About
Professional Summary:
An experienced Systems Architect, Enterprise Architect, Systems…
Articles by Charles
Activity
-
Loving the opportunity to serve as a Company Commander. It’s hard, demanding work, but being able to train, lead, and take care of Soldiers makes it…
Loving the opportunity to serve as a Company Commander. It’s hard, demanding work, but being able to train, lead, and take care of Soldiers makes it…
Liked by Charles White
-
Cancer sucks. Past nine months have been a trial for my family as my step-dad has been battling glioblastoma (Grade 4 Brain Cancer) Yet there is…
Cancer sucks. Past nine months have been a trial for my family as my step-dad has been battling glioblastoma (Grade 4 Brain Cancer) Yet there is…
Posted by Charles White
-
Sometimes when you make a change you know down deep this one will make a difference. If you asked me three years ago I would have said no way, but…
Sometimes when you make a change you know down deep this one will make a difference. If you asked me three years ago I would have said no way, but…
Liked by Charles White
Experience
Education
-
Virginia Polytechnic Institute and State University
-
-
Activities and Societies: Virginia Tech Corps of Cadets, IEEE, Virginia National Guard
I Company 1SG
I Company Commander
Ranger Challenge
Developed training system for Corps of Cadets -
-
-
Licenses & Certifications
-
Certified Systems Engineering Professional
International Council on Systems Engineering
Issued ExpiresCredential ID 01413
Patents
-
Server-client PKI for applied key management system and process
Issued US 10567355
Abstract: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
Other inventorsSee patent -
Linking encryption key management with granular policy
Issued US 10348485
Abstract: Examples describe herein relate to chaining operations under a molecular encryption scheme, including, but not limited to, defining a composite operation, wherein the composite operation comprises two or more separate operations, receiving input for the composite operation, invoking the composite operation for the input, performing the composite operation based on the input, and determining output corresponding to the input.
Other inventorsSee patent -
System and method for encryption key management, federation, and distribution
Issued US 9,729,577
Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies…
Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.
Other inventorsSee patent -
Client services for applied key management systems and processes
US US9967289B2
See patentEmbodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data connection with a file kernel driver of the client to enable the applied key management operation, receiving a request pertaining to encryption key data, relaying the request pertaining to the encryption key data to an applied key management system, and receiving a response regarding the request from the applied key management system based on at…
Embodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data connection with a file kernel driver of the client to enable the applied key management operation, receiving a request pertaining to encryption key data, relaying the request pertaining to the encryption key data to an applied key management system, and receiving a response regarding the request from the applied key management system based on at least one policy of the applied key management system.
Organizations
-
AFCEA International
Member, Cyber Comittee
- Present -
Military Cyber Professional Association
Member
- Present -
Scrum Alliance
Member
- Present -
Armed Forces Communications and Electronics Association
Member
- Present -
Institute of Electrical and Electronics Engineers
-
- PresentAlso maintained membership during college as well
-
International Council On Systems Engineering
Member
- Present
Recommendations received
9 people have recommended Charles
Join now to viewMore activity by Charles
-
Leidos has completed its $2.4 billion acquisition of ENTRUST Solutions Group, significantly expanding its capabilities in energy infrastructure and…
Leidos has completed its $2.4 billion acquisition of ENTRUST Solutions Group, significantly expanding its capabilities in energy infrastructure and…
Liked by Charles White
-
Cybersecurity is for more than traditional IT, but applying #zerotrust to protec critical OT and IoT assets requires a different approach and way of…
Cybersecurity is for more than traditional IT, but applying #zerotrust to protec critical OT and IoT assets requires a different approach and way of…
Liked by Charles White
-
General Dynamics Information Technology and Seekr are bridging the mission-ready gap by delivering autonomous, agentic AI that operates entirely…
General Dynamics Information Technology and Seekr are bridging the mission-ready gap by delivering autonomous, agentic AI that operates entirely…
Liked by Charles White
-
When I've asked Federal CTOs what they would fix if they could wave a magic wand, the answer is almost always the same: the traditional ATO process.…
When I've asked Federal CTOs what they would fix if they could wave a magic wand, the answer is almost always the same: the traditional ATO process.…
Liked by Charles White
-
Excited to share a photo from before the doors opened at the RSAC Conference, featuring a model of the Quantum System 2 chandeliers. I'm holding an…
Excited to share a photo from before the doors opened at the RSAC Conference, featuring a model of the Quantum System 2 chandeliers. I'm holding an…
Liked by Charles White
-
VICTORY!!! 3 years ago, I was recruited by con man Roger Ach to build an AI biometric security platform for his company, Chicago West Pullman LLC. I…
VICTORY!!! 3 years ago, I was recruited by con man Roger Ach to build an AI biometric security platform for his company, Chicago West Pullman LLC. I…
Liked by Charles White
-
Enjoyed a great luncheon at AFCEA Belvoir featuring guest speaker Rett Burroughs PMP, MAMH, MASS Leidos
Enjoyed a great luncheon at AFCEA Belvoir featuring guest speaker Rett Burroughs PMP, MAMH, MASS Leidos
Liked by Charles White
-
Come see General Dynamics Information Technology at the USMC AI Workshop. Table 29.
Come see General Dynamics Information Technology at the USMC AI Workshop. Table 29.
Liked by Charles White
-
Kicking off the 2026 NDIA POST Conference at the Hilton Hawaiian Village! 🌴 Leidos continues to invest in the Pacific and the mission through…
Kicking off the 2026 NDIA POST Conference at the Hilton Hawaiian Village! 🌴 Leidos continues to invest in the Pacific and the mission through…
Liked by Charles White
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content