Articles by Duncan
Activity
-
Throughout the past 24 years, I’ve had the privilege of working alongside many brilliant individuals. I’m incredibly grateful for their…
Throughout the past 24 years, I’ve had the privilege of working alongside many brilliant individuals. I’m incredibly grateful for their…
Liked by Duncan Sparrell
-
Please join us for another great lineup of speakers at the annual AT&T Secure Connections conference on November 12th. Registration is now open at…
Please join us for another great lineup of speakers at the annual AT&T Secure Connections conference on November 12th. Registration is now open at…
Liked by Duncan Sparrell
-
Cybersecurity incidents put patients' lives at risk. Jenna McLaughlin sat down with Dina Carlisle, of Ascension Health, at the spring CyberMed Summit…
Cybersecurity incidents put patients' lives at risk. Jenna McLaughlin sat down with Dina Carlisle, of Ascension Health, at the spring CyberMed Summit…
Liked by Duncan Sparrell
Experience
Licenses & Certifications
Volunteer Experience
-
Member Program Committee - Zero Trust and Software Supply Chain Security
International Telecommunication Union
- 7 months
Science and Technology
ITU Workshop on "Zero Trust and Software Supply Chain Security" -
https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2023/0828/Pages/Programme-Committee.aspx -
Steering Committee Member - Generative AI: Challenges and Opportunities for Security and Privacy
International Telecommunication Union
- 6 months
Science and Technology
ITU Workshop on Generative AI: Challenges and Opportunities for Security and Privacy.
https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2024/0219/Pages/default.aspx
Publications
-
SBOM FAQ
CISA
This guide provides information on the benefits of SBOM, common misconceptions and concerns, creation of an SBOM, distributing and sharing an SBOM, and role specific guidance. Also, the document provides information on SBOM related efforts, such as Vulnerability Exploitability eXchange (VEX), OpenC2, and digital bill of materials (DBOM).
-
When to Issue VEX Information
CISA
“The goal of Vulnerability Exploitability eXchange (VEX) is to allow a software supplier or other
parties to assert the exploitability status of specific vulnerabilities in a particular product or set of
products.” Issuing VEX information allows developers, suppliers, and others to provide
information in a human-readable and machine-comprehensible format, regardless of whether or
not software is affected by a specific vulnerability. This allows downstream users to make their
own…“The goal of Vulnerability Exploitability eXchange (VEX) is to allow a software supplier or other
parties to assert the exploitability status of specific vulnerabilities in a particular product or set of
products.” Issuing VEX information allows developers, suppliers, and others to provide
information in a human-readable and machine-comprehensible format, regardless of whether or
not software is affected by a specific vulnerability. This allows downstream users to make their
own assessments of the risks associated with the vulnerability.
This document seeks to explain the circumstances and events that could lead an entity to issue
VEX information and describes the entities that create or consume VEX information. Whether,
and when, to issue VEX information is a business decision for most suppliers and possibly a
more individual decision for independent open source developers. This document identifies
factors that influence the decision. -
The Open Cybersecurity Alliance at the VEX Summit
The VEX Summit
Presentation on the Open Cybersecurity Alliance (OCA) at the VEX Summit (https://vexsummit.org/schedule.html) hosted by Cisco and OASIS Open. The talk covers what the OCA is, why it is needed, and how it relates to SBOMs and VEX.
-
The Evolution of Telecom Business, Economy, Policies and Regulations
IEEE Communications Magazine
From the late 1970s onward, the global telecommunication industry has gone through several waves of regulatory and technological changes. Today, the very definition of telecommunication has changed. First, the traffic is no longer confined to voice and/or limited data services. Second, the boundary line between telecommunication and information sectors is increasingly blurred. Third, the parties that offer products and services for consumers, businesses and industrial users operate under…
From the late 1970s onward, the global telecommunication industry has gone through several waves of regulatory and technological changes. Today, the very definition of telecommunication has changed. First, the traffic is no longer confined to voice and/or limited data services. Second, the boundary line between telecommunication and information sectors is increasingly blurred. Third, the parties that offer products and services for consumers, businesses and industrial users operate under different regulatory regimes, ranging from strict regulations to no regulations at all. Fourth, the merging of the physical and virtual worlds through immersive technologies opens new social, cultural and business dimensions. Finally, the post-covid environment has opened unprecedented avenues for virtual workplaces (E-work).
Other authorsSee publication -
Minimum Requirements for Vulnerability Exploitability eXchange (VEX)
Cybersecurity & Infrastructure Security Agency
This document specifies the minimum elements to create a Vulnerability Exploitability eXchange (VEX) document. These elements are derived from, but may not fully conform to, existing VEX documentation and implementations. It was drafted and debated by experts from across the security and software world, representing different sectors and backgrounds.
-
Vulnerability Exploitability eXchange (VEX) - Status Justifications
CISA
This resource provides the recommended NOT AFFECTED status justifications of a VEX document and offers the reader examples of when the different status justifications might be used. VEX documents may contain a justification statement of why the VEX document creator chose to assert that the product’s status is NOT AFFECTED. This document was drafted by stakeholders through an open and transparent, community-led process
Other authorsSee publication -
Vulnerability Exploitability eXchange (VEX) – Use Cases
CISA
This resource provides the recommended minimum data elements of a VEX document and offers a set of scenarios with proposed implementations. This document was drafted by stakeholders through an open and transparent, community-led process.
Other authorsSee publication -
How to combine blockchain technology to revolutionize the supply chain?
UN World Summit on the Information Society
In recent years, there is a growing potential for the supply chain management application, especially in supply chain innovation. Blockchain as an emerging application model has been widely used in different industries. In the fields of finance, Internet of Things, social welfare and supply chain, there have been a lot of explorations and attempts of application. Among them, the supply chain field has become a "place of use" for blockchain technology due to its large market scale, multiple…
In recent years, there is a growing potential for the supply chain management application, especially in supply chain innovation. Blockchain as an emerging application model has been widely used in different industries. In the fields of finance, Internet of Things, social welfare and supply chain, there have been a lot of explorations and attempts of application. Among them, the supply chain field has become a "place of use" for blockchain technology due to its large market scale, multiple trust subjects and multi-party collaboration. Supply chain is an early development and relatively high maturity of blockchain applications.
The supply chain can be seen as a network of suppliers, manufacturers, warehouses, distribution centers and channels. The core of the supply chain concept is to establish trust between subjects, collaborate and cooperate, form a chain of originally loose enterprises, and collect and integrate discrete chain information. As the scope of supply chain becomes more and more extensive, enterprises coordinate their own and external resources through effective chain management so as to meet market demand. In the future, as the application of blockchain in the field of supply chain tends to mature, blockchain technology is expected to promote and complete the disruptive innovation of the entire supply chain industry and help realize the deep integration of traditional industries with the new generation of information.
This workshop will discuss some of the current problems in the supply chain, as well as the new challenges encountered in the supply chain in the era of the epidemic, and how to propose solutions in using Blockchain technologies to solve these problems.
#bom #supplychain #cybersecurityOther authors -
Making the World a Safer Place with Nerves
Nerves Meetup
Join us for a presentation by Duncan Sparrell about cybersecurity and the opportunities/challenges for Nerves and the Erlang/Elixir ecosystem in general. In May 2021 President Biden issued Presidential Executive Order(EO) 14028 on Improving the Nation’s Cybersecurity. The talk will begin with some cybersecurity basics, covering the environment, trends, and events that led to the EO. It will discuss why the Elixir/Erlang ecosystem, and OTP’s “let it fail” in particular, is well suited for…
Join us for a presentation by Duncan Sparrell about cybersecurity and the opportunities/challenges for Nerves and the Erlang/Elixir ecosystem in general. In May 2021 President Biden issued Presidential Executive Order(EO) 14028 on Improving the Nation’s Cybersecurity. The talk will begin with some cybersecurity basics, covering the environment, trends, and events that led to the EO. It will discuss why the Elixir/Erlang ecosystem, and OTP’s “let it fail” in particular, is well suited for cybersecurity. OTP was an originally an acronym for “Open Telcom Platform”, but now stands for “One Tough Platform”. With increased focus on the safety impact of cyber-physical systems in the Internet of Things (IoT), there are large opportunities for Nerves as well as challenges. I’ll discuss how the EO will use the power of the federal purse to transform the software industry and the opportunities and challenges to our ecosystem. Much of the talk will focus on Software Bill of Materials (SBOM) – it’s recent history, why SBOMs are important, what the EO means to SBOMs for Nerves projects, the hex/rebar tools to create SBOMs, and what attendees can (and should) do in their Nerves projects.
-
What Threats are Hiding in Your Software - And How to Find Them
All Things Open 2021
With COVID-19 as a backdrop, 2020 was the year that cybersecurity really came to the forefront. With the world mostly working from home and relying on the Internet more than ever, a plethora of security challenges arose that taxed an already overburdened IT industry. After things like the Solarwinds attack and hacks on public infrastructure such as in the energy sector, it became abundantly clear that we had to step up our efforts to more clearly automate sharing of threat data, understand what…
With COVID-19 as a backdrop, 2020 was the year that cybersecurity really came to the forefront. With the world mostly working from home and relying on the Internet more than ever, a plethora of security challenges arose that taxed an already overburdened IT industry. After things like the Solarwinds attack and hacks on public infrastructure such as in the energy sector, it became abundantly clear that we had to step up our efforts to more clearly automate sharing of threat data, understand what packages where in our critical software, and even begin to automate remediation plans when vulnerabilities were detected.
In this panel discussion, we gather together a collection of subject matter experts in everything from SBOM (Software Bill of Materials) to threat detection sharing and remediation to give the audience a look into open software projects and standards that are at the leading edge of helping to secure our digital future. The panel will answer questions in their respective areas of expertise, and also touch on how their particular specialties overlap and collaborate in the fight against cybersecurity threats. We will leave time for audience questions and participation.Other authorsSee publication -
The making of QuadBlockQuiz
ACM International Conference on Functional Programming
Explains the underpinnings of the QuadBlockQuiz game and why elixir/BEAM/OTP is so good for cybersecurity.
Abstract at https://icfp21.sigplan.org/details/erlang-2021-papers/8/Lightning-Talk-QuadBlockQuiz-Supply-Chain-Edition
Video of presentation at https://youtu.be/ZEyv7KPSlq0 -
IATC - QuadBlockQuiz - Supply Chain Sandbox Edition
BSides Las Vegas
Reprise of RSAC game at BSidesLV - teaching supply chain cybersecurity
-
"Campfire Stories: Overlord, Desert Shield the Sequel"
BSides Las Vegas
Telling scary stories around the campfire at BSidesLV - the story of my start in cybersecurity
-
Keynote Session Chair: Josh Corman on "Trust, Transparency, and Proportionality"
OASIS Borderless Cyber 21
Introduced and interviewed keynote speaker
-
Keynote Session Chair: Neal Ziring on ""Future Challenges and Directions for Security Automation and Orchestration"
OASIS Borderless Cyber 21
Introduced and interviewed keynote speaker
-
Keynote Session Chair: Cassie Crossley on "Product Security Risks and Third Party Supply chain"
OASIS Borderless Cyber 21
Introduced and interviewed keynote speaker
-
Panel Moderator: "Unique Perspectives On The Best Ways To Mitigate Supply Chain Disruption"
OASIS Borderless Cyber 21
Moderated panel on mitigating supply chain disruption
-
Session Chair: Chris Blask on "DBOM And Efforts Underway With Regards To Supply Chain Integrity/Assurance"
OASIS Borderless Cyber 21
Introduced speaker, moderated Q&A
-
QuadBlocks
RSA Conference
Created game for the Supply Chain Village at RSA Conference that demonstrated and taught supply chain cybersecurity
-
Making IoT Safer with BEAM/OTP
Code Beam SF 2020
This talk explains the safety impact of cyber-physical systems in the Internet of things. It explains the advantages of quantitative risk analysis for security decision making while extolling the advantages of "One Tough Platform" for developing secure software. Duncan presents pitfalls to avoid and best practices to follow. He evangelizes OTP for cybersecurity and cyber-physical safety and
demonstrates open-source on a Raspberry Pi showing how future IoT will adapt to threats in…This talk explains the safety impact of cyber-physical systems in the Internet of things. It explains the advantages of quantitative risk analysis for security decision making while extolling the advantages of "One Tough Platform" for developing secure software. Duncan presents pitfalls to avoid and best practices to follow. He evangelizes OTP for cybersecurity and cyber-physical safety and
demonstrates open-source on a Raspberry Pi showing how future IoT will adapt to threats in real-time.
-
Cyber-safety in healthcare IoT
ITU Kaleidoscope
Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
respond at machine speed. Cybersecurity standards being developed today will enable future
IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
analysis of reasonable mitigations performing triage to economically optimize the overall
healthcare…Healthcare is becoming more connected. Risks to patient and public safety are increasing due to
cybersecurity attacks. To best thwart cyberattacks, the Internet of health things (IoHT) must
respond at machine speed. Cybersecurity standards being developed today will enable future
IoHT systems to automatically adapt to cybersecurity threats in real time, based on a quantitative
analysis of reasonable mitigations performing triage to economically optimize the overall
healthcare outcome. This paper will discuss cybersecurity threats, risk, health impact, and how
future IoHT cybersecurity systems will adapt to threats in real time. -
National Security Strategy for 5G: Findings & Recommendations on Meeting the 5G Challenge
Trilateral Cyber Security Commission
The Trilateral Cyber Security Commission was formed to make recommendations to the
governments of the United States, Japan, and like-minded European countries individually
and collectively to improve the security of their information networks. Some of the most
critical challenges to all these countries are the economic and security risks of future 5G
networks. These rapidly developing networks will become a new and dominant form of critical
infrastructure. Unless the free market…The Trilateral Cyber Security Commission was formed to make recommendations to the
governments of the United States, Japan, and like-minded European countries individually
and collectively to improve the security of their information networks. Some of the most
critical challenges to all these countries are the economic and security risks of future 5G
networks. These rapidly developing networks will become a new and dominant form of critical
infrastructure. Unless the free market democratic countries can develop polices and take
actions in the near term, China is poised to dominate this emerging market and could use its
position to undermine the national security of its adversaries.
The Commission recommends the United States, Japan, and likeminded governments in Europe and elsewhere take a series of domestic and coordinated multilateral actions. The objectives are not only to protect their 5G networks, but also to support Western firms in competing fairly to deliver 5G solutions around the world.Other authorsSee publication -
Roles and Benefits for SBOM Across the Supply Chain
NTIA
This resource summarizes the benefits of having an SBOM from the perspective of those who make software, those who choose or buy software, and those who operate it. It characterizes the security, quality, efficiency, and other organizational benefits, as well as the potential for the broader ecosystem across the supply chain.
Other authorsSee publication -
Framing Software Component Transparency: Establishing a Common Software Bill of Material (SBOM)
NTIA
This resource defines SBOM concepts and related terms, offers a baseline of how software components are to be represented, and discusses the processes around SBOM creation. With terminology and a background of the NTIA process, it serves as a detailed introduction to SBOM.
Other authorsSee publication -
Improving IoT Safety using Standards
Borderless Cyber
Abstract at https://us19.borderlesscyber.org/program-schedule/program/69/bc-track-improving-iot-safety-using-standards-to-improve-iot-security. Bio at https://us19.borderlesscyber.org/program-schedule/users/detail/1150/duncan-sparrell. The Prezi for the presentation is at https://prezi.com/view/uU4txAdyhXFkHFwiAIk3
-
Cyber-Physical Safety
Rochester Security Summit
Abstract at https://guidebook.com/g/rss2019/#/session/24575049. Bio at https://guidebook.com/g/rss2019/#/item/12745003/. Slides (in a non-building pdf) are available at https://www.rochestersecurity.org/wp-content/uploads/2019/10/Sparrell_CyberPhysicalSafety.Sparrell_reduced.pdf. The Prezi as presented is available at https://prezi.com/view/fCWEZVUbeuLG13zCu3GT/.
-
Open Command and Control (OpenC2) Language Specification Version 1.0
OASIS
Open Command and Control (OpenC2) is a concise and extensible language to enable machine-to-machine communications for purposes of command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation.
-
Open Command and Control (OpenC2) Profile for Stateless Packet Filtering Version 1.0
OASIS
Open Command and Control (OpenC2) is a concise and extensible language to enable the command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation. Stateless packet filtering is a cyber defense mechanism that denies or allows traffic based on static properties of the traffic, such as address, port, protocol, etc. This profile defines the Actions…
Open Command and Control (OpenC2) is a concise and extensible language to enable the command and control of cyber defense components, subsystems and/or systems in a manner that is agnostic of the underlying products, technologies, transport mechanisms or other aspects of the implementation. Stateless packet filtering is a cyber defense mechanism that denies or allows traffic based on static properties of the traffic, such as address, port, protocol, etc. This profile defines the Actions, Targets, Specifiers and Options that are consistent with the version 1.0 of the OpenC2 Language Specification ([OpenC2-Lang-v1.0]) in the context of stateless packet filtering (SLPF).
Other authors -
The Case for Software Bills of Materials (SBoM)
LiveWorx19
Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic transparency into the composition and functionality of these systems contributes substantially to cybersecurity risk as well as the costs of development, procurement, and maintenance. In our increasingly interconnected world, risk and cost impact not only individuals and organizations directly but also collective goods like public safety and national security. This talk will cover the advantages of…
Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic transparency into the composition and functionality of these systems contributes substantially to cybersecurity risk as well as the costs of development, procurement, and maintenance. In our increasingly interconnected world, risk and cost impact not only individuals and organizations directly but also collective goods like public safety and national security. This talk will cover the advantages of having a Software Bill of Materials (SBoM) and the work underway in an NTIA Working Group on Software Transparency.
-
Using Science, not Fear, in Sizing Cybersecurity Budgets
LiveWorx19
The cost of cybersecurity is increasing while the impacts are worsening. The talk will present the underlying economics of today's cybersecurity industry and discuss how the existing drivers need to change to incent the desired behavior. Risk economics will be covered along with how other industries handle massive risk, minimal data, and chaotic actors using proven statistical techniques. Future cybersecurity systems will adapt to threats in real time based on the standards being developed…
The cost of cybersecurity is increasing while the impacts are worsening. The talk will present the underlying economics of today's cybersecurity industry and discuss how the existing drivers need to change to incent the desired behavior. Risk economics will be covered along with how other industries handle massive risk, minimal data, and chaotic actors using proven statistical techniques. Future cybersecurity systems will adapt to threats in real time based on the standards being developed today. Instead of Fear, Uncertainty, and Doubt (FUD), spending decisions will be based algorithmically on proven scientific methods using security policy, risk tolerance, and the potential financial impact of the threat. Factor Analysis of Information Risk (FAIR) is a practical framework for understanding, measuring and analyzing information risk, and ultimately, for enabling well-informed decision making. The talk will give a brief introduction to FAIR and the standards related to it.
-
IoTsm Response at Cyberspeed to Attack
Proceedings of the International Conference on Industrial Internet of Things and Smart Manufacturing
-
Cybersecurity, Erlang, & Opensource Combine in OpenC2
Security Opencamp
-
Defense at Cyber Speed
George Mason University Cyber Innovation Forum Series
-
Defense at Machine Speed
Borderless Cyber USA
https://us17.dryfta.com/en/program-schedule/program/5/defense-at-machine-speed
-
Let’s play defense at cyber speed
ANYCon
http://www.anycon.info/talksdefsec
slides available at https://prezi.com/gwudhjox8eev/anycon-lets-play-defense-at-cyber-speed/ -
Information Risk Strategy
Shell Information Risk Management Ecosystem Summit
-
Protecting Security at the Network Level
BITS Financial Services Roundtable
-
Monitoring Network Data to Detect IP Security Violations
GLOBECOM '06. IEEE
A method of detecting security violations by monitoring IP address space usage at per interface level.
Other authors -
Standards and innovation in telecommunications
Communications Magazine, IEEE Volume 30, Issue 7, Jul 1992 Page(s):22 - 29
Specific examples from recent cases in voice communications illustrate the standardization process and various strategies used to reach common agreement. A specific case of standards spurred innovation is discussed.
Other authorsSee publication -
Voice Packetization on Satellite;
International Conference on Digital Satellite Communications 8
-
Wideband packet technology
GLOBECOM '88; IEEE
Announcement of Wideband Packet Technology (subsequently used on many international cable and satellite routes and the basis for ITU standards G.764 and G.765).
-
The 32-KB/S ADPCM Coding Standard
AT&T Technical Journal 65 (5)
This paper highlights the process leading to the standards on 32-kb/s ADPCM recognized by ANSI and the CCITT and gives an overview of the algorithm itself.
Other authorsSee publication -
Digital Signal Processig in Digital Transmission Terminals
ENTELEC
-
Introduction of 32 kbits ADPCM Eaquipment into the North American Network
GLOBECOM '84; IEEE
-
Taking a Bite out of Bits
Telephone Engineer & Management
Other authors -
Taking a Big Bite out of Bits
AT&T Bell Laboratories RECORD 62 (6): 4-8
Other authors -
A real time analysis/Display system for nonstationary coastal processes
IEEE International Conference on Acoustics, Speech, and Signal Processing
Patents
-
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US-11652847-B2
Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US 11575713
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US 20210152608
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US 20190036974
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US 20170013020
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
Decoupling Hardware and Software Components of Network Security Devices to Provide Security Software as a Service in a Distributed Computing Environment
Issued US 20150033282
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
Other inventorsSee patent -
System and Method for Monitoring Networking Activity
Issued US 8713141
Described is a system and method for receiving first data corresponding to usage of a network, receiving second data corresponding to usage of the network, comparing the first data to the second data and providing an indication of a network event when the second data varies from the first data greater than a predetermined amount
Other inventorsSee patent -
Method and apparatus for routing data
Issued US 8660114
A method and apparatus for handling internet access telephone calls made via cable company telephone services.
Other inventorsSee patent -
Method and apparatus for routing data
Issued US 20120076138
A method and apparatus for handling internet access telephone calls made via cable company telephone services.
Other inventorsSee patent -
Method and apparatus for routing data
Issued US 8,094,650
A method and apparatus for handling internet access telephone calls made via cable company telephone services.
Other inventorsSee patent -
Method and Apparatus for providing a Network Traffic Composite Graph
Issued US 7,663,626
Visualization method/technique/software for analyzing network traffic, particularly useful for anomalies due to security events. Used on AT&T GNOC Wallboards.
Other inventorsSee patent -
Method and apparatus for routing data
Issued US 20080205383
A method and apparatus for handling internet access telephone calls made via cable company telephone services.
Other inventorsSee patent -
Method and apparatus for routing data
Issued US 7,369,542
A method and apparatus for handling internet access telephone calls made via cable company telephone services.
Other inventorsSee patent -
Method and apparatus for providing a network traffic composite graph
Issued US 20070204034
-
Automatic fault recovery in a packet network
Issued US 4999829
An arrangement is disclosed for recovering from faults in transmission equipment or facilities forming virtual circuits for transmitting packets in a network.
Other inventorsSee patent -
Bit Compression Multiplexing
Issued US 4,581,737
A transcoder for using ADPCM to compress two DS1 lines on one.
Honors & Awards
-
Distinguished Contributor Award
OASIS
Outstanding Achievement and Contributions to Open Standards and Open Source
-
10 Best CSOs of 2020
Industry Era
https://www.industry-era.com/Duncan-Sparrell-CSO-of-sFractal-Consulting-LLc-Best-CSOs-of-2020.php
-
AT&T Science and Technology Medal
AT&T
"AT&T Science and Technology Medalists are acknowledged in the company's technical community for demonstrating remarkable technical depth in a given area that results in a unique and significant contribution to innovation at AT&T Labs."
-
Inteligence Community Seal Medallion
FBI
"The Intelligence Community Seal Medallion... recognizes sustained superior performance of duty of high value that distinctly benefits the interests of the United States".
Awarded for support of FBI Counterintelligence, Counternarcotics, and Counterterrorism.
Organizations
-
Consortium for IT Software Quality
Member
- Presenthttps://it-cisq.org/trustworthy-systems-manifesto/
-
Program Committee for Borderless Cyber Conference
Member
- Presenthttps://www.oasis-open.org/news/pr/borderless-cyber-usa-2018
-
Program Committee for ITU Kaleidoscope Academic Conference
Member
- Presenthttps://www.itu.int/en/ITU-T/academia/kaleidoscope/Pages/default.aspx
-
NoVa Hackers
Member
- PresentNoVA Hackers is a group located in the Northern Virginia area based on the Austin Hackers Association (AHA) model and is made up of Information Security Professionals from all walks of life, from government and private sector, to students and beginners.
-
(ISC)^2
Member
- Present -
OWASP - Northern Virginia Chapter
Member
- Present -
Washington Cyber Roundtable
Member
- PresentWashington Cyber Roundtable is a non-profit, industry liaison group comprising senior level members who donate their time and knowledge to share tangible, private-sector expertise on cyber security challenges with federal government departments and agencies.
-
IEEE
Senior Member
- Present -
International Telecommunications Union
Working Party Chairman
-The International Telecommunication Union (ITU) is the United Nations specialized agency for information and communication technologies. I participated in the ITU-T, the part of the ITU developing world telecommunications standards. I led standardization activities for transmission, voice coding, and voice packetization. http://www.itu.int/ITU-T/1997-2000/com15/mgmt_team_old.html
Recommendations received
2 people have recommended Duncan
Join now to viewMore activity by Duncan
-
On the eve of a major voting event that really matters, thank you to everyone who voted for me for a recognition that pales in comparison but is…
On the eve of a major voting event that really matters, thank you to everyone who voted for me for a recognition that pales in comparison but is…
Liked by Duncan Sparrell
-
It's been 7 years and 2 days since I left an awesome job to start my own company, #Cydarm, with not much more than an idea. It has been quite the…
It's been 7 years and 2 days since I left an awesome job to start my own company, #Cydarm, with not much more than an idea. It has been quite the…
Liked by Duncan Sparrell
-
It was an honor and great experience to be in Belgium 🇧🇪 and participate in the inaugural Capyx #SBOM Summit with Pieter Ysenbrandt, Kurt…
It was an honor and great experience to be in Belgium 🇧🇪 and participate in the inaugural Capyx #SBOM Summit with Pieter Ysenbrandt, Kurt…
Liked by Duncan Sparrell
-
📰 🏦 #cyberrecovery I knew this was coming, but not so soon! 🙌🏻 Well done European Central Bank for introducing the “Cyber Resilience (Recovery)…
📰 🏦 #cyberrecovery I knew this was coming, but not so soon! 🙌🏻 Well done European Central Bank for introducing the “Cyber Resilience (Recovery)…
Liked by Duncan Sparrell
-
If you work with operational technologies (#OT and #ICS), you probably know how paramount cybersecurity is in this space. I’m excited to speak on a…
If you work with operational technologies (#OT and #ICS), you probably know how paramount cybersecurity is in this space. I’m excited to speak on a…
Liked by Duncan Sparrell
-
How to get 10-30% developer efficiency in your DevSecOps by automating your Application Security Posture Management with SOOS.io!
How to get 10-30% developer efficiency in your DevSecOps by automating your Application Security Posture Management with SOOS.io!
Liked by Duncan Sparrell
-
I'll be presenting "The Software Supply Chain Business Case" at the Cyber Supply Chain Risk Management Conference (CySCRM) 2024…
I'll be presenting "The Software Supply Chain Business Case" at the Cyber Supply Chain Risk Management Conference (CySCRM) 2024…
Shared by Duncan Sparrell
-
Thank you The Cyber Guild, Debbie Sallis, and Caitlin Fithian for this recognition and for your amazing work in building and supporting the next…
Thank you The Cyber Guild, Debbie Sallis, and Caitlin Fithian for this recognition and for your amazing work in building and supporting the next…
Liked by Duncan Sparrell
-
My good friend Duncan Sparrell gave an amazing talk about the need for security standards and how they can help #cybersecurity go faster and save…
My good friend Duncan Sparrell gave an amazing talk about the need for security standards and how they can help #cybersecurity go faster and save…
Liked by Duncan Sparrell
-
This is a great presentation by my industry friend Duncan Sparrell on how to automate cybersecurity controls using standards (many of them created…
This is a great presentation by my industry friend Duncan Sparrell on how to automate cybersecurity controls using standards (many of them created…
Liked by Duncan Sparrell
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More