Randall Brooks, CISSP, CSSLP
Orlando, Florida, United States
1K followers
500+ connections
About
Mr. Randall Brooks is a Technical Fellow for Raytheon Technologies (NYSE: RTX). He is the…
Experience
Publications
-
Cloud Computing Security in the Tactical Environment - the Difference a Year Makes
MILCOM 2015
A panel discussion on what changes have occurred in Cloud technologies over the last year as they apply to the Tactical Cloud.
Other authorsSee publication -
2005–2015 How Has The Cloud Changed Enterprise Architectures?
3rd International Conference on Cloud Security and Management ICCSM-2015
This paper focuses on how the Cloud transforms traditional enterprise security architecture models to handle the security and management needs of the 21st century. It leverages over 10 years of enterprise experience and the lessons learned from cloud security research and industry groups, such as the Cloud Security Alliance (CSA), offering important strategies for adoption and reference examples.
Other authorsSee publication -
2005–2015 How Has The Cloud Changed Enterprise Architectures?
Privacy. Security. Risk 2015
Over that last 10 years, cloud technologies have dramatically changed the cybersecurity paradigm, while security issues and threats such as advanced exploitation and resource misuse have become more advanced and prevalent. As we look toward the next 10 years, what have we learned about the past and present to prepare for the future? This session will explore enterprise architectures of both yesterday and today, ensuring you have the information needed to avoid past common mistakes. We’ll…
Over that last 10 years, cloud technologies have dramatically changed the cybersecurity paradigm, while security issues and threats such as advanced exploitation and resource misuse have become more advanced and prevalent. As we look toward the next 10 years, what have we learned about the past and present to prepare for the future? This session will explore enterprise architectures of both yesterday and today, ensuring you have the information needed to avoid past common mistakes. We’ll discuss the standard Enterprise Architecture of 2005; the new Enterprise Architecture of 2015; prevalent threats and how they’ve changed from 2005 to 2015; and the Notorious Nine Cloud Computing Top Threats. There will also be a demonstration of an example cloud threat, and you’ll hear recommendations on avoiding risk and not getting stuck in the past decade.
Other authorsSee publication -
B9-What are Your Top 25 Cloud Security Weaknesses
INFOSEC World 2015
See publicationThis talk covers:
* Cloud Security Alliance (CSA) and SAFECode's Practices for Secure Development of Cloud Applications
* Common Threats to Cloud Computing
* How to Avoid Design Issues
* What to Focus on to Avoid Implementation Issues
* The Benefits of Secure Development Training
* Free Online Resources for Application Security training
* An Example Top 25 List -
What are Your Top 25 Cloud Security Weaknesses?
2014 CSA Congress
See publicationThis talk covers:
* Cloud Security Alliance (CSA) and SAFECode's Practices for Secure Development of Cloud Applications
* Common Threats to Cloud Computing
* How to Avoid Design Issues
* What to Focus on to Avoid Implementation Issues
* The Benefits of Secure Development Training
* Free Online Resources for Application Security training
* An Example Top 25 List
-
Transforming Training to Adapt to the Speed of Change in Cyberspace
2014 Federal Information Systems Security Educators' Association (FISSEA) Conference
See publicationA panel discussion covering the importance of Cybersecurity training to dapt to the speed of change in Cyberspace.
-
Cloud Security: How Does Software Assurance Apply
2013 Cloud Security Alliance Congress
See publicationThis talk will covers:
• A practical definition of Software Assurance and how it relates to FISMA/FedRAMP
• How to determine Component Risk and Criticality
• How to determine the Attack Surface of a cloud application
• How to find weaknesses and vulnerabilities through Static and Dynamic Application Security Testing
• A practical example of testing a cloud application (including a common exploit)
-
Cloud Security: How Does Software Assurance Apply
Purdue CERIAS Seminar
See publicationIt was once said that the last time one had full control of their software was right before they released it. This is ever more important as organizations move applications and services into a public cloud to support a mobile lifestyle. Clouds have been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. It’s typically toward the latter in which the industry has been moving. Because of this, one must understand their…
It was once said that the last time one had full control of their software was right before they released it. This is ever more important as organizations move applications and services into a public cloud to support a mobile lifestyle. Clouds have been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. It’s typically toward the latter in which the industry has been moving. Because of this, one must understand their Attack Surface and threat environment to ensure that they have focused on “building security in” to their application.
-
Applying Software Assurance Concepts to the Cloud
CrossTalk Magazine September/October 2013
Developers must understand their attack surface and threat environment to ensure that they have focused on “building security into” their applications.
Other authorsSee publication -
Applying Software Assurance Concepts to Network Enabled Operations in the Cloud
Air Traffic Controllers Association Cyber Day
It was once said that the last time one had full control of their software was right before they released it. This is ever more important as Next Generation (NextGen) systems are focused on information-sharing components known as Network Enabled Operations (NEO), which is a network-centric infrastructure, providing information services built upon Commercial off the Shelf (COTS) cloud technologies. Clouds have often been described as “a safe and secure private cloud”, “a semi-trusted partner…
It was once said that the last time one had full control of their software was right before they released it. This is ever more important as Next Generation (NextGen) systems are focused on information-sharing components known as Network Enabled Operations (NEO), which is a network-centric infrastructure, providing information services built upon Commercial off the Shelf (COTS) cloud technologies. Clouds have often been described as “a safe and secure private cloud”, “a semi-trusted partner cloud”, or “a wild wild west full and open public cloud”. As NEO becomes more open, the cloud interfaces will be more trusted and reliant on the Cybersecurity posture of their interacting systems. Because of this, a system developer must understand their Attack Surface and threat environment to ensure that they have focused on “building security in” to their application.
Other authorsSee publication
Organizations
-
National Defense Industrial Association (NDIA)
Systems Security Engineering, Member
- Present -
Cloud Security Alliance
Company Representative
- Presenthttps://cloudsecurityalliance.org/
-
InterNational Committee for Information Technology Standards
Principal Voting Member SC27 CS1
- PresentThis membership provides comments and votes on International Standards for Cybersecurity (e.g. 27001).
-
DHS Software and Supply Chain Assurance Forum
Contributing Member
- Presenthttps://buildsecurityin.us-cert.gov/bsi/home.html
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content