“I worked with Jon-Michael during my 5 years with the Cloud Security Alliance. Jon-Michael has a impressive track-record of contributing, leading and developing many of CSA's industry leading cloud security best practices. He is a holistic cybersecurity professional that is well-versed in People, Process and Technology. Additionally, Jon-Michael is an excellent communicator and has a keen awareness of who his audience is and can speak to IT professionals from engineering to senior management assuaging any business, technology or security concerns. I enjoyed working with and continue to look forward to future opportunities.”
Jon-Michael C. Brook, CISSP, CCSK
Jupiter, Florida, United States
2K followers
500+ connections
About
• An accomplished business professional experienced in cloud ecosystems, information…
Activity
-
After 8 amazing years, today marks my last day at Starbucks, and I’m filled with a profound sense of gratitude and pride. I’ve been lucky to work…
After 8 amazing years, today marks my last day at Starbucks, and I’m filled with a profound sense of gratitude and pride. I’ve been lucky to work…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
Well, that’s a wrap on RSAC week 🎉 What. A. Week. It kicked off with 🏎️ Kyle Rosenthal 🏁 at a legendary gathering of security pros and their +1s…
Well, that’s a wrap on RSAC week 🎉 What. A. Week. It kicked off with 🏎️ Kyle Rosenthal 🏁 at a legendary gathering of security pros and their +1s…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
A PERSONAL UPDATE Over the past few weeks, I’ve been mostly absent from work, events, and online conversations including my normal posts here. I…
A PERSONAL UPDATE Over the past few weeks, I’ve been mostly absent from work, events, and online conversations including my normal posts here. I…
Liked by Jon-Michael C. Brook, CISSP, CCSK
Experience
Education
-
University of South Florida
-
-
Activities and Societies: Executive MBA program
2006 - Indianapolis Racing League - The Great Indy Challenge - Marketing Plan Winner
-
-
-
Licenses & Certifications
-
Microsoft Certified Systems Engineer
Microsoft
IssuedCredential ID 1832427 -
Certified Information Systems Security Professional
International Information Systems Security Certification Consortium
Issued ExpiresCredential ID 25593 -
GIAC Certified Intrusion Analyst (GCIA) Gold
Sans Institute
Issued ExpiresCredential ID 394 -
Symantec Sales Expert - Data Loss Prevention 10.5
Symantec
Issued Expires -
Symantec Technical Specialist - Data Loss Prevention 10.5
Symantec
Issued Expires -
Symantec Technical Specialist - Endpoint Protection 11 MR4
Symantec
Issued Expires -
Symantec Technical Specialist - Network Access Control 11
Symantec
Issued Expires -
Symantec Technical Specialist - Brightmail Gateway 8.0
Symantec
Issued Expires -
GIAC Security Essentials Certification (GSEC) Gold
SANS Institute
Issued ExpiresCredential ID 1650 -
Cisco Certified Network Professional (CCNP)
Cisco
Issued ExpiresCredential ID CSCO10145952
Publications
-
What Do We Need for Privacy in the Cloud?
2016 InfoSec World
See publication
Yesterday's legislated "private" data comes from a handful of common sources. The price on the black market isn't nearly what you'd think. The real treasure are today's privacy "diamonds in the rough". With further cloud adoption and new technologies, the advancement/proliferation of these diamonds will continue. Knowing who wants the information, how they may be combated and what advancements will be necessary to continue privacy protections will be key in the future.
-
The Treacherous 12 – Cloud Computing Top Threats in 2016
Cloud Security Alliance
"The Treacherous 12 – Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The report provides organizations with up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The report reflects the current consensus among security experts in CSA community about the most significant security issues in the cloud.
Other authorsSee publication -
Why should you trust your broker more than your banker? The top 5 3/4 things learned brokering clouds.
2014 IAPP Privacy Academy / CSA Congress
See publicationIf analyzing a move to a public cloud service provider has you scared, hold onto your pants. In this presentation, we’ll review brokerage tricks and traps uncovered working with customers in the most regulated environments, including examples from government, healthcare and finance.
-
Is Crypto in the Cloud Enough?
Information Security Magazine
See publicationBox.net, DropBox, iCloud, SkyDrive, Amazon Cloud Drive... the list goes on for convenient cloud storage options. Some have had a security incident; the rest will. All implement some form of protection against accidental exposure with varying degrees of protection. Are these sufficient and, in the ones claiming cryptographic isolation, truly implemented in a manner enough for more than sharing pictures of the kids with Aunt Betty? We’ll examine the technologies, architectures, risks and…
Box.net, DropBox, iCloud, SkyDrive, Amazon Cloud Drive... the list goes on for convenient cloud storage options. Some have had a security incident; the rest will. All implement some form of protection against accidental exposure with varying degrees of protection. Are these sufficient and, in the ones claiming cryptographic isolation, truly implemented in a manner enough for more than sharing pictures of the kids with Aunt Betty? We’ll examine the technologies, architectures, risks and mitigations associated with cloud storage and the cryptographic techniques employed.
-
Deprovisioning in the Cloud
Information Security Magazine
See publicationLet's be honest: how many of you have tried logging in to one of your former employer’s accounts? Maybe you had a CRM solution and you wanted to get the name of that guy who suggested he had the next hot idea. You didn't set your out-of-office message with your new/personal contact information in the hosted email service. The travel site for the previous company was just plain better than anything else you can access. As security professionals, we know the risks: the lag time for deprovisioning…
Let's be honest: how many of you have tried logging in to one of your former employer’s accounts? Maybe you had a CRM solution and you wanted to get the name of that guy who suggested he had the next hot idea. You didn't set your out-of-office message with your new/personal contact information in the hosted email service. The travel site for the previous company was just plain better than anything else you can access. As security professionals, we know the risks: the lag time for deprovisioning varies, but best practices suggest when an employee walks out the door, all of his administrative access shuts down as it closes. That has been harder to do in the cloud. Even with SAML tokens and a smathering of open standards for authentication, inconsistent support by SaaS providers and spotty enterprise directory integration leave opportunities for exploitation that simply don't exist in the on-premise IT world.
-
Profiting in the Cloud
Heavy Reading / Symantec
Cloud computing represents a significant market opportunity for communications service providers (CSPs). CSPs are in an excellent position to add cloud services to existing enterprise connectivity and hosting portfolios, and many have advanced plans for doing so.
CSPs that can provide cloud services with the highest levels of trust and availability at the lowest cost will profit most from the cloud. Such CSPs will persuade a critical mass of enterprises to migrate to the cloud and…Cloud computing represents a significant market opportunity for communications service providers (CSPs). CSPs are in an excellent position to add cloud services to existing enterprise connectivity and hosting portfolios, and many have advanced plans for doing so.
CSPs that can provide cloud services with the highest levels of trust and availability at the lowest cost will profit most from the cloud. Such CSPs will persuade a critical mass of enterprises to migrate to the cloud and benefit from the increased revenues this will bring.
Other authorsSee publication -
Federated Anonymization: Interagency Information Sharing Without Violating Personal Liberty Rights
2009 DoD Cybercrime Conference
See publicationPersonally Identifiable Information (PII) collection occurs daily, when a doctor’s office asks for a social security number, or a bank confirms your name and date of birth prior to accepting a check deposit. Laws govern day-to-day PII collection within the banking (FACT Act ), medical (HIPPA ), and telephone (TCPA ) industries. Within the law enforcement and intelligence arenas, similar laws apply. The 1968 Wiretap Act and FISA require warrants prior to surveillance.
During the…Personally Identifiable Information (PII) collection occurs daily, when a doctor’s office asks for a social security number, or a bank confirms your name and date of birth prior to accepting a check deposit. Laws govern day-to-day PII collection within the banking (FACT Act ), medical (HIPPA ), and telephone (TCPA ) industries. Within the law enforcement and intelligence arenas, similar laws apply. The 1968 Wiretap Act and FISA require warrants prior to surveillance.
During the course of a legal investigation, PII collection opens a host of liability issues and questions regarding probable cause and stirs enormous controversy within the privacy arena, especially with regards to PII storage and sharing. The problems with sensitive disclosures are well reported with 1 out of 4 US citizens experiencing a PII disclosure , and numerous agencies, the VA and NSA notwithstanding, receive black eyes for misappropriate data handling. Ignoring the storage problems, once collected, how can evidence be shared between departments or agencies without violating someone’s civil liberties? May data mining be done in those circumstances, where a possible match is not even known to exist?
Anonymization is one step in mitigating disclosure risks within an organization. Generically, anonymization replaces sensitive identifying data elements with a non-sensitive identifier. The sensitive data, such as a social security number, may thereby be separated from the non-sensitive data. How the split occurs controls what other actions may be performed later and what residual risks remain. -
Pseudonymization Methodologies: Personal Liberty vs. the Greater Good
2008 HOPE Conference
See publicationThink of four facts that can separate you from the rest of the general populous: name, address, date of birth, or Social Security Number perhaps. They are all likely what's currently referred to as Personally Identifiable Information (PII). In the data privacy realm, PII disclosure is the CSI trace evidence that corporations are increasingly finding themselves as silhouettes within blood splatter patterns on the wall. These PII disclosures may be avoided through the use of anonymization, or…
Think of four facts that can separate you from the rest of the general populous: name, address, date of birth, or Social Security Number perhaps. They are all likely what's currently referred to as Personally Identifiable Information (PII). In the data privacy realm, PII disclosure is the CSI trace evidence that corporations are increasingly finding themselves as silhouettes within blood splatter patterns on the wall. These PII disclosures may be avoided through the use of anonymization, or more importantly, pseudonymization. This talk will focus on the history, methodology, benefits, risks and mitigations, and current players, as well as provide a demonstration of the technology.
-
Data Encryption for Better Information Sharing
2008 DoD CyberCrime Conference
See publicationAn information sharing problem exists, sometimes referred to as an electronic tearline. In essence, it is a computer version of a perforated document, where information inappropriate for a user is simply torn off. Executive Order 13356 describes a system:
“(b) requiring records and reports related to terrorism information to be produced with multiple versions at an unclassified level and at varying levels of classification, for multiple versions at an unclassified level and at varying…An information sharing problem exists, sometimes referred to as an electronic tearline. In essence, it is a computer version of a perforated document, where information inappropriate for a user is simply torn off. Executive Order 13356 describes a system:
“(b) requiring records and reports related to terrorism information to be produced with multiple versions at an unclassified level and at varying levels of classification, for multiple versions at an unclassified level and at varying levels of classification, for example on an electronic tearline basis, allowing varying degrees of access by other agencies and personnel commensurate with their particular security clearance levels and special access approvals;”
Currently, no solution can send a single document which effectively presents information appropriate to a recipient’s classification level and need-to-know. Congressional legislation, IT plans and industry effort descriptions similar to Executive Order 13356 specifically name eXtensible Markup Language (XML) data tagging as a possible solution.
Existing Technology Solutions
Current tearline solutions miss for various reasons, including complexity, excessive risk of compromise, or exorbitant resource/monetary costs. Rights management solutions adopted products like XrML (XrightsML) from Content Guard & Entertrust, but have not been applied to tearline like problems for similar reasons.
Patents
-
Dynamic Rule Generation for an Enterprise Intrusion Detection System
Issued US 7,895,649
A method for dynamically generating rules for an enterprise intrusion detection system comprises receiving a packet flow from a sensor. The packet flow is dynamically processed to detect if the packet flow represents an attack on the enterprise system. A response message is automatically generated in response to the attack, the response message comprising a signature to identify the attack. The response message is automatically communicated to a response message file, the response message file…
A method for dynamically generating rules for an enterprise intrusion detection system comprises receiving a packet flow from a sensor. The packet flow is dynamically processed to detect if the packet flow represents an attack on the enterprise system. A response message is automatically generated in response to the attack, the response message comprising a signature to identify the attack. The response message is automatically communicated to a response message file, the response message file comprising at least one response message.
Other inventorsSee patent -
Vertically extensible intrusion detection system and method
Issued US 7,356,585
A method for vertically extensible intrusion detection for an enterprise comprises receiving a first packet flow from a first node, the first packet flow comprising at least a portion of packet headers received at the first node during a first timeframe and receiving a second packet flow, the second packet flow comprising at least a portion of packet headers received at the second node during a second timeframe. The first and second packet flow are processed to detect an attack on the…
A method for vertically extensible intrusion detection for an enterprise comprises receiving a first packet flow from a first node, the first packet flow comprising at least a portion of packet headers received at the first node during a first timeframe and receiving a second packet flow, the second packet flow comprising at least a portion of packet headers received at the second node during a second timeframe. The first and second packet flow are processed to detect an attack on the enterprise system. In response to the attack, an alert message is communicated to a master server, a response message is received from the master server, the response message comprising a signature to impede the attack, and the response message is automatically communicated to the first node and the second node.
Other inventorsSee patent -
Graphical user interface for an enterprise intrusion detection system
Issued US 7,293,238
A method for interfacing with a user of an enterprise intrusion detection system, the method comprises receiving at least one packet flow, each packet flow originating from a unique node in the intrusion detection system and comprising descriptive information and a plurality of packet headers. The descriptive information of a first subset of the received packet flows is communicated to a user based at least in part on a filtering ruleset. A second subset of the received packet flows is…
A method for interfacing with a user of an enterprise intrusion detection system, the method comprises receiving at least one packet flow, each packet flow originating from a unique node in the intrusion detection system and comprising descriptive information and a plurality of packet headers. The descriptive information of a first subset of the received packet flows is communicated to a user based at least in part on a filtering ruleset. A second subset of the received packet flows is concealed from the user based at least in part on the filtering ruleset. In response to receiving a command from the user, the plurality of packet headers for at least one packet flow in the first subset is communicated to the user.
Other inventorsSee patent
Courses
-
Accounting
-
-
Business Strategy
-
-
Marketing
-
Recommendations received
23 people have recommended Jon-Michael C.
Join now to viewMore activity by Jon-Michael C.
-
For the first time in 20 years, I will be missing the festivities at RSAC. I wish all of my friends the best of times and want you to know that I’ll…
For the first time in 20 years, I will be missing the festivities at RSAC. I wish all of my friends the best of times and want you to know that I’ll…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
Per the norm, the year is already off to a big start for us! We just launched our 3 fabulous new everyday flavors, and they are rolling out to…
Per the norm, the year is already off to a big start for us! We just launched our 3 fabulous new everyday flavors, and they are rolling out to…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
Our CMO Kathy Maurella sat down with Marketing Dive to discuss how we're elevating our approach to social media following the appointment of our new…
Our CMO Kathy Maurella sat down with Marketing Dive to discuss how we're elevating our approach to social media following the appointment of our new…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
Representing the Cloud Security Alliance with John Yeoh at the [un]promoted conference…
Representing the Cloud Security Alliance with John Yeoh at the [un]promoted conference…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
I'm insanely excited to announce that on October 1st I start full-time at the Cloud Security Alliance as Chief Analyst. I've been joking that we…
I'm insanely excited to announce that on October 1st I start full-time at the Cloud Security Alliance as Chief Analyst. I've been joking that we…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
I think there are three kinds of Hacker Summer Camp "posts". ▶️ Some people don't really post at all, just the "I'm here". ▶️ Some post verbose…
I think there are three kinds of Hacker Summer Camp "posts". ▶️ Some people don't really post at all, just the "I'm here". ▶️ Some post verbose…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
Today marks the first day of my new chapter after 10 years with Starbucks. I’ll be forever grateful for the friendships, opportunities, and…
Today marks the first day of my new chapter after 10 years with Starbucks. I’ll be forever grateful for the friendships, opportunities, and…
Liked by Jon-Michael C. Brook, CISSP, CCSK
-
– A Note of Gratitude – Nine years ago, I walked through Starbucks’ doors not knowing just how much this place—and its people—would shape me. Today,…
– A Note of Gratitude – Nine years ago, I walked through Starbucks’ doors not knowing just how much this place—and its people—would shape me. Today,…
Liked by Jon-Michael C. Brook, CISSP, CCSK
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content