Randall Brooks, CISSP, CSSLP

Randall Brooks, CISSP, CSSLP

Orlando, Florida, United States
1K followers 500+ connections

About

Mr. Randall Brooks is a Technical Fellow for Raytheon Technologies (NYSE: RTX). He is the…

Experience

Publications

  • Cloud Computing Security in the Tactical Environment - the Difference a Year Makes

    MILCOM 2015

    A panel discussion on what changes have occurred in Cloud technologies over the last year as they apply to the Tactical Cloud.

    Other authors
    See publication
  • 2005–2015 How Has The Cloud Changed Enterprise Architectures?

    3rd International Conference on Cloud Security and Management ICCSM-2015

    This paper focuses on how the Cloud transforms traditional enterprise security architecture models to handle the security and management needs of the 21st century. It leverages over 10 years of enterprise experience and the lessons learned from cloud security research and industry groups, such as the Cloud Security Alliance (CSA), offering important strategies for adoption and reference examples.

    Other authors
    See publication
  • 2005–2015 How Has The Cloud Changed Enterprise Architectures?

    Privacy. Security. Risk 2015

    Over that last 10 years, cloud technologies have dramatically changed the cybersecurity paradigm, while security issues and threats such as advanced exploitation and resource misuse have become more advanced and prevalent. As we look toward the next 10 years, what have we learned about the past and present to prepare for the future? This session will explore enterprise architectures of both yesterday and today, ensuring you have the information needed to avoid past common mistakes. We’ll…

    Over that last 10 years, cloud technologies have dramatically changed the cybersecurity paradigm, while security issues and threats such as advanced exploitation and resource misuse have become more advanced and prevalent. As we look toward the next 10 years, what have we learned about the past and present to prepare for the future? This session will explore enterprise architectures of both yesterday and today, ensuring you have the information needed to avoid past common mistakes. We’ll discuss the standard Enterprise Architecture of 2005; the new Enterprise Architecture of 2015; prevalent threats and how they’ve changed from 2005 to 2015; and the Notorious Nine Cloud Computing Top Threats. There will also be a demonstration of an example cloud threat, and you’ll hear recommendations on avoiding risk and not getting stuck in the past decade.

    Other authors
    See publication
  • B9-What are Your Top 25 Cloud Security Weaknesses

    INFOSEC World 2015

    This talk covers:
    * Cloud Security Alliance (CSA) and SAFECode's Practices for Secure Development of Cloud Applications
    * Common Threats to Cloud Computing
    * How to Avoid Design Issues
    * What to Focus on to Avoid Implementation Issues
    * The Benefits of Secure Development Training
    * Free Online Resources for Application Security training
    * An Example Top 25 List

    See publication
  • What are Your Top 25 Cloud Security Weaknesses?

    2014 CSA Congress

    This talk covers:
    * Cloud Security Alliance (CSA) and SAFECode's Practices for Secure Development of Cloud Applications
    * Common Threats to Cloud Computing
    * How to Avoid Design Issues
    * What to Focus on to Avoid Implementation Issues
    * The Benefits of Secure Development Training
    * Free Online Resources for Application Security training
    * An Example Top 25 List

    See publication
  • Transforming Training to Adapt to the Speed of Change in Cyberspace

    2014 Federal Information Systems Security Educators' Association (FISSEA) Conference

    A panel discussion covering the importance of Cybersecurity training to dapt to the speed of change in Cyberspace.

    See publication
  • Cloud Security: How Does Software Assurance Apply

    2013 Cloud Security Alliance Congress

    This talk will covers:
    • A practical definition of Software Assurance and how it relates to FISMA/FedRAMP
    • How to determine Component Risk and Criticality
    • How to determine the Attack Surface of a cloud application
    • How to find weaknesses and vulnerabilities through Static and Dynamic Application Security Testing
    • A practical example of testing a cloud application (including a common exploit)

    See publication
  • Cloud Security: How Does Software Assurance Apply

    Purdue CERIAS Seminar

    It was once said that the last time one had full control of their software was right before they released it. This is ever more important as organizations move applications and services into a public cloud to support a mobile lifestyle. Clouds have been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. It’s typically toward the latter in which the industry has been moving. Because of this, one must understand their…

    It was once said that the last time one had full control of their software was right before they released it. This is ever more important as organizations move applications and services into a public cloud to support a mobile lifestyle. Clouds have been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. It’s typically toward the latter in which the industry has been moving. Because of this, one must understand their Attack Surface and threat environment to ensure that they have focused on “building security in” to their application.

    See publication
  • Applying Software Assurance Concepts to the Cloud

    CrossTalk Magazine September/October 2013

    Developers must understand their attack surface and threat environment to ensure that they have focused on “building security into” their applications.

    Other authors
    See publication
  • Applying Software Assurance Concepts to Network Enabled Operations in the Cloud

    Air Traffic Controllers Association Cyber Day

    It was once said that the last time one had full control of their software was right before they released it. This is ever more important as Next Generation (NextGen) systems are focused on information-sharing components known as Network Enabled Operations (NEO), which is a network-centric infrastructure, providing information services built upon Commercial off the Shelf (COTS) cloud technologies. Clouds have often been described as “a safe and secure private cloud”, “a semi-trusted partner…

    It was once said that the last time one had full control of their software was right before they released it. This is ever more important as Next Generation (NextGen) systems are focused on information-sharing components known as Network Enabled Operations (NEO), which is a network-centric infrastructure, providing information services built upon Commercial off the Shelf (COTS) cloud technologies. Clouds have often been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. As NEO becomes more open, the cloud interfaces will be more trusted and reliant on the Cybersecurity posture of their interacting systems. Because of this, a system developer must understand their Attack Surface and threat environment to ensure that they have focused on “building security in” to their application.

    Other authors
    See publication
Join now to see all publications

Organizations

  • National Defense Industrial Association (NDIA)

    Systems Security Engineering, Member

    - Present
  • Cloud Security Alliance

    Company Representative

    - Present

    https://cloudsecurityalliance.org/

  • InterNational Committee for Information Technology Standards

    Principal Voting Member SC27 CS1

    - Present

    This membership provides comments and votes on International Standards for Cybersecurity (e.g. 27001).

  • DHS Software and Supply Chain Assurance Forum

    Contributing Member

    - Present

    https://buildsecurityin.us-cert.gov/bsi/home.html

View Randall’s full profile

  • See who you know in common
  • Get introduced
  • Contact Randall directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content