Douglas Brush

Douglas Brush

Denver Metropolitan Area
12K followers 500+ connections

About

Douglas proudly serves as a court-appointed Special Master and testifying expert in…

Services

Articles by Douglas

  • A Change in Mind-Set: Shifting from Cybersecurity to Cyber Resilience

    A Change in Mind-Set: Shifting from Cybersecurity to Cyber Resilience

    It is not a matter of if, but when, your organization will suffer a cybersecurity-related incident. How will your…

    8 Comments
  • Covid-19: A message from our Acme CEO

    Covid-19: A message from our Acme CEO

    During this time of crisis, the management team and I are writing to let you know how serious we are taking this…

    1 Comment
  • Cyber Security Awareness Month: Aware @ Home

    Cyber Security Awareness Month: Aware @ Home

    As cybersecurity awareness month comes to a close, I had to have "the talk" with my daughter. No not about drugs or…

  • The Password Is….

    The Password Is….

    Each year, Verizon and other organizations release reports on the prior year’s data breach findings. A common theme…

    2 Comments
  • Do you have a Bieber Policy?!

    Do you have a Bieber Policy?!

    What are you doing to change behavior in your org to reduce infosec risk? Many of my guests on Cyber Security…

    12 Comments
  • Essentialism in Information Security

    Essentialism in Information Security

    Do less and focus on securing what matters most. “The Way of the Essentialist isn’t about getting more done in less…

    7 Comments

Contributions

Activity

Join now to see all activity

Experience

  • Brush Cyber Graphic

    Brush Cyber

    Denver Metropolitan Area

  • -

    Denver Metropolitan Area

  • -

    Denver Metropolitan Area

  • -

    Greater Denver Area

  • -

    Denver, Colorado, United States

  • -

  • -

    Greater Denver Area

  • -

    Denver Metropolitan Area

  • -

    Greater Denver Area

  • -

    Greater Denver Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

Licenses & Certifications

Volunteer Experience

  • DEF CON Graphic

    Blue Team Village - Mentor

    DEF CON

    - 1 year 1 month

    Education

    DEF CON is what you make of it. I volunteer with DEF CON's Blue Team Village [BTV] as a mentor and speaker. My goal is to incubate, grow, and encourage new practitioners in information security.

    Additionally, I am focused on diversity, equity, and inclusion to promote and be an ally to underrepresented voices.

  • Her Justice Graphic

    Event committee Co-chair - The Red Party

    Her Justice

    - 7 years 1 month

    Civil Rights and Social Action

    The Red Party celebrates and supports strong, resilient women and the caring volunteer lawyers who help them break free from poverty and abuse.

    The Her Justice Red Party is the Junior Advisory Boards signature summer event! I have been on the development committee for over seven years and now support the event as the co-chair.

    For more information, please go here: http://www.herjustice.org/content/view/448/649/

  • Volunteer

    MakerBoulder.com

    - 6 months

    Science and Technology

    In the Rocky Mountains, we are celebrating all things creative, imaginative and exploratory at a festival extraordinaire… It’s Science, Technology, Entrepreneurship (invention!), Arts and Making. STEAM Fest is an awe-filled, jaw-dropping chance to tinker, hack, build, crumble, fly, drive, drink, DO, dabble — PLAY!)

Publications

  • A Change in Mind-Set: Shifting from Cybersecurity to Cyber Resilience

    Forum Views - Bombay Stock Exchange Brokers' Forum (BBF)

    It is not a matter of if, but when, your organization will suffer a cyber security-related incident. How will your institution continue to operate and recover during a cyber-attack?

    See publication
  • The Data Breaches Are Coming

    International Legal Technology Association (ILTA)

  • Getting Your First DFIR Job

    SANS

    Recently, I spoke to students in a computer forensics class who will be graduating in the spring of 2013 about getting a job in computer forensics after school. We covered interview tips as well as performed mock forensic job interviews when I realized there are some pointers that I could share about the process from a hiring manager's perspective to help candidates better prepare for seeking that first position in computer forensics. While many aspects of getting that first job are common in…

    Recently, I spoke to students in a computer forensics class who will be graduating in the spring of 2013 about getting a job in computer forensics after school. We covered interview tips as well as performed mock forensic job interviews when I realized there are some pointers that I could share about the process from a hiring manager's perspective to help candidates better prepare for seeking that first position in computer forensics. While many aspects of getting that first job are common in any field, serious computer forensics professionals do have a mindset, attitude and passion that requires a certain approach when a candidate is looking for their first job in the field.

    See publication
  • You're a tool, a digital forensic tool

    SANS

    A common question I am asked or see posted on forums, user groups and social media sites is: "What is the best computer forensic tool?"

    See publication

Courses

  • AccessData Forensic Boot Camp

    -

  • AccessData Internet Forensics

    -

  • AccessData Windows Forensics: Registry

    -

  • EnCase Computer Forensics I

    -

  • EnCase Computer Forensics II

    -

  • SANS FOR408: Computer Forensic Investigations - Windows In-Depth

    -

  • SANS FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting

    -

  • SANS MGT412: A Practical Introduction to Cyber Security Risk Management

    -

  • SANS SEC504: Hacker Techniques, Exploits & Incident Handling

    -

Projects

  • Security Architecture 101

    Standing room only LegalSEC 2015 conference session on security architecture design for firms & corporate legal departments of varying sizes / maturity levels. Covered legal industry-specific opportunities and challenges using the CIS top 20 as a presentation framework. The group tied each of the 20 areas back to applicable ISO 2700x groups / controls so attendees had appropriate context and could develop more strategic long-term security architecture roadmaps. We provided references and…

    Standing room only LegalSEC 2015 conference session on security architecture design for firms & corporate legal departments of varying sizes / maturity levels. Covered legal industry-specific opportunities and challenges using the CIS top 20 as a presentation framework. The group tied each of the 20 areas back to applicable ISO 2700x groups / controls so attendees had appropriate context and could develop more strategic long-term security architecture roadmaps. We provided references and tools to assist in planning & tracking security architecture effort.

    Other creators
    See project

Honors & Awards

  • 2019 CISO Award - Slack Savior

    Colorado = Security

  • GIAC Advisory Board

    Global Information Assurance Certification (GIAC)

    The GIAC Advisory Board is made up of GIAC certified professionals who wish to give back to the security community by taking an active role in the GIAC program. The GIAC Advisory Board provides a forum where Security professionals can exchange ideas and advice.

    Participation is by invitation only, and is offered to GIAC certification holders who earn a score of 90% or better on at least one certification exam.

Languages

  • English

    -

Organizations

  • International Association of Privacy Professionals

    -

    - Present

    The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data. In fact, we’re the world’s largest and most comprehensive global information privacy community. The IAPP is the only place that brings together the people, tools and global information management practices you need to thrive in today’s rapidly evolving information…

    The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data. In fact, we’re the world’s largest and most comprehensive global information privacy community. The IAPP is the only place that brings together the people, tools and global information management practices you need to thrive in today’s rapidly evolving information economy.

  • American Bar Association

    -

  • The Sedona Conference

    International Electronic Information Management, Discovery, and Disclosure - Working Group 6

    The mission of Working Group 6 is to develop principles, guidance and best practice recommendations for information governance, discovery and disclosure involving cross-border data transfers related to civil litigation, dispute resolution and internal and civil regulatory investigations.

  • The Sedona Conference

    Data Security and Privacy Liability - Working Group 11

Recommendations received

35 people have recommended Douglas

Join now to view

More activity by Douglas

View Douglas’ full profile

  • See who you know in common
  • Get introduced
  • Contact Douglas directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Douglas Brush in United States

Add new skills with these courses