“Mark is a very passionate technologist and computer security expert. In my time reporting to him, I found him to be a knowledgeable and caring manager. I knew little about computer or network security when I came on board at Endforce and Mark was an invaluable resource in my training and understanding of this part of the software industry. He has a knack for explaining technical details with all level of customers and prospects, from the IT staff up to CIOs and CTOs. He was always able to explain tricky technical details in a way that was understandable to everyone.”
About
Cybersecurity technical leader with significant experience and expertise in security and…
Activity
-
If you haven't visited our Downtown in City of Hilliard, Ohio USA yet, here's one more amazing reason to do so. We are so proud that our residents…
If you haven't visited our Downtown in City of Hilliard, Ohio USA yet, here's one more amazing reason to do so. We are so proud that our residents…
Liked by Mark B.
Licenses & Certifications
Volunteer Experience
-
Judge
OHI/O Hackathon
Education
-
Parent volunteer
Hilliard Avery Elementary School
Education
Publications
-
TCG Trusted Network Connect: TNC Architecture for Interoperability, Version 1.0
Trusted Computing Group
The Trusted Network Connect Sub Group (TNC-SG) is working to define and promote an open solution architecture that enables network operators to enforce policies regarding the security 4etate of endpoints in order to determine whether to grant access to a requested network infrastructure. Endpoint integrity policies may involve integrity par eters spanning a range ofsystem components (hardware, firmware, software and application settings), and may or may not include evidence of a Trusted…
The Trusted Network Connect Sub Group (TNC-SG) is working to define and promote an open solution architecture that enables network operators to enforce policies regarding the security 4etate of endpoints in order to determine whether to grant access to a requested network infrastructure. Endpoint integrity policies may involve integrity par eters spanning a range ofsystem components (hardware, firmware, software and application settings), and may or may not include evidence of a Trusted Platform Module (TPM).
Other authorsSee publication -
The Network Access Identifier
IETF RFC 4282
This document defines the syntax for the Network Access Identifier (NAI), the user identity submitted by the client during network authentication.
Other authorsSee publication -
TCG Trusted Network Connect TNC IF-IMV
Trusted Computing Group
This document describes and specifies IF-IMV, a critical interface in the Trusted Computing Group’s Trusted Network Connect (TNC) architecture. IF-IMV is the interface between Integrity Measurement Verifiers (IMVs) and a TNC Server (TNCS).
Other authors -
Criteria for Evaluating Network Access Server Protocols
IETF RFC 3169
This document defines requirements for protocols used by Network Access Servers (NAS).
Other authorsSee publication -
Criteria for Evaluating AAA Protocols for Network Access
IETF RFC 2989
This document represents a summary of Authentication, Authorization, Accounting (AAA) protocol requirements for network access.
Other authorsSee publication -
Network Access Server equirements Next Generation (NASREQNG) NAS Model.
IETF RFC 2881
This document describes the terminology and gives a model of typical Network Access Server (NAS). The purpose of this effort is to set the reference space for describing and evaluating NAS service protocols, such as RADIUS (RFCs 2865, 2866) [1], [2] and follow-on efforts like AAA Working Group, and the Diameter protocol [3]. These are protocols for carrying user service information for authentication, authorization, accounting, and auditing, between a Network Access Server which desires to…
This document describes the terminology and gives a model of typical Network Access Server (NAS). The purpose of this effort is to set the reference space for describing and evaluating NAS service protocols, such as RADIUS (RFCs 2865, 2866) [1], [2] and follow-on efforts like AAA Working Group, and the Diameter protocol [3]. These are protocols for carrying user service information for authentication, authorization, accounting, and auditing, between a Network Access Server which desires to authenticate its incomingdcalls and a shared authentication server.
Other authorsSee publication
Patents
-
Selection and Storage of Policies in Network Management
Issued US 7,882,152
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the…
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes. In another aspect, the logic layer also contains a device control console, which allows bypassing the policy creating and configuring to allow a user to directly access a device for configuration.
Other inventors -
Selection and storage of policies in network management
Issued US 7,840,599
A method of accessing a network device under control of a policy-based network management system.
Other inventors -
Device plug-in system for configuring network device over a public network.
Issued US 7,284,042
Provides device configuration and policy configuration data to network devices over a public network, e.g., the internet. A secure communication link is first established over the public network to the network device. Next, policy and configuration information is downloaded to the network device using that secure communication link.t.
Other inventorsSee patent -
Policy engine for modular generation of policy for a flat, per-device database.
Issued US 7,159,125
A policy engine in a policy-based, outsourced, network management system.
Other inventorsSee patent -
Selection and storage of policies in network management
Issued US 7,130,854
User interface and policy loading aspects of a policy-based, outsourced, network management system.
Other inventorsSee patent
Languages
-
English
Native or bilingual proficiency
-
Polish
Limited working proficiency
-
Spanish
Professional working proficiency
-
French
Limited working proficiency
-
C++
Full professional proficiency
-
PHP
Full professional proficiency
-
CSS
Full professional proficiency
Organizations
-
Ohio Cyber Collaboration Committee (OC3)
Chair, Cyber Range Subcommittee
-At the request of Ohio’s governor to strengthen cybersecurity in the state, the Ohio National Guard has brought together more than 200 representatives from public, private, military and educational organizations to form the Ohio Cyber Collaboration Committee (OC3). The OC3 mission is to provide a collaborative environment to develop a stronger cybersecurity infrastructure and workforce. One of the committee’s initiatives is the creation of the Ohio Cyber Range — a virtual environment used for…
At the request of Ohio’s governor to strengthen cybersecurity in the state, the Ohio National Guard has brought together more than 200 representatives from public, private, military and educational organizations to form the Ohio Cyber Collaboration Committee (OC3). The OC3 mission is to provide a collaborative environment to develop a stronger cybersecurity infrastructure and workforce. One of the committee’s initiatives is the creation of the Ohio Cyber Range — a virtual environment used for cybersecurity training and technology development. * Conduct cybersecurity exercises and competitions to hone cross organizational incident response capabilities and develop future cybersecurity professionals. * Research and test industry-standard best practices. * Facilitate the evaluation and testing of innovative technologies and processes. d. Enable a training environment for the current and future cybersecurity workforce, including National Guard personnel, state and local government personnel, faculty and students in the education community, and private sector entities.
-
Trusted Computing Group
Member, Trusted Network Connect Working Group
-Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits…
Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security. More than a billion devices include TCG technologies. Virtually all enterprise PCs, many servers and embedded systems include the TPM; while networking equipment, drives and other devices and systems deploy other TCG specifications, including self-encrypting drives and network security specifications.
-
Internet Engineering Task Force
BOF Chair, Working Group Chair
-Co-chairman of Network Access Server Requirements (NASREQ) Next Generation BOF and NASREQ Working Group, Internet Engineering Task Force
Recommendations received
8 people have recommended Mark
Join now to viewMore activity by Mark
-
It was 5 years ago today that Governor DeWine signed Senate Bill 52 that created and funded the Ohio Cyber Reserve (OhCR), a volunteer civilian corps…
It was 5 years ago today that Governor DeWine signed Senate Bill 52 that created and funded the Ohio Cyber Reserve (OhCR), a volunteer civilian corps…
Liked by Mark B.
-
For the second straight year, our Temecula, California team was proud to participate in the Susan G. Komen MORE THAN PINK Walk. Through fundraisers…
For the second straight year, our Temecula, California team was proud to participate in the Susan G. Komen MORE THAN PINK Walk. Through fundraisers…
Liked by Mark B.
-
Members of our marketing team took a quick road trip to host a recruiting event at the Kelley School of Business at Indiana University. The team is…
Members of our marketing team took a quick road trip to host a recruiting event at the Kelley School of Business at Indiana University. The team is…
Liked by Mark B.
-
We’re celebrating American Business Women’s Day, which is September 22, by shouting out the amazing efforts of our Scotts Women’s Network (SWN). SWN…
We’re celebrating American Business Women’s Day, which is September 22, by shouting out the amazing efforts of our Scotts Women’s Network (SWN). SWN…
Liked by Mark B.
-
As some of you may have noticed, I have transitioned to a new company and role to further expand my expertise in IT Security by showcasing various…
As some of you may have noticed, I have transitioned to a new company and role to further expand my expertise in IT Security by showcasing various…
Liked by Mark B.
-
Picturesque may be the appropriate word to describe the late afternoon hike with our friends in the National Partner Network. Big Darby Creek…
Picturesque may be the appropriate word to describe the late afternoon hike with our friends in the National Partner Network. Big Darby Creek…
Liked by Mark B.
-
"I've made a very big impact, I think, on ScottsMiracleGro...My garden has been the most productive it's ever been thanks to Miracle-Gro Organic…
"I've made a very big impact, I think, on ScottsMiracleGro...My garden has been the most productive it's ever been thanks to Miracle-Gro Organic…
Liked by Mark B.
-
Looking to add a low-maintenance option to your lawn? Alternatives like Scotts Clover Lawn don’t require a lot of water and can withstand short-term…
Looking to add a low-maintenance option to your lawn? Alternatives like Scotts Clover Lawn don’t require a lot of water and can withstand short-term…
Liked by Mark B.
-
Connecting kids and families with nature, sports and the Crew! With a big help from Every Kid Sports, Scotts shows how we GroMoreGood in our own…
Connecting kids and families with nature, sports and the Crew! With a big help from Every Kid Sports, Scotts shows how we GroMoreGood in our own…
Liked by Mark B.
-
This is what summer, soccer and being a kid are all about. With the help of Scotts, Every Kid Sports and athletes from Columbus Crew 2, celebrating…
This is what summer, soccer and being a kid are all about. With the help of Scotts, Every Kid Sports and athletes from Columbus Crew 2, celebrating…
Liked by Mark B.
-
It’s no surprise that 100,000 bees create quite a buzz. In an initiative that includes our Ortho brand and The Scotts Miracle-Gro Foundation, we’re…
It’s no surprise that 100,000 bees create quite a buzz. In an initiative that includes our Ortho brand and The Scotts Miracle-Gro Foundation, we’re…
Liked by Mark B.
-
I am deeply honored and humbled to have been nominated for the prestigious Cybersecurity Woman of the World award! This recognition is a testament to…
I am deeply honored and humbled to have been nominated for the prestigious Cybersecurity Woman of the World award! This recognition is a testament to…
Liked by Mark B.
-
Garden season is here! Direct from our associate garden in Marysville, Ohio, we’re putting organic soil in raised beds and planting early season…
Garden season is here! Direct from our associate garden in Marysville, Ohio, we’re putting organic soil in raised beds and planting early season…
Liked by Mark B.
-
Great giveaway to announce a new partnership for our Aerogarden Brand . Check it out! #SMGAssociate
Great giveaway to announce a new partnership for our Aerogarden Brand . Check it out! #SMGAssociate
Liked by Mark B.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Mark B. in United States
-
Mark Fjelde
District HR Leader Kroger (Retired)
-
Mark Steen
-
Mark B
Senior Data Engineer/CEO, Chief Executive Officer
-
Mark B.
Technical Recruiter
-
Mark B.
Software Developer
558 others named Mark B. in United States are on LinkedIn
See others named Mark B.