2016_HSA_Yrbk_YUMPU_r2___
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
sions at DOD and in the Intelligence communities<br />
differ from DHS, there still needs to be a<br />
collaborative effort for protecting the homeland<br />
domestically and abroad, especially with<br />
cybersecurity. I think that the new Administration<br />
has assembled a very strong and capable<br />
security leadership team.<br />
GSN: Can you update us on your social media<br />
and thought leadership activities?<br />
Yes, last year I was selected by LinkedIn as<br />
“One of the Top 5 People to Follow On LinkedIn”<br />
by LinkedIn (I was named #2). I now<br />
have around 32,000 first degree followers on<br />
LinkedIn and manage or own 12 LI groups<br />
(mostly dealing with tech and security issues). I<br />
am also active on Twitter nearing 4,500 followers<br />
(please follow me @ChuckDBrooks) and<br />
on Facebook. As you all know, social media<br />
has become part of the digital fabric of how we<br />
communicate, operate, and conduct business<br />
in and out of government.<br />
In the recent months I have published over 100<br />
articles blogs. My topic areas have included<br />
homeland security, cyber security, defense,<br />
CBRNE, IT, R & D, science & technology,<br />
public/private partnerships, IoT, innovation.<br />
In addition to Government Security News, I<br />
have been published in FORBES, Huffington<br />
Post, InformationWeek, MIT Sloan Blog, Computerworld,<br />
Federal Times, NextGov, Cygnus<br />
Security Media, Homeland Security Today,<br />
The Hill, Biometric Update, CIO Water Cooler,<br />
Government Executive, Bizcatalyst360, Brink,<br />
IT Security Planet, Christian Science Monitor,<br />
and others.<br />
I have also been very active on the speaking<br />
circuit at a variety of conferences and events<br />
at Universities and forums over the past year.<br />
A couple of highlight; a few months back I<br />
presented at a workshop sponsored by The<br />
National Academies of Sciences, Engineering,<br />
and Medicine and the Federal Bureau of<br />
Investigation on Securing Life Sciences Data.<br />
I also spoke at George Washington University<br />
event about the Cyber Threat Spectrum along<br />
with co-panelists John Perren, former Assistant<br />
Director, FBI’s Weapons of Mass Destruction<br />
Directorate, and Lieutenant Colonel Scott<br />
Applegate, Strategic Planner, J5, Cyber Policy<br />
Continued on next page<br />
7