting analytics provides a great platform to communicate, educate and promote. For me, LinkedIn groups, including the dozen groups I created, serve as the most optimal social media digital offerings for foraging. Research on LinkedIn is significantly amplified by the myriad of specialized information security LinkedIn groups that I can pull insightful and timely data from on a regular basis.
Several years back I wrote an article for LinkedIn called Why LinkedIn is an Indispensable Medium for Security Professionals Why LinkedIn is an Indispensable Medium for Security Professionals | LinkedIn Marketing Blog In that blog I noted that” LinkedIn has become part of the fabric of how I (and a majority of my peers) communicate, operate, and conduct business. For me, LinkedIn groups serve as interactive, informative forums. Many of the members in my groups are security professionals who have important roles in government or industry, including CISOS, CIOs, CTOs, or members of the C-Suite who possess deep subject matter knowledge.” I also stated that for thought leadership on homeland security and cybersecurity issues, that “LinkedIn is a real force for digital influence. It is an effective platform for educating, evangelizing, and promoting discussion of the cutting risk management issues.”
The value of LinkedIn for evangelism and marketing goes far beyond immediate connections. The extensive resources of LinkedIn combined with the intrinsic marketing capabilities based upon intelligence analytics provides a ready platform to communicate, educate and promote. In my major areas of interest, cybersecurity and emerging tech, I am very active in interchange of news and innovative ideas with groups, and also with my 70,000 direct follower connections. It facilitates keeping up with cybersecurity and emerging technology trends that I can share with others across digital media.
With 18 years under its belt and a membership globally of over 800,000 users, LinkedIn has become increasingly valuable as a forging resource and influence platform for branding people and companies. Twitter offers good avenues for networking, and often is starting point for interesting links that spur more foraging on other media sites. Both platforms offer users measurable metrics to track effectiveness of content and interactions.
For employees at a company or organization, foraging (and info sharing) on digital mediums as a corporate strategy can help drive collaboration between often aloof silos comprised of the c-suite, marketing, legal, and sales. A social media platform can also foster company awareness & relationship, cultivate business networks, and can even be used as a research tool for due diligence. For both companies and individuals, social digital platforms can serve as a resource and enabler for innovation by sharing important data derived from foraging among informative posts.
Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?