John C. Checco, D.Sc.

John C. Checco, D.Sc.

New York City Metropolitan Area
4K followers 500+ connections

About

Transformational leader with 25+ years of experience driving cybersecurity innovation…

Articles by John C.

  • Message to the Marymount University 2025 Graduating Doctorate Class

    I was honored to have achieved the academic excellence award for my doctoral graduating class, and as recipient was…

    85 Comments
  • U.S. versus the Global Economy

    Tariffs ..

  • Utilization of AI in Cyber Threat Intelligence

    With the recent hype on the use of AI/ML models in every part of the organizational operations, cyber threat…

    1 Comment
  • Persistent Issues for AI

    Over the course of the past decades, I have been working with various incantations of AI - from the AI Lab in IBM T. J.

  • Social Media and Modern Conflict

    How has social media changed the nature of modern conflicts? To address this question means to look at the definition…

  • A Decade-Old Method for Detecting DeepFakes

    Back in 2011, there was a paper on a novel video processing method called Eulerian Video Magnification. A variety of…

  • ZT's Love-Hate Relationship with AI/ML

    ZT needs to treat entities requesting data with both access and entitlement controls. AI works best with training data…

    2 Comments
  • Quotes I Live By

    I am perpetually thinking about (and occasionally opining on) leadership topics, critical infrastructure protection…

  • (QGI) Quantum General Intelligence

    I predict a disruption - a major disruption. It will occur as GenAI's progression towards AGI (Artificial General…

  • The AI Morality Divide

    There's been a lot of commentary on the value as well as the luggage that GenAI brings to our internet always-on…

Activity

4K followers

See all activities

Experience

  • ███ ████ ████

  • -

    New York City Metropolitan Area

  • -

  • -

  • -

  • -

    New York City Metropolitan Area

  • -

  • -

    Greater New York City Area

  • -

    Rockland County, NY

  • -

  • -

  • -

    New York City Metropolitan Area

  • -

    New York City Metropolitan Area

  • -

    New York City Metropolitan Area

  • -

    Washington D.C. Metro Area

  • -

    New York City Metropolitan Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

  • -

    New York City Metropolitan Area

  • -

  • -

  • -

  • -

    Greater New York City Area

  • -

  • -

  • -

  • -

    Greater New York City Area

  • -

  • -

  • -

  • -

  • -

    Greater New York City Area

  • -

    Mahwah, NJ

  • -

    Greater New York City Area

  • -

    Greater New York City Area

Education

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • Thiells Fire Department Graphic

    Firefighter / Rapid Intervention Team

    Thiells Fire Department

    - Present 2 years 5 months

  • Stony Point Fire District Graphic

    Firefighter / Emergency Response Diver

    Stony Point Fire District

    - 27 years 2 months

    In addition to my firematic duties, I also run the Clam Bar at the annual Wayne Day Fundraiser, cook for various fundraisers such as the Clam Bake, Pig Roast, Wing Night, et al.

  • Firefighter / Captain

    Milton Point Engine 192, City of Rye Fire Department, NY

    - 15 years

    In addition to my firematic duties, I also was treasurer as well as a firehouse cook for many social events.

  • Judge Advisor / Judge / Robot Inspector / Deans List Interviewer

    U.S. FIRST

    - 17 years 2 months

    Science and Technology

    FIRST Tech Challenge - Hudson Valley Qualifiers and Regionals

  • Assistant Hockey Coach (Bantam/Midget)

    North Rockland Youth Hockey Association

    - 2 years 8 months

    Children

    CEP-3 certified

Publications

  • Cyber-Physical Coordinated Attacks: The Emerging Complexity of Crisis Management

    The Cyber Defense Review (Army Cyber Institute)

    It is conceivable and probable that today’s adversaries have contemplated – and recruited for – event scenarios in which a physical crisis is pre-ignited by a series of one of more carefully orchestrated cyber incidents.

    As extremist groups grow bolder and attract younger more technology-astute prospects, there will be a convergence where both logical and physical attacks methods are used in concert towards a singular goal. These will be much more complex and targeted than the typical…

    It is conceivable and probable that today’s adversaries have contemplated – and recruited for – event scenarios in which a physical crisis is pre-ignited by a series of one of more carefully orchestrated cyber incidents.

    As extremist groups grow bolder and attract younger more technology-astute prospects, there will be a convergence where both logical and physical attacks methods are used in concert towards a singular goal. These will be much more complex and targeted than the typical diversionary tactics we are prepared for today.

    See publication
  • Reframing Data Privacy

    IAPP

    As an organization, ensure the identification, use and storage of consumer information is sufficiently tracked, since this will bolster both the security and privacy of those data elements. The results of this effort will assist with auditing and cyber-insurance compliance and materially reduce the impact radius of any breach.

    As an individual, write to your local federal representative, and implore the resurrection of the Data Broker Accountability and Transparency Act of 2020.

    See publication
  • Sacrifice Fly

    Independent

    Every rural and suburban town has at least one – the town idiot – the old fellow that has lived there forever, but doesn’t seem to be able to find their way out of a paper bag. In the urban areas, they thrive in large crowds in the homeless shelters where they are mostly ignored by society. But in rural America, people watch out for their own; regardless of their situation.

    See publication
  • Zero-Trust: From Aspirational to Overdue

    Independent

    Security is a resiliency model not an efficiency model, and as such, many organizations have increased their Year-over-Year (YoY) spending on security technologies. But as the threat landscape has been evolving to more targeted people-centric TTPs; the incremental costs of bolt-on security solutions have less of an effective impact resulting in a YoY decreased Return on Investment (ROI) in security spending.

    The Zero Trust paradigm re-thinks an organization’s security posture in terms…

    Security is a resiliency model not an efficiency model, and as such, many organizations have increased their Year-over-Year (YoY) spending on security technologies. But as the threat landscape has been evolving to more targeted people-centric TTPs; the incremental costs of bolt-on security solutions have less of an effective impact resulting in a YoY decreased Return on Investment (ROI) in security spending.

    The Zero Trust paradigm re-thinks an organization’s security posture in terms of people-centric threats and data-centric protections, emphasizing the age-old security tenets of “least privilege”, “segregation of duties” ,“continuous verification” and “security by design”. By embedding security at the core infrastructure, Zero Trust introduces a holistic, long-term, resilient, dynamic and cost-effective approach to an organization’s security posture.

    There is no “one size fits all” approach to a Zero Trust Initiative; hence we seek to discuss a thoughtful approach to executing (and operating) effectively in this new paradigm.

    See publication
  • The Resilient CISO

    Independent

    Cybersecurity is a lot like Firefighting, as they both use a (1) Risk-Based Approach coupled with (2) Situational Awareness of Scaffolding Dependencies plus (3) a Good Decision-Making Process to (4) make People a Priority.

    The Resilient CISO is not a unicorn. They are merely the right balance of Operational, Academic and Risk-Based approaches required by the organizational culture; but augmented with a People-Centric Foundation.

    See publication
  • Robotic Process Automation: The Promise, the Patterns, the Pitfalls

    O'Reilly / Pearson

    The demand for content related to RPA is surging, mainly because tactical guides currently do not exist. This field of software is maturing at a rapid pace and is being commoditized to the point where software bots work alongside humans for specific functions within an organization. In Robotic Process Automation LiveLessons, Mike Ogrinz and John Checco demonstrate the significant benefits involved in this red-hot topic and how to get the most out of your automation platforms.

    Other authors
    See publication
  • InfoSec Due Diligence in the M&A Process

    Unpublished

    With the maturity of knowledge in the data privacy and protection arena; due diligence in Information Security (InfoSec) practices should be considered a discrete practice that complements the technology and regulatory compliance assessments.

  • Level Two

    LuLu

    This novel leverages the latest scientific theories mixed with urban legend to turn our traditional perception of the world on its side. Entertain your brain, question reality, there is more here than meets the eye.

    See publication
  • Making Sense of a Biometrics Portfolio in an M&A Strategy

    Iris Capital Partners

    Taking the steps to understanding the business of biometrics is to dispel any preconceived notions about biometric technologies, recognize the timing for expansive growth in this market, comprehend the business drivers that influence biometrics technologies, and identify causalities for biometrics in a
    thoughtful and creative M&A strategy.

    See publication
  • Virtualization Striping: Providing RAID-like Failover for Applications

    WSTA

    Virtualization striping allows enterprises to gain the advantages of CPU optimization, server consolidation and first-level failover strategy. Virtualization and clustering technologies are more
    closely aligned than you think.

    See publication
Join now to see all publications

Patents

  • Optimizing Authentication and Management of Wireless Devices in Zero Trust Computing Environments

    Issued US 11381972

  • Data Sharding for Transmission over a High Generation Cellular Network

    Issued US 11258854, US 11706299, US 11979460

  • Reverse Proxy Server for an Internet-of-Things ("IoT") Network

    Issued US 10848588 B2

  • Blockchain-Based Supply Chain Smart Recall

    Issued US 10817829 B2

  • Reflexive benign service attack on IoT device(s)

    Issued US 10771502 B2, US 10609069 B2

  • Multi-Biometric-Factor, Internet of Things (IOT), Secured Network

    Issued US 11185229 B2, US 10602930 B2

  • Blockchain-Based Unexpected Data Detection

    Issued US 10567156 B2

  • Blockchain-Based Supply Chain Certification Systems and Methods

    Issued US 11055658 B2

  • Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data

    Issued US 11188909 B2, US 11196747 B2

  • Method for Providing Computer-Based Authentication Utilizing [Keystroke] Biometrics

    Issued US 7509686 B2

    A method and system looks for patterns in a series of data samples to determine consistency or inconsistency within the data sample.

  • Messaging Architecture Supporting Digital and Analog Media

    Issued US 5859898 A

    A message system includes voice or data messages and which allows such messages to be retrieved at the convenience of the recipient.

  • A Method for Providing Computer-Based Authentication Utilizing Gesture Biometrics

    Filed US 20130111580 A1

    A method and system looks for patterns in a series of gestures to determine consistency or inconsistency within the data sample.

Projects

  • LinkedOut Browser Extension

    - Present

    Chrome/Firefox browser extension to highlight and automatically hide "promoted ads" from your social media feed.

    See project
  • Outlook Client Safety Check

    - Present

    Outlook client add-on that allows users to passively check an email for "unusual anomalies" - such as spoofed email addresses, IP/host/domain blacklists, zero-width beacon images, misdirected URL content-types, and HaviEBeenPwned integration.

    See project
  • bioChec™ Keystroke Biometric Technology

    - Present

    Keystroke biometrics technology - now available free for in-house development use. Gesture biometrics implementation is currently being developed.

    See project
  • ConcurrentLock

    - Present

    In a really complex multithreaded application, traditional threading semaphore systems cause EXCLUSIVE access to objects, even if the method does not update any member variables! This results in an object implementation that only allows SERIAL access, not really what was meant by the multithreading capabilities of OO design. ConcurrentLock allows multiple threads CONCURRENT READ access to objects, while preserving object integrity through EXCLUSIVE WRITE access.

    See project
  • Resume Histogram

    This application displays a resume in histogram format, and allows employers to compare multiple resumes visually. Originally created as a BBS back in the late 1980's,it has been ported multiple times from C to Java to Ruby/Rails to PHP.

    See project
  • Transparent Cooperative Shared Computer Workspaces (T-CSCW)

    -

    In 1993, prior to what we now know as WebEx/Zoom/Teams, there was this little known research project at NYNEX Science & Technology to bring multi-point user video calls over the ISDN/SDSL to customers. Unfortunately, NYNEXS&T did not see this as their future, so the patent application was never filed. (Imagine if they had!)

Honors & Awards

  • Outstanding Achievement in Excellence

    -

  • County Fire Instructor of the Year

    Rockland County Fire Chiefs Association

  • County Fire Instructor of the Year

    Rockland County Fire Chiefs Association

  • Unit Citation - Swift Water Rescue Team

    Rockland County Volunteer Firefighters Association (RCVFA)

    Stony Point Fire Department Swift Water Rescue Team received a Unit Citation with regard to a rescue of several youths trapped in swift water during Hurricane Sandy

  • HURST Green Cross Award

    Stony Point Fire Department

    Life saving activities performed during a vehicle extrication.

Organizations

  • ISSA

    President

    - Present
  • NY Metro Joint Cyber Security Conference

    Co-Founder, Chair

    - Present

    The New York Metro Joint Cyber Security Conference is the first collaborative event cooperatively developed, organized and sponsored by the following leading information security industry organizations: InfraGard, OWASP, ISSA, ISACA, ISC2, CSA, HTCIA, ACFE, et al.

  • Rockland County Fire Instructors Association

    Member

    - Present
  • New York Metro InfraGard Members Alliance (FBI Outreach Program)

    Past President, Board Director

    - Present

    President (2013 - 2018), Board of Directors (2010 - 2018), Cyber Security Awareness Instructor (2010 - 2012), Strategic Planning Committee (2010 - 2012) Secure Member (since 2003).

  • Wall Street Technology Association (WSTA)

    Strategic Content Committee Member

    -
  • ASIS (NY Chapter)

    Member

    -
  • IACSP

    Member

    -
  • INCITS (International Committee for Information Technology Standards)

    M1 Biometrics Committee Member

    -

    Worked on the technology standards specification for a keystroke dynamics [signature] capture data format.

View John C.’s full profile

  • See who you know in common
  • Get introduced
  • Contact John C. directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses