About
Articles by Dr. Chase
-
A Tale of Two Funnels: The Impact of Virtual Demos
A Tale of Two Funnels: The Impact of Virtual Demos
By Dr. Chase Cunningham
-
Remembering Our Fallen: The True Meaning of Memorial Day
Remembering Our Fallen: The True Meaning of Memorial Day
By Dr. Chase Cunningham
-
Zero Trust and Software Design: Enhancing Security from the Start
Zero Trust and Software Design: Enhancing Security from the Start
By Dr. Chase Cunningham
Activity
-
If you are in Huntsville and free next Tuesday, stop on by. https://lnkd.in/eThgTsyH
If you are in Huntsville and free next Tuesday, stop on by. https://lnkd.in/eThgTsyH
Liked by Dr. Chase Cunningham
-
😎 Fancy a quali-day? #BritishGP #WeAreWilliams #KeeperRacing
😎 Fancy a quali-day? #BritishGP #WeAreWilliams #KeeperRacing
Liked by Dr. Chase Cunningham
Experience & Education
Licenses & Certifications
-
-
Anti Terrorism Accreditation Board Certified Cyber
ATAB
-
Certified Ethical Hacker
EC Council
-
Computer Hacking Forensic Investigator
-
-
Computer Information Warfare Certified
National Cryptologic School
-
EC Council Certified Security Administrator
EC Council
-
Licensed Pen Tester
EC Council
-
Microsoft Technical Specialist
Microsoft
-
Network +
Comptia
-
Security +
Comptia
Publications
-
How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders
Wiley Publishing
Ditch the fluff and sugarcoating and learn how to lead the way your people deserve. In How NOT To Lead, Dr. Chase Cunningham, a seasoned cybersecurity heavyweight and Retired Navy Chief, doesn't give you a textbook guide on leadership ― he delivers a no-holds-barred, gloves-off masterclass on the lethal mistakes that'll tank your leadership game and ultimately sink your reputation and even your company's future.
Want the brutal truth? This book slaps you with some cold, hard…Ditch the fluff and sugarcoating and learn how to lead the way your people deserve. In How NOT To Lead, Dr. Chase Cunningham, a seasoned cybersecurity heavyweight and Retired Navy Chief, doesn't give you a textbook guide on leadership ― he delivers a no-holds-barred, gloves-off masterclass on the lethal mistakes that'll tank your leadership game and ultimately sink your reputation and even your company's future.
Want the brutal truth? This book slaps you with some cold, hard realities:
What happens when you fall off your ego and hit your IQ on the way down as a leader, and why you need to do that.
The absolute idiocy of "Mushroom Farming": keeping your team in the dark, feeding them crap, and expecting gourmet results.
A nowhere-to-hide deep dive into "Dumpster Chickens" leadership: using destructive tactics that rip apart team spirit and obliterate business success.
The triple threat: the three non-negotiable currencies every leader MUST have. Miss one, and you're doomed.
Eye-opening case studies ― ripped from headlines and history books ― that throw a spotlight on the real-world disasters of crappy leadership.
Aimed squarely at managers, executives, and anyone brave enough to lead, How NOT To Lead is your audacious guide through the minefield of leadership pitfalls. If you've got the intestinal fortitude to read this book, then drop what you are doing and hitch up your britches for some tough love.
Don't let mediocrity be your legacy, do better. Your employees deserve it and so do you! -
TheHackedBook2
Amazon
We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.
The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not…We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.
The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not currently addressed by traditional security solutions.
The perimeter is no longer effective in deterring or preventing cyberattacks?
Cybersecurity attacks are up more than 80%
How comfortable are you with your ability to detect and respond before damage is done?
Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED! #HACKED2 delivers the experience of the Author and 12 Exceptional Cybersecurity Professionals all in one location.Other authorsSee publication -
Rip Tide: A Narrative on Cyber Security Failures at the National Level
Amazon
The United States, while possessing potent cyber operational capabilities, increasingly is focused on intelligence gathering and offensive cyber operations. Defensive cyber operations and day-to-day operations of critical mission-enabling information technology are increasingly outsourced to a variety collection of vendors and their subordinate partners. As 2021 nears its conclusion, elements within the US Department of Defense are advocating outsourcing the operations and maintenance of its…
The United States, while possessing potent cyber operational capabilities, increasingly is focused on intelligence gathering and offensive cyber operations. Defensive cyber operations and day-to-day operations of critical mission-enabling information technology are increasingly outsourced to a variety collection of vendors and their subordinate partners. As 2021 nears its conclusion, elements within the US Department of Defense are advocating outsourcing the operations and maintenance of its foundational mission-enabling information technology systems and networks with an eye toward what they call a “single service provider.” In this allegorical story, the authors present an independent third-party discussion of the topic with an eye on answering the question, “What possibly could go wrong with that?” It is our hope that this discussion will educate and inform policy makers in both the executive and legislative branches to make the best-informed risk management decisions to preserve, protect, and defend our country.
Other authorsSee publication -
gAbrIel
Amazon
The plane had only just broken free of the earth's gravity and was a few hundred feet off the ground when Greg and Mark saw the black dots ahead of him rise up from the grass beyond the runway fence.
They moved like a swarm of killer bees and quickly split into two groups. Each group maneuvered in the sky directly in front of each of the oncoming 737's engines.
"What in the hell...holy shit!" Greg shouted and looked eyes as wide as dinner plates at Mark. The plane's…The plane had only just broken free of the earth's gravity and was a few hundred feet off the ground when Greg and Mark saw the black dots ahead of him rise up from the grass beyond the runway fence.
They moved like a swarm of killer bees and quickly split into two groups. Each group maneuvered in the sky directly in front of each of the oncoming 737's engines.
"What in the hell...holy shit!" Greg shouted and looked eyes as wide as dinner plates at Mark. The plane's cockpit careened past the dots at over 400 miles per hour, and in that second, time slowed. Greg looked out of the cockpit window aghast at what he saw.
Drones.
Hundreds of them. -
Cyber Warfare-Truth, Tactics, and Strategies
Packt Publishing
Insights into the true history of cyber warfare, and the strategies, tactics, and cyber security tools that can be used to better defend yourself and your organization against cyber threat.
Other authorsSee publication -
The Cynja Field Instruction Manual
Blurb Publishing
An activity book for trainee cyberheroes! Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero—one who will protect cyberspace from attack! Join the Cynsei, as he helps you acquire cyber powers to fight zombies, worms and botnets. The world needs boys and girls with the digital smarts to become Cynjas and keep the Internet safe for all.Crack open the Cynja Field Instruction Manual & learn how to be a…
An activity book for trainee cyberheroes! Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero—one who will protect cyberspace from attack! Join the Cynsei, as he helps you acquire cyber powers to fight zombies, worms and botnets. The world needs boys and girls with the digital smarts to become Cynjas and keep the Internet safe for all.Crack open the Cynja Field Instruction Manual & learn how to be a cyberhero!
-
How to Talk InfoSec With Kids
HelpNet Security
As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet.
-
Ransomware-A Rising Threat That's Playing for Keeps
Firehost Inc
It seems that every day a major brand suffers a data breach. The breach is publicized widely in the news, and the company’s brand, customers, and business plunge immediately into crisis mode. However, far from the media spotlight, a prevailing trend in the seedy world of threat actors is causing numerous companies who are victimized to suffer in silence. Ransomware is one of the fastest-growing threats in today’s world. This is a video demonstration of tactics ransom actors can take to attack…
It seems that every day a major brand suffers a data breach. The breach is publicized widely in the news, and the company’s brand, customers, and business plunge immediately into crisis mode. However, far from the media spotlight, a prevailing trend in the seedy world of threat actors is causing numerous companies who are victimized to suffer in silence. Ransomware is one of the fastest-growing threats in today’s world. This is a video demonstration of tactics ransom actors can take to attack and victimize businesses. It is a nasty threat that makes it imperative for businesses to carefully select a cloud provider who can reduce risk, protect data and exceed compliance requirements.
-
The Cynja
Blurb Publishing
A cyber security comic for kids, the story begins:
Hidden deep inside our planet’s virtual world, lurking in the darkened cyber alleys of our digital neighborhoods, a new generation of bad guys has risen. Zombies, worms, botnets – all threaten our happiness and future. But there is hope. A lone warrior battles this new sinister cyber evil. He is the Cynsei.
The Cynsei is trying to keep us safe.
But the guardian of all things noble in cyberspace cannot fight alone. His enemies are…A cyber security comic for kids, the story begins:
Hidden deep inside our planet’s virtual world, lurking in the darkened cyber alleys of our digital neighborhoods, a new generation of bad guys has risen. Zombies, worms, botnets – all threaten our happiness and future. But there is hope. A lone warrior battles this new sinister cyber evil. He is the Cynsei.
The Cynsei is trying to keep us safe.
But the guardian of all things noble in cyberspace cannot fight alone. His enemies are too numerous. If the Internet is to escape falling into darkness, the Cynsei needs help. But who would be brave enough to travel into the depths of malicious networks?
A Cynja, that’s who. -
WILL SCIENCE AND TECHNOLOGY COMBINE TO ELIMINATE INSIDER THREATS?
Cyber Defense Magazine
Cybersecurity has gained an unprecedented amount of attention in the last decade. Traditionally, threats
involve nation state hacking, cybercrime, hacktivism, and malware. However, an increasing number of
insider threat incidents, which pose potentially greater ramifications to both public and private networks, are
also causing significant damage.
The cyber insider threat is not based on unauthorized access by unauthorized individuals, but rather, by…Cybersecurity has gained an unprecedented amount of attention in the last decade. Traditionally, threats
involve nation state hacking, cybercrime, hacktivism, and malware. However, an increasing number of
insider threat incidents, which pose potentially greater ramifications to both public and private networks, are
also causing significant damage.
The cyber insider threat is not based on unauthorized access by unauthorized individuals, but rather, by
authorized access authorized individuals. Insider threats are currently the number one security problem
facing most organizations.. According to a study by the US Secret Service and US Computer Emergency
Readiness Team (CERT), a staggering 83 percent of insider threat cases involve attacks that took place
from within the insider’s physical offices-- in 70 percent of the cases, the incidents took place during normal
business hours. Insider attacks are also far more costly to companies than external breaches. -
The Cyber Defence Landscape -A Constantly Changing and Dynamic War Fighting Environment
MilTech Magazine
The recent innovations and developments
in both technologies and tactics from
the defense and analytic standpoint is
improving by leaps and bounds as
intelligence collection and deep
technology and attack specific tools are
developed and information is shared,
but the onslaught of attack will continue. -
The Future of Cyber Analytics
CyberUnited
There is a coming change in how cyber security is both perceived and functionally
performed across all of the cyber security industry. The revolution has been slowly and quietly
fermenting among small groups of individuals and progressing through focused research projects
funded by a variety of agencies and individual investors. These industry changing initiatives have
their basis in ideas and practices that range from advanced algorithmic augmentation and
machine learning…There is a coming change in how cyber security is both perceived and functionally
performed across all of the cyber security industry. The revolution has been slowly and quietly
fermenting among small groups of individuals and progressing through focused research projects
funded by a variety of agencies and individual investors. These industry changing initiatives have
their basis in ideas and practices that range from advanced algorithmic augmentation and
machine learning modified to detect and isolate anomalous activity across the breadth of source
data originating within emails, logs, chat sessions, and other vast lakes and oceans of data. It will
be these new methods and practices and the resulting technologies that will follow that will truly
push the boundaries of the realm of the possible within cyber security and will provide quantum
leaps in additions to the functional comprehension of the realities of the uses of data for truly
optimized security and next generation prevention of compromises.
Patents
-
Extracting and detecting malicious instructions on a virtual machine
Issued US 10210325
Abstract: A system that includes a vault management console configured to determine a measurement request for virtual machine operating characteristics metadata. The system further includes a guest virtual machine that includes virtual machine measurement points and a hypervisor control point. The system further includes a hypervisor associated with the guest virtual machine that is configured to communicate the measurement request to the hypervisor control point. The hypervisor is further…
Abstract: A system that includes a vault management console configured to determine a measurement request for virtual machine operating characteristics metadata. The system further includes a guest virtual machine that includes virtual machine measurement points and a hypervisor control point. The system further includes a hypervisor associated with the guest virtual machine that is configured to communicate the measurement request to the hypervisor control point. The hypervisor is further configured to receive a packet with the virtual machine operating characteristics metadata and to communicate the packet to the virtual vault machine. The hypervisor device driver is configured to receive the packet from the hypervisor and to communicate the virtual machine operating characteristics to an analysis tool.
Other inventorsSee patent -
Extracting malicious instructions on a virtual machine in a network environment
Issued US 10157276
A system including a guest virtual machine with one or more virtual machine measurement points configured to collect virtual machine operating characteristics metadata and a hypervisor control point configured to receive virtual machine operating characteristics metadata from the virtual machine measurement points. The hypervisor control point is further configured to send the virtual machine operating characteristics metadata to a hypervisor associated with the guest virtual machine. The…
A system including a guest virtual machine with one or more virtual machine measurement points configured to collect virtual machine operating characteristics metadata and a hypervisor control point configured to receive virtual machine operating characteristics metadata from the virtual machine measurement points. The hypervisor control point is further configured to send the virtual machine operating characteristics metadata to a hypervisor associated with the guest virtual machine. The system further includes the hypervisor configured to receive the virtual machine operating characteristics metadata and to forward the virtual machine operating characteristics metadata to a hypervisor device driver in a virtual vault machine. The system further includes the virtual vault machine configured to determine a classification for the guest virtual machine based on the virtual machine operating characteristics metadata and to send the determined classification to a vault management console.
Other inventorsSee patent -
Detecting malicious instructions on a virtual machine
Issued US 10210324
A system that includes a hypervisor configured to communicate packets comprising virtual machine operating characteristics metadata for guest virtual machines. The system further includes a virtual vault machine comprising a hypervisor device driver, a hypervisor device driver interface, and an analysis tool. The hypervisor device driver is configured to receive a packet comprising virtual machine operating characteristics metadata for a guest virtual machine and to communicate the virtual…
A system that includes a hypervisor configured to communicate packets comprising virtual machine operating characteristics metadata for guest virtual machines. The system further includes a virtual vault machine comprising a hypervisor device driver, a hypervisor device driver interface, and an analysis tool. The hypervisor device driver is configured to receive a packet comprising virtual machine operating characteristics metadata for a guest virtual machine and to communicate the virtual machine operating characteristics metadata to an analysis tool using the hypervisor device driver interface. The analysis tool is configured to correlate the virtual machine operating characteristics metadata to one of a cluster of known healthy guest virtual machines or a cluster of known compromised guest virtual machines using a machine learning algorithm and to classify the guest virtual machine.
Other inventorsSee patent
Projects
-
The Cynja
The Cynja is an illustrated story introducing kids to the awesome world of cybersecurity and technology.
-
National Board of Information Security Examiners
The National Board of Information Security Examiners mission is to improve the performance of the cybersecurity workforce. Through its programs and research, NBISE helps to validate hands-on skills and knowledge in order to reliably predict an individual’s future performance and aptitude for cybersecurity.
NBISE was formed to leverage the latest advances in assessment and learning science towards the solution of one of the United States’ most critical workforce shortages: cyber security…The National Board of Information Security Examiners mission is to improve the performance of the cybersecurity workforce. Through its programs and research, NBISE helps to validate hands-on skills and knowledge in order to reliably predict an individual’s future performance and aptitude for cybersecurity.
NBISE was formed to leverage the latest advances in assessment and learning science towards the solution of one of the United States’ most critical workforce shortages: cyber security professionals. Through its Advanced Defender Aptitude and Performance Testing and Simulation (ADAPTS) program, NBISE coordinates the work of teams of practitioners, researchers, and educators which develop and validate or enhance existing performance-based learning and assessment vehicles to materially accelerate the acquisition of hands-on skill and tacit knowledge by students and practitioners in collegiate and continuing education programs. -
Military Technology Magazine Cyber Contributor
MILITARY TECHNOLOGY (MILTECH) is the world's leading international tri-service defence monthly magazine in the English language. MILITARY TECHNOLOGY is "Required Reading for Defence Professionals".
-
The Cynja
-
The Cynja is an illustrated story introducing kids to the awesome world of cybersecurity and technology.
The world needs more heroes. The cyber world is both thrilling and threatening but it doesn’t have it’s own superhero. That’s why we created The Cynja, you know a Cynja is a cyber ninja. The world needs more Cynjas.
Honors & Awards
-
2019 Most Influential People in Security
Security Magazine
Security magazine is pleased to announce our 2019 Most Influential People in Security – 26 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.
These security leaders have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and overall positive impact on stakeholders, enterprises, colleagues…Security magazine is pleased to announce our 2019 Most Influential People in Security – 26 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.
These security leaders have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and overall positive impact on stakeholders, enterprises, colleagues, constituents and the general public.
Languages
-
English
-
-
Russian - basic
-
Organizations
-
Cleared Professionals
TS/SCI CI Poly
Recommendations received
15 people have recommended Dr. Chase
Join now to viewMore activity by Dr. Chase
-
A lot of you are too scared to fail, and it shows. Got some news for you—Complacency breeds shit marketing. Marketing leaders are setting their…
A lot of you are too scared to fail, and it shows. Got some news for you—Complacency breeds shit marketing. Marketing leaders are setting their…
Liked by Dr. Chase Cunningham
-
What if I told you that the majority, if not all, of the current cyber attacks we have seen could have been easily prevented? If you are attending…
What if I told you that the majority, if not all, of the current cyber attacks we have seen could have been easily prevented? If you are attending…
Liked by Dr. Chase Cunningham
-
Summer has arrived and so have our G2 Summer 2024 Reports! The world of B2B software and services moves fast, so in addition to our real-time…
Summer has arrived and so have our G2 Summer 2024 Reports! The world of B2B software and services moves fast, so in addition to our real-time…
Liked by Dr. Chase Cunningham
-
Happy Independence Day from TAC! #thetac #technologyadvancementcenter
Happy Independence Day from TAC! #thetac #technologyadvancementcenter
Liked by Dr. Chase Cunningham
-
A Very Happy 4th of July to my American friends and colleagues...from Berlin! Xage Security
A Very Happy 4th of July to my American friends and colleagues...from Berlin! Xage Security
Liked by Dr. Chase Cunningham
-
Oh hey Nelson Soares glad I’m sending my peeps to work with y’all 🥂 Cc Reco AI
Oh hey Nelson Soares glad I’m sending my peeps to work with y’all 🥂 Cc Reco AI
Liked by Dr. Chase Cunningham
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More