“I worked with Christiaan at Google while I was supporting the sign in and security product team. Christiaan’s deep understanding of security technology and his ability to quickly analyze system flows to detect problem triggers is truly exceptional. I learned a lot from him. I can highly recommend Christiaan as a product leader with a true passion for his work.”
About
In 2009 I co-founded financial services security company, Entersekt. I have since moved…
Activity
-
Corporate board members take note: In 2020, attackers bypassed Twitter's internal MFA and used staff credentials to access Twitter’s internal…
Corporate board members take note: In 2020, attackers bypassed Twitter's internal MFA and used staff credentials to access Twitter’s internal…
Liked by Christiaan Brand
-
Greetings from the future! Time is short, but I’m allowed to reveal just one crucial insight before I am snatched back to the future: if your…
Greetings from the future! Time is short, but I’m allowed to reveal just one crucial insight before I am snatched back to the future: if your…
Liked by Christiaan Brand
-
Putting on my personal OSS developer hat for a sec, a HUGE thank you to Platinum sponsor Okta and Gold sponsor Authsignal for sponsoring…
Putting on my personal OSS developer hat for a sec, a HUGE thank you to Platinum sponsor Okta and Gold sponsor Authsignal for sponsoring…
Liked by Christiaan Brand
Experience
Education
Publications
-
Retiring One Time Passwords for good
PaymentsSource
Security breaches at trusted global corporations, such as Target and eBay are becoming a regular occurrence. Valuable customer data serves as a new currency of sorts for fraudsters, prompting the digital underground to stage well thought out attacks on a scale previously unheard of.
-
Who are you? The impact of security breaches on authentication
(IN)Secure Magazine
As businesses that rely on the Internet continue reeling from the recent Heartbleed bug incident, the question remains when, not if, another SSL bug will emerge and wreak havoc on Internet users.
-
Traffic Class Prediction and Prioritization on a Diversified IP Network Using Machine Learning
GLOBECOM Workshops, 2009 IEEE
As more homes are becoming broadband enabled, a huge strain is placed on the underlying IP infrastructure. In being able to predict the types of traffic that nodes might generate, preference can be given to high priority, latency sensitive traffic. Traditionally, a home had a single computer utilizing a link to the Internet. In recent years this single computer was replaced by a multitude of smart devices with the same ultimate goal: embedding the user into the social fabric of the Internet…
As more homes are becoming broadband enabled, a huge strain is placed on the underlying IP infrastructure. In being able to predict the types of traffic that nodes might generate, preference can be given to high priority, latency sensitive traffic. Traditionally, a home had a single computer utilizing a link to the Internet. In recent years this single computer was replaced by a multitude of smart devices with the same ultimate goal: embedding the user into the social fabric of the Internet. With the home still connected via a single link, these nodes are all contending for bandwidth and a novel QoS scheme is needed. In this paper, various models characterizing packet flow on a network will be developed. These are subsequently used to predict as accurately as possible, the immediate future traffic classes to be expected from nodes. This will eventually be used as a dynamic QoS criteria for pre-emptively assigning transmission slots to specific hosts. A number of techniques to accomplish this important task of node traffic pattern prediction, are presented. Lastly, evaluation of our approach, based on an 802.11b/g SOHo implementation, is also covered.
Other authorsSee publication -
The Development of an ARM-based OBC for a Nanosatellite
University of Stellenbosch
Next-generation nanosatellites are becoming a very cost effective solution to gain access to space. Modern manufacturing technology together with low power low cost devices makes the development of nanosatellites, using standard industrial components, very attractive. A typical nanosatellite will have only one microprocessor, capable of performing all the computing tasks onboard the satellite - housekeeping, AODC (Attitude and Orbit Control) and instructing the different payloads aboard the…
Next-generation nanosatellites are becoming a very cost effective solution to gain access to space. Modern manufacturing technology together with low power low cost devices makes the development of nanosatellites, using standard industrial components, very attractive. A typical nanosatellite will have only one microprocessor, capable of performing all the computing tasks onboard the satellite - housekeeping, AODC (Attitude and Orbit Control) and instructing the different payloads aboard the satellite. One of the major requirements was to choose a processor from a dominant manufacturer in the market that will still be available for future satellite missions. Just as the 8051 dominated the 8-bit market, the ARM7 processor is fast becoming a market leader in the segment for 16-bit applications. ARM processors has also been used much in handheld devices in recent years - which emphasize the low power requirements and stability of these processors in embedded applications. This thesis investigates the different processors that are currently available. A complete system design is done, taking into account all the different modules needed onboard a very small Low Earth Orbit (LEO) satellite. Finally, some test results are given showing how this system can be reliably used onboard a nanosatellite in future.
Patents
-
Identifying A Mobile Computing Device
Issued US 9,942,757
A mobile computing device, such as a cellular telephone or cellular network capable tablet or PDA, can be identified by a phone number associated with the mobile computing device. A mobile computing device can include a Subscriber Identity Module (SIM) card that can be used to identify the mobile computing device and to connect the mobile computing device to a communications network operated by the communications carrier or another communications carrier. The SIM card can include memory for…
A mobile computing device, such as a cellular telephone or cellular network capable tablet or PDA, can be identified by a phone number associated with the mobile computing device. A mobile computing device can include a Subscriber Identity Module (SIM) card that can be used to identify the mobile computing device and to connect the mobile computing device to a communications network operated by the communications carrier or another communications carrier. The SIM card can include memory for storing an International Mobile Subscriber Identity (IMSI). The IMSI can be used to identify the mobile computing device. A computing system can use the IMSI to request device authentication values and/or a phone number for the mobile computing device from a carrier associated with the mobile computing device.
Other inventorsSee patent -
Secure transaction authentication
Issued US 8862097
A method and system for authenticating secure transactions between a transacting user and a secure transaction host is provided. The system includes a mobile phone software application installed on a transacting user's mobile phone which is configured to compose a digital fingerprint uniquely associated with the specific mobile phone on which it is installed. The system further includes an authentication service provider with which users of the system may be enrolled by registering at least the…
A method and system for authenticating secure transactions between a transacting user and a secure transaction host is provided. The system includes a mobile phone software application installed on a transacting user's mobile phone which is configured to compose a digital fingerprint uniquely associated with the specific mobile phone on which it is installed. The system further includes an authentication service provider with which users of the system may be enrolled by registering at least the digital identifiers composed by the applications installed on their mobile communication devices in an authentication database. The authentication service provider is configured to authenticate secure transactions on request from secure transaction hosts by sending transaction confirmation requests to mobile phones of enrolled users requiring them to confirm or deny secure transactions before such transactions are allowed to be finalized.
Other inventorsSee patent -
Mobile handset identification and communication authentication
Issued US 8707029
A system and method for authenticating a communications channel between a mobile handset associated with a user and an application server, for uniquely identifying the mobile handset and for encrypting communications between the mobile handset and the application server over the communication channel is provided. The system includes a certificate authority configured to issue digital certificates to the handset and the application server, as well as software applications operating on both the…
A system and method for authenticating a communications channel between a mobile handset associated with a user and an application server, for uniquely identifying the mobile handset and for encrypting communications between the mobile handset and the application server over the communication channel is provided. The system includes a certificate authority configured to issue digital certificates to the handset and the application server, as well as software applications operating on both the handset and application server. The digital certificates may be used by the handset and application server to uniquely identify one another as well as to exchange encryption keys by means of which further communication between them may be encrypted.
Other inventorsSee patent -
Batch transaction authorisation
Filed US US 20150006392
A method and system for conducting batched transaction authorisations from a mobile device is disclosed. The method includes transmitting a batched transactions list including details of multiple transactions loaded against an account and awaiting authorisation, to the mobile device, over a secure connection between an authentication server and the mobile device, and receiving a batched transaction authorisation message from the mobile device over the secure connection including a positive or…
A method and system for conducting batched transaction authorisations from a mobile device is disclosed. The method includes transmitting a batched transactions list including details of multiple transactions loaded against an account and awaiting authorisation, to the mobile device, over a secure connection between an authentication server and the mobile device, and receiving a batched transaction authorisation message from the mobile device over the secure connection including a positive or negative authorisation result in respect of two or more of the transactions in the batched transaction list, each authorisation result in the batched transaction authorisation message having been individually signed with a private key associated with a unique digital certificate of the mobile device.
Languages
-
English
Native or bilingual proficiency
-
Afrikaans
Native or bilingual proficiency
Organizations
-
FIDO Alliance
-
- Present -
IEEE
-
- Present
Recommendations received
5 people have recommended Christiaan
Join now to viewMore activity by Christiaan
-
Secure by design takes dedication and years of hard work to get the balance right between velocity and safety. Read a bit about @Google’s commitment…
Secure by design takes dedication and years of hard work to get the balance right between velocity and safety. Read a bit about @Google’s commitment…
Liked by Christiaan Brand
-
Learned a ton and met so many impressive FIDO enthusiasts last week at Authenticate 2024, where the FIDO Alliance showcased groundbreaking…
Learned a ton and met so many impressive FIDO enthusiasts last week at Authenticate 2024, where the FIDO Alliance showcased groundbreaking…
Liked by Christiaan Brand
-
This week, Google stores in New York City and Mountain View held interactive events for consumers to learn about tools they can use to protect their…
This week, Google stores in New York City and Mountain View held interactive events for consumers to learn about tools they can use to protect their…
Liked by Christiaan Brand
-
Wat n voorreg om hierdie saam met jou te launch. Hoofstuk 1 ✅ Nog hope om te kom.
Wat n voorreg om hierdie saam met jou te launch. Hoofstuk 1 ✅ Nog hope om te kom.
Liked by Christiaan Brand
-
We had a blast 🚀 at last night’s #Authenticate2024 Passwordless Party! Share your favorite moments and tag us in your posts. We can’t wait to see…
We had a blast 🚀 at last night’s #Authenticate2024 Passwordless Party! Share your favorite moments and tag us in your posts. We can’t wait to see…
Liked by Christiaan Brand
-
Proud to work alongside Google’s Heather Adkins and her ongoing commitment to building a more secure future. Read more about her great work and…
Proud to work alongside Google’s Heather Adkins and her ongoing commitment to building a more secure future. Read more about her great work and…
Liked by Christiaan Brand
-
Congratulations to the research team from Stellenbosch University's Department of Electrical and Electronic Engineering who has won the 2023 Van…
Congratulations to the research team from Stellenbosch University's Department of Electrical and Electronic Engineering who has won the 2023 Van…
Liked by Christiaan Brand
-
Well, my #Authenticate2024 started with the FIDO Feud. Our team decided to wear pink in honor of Breast Cancer awareness month. Thank you for being…
Well, my #Authenticate2024 started with the FIDO Feud. Our team decided to wear pink in honor of Breast Cancer awareness month. Thank you for being…
Liked by Christiaan Brand
-
Let's keep the #passkeys momentum going! #Authenticate2024
Let's keep the #passkeys momentum going! #Authenticate2024
Liked by Christiaan Brand
-
Google is onstage at Authenticate discussing passkeys. The second point on the slide - credential managers are the root of trust - is absolutely…
Google is onstage at Authenticate discussing passkeys. The second point on the slide - credential managers are the root of trust - is absolutely…
Liked by Christiaan Brand
-
Exciting News: I've Joined SPIRL, the workload identity company! It is a great privilege to join the SPIRL team - a team of passionate, trail…
Exciting News: I've Joined SPIRL, the workload identity company! It is a great privilege to join the SPIRL team - a team of passionate, trail…
Liked by Christiaan Brand
-
Thrilled and honoured to share that our team has received the 2023 IEEE CSC Van Duzer Award! It's been an incredible journey collaborating with such…
Thrilled and honoured to share that our team has received the 2023 IEEE CSC Van Duzer Award! It's been an incredible journey collaborating with such…
Liked by Christiaan Brand
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Christiaan Brand
-
Christiaan Brand
-
Christiaan Brand
--
-
Christiaan Brand
-
Christiaan Pieter Brand
Aspiring Industrial Psychologist / Psychometrist
13 others named Christiaan Brand are on LinkedIn
See others named Christiaan Brand