Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Chuck Brooks

President at Brooks Consulting International

Washington, D.C., United States

NAMED BY THOMSON REUTERS AS A “TOP 50 SOCIAL INFLUENCER IN RISK, COMPLIANCE.” NAMED BY IFSEC “#2 GLOBAL CYBERSECURITY INFLUENCER. TWO-TIME PRESIDENTIAL APPOINTEE. CORPORATE EXECUTIVE ROLES; GENERAL DYNAMICS, XEROX, SRA, RAPISCAN. THOUGHT LEADER, INFLUENCER, BRAND AMBASSADOR. 62k LINKEDIN FOLLOWERS, 12k TWITTER, 5k FACEBOOK. LEADERSHIP IN GOVERNMENT RELATIONS, MARKETING, BUSINESS DEVELOPMENT, AND STRATEGY

*Named Top Person To Follow on Tech by LinkedIn. Thought Leader, Influencer, Brand Ambassador.
*Adjunct Faculty at Georgetown University. Former Adjunct Faculty Johns Hopkins
* Marketing, Government Relations, Business Development, Strategic Partnerships, Corporate Growth Strategist
* Blogger and event speaker for AT&T, IBM, Blackberry/Cylance, Xerox, General Dynamics, Tripwire, others
*Received Presidential Appointments for Executive Service by two U.S. Presidents
*Helped "stand up" Office of Legislative at DHS. Served as first Director of Legislative Affairs at the DHS Science & Technology Directorate
*Served as Senior Legislative Staff (foreign affairs, security, tech) to Senator Arlen Specter, U.S. Senate
*Named Cybersecurity Marketer of the Year and Top Cybersecurity SME to Follow
* Contributor to FORBES on Technology and Cybersecurity topics
* Former Technology Partner Advisor at Bill and Melinda Gates Foundation
*EC-Council Global Advisory Board
* MIT Technology Review Advisory Panelist
* Cyber Start Up Observatory Hall of Fame
* Program Chair Quantum Security Alliance
* Judge Homeland Security Awards
* Advisory Boards (Cybersecurity, Emerging Technology, Risk Management)
* Project Management, and Marketing Certifications
* Former Auxiliary Police Officer
* Former competive powerlifter

THOUGHT LEADER, INFLUENCER, TECHNOLOGY EVANGELIST; Featured Writer/Speaker/Blogger: areas: homeland security, cyber security, CBRNE, artificial intelligence (AI), Internet of Things (IoT), science & technology, public/private partnerships, Risk Management, blockchain, innovation. Published in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov, Government Security News, Cygnus Security Media, Homeland Security Today (Visiting Editor), The Hill, Biometric Update, Bizcatalyst360, IT Security Planet, Christian Science Monitor. Published 180 + articles *

INDUSTRY EXECUTIVE: former Vice President for Homeland Security, Xerox; Former Vice President of Government Relations, SRA; Former Vice President R&D Rapiscan

* Co-leader of two top Homeland Security Groups on LinkedIn. Run 15 other business, tech LI groups

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Washington,DC

Chuck Brooks Points
Academic 55
Author 456
Influencer 976
Speaker 51
Entrepreneur 25
Total 1563

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Cybersecurity, Homeland Security,
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed
Media Experience: 20 plus years
Last Media Interview: 07/02/2020

Areas of Expertise

5G 30.03
AI 30.44
Analytics
AR/VR 30.22
Big Data 30.07
Blockchain
Business Strategy 30.31
Cloud 30.59
Cybersecurity 53.27
Data Center 30.18
Digital Disruption 31.15
Digital Transformation 30.27
Emerging Technology 36.32
Entrepreneurship
GovTech 32.83
Health and Safety 30.27
Innovation 31.69
IoT 30.95
Leadership 30.79
Management 31.89
Marketing 30.39
Mobility
Open Innovation
Privacy 30.41
Quantum Computing 31.04
Risk Management 42.62
Social 30.12
Startups
Supply Chain 30.10
Legal and IP 30.26
Change Management
COVID19 32.98
Sustainability 30.17
Agile 30.03
Predictive Analytics 30.01
Customer Experience 30.03
Ecosystems 30.12
Smart Cities 30.69
Security 40
Cryptocurrency 30.13
Mergers and Acquisitions 30.15
International Relations 32.07
National Security 32.73

Industry Experience

Aerospace & Defense
Federal & Public Sector
Healthcare
High Tech & Electronics
Higher Education & Research
Hospitality
Media
Oil & Gas
Professional Services
Telecommunications
Utilities

Publications

1 Academic Certification
Selected Chair of Quantum Impacts on the Internet of Things by the Quantum Security Alliance
Quantum Security Alliance
December 18, 2018
Selected Chair of Quantum Impacts on the Internet of Things by the Quantum Security Alliance

See publication

Tags: IoT, Management, Leadership

1 Adjunct Professor
Disruptive Tech & Org Change
Georgetown University
August 26, 2020
This course explores the impact of disruptive technological innovation on organizations and their ability to adapt to change. More precisely, students learn how to detect and anticipate disruptive technologies and their potential impact on organizational culture, processes, and strategies. The course places an emphasis on understanding organizational values, processes, resources, and migration capabilities. Upon completion of the course, students will be able to identify and apply sustainable solutions to accommodate disruptive innovations and capabilities to cope with organizational and industry changes.
Course #: MPCR-600-01
CRN: 38191
Format: On-campus
Instructor: Brooks, C.
Dates: Aug 26 – Dec 18, 2020
Class Meetings:
Mon 5:20 PM - 7:50 PM, Online, Room REMOTE

See publication

Tags: Cybersecurity, Digital Disruption, Innovation

158 Article/Blogs
How Intel Core Ultra Processors and Intel vPro Can Help Keep Your PC Secure
LinkedIn
April 19, 2024
In 2024 artificial intelligence (AI) has become the focus of every industry in the technology sector. All types of businesses, big and small, have been touched by the development of AI tools. It is heavily impacting personal computing as AI works together to improve an organization's capacity for safe and effective operations, which boosts performance in today's fast-paced business climate. AI is exponentially impacting the business ecosystem.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Cyber-Securing Space Systems A Growing Global Concern
Forbes
April 09, 2024
There is a growing global consensus that governments and businesses need to prioritize security when securing the frontier of space systems.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Healthcare Cybersecurity: A Global Imperative
Forbes
April 05, 2024
In 2023, healthcare cyberattacks had an impact on over 100 million people. Healthcare cybersecurity must become a global imperative.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Artificial Intelligence and the Growing Importance of Chief Digital Officers
Forbes
April 01, 2024
The current Chief Digital Officer role integrates artificial intelligence and automation capabilities with data sources to build analytics tiers.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Target Breach 10 Years Later
Security Infowatch
March 12, 2024
Just over 10 years have passed since Target Corporation's cyberattack, which may have compromised 70 million debit and credit cards. Of the 11 gigabytes of data leaked in the event, up to 70 million people's names, mailing addresses, phone numbers, email addresses, and credit card information were exposed. Nobody knew how it happened at the time, but it was the first of several business alerts about how susceptible their vendor networks were to insider threats and external hackers.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Grey Swans on the Horizon; AI, Cyber, Pandemics, and ET Scenarios
Forbes
February 29, 2024
Grey Swan events can include artificial intelligence, cyber, pandemics, and ET contact surprises.


See publication

Tags: AI, Cybersecurity, Emerging Technology, Security

2024 enterprise cybersecurity forecasts
Enterprise
January 29, 2024
In 2024, cyberattacks against vital infrastructure will likely increase in frequency and scale. Digital connectivity brought forth by the advancement of operational technology (OT) and the Industrial Internet of Things has further expanded the attack surface. Supply chains for IT, OT, and ICS in CI can be particularly vulnerable since they can cross-pollinate and give attackers several points of access. Furthermore, earlier Legacy OT systems were not designed to fend off hackers.

See publication

Tags: Cybersecurity, Security

Computational Capabilities That Will Transform the World
Forbes
January 22, 2024
Advanced computing, including supercomputing and quantum computing, has a fascinating and mind-blowing future. One day, computers might have sentience.

See publication

Tags: AI, Cybersecurity, Emerging Technology

Cybersecurity Awareness: Data Protection & Incident Response Strategies
Deltek
October 26, 2023
As the world of computing undergoes a dynamic transformation, driven by advancements in technology and evolving user demands, the unmistakable shift towards cloud and hybrid cloud environments has become a defining feature of this digital era. As businesses and government bodies of all sizes embark on this transition, ensuring the of sensitive data becomes a pressing concern.

See publication

Tags: Cybersecurity, Risk Management, Security

Cybersecurity Awareness: Risk Management, Malware and Phishing Strategies
Deltek
October 24, 2023
As we observe National Cybersecurity Awareness Month, there have been many significant changes in threats from the previous year. Because of the increase in connectivity over the past year, the surface of cyberattacks has gotten much worse. Remote work has made a significant contribution to this growth. Malware and hacker breaches into cyberspace have increased in tandem with the capability and connectedness of cyber devices. The ecosystem of cyber-threat actors has expanded in both magnitude and complexity.

See publication

Tags: Cybersecurity, Risk Management

Spooky Cyber Statistics And Trends You Need To Know
Forbes
October 20, 2023
In 2023, there have been numerous high-profile data breaches. All things considered, Halloween (and 2024) will bring with it a potent mixture of cyber-threats and trends.

See publication

Tags: Cybersecurity, Risk Management, Security

A Primer On Artificial Intelligence And Cybersecurity
Forbes
September 26, 2023
In simple terms, artificial intelligence acts as a powerful catalyst and enabler for cybersecurity in our connected ecosystem.

See publication

Tags: AI, Cybersecurity, Emerging Technology

GovCon: Topics in Cybersecurity, Emerging Tech and Strategy & Policy
Linkedln
September 10, 2023
Dear Readers, please find below a collection of articles (with links) to topics of GovCon. Special thanks for GovCon & Executive Mosaic for the forum for these published works. Thanks, and stay safe! Chuck Brooks

See publication

Tags: Cybersecurity, Emerging Technology

Artificial Intelligence: Transforming Healthcare, Cybersecurity, and Communications
Forbes
September 04, 2023
Machine learning and natural language processing are components of the advent of AI. They are transforming healthcare, cybersecurity, and communications.

See publication

Tags: AI, Cybersecurity, Emerging Technology

Thoughts on Trends in Cybersecurity, Tech, and Innovation -- Recent Interviews of Chuck Brooks
Linkedin
August 09, 2023
Sharing a few of my recent interviews on topics of cybersecurity, homeland security, emerging technologies, and innovation. Thanks for reading and sharing.

See publication

Tags: Cybersecurity, Risk Management, Security

Academia, Industry, And Government Can Create Innovative Partnerships And Help Secure Our Digital Future
Forbes
July 13, 2023
Connected technology tools can be stepping-stones to a new world in diverse areas such as genetic engineering, augmented reality, robotics, and renewable energies. But they need cyber protection.

See publication

Tags: AI, Cybersecurity, Innovation

My Dell Laptop Powered By Intel vPro Offers End To End Built-In Protection Against Advanced Cyber-Threats (Including AI)
Linkedin
June 12, 2023
It is quite a difficult time to operate any business in 2023. Aside from the uncertainties of industry markets, the expanding commercial digital ecosystem is facing an array of sophisticated cyber-threats from state actors and criminal hacker gangs. As we have transitioned from offices to hybrid and remote workplaces, every business and everyone’s computers have become a ripe target for attackers.

See publication

Tags: Cybersecurity, Risk Management, Security

SOCS And Corporate Cybersecurity Hubs Growing In Importance and Capabilities In New Threat Landscape
LinkedIn
May 04, 2023

See publication

Tags: Cybersecurity

Cybersecurity Trends & Statistics For 2023; What You Need To Know
Forbes
March 05, 2023
While cybersecurity capabilities and awareness seem to be improving, unfortunately the threat and sophistication of cyber-attacks are matching that progress.

See publication

Tags: AI, Cybersecurity, Innovation

Quantum Tech Needed To Secure Critical Data From Quantum Decryption
Forbes
January 19, 2023
The quantum computing decryption threat will be here soon enough, and it is time for businesses, organizations and governments to protect their data for that inevitability

See publication

Tags: AI, Cybersecurity, Quantum Computing

4 Mind-Boggling Technology Advances In Store For 2023
Forbes
December 13, 2022
2022 was a transformative year for technological innovation and digital transformation. The trend will continue as the pace of innovation and development of potentially disruptive emerging technologies exponentially increases every year. The question arises, what lies ahead for tech for us to learn and experience in 2023?

See publication

Tags: AI, Cybersecurity

Cybersecurity and Business Computing Performance -- Out of the Box for 2023!
Linkedin
December 07, 2022
As we approach 2023, I was excited to upgrade my home office computing capabilities with a Dell Latitude 5430 laptop fortified with the Intel vPro platform. Because of my role in running a consulting firm, teaching graduate courses at a prominent university, and my passion for globally evangelizing cybersecurity in public forums, this was an easy choice for me to make.

See publication

Tags: Cybersecurity, Security, National Security

A Cybersecurity Primer for The C-Suite, SMBS, and Organizations
LinkedIn
November 17, 2022
In this issue of Security & Tech Insights we explore strategies, policies, tools, and advice to better fortify cybersecurity for companies (and home offices).

See publication

Tags: Cybersecurity, Risk Management, Security, National Security

For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats
Forbes
October 02, 2022
As we begin Cybersecurity Awareness month, it is incumbent for all of us to be more wary than usual by the scary stats surrounding an increasingly sophisticated and lethal cyber threat landscape.

See publication

Tags: Cybersecurity, Risk Management, Security, National Security

The Search For Extraterrestrial Life, UFOS, And Our Future
Forbes
September 04, 2022
The question of whether we are alone in the universe has been pondered throughout human history.

See publication

Tags: AI, Emerging Technology

4 Author Newsletters
Cybersecurity of Space Systems
LinkedIn
February 24, 2024
Protecting the frontier of space systems is unquestionably a security priority for governments and industry. Due to our increasing reliance on space, and particularly satellites, for communications, security, intelligence, and business, satellite and space cybersecurity is becoming increasingly important in this new digital era.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Tech and Cyber Predictions For 2024
Linkedln
February 04, 2024
Welcome to the latest edition of Security & Tech Insights. In this newsletter, predictions on topics of cybersecurity, emerging computing, artificial intelligence, and space will be explored. Thanks for reading and sharing!

See publication

Tags: Cybersecurity, Emerging Technology, Security

Risk Management of the Emerging Tech and Security Landscapes for 2024
Linkedln
January 04, 2024
Risk mitigation in the cyber and emerging tech landscapes in 2024 will be a challenge as technologies become more sophisticated and interconnectivity grows. This edition of the newsletter explores some of those trends. Wising readers of Security & Tech Insights, and a very happy and safe 2024!

See publication

Tags: Cybersecurity, Emerging Technology

Cybersecurity Tips For The Holiday Shopping Season
Linkedln
December 09, 2023
Dear readers, welcome to another edition of Security & Tech Insights newsletter! Please find below several articles to help you become better cyber-secure during the holiday shopping season. Stay safe and have a great 2024!

See publication

Tags: Cybersecurity, Emerging Technology

1 Faculty Member
Designed and teaching course at Georgetown on Disruptive Technologies
George Town University
July 01, 2020
Chuck Brooks a globally recognized thought leader and evangelist for Cybersecurity. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to FORBES. He has also been featured author in technology and cybersecurity blogs by IBM, AT&T, Cylance, and many others.

See publication

Tags: Cybersecurity, Risk Management, Security

1 Founder
Brooks Consulting International
Brooks Consulting International
January 01, 2020
Founder at Brooks Consulting International

Brooks Consulting International is a Government Relations & Marketing firm providing Digital Branding & Subject Matter Expertise, Advise, & Thought Leadership

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

1 Industry Award
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award.
ONCON
July 08, 2019
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award. The list was selected by distinguished judges from Fortune 500 corporations and associations across the globe. The OnCon Icon Award recognize icons in the categories of marketing, human resources, and legal (corporate counsel). Nominees were voted on by leading professionals within each job function or industry to establish a true non-biased or non-conflicted winner.
Please vote for Chuck on at this site: https://www.onconferences.com/votemarketing
THANKS!

See publication

Tags: Innovation, GovTech, Marketing, Security

2 Influencer Awards
10 cybersecurity experts to follow on social media
Techtarget
October 17, 2023
Chuck Brooks is considered a thought leader in cybersecurity, information systems and emerging technologies. His contributions to cybersecurity can be found in conferences, university settings and well-known publications, such as The Washington Post, Homeland Security Today and Forbes. He has received many awards and recognitions for his work, underscoring his influence and effect on the field.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Top 30 Cybersecurity Experts You Should Follow In 2021
Cybersecurity Ventures
December 07, 2020
When we surround ourselves with individuals smarter than us, we can channel their talents for innovation and insights hoping for some to rub off on us. When I’m not writing and presenting on cybersecurity, I run a wireless security business so I feel fortunate to be able to cross-pollinate with many cybersecurity rock stars who also happen to possess great minds.

See publication

Tags: Cybersecurity, Leadership, Security

1 Infographic
Strategic Paths to Cybersecurity
LinkedIn
September 27, 2021
Strategic Paths to Cybersecurity - Infographic via Chuck Brooks

See publication

Tags: Cybersecurity, Security, National Security

1 Journal Publication
Cyber Startup Observatory -- Interview with Chuck Brooks
Cyber Startup Observatory
December 20, 2018
Interview with Chuck Brooks who iis the Principal Market Growth Strategist – Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. Chuck is also an Adjunct Faculty member at Georgetown University in their Applied Intelligence and Cybersecurity Programs. LinkedIn named Chuck as “a Top Tech Person To Follow” and he has been widely published on cybersecurity and emerging technology topics in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, Homeland Security Today (Visiting Editor), and many other publications. Chuck helped “stand up” Office of Legislative Affairs at the US Department of Homeland Security and served as first Director of Legislative Affairs at the DHS Science & Technology Directorate. He has an MA in International Relations from the University of Chicago and a BA in Political Science form DePauw University.

See publication

Tags: Cybersecurity, GovTech, International Relations

3 Keynotes
The Urgency of Protecting Critical Infrastructure from both digital and physical threats
Global Cybersecurity Association (GCA)
November 18, 2021
Protecting our critical infrastructure from both cyber and physical threats will be a
key challenge in 2021 and the years following as already evidenced by attacks on
pipelines, power, and water treatment plants. What are the most pressing
challenges and how can critical infrastructure be better protected from threats?

See publication

Tags: Cybersecurity, Leadership, Security

Real World Intelligence and Global Cybersecurity Threats
Cyber Risk Alliance
June 24, 2020
InfoSec World 2020 DIGITAL Keynote (with Former Top CIA Executive Mark Kelton).

See publication

Tags: Cybersecurity, Management, Security

Cybersecurity after COVID19
eventbrite
June 10, 2020
Global Security Connection Virtual Tradeshow & Exhibition Series

We have 3-day full agenda including:

45 mins Keynote Speaker sessions.

​30 mins SME Session webinars.

15 mins Vendors Tech Talks. ​

45 mins Brainstorming & Panel roundtable.

​15 mins breakdown sessions. Networking.

60 mins Workshop. Chat Lounge “peer-to-peer” Networking

Trivia moment (Raffles & Prizes)

Don't miss the opportunity to bring your experience and knowledge and share within our Global Community!

See publication

Tags: Cybersecurity, Emerging Technology, Security

17 Media Interviews
Accelerating Innovation, Security, & Education in the Digital Age August 24, 2023
Digital First Magazine
August 24, 2023
Recently, in an exclusive interview with Digital First Magazine, Chuck shared his insights on the future of cybersecurity landscape, his career trajectory, what sets Brooks Consulting International apart from other market competitors, the key qualities required to be a successful security leader, future plans, pearls of wisdom, and much more. The following excerpts are taken from the interview.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Why Is Cybersecurity at a Crossroads?
Secure World
December 20, 2021
At our most recent virtual conference, SecureWorld West Coast, Chuck Brooks presented the closing keynote, discussing why cybersecurity is at a crossroads as we head into 2022.

Here are some key thoughts from our fireside chat with Brooks.

See publication

Tags: Cybersecurity, Risk Management, Security

Renew cyber hygiene strategies for 2022
Cyber Series
December 06, 2021
We asked the leading cybersecurity expert – Chuck Brooks (one of the top 5 Cybersecurity Exec to Watch, top leader and influencer in “who’s who in cybersecurity“ named by Onalytica and top cybersecurity expert in Thinkers360) to throw some light on the significance of cyber hygiene.

See publication

Tags: AI, Cybersecurity, Security

Chuck Brooks - Cyber Insights for 2021
Buzzsprout
January 10, 2021
Chuck is a great guest to join us as we kick off 2021!

Chuck Brooks is a true "cyber influencer" who has managed to retire into fulltime career from Homeland Security into teaching at Georgetown University as well as writing for Forbes.

We discuss a wide variety of topics that pose a threat in 2021 to both enterprise as well as service providers. Multifactor authentication, threat actors, new cyber warfare environment, many different directions we could have taken with this one.

See publication

Tags: Cloud, Cybersecurity, Leadership

Chuck Brooks: Security by Design Needed to Safeguard Energy Infrastructure From Cyber Attacks
GocConWire
July 07, 2020
Chuck Brooks President Brooks Consulting
Chuck Brooks, a GovCon expert and president of Brooks Consulting International, virtually addressed the G20 forum Sunday, July 5, on energy systems cybersecurity during the Workshop on Energy Security and Markets Stability.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management, Security

AI, the Economy’s Backbone | Chuck Brooks | Engati Engage
Engati
June 17, 2020
In the current digital era, Chuck Brooks reveals that technology defines who we are and what we do and AI will be the backbone of the Economy. We also discuss the emergence of digital in Customer Service and the growth of the remote economy.

See publication

Tags: AI, Cybersecurity, Marketing

Thought Leader and Influencer Interview with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University
Thinkers360
June 09, 2020
Thinkers360 interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University.

See publication

Tags: Cybersecurity, Digital Transformation, Marketing

Security concerns with work from home?
Netsync
June 08, 2020
Watch Chuck Brooks, named one of the Top 5 Tech People to follow on LinkedIn, discuss with Netsync’s Mark Lynd ways to remain digitally safe during the COVID-19 pandemic. While many businesses, especially smaller ones, were caught off guard and unprepared for the rapid move to remote working, Chuck discusses ways to catch up and implement policies for employees working from home, especially relating to the use of WiFi.

See publication

Tags: COVID19, Cybersecurity, Emerging Technology

Former General Dynamics Exec Chuck Brooks Creates GovCon-Focused Consulting Firm
Executive Mosaic
May 20, 2020
Chuck Brooks, a more than three-decade professional in the government contracting industry, has established a firm focused on government relations and marketing named Brooks Consulting International where he will also serve as president.

See publication

Tags: Cybersecurity, GovTech, Business Strategy

Made for the Moment #6 - Data Infringement & Free Speech (ft. Cybersecurity Expert Chuck Brooks)
YouTube
April 29, 2020
Made for the Moment is a podcast by Jason Dodier of Alpha Struxure and Jaret Grossman of JARBLY discussing world events through unique topics of interest and interesting guests. Our guest today is Chuck Brooks is a global cybersecurity expert who is rated one of the Top 5 technology experts to follow on LinkedIn with over 59k followers and is also a Forbes contributor.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

YOURSELF READY for the DIGITAL ERA … 5th INDUSTRIAL REVOLUTION Interview of Chuck Brook
Global business news
January 26, 2020
5th INDUSTRIAL REVOLUTION

See publication

Tags: AI, Emerging Technology, Security

Joe Coughlin and Chuck Brooks discuss cyber security
YouTube
June 27, 2019
Recently at IndEx 2019, Joe Coughlin and Chuck Brooks got together to discuss cyber security. Joe is the CEO of Corporate Risk Solutions, a risk advisory firm. He spoke with Chuck, who is Principal Market Growth Strategist for General Dynamics Missions Systems. Find out more about recent developments in cybercrime that have experts worried, what companies are doing for their own cyber security, and much more in this interview.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

IFSEC Global Influencer Chuck Brooks Talks All Things Cyber Security
Cyber Security Hub
January 30, 2019
Cybersecurit: From private to public sector to emerging tech to talent crisis and more

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

The IFSEC 2 Global Cyber Security Influencer for 2018
Voice America
January 28, 2019
The Principal Market Growth Strategist for General Dynamics Mission Systems for Cybersecurity, and the IFSEC #2 Global Cyber Security Influencer for 2018, Mr. Chuck Brooks, joins Episode #69 of Task Force 7 Radio to talk all things Cyber Security. Brooks explains the challenges from transitioning from the public sector to the private sector, what his thoughts are on the militarization of cyber security, and the difference between roles in cyber security in the public sector vs. the private sector. Brooks also talks about how emerging threats are affecting businesses, how companies are combating the threats around IoT, Cloud, Mobile, and Third Party risks, and how new technologies being deployed as mitigating controls are introducing new threats into the environment. Brooks also gives his thoughts on the talent crisis and provides career advice to professionals seeking to enter the Cyber Security field.

See publication

Tags: Cybersecurity, Risk Management, Security

Chuck Brooks on Emerging Technologies
YouTube
October 25, 2018
I caught up with Chuck Brooks at the AT&T Business Summit in Dallas to talk about Emerging Technologies and what it means for cyber security.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

What keeps Chuck Brooks up at night?
YouTube
June 07, 2018
Each week from his Zero Day Studios, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. This week, Chuck Brooks offers an expert perspective.

Chuck Brooks is Principal Market Growth Strategist of Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. LinkedIn named Chuck Brooks as one of “The Top 5 Tech People to Follow on LinkedIn” out of their 550 million members. Chuck has served at The Department of Homeland Security as the first Legislative Director of The Science & Technology Directorate. Chuck is an Adjunct Faculty member at Georgetown University in their Applied Intelligence Program and has an MA in International relations from the University of Chicago and a BA in Political Science from DePauw University.

See publication

Tags: Cybersecurity, Emerging Technology, International Relations

New administration looks to DC for cyber innovation
Federal News Radio
May 12, 2017
The new administration has promised to focus on cybersecurity and artificial intelligence and will be looking to the Washington, D.C. region for new breakthroughs in technology.

See publication

Tags: Cybersecurity, Innovation

3 Panels
Balancing security + gov cloud innovation
Meetup
October 28, 2020
The proliferation of data combined with the speed of advancing technology bring complex challenges to government’s ability to protect itself from evolving cyberthreats while striving to accelerate cloud innovation.

See publication

Tags: Cloud, Cybersecurity, Innovation

Industry 4.0 and Cybersecurity 2.0 –- Opportunities & Challenges -- IIoT World Days.
IIoT World
August 17, 2020
The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.

In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.

See publication

Tags: Cybersecurity, IoT, Risk Management

TIC Consortium Panel: Emerging Tech for Hybrid Warfare
eventbrite
May 23, 2018
Come and join TIC Consortium in its second event in Old Town Alexandria on May 23rd at 2pm for a panel discussion about emerging technologies and considerations for hybrid warfare.
Wars of the future will only be more complex. Consider the following scenario: China pressures US firms to censor Chinese individuals. Meanwhile, the EU also wants hate speech removed in 24 hours. This is all while a California lawmaker argues that strong encryption online aids human trafficking.
What will all of these political and cultural pressures mean for the future of cyber defense and attack? What are the emerging technologies, ethical considerations and policy initiatives that should be pursued? How should companies be positioning and teaming in order to provide the best products and services for the next conflict?

See publication

Tags: Cybersecurity, Emerging Technology

97 Podcasts
BEC: Real Stories, Real Defense
Import from wordpress feed
December 07, 2021
Business Email Compromise (BEC) remains rampant, with annual losses in the billions of dollars. Every type of organization is at risk. During this episode, we discuss key things your organization and people should know about this cybercrime, plus the most effective way to respond in hopes of recover

See publication

Tags: Cybersecurity

A Cyber Mercenary Investigation
Import from wordpress feed
November 17, 2021
What is a cyber mercenary group and who are they attacking through cyberspace? In this episode, Feike Hacquebord, Sr. Threat Researcher at Trend Micro, reveals extensive details of a cyber mercenary group he has been tracking for more than a year, which he calls Void Balaur. "They target a lot of d

See publication

Tags: Cybersecurity

The Cybersecurity Talent Pipeline Problem
Import from wordpress feed
November 04, 2021
This discussion on the cybersecurity talent pipeline problem is unlike any other you have heard before. And you and your organization could play a part in growing the future of the cybersecurity workforce. We're talking with the founders of the Last Mile Education Fund: •  Rian Walker, Informatio

See publication

Tags: Cybersecurity, Education

Cybersecurity Brain Hacks and Big Ideas
Import from wordpress feed
October 27, 2021
Can brain hacks and cybersecurity habits improve the security posture at your organization? CISO George Finney of Southern Methodist University believes the answer is yes and he makes his case in this episode. Also, here's a big idea: cybersecurity doesn't slow down digital transformation, it speeds

See publication

Tags: Cybersecurity

Emergency Response Lessons for Cybersecurity
Import from wordpress feed
October 21, 2021
Andrew "AJ" Jarrett is Applied Cybersecurity Program Manager at the Cyber Readiness Center (CRC) and Texas A&M Engineering Extension Service (TEEX). He's been a wildland firefighter for more than a decade and believes Emergency Response frameworks that save lives can apply to cyber incident response

See publication

Tags: Cybersecurity

Cybersecurity Inflection Point?
Import from wordpress feed
October 13, 2021
Ed Cabrera is the former CISO of the United States Secret Service and current Chief Cybersecurity Officer at Trend Micro. He believes we are at an inflection point in cybersecurity and is cautiously optimistic. During this conversation with SecureWorld, Cabrera also discusses ransomware, cryptocurre

See publication

Tags: Cybersecurity

Cyber Resilience, the Game Show
Import from wordpress feed
October 07, 2021
In this SecureWorld Sessions podcast bonus episode, three Chief Information Security Officers play a game show around modern cyber resilience. What is cyber resiliency, how do you align it with business objectives, and is it possible a unicorn won this battle of the CISOs? Contestants include Ricard

See publication

Tags: Cybersecurity

Ransomware and the Secret Service
Import from wordpress feed
September 28, 2021
Our guest on this episode is Jeremy C. Sheridan, Assistant Director, Office of Investigations, at the United States Secret Service. We discuss the evolution of ransomware in cybercrime, including: advances in technology, cyber insurance, the cryptocurrency challenge, the sophistication of ransomware

See publication

Tags: Cybersecurity

Creating a Security Culture
Import from wordpress feed
September 09, 2021
Princeton University implemented a multi-year program to create a culture of cybersecurity throughout campus. It has already made an impact on the organizational security mindset, including risk reduction, implementing new technologies, broadening security knowledge, and strengthening campus partner

See publication

Tags: Cybersecurity

Nation-State Cyber Threats: What Now?
Import from wordpress feed
September 01, 2021
What can organizations, the U.S. government, and everyday citizens do to stop the surge of ransomware and cyber threats hitting us from overseas? In this episode, we hear from retired Air Force Colonel Cedric Leighton. Leighton is a CNN military analyst who held cyber leadership positions while serv

See publication

Tags: Cybersecurity

Suing the CISO
Import from wordpress feed
August 24, 2021
Are CISOs getting sued? Yes. Investors filed a lawsuit that specifically names the CISO of SolarWinds as a defendant. Is this the beginning of a trend to sue the Chief Information Security Officer after a cyber incident? #InfoSec twitter reacts, and so do the experts on today's podcast: Rebecca Rako

See publication

Tags: Cybersecurity

Season of Cybercrime: The Insider Threat
Import from wordpress feed
August 10, 2021
In this true cybercrime episode, we uncover the case of an insider threat scheme at an AT&T Wireless call center. Court documents reveal how rogue employees collected approximately $1 million in bribes. Plus, Dr. Larry Ponemon discusses the Insider Threat risk, and John Grimm discusses Insider Threa

See publication

Tags: Cybersecurity

Season of Cybercrime: Exploring the Dark Web
Import from wordpress feed
August 03, 2021
In this true cybercrime episode, we interview Myra Rosario-Fuentes, Senior Threat Researcher at Trend Micro, who just completed an in-depth, two-year research project on Dark Web markets, especially those selling exploits that hackers use to take advantage of security holes in networks and devices.

See publication

Tags: Cybersecurity

Season of Cybercrime: W.H.O. Cyberattack
Import from wordpress feed
July 20, 2021
In this true cybercrime podcast episode, we interview Alexander Urbelis, cyber attorney and threat intelligence expert, who uncovered a cyberattack against the World Health Organization at the start of the coronavirus pandemic. Resource Links: •  Trend Micro phishing and ransomware white paper: h

See publication

Tags: Cybersecurity

Season of Cybercrime: SeaWorld Cyberattack
Import from wordpress feed
July 13, 2021
In this true cybercrime episode, we interview Cam, who was arrested for hacking when he was 14 years old. One of his focused cyberattacks was against SeaWorld San Diego. Now, he works as a cybersecurity professional. How did he get into cybercrime and then into a role defending against it? It all st

See publication

Tags: Cybersecurity

Cybersecurity Workforce Development at Scale
Import from wordpress feed
June 29, 2021
How can we scale up the development of our collective cybersecurity talent pipeline, and what role can you play in this? How can your organization help develop talent? How can your alma mater or current university play a part in this? Hear about a model for this kind of work underway through partner

See publication

Tags: Cybersecurity

State CISO Discussion: Future of Security
Import from wordpress feed
June 22, 2021
Listen in as U.S. state cybersecurity leaders discuss key topics: •  coming year priority projects •  the ransomware surge and preparing for security incidents •  their organization's security culture and training to deal with issues •  innovative, special projects they are most excited

See publication

Tags: Cybersecurity

Ransomware Incident Response Lessons
Import from wordpress feed
June 15, 2021
Nancy Rainosek is the Chief Information Security Officer (CISO) for the State of Texas. She knows all about ransomware incident response. Her team played a key role in remediation after a coordinated ransomware attack hit 22 state agencies in Texas in a single day. 1. What was that ransomware day li

See publication

Tags: Cybersecurity

AI and Our Future
Import from wordpress feed
May 25, 2021
Josh Jackson is Founder and Executive Director of the AI Association, which advocates for the furtherance of artificial intelligence and automation in the United States. In this wide-ranging discussion about AI, Jackson unpacks the following: 1. How should we define artificial intelligence? 2. Where

See publication

Tags: Cybersecurity

Outlaw Ransomware Payments?
Import from wordpress feed
May 18, 2021
Shawn Tuma is a nationally known "breach quarterback" or "incident response coach" who walks victimized companies through the fallout of a ransomware attack. In this episode, he discusses the following: 1. What stages do organizations and security teams experience during a ransomware attack? 2. Woul

See publication

Tags: Cybersecurity

Operationalizing Your Cybersecurity Knowledge
Import from wordpress feed
May 11, 2021
Join a CISO panel for a fast-moving discussion around the following questions: 1. The state of cybersecurity: what can we understand from security's rise and the rise of the CISO? 2. What does the business need more of from security teams? And what about from security leaders? 3. Are InfoSec job pos

See publication

Tags: Cybersecurity

Refocusing on the Privacy and Security Landscape
Import from wordpress feed
May 04, 2021
2020 was a "blender" year, during which data privacy and cybersecurity seemingly took a backseat to the other major, pressing health and social issues. As more and more people are getting vaccinated and we reemerge into a world that looks a lot different (i.e. new laws and regulations, new threats,

See publication

Tags: Cybersecurity

Achieving Your Cybersecurity Career Goals
Import from wordpress feed
April 27, 2021
Are you "stuck" somewhere along your cybersecurity career path? Are you planning to pursue your InfoSec career goals "someday" down the road? Belinda Enoma has a cybersecurity and privacy background, and she's a Certified Information Privacy Professional (CIPP) in the U.S. She is also a career advic

See publication

Tags: Cybersecurity

Myth Busting: IAM in Multi-Cloud
Import from wordpress feed
April 20, 2021
In this episode, Michael Meyer, Chief Risk Officer and Chief Innovation Officer at MRS BPO, exposes three crucial myths around IAM in cloud, especially a multi-cloud environment. Are you believing the myths that stand in the way of properly implementing IAM (Identity and Access Management) in your c

See publication

Tags: Cybersecurity

Resilience in Cybersecurity
Import from wordpress feed
April 13, 2021
In this episode, Mark Eggleston, Vice President and CISO/CPO of Health Partners Plans, speaks with security leaders about cyber resiliency, the return to the workplace, combatting nation-state cyber threats, pandemic lessons that can fuel digital innovation, and mental health in cybersecurity. Panel

See publication

Tags: Cybersecurity

1 Speaking Engagement
Chuck Brooks Discusses All Things Cybersecurity
Made For the Moment Podcast
June 09, 2020
Podcast

See publication

Tags: Cybersecurity, Emerging Technology, Security

5 Webinars
Seyfarth and NY Metro InfraGard Present: Lunch with America’s Cybersecurity Influencers
Seyfarth
October 06, 2021
Join Seyfarth and NY Metro InfraGard on Wednesday October 6th, 2021 at 1 pm ET for an exclusive presentation on the importance of carrying out the cybersecurity basics, an often overlooked yet critical issue required to strength your cybersecurity posture and resiliency. Despite some well-meaning intentions from both government and the private sector, attacks continue to cause havoc in America on a daily basis, whether through malware, ransomware, social engineering, or a combination of all the above. Join some of the most important cyber and information security influencers on the Internet today on how carrying out the cybersecurity basics can make a significant difference in securing your organization and strengthening our country. We look forward to your participation.

See publication

Tags: Cybersecurity, Management, Leadership

RaCE: Resilience and Collaboration Extended
Al-Iktissad Wal-Aamal Group
February 03, 2021
The UAE Banks Federation and Al-Iktissad Wal-Aamal CO. are organizing RaCE, a 2-day Cybersecurity webinar on the 3rd & 4th of February 2021, focusing on best practices in data privacy and protection as businesses shift to a hybrid working environment.

Remote working has added further challenges to cybersecurity teams who are facing an increase in the frequency and intensity of cyber-attacks targeting remote workers and customers alike. Ensuring that employees and clients are well informed and protected against such attacks has become a primary requirement to maintain data protection and prevent losses.

As such, the webinar will discuss:

Protecting Data in an Era of Increased Cyber Risk
Data Privacy in a Complex Regulatory Framework
Cyber threats; The Dark Side\drawbacks of Digital Transformation
Managing a Cyber Pandemic
RaCE will bring together renowned cybersecurity experts from the UAE and abroad to present trending cyber-attacks in the financial sector and means of maintaining cyber-immunity against them.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

2020 Cyber Innovators Summit
The Cyber Institute
October 30, 2020
The Cyber Institute has gathered together some of the brightest minds in cybersecurity to discuss (virtually) the dynamic challenges of infosec, new approaches towards structuring security infrastructures, and predictions for this upcoming decade. Join leaders of SentinelOne, McAfee, Norwest, Check Point, and other innovators during this forum. The 2020 Summit has been sponsored by Active Cypher, developer of file-centric protection against malicious and unintentional data loss.

Session 8 (3:00 PM PST): Future Threat Panel - Ashwin Ram, Mathew Rosenquist, & Chuck Brooks.
Our speakers will discuss future threats on the horizon and effective responses they see. IT organizations are far too often worried about protecting against yesterday's vulnerability and not focusing on future.

See publication

Tags: Cybersecurity, Management, Leadership

October Cyber Bytes Networking Event: Election Security
Cyber Bytes Foundation
October 29, 2020
Join us for our next Cyber Bytes Networking Event on Election Security. The virtual event is set to take place on Thursday, October 29, 2020 at 3 pm. Register today.

See publication

Tags: Cybersecurity, Management, Leadership

CISO's View: Emerging Technologies Impacting the IAM Landscape
CyberEd.io
June 23, 2020
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies that impact Identity and Access Management that can help us navigate the increasingly malicious cyber threat landscape. Join cybersecurity thought leader Chuck Brooks for an overview of these cutting-edge technologies, including:

AL/ML
Big Data: Real-time Analytics and Predictive Analytics
Biometrics and Authentication Technologies

See publication

Tags: Cybersecurity, Emerging Technology, GovTech, Risk Management

Thinkers360 Credentials

23 Badges

Blog

2 Article/Blogs
Social Media Platforms Are Helping Shape Business Success
Thinkers360
October 18, 2021

Social media has transformed the way people interact and conduct business both in the public and private sector. The Covid19 pandemic, combined economic factors, have led to the emergence of remote work and hybrid environments and different ways of doing commerce. The move away from business lunches, live events, and meetings has propelled digital platforms into becoming a main fulcrum for communications and branding. Those social platforms have especially impacted components of business development, sales, government relations, and marketing and are helping shape pathways to success.

Many users enjoy social mediums because they control the content, and it is non-invasive. Also, it can be perpetually shared. Social media has become a platform to communicate who we are and what we do. Platforms such as LinkedIn, Twitter, and Instagram, have now become a daily means for sharing content, building networks, and reaching targeted markets. Thought leadership on meaningful topics is of timely interest to everyone and the use of subject matter experts and influencers have become a primary means for brand amplification via articles, blogs, podcasts, and online events.

Today, most senior-level executives on both the public and private sectors have LinkedIn profiles, including administrators, CEOs, CTO, CIOS and their numbers are increasing. They often use it as a conduit for 1) Branding 2) Socializing/Networking; 2) Basic Intelligence; 3) Events: and 4) Strategic Partnering/Marketing.

Branding:  the trend of digital brand amplification began to grow at the beginning of the outset of the pandemic. Because of the lack of in person meetings, many companies, new & old, large & small, sought to be more visible and recognized for the unique viability for branding on social media platforms. Companies were and are seeking quality and interesting content that helps enable them to be able to connect with peers and clients. A benefit of social media digital marketing and brand amplification is that it can be very cost-effective, repetitive, and can generate revenue and build positive reputations. A good written message, video or graphic can have a long shelf-life and be shared widely across various social media platforms. Influencers have also become part of the branding mix; expertise bring credibility and attention and many companies have expanded strategies that use influencers and thought leaders who can augment company marketing and sales.

Socializing/networking: social media is in its essence “social.” It is an outlet for networking and connecting with people who share your interests, goals, and professional paths.  A platform like LinkedIn, Facebook, Instagram, and Twitter are useful for reconnecting to people you have worked with in past jobs, friends, and alumni of universities, and colleges. In particular, the service encourages you to join professional and hobby interest groups where you can post articles and engage in discussion with group members. I am a big proponent of LinkedIn for networking where I have over 73,000 followers, especially with targeted groups. For example, I have management roles in several of the largest and most influential homeland security groups on LinkedIn. Another key area of group ownership and involvement for me on LinkedIn is with cybersecurity and emerging technology groups where I find the readership are exceptionally informed and active. Also, as a “foodie”, I created the “DC Foodies” LinkedIn group to reach out to others in the greater Washington, DC area that may have a passion for food, wine, and restaurants. On LinkedIn there is a group for almost every subject from healthcare, governing, martial arts, Space, to quantum physics.

Basic Intelligence: Another function of social media is that it provides you with working biographies of members. Whenever I have a meeting with someone new, I can usually find their profile on LinkedIn and see where they worked, what schools they attended and who we know in common. Also, by following the posts in groups, I can view the latest news from a variety of sources on a topic of interest. Also, almost all federal agencies and public entities have their own profiles (and often groups) on LinkedIn that make the basic intel process quick and easy.

Events: There is no better place to go to find out who is hosting what than on social media. This includes LinkedIn, Twitter, Instagram, Facebook in the event domain. Since most publications are intertwined between print and digital media, social media outlets are a fulcrum for seeing what activities are happening in personal or business areas of interest daily.

Strategic Partnering/Marketing: social media is really the Holy Grail for strategic partnering and marketing. Messaging is immediate, perpetual, and cost-effective. It is also much targeted and will allow you to focus communications to audiences, both individual and groups that may have an interest in your offerings and services. For those who are specifically focused on the federal market, LinkedIn is an especially good resource for finding teaming members and potentially partners to pursue opportunities. By being active on LinkedIn, companies can often find you and reach out for help in areas that may be mutually beneficial. As government encourages diverse and multiple partners to work together on programs, the importance of having a strong stable of networked partners is becoming more of a premium.

We are still only in the early era of social media. It will continue to grow and be fused into all aspects of our lives, especially with the growth of augmented reality and emerging communication technologies. Social media vehicles like LinkedIn already have great utility in the workplace both in the corporate world and in government. Linked and other social media platforms are already shaping communications. “Linking in” and being active on social media platforms have become more of an imperative than a choice for those who want to thrive in a digital world. 

 

Chuck Brooks, President of Brooks Consulting International, and Adjunct Faculty at Georgetown University, is a Technology Evangelist, Corporate Executive, Speaker, Writer, Government Relations, Business Development, and Marketing Executive. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated, as a “Top 50 Global Influencer in Risk, Compliance,” by Thomson Reuters, “Best of The Word in Security” by CISO Platform, and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was also named “Best in The World in Security” by CISO Platform, one of the “Top 5 Executives to Follow on Cybersecurity” by Executive Mosaic, and as a “Top Leader in Cybersecurity and Emerging Technologies” by Thinkers360. Chuck was named by Oncon in 2019 “Top Global Top 50 Marketer” by his peers across industry. 

Chuck also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. He is a featured contributor to Thinkers360

See blog

Tags: Social, Marketing, Business Strategy

“Innovation Foraging” on Social Digital Mediums
Thinkers360
May 17, 2021

In the science, technology worlds, there is a category referred to as “technology foraging,” or the searching for smart ideas and emerging technologies that may exist already in research institutions of found in patents to fill gaps and offer new solutions.  Technology foraging has been an engine for the technological transformation now taking place in society.  It has served as a catalyst for discoveries of many products brought to the marketplace.

The foraging process is often conducted in research centers by national labs, universities, and in government & corporate innovation hubs. It has expanded commensurately with the rapid pace of innovation in our new era of exponential digital transformation where humans and computing devices are intertwined, and data is more accessible. Please see my article Technology Foraging for Cybersecurity Solutions Technology Foraging for Cybersecurity Solutions | AT&T Cybersecurity (att.com)                                                                                                                 

Digital transformation combined with tech foraging of the 4th Industrial Era has led to significant jumps in innovation of technologies. This includes, for example, emerging tech such as big data, artificial intelligence, IoT, smart cities, 5G wireless, virtual & augmented reality, nanotechnologies, robotics, self-driving cars, 3-D Printing, cybersecurity, quantum computing, predictive data analytics, Biometrics and wearables, self-healing materials, bioinformatics, genetic engineering, and a new world of medical applications. 

The digital transformation It has also impacted communication mediums, especially social media where research, ideas, analyses, and opinions are cultivated by open sharing and interaction. The networking and information sharing on digital mediums can be viewed as a foraging process. The pace of digital expansion and change is happening so rapidly that it can be quite overwhelming just to try to keep up.  But social media does offer a pathway to do so via innovation foraging and collaborative information sharing.

For example, my career passion revolves around searching and reading about topics in cybersecurity. Using social media, I can keep abreast of the latest news and events. A case in point is the recent Colonial Pipeline breach. Almost immediately after happened, detailed descriptions of the breach and surrounding issues such as ransomware were posted on LinkedIn, Twitter, and other digital mediums. There was a potpourri of expert perspectives available, including posts on technical analyses, and posts on geopolitical and economic implications. Forging through posts you can also develop your own knowledge to explore remedies and policy frameworks that may apply digital impact to your own professional or business circumstances.

From my perspective as cyber security & technology strategist, the extensive resources of LinkedIn combined with their supporting analytics provides a great platform to communicate, educate and promote. For me, LinkedIn groups, including the dozen groups I created, serve as the most optimal social media digital offerings for foraging. Research on LinkedIn is significantly amplified by the myriad of specialized information security LinkedIn groups that I can pull insightful and timely data from on a regular basis. 

Several years back I wrote an article for LinkedIn called Why LinkedIn is an Indispensable Medium for Security Professionals Why LinkedIn is an Indispensable Medium for Security Professionals | LinkedIn Marketing Blog  In that blog I noted that” LinkedIn has become part of the fabric of how I (and a majority of my peers) communicate, operate, and conduct business. For me, LinkedIn groups serve as interactive, informative forums. Many of the members in my groups are security professionals who have important roles in government or industry, including CISOS, CIOs, CTOs, or members of the C-Suite who possess deep subject matter knowledge.” I also stated that for thought leadership on homeland security and cybersecurity issues, that “LinkedIn is a real force for digital influence. It is an effective platform for educating, evangelizing, and promoting discussion of the cutting risk management issues.”

The value of LinkedIn for evangelism and marketing goes far beyond immediate connections.  The extensive resources of LinkedIn combined with the intrinsic marketing capabilities based upon intelligence analytics provides a ready platform to communicate, educate and promote. In my major areas of interest, cybersecurity and emerging tech, I am very active in interchange of news and innovative ideas with groups, and also with my 70,000 direct follower connections. It facilitates keeping up with cybersecurity and emerging technology trends that I can share with others across digital media.

With 18 years under its belt and a membership globally of over 800,000 users, LinkedIn has become increasingly valuable as a forging resource and influence platform for branding people and companies. Twitter offers good avenues for networking, and often is starting point for interesting links that spur more foraging on other media sites. Both platforms offer users measurable metrics to track effectiveness of content and interactions.

For employees at a company or organization, foraging (and info sharing) on digital mediums as a corporate strategy can help drive collaboration between often aloof silos comprised of the c-suite, marketing, legal, and sales. A social media platform can also foster company awareness & relationship, cultivate business networks, and can even be used as a research tool for due diligence. For both companies and individuals, social digital platforms can serve as a resource and enabler for innovation by sharing important data derived from foraging among informative posts. 

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. 

Chuck Brooks LinkedIn Profile:    https://www.linkedin.com/in/chuckbrooks/

Chuck Brooks on Twitter:   @ChuckDBrooks

See blog

Tags: Cybersecurity, Digital Transformation, Innovation

Opportunities

1 Social Media
Brooks Consulting International

Location: Washington, DC    Date Available: September 30th, 2020     Fees: Negotiable

Submission Date: September 29th, 2020     Service Type: Service Offered

Social Media Marketing · Marketing Consulting · Digital Marketing · Cybersecurity · Content Strategy · Brand Consulting · Business Consulting · Blogging · Project Management · Public Speaking

Respond to this opportunity

Contact Chuck Brooks

Book Chuck Brooks for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Chuck Brooks


Latest Activity

Latest Opportunities