Springfield, Massachusetts Metropolitan Area
Contact Info
3K followers
500+ connections
Contributions
-
How can you get involved in the information security community?
This topic was discussed at the DOE Energy Summit on Feb 5-8; "This led to a call to action to audience members to engage in the creation of standards and discussions in industry forums aimed at providing FERC with guidance, such as NAESB meetings and discussions taking place within the Energy Central community." https://www.nrel.gov/security-resilience/assets/pdfs/ets-detailed-agenda.pdf
-
How do you code for emerging trends in SDLC?
The software business is changing with the introduction of regulations requiring more attention to secure by design techniques and secure coding practices. The EU CRA proposed rules will have a profound effect on open-source software development as governments around the world attempt to protect consumers from cyber risks. Developers will need to adjust their SDLC processes to include cybersecurity functions and features, such as SBOM's and Vulnerability Disclosure Reports that serve as attestations showing adherence to accepted (expected) practices in order to satisfy customer and government expectations, and regulations, as they come to fruition. Coordinate vulnerability disclosure programs will become a requirement.
Activity
-
Between the pandemic’s impact on work-life balance and the rise of BYOD, the line between personal and business has blurred when it comes to the…
Between the pandemic’s impact on work-life balance and the rise of BYOD, the line between personal and business has blurred when it comes to the…
Liked by Richard (Dick) Brooks
-
At Frenos, we help organizations answer the important question: "What activities should I do right now to lower risk in my most critical…
At Frenos, we help organizations answer the important question: "What activities should I do right now to lower risk in my most critical…
Liked by Richard (Dick) Brooks
-
Cybersecurity "status quo" continues to dominate C-Suite thinking about cyber-risk. Surprise! The world has changed... Watch out for those CISA…
Cybersecurity "status quo" continues to dominate C-Suite thinking about cyber-risk. Surprise! The world has changed... Watch out for those CISA…
Shared by Richard (Dick) Brooks
Experience & Education
Licenses & Certifications
Patents
-
METHODS FOR VERIFICATION OF SOFTWARE OBJECT AUTHENTICITY AND INTEGRITY
Issued US 11374961
A computer - implemented method includes determining , by a processor , an authenticity of a software object and its supply chain and providing an authenticity result indicative thereof ; determining , by the processor , an integrity of the software object and its supply chain and providing an integrity result indicative thereof ; and determining , by the processor, from the authenticity result and the integrity
result , a score indicative of an amount of trust in the supply chain of the…A computer - implemented method includes determining , by a processor , an authenticity of a software object and its supply chain and providing an authenticity result indicative thereof ; determining , by the processor , an integrity of the software object and its supply chain and providing an integrity result indicative thereof ; and determining , by the processor, from the authenticity result and the integrity
result , a score indicative of an amount of trust in the supply chain of the software object and in the software object , wherein the score is indicative of an amount of trust that the software object will work correctly if installed in a system that utilizes the software object .
A software object is defined as any digital object that contains software or is constructed by software or is considered software, that is needed to manage and/or operate a digital device correctly to perform a desired function, as expected by an end user or consumer of that software object and/or digital device. This SAG process uses corroborating evidence gathered using thorough risk assessment techniques to determine the trust level (trustworthiness) assigned to a software object, called a SAGScore™, across 7 risk categories, considering 39 independent risk factors.
More activity by Richard (Dick)
-
At SERC Reliability Corporation, we brought together our remote and local employees for a special social event as part of our annual employee…
At SERC Reliability Corporation, we brought together our remote and local employees for a special social event as part of our annual employee…
Liked by Richard (Dick) Brooks
-
The financial sector is a very attractive target for hackers to harvest ransomware payments. Watch out for those CISA KEVs, they can ruin your…
The financial sector is a very attractive target for hackers to harvest ransomware payments. Watch out for those CISA KEVs, they can ruin your…
Shared by Richard (Dick) Brooks
-
What is the effect of inadequate #cybersecurity on the #bond market, you ask? The Bond Buyer has an answer for you: https://lnkd.in/egpHdHaQ Thank…
What is the effect of inadequate #cybersecurity on the #bond market, you ask? The Bond Buyer has an answer for you: https://lnkd.in/egpHdHaQ Thank…
Liked by Richard (Dick) Brooks
-
Happy to be working with Mark Weatherford, Amit Yoran, James L. Hayes and the team at Tenable on this new Public Sector Advisory Board!
Happy to be working with Mark Weatherford, Amit Yoran, James L. Hayes and the team at Tenable on this new Public Sector Advisory Board!
Liked by Richard (Dick) Brooks
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Richard (Dick) Brooks in United States
-
Richard Brooks
-
Richard Brooks
Vice President and General Counsel at AuguStar Life
-
Richard Brooks
-
Richard Brooks
Agile Coach Manager
668 others named Richard (Dick) Brooks in United States are on LinkedIn
See others named Richard (Dick) Brooks