Quantum Tech Needed To Secure Critical Data From Quantum Decryption
Forbes
January 19, 2023
The quantum computing decryption threat will be here soon enough, and it is time for businesses, organizations and governments to protect their data for that inevitability
See publication
Tags: AI, Cybersecurity, Quantum Computing
4 Mind-Boggling Technology Advances In Store For 2023
Forbes
December 13, 2022
2022 was a transformative year for technological innovation and digital transformation. The trend will continue as the pace of innovation and development of potentially disruptive emerging technologies exponentially increases every year. The question arises, what lies ahead for tech for us to learn and experience in 2023?
See publication
Tags: AI, Cybersecurity
Cybersecurity and Business Computing Performance -- Out of the Box for 2023!
Linkedin
December 07, 2022
As we approach 2023, I was excited to upgrade my home office computing capabilities with a Dell Latitude 5430 laptop fortified with the Intel vPro platform. Because of my role in running a consulting firm, teaching graduate courses at a prominent university, and my passion for globally evangelizing cybersecurity in public forums, this was an easy choice for me to make.
See publication
Tags: Cybersecurity, Security, National Security
A Cybersecurity Primer for The C-Suite, SMBS, and Organizations
LinkedIn
November 17, 2022
In this issue of Security & Tech Insights we explore strategies, policies, tools, and advice to better fortify cybersecurity for companies (and home offices).
See publication
Tags: Cybersecurity, Risk Management, Security, National Security
For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats
Forbes
October 02, 2022
As we begin Cybersecurity Awareness month, it is incumbent for all of us to be more wary than usual by the scary stats surrounding an increasingly sophisticated and lethal cyber threat landscape.
See publication
Tags: Cybersecurity, Risk Management, Security, National Security
The Search For Extraterrestrial Life, UFOS, And Our Future
Forbes
September 04, 2022
The question of whether we are alone in the universe has been pondered throughout human history.
See publication
Tags: AI, Emerging Technology
Emerging Tech On The Horizon
Security & Tech Insights
August 26, 2022
Welcome to the 10th edition of Security and Insights newsletter. In this edition topics of quantum, artificial intelligence, nanotech, and others are explored, including how they relate to security concerns. Thanks for reading and sharing! Best, Chuck Brooks
See publication
Tags: Cybersecurity, Emerging Technology, Security
Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment
HS Today.US
August 12, 2022
Prevention and preparedness begin with discovering the knowns and unknowns in the code that is the backbone of the array of applications and operating networks.
See publication
Tags: Cybersecurity, Risk Management, Security, National Security
The Quantum Era Is Arriving, And It Will Be Transformational !
Forbes
July 20, 2022
The quantum era is arriving, and it will be transformational ! It is important to understand some of the basics, quantum computing, quantum sensing, quantum encryption, quantum IoT, and ultimately our quantum future
See publication
Tags: Cybersecurity, IoT, Security
IntelvPro Means Business by now including the 12th Gen Intel Core processor To Meet Growing Cyber-Threats
LinkedIn
July 06, 2022
Recently, Intel introduced the Intel vPro with 12th Generation Intel Core processors to significantly enhance both business performance and security. With many new features needed for business to success in a rapidly changing and risky digital world, Intel vPro means business.
See publication
Tags: Cybersecurity, Security
Public/Private Partnerships and Cybersecurity
Security & Tech Insights
May 27, 2022
This issue is focused on the importance of public private partnerships (PPP) and cybersecurity. PPPS have become a hot topic in cybersecurity and with government. It is a mission now being prioritized by CISA DHS.
See publication
Tags: Cybersecurity, Privacy, Security
A Cybersecurity Risk Management Strategy for the C-Suite
HS Today US
May 11, 2022
There is rarely a day that goes by when we do not hear of a cyber breach. Often the target is small and medium companies, and the result of a cyber-attack can mean loss of operations or even going out of business.
See publication
Tags: Cybersecurity, Risk Management, Security
The Importance of Marketing Cybersecurity on LinkedIn And Other Social Mediums
Cyber Theory
May 11, 2022
Several years back, LinkedIn asked me to pen a blog on the perspectives of using social media and an outreach medium as a security practitioner. The blog was titled, “Why LinkedIn is an Indispensable Medium for Security Professionals,” and it garnered much attention. The theme of my writing was that LinkedIn had become part of the fabric of how I (and a majority of my security world peers) communicate, operate and conduct business.
See publication
Tags: Cybersecurity, Risk Management, Security
Cyber Security Risk Management
LinkedIn
May 05, 2022
In this issue of the Security & Tech Insights newsletter we examine key elements of cybersecurity risk management, including new mandates to adhere to a Zero Trust Strategy. Thank you for reading and sharing. Also, kindly follow me on LinkedIn (6) Chuck Brooks | LinkedIn and Twitter @ChuckDBrooks for posts and articles on cybersecurity, emerging tech, and digital transformation. -- Chuck
See publication
Tags: Cybersecurity, Risk Management
When Botnets Attack
Forbes
April 22, 2022
Botnet cyber-attacks are not new and have been going on for almost two decades, but they are proliferating and pose major threats.
See publication
Tags: Cybersecurity, Risk Management, Security
The Internet of Things and Cybersecurity
LinkedIn
April 17, 2022
Welcome to the 5th edition of the Security & Tech Insights newsletter. In this issue we explore the implications of cyber-securing the Internet of Things, which is quite a challenge. Thank you for reading and please alert others you may know who might be interested in a free subscription. Thanks and Best regards, Chuck Brooks
See publication
Tags: Cybersecurity, IoT, Security
The Intel vPro Platform Enterprise for Windows with Built-in Intel Hardware Shield Can Detect and Mitigate the Threat of Ransomware
LinkedIn
April 14, 2022
In the past few years, the deployment of ransomware has become a preferred method of cyber-attack by hackers. Most ransomware breaches begin with a phishing email or through a Remote Desktop Protocol (RDP) compromise. The rise in attacks is the result of the transformation to remote work and because many business networks and users do not use secure browsing practices. Many targeted businesses often lack the in-house cybersecurity expertise, understanding of the threats, and do not have many of the security tools necessary to help thwart attacks.
See publication
Tags: Cloud, Cybersecurity, Security
The Urgency To Cyber-Secure Space Assets
Forbes
February 27, 2022
Our reliance on space, and especially satellites, for communications, security, intelligence, and commerce has exponentially grown with digital transformation. Unfortunately, so have the risks, as a result, the need to prioritize cybersecurity around space assets is urgent.
See publication
Tags: AI, Digital Transformation, GovTech
Cyber Hygiene
LinkedIn
February 21, 2022
Hi readers, this Security and Tech insights newsletter issue focuses on the urgency for cyber hygiene in an increasingly risk digital landscape. Also, please be sure to see the section on upcoming events of interest in cybersecurity.
See publication
Tags: Cybersecurity, Security
PROTECTING CRITICAL INFRASTRUCTURE
LinkedIn
January 31, 2022
Dear Readers, welcome to the third edition of Security & Tech Insights Newsletter. In this issue, the focus is on protecting critical infrastructure, both from digital and physical threats. In addition, I have added a section on upcoming events and items of special interest at the end of the newsletter as so much is happening in security and cybersecurity in 2022! Thanks for subscribing and please follow me on LinkedIn and Twitter. Thanks and Stay Safe, Best Chuck
See publication
Tags: Cybersecurity, Security
M&A Trending In Cybersecurity Industry Vertical For 2022
AT&T Business
January 28, 2022
Nowadays you need a scorecard to keep track of the monthly acquisitions and mergers in the cybersecurity industry. Mergers and acquisition (M&A) of products, capabilities, and companies has become a common strategy for business and market growth. Even through the Covid19 pandemic, trends in acquisition and consolidation of information security oriented companies remained quite strong. In fact, the volume of U.S. cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. Please see graphic from S&P Global Market Intelligence.
See publication
Tags: Cybersecurity, Leadership, Mergers and Acquisitions
Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats
Forbes
January 21, 2022
Last year I wrote two FORBES articles* that highlighted some of the more significant cyber statistics associated with our expanding digital ecosystem. In retrospect, 2021 was a very trying year for cybersecurity in so many areas.
See publication
Tags: Cybersecurity, Emerging Technology, Security
NEW YEAR PREDICTIONS -- EMERGING TECH & CYBERSECURITY
LinkedIn
December 27, 2021
We are approaching 2022 and rather than ponder the immediate future, I want to explore what may beckon in the ecosystem of disruptive technologies a decade from now. We are in the initial stages of an era of rapid and technological change that will witness regeneration of body parts, new cures for diseases, augmented reality, artificial intelligence, human/computer interface, autonomous vehicles, advanced robotics, flying cars, quantum computing, and connected smart cities. Exciting times may be ahead.
See publication
Tags: Cybersecurity, Emerging Technology, Security
Welcome To 2032: A Merged Physical/Digital World
Forbes
December 18, 2021
We are approaching 2022 and rather than ponder the immediate future, I want to explore what may beckon in the ecosystem of disruptive technologies a decade from now. We are in the initial stages of an era of rapid and technological change that will witness regeneration of body parts, new cures for diseases, augmented reality, artificial intelligence, human/computer interface, autonomous vehicles, advanced robotics, flying cars, quantum computing, and connected smart cities. Exciting times may be ahead.
See publication
Tags: AI, Digital Disruption, Security
Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats
AT&T Business
December 07, 2021
In 2020, I published an AT&T blog called “Top Cybersecurity Trends & Predictions for 2020’” 2021 Cybersecurity Trends and Insights | AT&T Cybersecurity (att.com) In the article I had forecasted that cybersecurity would become even more of a strategic priority for companies as the cost, sophistication, and lethality of breaches would continue to rise. Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, auomating phishing, and finding new deceptive paths for infiltrating malware.
See publication
Tags: Cybersecurity, Innovation, Ecosystems
Bolstering Cybersecurity Risk Management With SBOMS
Forbes
November 01, 2021
Cybersecurity is about risk mitigation, understanding the threats and fortifying gaps in networks and devices. Companies and organizations cannot fully protect digital assets unless they know what software applications you have connected to enterprise networks and devices. With the growth of supply chain attacks, and record number of breaches both to corporations and government agencies, there are efforts underway for more transparency, and accountability of such assets. One initiative is the call for a “Software Bill of Materials” (SBOM).
See publication
Tags: Cybersecurity, Leadership, Risk Management
MORE Alarming Cybersecurity Stats For 2021 !
LinkedIn
October 24, 2021
Earlier this year I wrote a FORBES article called “Alarming Cybersecurity Stats: What You Need To Know For 2021.” Alarming Cybersecurity Stats: What You Need To Know For 2021 (forbes.com) It included an assortment of stats on the increase in threats to our digital wellness as companies, governments, and consumers. The article was based on the backdrop of a spate of high-profile cyber-attacks such as Solar Winds, and Colonial Pipeline and had painted a dire assessment of the 2021 first half status of the cyber-threat ecosystem. Now we have reached the second half of 2021. Just when we thought it could not get much worse from a cybersecurity stat perspective, it did.
See publication
Tags: Cybersecurity, IoT, Risk Management
The Security Challenge Of Protecting Smart Cities
Forbes
October 10, 2021
As we continue to move forward in the Industry 4.0 era of greater connectivity between the physical and digital, the promise and development of smart cities become a more likely vision. While the term may have differing definitions, the term “smart city” usually connotes creating a public/private infrastructure to orchestrate the integration of transportation, energy, water resources, waste collections, smart-building technologies, and security technologies and services in a central location.
See publication
Tags: Cybersecurity, Smart Cities, Security
The Cyber-Hygiene Mantra
US Cybersecurity Magazine
October 04, 2021
National Cybersecurity Awareness Month is a good time for everyone to review the importance of the basics of defending their data and devices from cyber-attackers. Cyber-hygiene is a starting point to build those fortifications.
See publication
Tags: Cybersecurity, Security
Three Key Artificial Intelligence Applications For Cybersecurity by Chuck Brooks and Dr. Frederic Lemieux
Forbes
September 24, 2021
We are at the doorstep of a new era of smart technology and cybersecurity is already a testing ground. The cybersecurity industry is increasingly impacted by the deployment of solutions supported by artificial intelligence
See publication
Tags: AI, Cybersecurity, Security
Cyber “Whack-a-Mole” is a $10 Trillion a Year Hit for Shareholders and Management
Skytop Strategies
September 07, 2021
In the past several years, the world has changed and has become more perilous for corporate leaders. A new era of exponential digital connectivity catalyzed by the covid pandemic has changed the security paradigm. The growing and sophisticated cyber threat actors include various criminal enterprises, loosely affiliated hackers, and adversarial nation states. Every company is now a reachable target, and every company, large or small, has operations, brand, reputation, and revenue pipelines that are potentially at risk from a breach.
See publication
Tags: Cybersecurity, Management, Leadership
Ransomware on a Rampage; a New Wake-Up Call
Forbes
August 21, 2021
The rampage of Ransomware is a wake-up call. We live in an increasingly hyper-connected world that impacts all aspects of our lives. Managing and protecting data is a security imperative for every industry and organization.
See publication
Tags: Cybersecurity, Emerging Technology, Privacy
A Roadmap On The Geopolitical Impact Of Emerging Technologies By Chuck Brooks And Dr. David Bray
Forbes
July 27, 2021
Earlier this summer, the Atlantic Council’s GeoTech Center published a new bipartisan report of Commission on the Geopolitical Impacts of New Technologies and Data (www.atlanticcouncil.org/geotechreport). Fourteen months in the making, the bipartisan recommendations highlight that the technological revolution is advancing at such speed and enormity that it is reshaping both societies globally and the geopolitical landscape.
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
A Risk Management Cybersecurity Imperative For State, Local & Tribal Governments
Forbes
July 21, 2021
The cyber-attack using the SolarWinds vulnerability raised alarms throughout the federal government as many agency networks data were presumably compromised. The extent of the damage from Solar Winds (and other recent breaches) are still being investigated and mitigated. The cyber breach not only impacted federal systems, but also state, local, and Tribal governments (SLTG) and data bases. The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), posted on its website that, the SolarWinds hacking campaign was “impacting enterprise networks across federal, SLTG governments, as well as critical infrastructure entities and other private sector organizations.”
See publication
Tags: Cybersecurity, Risk Management, Security
The Chief Data Officers Growing Importance In Digital Transformation of Government
GovconWire
June 03, 2021
GovCon Expert Chuck Brooks, a highly esteemed leader to the cybersecurity and government contracting (GovCon) sectors as well as an influential member of Executive Mosaic’s GovCon Expert program, has released his latest article with the program.
See publication
Tags: Digital Transformation, Emerging Technology, GovTech
4 Beckoning Cyber-Threat Challenges
Forbes
May 09, 2021
My most recent FORBES article focused on 3 big trends impacting the cybersecurity ecosystem. They included, the expanding cyber-attack surface, the use of ransomware as a cyber weapon of choice by hackers, and the growing ICS, OT/IT Cyber-Threat convergence. All the elements of that article apply to this analysis of the myriad of cyber-threat trends & challenges we are currently or will be soon facing. The following observations on 4 beckoning cyber-threat challenges are another affirmation that mitigating cyber-threats is a societal imperative and cybersecurity has become indispensable to securing our digital future.
See publication
Tags: AI, Cybersecurity, Emerging Technology
GovCon Expert Chuck Brooks: Top Cybersecurity Trends Impacting GovCon Industry - GovCon Wire
GovconWire
April 27, 2021
For this article, GovCon Expert Brooks has summarized the most significant trends in cyber that are impacting the federal landscape and government this year. Some of the trends he mentions include cybersecurity innovation, training, the impact of emerging technologies, the cyber-threat landscape, the defense of our nation’s critical infrastructure, supply chains and other aspects.
See publication
Tags: Cybersecurity, Supply Chain, GovTech
3 Key Cybersecurity Trends To Know For 2021 (and On ...)
Forbes
April 12, 2021
Most business ventures rely on lessons learned to improve outcomes. They analyze what they did right or wrong to fill gaps and adapt strategies is often a barometer of future success. The cybersecurity industry needs to follow this heuristic model. In 2021 we are already facing a variety of cyber-attacks and look to lessons learned to close cyber vulnerabilities. Three trends to focus on include 1) the expanding cyber-attack surface (remote work, IoT supply chain), 2) Ransomware as a cyber weapon of choice, 3) threats to critical infrastructure via ICS, OT/IT cyber-threat convergence.
See publication
Tags: Cybersecurity, Digital Transformation, IoT
The Emerging Paths Of Quantum Computing
Forbes
March 21, 2021
The world of computing has witnessed seismic advancements since the invention of the electronic calculator in the 1960s. The past few years in information processing have been especially transformational. What were once thought of as science fiction fantasies are now technological realties. Classical computing has become more exponentially faster and more capable and our enabling devices smaller and more adaptable.
See publication
Tags: Emerging Technology, Quantum Computing
Four Emerging Technology Areas Impacting Industry 4.0: Advanced Computing, Artificial intelligence, Big Data & Materials Science
Cognitive World
March 09, 2021
https://cognitiveworld.com/articles/2021/3/4/four-emerging-technology-areas-impacting-industry-40-advanced-computing-artificial-intelligence-big-data-materials-science
See publication
Tags: AI, Big Data, Emerging Technology, Quantum Computing
Alarming Cybersecurity Stats: What You Need To Know For 2021
Forbes
March 02, 2021
The year 2020 broke all records when it came to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals. In addition, the sophistication of threats increased from the application of emerging technologies such as machine learning, artificial intelligence, and 5G, and especially from greater tactical cooperation among hacker groups and state actors. The recent Solar Winds attack, among others, highlighted both the threat and sophistication of those realities.
See publication
Tags: AI, Cybersecurity, Emerging Technology
Combining Three Pillars Of Cybersecurity
Forbes
February 18, 2021
Our digital world is under assault, and we need to urgently upgrade our defenses. In the past couple of years, the digital attack surface has vastly expanded from a move to remote work, from more people coming online, and from more interconnectivity of PCs and smart devices around the globe. Simultaneously, criminal enterprises and state actors have taken advantage of the lack of visibility and security administration. They are sharing resources and tactics over Dark Web forums and are growing more sophisticated and capable of using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks.
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Priority of Protecting Digital Critical Infrastructure Will Grow in 2021
CIP Association
January 16, 2021
In 2021 we will be facing a new and more sophisticated array of physical security and cybersecurity challenges that pose significant risk to global critical infrastructure (CI). A difficult challenge will be keeping up with the increasing sophistication of cyber threats and the expanding digital attack surfaces.
See publication
Tags: Cloud, Cybersecurity, GovTech
A Cybersecurity Checklist For 2021: 6 Ways To Help You Protect Yourself In Coming Year
Forbes
December 26, 2020
2020 has been a perilous challenge for everyone across the globe. It was the year of the virus, from both a biological and a digital perspective.
We were unexpectedly infected by Covid19, a deadly and disruptive virus that changed our way of living. Thankfully, great strides are being made in therapeutics, and vaccines are on the way. The unexpected happened in 2020, and it served as an urgent wake-up call on the need for better pandemic preparedness.
See publication
Tags: Cybersecurity, Management, Leadership
GovCon Expert Chuck Brooks: Better Cybersecurity on 2021 Urgent Wish List for U.S. Government
GovCon Wire
December 22, 2020
GovCon Expert Chuck Brooks has published his latest article as a member of Executive Mosaic’s GovCon Expert program on Tuesday.
In his latest piece, Chuck Brooks discussed the most recent cyber breaches that have impacted federal agencies and the dire need to prevent future breaches and potential consequences of not prioritizing cybersecurity in 2021. He also mentioned the potential impact of the Cybersecurity Maturity Model Certification (CMMC) program and other issues surrounding our nation’s supply chain management heading into the new year.
See publication
Tags: Cloud, Cybersecurity, GovTech
Law Firms Should Tap Into External Cybersecurity Expertise By Chuck Brooks
High Performance Counsel
November 23, 2020
The topic of cybersecurity has not a specialized area of expertise at most law firms, internally or for clients. Of course there are some exceptions to that statement in the larger legal community, especially related to compliance and insurance issues. It is not surprising that law firms lack expertise as the leadership at law firms mirrors the leadership in the corporate world where cybersecurity has been traditionally considered an afterthought. In today’s changing digital ecosystem, law firms can no longer afford to remain disconnected from the reality of breaches and cyber-threats.
See publication
Tags: Cybersecurity, Leadership, Ecosystems
GovCon Expert Chuck Brooks: Fast Tracking Our Tech Future With Government
Govconwire
November 11, 2020
The development and procurement of emerging technologies is being institutionalized throughout government, particularly in national security areas. There are a variety of new initiatives and programs that have been created to ensure that the United States is prepared for a new era of technology leadership. If you are interested in transformative technologies, it is an exciting time to follow what is happening both in industry and in government
See publication
Tags: Cybersecurity, GovTech, Security
5G Is Here: Get Ready for the Cybersecurity Battles of Tomorrow
HS Today
November 04, 2020
The worldwide rollout of 5G will create innumerable benefits for the enterprise business community and the U.S. economy. Advanced 5G and wireless networks will bring a huge selection of benefits, including higher traffic capacities, lower latency, and increased reliability. It will empower millions by broadband connectedness. It will impact commercial verticals such as retail, health, and financial by enabling processing and analytics in real time. In essence, 5G will function as a data superhighway
See publication
Tags: Cybersecurity, 5G, Security
Protecting Space-Based Assets from Cyber Threats
Homeland Security Today
October 17, 2020
Last August, the Air Force and DOD’s Defense Digital Service ran a competition intended to spur interest in aerospace cybersecurity. The challenge was called “Hack-A-Sat” and hackers were able to take control of a satellite. While it was a controlled event, the hackers demonstrated why protecting space-based assets from cyberthreats needs to be a new priority.
See publication
Tags: Cybersecurity, Innovation, GovTech
Creating An Internal Cybersecurity Hub Inside Your Company
Forbes
September 18, 2020
In 2019 more than 16 billion records were exposed through data breaches. This trend has continued in the first quarter of 2020 and so far, it has been one of the worst in data breach history. It is logical to say that in our era of increasing digital connectivity, every company’s operations, brand, reputation, and revenue pipelines can be directly threatened by cyber-attacks and breaches.
See publication
Tags: Cybersecurity, Risk Management, Security
The Merging Of Human And Machine. Two Frontiers Of Emerging Technologies
Forbes
August 27, 2020
An amazing aspect of living in The Fourth Industrial Era is that we are at a new inflection point in bringing emerging technologies to life. We are in an era of scientific breakthroughs that will change the way of life as we currently know it. While there are many technological areas of fascination for me, the meshing of biology with machine is one of the most intriguing. It fuses many elements of technologies especially artificial intelligence and pervasive computing. I have highlighted two frontiers of “mind-bending” developments that are on the horizon, Neuromorphic technologies, and human-machine biology.
See publication
Tags: Digital Transformation, Emerging Technology, Innovation
GovCon Expert Chuck Brooks: Security by Design Needed to Safeguard Energy Infrastructure From Cyber Attacks
GovconWire
July 06, 2020
Chuck Brooks, a GovCon Expert and president of Brooks Consulting International, virtually addressed the G20 forum Sunday, July 5, on energy systems cybersecurity during the Workshop on Energy Security and Markets Stability.
Brooks told G20 member countries that cyber attacks are always evolving when it comes to capabilities and tactics and that state actors, “hackavists” and other attackers homing in on energy critical infrastructure “have become more “technologically sophisticated.”
“The scale and frequency of attacks are alarming,” he said. “Adversaries have gained a deeper knowledge of control systems and how they can be attacked and can employ weaponized malware.”
Brooks noted that connectivity driven by the adoption of industrial internet of things and operational technology has further expanded the attack surface and that energy infrastructure operators should implement “security by design” to counter cyber threats.
“Protecting critical energy infrastructure from cyber attacks requires security by design. It necessitates building Agile systems with operational cyber-fusion to be able to monitor, recognize and respond to emerging threats,” he said.
The G20 is an international forum for economic cooperation and is chaired by Saudi Arabia this year. Member countries account for approximately 80 percent of the world’s economic output, 75 percent of international trade and two-thirds of the world population.
See publication
Tags: Cybersecurity, Agile, Risk Management
4 Evolving Technology Areas Of Smart Cybersecurity
FORBES
July 05, 2020
The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity
See publication
Tags: Cybersecurity, Digital Disruption, Emerging Technology
The Cybersecurity Imperative of Protecting Critical Infrastructure
Cyber Theory
July 03, 2020
The 2020 World Economic Forum’s Global Risks Report listed cyberattacks on critical infrastructure as a top concern. WEF noted that “attacks on critical infrastructure have become the new normal across sectors such as energy, healthcare, and transportation.”
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
A CYBERSECURITY CHEAT SHEET FOR GENERAL COUNSEL AND THE C-SUITE BY LEADING CYBER EXPERT CHUCK BROOKS
High Performance Counsel
July 01, 2020
See publication
Tags: Cybersecurity, Business Strategy, Legal and IP
GovCon Expert Chuck Brooks: New Government Technology Initiatives To Stir Innovation
GovCon Wire
June 17, 2020
Investment in technology research is an integral part of the journey as we embark on the 4th industrial era. Government is recognizing the imperative to stir technological innovation and new initiatives that are now coming to the forefront.
See publication
Tags: Cybersecurity, Emerging Technology, Innovation, GovTech
ADDRESSING SECURITY, HEALTH, AND COMMERCIAL CHALLENGES VIA AUGMENTED & MIXED REALITY GLASSES
Bizcatalyst 360°
June 17, 2020
Iam pleased to present the second blog in a series of interviews with companies introducing interesting and potentially disruptive emerging technologies that impact the new era of Industry 4.0. Today we explore product innovations in augmented and mixed reality technologies (AR/MR) glasses and software with Nick Cherukuri of the company ThirdEye.
See publication
Tags: Cybersecurity, Emerging Technology
Emerging Virtual Realities In Industry, Government And Academia
FORBES
June 11, 2020
See publication
Tags: Digital Transformation, Digital Disruption, Emerging Technology
A POTENTIAL MEDICAL TECHNOLOGY PARADIGM SHIFT –COMBATING DANGEROUS BACTERIA, FUNGUS, AND VIRUSES
Bizcatalyst 360°
June 10, 2020
We are currently in the midst of one of the world’s biggest challenges and threats, mitigation of the Covid19 virus. An unprecedented level of medical research and development is being directed toward therapeutic and prophylactic treatments for the pandemic. As we test and explore, scientists are discovering that there may already be available technology solutions that can make a difference in helping quell the effects of pandemics. In my series of blogs examining the impact of emerging and disruptive technologies, I was fortunate to interview Dr. Brian Huber on an available “over the counter” product that may prevent and neutralize the most dangerous bacteria’s and viruses threatening mankind today, including Covid19.
See publication
Tags: Emerging Technology, Management, COVID19
HPC PRESENTS A CYBERSECURITY CHEAT SHEET FOR GENERAL COUNSEL AND THE C-SUITE BY LEADING CYBER EXPERT CHUCK BROOKS
High Performance Councel
May 22, 2020
The Covid19 pandemic has awakened the globe to our era of global connectivity and has also exposed our vulnerabilities in cyberspace. As we have transitioned to remote work on our home on secured portals, devices, and personal Wi-Fi, we have become more of a target to cybercrime.
According to Barracuda networks, The number of coronavirus COVID-19-related email attacks has increased by 667 per cent since the end of February. And between March 1 and March 23, Barracuda researchers detected 467,825 spear phishing email attacks, and 9,116 of those detections were related to COVID-19.
See publication
Tags: Cybersecurity, Risk Management, COVID19
A passport to data-centric protection and privacy
IBM
May 21, 2020
Author Chuck Brooks discussed the emerging data privacy and protection landscape with IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia. Over the next two blog posts, we’ll learn what he discovered and what IBM is doing to tackle these new challenges.
See publication
Tags: Cybersecurity, Digital Disruption, Data Center, Security
6 Tips for Employees to Work From Home Securely
Cybersecurity Collaborative
May 21, 2020
The world is becoming digital, unfortunately much faster as we isolate ourselves on our computers at home sheltering from the COVID-19 virus. As we work remote on our home on secured portals, devices, and personal Wi-Fi, we have become more vulnerable to cybercrime. Microsoft had estimated that by 2020 over 4 billion people will be online, many in remote work environments. That number is far, far larger because of the consequences of the COVID-19 virus.
See publication
Tags: Cybersecurity, Risk Management, COVID19
Cybersecurity, Emerging Tech, Homeland Security: - Spring 2020 Writings & Media by Chuck Brooks
LinkedIn
May 13, 2020
See publication
Tags: Cybersecurity, Risk Management, Security
Public and Private Sector Partnerships Addressing COVID-19 Are A Model for Cybersecurity by Chuck Brooks
Cybertheory
May 13, 2020
A silver lining of the current Covid-19 pandemic has been the cooperation of industry and government who have been working closely together to bring solutions that alleviate supply shortages, and cultivate treatments to combat the lethal virus. Not since World War II have we witnessed such a monumental effort of companies adapting their manufacturing lines to build emergency medical products, and collaboratively work with public sector on the greater mission. This Covid-19 working model of addressing threats via Public Private Partnerships (PPPs) should be replicated to help meet the challenges of cyber-securing our digital world.
See publication
Tags: Cybersecurity, Supply Chain, Risk Management
3 Digital Realities Arising From The Covid19 Pandemic (By Chuck Brooks in FORBES)
Forbes
April 28, 2020
The Covid19 pandemic has brought misery to most of the world. Unlike the 1918 Spanish Flu pandemic we do have a better ability to surveil the virus ecosystem and process lessons learned through our digital technologies. There are many lessons still to learn, but three digital realities can guide our future outlook.
See publication
Tags: Cybersecurity, Digital Transformation, COVID19
Chuck Brooks: Government Focused on Securing the Cyber Supply Chain
GOVCON
April 28, 2020
Supply chain cyber-attacks can be perpetrated from nation state adversaries, espionage operators, criminals or hackavists. Their goals are to breach contractors, systems, companies and suppliers via the weakest links in the chain. This is often done through taking advantage of poor security practices of suppliers, embedding compromised (or counterfeit) hardware and software, or from insider threats within networks.
See publication
Tags: Cybersecurity, IoT, Supply Chain
Sheltering At Home, A Day In The Life In The COVID-19 Pandemic (FORBES)
FORBES
April 10, 2020
For many people, the situation in Washington DC resembles the theme of the classic movie Ground Hog day, repetition of the same activities over and over each day. After all, sheltering at home can be limiting. Still we must move ahead and adapt to the new challenges of sheltering at home and getting through each day of the pandemic.
See publication
Tags: Cybersecurity, Sustainability, COVID19
4 Reasons Why Gamification Will Transform the Cybersecurity Industry
CyberSecurity Collaborative
January 31, 2020
When sitting down to write this article we wanted to share HOW gamification benefits the cybersecurity industry, but also WHY it can work effectively. The “why” question in its most simple term is that gamification touches on human needs. Most of us studied Maslow’s Hierarchy of Needs in our Psychology 101 classes so this is going to resonate.
See publication
Tags: Cybersecurity, Privacy, Security
A passport to data-centric protection and privacy, pt 2
IBM
January 15, 2020
From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.
See publication
Tags: Cloud, Privacy, Data Center
A passport to data-centric protection and privacy
IBM
January 08, 2020
Author Chuck Brooks discussed the emerging data privacy and protection landscape with IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia. Over the next two blog posts, we’ll learn what he discovered and what IBM is doing to tackle these new challenges.
See publication
Tags: Privacy, Data Center
Top Cybersecurity trends & predictions for 2020
Cibersecurity
December 17, 2019
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a quick list of what me may expect in the 2020.
Cybersecurity will become even more of a strategic priority for companies as the cost, sophistication, and lethality of breaches continue to rise.
The advent of emerging and fused technologies 5G, IoT (and Industrial IoT) will pose significant operational and regulatory challenges. Companies and agencies will look to automation and orchestration technologies such as machine learning, deep learning, artificial intelligence, and other analytic tools to mitigate gaps on ubiquitous platforms.
See publication
Tags: Cybersecurity, Predictive Analytics, Risk Management
Quantum Trends And The Internet of Things
Forbes
December 05, 2019
As a new decade approaches, we are in a state of technological flux across many spectrums. One area to take note of is quantum computing. We are starting to evolve beyond classical computing into a new data era called quantum computing. It is envisioned that quantum computing (still in a development stage) will accelerate us into the future by impacting the landscape of artificial intelligence and data analytics. The quantum computing power and speed will help us solve some of the biggest and most complex challenges we face as humans.
See publication
Tags: AI, IoT, Quantum Computing
Perspectives: Cybersecurity, Emerging Tech, and Risk Management by Chuck Brooks
LinkedIn
October 20, 2019
Sharing an update on some of my recent writings/speeches/activities in thought leadership:
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Risk Management And Black Swan Events
FORBES
October 18, 2019
Black Swans bring challenges to risk management, especially in our rapidly transforming technological landscape. However, those transformative changes in emerging technology add to the ability to analytically forecast and try to mitigate Black Swan events.us on
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Discovering Applications and Potential of The Internet of Things
IIOT-WORLD
September 11, 2019
We have entered a new era of scientific breakthroughs and technological applications that will change life as we know it. Accelerated technological development is transforming our civilization. The pace of innovation is growing so rapidly that it is becoming exponential as each year passes. Futurist Dr. Michio Kaku characterizes this blazing technological shift as moving from the “age of discovery” to the “age of mastery.
See publication
Tags: Cybersecurity, Digital Transformation, IoT
Public Private Partnerships And The Cybersecurity Challenge Of Protecting Critical Infrastructure
FORBES
September 04, 2019
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Examining The Future: Cybersecurity and Emerging Tech
LinkedIn
July 08, 2019
Selected writings, speeches on trends in cybersecurity and emerging tech
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Government, An Integral Partner For Exploring Artificial Intelligence
Forbes
June 14, 2019
On June 24, an upcoming conference will explore the implications of artificial intelligence (AI) in the public sectors. AI World Government will gather leaders across government, industry and academia to discuss the challenges and potential solutions of AI in automating our expanding digital world. The event is described as “a comprehensive three-day forum to educate and inform public sector agencies on the strategic and tactical benefits of deploying AI and cognitive technologies.”
See publication
Tags: AI, Cybersecurity, GovTech
Principal Market Growth Strategist -- Cybersecurity and Emerging Technologies
LinkedIn
May 28, 2019
Compiled writings and media on cybersecurity, homeland security, risk management and emerging technologies
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
How Data-Centric Security Solutions Thwart Insider Threats
Today.us
May 01, 2019
Thwarting insider threats is one of the most difficult challenges for companies, organizations, and governments. In fact, behind phishing, it is most often ranked as one of the top cybersecurity challenges by CISOs and CIOs. According to PwC’s Audit Committee Update on Insider Threat, 44 percent of data breaches are attributable to insiders and 80 percent of attacks are committed during work hours on company-issued software.
See publication
Tags: Cybersecurity, Management, Data Center
The New Techno-Fusion: The Merging Of Technologies Impacting Our Future
FORBES
February 26, 2019
The process of systems integration (SI) functionally links together infrastructure, computing systems, and applications. SI can allow for economies of scale, streamlined manufacturing, and better efficiency and innovation through combined research and development.
See publication
Tags: Cybersecurity, Emerging Technology, IoT
Protecting Energy Critical Infrastructure a Key Challenge for DHS
Homeland Security Today
February 16, 2019
Protecting our critical infrastructure from both cyber and physical threats will be a key challenge for 2019 and the years following. The Department of Homeland Security (DHS) describes critical infrastructure as “the physical and cyber systems and assets that are so vital to the United States that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety.”
See publication
Tags: Cybersecurity, Emerging Technology, Health and Safety
Articles, Trends, Activities on Emerging Tech, Cybersecurity, and Risk Management
LinkedIn
February 04, 2019
Sharing some highlights and compiled writings from an early start of the new year. Wishing you all a Happy, Healthy,and Prosperous 2019!
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Personal Recollections – With Dr. J. Allen Hynek Of ‘Project Blue Book’
Bizcatalyst 360°
January 26, 2019
Starting in January, the History Channel will premiere Project Blue Book, a series based on unidentified flying object (UFOs) cases that were inspired by the work of the late Dr. J. Allen Hynek. Dr. Hynek was an American astronomer, professor, and ufologist.
HISTORY’s upcoming new drama series ‘Project Blue Book’ is based on the true, top-secret investigations into Unidentified Flying Objects (UFOs) and related phenomena conducted by the United States Air Force from 1952 to 1969.
See publication
Tags: Management, Leadership
The CyberAvengers: 5 Tips To Improve Your Cybersecurity Posture In 2019
ITSP MAGAZINE
January 23, 2019
So here we are in early 2019, looking back at 2018 which was arguably an IT and network security dumpster fire. There were breaches of epic proportions, and breaches of trust and confidence. But 2017 was no better, ending with the aftermath of the Equifax breach, which affected approximately 143 million customers.
Which leaves us with the question of whether we whine, moan and complain about the past — or do something to change the cybersecurity game in 2019, to change the paradigm of pain and suffering. We suggest that the latter is much more beneficial, as it has the potential for good things to happen.
Here are 5 things you can do in the next few weeks to have a better cyber 2019:
See publication
Tags: Cybersecurity, Management, Leadership
The Imperative to Address Security Concerns of the Rapidly Evolving Internet of Things
The State of Security
January 20, 2019
The Internet of Things (IoT) broadly refers to devices and equipment that are readable, recognizable, locatable, addressable and/or controllable via the internet. This includes everything from edge computing devices to home appliances, from wearable technology to cars. IoT represents the melding of the physical world and the digital worked, as sensors are not costly and wireless access is now ubiquitous.
These days, if a device can be turned on, it can most likely be connected to the internet. Because of this, data can be shared quickly across a multitude of objects and devices, thereby increasing the rate of communications.
See publication
Tags: Cybersecurity, IoT, Risk Management
HSToday Visiting Editor Brooks to Serve as Mentor to USAF Technology Accelerator Program
HSTODAY.US
January 15, 2019
Chuck Brooks was recently selected to serve as a mentor to the Techstars Autonomous Technology Accelerator with the U.S. Air Force. Techstars is a mentor-driven program to encourage innovation and rapid prototyping of cutting-edge products.
The Techstars Autonomous Technology Accelerator with the U.S. Air Force, held in Boston Q1 2018, was an experiment by the Air Force in establishing closer ties to the most innovative early startup companies with commercially viable products that the Air Force found compelling.
See publication
Tags: Innovation, Management, Leadership
Why Computer Passwords Are Still a Problem in 2019
Nextgov
January 11, 2019
There was a recent article before the holiday break on the complexity of computer passwords. The top “worst” password for 2018 was “123456.” Close behind in second place was “password.” They were also in first and second place in 2017. Slightly more complex was “123456789,” in third place in 2018, with the one-character shorter version, “12345678” just behind in fourth place. You get the gist.
Passwords are one of the critical problems in cybersecurity today. They are too easy to guess. They are too easy to break. All a hacker needs is your user ID (say, e.g. notsodifficult@password.com) and he or she can be off to the races in a matter of minutes invading your employee email account. Likely he also will be able to raid many of your other online accounts (like shopping, online gaming and streaming video) because you thought your lame password was so tricky that it was worthy of reusing in your 10 other accounts. The technical term for what happens here is an account takeover. In this case times 10. Re-using a lame password is problem one.
See publication
Tags: Customer Experience, Cybersecurity, GovTech
Cybersecurity, Emerging Tech, Risk Management - Published articles and speeches by Chuck Brooks
SlideShare
January 02, 2019
2018 Collected writings on emerging tech, cybersecurity and risk management by Chuck Brooks
See publication
Tags: Cybersecurity, Emerging Technology, Risk Management
Four Emerging Technology Areas That Will Help Define Our World In 2019
FORBES
December 26, 2018
2018 was surely a transformative year for technological innovation. We saw early development of ambient computing, quantum teleportation, cloaks of invisibility, genomics advancements and even robocops. Granted we're not flying around in our own cars like the Jetsons did yet, but we're closer. In 2019 we will continue on the transformation path and expand even more into adopting cutting edge immersive technologies
See publication
Tags: Cybersecurity, Emerging Technology, IoT
Four Emerging Technology Areas That Will Help Define Our World In 2019
FORBES
December 24, 2018
2018 was surely a transformative year for technological innovation. We saw early development of ambient computing, quantum teleportation, cloaks of invisibility, genomics advancements and even robocops. Granted we're not flying around in our own cars like the Jetsons did yet, but we're closer. In 2019 we will continue on the transformation path and expand even more into adopting cutting edge immersive technologies. What's ahead for the coming year? I envision four emerging technology areas that will significantly impact our lives in 2019.
See publication
Tags: AI, AR/VR, Emerging Technology
Journeys in Cybersecurity, AI, and Risk Management
LinkedIn
December 20, 2018
Collections of some of Chuck Brooks recent writings, speeches and activities
See publication
Tags: AI, Cybersecurity, Emerging Technology, Risk Management
Cybersecurity Leader of the Week, Chuck Brooks, General Dynamics Mission Systems
Cyber Startup Observatory
December 10, 2018
Chuck Brooks recognized for his thought leadership in cybersecurity
See publication
Tags: Cybersecurity, Innovation, Leadership
Employing A Risk Management Strategy To The Internet of Things
Front Lines
December 10, 2018
Analyses and suggestions on how to create an IoT cybersecurity Risk Framework
See publication
Tags: Cybersecurity, IoT, Risk Management
ON #BAKERSDOZEN: CHUCK BROOKS IN INTERVIEW WITH HIGH PERFORMANCE COUNSEL
High Performance Counsel
December 10, 2018
Interview with Chuck Brooks on security issues facing the legal community
See publication
Tags: Cybersecurity, Innovation, Leadership
ON #BAKERSDOZEN: CHUCK BROOKS IN INTERVIEW WITH HIGH PERFORMANCE COUNSEL
High Performance Counsel
December 10, 2018
Interview with Chuck Brooks on security issues facing the legal community
See publication
Tags: Cybersecurity, Innovation, Leadership
Emerging Tech Impacting The Security Industry
Forbes
November 05, 2018
A look into emerging tech impacting the security industry
See publication
Tags: AI, Cybersecurity, Emerging Technology
Five Ways Artificial Intelligence Can Facilitate Public Safety Now
Homeland Security Today
October 31, 2018
We are privileged to live in the Golden Age of data. Head-spinning technological advances allow us to gain greater data-driven insights than ever before. To truly leverage our ability to use this new data, however, we need to make sure our thinking about how to best use this data keeps pace with its availability.
See publication
Tags: AI, Cybersecurity, Emerging Technology
DHS State, Local, Tribal and Territorial Cybersecurity Task Force Tackles Preparedness, Mitigation
Homeland Security
October 30, 2018
Recent high-profile attacks by malicious state and non-state actors against both commercial interests and government elections, which play a vital role in our democratic process, have created a renewed sense of urgency to better understand and protect critical operations. In the past few years cybersecurity has come to the forefront and is now considered a critical issue for local governments, particularly now that the current threat environment has moved from stateside hackers to sophisticated nation-state sponsored actors
See publication
Tags: Cybersecurity, GovTech
PERSPECTIVE: Honor Native Americans’ Security Contributions with More Cyber Training
Homeland Security Today
October 07, 2018
Native American contributions to U.S. national security have been largely unheralded. Native Americans have served in the U.S. Armed Forces in every major military conflict since the Revolutionary War. Twenty-eight Native Americans have the earned the Medal of Honor, the nation’s highest decoration for military valor. The Navajo Code Talkers of World War II played an amazing role in helping the U.S. and allies achieve victory. Today over 24,000 Native Americans serve in the Armed Forces and have the highest per capita rate of military service of any ethnic group protecting the homeland. And more than 150,000 veterans self-identify as American Indian or Alaska Native.
See publication
Tags: Cybersecurity, GovTech, Management
Israel: Accelerating Global Cybersecurity Innovation
Cyberstartup Observatory
October 01, 2018
Last year, Tom Bossert, former White House homeland security and counterterrorism adviser, disclosed the new partnership to combat cyberattacks during remarks at an annual cybersecurity conference in Tel Aviv.
“These high-level meetings represent the first step in strengthening bilateral ties on cyber issues following President Trump’s visit to Israel,” Bossert said at Cyber Week 2017, according to Reuters. “The agility Israel has in developing solutions will innovate cyber defenses that we can test here and bring back to America,” the White House aide continued. “Perfect security may not be achievable but we have within our reach a safer and more secure Internet.”
See publication
Tags: Cybersecurity, Innovation, IoT, Risk Management
A Scoville Heat Scale For Measuring Cybersecurity
Forbes
September 05, 2018
The Scoville Scale is a measurement chart used to rate the heat of peppers or other spicy foods. It can also can have a useful application for measuring cybersecurity threats. Cyber-threats are also red hot as the human attack surface is projected to reach over 6 billion people by 2022. In addition, cyber-crime damage costs are estimated to reach $6 trillion annually by 2021. The cybersecurity firm RiskIQ states that every minute approximately 1,861 people fall victim to cyber-attacks, while some $1.14 million is stolen. In recognition of these alarming stats, perhaps it would be useful to categorize cyber-threats in a similar scale to the hot peppers we consume.
See publication
Tags: Cybersecurity, Emerging Technology
Cybersecurity, Innovation, Emerging Tech, Homeland Security, and Risk Management by Chuck Brooks
LinkedIn
August 24, 2018
Links and Excerpts of recent writings/activities on Cybersecurity, Innovation, Emerging Tech, Homeland Security, and Risk Management
See publication
Tags: Cybersecurity, Emerging Technology, GovTech, Risk Management
On The Future Horizon: Cybersecurity, Homeland Security, IoT, Big Data, AI, Emerging Tech by Chuck Brooks
On The Future Horizon: Cybersecurity, Homeland Security, IoT, Big Data, AI, Emerging Tech by Chuck Brooks
July 15, 2018
Recent publications on emerging technologies and cybersecurity by Chuck Brooks
See publication
Tags: Cybersecurity, Emerging Technology, Innovation
Catalyzing Innovation via Centers, Labs, and Foundries
Forbes
July 11, 2018
The cornerstone of collaboration is based on knowledge transfer; sharing of research tools, methodologies and findings; and sometimes combining mutual funding resources to meet shortfalls necessary to build prototypes and commercialize technologies.
See publication
Tags: Emerging Technology, Innovation, Risk Management
Avatars, Bots, And AI – Emerging Tech For Digital Government
Bizcatalyst 360°
June 05, 2018
In a new era of fiscal belt-tightening, the combination of technological innovation and transformational digital processes in customer engagement has become a specialized mission for many government agencies.
Government agencies are faced with the challenge to keep pace with rising expectations from the public to deliver the same level of service received in the private sector or, better. Consequently, federal agencies have integrated service metrics from commercial best practices and are looking for companies with industry customer relations experience to model their outreach programs. They are recognizing that industry metrics, based on proven consistency, efficiency, and quality of services, allows for a more predictable allocation of capital resources. It also translates to lower cost for federal agencies combined with deeper and more flexible insights into data for improved citizen engagement.
See publication
Tags: AI, Digital Transformation, Emerging Technology
PERSPECTIVE: Leadership Role Suits DHS in Cybersecurity Evolution
Homeland Security Today
May 29, 2018
Last month the Department of Homeland Security (DHS) unveiled its new cybersecurity strategy. DHS characterizes the strategy as providing “the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.”
See publication
Tags: Cybersecurity, Leadership, Risk Management
WASHINGTON POST TAPS CYBERSECURITY EXPERT CHUCK BROOKS '79 FOR 'THE NETWORK:\'
DePauw University
May 21, 2018
Chuck Brooks, a 1979 graduate of DePauw University, has been selected by the Washington Post to be a part of "The Network:\," composed of "some of the most influential people in cybersecurity."
Brooks is among "a group of high-level digital security experts from across government, the private sector and security research community invited by the Post to vote in surveys on the most pressing issues in the field ... They include members of Congress and the Trump administration, the country’s top security researchers and senior leaders at companies as varied as Facebook, General Motors and Visa."
See publication
Tags: Cybersecurity, Emerging Technology, Leadership
A CYBERSECURITY ACTION LIST FOR LAW FIRMS
LinkedIn
May 10, 2018
There is a congruency with the legal community’s mission of preparedness and the practice of cybersecurity. A primary requirement of the legal profession is to obtain data and explore evidence, access the implications of that evidence, and prepare accordingly to protect and serve the client.
See publication
Tags: Cybersecurity, Security
Cybersecurity, Is there Light at the End of The Tunnel in 2018?
AT&T Business
May 09, 2018
2017 was certainly a challenging year for cybersecurity. The volume of data breaches continued to climb from the already alarming experiences of previous years. The sophistication and intensity of cyberattacks from social engineering, ransomware, and DDOS attacks also experienced exponential growth. The question remains, what should we expect (or fear) in 2018?
See publication
Tags: Cybersecurity, Leadership, Security
Artificial intelligence and machine learning hot topics at RSA 2018
ITSP Magazine
April 12, 2018
I am excited about attending the RSA 2018 Conference next week. RSA has been the annual preeminent forum for learning about trends and developments in the cybersecurity ecosystem.
This year, artificial intelligence (AI) and machine learning have emerged as hot topics for the conference. And justifiably so. In 2017, Artificial intelligence (AI) and Machine Learning were major focus areas of VC investments (over $12B). Many of those investments included aspects correlating to information security.
See publication
Tags: AI, Cybersecurity, Security
Employing a risk management framework to the Internet of Things
On the Frontlines Magazine
April 08, 2018
See publication
Tags: Cybersecurity, IoT, Risk Management
The Science of Cybersecurity - An Interview with Chuck Brooks
LinkedIn
April 03, 2018
The current state is a scary one. Constant breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce. Our banking accounts, credit cards, and financial daily activities are interconnected.
See publication
Tags: Cybersecurity
Chuck Brooks appointed to Adjunct Faculty at Master
LinkedIn
March 15, 2018
Chuck Brooks was recently appointed to be Adjunct Faculty at Master's in Applied Intelligence Program at Georgetown University School of Continuing Studies.
See publication
Tags: Cybersecurity, Security
Using LinkedIn As A Marketing Fulcrum For Emerging Technologies In 2018
LinkedIn
February 10, 2018
2018 has started and accompanying this new year will be more disruption from emerging technologies. The impact surrounding the ecosystem of technology are clearly reshaping our world in business, science, and the conduct of our daily lives.
See publication
Tags: Cybersecurity
CYBER SECURING CRYPTO CURRENCIES
LinkedIn
January 10, 2018
Recently it was disclosed that almost 4,700 bitcoins crypto currency valued at $64m were stolen by hackers who broke into Slovenian-based bitcoin mining marketplace called NiceHash.
See publication
Tags: Cryptocurrency, Cybersecurity, Security
A 2018 Cybersecurity "Cheat Sheet" For The C-Suite
LinkedIn
January 01, 2018
2018 has arrived and it is time for executive management to review how they can best fortify against data breaches as cyber-threats as the new year unfolds.
See publication
Tags: Cybersecurity
Emerging Technologies and the Cyber Threat
AlienVault
December 13, 2017
Cybersecurity is at a tipping point, the sheer volume of breaches, attacks, and threats has become overwhelming. Juniper Research, suggests that the rapid digitization of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.
See publication
Tags: Cybersecurity
7 Emerging Tech Trends For 2018
LinkedIn
December 05, 2017
2017 was certainly a epic year for technological innovation and digital transformation. But we have only recently entered the era of the Fourth Industrial Revolution and 2018 promises to see more exponential changes.
See publication
Tags: AI, Big Data, Cybersecurity, IoT
Cybersecurity, Homeland Security, IoT, Big Data, AI, Emerging Tech, and other topics -- Published Writings by Chuck Brooks
LinkedIn
October 08, 2017
See publication
Tags: Cybersecurity, Emerging Technology, Security
CYBERSECURITY: A QUICK SUMMARY OF RECENT TRENDS & DEVELOPMENTS
LinkedIn
September 22, 2017
According to market research firm Gartner, global spending on information security is expected to reach nearly $87 billion in 2017 — an increase of around 7 per cent over 2016 – and is expected to top $113 billion by 2020. Also according to Gartner, by 2020, 40 percent of all managed security service (MSS) contracts will be bundled with other security services and broader IT outsourcing (ITO) projects, up from 20 percent today.
See publication
Tags: Cybersecurity
"RISING TIDES AND HIGHER STAKES" HIGH PERFORMANCE COUNSEL INTERVIEWS CYBERSECURITY THOUGHT-LEADER CHUCK BROOKS
LinkedIn
August 26, 2017
We live in world of algorithms; x’s and o’s. Our digital world is ripe for access and compromise by those who want do harm from just a laptop and server. A myriad of recent breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce.
See publication
Tags: Cybersecurity
Why LinkedIn is an Indispensable Medium for Security Professionals
LinkedIn
August 16, 2017
See publication
Tags: Cybersecurity
The Imperative of Critical Infrastructure Protection - Cyber and Physical (articles/blogs by Chuck Brooks)
LinkedIn
August 03, 2017
Recently, the Kentucky Office of Homeland Security hosted an exercise simulating attacks on the power grid and government computer networks. Participants included law enforcement, first responders, and private sector representatives engaged in health and security.
See publication
Tags: Cybersecurity
CHUCK BROOKS, NOW ADVISOR TO LINKEDIN MARKETING AS CYBERSECURITY AND EMERGING TECHNOLOGY SUBJECT MATTER EXPERT
LinkedIn
July 22, 2017
We are pleased to announce that Chuck Brooks, who is HIGH PERFORMANCE COUNSEL’s featured Contributor on cybersecurity issues, has been working directly with the LinkedIn Team as a security (Cyber, Homeland) and emerging technologies (IoT, Big Data, Artificial Intelligence, Cloud, BlockChain) Subject Matter Expert/Advisor for content in marketing.
See publication
Tags: Cybersecurity
The #CyberAvengers
LinkedIn
July 11, 2017
The #CyberAvengers are a group of salty and experienced professionals who have decided to work together to help keep this nation and its data safe and secure.
See publication
Tags: Cybersecurity
Identity Theft, the Not So Hidden Scourge
AlienVault
July 05, 2017
Per a recent study released by Javelin Strategy & Research, identity fraud hit a record high in 2016 targeting 15.4 Million U.S. Victims and with hacker/fraudsters netting around $16 billion dollars. Those findings are not so shocking, as breaches from companies, government, and untold individual accounts are becoming an unfortunate norm.
See publication
Tags: Cybersecurity
Understanding The Potential and Challenges of The Internet of Things
LinkedIn
June 22, 2017
Recently, I have published several articles on the topic of Internet of things. The highlights are shared below.
See publication
Tags: Cybersecurity
Thought Leadership -- Evangelizing The Future
LinkedIn
June 14, 2017
Digital technologies and connectivity have transformed the way the world works. The cyber medium has transformed our lives including how we communicate, and how we do business. Social media platforms, and especially, LinkedIn, have led to a new paradigm for thought leadership as a catalyst for productivity and achievement in industry and government.
See publication
Tags: Cybersecurity
FOUR MUST READ CYBERSECURITY BOOKS/RESOURCES
LinkedIn
May 19, 2017
Please check out quick synopses, reviews, and commercial links to what I consider four "go-to" books on the encompassing topic of cybersecurity.
See publication
Tags: Cybersecurity
Exploring Trends in Cybersecurity, Artificial Intelligence, Iot, and Emerging Technologies
LinkedIn
March 31, 2017
Please see below a list of some selected links to recent articles/speeches I have written on 'tech topics of the day'.
See publication
Tags: Cybersecurity
COGNITIVE WORLD aims to be the go-to resource for enterprise decision-makers interested in artificial intelligence (AI)
LinkedIn
March 30, 2017
Cognitive World will be official launching April 25th and I am excited to be both an Advisor and Contributor to the HUB.
See publication
Tags: AI, Cybersecurity
The Special 2-Way Relationship with Man's Best Friend (Dogs)
LinkedIn
March 29, 2017
The old adage that Dogs are man's best friend (and women's) really rings true. Dogs have a long and special relationship with humans since they were domesticated as pets tens of thousands of years ago according to the latest archeological estimates.
See publication
Tags: Cybersecurity
Interview of Chuck Brooks, Judge of GSN Homeland Security Awards, on Key Homeland Security, Cybersecurity, and Technology Issues for 2017
LinkedIn
March 03, 2017
It was my real pleasure. Each year I am more and more impressed with the capabilities of the company submissions for best solutions.
See publication
Tags: Cybersecurity, Security
Alarming Cybersecurity Stats You Should Know
LinkedIn
February 20, 2017
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. It is clear that companies and individuals are playing games of catch up from a growing array of cyber adversaries.
See publication
Tags: Cybersecurity, Security
DHS, NIST Release Security Guidelines for IoT Devices
LinkedIn
January 26, 2017
The Department of Homeland Security (DHS) and National Institute of Standards and Technology (NIST) released new security guidelines last week for the Internet of Things (IoT) after a massive distributed denial-of-service attack targeted these devices and shutdown many popular websites like Twitter and Etsy last month.
See publication
Tags: Cybersecurity, IoT, Security
Chuck Brooks Selected As Winner of "Cybersecurity Marketer of The Year"? at the 2017 Cybersecurity Excellence Awards
LinkedIn
January 17, 2017
The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security.
See publication
Tags: Cybersecurity
Emerging Technologies to watch (a resource guide)
LinkedIn
December 18, 2016
A few years back, The McKinsey Global Institute published an informative analysis that comprehensively examined the economic impact of global technology trends.
See publication
Tags: Cybersecurity
Compiled Writings on cybersecurity, Homeland Security, and Emerging Technologies
LinkedIn
December 16, 2016
See publication
Tags: Cybersecurity, Emerging Technology