Chuck Brooks Subject Matter Expert & Thought leader: Cybersecurity & Homeland Security Emerging Technologies: Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things Government Relations & Marketing: “How to do business in Washington DC” Named by LinkedIn as the #2 Person you should be following on Tech issues out of 450 million members Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and serves on Boards to several prominent public and private companies and organizations. He is a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense
40
Embed
Chuck brooks profile on cybersecurity, homeland security, and emerging technologies
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Government Relations & Marketing: “How to do business in
Washington DC”
Named by LinkedIn as the #2 Person you should be following on Tech issues out of 450 million members
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for
Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets.
Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and serves on Boards to several prominent public and private companies and organizations. He is a subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense
Technical Information Center (DTIC). Chuck also advised the Bill and Melinda Gates Technology
Partner network, Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three
large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent
six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty
Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. Chuck is widely published on the subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity
Summary of Experience:
* Corporate: Extensive service in Senior Executive Management, Government Relations (also
Lobbying & PAC management), External Relations, and Business Development/Sales for three large public corporations. Managed own successful PR and Government Relations consulting
firm.
* Government: Appointee of two Presidents, George W. Bush (DHS), and Ronald Reagan (Voice
of America). Helped "stand up" Office of Legislative Affairs at the US Department of Homeland Security and served as the first Director of Legislative Affairs at the Science & Technology
Directorate. Served as a Senior Legislative Staff (defense & foreign affairs, national security, business) to the late Senator Arlen Specter at the U.S. Senate.
* Affiliations:
Former Technology Partner Advisor, Bill and Melinda Gates Foundation Chairman, CompTIA New and Emerging Technology Committee
PASSCODE INFLUENCER, Christian Science Monitor He is a subject Matter Expert to The Homeland Defense and Security Information
Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC)
Advisory Board, Center for Advancing innovation Board of Directors, Ecrypt (public company now called Bravatek)
Board of Advisors, Cyber Resilience Institute Board of Advisors CyberTECH
Board of Advisor B2B Cybersecurity Member, AFCEA Cybersecurity Committee
Member, Professional Services Council Homeland Security Task Force Governance Committee of the IJIS Institute (supported by DHS & DOJ) Board of Directors of the Safe America Foundation
Board of Directors of the Franklin Foundation (Innovation and Stem focus)
Board of Directors of “One World For Life” (Emergency Management focus)
Lead Judge, the 2013 and 2014, 2015, and 2016 Homeland Security/Border Security Awards (Government Security News)
* Media: Digital; Co-leader of two of the most prominent Homeland Security Groups on Linked
In (“Homeland Security”, “US Homeland Security, DHS” (over 50,000 combined members). Top
1% viewed profile on LinkedIn. 32,000 first degree connections, mostly executive level. Over 2,500 followers on Twitter. Traditional Media; Writer/speaker; expertise areas include:
homeland security, cyber security, intelligence, defense, foreign affairs, IT, R & D, science & technology, political risk, strategic partnering, business development/sales, government
relations, legislative/budget processes, thought leadership, innovation, and social media. (Huffington Post, Forbes, Government Security News (regular contributor) .The Hill (featured
contributor), Federal Times (featured contributor), Christian Science Monitor (Member of Passcode Influencers Panel) Government Executive, MIT Sloan Blog, Homeland Security Today,
* Academia: Former Adjunct Faculty at Johns Hopkins University (taught graduate level course for two years). Produced webinar on DHS & Cybersecurity for George Washington University
Cybersecurity Marketer of the Year 2016,17 – Chuck Brooks
Chuck Brooks (Sutherland Government Solutions) – WINNER
which incorporates fresh/unexpected content to help keep readers
interested and foster conversation.
Featured Speaker:
National Academy of Sciences/FBI Biosecurity Meeting 2016
USTRANSCOM Cybersecurity Roundtable 2017 The Information Systems Security Association (ISSA) 2017 Mid Atlantic Conference George Washington University Cybersecurity event Institute of Management Consultants Conference 2016 Critical Security Controls Editorial Panel, Council on Cybersecurity
DC Cybersecurity Summit (Securing The IoT) 2016
CRM Summit (The Internet of Things, Cyber-Security, and Government Readiness) 2016 National Cybersecurity Institute
CyberMaryland conference 2014/15 National Press Club, Global Business News events 2014/15
Featured Panelist on Cybersecurity, Open Innovations Forum (MIT Technology Review co-sponsor)
Issue area topics of writings/presentations/interviews/:
Cybersecurity Homeland Security
Emerging Technologies Transaction Processing
3-D Printing
Big Data Internet of Things (IoT)
Wearables Cloud Computing
Context-aware Computing Artificial Intelligence
Critical Infrastructure Protection and Information Assurance Data-Centers and Data-Center Consolidation
Digital Government Digital Trust and Identity Integration and Management
Digitization and Imaging Defined Leading Edge Technologies Mobility Outsourcing IT Services Contact Centers
Sensors, Devices and Radio Frequency Identification (RFID) Software Development
Virtualization Web Analytics
Example Speech Topics: “The Cybersecurity Threat to You and Your Business”, “Understanding Cybersecurity”, “New Technologies and Strategies for Ensuring Physical and
Cybersecurity”, “The Dawn of a New Technological Era”, How to Do Business In Washington, DC”, “How to Use Social Media to Brand, Market, and Win Business”
Links to Writings, Webinars, Conference Speeches, Radio
Interviews:
5 Tech Voices You Should Be Following on LinkedIn https://business.linkedin.com/marketing-
Homeland Security wins in Trump budget, especially in cybersecurity [Commentary] http://fifthdomain.com/2017/03/17/homeland-security-wins-in-trump-budget-especially-in-
cybersecurity-commentary/
The cybersecurity priority for DHS in 2017 http://www.federaltimes.com/articles/the-cybersecurity-priority-for-dhs-in-2017
Congress had an office that gave expert tech analysis; let's bring it back
Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise https://www.alienvault.com/blogs/security-essentials/recent-attacks-demonstrate-the-urgent-need-
for-c-suite-cybersecurty-expertise
Will Vulnerable U.S. Electric Grid Get a New Protection
Cyber Defense in an Imperfect World, a New Approach http://www.brinknews.com/cyber-
defense-in-an-imperfect-world-a-new-approach/
Elections at Risk in Cyberspace, Part IV: Securing the Vote | SIGNAL Magazine http://www.afcea.org/content/?q=Article-elections-risk-cyberspace-part-iv-securing-vote
US must invest more in advanced computing http://thehill.com/blogs/pundits-
Future Watch – Follow The Tech Leader http://bizcatalyst360.com/future-watch-follow-the-tech-
leader/
Gen Touhill brings vision, strategy as nation’s first CISO http://www.federaltimes.com/articles/gen-touhill-brings-vision-strategy-as-nations-first-ciso
The Emerging Trend of Gamification in Cybersecurity
Pathway To The New Era of Quantum Computing https://ctovision.com/2016/06/pathway-new-era-quantu m-computing/
UK/US Cybersecurity Will Thrive With or Without Brexit http://www.itsecurityplanet.com/from-the-newsroom/uk/us-cybersecurity-cooperation-will-thrive-with-or-without-brexitooperation
Creating a Digital Career Path for Native Americans http://www.federaltimes.com/story/government/dhs/blog/2016/05/16/creating-digital-career-path-native-americans/84455826/
The Rise of the Chief Data Officer https://www.alienvault.com/blogs/security-essentials/the-rise-of-the-chief-data-officer
Ransomware Trending as Weapon of Choice for Hackers http://www.itsecurityplanet.com/from-the-newsroom/ransomware-trending-as-weapon-of-choice-for-hackers
The Government Explores Artificial Intelligence http://thehill.com/blogs/pundits-
The Cusp of Technological Transformation http://www.itsecurityplanet.com/from-the-newsroom/the-cusp-of-technological-transformation
The Globality Quotient: Cybersecurity (Chuck Brooks Interviewed) http://bizcatalyst360.com/the-global-quotient-cybersecurity/
Chuck Brooks on Cybersecurity: The Weakest Link Will Always Be the Human Element http://www.govtech.com/dc/articles/Chuck-Brooks-on-Cybersecurity-The-Weakest-Link-Will-Always-Be-the-Human-Element.html
DHS's ongoing challenge: Securing soft targets by Chuck Brooks
3 of the biggest concerns about external cyber threats Phishing attacks employing malware, especially
ransomware, i s a top cybersecurity concern of Chuck Brooks (@ChuckDBrooks), vice president of government relations and
marketing at Sutherland Global Services. “Anyone and everyone is vulnerable,” he said. “The expanding interconnectivity of our
devices and the Internet of Things also makes malware a network threat. And with these kinds of phishing attacks, i t is often
quite difficult to find and prosecute the perpetrators.” http://theartofthehack.com/3-of-the-biggest-concerns-
about-external-cyber-threats/
Government R&D can be a catalyst for technological progress http://thehill.com/blogs/pundits-blog/technology/267944-government-rd-can-be-a-catalyst-for-technological-progress
The GSN 2015 Digital Yearbook of Awards- Judge Chuck Brooks Interview
Key homeland security priorities to watch in 2016 http://www.federaltimes.com/story/government/dhs/blog/2015/12/15/key-homeland-security-priorities-watch-2016/77368604/
Seven astounding technology trends for 2016 http://www.securityinfowatch.com/article/12151224/seven-top-technology-trends-for-2016
HSN Charles Brooks Interview - The Threat Cyber-security Poses to Homeland Security http://homelandsecuritynet.com/component/contushdvideoshare/player/hsn-tv/hsn-charles-brook-interview?Itemid=
The Internet Of Things (IoT) Has Arrived – What You Should Know
Terror bulletins, alerts or nothing at all: Feds try for happy medium ( Chuck Brooks interviewed) http://www.federaltimes.com/story/government/dhs/2016/02/08/homeland-
Does Government Need ‘Hardware-Separated’ Operating Systems?: http://www.nextgov.com/technology-news/tech-insider/2015/09/does-government-need-hardware-separated-operating-systems/121826/
Winning With Women - an interview with Chuck Brooks: https://milspray.wordpress.com/2015/09/02/winning-with-women-wednesday-first-male-
The Four Pillars to Navigating Washington, DC (The Hill) http://thehill.com/blogs/pundits-blog/washington-metro-news/217783-navigating-the-four-pillars-of-Washington
Interview with Chuck Brooks on key Homeland Security Issues for 2015 (Government Security News) gsn 2014 digital yearbook of homeland security awards recipients
Homeland Security Interview by Government Security News on Key issues for 2015 http://blog.securityrecruiter.com/2015/02/gsn-2014-digital-yearbook-of-homeland.html
Some catalyzing technologies on the government horizon http://thehill.com/blogs/pundits-
Carahsoft Citizen Engagement Seminar (Chuck Brooks on Panel) https://www.carahsoft.com/learn/event/1733-carahsoft-citizen-engagement-seminar
DHS, FBI stepping up digitization of Records http://archive.federaltimes.com/article/20140827/BLG04/308270010/DHS-FBI-stepping-up-digitization-records
Internet of Things, New Frontier of Technology Convergence http://government.blogs.xerox.com/2014/08/27/iot-new-frontier-technology-convergence/#prettyPhoto
DHS: A decade (and more) of competing congressional oversight http://www.federaltimes.com/article/20140718/BLG04/307180011/DHS-decade-more-competing-congressional-oversight
Huffington Post Cybersecurity Industry Interview With Xerox's Chuck Brooks http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-
Creating resilience with public/private partnerships—and planning (MIT Sloan Blog) http://executive.mit.edu/blog/2014/02/creating-resilience-with-publicprivate-partnerships-and-planning/
DHS’s Special Partnership with Native Americans (Indian Country News) http://www.indiancountrynews.com/index.php/news/26-mainstream-politics/13958-
dhs-s-special-partnership-with-native-americans
TechNOW – Interview with Charles Brooks, VP, Department Homeland Security at Xerox https://www.youtube.com/watch?v=t8WXYOotJh8
Homeland Security is Back in the Limelight By Chuck Brooks (The Hill) http://thehill.com/blogs/pundits-blog/homeland-security/230788-homeland-security-is-back-in-the-limelight
Critical Infrastructure Cybersecurity Takes Center Stage A Decade After The 9/11 Commission
Mining Big Data for What It’s Worth http://government.blogs.xerox.com/2014/12/05/big-
data-what-its-worth/#.VSLft5h0xdg
Charles Brooks to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://www.gsnmagazine.com/article/41412/charles_brooks_linkedin_homeland_s
ecurity_discussi
The public/private imperative to protect the grid by Chuck Brooks (Federal
“Human Factors” and Biometrics at DHS: http://www.biometricupdate.com/author/chuck-brooks
The public/private imperative to protect the grid http://archive.federaltimes.com/article/20140616/BLG04/306160008/The-public-private-imperative-protect-grid
Government Security News 2013 Homeland Security Awards (Lead Judge) http://www.gsnmagazine.com/node/39332?c=federal_agencies_legislative
Securing the Cyber Ecosystem through Protection Projects and Planning (Homeland Security Week presentation) http://www.homelandsecurityexpo.com/speakerinfo.aspx?tp_spkid=105234
Tech Interviews Featured on House Homeland Security Website http://article.wn.com/view/2015/03/13/House_Committee_on_Homeland_Security_S
chedule_for_March_1620/
DHS Secretary Jeh Johnson revitalizes the 'One DHS' vision http://www.federaltimes.com/article/20140513/BLG04/305130012/DHS-Secretary-Jeh-Johnson-revitalizes-One-DHS-vision
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned
from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons learned following last year's bombing tragedy" by Steve
Strategic Cyber Operations Webinar: The Evolving Role of Cybersecurity at the Department of
Homeland Security by Chuck Brooks at GWU http://cps.gwu.edu/strategic-cyber-operations-webinar-evolving-role-cybersecurity-department-homeland-security
“Why You Should be Excited about Future Tech”. Key topics: The digital age and the Internet of Things; Health & Medicine; and, Manufacturing http://www.cata.ca/Media_and_Events/Press_Releases/cata_pr07041401.html
Interview with Chuck Brooks: Talking LinkedIn Strategy with Mark Amtower | Hinge http://www.hingemarketing.com/blog/story/talking-linkedin-strategy-with-mark-
amtower
Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
How Big Data Will Revolutionize Aviation Security (Chuck Brooks Interviewed) http://www.hstoday.us/index.php?id=483&cHash=081010&tx_ttnews%5Btt_news%5D=32217
Xerox’s Charles Brooks: Gov’t Agencies Seek to Accelerate Record Digitization http://blog.executivebiz.com/2014/08/xeroxs-charles-brooks-govt-agencies-seek-
to-accelerate-record-digitization/
Transaction Processing is at the Root of Data Analytics http://government.blogs.xerox.com/2014/06/11/transaction-processing-root-of-data-analytics/#prettyPhoto
BizCatalyst 360: Digital Government Yields Customer Service Innovation http://bizcatalyst360.com/digital-government-yields-customer-service-innovation/
Government Security News: Charles Brooks, Linkedin Homeland Security discussion leader, to present June 26 webinar on evolving DHS role in Strategic Cyber Operations http://gsnmagazine.com/node/41412?c=cyber_security
Digital Government Yields Exciting Innovation http://government.blogs.xerox.com/2014/05/28/digital-government-yields-
Chuck Brooks interview published in SecurityInfoWatch on the application of lessons learned from last year's Boston Marathon bombings. "Boston Marathon a case study in lessons
learned following last year's bombing tragedy" by Steve Lasky http://www.securityinfowatch.com/article/11416172/boston-marathon-security-measures-
make-for-a-different-event
DHS's Special Partnership with Native Americans Homeland Security
Pausing Before Tapping “Connect:” Can Privacy and Security ... http://airpatrolcorp.com/2015/01/27/internetofthings/
The Future of Social Media (Chuck Brooks quote) http://www.business2community.com/social-media/future-social-media-60-experts-share-2014-predictions-0718083
Next Practices Institute Events - Executive Next Practices Institutehttp://www.enpinstitute.com/events/
What Government Agencies Can Learn From The Private Sector (FORBES) http://www.forbes.com/sites/xerox/2013/10/02/government-agencies-eye-contact-centers-for-consolidation-3-takeaways-from-the-private-sector/
Xerox Real Business Radio Online Radio | BlogTalkRadio http://www.blogtalkradio.com/xeroxradio
Interview - Global Radio Talk Show – Interviews with Business Leaders ... http://globalradiotalkshow.com/
Xerox exec Chuck Brooks to discuss global cybersecurity threats at MIT Forum in
Government cyber security programs mandated to go commercial (Cygnus Media): http://mobile.securityinfowatch.com/article/11151600/congressional-hearings-have-called-attention-to-the-need-for-better-cooperation-between-government-agencies-and-the-
private-sector
The National Press Club Hosts Global Leadership Challenges: Government and Private Sector Leaders Share Innovation, Talent and Regulatory Strategies
Combining Legislation and technology for Better Government
Service http://zone.tmcnet.com/topics/articles/355948-combining-legislation-technology-better-government-customer-service.htm
Radio Interview: The U.S. Needs a Proactive Approach To Combat Cybercrime https://www.centerforsecuritypolicy.org/2014/04/16/the-u-s-needs-a-proactive-
approach-to-combat-cybercrime/
Featured Speaker; Symposium on Homeland Security & Defense http://symposiumonhomelandsecurity.com/wp-content/uploads/2015/03/2015-
Interview with Chuck Brooks The Business Edge | VoiceAmerica™ http://www.voiceamerica.com/show/2186/the-business-edge
Featured Speaker; The Counter Terrorist magazine http://www.thecounterterroristmag.com/conference/
Moderator, Technology Conference - Association for Corporate Growth http://www.acg.org/boston/technologyconference.aspx
Featured Speaker: 4th Annual Human Cyber Forensics Conference: https://www.fbcinc.com/e/HCFC/speakers.aspx
Featured Speaker; The CyberMaryland Conference - Federal Business Council, Inc. http://www.fbcinc.com/e/cybermdconference/speakers.aspx
Cybersecurity 2014: Beyond the NIST framework - FedScoop http://fedscoop.com/cybersecurity-2014-beyond-nist-framework/
How Wearable Devices Can Transform Contact Center Operations http://www.customerexperiencereport.com/strategy-and-trends/wearable-devices-can-transform-contact-center-operations/
Interview: TechNOW -- with Charles Brooks, VP, Department Homeland Security at Xerox: What are your Homeland Security
Chuck Brooks, Featured Speaker at Press Club on Doing Business in Washington, DC Washington '14 March - Global HR Newshttp://www.globalbusinessnews.net/conf.asp%3Fcid%3D271
Public/private partnership is key to be competitive in any market. The Know How http://asiasecuritynews.com/6299/publicprivate-partnership-is-key-to-be-competitive-
It was an honor co-presenting with John Perren former Assistant Director of the
Weapons of Mass Destruction Directorate of the FBI, and LTC Scott Appelgate,
Strategic Planner, J5, Cyber Policy Division at US Joint Chiefs Of Staff and Dr.
Frederic Lemieux Professor and Program Director, at the National Security Threat
Convergence: Violent Extremism and Cybersecurity event at George Washington
University
Thursday,
June 30, 2016 from 8:00 AM to 6:00 PM
The Ritz-Carlton Tysons Corner • Learn from Security Experts & Advisors Including:
Chuck Brooks Vice President for Government Relations & Marketing
Sutherland Global Services
Speaking on Panel 1: Protecting the Enterprise from the Growing Risk of Security Breaches as it Relates to the Internet of Things
Meeting: BOARD ON LIFE SCIENCES and BOARD ON CHEMICAL SCIENCES AND
TECHNOLOGY
Safeguarding the Bioeconomy III
Safeguarding the Bioeconomy III: Securing Life Sciences Data Speaker: Charles (Chuck) Brooks serves as the Vice President for Government
Relations & Marketing for Sutherland Global Services. Chuck also serves as Chairman of CompTIA’s New and Emerging Technology Committee, and he
serves as subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DOD)
sponsored organization through the Defense Technical Information Center (DTIC). In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology
Directorate. Chuck also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues .In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago,
and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law. Chuck is widely published on the
subjects of innovation, public/private partnerships, emerging technologies, and issues of homeland security and cybersecurity
From “Cybersecurity is Top Business Priority in 2017” https://www.bebee.com/producer/@dbgrinberg/cybersecurity-is-top-business-priority-in-2017
In assessing the severity of security flaws in cyberspace, I spoke with several experts in the field.
Charles “Chuck” Brooks is the vice president for government relations and marketing for Sutherland Government Solutions. He served at DHS as the first director of legislative affairs
for the Science and Technology Directorate. He ominously points out:
"The reality is that the more digitally interconnected we become in our work and personal
lives, the more vulnerable we become." -- Chuck Brooks
Mr. Brooks adds: "Mitigating cyber threats will grow as a priority for business, and for us personally, if we are to commercially function and prosper."
But how can companies successfully mitigate cyber threats?
His advice: "The C-suites and governing boards of corporations will need to invest in better
enterprise and endpoint security to prevent phishing and malware probes by hackers. This will also require better training of executives and employees in basic information security
measures."
Chuck Brooks wins Marketer of the Year at 2017
Cybersecurity Excellence Awards
Thu, 2017-02-09 01:49 PM
Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of
The New Emerging Technologies Committee for CompTIA, was named winner of
Cybersecurity Marketer of The Year at the 2017 Cybersecurity Excellence Awards.
The 2017 Cybersecurity Excellence Awards recognize companies, products and
individuals that demonstrate excellence, innovation and leadership in information
security. The finalists and winners were selected based on the strength of their
nomination and the popular vote by members of the Information Security
Community (both ratings and comments).
“Congratulations to Chuck Brooks for winning the Cybersecurity Marketer of the Year
category in the 2017 Cybersecurity Excellence Awards,” said Holger Schulze,
founder of the 350,000 member Information Security Community on LinkedIn which
organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners
and finalists reflect the very best in leadership, excellence and innovation in today's cybersecurity industry.”
Chuck's thought leadership writings on cybersecurity have helped shape the public policy debate as he is
respected in industry, in the Federal Government, academia, and on Capitol Hill. He has been a force in
discussing, advocating, promoting cybersecurity issues across digital media, at events, in professional
forums, and with a variety of public policy organizations.
He has been a leading evangelist for cybersecurity, homeland security, and emerging technologies in both
the public and private sectors. He was selected by LinkedIn as “One of the Top 5 Tech People to Follow On
LinkedIn” by LinkedIn. He has been a featured speaker at numerous events and conferences. He recently
presented at a workshop sponsored by The National Academies of Sciences, Engineering, and Medicine and
Brooks
the Federal Bureau of Investigation on Securing Life Sciences Data. He recently spoke at George Washington
University event about the Cyber Threat Spectrum, will be participating soon at USTRANSCOM Senior Leader
Cyber Security Roundtable.
Chuck has authored numerous articles focusing on cybersecurity, homeland security and technology
innovation for many publications including Forbes, Huffington Post, The Hill, Federal Times, IT Security
Planet, Bizcatalyst 360, Next Gov, Alien Vault, Gov Tech, MIT Sloan Blog, Government Security News, and
Brink. Chuck is a pioneer in social media with over 32,000 followers on LinkedIn and a global following and
has brought significant attention to cyber issues from his frequent posts and commentaries. He has been
involved as a judge for the past four years as a Judge for Government Security News’ Annual Homeland
Security Awards.
As a senior executive in government relations, marketing, and management, Chuck brings a unique
experience from service in the public sector, academia, and industry. He serves on a variety of boards,
many of them philanthropic. He brings a substantive knowledge on a broad range of cyber issues and a
special subject matter expertise of cybersecurity and homeland security in government that have benefited
both the not-for-profit, public, and commercial sectors.
Chuck is one of the original “plank holders” at the Department of Homeland Security (DHS). Admiral Jay
Cohen, former Under Secretary for Science & Technology at DHS stated “Chuck B rooks. as Director of
Legislative Affairs at DHS, was INVALUABLE to me, the DHS S&T Directorate, DHS, the Nation AND Congress
in making the "reformation" of DHS S&T a complete success. His Hill/DC acumen, insight, reliability, ability
to develop highly effective congressional interaction/communications is WITHOUT PEER in my nearly 16
years dealing with senior executive branch officials, industry, academia and the Congress.”
Dexter Ingram, Senior Advisor to Interpol, said the following about Chuck “he is a consummate professional
who has a deep understanding of the issues, process, and people involved in the world of homeland security
and Law enforcement. His breadth of experience derived from working on The Hill, in government, in
academia, in industry, and with the media make him truly unique.”
Chuck worked for many years on Capitol Hill for the late Senator Arlen Specter and covered national
security, foreign affairs, and technology issues. He also was a member of the Adjunct Faculty at John
Hopkins University where taught homeland security for two years. He has advised a multitude of
organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and the Center
for Advancing Innovation. He also serves as Chairman of CompTIA’s New and Emerging Technologies
Committee, and is a member of the AFCEA Cybersecurity Committee. He is on the Board of Advisors for
CyberTech, and on the Board of Directors at Bravatek, and the Cyber Resilience Institute. He is an advisor to
R & D cybersecurity company Inzero Systems. He is a subject Matter Expert to The Homeland Defense and
Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization
through the Defense Technical Information Center (DTIC. Chuck also serves as a Christian Science Monitor
“Passcode Influencers Panel member” on Information Security. He has a BA from DePauw University and an
Christian Science Monitor’s Passcode Influencers gathered from 120 experts from across government, the private sector, research, and the privacy advocacy community
s (Chuck) Brooks serves as the Vice President for Government Relations & Marketing
for Sutherland Global Services. Chuck leads Federal and State & Local Government
relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital
Outre Thought Leadership, Strategic Partnering, Branding) for the Federal
a\
Charles (Chuck) Brooks serves as the Vice President for Government Relations &
Marketing for Sutherland Global Services. Chuck leads Federal and State & Local
Government relations activities. He is also responsible for the Marketing portfolio
(Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for
the Federal and State & Local markets. Chuck is also an Advisor to the Bill and Melinda
Gates Technology Partner network and serves on Boards to several prominent public and
private companies and organizations. Chuck has extensive service in Senior Executive
Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the
Department of Homeland Security as the first Director of Legislative Affairs for the
Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior
Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and
technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns
Hopkins University where he taught graduate level students about homeland security and
Congress. He has an MA in International relations from the University of Chicago, and a
BA in Political Science from DePauw University, and a Certificate in International Law
from The Hague. Chuck is widely published on the subjects of innovation, public/private
partnerships, emerging technologies, and issues of homeland security and cybersecurity
State & Local markets. Chuck is also an Advisor to the Bill and Melinda Gates The poles of debate are still forming in the Digital Age. There is
no common philosophy defining what constitutes a "hawk" or a "dove" in cyberwar. International norms for countries' behavior on the Internet are not yet established. There's still no consensus about the appropriate balance between personal privacy and national security when it comes to government surveillance or private-sector encryption. Many companies and organizations are divided about the best defenses that will shield them from online attacks.
Passcode, The Christian Science Monitor's new section on security and privacy, formed an Influencers Poll to foster debate and discussion in this space. We regularly survey a wide swath of in-the-know experts about the most pressing issues – and share their answers and opinions with our readers. To form our pool of Passcode Influencers, we gathered more than 120 experts from across government, the private sector, research, and the privacy advocacy community.
Navigating the four pillars of Washington By Chuck Brooks, contributor
Washington is an eclectic city. It is a metropolis that is thriving economically and socially. Its architectural design is modeled after Paris and it is certainly a city of
cultural diversity and historically interesting neighborhoods. Visually, the site of the
monuments reflecting against the panoramic backdrop of the Potomac River is memorable for both visitors and native Washingtonians alike.
It is really a city like no other city in America. Although it may be geographically
small, Washington serves as the engine of government, an anchor of global financial policy and representation, a seat of institutionalized policymaking organizations, and
as a growing center for business, especially in high tech.
When I first came to Washington, I was overwhelmed by the intensity of life "inside the Beltway." I was enamored with all it had to offer ("Potomac Fever") but uncertain
how to navigate it and decipher how things worked. Looking back, I would like to offer structure and pathways for others contemplating a public service career or
seeking to accomplish tangible objectives for policy and/or business purposes in the
nation's capital.
There are four pillars that comprise the foundation of the operational world of
Washington: government (executive, judicial and legislative branches); commercial (business, including global financial institutions; policy: (academia, think tanks and
associations/organizations); and media (old and new).
These pillars function both individually and collectively. They are intertwined and to
be effective, it is essential to understand their roles and impact on what you hope to
accomplish. Understanding and gaining experience within these pillars that comprise the operational system of Washington takes focus and time. Success can be
realized by navigating the pillars and establishing a strategy of strategic relationship
building and connecting.
Government: There has never been any doubt that government and politics make
Washington tick. Government is not only the basis for tens of thousands of jobs in
the area, but it also serves as the fulcrum for evolving and communicating domestic and international policies. Government is the center for laws and executive orders
overseeing all aspects of our daily life and our professions. The Pentagon, intelligence agencies, and Department of Homeland Security are all based in
Washington because it is the epicenter of power and decision-making. Government
in Washington is by design structured as a system of check and balances. An understanding of how the various branches of government function is essential to
influencing any regulatory outcome whether it be energy, healthcare or a national
security issue. Working on Capitol Hill is invaluable experience and connects to all the pillars and is a special pedigree for mobility in one's career.
Commercial: Although it is not a financial center like New York, Washington has
been transforming over the years as a commercial hub. The World Bank, Federal Reserve, International Financial Corporation and the Chamber of Commerce are
some of the organizations headquartered in the city. Many corporations have also
relocated to the area to be near the action and position themselves for government and commercial opportunities. Both Virginia and Maryland have established high-
tech corridors close to the city for those reasons. The international community with their embassies and trade groups increasingly see Washington as a growing center
for commerce.
Policy: It is not only the pillars of business and government that are cogs in the
machine. Policy organizations (such as the Center for Strategic and International
Studies, the Brookings Institution, the Heritage Foundation, the American Enterprise Institute and the Aspen Institute) that provide issue expertise, training and solutions
are really the enabling fuel. A myriad of think tanks offer the latest insights in domestic and global events on a regular basis. Top local universities (such as Johns
Hopkins's School of Advanced International Studies, George Washington,
Georgetown, American, George Mason, and Maryland), also promote dialogue and informed decision-making and access. The over 6,000 associations and organization
with issue specific interests regularly outreach to key decision–makers who are part
of the public and private sector pillars. Strategic communications and thought leadership are integral tools for persuasion.
Media: The media are disseminators of information, with the duty to circumspect the
activities of the other three pillars. The media's role is a fundamental one; any
system of democratic government cannot operate without transparency and oversight. In Washington, most of the country's key media outlets have
representation. Outside traditional old media, new media has become a force to
consider. Most citizens have constant access and the metrics of public opinion are constantly pulsed. Corporate executives and government leaders use the social
media, especially LinkedIn, Facebook and Twitter as part of their work environments.
Government 2.0 and Business 2.0 are becoming the norms.
Working in one or all of the pillars is helpful in terms of building issue expertise, contacts and gaining a holistic perspective of how Washington really works. This
experience can provide the tactical knowledge to advance your marketing efforts
and/or cause in the public/private world. There is no substitute for experience and for building a personal network to be empowered and effective. To be successful, you
have to always keep abreast of the latest trends and be visible and helpful to your
customer. In the Washington arena, you also have to develop the qualities for resilience and persistence as no one is always on the winning side of issues and
contracts.
Washington will always have its image challenges and be an enigma as to how it
functions, especially to those who have never experienced life inside the Beltway. Exploring and experiencing the four pillars will bring an understanding of how to
navigate a path to success for those who come to this amazing city to make a
If you're in the cybersecurity business, you know the name Chuck Brooks. He is an advisor to the Bill and Melinda Gates Foundation Technology Partner
Network, chairman of CompTIA's New and Emerging Tech Committee, subject
matter expert to the Homeland Defense and Security Information Analysis Center,
“passcode influencer” for The Christian Science Monitor, on the Board of Advisors for CyberTech, and on the Board of Directors at Bravatek and the Cyber Resilience
Institute.
Brooks also has authored numerous articles focusing on cybersecurity, homeland
security and technology innovation for such publications as Forbes, Huffington Post,InformationWeek, MIT Sloan Blog, Computerworld, Federal
My passion for cybersecurity issues was first established over a decade ago during
the time I spent at the Department of Homeland Security’s Science and Technology Directorate. Back then, the threats to our critical infrastructure were not as
pronounced as they are today. Of course we were just beginning to experience the
smartphone era. The field of cybersecurity has evolved exponentially along with the
technologies, networks and connectivity that make up the cyberecosystem. And the
ecosystem is quite diverse and expansive, comprising software, hardware, monitoring, forensics, governance and more. All these elements make it an exciting
area to explore since there is always more to learn from strategy and technology
perspectives. Also, it certainly blends my common career threads.
For anyone’s career focus, studying cybersecurity makes [sense] since it touches everything work- or personal-related. In both the public and private sectors — just
about every CIO survey — cybersecurity is the top concern. And of course, along with
data analytics, cybersecurity is a annually a budget priority of federal spending. DHS
Secretary Jeh Johnson recently described cybersecurity and counterterrorism as the
two top priorities for the protecting the homeland.
What I want to accomplish in this space is to continue being a subject matter expert
in cybersecurity; I enjoy writing and speaking about the varied aspects of the topic
and especially in educating others on how it can impact their lives. My advisory and
board director roles with organizations are a reflection of that interest. When I retire (which is a long way off), I hope to join academia again in a part-time role. I spent
two years at Johns Hopkins University SAIS [School of Advanced International
Studies] teaching graduate students homeland security and found it very fulfilling.
Q. You have one of the most active groups in LinkedIn under the heading of the Department of Homeland Security. How has this helped both
yourself and DHS in feeling the pulse of the cybersecurity industry?
A. I do operate a half dozen groups that focus on homeland security and information
security on LinkedIn, including a few of the largest groups: “U.S. Department of
Homeland Security, DHS” “Information Technology (Homeland & National Security)” and “Homeland Security.”
In all, these groups include about 60,000 people. Among the members are a host of
well-known cybersecurity professionals who often post and comment on issues of
the day. Also, as any news on data breaches or cyberincidents occur, they are often
posted in the LinkedIn groups.
Moderating these groups certainly keeps me updated and in tune with the pulse of
policy. It has also served as a great networking venue to share ideas and information
with some of the best security minds around in both the private and federal sectors.
Many senior-level executives in the federal government are on social sites such as
LinkedIn, GovLoop, Facebook and Twitter. There are an estimated 1.5 million federal government employees who regularly use LinkedIn, including over 65,000
from DHS. Because of the growing need for public/private-sector collaboration and
interface, being actively involved in social media makes a lot of sense.
Q. What is Sutherland Government Relations and what do you do for the company?
A. Sutherland Global Services is a global provider of business processing services,
contact centers, IT service desks and management consulting serving government
and U.S. leading corporations across multiple industries, including health care and
insurance, technology, mortgage and loan services, finance and banking, retail, and travel. Sutherland has 36,000 employees and annual revenues of over $1.2 billion,
[and] was listed in 2015 as one of the fastest growing private companies in America
byInc.
I work for the recently created Sutherland Government Solutions as VP of Government Relations and Marketing, where we are at several agencies and are
known for integrated services for citizen service needs and digital government. Our
cybersecurity operations at Sutherland Government Services are internal, but we do
have a practice in customer relations management after a company or agency has
been breached. Our cybersecurity practice is led by Glenn Schoonover who has a deep technical background. He is a former chief information security officer for the
Army and was responsible for providing network security to the Department of the
Army headquarters. He is also a former senior technology strategist for Worldwide
National Security and Public Safety at Microsoft.
Q. I see you are active in both the public and private sectors when it
comes to cybersecurity. What are the similarities and differences
between these two sectors?
A. The biggest difference is that government is motivated by mission, and the private
sector (for the most part) is driven by profit and loss. The R&D efforts, innovation sector and skilled technical expertise in the private sector has been more robust than
in government. Industry is more agile and able to react to threat trends.
On the federal side, the landscape has really changed over the past few years. [The
U.S. Department of Defense], of course, has had the cybersecurity war-fighting
mission and continues to build upon new requirements for operations and for systems. On the civilian side, DHS takes an increasingly larger role in cybersecurity.
Presidential and congressional directives have mandated that DHS play a growing
and more primary role, especially with protecting critical infrastructure
(transportation, health, energy, finance) that is mostly owned by the private sector.
DHS has to step up its activities in assessing situational awareness, information
sharing, and resilience research and development plans with stakeholders. This has led to a trend in public-private partnering for sharing threat information and in
creating standards and protocols. In both the public and private sectors, training of
the next-generation cybersecurity technical and policy [subject matter experts] is a
major priority.
Q. To date, there seems to be a stand-off between Apple and the federal
government when it comes to iPhone security. What are your thoughts
on this, and can this bring about some lessons learned for the
cybersecurity industry?
A. This is the topic of the day, and it is a complicated issue relating to government
requesting a corporation to provide software to allow access to data. My thoughts
may be a bit different from some of the others in the industry. While I recognize the
importance of privacy and the dire risk of an Orwellian surveillance state, I consider
protecting innocent lives as a mitigating circumstance. What if that data that the FBI is seeking on the terrorist's encrypted phone uncovers a deeper terrorist network
planning more horrific acts? In my opinion, this is a mitigating circumstance.
What should be done is to establish protocols between industry and law enforcement
to cooperate in these type of instances (with proper warrants and assurances) so that
company Internet protocol can be isolated and privacy issues for the company’s customers can be best addressed. I am quite sure Congress will be looking closely at
this case to establish legislation to create a working formula. The lesson for
cybersecurity is that there is a balance between privacy and security that has to be
constantly reviewed in accordance with the threats at hand.
Q. With billions of Inernet of Things devices on the near horizon and zetabytes of data projected by 2020, can we secure and control our
digital processes, or are we headed for a digital train wreck?
A. According to Gartner, there will be nearly 26 billion networked devices on the
Internet of Things (IoT) by 2020. Moreover, it will keep expanding as the cost of
sensors decreases and processing power and bandwidth continue to increase. The fact is that most of these IT networks will have some sort of an IoT-based security
breach. We could be headed for a digital train wreck if IoT security standards are not
adopted. We may have a digital train wreck even if they are adopted. Standards will
have to be developed industry by industry. Protecting a network of medical devices
in a hospital will require different sets of standards than protecting utilities with SCADA [supervisory control and data acquisition] systems that make up the electric
grid. There are a lot of questions, including who enforces compliance? And what are
the liabilities of an IoT breach?
The real danger is that the Internet was not
built for security at its inception; it was built for connectivity. There is some truth to
the notion that your network may someday
be betrayed by your toaster or refrigerator.
One thing is for sure: the Internet of Things
will pose many challenges to cybersecurity and data analytics, much of which we have
yet to contemplate.
Q. You've had the opportunity to
review many cyberdefense technologies. Are we really finding
new solutions that can handle this
explosion of digital processes, or are
we still playing the game of catch-up
and patch-and-pray cybersecurity?
A. New solutions are continually evolving
with threats, but there will always be a need
for better encryption, biometrics, analytics
and automated network security to protect networks and endpoints. It is a perpetual
game of cat and mouse between hackers
and protectors, and there is really no such
thing as being invulnerable.
In a sense, we are continually playing catch-
up and reacting to the last incident with
patches. The weakest link will always be the
human element. However, there are many
new interesting technologies that could significantly impact cybersecurity in the
near future. There are technologies and
algorithms coming out of the national labs,
government, and from private-sector R&D
and startups that have the potential to be disruptive.
CYBERSECURITY EXPERT
CHUCK BROOKS' MASTER LIST
OF CYBERSECURITY TECH
AREAS, PRIORITIES AND
EMERGING TRENDS
Emerging Technology Areas: // Internet of Things
// Wearables
// Drones and robots
// Artificial intelligence
// Smart cities
// Connected transportation
// Quantum computing
Priorities:
// Protecting critical infrastructure
through technologies and Public/Private
cooperation
// Better encryption and biometrics
(quantum encryption, keyless
authentication)
// Automated network-security
correcting systems (self-encrypting
drives)
// Technologies for “real-time” horizon
scanning and monitoring of networks
// Diagnostics and forensics (network
traffic analysis, payload analysis and
endpoint behavior analysis)
// Advanced defense for framework
layers (network, payload, endpoint,
firewalls and antivirus)
// Mobility and BYOD security
// Big data
// Predictive analytics
// Interoperability
Trends:
// Informed risk management
// Emergence of public/private sector
partnerships
Q. Any final comments? And are
there any speaking engagements or
events you are participating in that you would like to announce? Could
you also offer a good source for
information on the subject of
cybersecurity that you would suggest
for our readers?
A. Please check my regular posts in the
media and social media, join my LinkedIn
groups and follow me on Twitter @ChuckDBrooks. I do have some future blogs with
the National Cybersecurity Institute on my agenda. Also, in addition to social media, which I highly recommend, there are many excellent outlets for cybersecurity
information including the Homeland Defense and Security Information Analysis
Center. A great site that aggregated cybersecurity news daily is The CyberWire.
Larry Karisny |
Larry Karisny is the director of Project Safety.org, an advisor, consultant, speaker and writer supporting
advanced cybersecurity technologies in both the public and private sectors.