Richard (Dick) Brooks
Springfield, Massachusetts Metropolitan Area
4K followers
500+ connections
Articles by Richard (Dick)
Contributions
-
How can you get involved in the information security community?
This topic was discussed at the DOE Energy Summit on Feb 5-8; "This led to a call to action to audience members to engage in the creation of standards and discussions in industry forums aimed at providing FERC with guidance, such as NAESB meetings and discussions taking place within the Energy Central community." https://www.nrel.gov/security-resilience/assets/pdfs/ets-detailed-agenda.pdf
-
How do you code for emerging trends in SDLC?
The software business is changing with the introduction of regulations requiring more attention to secure by design techniques and secure coding practices. The EU CRA proposed rules will have a profound effect on open-source software development as governments around the world attempt to protect consumers from cyber risks. Developers will need to adjust their SDLC processes to include cybersecurity functions and features, such as SBOM's and Vulnerability Disclosure Reports that serve as attestations showing adherence to accepted (expected) practices in order to satisfy customer and government expectations, and regulations, as they come to fruition. Coordinate vulnerability disclosure programs will become a requirement.
Activity
-
It’s a winter wonderland here in Westchester County NY. Wishing everyone a wonderful holiday season. NACD (National Association of Corporate…
It’s a winter wonderland here in Westchester County NY. Wishing everyone a wonderful holiday season. NACD (National Association of Corporate…
Liked by Richard (Dick) Brooks
-
I am very proud of our team, and their tireless dedication to making a real difference.
I am very proud of our team, and their tireless dedication to making a real difference.
Liked by Richard (Dick) Brooks
-
Don't be surprised when cyber insurers begin to require covered entities to check for and use only "Secure by Design" and "Secure by Default" digital…
Don't be surprised when cyber insurers begin to require covered entities to check for and use only "Secure by Design" and "Secure by Default" digital…
Liked by Richard (Dick) Brooks
Experience
Licenses & Certifications
Patents
-
METHODS FOR VERIFICATION OF SOFTWARE OBJECT AUTHENTICITY AND INTEGRITY
Issued US 11374961
A computer - implemented method includes determining , by a processor , an authenticity of a software object and its supply chain and providing an authenticity result indicative thereof ; determining , by the processor , an integrity of the software object and its supply chain and providing an integrity result indicative thereof ; and determining , by the processor, from the authenticity result and the integrity
result , a score indicative of an amount of trust in the supply chain of the…A computer - implemented method includes determining , by a processor , an authenticity of a software object and its supply chain and providing an authenticity result indicative thereof ; determining , by the processor , an integrity of the software object and its supply chain and providing an integrity result indicative thereof ; and determining , by the processor, from the authenticity result and the integrity
result , a score indicative of an amount of trust in the supply chain of the software object and in the software object , wherein the score is indicative of an amount of trust that the software object will work correctly if installed in a system that utilizes the software object .
A software object is defined as any digital object that contains software or is constructed by software or is considered software, that is needed to manage and/or operate a digital device correctly to perform a desired function, as expected by an end user or consumer of that software object and/or digital device. This SAG process uses corroborating evidence gathered using thorough risk assessment techniques to determine the trust level (trustworthiness) assigned to a software object, called a SAGScore™, across 7 risk categories, considering 39 independent risk factors.
More activity by Richard (Dick)
-
Don't be surprised when cyber insurers begin to require covered entities to check for and use only "Secure by Design" and "Secure by Default" digital…
Don't be surprised when cyber insurers begin to require covered entities to check for and use only "Secure by Design" and "Secure by Default" digital…
Shared by Richard (Dick) Brooks
-
Defining cyber risk appetite is a critical step for security leaders in aligning organizational goals with security strategies. But setting this…
Defining cyber risk appetite is a critical step for security leaders in aligning organizational goals with security strategies. But setting this…
Liked by Richard (Dick) Brooks
-
Season’s greetings and warm wishes to everyone this holiday season.
Season’s greetings and warm wishes to everyone this holiday season.
Liked by Richard (Dick) Brooks
-
Happy Holidays from ISO New England.
Happy Holidays from ISO New England.
Liked by Richard (Dick) Brooks
-
Great piece by Brian Harrell and I'm so happy to see him highlight physical GRC. Too often we are enamored with IT or OT technology and forget that…
Great piece by Brian Harrell and I'm so happy to see him highlight physical GRC. Too often we are enamored with IT or OT technology and forget that…
Liked by Richard (Dick) Brooks
-
Congratulations to Lily Fitzgerald on being promoted to Director for the Center for Advanced Manufacturing (CAM). Fitzgerald will lead the…
Congratulations to Lily Fitzgerald on being promoted to Director for the Center for Advanced Manufacturing (CAM). Fitzgerald will lead the…
Liked by Richard (Dick) Brooks
-
📢 We issued Binding Operational Directive (BOD) 25—01: Implementing Secure Practices for Cloud Services, a critical step to strengthen cloud…
📢 We issued Binding Operational Directive (BOD) 25—01: Implementing Secure Practices for Cloud Services, a critical step to strengthen cloud…
Liked by Richard (Dick) Brooks
-
I've been hugely inspired by what Marc Frankel and Daniel Bardenstein are building with Manifest (and proud to count Silver Buckshot Ventures as a…
I've been hugely inspired by what Marc Frankel and Daniel Bardenstein are building with Manifest (and proud to count Silver Buckshot Ventures as a…
Liked by Richard (Dick) Brooks
-
If I'm allowed to brag for a moment (this is LinkedIn), I just delivered a 3 hour heavy tech demonstration class this week. I get lots of anxiety…
If I'm allowed to brag for a moment (this is LinkedIn), I just delivered a 3 hour heavy tech demonstration class this week. I get lots of anxiety…
Liked by Richard (Dick) Brooks
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Richard (Dick) Brooks in United States
-
Richard Brooks
-
Richard Brooks
Vice President and General Counsel at AuguStar Life
-
Richard Brooks
-
Richard Brooks
674 others named Richard (Dick) Brooks in United States are on LinkedIn
See others named Richard (Dick) Brooks