About
Transformational leader with 25+ years of experience driving cybersecurity innovation…
Articles by John C.
Activity
4K followers
Experience
-
███ ████ ████
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
Volunteer Experience
-
-
Firefighter / Emergency Response Diver
Stony Point Fire District
- 27 years 2 months
In addition to my firematic duties, I also run the Clam Bar at the annual Wayne Day Fundraiser, cook for various fundraisers such as the Clam Bake, Pig Roast, Wing Night, et al.
-
Firefighter / Captain
Milton Point Engine 192, City of Rye Fire Department, NY
- 15 years
In addition to my firematic duties, I also was treasurer as well as a firehouse cook for many social events.
-
Judge Advisor / Judge / Robot Inspector / Deans List Interviewer
U.S. FIRST
- 17 years 2 months
Science and Technology
FIRST Tech Challenge - Hudson Valley Qualifiers and Regionals
-
Assistant Hockey Coach (Bantam/Midget)
North Rockland Youth Hockey Association
- 2 years 8 months
Children
CEP-3 certified
Publications
-
Cyber-Physical Coordinated Attacks: The Emerging Complexity of Crisis Management
The Cyber Defense Review (Army Cyber Institute)
See publicationIt is conceivable and probable that today’s adversaries have contemplated – and recruited for – event scenarios in which a physical crisis is pre-ignited by a series of one of more carefully orchestrated cyber incidents.
As extremist groups grow bolder and attract younger more technology-astute prospects, there will be a convergence where both logical and physical attacks methods are used in concert towards a singular goal. These will be much more complex and targeted than the typical…It is conceivable and probable that today’s adversaries have contemplated – and recruited for – event scenarios in which a physical crisis is pre-ignited by a series of one of more carefully orchestrated cyber incidents.
As extremist groups grow bolder and attract younger more technology-astute prospects, there will be a convergence where both logical and physical attacks methods are used in concert towards a singular goal. These will be much more complex and targeted than the typical diversionary tactics we are prepared for today. -
Reframing Data Privacy
IAPP
See publicationAs an organization, ensure the identification, use and storage of consumer information is sufficiently tracked, since this will bolster both the security and privacy of those data elements. The results of this effort will assist with auditing and cyber-insurance compliance and materially reduce the impact radius of any breach.
As an individual, write to your local federal representative, and implore the resurrection of the Data Broker Accountability and Transparency Act of 2020. -
Sacrifice Fly
Independent
See publicationEvery rural and suburban town has at least one – the town idiot – the old fellow that has lived there forever, but doesn’t seem to be able to find their way out of a paper bag. In the urban areas, they thrive in large crowds in the homeless shelters where they are mostly ignored by society. But in rural America, people watch out for their own; regardless of their situation.
-
Zero-Trust: From Aspirational to Overdue
Independent
See publicationSecurity is a resiliency model not an efficiency model, and as such, many organizations have increased their Year-over-Year (YoY) spending on security technologies. But as the threat landscape has been evolving to more targeted people-centric TTPs; the incremental costs of bolt-on security solutions have less of an effective impact resulting in a YoY decreased Return on Investment (ROI) in security spending.
The Zero Trust paradigm re-thinks an organization’s security posture in terms…Security is a resiliency model not an efficiency model, and as such, many organizations have increased their Year-over-Year (YoY) spending on security technologies. But as the threat landscape has been evolving to more targeted people-centric TTPs; the incremental costs of bolt-on security solutions have less of an effective impact resulting in a YoY decreased Return on Investment (ROI) in security spending.
The Zero Trust paradigm re-thinks an organization’s security posture in terms of people-centric threats and data-centric protections, emphasizing the age-old security tenets of “least privilege”, “segregation of duties” ,“continuous verification” and “security by design”. By embedding security at the core infrastructure, Zero Trust introduces a holistic, long-term, resilient, dynamic and cost-effective approach to an organization’s security posture.
There is no “one size fits all” approach to a Zero Trust Initiative; hence we seek to discuss a thoughtful approach to executing (and operating) effectively in this new paradigm. -
The Resilient CISO
Independent
See publicationCybersecurity is a lot like Firefighting, as they both use a (1) Risk-Based Approach coupled with (2) Situational Awareness of Scaffolding Dependencies plus (3) a Good Decision-Making Process to (4) make People a Priority.
The Resilient CISO is not a unicorn. They are merely the right balance of Operational, Academic and Risk-Based approaches required by the organizational culture; but augmented with a People-Centric Foundation. -
Robotic Process Automation: The Promise, the Patterns, the Pitfalls
O'Reilly / Pearson
The demand for content related to RPA is surging, mainly because tactical guides currently do not exist. This field of software is maturing at a rapid pace and is being commoditized to the point where software bots work alongside humans for specific functions within an organization. In Robotic Process Automation LiveLessons, Mike Ogrinz and John Checco demonstrate the significant benefits involved in this red-hot topic and how to get the most out of your automation platforms.
Other authorsSee publication -
InfoSec Due Diligence in the M&A Process
Unpublished
With the maturity of knowledge in the data privacy and protection arena; due diligence in Information Security (InfoSec) practices should be considered a discrete practice that complements the technology and regulatory compliance assessments.
-
Level Two
LuLu
See publicationThis novel leverages the latest scientific theories mixed with urban legend to turn our traditional perception of the world on its side. Entertain your brain, question reality, there is more here than meets the eye.
-
Making Sense of a Biometrics Portfolio in an M&A Strategy
Iris Capital Partners
See publicationTaking the steps to understanding the business of biometrics is to dispel any preconceived notions about biometric technologies, recognize the timing for expansive growth in this market, comprehend the business drivers that influence biometrics technologies, and identify causalities for biometrics in a
thoughtful and creative M&A strategy. -
Virtualization Striping: Providing RAID-like Failover for Applications
WSTA
See publicationVirtualization striping allows enterprises to gain the advantages of CPU optimization, server consolidation and first-level failover strategy. Virtualization and clustering technologies are more
closely aligned than you think.
Patents
-
Optimizing Authentication and Management of Wireless Devices in Zero Trust Computing Environments
Issued US 11381972
-
Data Sharding for Transmission over a High Generation Cellular Network
Issued US 11258854, US 11706299, US 11979460
-
Reverse Proxy Server for an Internet-of-Things ("IoT") Network
Issued US 10848588 B2
-
Blockchain-Based Supply Chain Smart Recall
Issued US 10817829 B2
-
Reflexive benign service attack on IoT device(s)
Issued US 10771502 B2, US 10609069 B2
-
Multi-Biometric-Factor, Internet of Things (IOT), Secured Network
Issued US 11185229 B2, US 10602930 B2
-
Blockchain-Based Unexpected Data Detection
Issued US 10567156 B2
-
Blockchain-Based Supply Chain Certification Systems and Methods
Issued US 11055658 B2
-
Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data
Issued US 11188909 B2, US 11196747 B2
-
Method for Providing Computer-Based Authentication Utilizing [Keystroke] Biometrics
Issued US 7509686 B2
A method and system looks for patterns in a series of data samples to determine consistency or inconsistency within the data sample.
-
Messaging Architecture Supporting Digital and Analog Media
Issued US 5859898 A
A message system includes voice or data messages and which allows such messages to be retrieved at the convenience of the recipient.
-
A Method for Providing Computer-Based Authentication Utilizing Gesture Biometrics
Filed US 20130111580 A1
A method and system looks for patterns in a series of gestures to determine consistency or inconsistency within the data sample.
Projects
-
LinkedOut Browser Extension
- Present
See projectChrome/Firefox browser extension to highlight and automatically hide "promoted ads" from your social media feed.
-
Outlook Client Safety Check
- Present
See projectOutlook client add-on that allows users to passively check an email for "unusual anomalies" - such as spoofed email addresses, IP/host/domain blacklists, zero-width beacon images, misdirected URL content-types, and HaviEBeenPwned integration.
-
bioChec™ Keystroke Biometric Technology
- Present
See projectKeystroke biometrics technology - now available free for in-house development use. Gesture biometrics implementation is currently being developed.
-
ConcurrentLock
- Present
See projectIn a really complex multithreaded application, traditional threading semaphore systems cause EXCLUSIVE access to objects, even if the method does not update any member variables! This results in an object implementation that only allows SERIAL access, not really what was meant by the multithreading capabilities of OO design. ConcurrentLock allows multiple threads CONCURRENT READ access to objects, while preserving object integrity through EXCLUSIVE WRITE access.
-
Resume Histogram
See projectThis application displays a resume in histogram format, and allows employers to compare multiple resumes visually. Originally created as a BBS back in the late 1980's,it has been ported multiple times from C to Java to Ruby/Rails to PHP.
-
Transparent Cooperative Shared Computer Workspaces (T-CSCW)
-
In 1993, prior to what we now know as WebEx/Zoom/Teams, there was this little known research project at NYNEX Science & Technology to bring multi-point user video calls over the ISDN/SDSL to customers. Unfortunately, NYNEXS&T did not see this as their future, so the patent application was never filed. (Imagine if they had!)
Honors & Awards
-
Outstanding Achievement in Excellence
-
-
County Fire Instructor of the Year
Rockland County Fire Chiefs Association
-
County Fire Instructor of the Year
Rockland County Fire Chiefs Association
-
Unit Citation - Swift Water Rescue Team
Rockland County Volunteer Firefighters Association (RCVFA)
Stony Point Fire Department Swift Water Rescue Team received a Unit Citation with regard to a rescue of several youths trapped in swift water during Hurricane Sandy
-
HURST Green Cross Award
Stony Point Fire Department
Life saving activities performed during a vehicle extrication.
Organizations
-
ISSA
President
- Present -
NY Metro Joint Cyber Security Conference
Co-Founder, Chair
- PresentThe New York Metro Joint Cyber Security Conference is the first collaborative event cooperatively developed, organized and sponsored by the following leading information security industry organizations: InfraGard, OWASP, ISSA, ISACA, ISC2, CSA, HTCIA, ACFE, et al.
-
Rockland County Fire Instructors Association
Member
- Present -
New York Metro InfraGard Members Alliance (FBI Outreach Program)
Past President, Board Director
- PresentPresident (2013 - 2018), Board of Directors (2010 - 2018), Cyber Security Awareness Instructor (2010 - 2012), Strategic Planning Committee (2010 - 2012) Secure Member (since 2003).
-
Wall Street Technology Association (WSTA)
Strategic Content Committee Member
- -
ASIS (NY Chapter)
Member
- -
IACSP
Member
- -
INCITS (International Committee for Information Technology Standards)
M1 Biometrics Committee Member
-Worked on the technology standards specification for a keystroke dynamics [signature] capture data format.
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content