Christopher Hickernell

Christopher Hickernell

Haines City, Florida, United States
336 followers 260 connections

About

Security Manager with over 20 years of experience in the IT industry. Capable of building…

Articles by Christopher

  • Cybersecurity 101

    Overview Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks…

    6 Comments
  • A Call For Experts

    The world is full of problems--big problems, such as global warming, epidemics, and poverty. We are encountering new…

Activity

Join now to see all activity

Experience

  • Mitsubishi Heavy Industries America

  • -

  • -

  • -

  • -

    Orlando, Florida Area

  • -

    Orlando, Fl

  • -

    Orlando, Florida Area

  • -

    Orlando, Fl

  • -

    University of Wisconsin-Madison

  • -

    University of Wisconsin-Madison

  • -

    Greater Boston Area

  • -

    Washington D.C. Metro Area

  • -

    Clarion, PA

  • -

    Greater Philadelphia Area

  • -

    Clarion, PA

Education

Licenses & Certifications

Publications

  • PhotoStack Authentication Protocol For Password-Free Authentication

    Master's Thesis

    Password authentication has become a very common method to control access to computer information and resources. However, human nature is the major weakness that makes password authentication an insecure method of proving one's identity. Human beings have a limited capacity to remember long and complex strings of characters required for current password-based authentication. This thesis presents an alternative method of authentication that uses easy to remember images without the need for…

    Password authentication has become a very common method to control access to computer information and resources. However, human nature is the major weakness that makes password authentication an insecure method of proving one's identity. Human beings have a limited capacity to remember long and complex strings of characters required for current password-based authentication. This thesis presents an alternative method of authentication that uses easy to remember images without the need for special software or hardware. The PhotoStack Authentication Protocol is a novel method of authentication that uses images to facilitate a secret exchange between the user and a web service, obviating the requirement to provide a password during user authentication. A prototype system was developed to demonstrate how the PhotoStack Authentication Protocol may function in a real-world scenario.

Courses

  • AMA-CPM Certified Professional in Management

    -

  • Information Security for Information System Security Professionals

    NSTISSI 4011

  • Information Security for Information Systems Security Officers

    CNSSI 4014

  • Information Security for Risk Analysts

    CNSSI 4016

  • Information Security for Senior System Managers

    CNSSI 4012

  • Information Security for System Administrators

    CNSSI 4013

  • Information Security for System Certifiers

    NSTISSI 4015

  • Legal Issues in Information Security

    -

Projects

  • IT Security Assessment

    -

    Over a period of six months and in partnership with the Senior Security Manager, we conducted security assessments for 17 Mitsubishi Heavy Industries (MHI) companies in North America. I was solely responsible for completion of 10 out of the 17 assessments. I worked with the Senior Security Manager to develop a custom assessment methodology--combining requirements and best practices from MHI IT Policy, NIST Cybersecurity Framework, and Center for Internet Security. Each assessment comprised…

    Over a period of six months and in partnership with the Senior Security Manager, we conducted security assessments for 17 Mitsubishi Heavy Industries (MHI) companies in North America. I was solely responsible for completion of 10 out of the 17 assessments. I worked with the Senior Security Manager to develop a custom assessment methodology--combining requirements and best practices from MHI IT Policy, NIST Cybersecurity Framework, and Center for Internet Security. Each assessment comprised of a multi-day onsite visit at each company; an analysis and risk assessment; and delivery of an Executive Summary presentation and Findings Report. During the onsite visit, I conducted interviews, network scanning, and artifact gathering to assess the company's security capabilities in 28 different Control Families. Following the onsite visit, I conducted analysis of the findings, completed a risk assessment, and formulated recommended remediation actions. Each company was given maturity ratings in five major security functions--Identify, Protect, Detect, Respond, and Recover. At the close of each assessment, an Executive Summary was presented to representatives from the company and parent organizations. The presentation highlighted the company's security strengths, high priority items, and areas for improvement. Upon completion of the project, my employer presented me with a President's Award for my outstanding achievement and performance.

  • Governance, Risk, and Compliance

    -

    Implemented a Governance, Risk, and Compliance (GRC) system that centralized evidence gathering, improved documentation, and simplified the management of Compete's Information Security Program and security control framework. Through the Redmine ticketing software, the implementation and execution of security controls are tracked, evidenced, and alerted.

    Implemented work-flow management software (Integrify), developed processes, and conducted training for Application Custodians that…

    Implemented a Governance, Risk, and Compliance (GRC) system that centralized evidence gathering, improved documentation, and simplified the management of Compete's Information Security Program and security control framework. Through the Redmine ticketing software, the implementation and execution of security controls are tracked, evidenced, and alerted.

    Implemented work-flow management software (Integrify), developed processes, and conducted training for Application Custodians that improved traceability and simplified execution of Access Termination activities. Traceability is improved, because actions are automatically recorded and timestamped by Integrify. Execution is simplified, because custodians are able to respond using only a few mouse clicks and customized forms.

  • Standard Operating Procedure for Certification & Accreditation Activities

    -

    Led the effort to formalize CNIC’s certification & accreditation activities. Personally authored the Standard Operating Procedure (SOP) that CNIC’s IA workforce would use to develop, review, and submit accreditation packages through the DoD IA Certification process. As part of the SOP, I documented roles and responsibilities, defined protocols for communication, and developed template forms. The SOP was approved by CNIC’s IA Program Manager.

  • Paperless Telephone Billing System

    -

    Solved the challenge of implementing a paperless telephone billing system to service University departments. Developed a database system that accepted inputs from various systems, analyzed call detail records, and produced and delivered electronic invoices by email. The system produced the necessary SAP transactions that enabled automatic cross-charging of University departments for telephony services.

  • Wireless Network Engineering

    -

    Re-engineered the wireless network infrastructure to expand wireless services, centralize administration, simplify configurations, and increase security. I implemented WPA2 authentication with AES encryption to activate the network's 802.11n capabilities. I diagrammed and modeled the wireless access point deployment for all campus facilities. I conducted site surveys, assessed wireless coverage patterns, and relocated access points to improve performance. I developed wireless user guides…

    Re-engineered the wireless network infrastructure to expand wireless services, centralize administration, simplify configurations, and increase security. I implemented WPA2 authentication with AES encryption to activate the network's 802.11n capabilities. I diagrammed and modeled the wireless access point deployment for all campus facilities. I conducted site surveys, assessed wireless coverage patterns, and relocated access points to improve performance. I developed wireless user guides, communications, and configuration utilities.

Recommendations received

2 people have recommended Christopher

Join now to view

More activity by Christopher

View Christopher’s full profile

  • See who you know in common
  • Get introduced
  • Contact Christopher directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Christopher Hickernell

Add new skills with these courses