Brad Doctor

Brad Doctor

United States
7K followers 500+ connections

About

Brad Doctor is a senior technology and security executive with more than 20 issued…

Activity

Join now to see all activity

Experience

Licenses & Certifications

  • CISSP Graphic

    CISSP

    (ISC)²

    Issued
    Credential ID 26582

Volunteer Experience

  • University of Colorado Boulder Graphic

    Guest Lecturer - ITP Masters program

    University of Colorado Boulder

    - 2 years 1 month

    Education

    I led the security component for the ITP program for two semesters. This included a hands-on lab component with a CTF element, and was very well rated by the masters students.

  • ISSA Denver Chapter Graphic

    Secretary and President

    ISSA Denver Chapter

    - 1 year 1 month

    Science and Technology

    Voted in as the chapter Secretary, then assumed President role after the former President resigned due to relocation.

Publications

Patents

  • Hybrid cloud network monitoring system for tenant use (#2)

    Issued US 10,944,811

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.

  • APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS (#3)

    Filed US 20200344246

    Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat

  • Apparatus, system and method for identifying and mitigating malicious network threats (#2)

    Issued US 10,721,243

    Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.

  • Authentication system and method

    Issued US 10,708,276

    A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication…

    A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.

  • APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS

    Filed US 20190104136

  • Apparatus, system and method for identifying and mitigating malicious network threats

    Issued US 10,129,270

    Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.

  • System and method for a security asset manager #4

    Issued US 10,097,575

    Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more…

    Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.

    See patent
  • SYSTEM AND METHOD FOR A SECURITY ASSET MANAGER #4

    Filed US 20180091545

    Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more…

    Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.

    See patent
  • HYBRID CLOUD NETWORK MONITORING SYSTEM FOR TENANT USE (#1)

    Issued US 9,860,309

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.

    Other inventors
  • System and method for a security asset manager - #3

    Issued US 9,838,414

  • System and method for a security asset manager #2

    Issued US 9,503,481

  • Method and system to associate a geographic location information with a network address using a combination of automated and manual processes

    Issued US 9,413,712

  • AUTHENTICATION SYSTEM AND METHOD #1

    Issued US 9,202,031

  • Method and system to associate geographic location information with a network address using a combination of automated and manual processes

    Issued US 9,021,080

  • HYBRID CLOUD NETWORK MONITORING SYSTEM FOR TENANT USE (#2)

    US 20180109602

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…

    Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.

  • Method and apparatus for estimating a geographic location of a networked entity

    US 6,684,250

  • Method and system to collect geographic location information for a network address utilizing geographically dispersed data collection agents

    US 7,809,857

  • Method and system to initiate geolocation activities on demand and responsive to receipt of a query

    US 7,472,172

  • Method and system to modify geolocation activities based on logged query information

    US 7,072,963

  • Network Monitoring System with Enhanced Performance

    US 20090092057

Honors & Awards

  • CSO Magazine CSO50 2016 honoree for top industry program

    CSO Magazine

  • 2011-2013 Level (3) ELP leadership graduate

    -

  • 2012 GTI Leadership recognition

    -

More activity by Brad

View Brad’s full profile

  • See who you know in common
  • Get introduced
  • Contact Brad directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Brad Doctor

Add new skills with these courses