Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Chuck Brooks

President at Brooks Consulting International

Washington, D.C., United States

NAMED BY THOMSON REUTERS AS A “TOP 50 SOCIAL INFLUENCER IN RISK, COMPLIANCE.” NAMED BY IFSEC “#2 GLOBAL CYBERSECURITY INFLUENCER. TWO-TIME PRESIDENTIAL APPOINTEE. CORPORATE EXECUTIVE ROLES; GENERAL DYNAMICS, XEROX, SRA, RAPISCAN. THOUGHT LEADER, INFLUENCER, BRAND AMBASSADOR. 62k LINKEDIN FOLLOWERS, 12k TWITTER, 5k FACEBOOK. LEADERSHIP IN GOVERNMENT RELATIONS, MARKETING, BUSINESS DEVELOPMENT, AND STRATEGY

*Named Top Person To Follow on Tech by LinkedIn. Thought Leader, Influencer, Brand Ambassador.
*Adjunct Faculty at Georgetown University. Former Adjunct Faculty Johns Hopkins
* Marketing, Government Relations, Business Development, Strategic Partnerships, Corporate Growth Strategist
* Blogger and event speaker for AT&T, IBM, Blackberry/Cylance, Xerox, General Dynamics, Tripwire, others
*Received Presidential Appointments for Executive Service by two U.S. Presidents
*Helped "stand up" Office of Legislative at DHS. Served as first Director of Legislative Affairs at the DHS Science & Technology Directorate
*Served as Senior Legislative Staff (foreign affairs, security, tech) to Senator Arlen Specter, U.S. Senate
*Named Cybersecurity Marketer of the Year and Top Cybersecurity SME to Follow
* Contributor to FORBES on Technology and Cybersecurity topics
* Former Technology Partner Advisor at Bill and Melinda Gates Foundation
*EC-Council Global Advisory Board
* MIT Technology Review Advisory Panelist
* Cyber Start Up Observatory Hall of Fame
* Program Chair Quantum Security Alliance
* Judge Homeland Security Awards
* Advisory Boards (Cybersecurity, Emerging Technology, Risk Management)
* Project Management, and Marketing Certifications
* Former Auxiliary Police Officer
* Former competive powerlifter

THOUGHT LEADER, INFLUENCER, TECHNOLOGY EVANGELIST; Featured Writer/Speaker/Blogger: areas: homeland security, cyber security, CBRNE, artificial intelligence (AI), Internet of Things (IoT), science & technology, public/private partnerships, Risk Management, blockchain, innovation. Published in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov, Government Security News, Cygnus Security Media, Homeland Security Today (Visiting Editor), The Hill, Biometric Update, Bizcatalyst360, IT Security Planet, Christian Science Monitor. Published 180 + articles *

INDUSTRY EXECUTIVE: former Vice President for Homeland Security, Xerox; Former Vice President of Government Relations, SRA; Former Vice President R&D Rapiscan

* Co-leader of two top Homeland Security Groups on LinkedIn. Run 15 other business, tech LI groups

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Washington,DC

Chuck Brooks Points
Academic 55
Author 501
Influencer 976
Speaker 51
Entrepreneur 25
Total 1608

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Cybersecurity, Homeland Security,
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: 1-10
Company Founded Date: Undisclosed
Media Experience: 20 plus years
Last Media Interview: 07/02/2020

Areas of Expertise

5G 30.05
Agile 30.03
AI 30.62
Analytics 30.13
AR/VR 30.22
Big Data 30.10
Blockchain
Business Strategy 30.27
Change Management
Cloud 30.45
COVID19 32.95
Cryptocurrency 30.13
Customer Experience 30.01
Cybersecurity 47.92
Data Center 30.17
Digital Disruption 30.19
Digital Transformation 30.27
Ecosystems 30.29
EdTech 30.07
Emerging Technology 37.70
Entrepreneurship
ERP 30.02
GovTech 32.07
Health and Safety 30.26
Innovation 31.36
International Relations 30.90
IoT 30.38
Leadership 30.77
Legal and IP 30.18
Management 31.58
Marketing 30.18
Mergers and Acquisitions 30.15
Mobility
National Security 31.76
Open Innovation
Predictive Analytics 30.01
Privacy 32.70
Quantum Computing 37.32
Risk Management 34.35
Sales 30.10
Security 38.94
Smart Cities 30.31
Social 30.11
Startups
Supply Chain 30.37
Sustainability 30.08

Industry Experience

Aerospace & Defense
Federal & Public Sector
Healthcare
High Tech & Electronics
Higher Education & Research
Hospitality
Media
Oil & Gas
Professional Services
Telecommunications
Utilities

Publications & Experience

1 Academic Certification
Selected Chair of Quantum Impacts on the Internet of Things by the Quantum Security Alliance
Quantum Security Alliance
December 18, 2018
Selected Chair of Quantum Impacts on the Internet of Things by the Quantum Security Alliance

See publication

Tags: IoT, Management, Leadership

1 Adjunct Professor
Disruptive Tech & Org Change
Georgetown University
August 26, 2020
This course explores the impact of disruptive technological innovation on organizations and their ability to adapt to change. More precisely, students learn how to detect and anticipate disruptive technologies and their potential impact on organizational culture, processes, and strategies. The course places an emphasis on understanding organizational values, processes, resources, and migration capabilities. Upon completion of the course, students will be able to identify and apply sustainable solutions to accommodate disruptive innovations and capabilities to cope with organizational and industry changes.
Course #: MPCR-600-01
CRN: 38191
Format: On-campus
Instructor: Brooks, C.
Dates: Aug 26 – Dec 18, 2020
Class Meetings:
Mon 5:20 PM - 7:50 PM, Online, Room REMOTE

See publication

Tags: Cybersecurity, Innovation, Quantum Computing

189 Article/Blogs
Technological Disruption: Strategic Inflection Points From 2026 - 2036
Forbes
December 26, 2025
The forthcoming decade will not only prolong current technological trends; it will transform the foundational institutions that regulate security, trade, and societal trust. From 2026 to 2036, the amalgamation of artificial intelligence, quantum science, ubiquitous connectivity, and cyber-physical integration will radically transform national defense, enterprise risk management, and individual interactions with digital and physical surroundings.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Securing the Convergence Era: Why Cyber, AI, and Critical Infrastructure Are Now Interdependent Risks
GOVCONWIRE
December 03, 2025
Federal agencies and their industry counterparts are moving at a breakneck pace to modernize in this fast-changing digital world. Artificial intelligence, automation, behavioral analytics, and autonomous decision systems have become integral to mission-critical operations. This includes everything from managing energy and securing borders to delivering healthcare, supporting defense logistics, and verifying identities. These technologies are undeniably enhancing capabilities. However, they are also subtly altering the landscape of risk.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Cybersecurity, AI, Security, Emerging Tech—Trends on the Horizon
Linkedin
December 01, 2025
The Essential Role of Trust In this era of swift technological progress, where AI, automation, and behavioral analytics are becoming the norm in safeguarding critical systems. A guiding lesson from experience and statistics still resonates that trust is the most potent weapon in cybersecurity, and human judgment is its Achilles' heel.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Thriving In The Emerging Digital Era: Guidance For Career Readiness
Forbes
November 28, 2025
We are experiencing one of the most transformative moments in human history. The combination of artificial intelligence, quantum technologies, cybersecurity, automation, and immersive digital environments is transforming every industry, from banking and transportation to healthcare, national security, and education. This event is more than simply a technology disruption; it is a societal transformation.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Genesis Mission To Harness AI For Innovation And Security
Forbes
November 25, 2025
This Genesis Mission is a bold strategic move that treats science, data, and computing as essential parts of our national strength, not optional extras


See publication

Tags: Cybersecurity, Emerging Technology, Security

Trust, Technology And Human Factors—The Foundation Of Cyber Resilience
Forbes
November 23, 2025
There is a need for increased Trust in this era of swift technological progress, where AI, automation, and deepfakes are threatening the cybersecurity landscape


See publication

Tags: Cybersecurity, Emerging Technology, ERP, Security

From Generative To Agentic: The New Era Of AI Autonomy In 2026
Forbes
November 21, 2025
Agentic AI is a form of artificial intelligence that does more than just generate; it will act, reason somewhat, collaborate, and execute on its own. Agentic AI transforms its role from a limited tool to that of a collaborative coworker.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Inside the F5 Breach: How One Layer-3 Platform Could Have Closed the Door
Linkedin
October 19, 2025
Recently, CISA ordered federal agencies to promptly patch their affected F5 products and disconnect the devices’ management interfaces from the internet. Over 269,000 F5 devices were found to be exposed online after the breach. This is only the latest incursion into public sector networks. The threat landscape for federal agencies is expanding daily as more systems migrate to public clouds and workforces transition to remote/telework models.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Rise Of AI-Powered Ransomware: The Need To Adapt
Forbes
September 29, 2025
Ransomware has always been more than a technical risk—it’s a business, a weapon, and a psychological warfare tool. In my previous Forbes article titled “Ransomware on a Rampage; a New Wake-Up Call,” I argued that ransomware was already evolving into a systemic threat, not just isolated incidents.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Healthcare Cybersecurity: The Urgency Of Now
Forbes
September 23, 2025
Healthcare exists at the intersection of trust and vulnerability. Every medical record, test result, and insurance claim is more than just data on a computer; it represents a person's identity, medical history, and, in many cases, the road to care. For years, I've warned in papers and briefings that the healthcare sector is particularly vulnerable.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Securing The Future: Addressing Cybersecurity Challenges In Smart Cities
Forbes
September 19, 2025
The notion of a "smart city" has progressed from a futuristic vision to a realistic reality. Sensors, linked infrastructure, data analytics, and artificial intelligence are transforming urban landscapes worldwide, promising efficiency, sustainability, and increased quality of life. However, although smart cities provide incredible benefits, they also provide hitherto unknown risks. As cities evolve into digital creatures, cybersecurity becomes a need rather than an option.

See publication

Tags: Cybersecurity, Emerging Technology, Security

A Cybersecurity Cheat Sheet: 10 Steps For Businesses To Follow
Forbes
August 30, 2025
Cybersecurity is no longer just an IT problem—it’s a business survival issue. From ransomware attacks that can cripple supply chains to sophisticated nation-state campaigns targeting critical infrastructure, the threats facing companies today are pervasive, costly, and constantly evolving.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Coming Inflection Point For Quantum Technology
Forbes
August 29, 2025
In today’s world, quantum technology is no longer a far-off concept that is just a theoretical physics concept. In the not-too-distant future, it will become a disruptive force that has the capacity to rethink computers, cybersecurity, and data analytics as conventionally understood. Quantum innovation will stimulate revolution across sectors, from healthcare and finance to logistics and national security. It will bring new capabilities while posing hazards that have never been seen before.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Artificial Intelligence and the Next Great Transformation
Forbes
August 22, 2025
Transformative technologies have had a profound impact on civilization over the course of human history. The steam engine was the progenitor of the first industrial revolution, followed by the invention of electricity and the third was the advent of digital computers. We are on the verge of the fourth era, the age of AI.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Artificial Intelligence Is Transforming World Of Coding With A New Vibe
Forbes
August 22, 2025
Artificial intelligence is significantly impacting many areas of industry, including software development. AI coding agents are changing the software development landscape by automating tasks, accelerating development, and assisting with complex problem-solving.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Growing Impact Of AI And Quantum On Cybersecurity
Forbes
July 31, 2025
In mid-2025, we are entering the early stages of a new age of digital transformation where networked technologies that combine engineering, computer algorithms, and culture are becoming impactful on a global scale. The upcoming digital revolution and technological convergence will drastically affect our patterns of living, working, and networking in the near future.

See publication

Tags: Cybersecurity, Emerging Technology, Security

A Cybersecurity Primer For Businesses In 2025
Linkedln
July 13, 2025
Understanding the fundamentals of cybersecurity is increasingly important in our digital age. Cybersecurity, at its core, involves protecting computer systems, networks, and data from attacks, damage, or unauthorized access.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Criminal Hackers Are Employing AI To Facilitate Identity Theft
Forbes
July 06, 2025
Identity theft refers to the illicit acquisition and utilization of an individual's private identifying information, typically for financial benefit, and it constitutes an escalating global issue. The sophistication and expertise of cybercriminals have escalated in their intrusions that are putting identities at risk.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Surging Investments in AI Are Transforming Cybersecurity
Forbes
June 27, 2025
AI is transforming cybersecurity, and investments are following in close concert with those trends. AI systems seek to replicate human traits and computational capabilities in a machine and surpass human limitations and speed. Elements of AI emergence consist of machine learning and natural language processing. Today, AI can understand, diagnose, and solve problems from both structured and unstructured data—and in some cases, without being specifically programmed.

See publication

Tags: Cybersecurity, Emerging Technology, Security

How Drone, 5G, And AI Technologies Are Enabling First Responders
Forbes
June 17, 2025
First responders are special people. They often risk their lives to save people who might not otherwise have encountered them. They include members of the Coast Guard, emergency medical technicians, firefighters, law enforcement, and the military. These leaders need our support and the latest technology to carry out their responsibilities. The capabilities of drones, 5G, and artificial intelligence (AI) are significantly making a difference in their ability to succeed at their jobs.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Public-Private Sector Partnerships For Space Systems Innovation And Security
Forbes
May 28, 2025
Space is a growing commercial critical infrastructure sector dependent on both public and private resources and expertise. Public-private cooperation is essential to the successful growth and secure operations of the space sector.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Growing Cyberthreats To The Internet Of Things
Forbes
May 18, 2025
Among the most significant cybersecurity threats this year comes via the Internet of Things (IoT), and they are increasingly becoming more sophisticated and targeted. Proactive cybersecurity is needed to address vulnerabilities in the growing connectivity of both the digital and physical ecosystems constituting IoT.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Rise of the Humanoid Robotic Machines Is Nearing
Forbes
May 07, 2025
The rise of the humanoid robotic machines is nearing. Robotics is now revolutionizing numerous industry sectors through the integration of artificial intelligence, machine learning and reinforcement learning, as well as advances in computer vision that empower robots to make complicated judgments.

See publication

Tags: Cybersecurity, Emerging Technology, Security

SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators
Forbes
April 29, 2025
Modern software is created using code fragments and methods from various sources, including open source and commercial solutions. The software components and dependencies of an application are detailed in a tool known as a Software Bill of Materials (SBOM) (NTIA, 2021). An SBOM is essential for managing and understanding the complexities of contemporary software supply chains and can be compared to an ingredient list on a food product label. A software package and its contents are uniquely identified by an SBOM, which is formal, machine-readable metadata that may also contain information on the software package's contents, such as copyrights and license information.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Meshing Of Minds And Machines Has Arrived
Forbes
April 20, 2025
Examining the mesh between humans and machines provides insight into the future. Science is already making significant progress in the development of brain/computer interface technologies, such as brain mapping and neuromorphic circuits.

See publication

Tags: Cybersecurity, Emerging Technology, Security

16 Author Newsletters
2026 - Trends and Insights on Cybersecurity, Artificial Intelligence, and Quantum Computing
Linkedin
January 12, 2026
2026 is a pivotal juncture for cybersecurity. What was once considered an operational safety net and a business cost item is now a determinant of long-term competitiveness, market confidence, and organizational resilience. The data unequivocally indicates that cyber danger is systemic rather than episodic.

See publication

Tags: Cybersecurity, Emerging Technology, Security

2026 Technology and Cybersecurity Predictions
Linkedin
November 06, 2025
We are entering a time of hyper-innovation and hyper-risk. The year 2026 will be defined by acceleration — in artificial intelligence, quantum computing, IoT, biotechnology, and connected infrastructure.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Cyber-Securing the Connected Worlds of the Internet of Things, Smart Cities, and Space
Linkedin
November 02, 2025
The Internet of Things is no longer a fringe technology. Sensors, cameras, medical devices, industrial controllers, smart meters, and connected vehicles are now integral to how we live, work, and defend our nations. IoT promises enormous economic and social benefits—greater efficiency, new services, improved public safety—but it also vastly expands the attack surface for cyber adversaries.

See publication

Tags: Cybersecurity, Emerging Technology, Security

The Mini MBA in Customer Experience Management | Open Day - book your place
Linkedln
July 25, 2025
We will run through the course programme, share the format and explore some of the modules. You will get to meet the course creators and ask questions.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Risk Management and the Potential of Gray Swan and Black Swan Occurrences
Linkedln
June 06, 2025
Dear Friends and Colleagues, in this issue of the Security and Tech Insights newsletter, I focus on the risk management of expecting the unexpected. The focus of this issue is on potential Black and Gray Swan events. I also delve into protecting space systems and the energy grid, as the threats are existential. Thanks for reading and sharing! Best, Chuck Brooks

See publication

Tags: Cybersecurity, Emerging Technology, Security

Some Easy Steps for Business Cybersecurity Preparedness in 2025
Linkedln
March 11, 2025
Businesses of all sizes, whether in the financial, transportation, retail, communications, entertainment, healthcare, or energy sectors, are impacted by cybersecurity. Cyberthreats are commonplace. Cyberattacks have increased in frequency and maliciousness, including ransomware, phishing, and distributed denial of service attacks against networks. Growing cyberthreats to business operations, reputation, and intellectual property theft can impact a company's viability in addition to its stock price.

See publication

Tags: EdTech, Marketing, Sales

Protecting Payments Via Compliance, Cybersecurity and Awareness
Linkedln
December 09, 2024
Thank you for joining us, Ed. PCI DSS v4.0 brings a lot of changes, with requirements 6.4.3 and 11.6.1 being particularly challenging. Can you start by explaining why these requirements are so significant?

See publication

Tags: Cybersecurity, Emerging Technology, Security

Building Resilience Through Visibility and Proactive Defense
Linkedln
December 04, 2024
As cyber threats become more sophisticated, the need for visibility across your organization’s cyber asset environment and proactive strategies has become increasingly critical. According to Enoch Long, Field CISO at JupiterOne, true visibility goes beyond asset tracking and instead should encompass people, processes, and technology to create a unified defense.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Navigating an Evolving Threat Landscape: Tales from the SOC
Linkedln
November 26, 2024
Cybersecurity is a constantly changing battleground, where threats are evolving more rapidly than ever before. For Enoch Long, Field CISO at JupiterOne, navigating this complex environment requires not only technical expertise, but also a calm and strategic mindset which he has developed over his two decades spent in the field. From leading SOC teams during high-pressure incidents to managing enterprise security for Fortune 500 companies, Enoch has seen firsthand how the threat landscape has evolved over time.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Cybersecurity, AI, BioTech, New Book; A Potpourri of Reading for the Fall Season
LinkedIn
October 30, 2024
Every year the stats on cyber-attacks seem to get spookier! As we finish October’s Cybersecurity Awareness month, it is a suitable time to review some of the key statistics and trends that can haunt us and help us meet the cybersecurity challenges of the evolving digital ecosystem. There are so many frightening cyber stats that I had room for only a few categories, but they are important ones to know.

See publication

Tags: Cybersecurity, Ecosystems

Cybersecurity Awareness
Linkedln
October 04, 2024
Cybersecurity Awareness Month is approaching. Any businesses and organizations, no matter how big or small, can be hacked in today's digital world. That is a fact of our digital lives. However, not enough companies or people prepare to avoid a breach that could significantly impact their operations, brand, reputation, and income streams.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Growing Cyber Threats to Industry in 2024
LinkedIn
July 05, 2024
There is no doubt that 2023 was a tough year for cyber security. The amount of data breaches keeps rising from previous years, which was already very scary. An exponential rise in the complexity and intensity of cyberattacks like social engineering, ransomware, and DDOS attacks was also seen. This was mostly made possible by hackers using AI tools.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Cybersecurity of Space Systems
LinkedIn
February 24, 2024
Protecting the frontier of space systems is unquestionably a security priority for governments and industry. Due to our increasing reliance on space, and particularly satellites, for communications, security, intelligence, and business, satellite and space cybersecurity is becoming increasingly important in this new digital era.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Tech and Cyber Predictions For 2024
Linkedln
February 04, 2024
Welcome to the latest edition of Security & Tech Insights. In this newsletter, predictions on topics of cybersecurity, emerging computing, artificial intelligence, and space will be explored. Thanks for reading and sharing!

See publication

Tags: Cybersecurity, Emerging Technology, Security

Risk Management of the Emerging Tech and Security Landscapes for 2024
Linkedln
January 04, 2024
Risk mitigation in the cyber and emerging tech landscapes in 2024 will be a challenge as technologies become more sophisticated and interconnectivity grows. This edition of the newsletter explores some of those trends. Wising readers of Security & Tech Insights, and a very happy and safe 2024!

See publication

Tags: Cybersecurity, Emerging Technology

Cybersecurity Tips For The Holiday Shopping Season
Linkedln
December 09, 2023
Dear readers, welcome to another edition of Security & Tech Insights newsletter! Please find below several articles to help you become better cyber-secure during the holiday shopping season. Stay safe and have a great 2024!

See publication

Tags: Cybersecurity, Emerging Technology

1 Faculty Member
Designed and teaching course at Georgetown on Disruptive Technologies
George Town University
July 01, 2020
Chuck Brooks a globally recognized thought leader and evangelist for Cybersecurity. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to FORBES. He has also been featured author in technology and cybersecurity blogs by IBM, AT&T, Cylance, and many others.

See publication

Tags: Cybersecurity, Risk Management, Security

1 Founder
Brooks Consulting International
Brooks Consulting International
January 01, 2020
Founder at Brooks Consulting International

Brooks Consulting International is a Government Relations & Marketing firm providing Digital Branding & Subject Matter Expertise, Advise, & Thought Leadership

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

1 Industry Award
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award.
ONCON
July 08, 2019
Thinkers 360 Thought Leader Chuck Brooks selected as a finalist for the Top 50 Marketer Award. The list was selected by distinguished judges from Fortune 500 corporations and associations across the globe. The OnCon Icon Award recognize icons in the categories of marketing, human resources, and legal (corporate counsel). Nominees were voted on by leading professionals within each job function or industry to establish a true non-biased or non-conflicted winner.
Please vote for Chuck on at this site: https://www.onconferences.com/votemarketing
THANKS!

See publication

Tags: Innovation, GovTech, Marketing, Security

2 Influencer Awards
10 cybersecurity experts to follow on social media
Techtarget
October 17, 2023
Chuck Brooks is considered a thought leader in cybersecurity, information systems and emerging technologies. His contributions to cybersecurity can be found in conferences, university settings and well-known publications, such as The Washington Post, Homeland Security Today and Forbes. He has received many awards and recognitions for his work, underscoring his influence and effect on the field.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Top 30 Cybersecurity Experts You Should Follow In 2021
Cybersecurity Ventures
December 07, 2020
When we surround ourselves with individuals smarter than us, we can channel their talents for innovation and insights hoping for some to rub off on us. When I’m not writing and presenting on cybersecurity, I run a wireless security business so I feel fortunate to be able to cross-pollinate with many cybersecurity rock stars who also happen to possess great minds.

See publication

Tags: Cybersecurity, Leadership, Security

1 Infographic
Strategic Paths to Cybersecurity
LinkedIn
September 27, 2021
Strategic Paths to Cybersecurity - Infographic via Chuck Brooks

See publication

Tags: Cybersecurity, Security, National Security

1 Journal Publication
Cyber Startup Observatory -- Interview with Chuck Brooks
Cyber Startup Observatory
December 20, 2018
Interview with Chuck Brooks who iis the Principal Market Growth Strategist – Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. Chuck is also an Adjunct Faculty member at Georgetown University in their Applied Intelligence and Cybersecurity Programs. LinkedIn named Chuck as “a Top Tech Person To Follow” and he has been widely published on cybersecurity and emerging technology topics in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, Homeland Security Today (Visiting Editor), and many other publications. Chuck helped “stand up” Office of Legislative Affairs at the US Department of Homeland Security and served as first Director of Legislative Affairs at the DHS Science & Technology Directorate. He has an MA in International Relations from the University of Chicago and a BA in Political Science form DePauw University.

See publication

Tags: Cybersecurity, GovTech, International Relations

3 Keynotes
The Urgency of Protecting Critical Infrastructure from both digital and physical threats
Global Cybersecurity Association (GCA)
November 18, 2021
Protecting our critical infrastructure from both cyber and physical threats will be a
key challenge in 2021 and the years following as already evidenced by attacks on
pipelines, power, and water treatment plants. What are the most pressing
challenges and how can critical infrastructure be better protected from threats?

See publication

Tags: Cybersecurity, Leadership, Security

Real World Intelligence and Global Cybersecurity Threats
Cyber Risk Alliance
June 24, 2020
InfoSec World 2020 DIGITAL Keynote (with Former Top CIA Executive Mark Kelton).

See publication

Tags: Cybersecurity, Management, Security

Cybersecurity after COVID19
eventbrite
June 10, 2020
Global Security Connection Virtual Tradeshow & Exhibition Series

We have 3-day full agenda including:

45 mins Keynote Speaker sessions.

​30 mins SME Session webinars.

15 mins Vendors Tech Talks. ​

45 mins Brainstorming & Panel roundtable.

​15 mins breakdown sessions. Networking.

60 mins Workshop. Chat Lounge “peer-to-peer” Networking

Trivia moment (Raffles & Prizes)

Don't miss the opportunity to bring your experience and knowledge and share within our Global Community!

See publication

Tags: Cybersecurity, Emerging Technology, Security

17 Media Interviews
Accelerating Innovation, Security, & Education in the Digital Age August 24, 2023
Digital First Magazine
August 24, 2023
Recently, in an exclusive interview with Digital First Magazine, Chuck shared his insights on the future of cybersecurity landscape, his career trajectory, what sets Brooks Consulting International apart from other market competitors, the key qualities required to be a successful security leader, future plans, pearls of wisdom, and much more. The following excerpts are taken from the interview.

See publication

Tags: Cybersecurity, Emerging Technology, Security

Why Is Cybersecurity at a Crossroads?
Secure World
December 20, 2021
At our most recent virtual conference, SecureWorld West Coast, Chuck Brooks presented the closing keynote, discussing why cybersecurity is at a crossroads as we head into 2022.

Here are some key thoughts from our fireside chat with Brooks.

See publication

Tags: Cybersecurity, Risk Management, Security

Renew cyber hygiene strategies for 2022
Cyber Series
December 06, 2021
We asked the leading cybersecurity expert – Chuck Brooks (one of the top 5 Cybersecurity Exec to Watch, top leader and influencer in “who’s who in cybersecurity“ named by Onalytica and top cybersecurity expert in Thinkers360) to throw some light on the significance of cyber hygiene.

See publication

Tags: AI, Cybersecurity, Security

Chuck Brooks - Cyber Insights for 2021
Buzzsprout
January 10, 2021
Chuck is a great guest to join us as we kick off 2021!

Chuck Brooks is a true "cyber influencer" who has managed to retire into fulltime career from Homeland Security into teaching at Georgetown University as well as writing for Forbes.

We discuss a wide variety of topics that pose a threat in 2021 to both enterprise as well as service providers. Multifactor authentication, threat actors, new cyber warfare environment, many different directions we could have taken with this one.

See publication

Tags: Cloud, Cybersecurity, Leadership

Chuck Brooks: Security by Design Needed to Safeguard Energy Infrastructure From Cyber Attacks
GocConWire
July 07, 2020
Chuck Brooks President Brooks Consulting
Chuck Brooks, a GovCon expert and president of Brooks Consulting International, virtually addressed the G20 forum Sunday, July 5, on energy systems cybersecurity during the Workshop on Energy Security and Markets Stability.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management, Security

AI, the Economy’s Backbone | Chuck Brooks | Engati Engage
Engati
June 17, 2020
In the current digital era, Chuck Brooks reveals that technology defines who we are and what we do and AI will be the backbone of the Economy. We also discuss the emergence of digital in Customer Service and the growth of the remote economy.

See publication

Tags: AI, Cybersecurity, Marketing

Thought Leader and Influencer Interview with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University
Thinkers360
June 09, 2020
Thinkers360 interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Chuck Brooks, President, Brooks Consulting International and Adjunct Faculty Georgetown University.

See publication

Tags: Cybersecurity, Digital Transformation, Marketing

Security concerns with work from home?
Netsync
June 08, 2020
Watch Chuck Brooks, named one of the Top 5 Tech People to follow on LinkedIn, discuss with Netsync’s Mark Lynd ways to remain digitally safe during the COVID-19 pandemic. While many businesses, especially smaller ones, were caught off guard and unprepared for the rapid move to remote working, Chuck discusses ways to catch up and implement policies for employees working from home, especially relating to the use of WiFi.

See publication

Tags: COVID19, Cybersecurity, Emerging Technology

Former General Dynamics Exec Chuck Brooks Creates GovCon-Focused Consulting Firm
Executive Mosaic
May 20, 2020
Chuck Brooks, a more than three-decade professional in the government contracting industry, has established a firm focused on government relations and marketing named Brooks Consulting International where he will also serve as president.

See publication

Tags: Cybersecurity, GovTech, Business Strategy

Made for the Moment #6 - Data Infringement & Free Speech (ft. Cybersecurity Expert Chuck Brooks)
YouTube
April 29, 2020
Made for the Moment is a podcast by Jason Dodier of Alpha Struxure and Jaret Grossman of JARBLY discussing world events through unique topics of interest and interesting guests. Our guest today is Chuck Brooks is a global cybersecurity expert who is rated one of the Top 5 technology experts to follow on LinkedIn with over 59k followers and is also a Forbes contributor.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

YOURSELF READY for the DIGITAL ERA … 5th INDUSTRIAL REVOLUTION Interview of Chuck Brook
Global business news
January 26, 2020
5th INDUSTRIAL REVOLUTION

See publication

Tags: AI, Emerging Technology, Security

Joe Coughlin and Chuck Brooks discuss cyber security
YouTube
June 27, 2019
Recently at IndEx 2019, Joe Coughlin and Chuck Brooks got together to discuss cyber security. Joe is the CEO of Corporate Risk Solutions, a risk advisory firm. He spoke with Chuck, who is Principal Market Growth Strategist for General Dynamics Missions Systems. Find out more about recent developments in cybercrime that have experts worried, what companies are doing for their own cyber security, and much more in this interview.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

IFSEC Global Influencer Chuck Brooks Talks All Things Cyber Security
Cyber Security Hub
January 30, 2019
Cybersecurit: From private to public sector to emerging tech to talent crisis and more

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

The IFSEC 2 Global Cyber Security Influencer for 2018
Voice America
January 28, 2019
The Principal Market Growth Strategist for General Dynamics Mission Systems for Cybersecurity, and the IFSEC #2 Global Cyber Security Influencer for 2018, Mr. Chuck Brooks, joins Episode #69 of Task Force 7 Radio to talk all things Cyber Security. Brooks explains the challenges from transitioning from the public sector to the private sector, what his thoughts are on the militarization of cyber security, and the difference between roles in cyber security in the public sector vs. the private sector. Brooks also talks about how emerging threats are affecting businesses, how companies are combating the threats around IoT, Cloud, Mobile, and Third Party risks, and how new technologies being deployed as mitigating controls are introducing new threats into the environment. Brooks also gives his thoughts on the talent crisis and provides career advice to professionals seeking to enter the Cyber Security field.

See publication

Tags: Cybersecurity, Risk Management, Security

Chuck Brooks on Emerging Technologies
YouTube
October 25, 2018
I caught up with Chuck Brooks at the AT&T Business Summit in Dallas to talk about Emerging Technologies and what it means for cyber security.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

What keeps Chuck Brooks up at night?
YouTube
June 07, 2018
Each week from his Zero Day Studios, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. This week, Chuck Brooks offers an expert perspective.

Chuck Brooks is Principal Market Growth Strategist of Cybersecurity and Emerging Technologies for General Dynamics Mission Systems. LinkedIn named Chuck Brooks as one of “The Top 5 Tech People to Follow on LinkedIn” out of their 550 million members. Chuck has served at The Department of Homeland Security as the first Legislative Director of The Science & Technology Directorate. Chuck is an Adjunct Faculty member at Georgetown University in their Applied Intelligence Program and has an MA in International relations from the University of Chicago and a BA in Political Science from DePauw University.

See publication

Tags: Cybersecurity, Emerging Technology, International Relations

New administration looks to DC for cyber innovation
Federal News Radio
May 12, 2017
The new administration has promised to focus on cybersecurity and artificial intelligence and will be looking to the Washington, D.C. region for new breakthroughs in technology.

See publication

Tags: Cybersecurity, Innovation, AI

3 Panels
Balancing security + gov cloud innovation
Meetup
October 28, 2020
The proliferation of data combined with the speed of advancing technology bring complex challenges to government’s ability to protect itself from evolving cyberthreats while striving to accelerate cloud innovation.

See publication

Tags: Cloud, Cybersecurity, Quantum Computing

Industry 4.0 and Cybersecurity 2.0 –- Opportunities & Challenges -- IIoT World Days.
IIoT World
August 17, 2020
The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.

In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.

See publication

Tags: Cybersecurity, IoT, Risk Management

TIC Consortium Panel: Emerging Tech for Hybrid Warfare
eventbrite
May 23, 2018
Come and join TIC Consortium in its second event in Old Town Alexandria on May 23rd at 2pm for a panel discussion about emerging technologies and considerations for hybrid warfare.
Wars of the future will only be more complex. Consider the following scenario: China pressures US firms to censor Chinese individuals. Meanwhile, the EU also wants hate speech removed in 24 hours. This is all while a California lawmaker argues that strong encryption online aids human trafficking.
What will all of these political and cultural pressures mean for the future of cyber defense and attack? What are the emerging technologies, ethical considerations and policy initiatives that should be pursued? How should companies be positioning and teaming in order to provide the best products and services for the next conflict?

See publication

Tags: Cybersecurity, Emerging Technology, Quantum Computing

97 Podcasts
BEC: Real Stories, Real Defense
Import from wordpress feed
December 07, 2021
Business Email Compromise (BEC) remains rampant, with annual losses in the billions of dollars. Every type of organization is at risk. During this episode, we discuss key things your organization and people should know about this cybercrime, plus the most effective way to respond in hopes of recover

See publication

Tags: Cybersecurity

A Cyber Mercenary Investigation
Import from wordpress feed
November 17, 2021
What is a cyber mercenary group and who are they attacking through cyberspace? In this episode, Feike Hacquebord, Sr. Threat Researcher at Trend Micro, reveals extensive details of a cyber mercenary group he has been tracking for more than a year, which he calls Void Balaur. "They target a lot of d

See publication

Tags: Cybersecurity

The Cybersecurity Talent Pipeline Problem
Import from wordpress feed
November 04, 2021
This discussion on the cybersecurity talent pipeline problem is unlike any other you have heard before. And you and your organization could play a part in growing the future of the cybersecurity workforce. We're talking with the founders of the Last Mile Education Fund: •  Rian Walker, Informatio

See publication

Tags: Cybersecurity, Education

Cybersecurity Brain Hacks and Big Ideas
Import from wordpress feed
October 27, 2021
Can brain hacks and cybersecurity habits improve the security posture at your organization? CISO George Finney of Southern Methodist University believes the answer is yes and he makes his case in this episode. Also, here's a big idea: cybersecurity doesn't slow down digital transformation, it speeds

See publication

Tags: Cybersecurity

Emergency Response Lessons for Cybersecurity
Import from wordpress feed
October 21, 2021
Andrew "AJ" Jarrett is Applied Cybersecurity Program Manager at the Cyber Readiness Center (CRC) and Texas A&M Engineering Extension Service (TEEX). He's been a wildland firefighter for more than a decade and believes Emergency Response frameworks that save lives can apply to cyber incident response

See publication

Tags: Cybersecurity

Cybersecurity Inflection Point?
Import from wordpress feed
October 13, 2021
Ed Cabrera is the former CISO of the United States Secret Service and current Chief Cybersecurity Officer at Trend Micro. He believes we are at an inflection point in cybersecurity and is cautiously optimistic. During this conversation with SecureWorld, Cabrera also discusses ransomware, cryptocurre

See publication

Tags: Cybersecurity

Cyber Resilience, the Game Show
Import from wordpress feed
October 07, 2021
In this SecureWorld Sessions podcast bonus episode, three Chief Information Security Officers play a game show around modern cyber resilience. What is cyber resiliency, how do you align it with business objectives, and is it possible a unicorn won this battle of the CISOs? Contestants include Ricard

See publication

Tags: Cybersecurity

Ransomware and the Secret Service
Import from wordpress feed
September 28, 2021
Our guest on this episode is Jeremy C. Sheridan, Assistant Director, Office of Investigations, at the United States Secret Service. We discuss the evolution of ransomware in cybercrime, including: advances in technology, cyber insurance, the cryptocurrency challenge, the sophistication of ransomware

See publication

Tags: Cybersecurity

Creating a Security Culture
Import from wordpress feed
September 09, 2021
Princeton University implemented a multi-year program to create a culture of cybersecurity throughout campus. It has already made an impact on the organizational security mindset, including risk reduction, implementing new technologies, broadening security knowledge, and strengthening campus partner

See publication

Tags: Cybersecurity, Culture

Nation-State Cyber Threats: What Now?
Import from wordpress feed
September 01, 2021
What can organizations, the U.S. government, and everyday citizens do to stop the surge of ransomware and cyber threats hitting us from overseas? In this episode, we hear from retired Air Force Colonel Cedric Leighton. Leighton is a CNN military analyst who held cyber leadership positions while serv

See publication

Tags: Cybersecurity

Suing the CISO
Import from wordpress feed
August 24, 2021
Are CISOs getting sued? Yes. Investors filed a lawsuit that specifically names the CISO of SolarWinds as a defendant. Is this the beginning of a trend to sue the Chief Information Security Officer after a cyber incident? #InfoSec twitter reacts, and so do the experts on today's podcast: Rebecca Rako

See publication

Tags: Cybersecurity

Season of Cybercrime: The Insider Threat
Import from wordpress feed
August 10, 2021
In this true cybercrime episode, we uncover the case of an insider threat scheme at an AT&T Wireless call center. Court documents reveal how rogue employees collected approximately $1 million in bribes. Plus, Dr. Larry Ponemon discusses the Insider Threat risk, and John Grimm discusses Insider Threa

See publication

Tags: Cybersecurity

Season of Cybercrime: Exploring the Dark Web
Import from wordpress feed
August 03, 2021
In this true cybercrime episode, we interview Myra Rosario-Fuentes, Senior Threat Researcher at Trend Micro, who just completed an in-depth, two-year research project on Dark Web markets, especially those selling exploits that hackers use to take advantage of security holes in networks and devices.

See publication

Tags: Cybersecurity

Season of Cybercrime: W.H.O. Cyberattack
Import from wordpress feed
July 20, 2021
In this true cybercrime podcast episode, we interview Alexander Urbelis, cyber attorney and threat intelligence expert, who uncovered a cyberattack against the World Health Organization at the start of the coronavirus pandemic. Resource Links: •  Trend Micro phishing and ransomware white paper: h

See publication

Tags: Cybersecurity

Season of Cybercrime: SeaWorld Cyberattack
Import from wordpress feed
July 13, 2021
In this true cybercrime episode, we interview Cam, who was arrested for hacking when he was 14 years old. One of his focused cyberattacks was against SeaWorld San Diego. Now, he works as a cybersecurity professional. How did he get into cybercrime and then into a role defending against it? It all st

See publication

Tags: Cybersecurity

Cybersecurity Workforce Development at Scale
Import from wordpress feed
June 29, 2021
How can we scale up the development of our collective cybersecurity talent pipeline, and what role can you play in this? How can your organization help develop talent? How can your alma mater or current university play a part in this? Hear about a model for this kind of work underway through partner

See publication

Tags: Cybersecurity

State CISO Discussion: Future of Security
Import from wordpress feed
June 22, 2021
Listen in as U.S. state cybersecurity leaders discuss key topics: •  coming year priority projects •  the ransomware surge and preparing for security incidents •  their organization's security culture and training to deal with issues •  innovative, special projects they are most excited

See publication

Tags: Cybersecurity

Ransomware Incident Response Lessons
Import from wordpress feed
June 15, 2021
Nancy Rainosek is the Chief Information Security Officer (CISO) for the State of Texas. She knows all about ransomware incident response. Her team played a key role in remediation after a coordinated ransomware attack hit 22 state agencies in Texas in a single day. 1. What was that ransomware day li

See publication

Tags: Cybersecurity

AI and Our Future
Import from wordpress feed
May 25, 2021
Josh Jackson is Founder and Executive Director of the AI Association, which advocates for the furtherance of artificial intelligence and automation in the United States. In this wide-ranging discussion about AI, Jackson unpacks the following: 1. How should we define artificial intelligence? 2. Where

See publication

Tags: Cybersecurity, AI

Outlaw Ransomware Payments?
Import from wordpress feed
May 18, 2021
Shawn Tuma is a nationally known "breach quarterback" or "incident response coach" who walks victimized companies through the fallout of a ransomware attack. In this episode, he discusses the following: 1. What stages do organizations and security teams experience during a ransomware attack? 2. Woul

See publication

Tags: Cybersecurity

Operationalizing Your Cybersecurity Knowledge
Import from wordpress feed
May 11, 2021
Join a CISO panel for a fast-moving discussion around the following questions: 1. The state of cybersecurity: what can we understand from security's rise and the rise of the CISO? 2. What does the business need more of from security teams? And what about from security leaders? 3. Are InfoSec job pos

See publication

Tags: Cybersecurity

Refocusing on the Privacy and Security Landscape
Import from wordpress feed
May 04, 2021
2020 was a "blender" year, during which data privacy and cybersecurity seemingly took a backseat to the other major, pressing health and social issues. As more and more people are getting vaccinated and we reemerge into a world that looks a lot different (i.e. new laws and regulations, new threats,

See publication

Tags: Cybersecurity, Privacy

Achieving Your Cybersecurity Career Goals
Import from wordpress feed
April 27, 2021
Are you "stuck" somewhere along your cybersecurity career path? Are you planning to pursue your InfoSec career goals "someday" down the road? Belinda Enoma has a cybersecurity and privacy background, and she's a Certified Information Privacy Professional (CIPP) in the U.S. She is also a career advic

See publication

Tags: Cybersecurity, Privacy

Myth Busting: IAM in Multi-Cloud
Import from wordpress feed
April 20, 2021
In this episode, Michael Meyer, Chief Risk Officer and Chief Innovation Officer at MRS BPO, exposes three crucial myths around IAM in cloud, especially a multi-cloud environment. Are you believing the myths that stand in the way of properly implementing IAM (Identity and Access Management) in your c

See publication

Tags: Cybersecurity

Resilience in Cybersecurity
Import from wordpress feed
April 13, 2021
In this episode, Mark Eggleston, Vice President and CISO/CPO of Health Partners Plans, speaks with security leaders about cyber resiliency, the return to the workplace, combatting nation-state cyber threats, pandemic lessons that can fuel digital innovation, and mental health in cybersecurity. Panel

See publication

Tags: Cybersecurity, Mental Health

1 Speaking Engagement
Chuck Brooks Discusses All Things Cybersecurity
Made For the Moment Podcast
June 09, 2020
Podcast

See publication

Tags: Cybersecurity, Emerging Technology, Security

5 Webinars
Seyfarth and NY Metro InfraGard Present: Lunch with America’s Cybersecurity Influencers
Seyfarth
October 06, 2021
Join Seyfarth and NY Metro InfraGard on Wednesday October 6th, 2021 at 1 pm ET for an exclusive presentation on the importance of carrying out the cybersecurity basics, an often overlooked yet critical issue required to strength your cybersecurity posture and resiliency. Despite some well-meaning intentions from both government and the private sector, attacks continue to cause havoc in America on a daily basis, whether through malware, ransomware, social engineering, or a combination of all the above. Join some of the most important cyber and information security influencers on the Internet today on how carrying out the cybersecurity basics can make a significant difference in securing your organization and strengthening our country. We look forward to your participation.

See publication

Tags: Cybersecurity, Management, Leadership

RaCE: Resilience and Collaboration Extended
Al-Iktissad Wal-Aamal Group
February 03, 2021
The UAE Banks Federation and Al-Iktissad Wal-Aamal CO. are organizing RaCE, a 2-day Cybersecurity webinar on the 3rd & 4th of February 2021, focusing on best practices in data privacy and protection as businesses shift to a hybrid working environment.

Remote working has added further challenges to cybersecurity teams who are facing an increase in the frequency and intensity of cyber-attacks targeting remote workers and customers alike. Ensuring that employees and clients are well informed and protected against such attacks has become a primary requirement to maintain data protection and prevent losses.

As such, the webinar will discuss:

Protecting Data in an Era of Increased Cyber Risk
Data Privacy in a Complex Regulatory Framework
Cyber threats; The Dark Side\drawbacks of Digital Transformation
Managing a Cyber Pandemic
RaCE will bring together renowned cybersecurity experts from the UAE and abroad to present trending cyber-attacks in the financial sector and means of maintaining cyber-immunity against them.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

2020 Cyber Innovators Summit
The Cyber Institute
October 30, 2020
The Cyber Institute has gathered together some of the brightest minds in cybersecurity to discuss (virtually) the dynamic challenges of infosec, new approaches towards structuring security infrastructures, and predictions for this upcoming decade. Join leaders of SentinelOne, McAfee, Norwest, Check Point, and other innovators during this forum. The 2020 Summit has been sponsored by Active Cypher, developer of file-centric protection against malicious and unintentional data loss.

Session 8 (3:00 PM PST): Future Threat Panel - Ashwin Ram, Mathew Rosenquist, & Chuck Brooks.
Our speakers will discuss future threats on the horizon and effective responses they see. IT organizations are far too often worried about protecting against yesterday's vulnerability and not focusing on future.

See publication

Tags: Cybersecurity, Management, Leadership

October Cyber Bytes Networking Event: Election Security
Cyber Bytes Foundation
October 29, 2020
Join us for our next Cyber Bytes Networking Event on Election Security. The virtual event is set to take place on Thursday, October 29, 2020 at 3 pm. Register today.

See publication

Tags: Cybersecurity, Management, Leadership

CISO's View: Emerging Technologies Impacting the IAM Landscape
CyberEd.io
June 23, 2020
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies that impact Identity and Access Management that can help us navigate the increasingly malicious cyber threat landscape. Join cybersecurity thought leader Chuck Brooks for an overview of these cutting-edge technologies, including:

AL/ML
Big Data: Real-time Analytics and Predictive Analytics
Biometrics and Authentication Technologies

See publication

Tags: Cybersecurity, Emerging Technology, GovTech, Risk Management

Thinkers360 Credentials

20 Badges

Blog

4 Article/Blogs
Chuck Brooks’ 2026 Cybersecurity Predictions
Thinkers360
November 17, 2025

Image by Roman from Pixabay

 

Agentic AI as the New Cyber Battle-Ground

Prediction: Autonomous (“agentic”) AI — systems that act with minimal human intervention — will be central in both attacks and defense. 

Implication: Attackers will use AI bots to run reconnaissance, move laterally, and exfiltrate data; defenders must deploy AI agents to monitor, detect, and contain threats. Security teams need to simulate “agents in the wild” to test unexpected, emergent behaviors.

Quantum Computing Threat Accelerates

Prediction: 2026 will mark a tipping point for quantum-related risk.

Implication: Stolen data today may be decrypted later (“harvest now, decrypt later”). Legacy encryption systems (e.g., RSA, ECC) will be increasingly vulnerable. Organizations must inventory their crypto assets, adopt post-quantum or hybrid cryptography, and properly manage key deletion and archival.

Rise of Deepfakes and Synthetic Identities

Prediction: Deepfake audio/video and synthetic identities will be used more aggressively by threat actors. 

Implication: Traditional identity verification (e.g., one-time checks) will be insufficient. Defense strategies should incorporate continuous authentication and behavioral anomaly detection. There's also a need to educate employees about “synthetic realism” and plan for legal/insurance coverage relating to identity spoofing.

Expanding Attack Surface via IoT, Edge, and Device Proliferation

Prediction: As IoT, edge computing, and 5G/6G expand, attackers will increasingly exploit weak embedded devices. 

Implication: Devices with poor patching capabilities or default credentials will be prime targets. Edge clusters can become pivot points for lateral movement. Security must emphasize device lifecycle management (provisioning, patching, decommissioning), micro-segmentation, and a zero-trust mindset at the device level.

Cybercrime Organizes as Corporate-Class Businesses

Prediction: Cybercriminal groups will operate more like formal enterprises, with affiliate models, subscriptions, and full “service industries” around ransomware and extortion. 

Implication: Treat threat actors not merely as “hackers” but as business competitors. Expect outsourced operations, “customer support” for ransomware victims, and professionalization. Organizations need to invest in resilience (not just prevention), leadership, and culture, and integrate business continuity, insurance, and legal strategies into their incident response planning.

Cybersecurity as a Strategic Business Pillar

Prediction: Companies that embed cybersecurity into their business strategy — not just treat it as IT overhead — will perform best. 

Implication: CISOs (or equivalent) must be elevated to strategic business partners. Metrics should go beyond “threats blocked” to include resilience indicators: time-to-recover, adaptability, containment effectiveness. Cyber risk must be woven into board-level discussions, supply-chain coordination, threat intelligence sharing, and cultural change.

For more perspectives please also see: Cybersecurity 2026: 6 Forecasts and a Blueprint for the Year Ahead

 

See blog

Tags: Cybersecurity

Emerging Technologies That Will Shape Our Future
Thinkers360
October 04, 2025

We are not simply entering a new technological era—we are living in one. Artificial intelligence, quantum technologies, the Internet of Things, advanced networks, and space systems are converging into an ecosystem that touches commerce, national security, and everyday life.

As I discussed in my book Inside Cyber, technological opportunity and systemic risk are two sides of the same coin. How we govern, design, and deploy these capabilities will determine whether they become engines of prosperity or vectors of fragility.


Artificial Intelligence: Acceleration, Automation, and Accountability

AI is rewriting the playbook for productivity and decision-making. From automating diagnostics in healthcare to optimizing logistics and augmenting intelligence analysis, AI has become an accelerator of capability across nearly every domain.

However, this acceleration comes with complex risks. Malicious actors are already weaponizing AI to scale disinformation, automate reconnaissance, and craft realistic phishing and deepfake campaigns that target human behavior as much as network vulnerabilities.

The defensive answer is not to slow innovation but to embed accountability into every stage of development: explainable models, adversarial testing, red-team reviews, and strong data provenance. Leaders must treat AI risk as enterprise risk and ensure transparency, governance, and oversight guide every deployment.


Quantum: Promise, Peril, and Preparation

Quantum technologies—computing, sensing, and communications—are transitioning from theoretical science to operational capability. They promise breakthroughs in logistics, drug discovery, and materials science, but they also pose existential cybersecurity challenges.

Quantum computing threatens to render much of today’s encryption obsolete. The looming “harvest now, decrypt later” threat means adversaries may already be stockpiling encrypted data to exploit once quantum decryption becomes viable.

Preparation is essential. The path forward requires migration to post-quantum cryptography, secure-by-design architectures, and a coordinated effort between governments, industry, and academia to build testbeds, establish standards, and grow a skilled workforce.

Quantum readiness will define future resilience—and those who plan early will lead in both trust and capability.


The Internet of Things and Operational Technology: The Expanding Attack Surface

The Internet of Things (IoT) connects tens of billions of devices—ranging from smart homes and vehicles to industrial sensors and healthcare systems. According to Statista, there will be more than 29 billion IoT devices worldwide by 2030, a dramatic increase from 16.7 billion in 2023.

This unprecedented connectivity offers efficiency and data-driven insights but also multiplies risk. Many devices are deployed with weak security controls, short product lifecycles, and limited patching mechanisms, making them ideal footholds for cybercriminals and hostile actors.

Operational resilience demands disciplined management: maintaining accurate asset inventories, enforcing identity-centric device authentication, ensuring secure update paths, and integrating software bills of materials (SBOMs) into procurement contracts.

As I have often emphasized, cybersecurity must be engineered into IoT ecosystems from inception—not bolted on after deployment.


Networks, Edge, and Resilience

5G, edge computing, and software-defined networks are the connective tissue enabling this digital revolution. They power real-time analytics, autonomy, and distributed sensing—but they also create concentration points of risk.
A compromise in one layer of the network can cascade rapidly across sectors. To mitigate that, networks must be architected for resilience: segmentation, observability, encryption, and supply-chain diversity are critical.

True resilience assumes breach and focuses on minimizing the blast radius of compromise while maintaining continuity of essential services.


Space Systems as Critical Infrastructure

Space is now part of the cybersecurity landscape. Satellites provide communications, navigation, and intelligence capabilities that underpin both civilian life and national defense.

Yet these systems face growing threats—from signal jamming and spoofing to ground-station intrusions and supply-chain tampering. The global commercial space sector now exceeds $550 billion annually and is projected to surpass $1 trillion by 2035, underscoring its strategic and economic importance.

To protect this domain, cybersecurity standards must extend into orbit: robust encryption for telemetry, redundant ground control networks, and continuous monitoring against electronic and kinetic threats. Space should be treated as critical infrastructure, vital to the functioning of modern civilization.


Convergence and Cascading Risk

The true challenge of emerging technologies lies in their convergence. AI can optimize and attack IoT systems. Quantum computing can decrypt their communications. Edge networks and satellites can propagate both benefits and failures at unprecedented speed.

We face an era of cascading risk, where vulnerabilities in one domain can amplify across others. Meeting that challenge requires cross-domain collaboration—between government, industry, academia, and international partners.


Policy and Strategic Priorities

The future will reward foresight. Key actions for policymakers and executives include:

  • Accelerate adoption of post-quantum cryptography in critical sectors.
  • Establish AI governance frameworks emphasizing transparency, explainability, and adversarial testing.
  • Require baseline security standards for IoT devices and software supply chains, including unique credentials and update lifecycles.
  • Expand public-private testbeds and research partnerships to harden systems before mass deployment.
  • Build workforce pipelines that blend expertise across cybersecurity, engineering, and policy.

These are not aspirational talking points—they are practical imperatives for securing the digital future.


The Road Ahead: Leading with Foresight

Emerging technologies are reshaping the balance of power, economy, and society. In Inside Cyber, I noted that the future of cybersecurity is not about eliminating risk, but about intelligently managing it amid accelerating innovation.

Artificial intelligence will amplify our analytical power; quantum will redefine computation; IoT will extend our digital reach; and space will expand our operational horizon.

The question is not whether these technologies will transform our world—they already have. The real question is how we choose to guide that transformation.

If we lead with foresight, engineer with integrity, and collaborate globally, we can ensure that AI, quantum, and connected technologies serve humanity’s best interests—creating a future defined by resilience, trust, and progress.

 

See blog

Tags: Cybersecurity, Emerging Technology, Security

Social Media Platforms Are Helping Shape Business Success
Thinkers360
October 18, 2021

Social media has transformed the way people interact and conduct business both in the public and private sector. The Covid19 pandemic, combined economic factors, have led to the emergence of remote work and hybrid environments and different ways of doing commerce. The move away from business lunches, live events, and meetings has propelled digital platforms into becoming a main fulcrum for communications and branding. Those social platforms have especially impacted components of business development, sales, government relations, and marketing and are helping shape pathways to success.

Many users enjoy social mediums because they control the content, and it is non-invasive. Also, it can be perpetually shared. Social media has become a platform to communicate who we are and what we do. Platforms such as LinkedIn, Twitter, and Instagram, have now become a daily means for sharing content, building networks, and reaching targeted markets. Thought leadership on meaningful topics is of timely interest to everyone and the use of subject matter experts and influencers have become a primary means for brand amplification via articles, blogs, podcasts, and online events.

Today, most senior-level executives on both the public and private sectors have LinkedIn profiles, including administrators, CEOs, CTO, CIOS and their numbers are increasing. They often use it as a conduit for 1) Branding 2) Socializing/Networking; 2) Basic Intelligence; 3) Events: and 4) Strategic Partnering/Marketing.

Branding:  the trend of digital brand amplification began to grow at the beginning of the outset of the pandemic. Because of the lack of in person meetings, many companies, new & old, large & small, sought to be more visible and recognized for the unique viability for branding on social media platforms. Companies were and are seeking quality and interesting content that helps enable them to be able to connect with peers and clients. A benefit of social media digital marketing and brand amplification is that it can be very cost-effective, repetitive, and can generate revenue and build positive reputations. A good written message, video or graphic can have a long shelf-life and be shared widely across various social media platforms. Influencers have also become part of the branding mix; expertise bring credibility and attention and many companies have expanded strategies that use influencers and thought leaders who can augment company marketing and sales.

Socializing/networking: social media is in its essence “social.” It is an outlet for networking and connecting with people who share your interests, goals, and professional paths.  A platform like LinkedIn, Facebook, Instagram, and Twitter are useful for reconnecting to people you have worked with in past jobs, friends, and alumni of universities, and colleges. In particular, the service encourages you to join professional and hobby interest groups where you can post articles and engage in discussion with group members. I am a big proponent of LinkedIn for networking where I have over 73,000 followers, especially with targeted groups. For example, I have management roles in several of the largest and most influential homeland security groups on LinkedIn. Another key area of group ownership and involvement for me on LinkedIn is with cybersecurity and emerging technology groups where I find the readership are exceptionally informed and active. Also, as a “foodie”, I created the “DC Foodies” LinkedIn group to reach out to others in the greater Washington, DC area that may have a passion for food, wine, and restaurants. On LinkedIn there is a group for almost every subject from healthcare, governing, martial arts, Space, to quantum physics.

Basic Intelligence: Another function of social media is that it provides you with working biographies of members. Whenever I have a meeting with someone new, I can usually find their profile on LinkedIn and see where they worked, what schools they attended and who we know in common. Also, by following the posts in groups, I can view the latest news from a variety of sources on a topic of interest. Also, almost all federal agencies and public entities have their own profiles (and often groups) on LinkedIn that make the basic intel process quick and easy.

Events: There is no better place to go to find out who is hosting what than on social media. This includes LinkedIn, Twitter, Instagram, Facebook in the event domain. Since most publications are intertwined between print and digital media, social media outlets are a fulcrum for seeing what activities are happening in personal or business areas of interest daily.

Strategic Partnering/Marketing: social media is really the Holy Grail for strategic partnering and marketing. Messaging is immediate, perpetual, and cost-effective. It is also much targeted and will allow you to focus communications to audiences, both individual and groups that may have an interest in your offerings and services. For those who are specifically focused on the federal market, LinkedIn is an especially good resource for finding teaming members and potentially partners to pursue opportunities. By being active on LinkedIn, companies can often find you and reach out for help in areas that may be mutually beneficial. As government encourages diverse and multiple partners to work together on programs, the importance of having a strong stable of networked partners is becoming more of a premium.

We are still only in the early era of social media. It will continue to grow and be fused into all aspects of our lives, especially with the growth of augmented reality and emerging communication technologies. Social media vehicles like LinkedIn already have great utility in the workplace both in the corporate world and in government. Linked and other social media platforms are already shaping communications. “Linking in” and being active on social media platforms have become more of an imperative than a choice for those who want to thrive in a digital world. 

 

Chuck Brooks, President of Brooks Consulting International, and Adjunct Faculty at Georgetown University, is a Technology Evangelist, Corporate Executive, Speaker, Writer, Government Relations, Business Development, and Marketing Executive. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated, as a “Top 50 Global Influencer in Risk, Compliance,” by Thomson Reuters, “Best of The Word in Security” by CISO Platform, and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was also named “Best in The World in Security” by CISO Platform, one of the “Top 5 Executives to Follow on Cybersecurity” by Executive Mosaic, and as a “Top Leader in Cybersecurity and Emerging Technologies” by Thinkers360. Chuck was named by Oncon in 2019 “Top Global Top 50 Marketer” by his peers across industry. 

Chuck also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. He is a featured contributor to Thinkers360

See blog

Tags: Social, Marketing, Business Strategy

“Innovation Foraging” on Social Digital Mediums
Thinkers360
May 17, 2021

In the science, technology worlds, there is a category referred to as “technology foraging,” or the searching for smart ideas and emerging technologies that may exist already in research institutions of found in patents to fill gaps and offer new solutions.  Technology foraging has been an engine for the technological transformation now taking place in society.  It has served as a catalyst for discoveries of many products brought to the marketplace.

The foraging process is often conducted in research centers by national labs, universities, and in government & corporate innovation hubs. It has expanded commensurately with the rapid pace of innovation in our new era of exponential digital transformation where humans and computing devices are intertwined, and data is more accessible. Please see my article Technology Foraging for Cybersecurity Solutions Technology Foraging for Cybersecurity Solutions | AT&T Cybersecurity (att.com)                                                                                                                 

Digital transformation combined with tech foraging of the 4th Industrial Era has led to significant jumps in innovation of technologies. This includes, for example, emerging tech such as big data, artificial intelligence, IoT, smart cities, 5G wireless, virtual & augmented reality, nanotechnologies, robotics, self-driving cars, 3-D Printing, cybersecurity, quantum computing, predictive data analytics, Biometrics and wearables, self-healing materials, bioinformatics, genetic engineering, and a new world of medical applications. 

The digital transformation It has also impacted communication mediums, especially social media where research, ideas, analyses, and opinions are cultivated by open sharing and interaction. The networking and information sharing on digital mediums can be viewed as a foraging process. The pace of digital expansion and change is happening so rapidly that it can be quite overwhelming just to try to keep up.  But social media does offer a pathway to do so via innovation foraging and collaborative information sharing.

For example, my career passion revolves around searching and reading about topics in cybersecurity. Using social media, I can keep abreast of the latest news and events. A case in point is the recent Colonial Pipeline breach. Almost immediately after happened, detailed descriptions of the breach and surrounding issues such as ransomware were posted on LinkedIn, Twitter, and other digital mediums. There was a potpourri of expert perspectives available, including posts on technical analyses, and posts on geopolitical and economic implications. Forging through posts you can also develop your own knowledge to explore remedies and policy frameworks that may apply digital impact to your own professional or business circumstances.

From my perspective as cyber security & technology strategist, the extensive resources of LinkedIn combined with their supporting analytics provides a great platform to communicate, educate and promote. For me, LinkedIn groups, including the dozen groups I created, serve as the most optimal social media digital offerings for foraging. Research on LinkedIn is significantly amplified by the myriad of specialized information security LinkedIn groups that I can pull insightful and timely data from on a regular basis. 

Several years back I wrote an article for LinkedIn called Why LinkedIn is an Indispensable Medium for Security Professionals Why LinkedIn is an Indispensable Medium for Security Professionals | LinkedIn Marketing Blog  In that blog I noted that” LinkedIn has become part of the fabric of how I (and a majority of my peers) communicate, operate, and conduct business. For me, LinkedIn groups serve as interactive, informative forums. Many of the members in my groups are security professionals who have important roles in government or industry, including CISOS, CIOs, CTOs, or members of the C-Suite who possess deep subject matter knowledge.” I also stated that for thought leadership on homeland security and cybersecurity issues, that “LinkedIn is a real force for digital influence. It is an effective platform for educating, evangelizing, and promoting discussion of the cutting risk management issues.”

The value of LinkedIn for evangelism and marketing goes far beyond immediate connections.  The extensive resources of LinkedIn combined with the intrinsic marketing capabilities based upon intelligence analytics provides a ready platform to communicate, educate and promote. In my major areas of interest, cybersecurity and emerging tech, I am very active in interchange of news and innovative ideas with groups, and also with my 70,000 direct follower connections. It facilitates keeping up with cybersecurity and emerging technology trends that I can share with others across digital media.

With 18 years under its belt and a membership globally of over 800,000 users, LinkedIn has become increasingly valuable as a forging resource and influence platform for branding people and companies. Twitter offers good avenues for networking, and often is starting point for interesting links that spur more foraging on other media sites. Both platforms offer users measurable metrics to track effectiveness of content and interactions.

For employees at a company or organization, foraging (and info sharing) on digital mediums as a corporate strategy can help drive collaboration between often aloof silos comprised of the c-suite, marketing, legal, and sales. A social media platform can also foster company awareness & relationship, cultivate business networks, and can even be used as a research tool for due diligence. For both companies and individuals, social digital platforms can serve as a resource and enabler for innovation by sharing important data derived from foraging among informative posts. 

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. 

Chuck Brooks LinkedIn Profile:    https://www.linkedin.com/in/chuckbrooks/

Chuck Brooks on Twitter:   @ChuckDBrooks

See blog

Tags: Cybersecurity, Digital Transformation, Innovation

Opportunities

1 Social Media Engagement
Brooks Consulting International

Location: Washington, DC    Fees: Negotiable

Service Type: Service Offered

Social Media Marketing · Marketing Consulting · Digital Marketing · Cybersecurity · Content Strategy · Brand Consulting · Business Consulting · Blogging · Project Management · Public Speaking

Respond to this opportunity

Events

5 Online Events
CISA Zero Trust Maturity Model: The Requirement for a New Data-Centric Cybersecurity Approach

Location: Virtual    Date : March 23, 2022 - March 23, 2022     Organizer: Anacomp, Inc.

The webinar will address the paradigm shift to Zero Trust Architecture in light of current cybersecurity threats to critical infrastructure, government, and commercial enterprises. Topics will focus on White House, CISA/DHS Zero Trust Architecture requirements and guidelines, including the five pillars of Zero Trust, as well as the importance of an inventory of assets, including data, in building a Zero Trust foundation.

Top cybersecurity experts will participate in the webinar including Charles (Chuck) Brooks, President of Brooks Consulting International, Gregory (Greg) Touhill, Director of the CERT Division at the Carnegie Mellon University Software Engineering Institute, and Tyler Cohen Wood, National Security Consultant and VoiceAmerica Talk Show Host.

See Event

Seyfarth and NY Metro InfraGard Present: Lunch with America’s Cybersecurity Influencers

Location: Virtual    Date : October 06, 2021 - October 06, 2021     Organizer: Seyfarth

Join Seyfarth and NY Metro InfraGard on Wednesday October 6th, 2021 at 1 pm ET for an exclusive presentation on the importance of carrying out the cybersecurity basics, an often overlooked yet critical issue required to strength your cybersecurity posture and resiliency. Despite some well-meaning intentions from both government and the private sector, attacks continue to cause havoc in America on a daily basis, whether through malware, ransomware, social engineering, or a combination of all the above. Join some of the most important cyber and information security influencers on the Internet today on how carrying out the cybersecurity basics can make a significant difference in securing your organization and strengthening our country. We look forward to your participation.

See Event

The Urgency of Protecting Critical Infrastructure from both digital and physical threats

Location: Virtual    Date : November 18, 2021 - November 18, 2021     Organizer: Global Cybersecurity Association (GCA)

Protecting our critical infrastructure from both cyber and physical threats will be a
key challenge in 2021 and the years following as already evidenced by attacks on
pipelines, power, and water treatment plants. What are the most pressing
challenges and how can critical infrastructure be better protected from threats?

See Event

Balancing security + gov cloud innovation

Location: Virtual    Date : October 28, 2020 - October 28, 2020     Organizer: Microsoft Azure Government DC

The proliferation of data combined with the speed of advancing technology bring complex challenges to government’s ability to protect itself from evolving cyberthreats while striving to accelerate cloud innovation.

In support of National Cybersecurity Awareness Month, we invite you to RSVP and join us for a virtual Azure Government Meetup, “Balancing security + gov cloud innovation,” via Teams Live Event.

During this free and open event, government and industry experts will discuss:
• Top security challenges and approaches for government including Zero Trust
• Current and future security and compliance policies and processes
• The role of automation and its impact on cybersecurity
• Demos of the latest security tools and technologies

See Event

October Cyber Bytes Networking Event: Election Security

Location: Virtual    Date : October 29, 2020 - October 29, 2020     Organizer: Cyber Bytes Foundation

Join us for our next Cyber Bytes Networking Event on Election Security. The virtual event is set to take place on Thursday, October 29, 2020 at 3 pm. Register today.

See Event

Contact Chuck Brooks

Book Chuck Brooks for Speaking

Book a Video Meeting

Media Kit

Share Profile

Contact Info

  Profile

Chuck Brooks


Latest Activity

Latest Opportunities

Latest Member Blogs

Search
How do I climb the Thinkers360 thought leadership leaderboards?
What enterprise services are offered by Thinkers360?
How can I run a B2B Influencer Marketing campaign on Thinkers360?