About
Brad Doctor is a senior technology and security executive with more than 20 issued…
Activity
-
My wife Kathy just got nominated for a James Beard Award ‼️ For anyone outside the food world: the Beards are the Oscars of food. There is nothing…
My wife Kathy just got nominated for a James Beard Award ‼️ For anyone outside the food world: the Beards are the Oscars of food. There is nothing…
Liked by Brad Doctor
-
Two cities. Same focus. Boston and New York behind us. Another roadshow centered on building relationships that matter and a community that shows…
Two cities. Same focus. Boston and New York behind us. Another roadshow centered on building relationships that matter and a community that shows…
Liked by Brad Doctor
Experience
Licenses & Certifications
Volunteer Experience
-
Guest Lecturer - ITP Masters program
University of Colorado Boulder
- 2 years 1 month
Education
I led the security component for the ITP program for two semesters. This included a hands-on lab component with a CTF element, and was very well rated by the masters students.
-
Secretary and President
ISSA Denver Chapter
- 1 year 1 month
Science and Technology
Voted in as the chapter Secretary, then assumed President role after the former President resigned due to relocation.
Publications
-
Simply Secure. How Reducing IT Complexity Reaps Amazing Security Benefits
VMware on VMware Blogs
See publicationHow reducing complexity helps security posture
-
Level 3 Communications corporate security blog
Level 3 Communications
See publicationTopical articles on the security industry.
Patents
-
Hybrid cloud network monitoring system for tenant use (#2)
Issued US 10,944,811
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.
-
APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS (#3)
Filed US 20200344246
Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat
-
Apparatus, system and method for identifying and mitigating malicious network threats (#2)
Issued US 10,721,243
Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.
-
Authentication system and method
Issued US 10,708,276
A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication…
A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
-
APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS
Filed US 20190104136
-
Apparatus, system and method for identifying and mitigating malicious network threats
Issued US 10,129,270
Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.
-
System and method for a security asset manager #4
Issued US 10,097,575
See patentImplementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more…
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
-
SYSTEM AND METHOD FOR A SECURITY ASSET MANAGER #4
Filed US 20180091545
See patentImplementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more…
Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
-
HYBRID CLOUD NETWORK MONITORING SYSTEM FOR TENANT USE (#1)
Issued US 9,860,309
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.
Other inventors -
System and method for a security asset manager - #3
Issued US 9,838,414
-
System and method for a security asset manager #2
Issued US 9,503,481
-
Method and system to associate a geographic location information with a network address using a combination of automated and manual processes
Issued US 9,413,712
-
AUTHENTICATION SYSTEM AND METHOD #1
Issued US 9,202,031
-
Method and system to associate geographic location information with a network address using a combination of automated and manual processes
Issued US 9,021,080
-
HYBRID CLOUD NETWORK MONITORING SYSTEM FOR TENANT USE (#2)
US 20180109602
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first…
Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (VM) executing in the cloud computing system, wherein the first VM is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating VM having a first network interface and a second network interface is instantiated, wherein the decapsulating VM is inaccessible to the first tenant organization. An encapsulated port mirroring session from the tenant port of the first VM to the first network interface of the decapsulating VM is then established. A plurality of packets comprising captured network traffic received via the encapsulated port mirroring session are decapsulated, and the captured network traffic is forwarded via the second network interface of the decapsulating VM to a sniffer VM.
-
Method and apparatus for estimating a geographic location of a networked entity
US 6,684,250
-
Method and system to collect geographic location information for a network address utilizing geographically dispersed data collection agents
US 7,809,857
-
Method and system to initiate geolocation activities on demand and responsive to receipt of a query
US 7,472,172
-
Method and system to modify geolocation activities based on logged query information
US 7,072,963
-
Network Monitoring System with Enhanced Performance
US 20090092057
Honors & Awards
-
CSO Magazine CSO50 2016 honoree for top industry program
CSO Magazine
-
2011-2013 Level (3) ELP leadership graduate
-
-
2012 GTI Leadership recognition
-
More activity by Brad
-
The tide is changing. Background screening can no longer be static or one-dimensional—it has to be continuous. This morning at Collaborate 2026…
The tide is changing. Background screening can no longer be static or one-dimensional—it has to be continuous. This morning at Collaborate 2026…
Liked by Brad Doctor
-
For those it concerns, Last week I resigned as Candriam CISO, I am in the transition phase to a new job, more on this soon (you saw these posts…
For those it concerns, Last week I resigned as Candriam CISO, I am in the transition phase to a new job, more on this soon (you saw these posts…
Liked by Brad Doctor
-
Excellent way to start this Thursday morning! Thrilled to share more recognition for the First Advantage team. 👏 #WeAreFA
Excellent way to start this Thursday morning! Thrilled to share more recognition for the First Advantage team. 👏 #WeAreFA
Liked by Brad Doctor
-
If you're attending the conference, I look forward to seeing you outside around the fire.
If you're attending the conference, I look forward to seeing you outside around the fire.
Liked by Brad Doctor
-
Our Aramco champion Lauren Coughlin is back for the JM Eagle LA Championship! Sending best wishes to our Brand Ambassador for a great weekend on the…
Our Aramco champion Lauren Coughlin is back for the JM Eagle LA Championship! Sending best wishes to our Brand Ambassador for a great weekend on the…
Liked by Brad Doctor
-
Introducing the sponsors behind Collaborate 2026. ✨ Join us in welcoming ID.me, Premier Biotech, SambaSafety, Fama Technologies Inc., Amazon Web…
Introducing the sponsors behind Collaborate 2026. ✨ Join us in welcoming ID.me, Premier Biotech, SambaSafety, Fama Technologies Inc., Amazon Web…
Liked by Brad Doctor
-
With the Mythos discovery and remediation efforts completely dominating the airwaves lately, it’s easy to get swept up in the noise. However, I’d be…
With the Mythos discovery and remediation efforts completely dominating the airwaves lately, it’s easy to get swept up in the noise. However, I’d be…
Liked by Brad Doctor
-
Shortly after my first book, Never Enough, came out in 2021, I received a call from an unknown number. On the other end was UConn MBB coach Dan…
Shortly after my first book, Never Enough, came out in 2021, I received a call from an unknown number. On the other end was UConn MBB coach Dan…
Liked by Brad Doctor
-
Are you an expert in your field, daydreaming about your next career move? Chances are, we've got a match for you! From roles in product and…
Are you an expert in your field, daydreaming about your next career move? Chances are, we've got a match for you! From roles in product and…
Liked by Brad Doctor
-
Yesterday marked two years at First Advantage, and I am grateful for the opportunity to work alongside such thoughtful, driven, and high‑integrity…
Yesterday marked two years at First Advantage, and I am grateful for the opportunity to work alongside such thoughtful, driven, and high‑integrity…
Liked by Brad Doctor
-
A new Crowdstrike article was published highlighting the partnership with Lumen Technologies. There are some good quotes in there, but I might be a…
A new Crowdstrike article was published highlighting the partnership with Lumen Technologies. There are some good quotes in there, but I might be a…
Liked by Brad Doctor
-
Honored to have been nominated as a 2026 CFO of the Year by the Atlanta Business Chronicle. Huge thanks to the First Advantage team, and especially…
Honored to have been nominated as a 2026 CFO of the Year by the Atlanta Business Chronicle. Huge thanks to the First Advantage team, and especially…
Liked by Brad Doctor
-
Our First Advantage brand ambassador, Lauren Coughlin, just dominated in Las Vegas. What a win!
Our First Advantage brand ambassador, Lauren Coughlin, just dominated in Las Vegas. What a win!
Liked by Brad Doctor
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Brad Doctor
5 others named Brad Doctor are on LinkedIn
See others named Brad Doctor