Christopher Hickernell
Haines City, Florida, United States
336 followers
260 connections
About
Security Manager with over 20 years of experience in the IT industry. Capable of building…
Articles by Christopher
Activity
-
New Year Message to My Network — 2026 As 2025 comes to a close, I’ve been reflecting on the people who make this profession meaningful. Whether…
New Year Message to My Network — 2026 As 2025 comes to a close, I’ve been reflecting on the people who make this profession meaningful. Whether…
Liked by Christopher Hickernell
-
"STAR method doesn't help me show impact in interviews." I hear this from software engineers constantly. After tech recruiting for 10+ years and…
"STAR method doesn't help me show impact in interviews." I hear this from software engineers constantly. After tech recruiting for 10+ years and…
Liked by Christopher Hickernell
-
Hump Day Humor: Magician Edition Now you see the stress… now you don’t! Here are 10 magician jokes to make your midweek magically hilarious. 1️⃣…
Hump Day Humor: Magician Edition Now you see the stress… now you don’t! Here are 10 magician jokes to make your midweek magically hilarious. 1️⃣…
Liked by Christopher Hickernell
Experience
-
Mitsubishi Heavy Industries America
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
Publications
-
PhotoStack Authentication Protocol For Password-Free Authentication
Master's Thesis
Password authentication has become a very common method to control access to computer information and resources. However, human nature is the major weakness that makes password authentication an insecure method of proving one's identity. Human beings have a limited capacity to remember long and complex strings of characters required for current password-based authentication. This thesis presents an alternative method of authentication that uses easy to remember images without the need for…
Password authentication has become a very common method to control access to computer information and resources. However, human nature is the major weakness that makes password authentication an insecure method of proving one's identity. Human beings have a limited capacity to remember long and complex strings of characters required for current password-based authentication. This thesis presents an alternative method of authentication that uses easy to remember images without the need for special software or hardware. The PhotoStack Authentication Protocol is a novel method of authentication that uses images to facilitate a secret exchange between the user and a web service, obviating the requirement to provide a password during user authentication. A prototype system was developed to demonstrate how the PhotoStack Authentication Protocol may function in a real-world scenario.
Courses
-
AMA-CPM Certified Professional in Management
-
-
Information Security for Information System Security Professionals
NSTISSI 4011
-
Information Security for Information Systems Security Officers
CNSSI 4014
-
Information Security for Risk Analysts
CNSSI 4016
-
Information Security for Senior System Managers
CNSSI 4012
-
Information Security for System Administrators
CNSSI 4013
-
Information Security for System Certifiers
NSTISSI 4015
-
Legal Issues in Information Security
-
Projects
-
IT Security Assessment
-
Over a period of six months and in partnership with the Senior Security Manager, we conducted security assessments for 17 Mitsubishi Heavy Industries (MHI) companies in North America. I was solely responsible for completion of 10 out of the 17 assessments. I worked with the Senior Security Manager to develop a custom assessment methodology--combining requirements and best practices from MHI IT Policy, NIST Cybersecurity Framework, and Center for Internet Security. Each assessment comprised…
Over a period of six months and in partnership with the Senior Security Manager, we conducted security assessments for 17 Mitsubishi Heavy Industries (MHI) companies in North America. I was solely responsible for completion of 10 out of the 17 assessments. I worked with the Senior Security Manager to develop a custom assessment methodology--combining requirements and best practices from MHI IT Policy, NIST Cybersecurity Framework, and Center for Internet Security. Each assessment comprised of a multi-day onsite visit at each company; an analysis and risk assessment; and delivery of an Executive Summary presentation and Findings Report. During the onsite visit, I conducted interviews, network scanning, and artifact gathering to assess the company's security capabilities in 28 different Control Families. Following the onsite visit, I conducted analysis of the findings, completed a risk assessment, and formulated recommended remediation actions. Each company was given maturity ratings in five major security functions--Identify, Protect, Detect, Respond, and Recover. At the close of each assessment, an Executive Summary was presented to representatives from the company and parent organizations. The presentation highlighted the company's security strengths, high priority items, and areas for improvement. Upon completion of the project, my employer presented me with a President's Award for my outstanding achievement and performance.
-
Governance, Risk, and Compliance
-
Implemented a Governance, Risk, and Compliance (GRC) system that centralized evidence gathering, improved documentation, and simplified the management of Compete's Information Security Program and security control framework. Through the Redmine ticketing software, the implementation and execution of security controls are tracked, evidenced, and alerted.
Implemented work-flow management software (Integrify), developed processes, and conducted training for Application Custodians that…Implemented a Governance, Risk, and Compliance (GRC) system that centralized evidence gathering, improved documentation, and simplified the management of Compete's Information Security Program and security control framework. Through the Redmine ticketing software, the implementation and execution of security controls are tracked, evidenced, and alerted.
Implemented work-flow management software (Integrify), developed processes, and conducted training for Application Custodians that improved traceability and simplified execution of Access Termination activities. Traceability is improved, because actions are automatically recorded and timestamped by Integrify. Execution is simplified, because custodians are able to respond using only a few mouse clicks and customized forms. -
Standard Operating Procedure for Certification & Accreditation Activities
-
Led the effort to formalize CNIC’s certification & accreditation activities. Personally authored the Standard Operating Procedure (SOP) that CNIC’s IA workforce would use to develop, review, and submit accreditation packages through the DoD IA Certification process. As part of the SOP, I documented roles and responsibilities, defined protocols for communication, and developed template forms. The SOP was approved by CNIC’s IA Program Manager.
-
Paperless Telephone Billing System
-
Solved the challenge of implementing a paperless telephone billing system to service University departments. Developed a database system that accepted inputs from various systems, analyzed call detail records, and produced and delivered electronic invoices by email. The system produced the necessary SAP transactions that enabled automatic cross-charging of University departments for telephony services.
-
Wireless Network Engineering
-
Re-engineered the wireless network infrastructure to expand wireless services, centralize administration, simplify configurations, and increase security. I implemented WPA2 authentication with AES encryption to activate the network's 802.11n capabilities. I diagrammed and modeled the wireless access point deployment for all campus facilities. I conducted site surveys, assessed wireless coverage patterns, and relocated access points to improve performance. I developed wireless user guides…
Re-engineered the wireless network infrastructure to expand wireless services, centralize administration, simplify configurations, and increase security. I implemented WPA2 authentication with AES encryption to activate the network's 802.11n capabilities. I diagrammed and modeled the wireless access point deployment for all campus facilities. I conducted site surveys, assessed wireless coverage patterns, and relocated access points to improve performance. I developed wireless user guides, communications, and configuration utilities.
Recommendations received
2 people have recommended Christopher
Join now to viewMore activity by Christopher
-
📚My Cybersecurity Study Routine Inside an Offline Home Lab Everything I do happens inside my fully offline cybersecurity lab, built on my own…
📚My Cybersecurity Study Routine Inside an Offline Home Lab Everything I do happens inside my fully offline cybersecurity lab, built on my own…
Liked by Christopher Hickernell
-
We're losing CISOs faster than we can develop them. Not to competitors. To exhaustion. A recent industry report showed that cybersecurity…
We're losing CISOs faster than we can develop them. Not to competitors. To exhaustion. A recent industry report showed that cybersecurity…
Liked by Christopher Hickernell
-
As professionals, we have an obligation to use terminology correctly. Inaccurate or incorrect statements tarnish our reputation, we lose credibility,…
As professionals, we have an obligation to use terminology correctly. Inaccurate or incorrect statements tarnish our reputation, we lose credibility,…
Posted by Christopher Hickernell
-
The best analysts are built, not hired. No one walks into a SOC knowing how to triage an alert, pivot through logs, or write detection logic. You…
The best analysts are built, not hired. No one walks into a SOC knowing how to triage an alert, pivot through logs, or write detection logic. You…
Liked by Christopher Hickernell
-
“Those who can’t ‘do,’ teach.” I’ve never disagreed more. Over the years, I’ve learned that the people who make the greatest impact in business…
“Those who can’t ‘do,’ teach.” I’ve never disagreed more. Over the years, I’ve learned that the people who make the greatest impact in business…
Liked by Christopher Hickernell
-
Cybersecurity is hard. Why? In cybersecurity, we are often perceived as individuals who are rigid and rule-bound. We are expected to be "cut and…
Cybersecurity is hard. Why? In cybersecurity, we are often perceived as individuals who are rigid and rule-bound. We are expected to be "cut and…
Posted by Christopher Hickernell
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Christopher Hickernell
4 others named Christopher Hickernell are on LinkedIn
See others named Christopher Hickernell