Dr. Chase Cunningham

Washington DC-Baltimore Area Contact Info
15K followers 500+ connections

Join to view profile

About

I am a retired Navy Chief Cryptologist with more than 20 years experience in Cyber…

Articles by Dr. Chase

See all articles

Activity

Join now to see all activity

Experience & Education

  • MISI is now Technology Advancement Center (TAC)

View Dr. Chase’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders

    Wiley Publishing

    Ditch the fluff and sugarcoating and learn how to lead the way your people deserve. In How NOT To Lead, Dr. Chase Cunningham, a seasoned cybersecurity heavyweight and Retired Navy Chief, doesn't give you a textbook guide on leadership ― he delivers a no-holds-barred, gloves-off masterclass on the lethal mistakes that'll tank your leadership game and ultimately sink your reputation and even your company's future.

    Want the brutal truth? This book slaps you with some cold, hard…

    Ditch the fluff and sugarcoating and learn how to lead the way your people deserve. In How NOT To Lead, Dr. Chase Cunningham, a seasoned cybersecurity heavyweight and Retired Navy Chief, doesn't give you a textbook guide on leadership ― he delivers a no-holds-barred, gloves-off masterclass on the lethal mistakes that'll tank your leadership game and ultimately sink your reputation and even your company's future.

    Want the brutal truth? This book slaps you with some cold, hard realities:

    What happens when you fall off your ego and hit your IQ on the way down as a leader, and why you need to do that.
    The absolute idiocy of "Mushroom Farming": keeping your team in the dark, feeding them crap, and expecting gourmet results.
    A nowhere-to-hide deep dive into "Dumpster Chickens" leadership: using destructive tactics that rip apart team spirit and obliterate business success.
    The triple threat: the three non-negotiable currencies every leader MUST have. Miss one, and you're doomed.
    Eye-opening case studies ― ripped from headlines and history books ― that throw a spotlight on the real-world disasters of crappy leadership.
    Aimed squarely at managers, executives, and anyone brave enough to lead, How NOT To Lead is your audacious guide through the minefield of leadership pitfalls. If you've got the intestinal fortitude to read this book, then drop what you are doing and hitch up your britches for some tough love.

    Don't let mediocrity be your legacy, do better. Your employees deserve it and so do you!

    See publication
  • TheHackedBook2

    Amazon

    We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.

    The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not…

    We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.

    The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not currently addressed by traditional security solutions.

    The perimeter is no longer effective in deterring or preventing cyberattacks?
    Cybersecurity attacks are up more than 80%
    How comfortable are you with your ability to detect and respond before damage is done?

    Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED! #HACKED2 delivers the experience of the Author and 12 Exceptional Cybersecurity Professionals all in one location.

    Other authors
    See publication
  • Rip Tide: A Narrative on Cyber Security Failures at the National Level

    Amazon

    The United States, while possessing potent cyber operational capabilities, increasingly is focused on intelligence gathering and offensive cyber operations. Defensive cyber operations and day-to-day operations of critical mission-enabling information technology are increasingly outsourced to a variety collection of vendors and their subordinate partners. As 2021 nears its conclusion, elements within the US Department of Defense are advocating outsourcing the operations and maintenance of its…

    The United States, while possessing potent cyber operational capabilities, increasingly is focused on intelligence gathering and offensive cyber operations. Defensive cyber operations and day-to-day operations of critical mission-enabling information technology are increasingly outsourced to a variety collection of vendors and their subordinate partners. As 2021 nears its conclusion, elements within the US Department of Defense are advocating outsourcing the operations and maintenance of its foundational mission-enabling information technology systems and networks with an eye toward what they call a “single service provider.” In this allegorical story, the authors present an independent third-party discussion of the topic with an eye on answering the question, “What possibly could go wrong with that?” It is our hope that this discussion will educate and inform policy makers in both the executive and legislative branches to make the best-informed risk management decisions to preserve, protect, and defend our country.

    Other authors
    See publication
  • gAbrIel

    Amazon

    The plane had only just broken free of the earth's gravity and was a few hundred feet off the ground when Greg and Mark saw the black dots ahead of him rise up from the grass beyond the runway fence.


    They moved like a swarm of killer bees and quickly split into two groups. Each group maneuvered in the sky directly in front of each of the oncoming 737's engines.


    "What in the hell...holy shit!" Greg shouted and looked eyes as wide as dinner plates at Mark. The plane's…

    The plane had only just broken free of the earth's gravity and was a few hundred feet off the ground when Greg and Mark saw the black dots ahead of him rise up from the grass beyond the runway fence.


    They moved like a swarm of killer bees and quickly split into two groups. Each group maneuvered in the sky directly in front of each of the oncoming 737's engines.


    "What in the hell...holy shit!" Greg shouted and looked eyes as wide as dinner plates at Mark. The plane's cockpit careened past the dots at over 400 miles per hour, and in that second, time slowed. Greg looked out of the cockpit window aghast at what he saw.


    Drones.


    Hundreds of them.

    See publication
  • Cyber Warfare-Truth, Tactics, and Strategies

    Packt Publishing

    Insights into the true history of cyber warfare, and the strategies, tactics, and cyber security tools that can be used to better defend yourself and your organization against cyber threat.

    Other authors
    See publication
  • The Cynja Field Instruction Manual

    Blurb Publishing

    An activity book for trainee cyberheroes! Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero—one who will protect cyberspace from attack! Join the Cynsei, as he helps you acquire cyber powers to fight zombies, worms and botnets. The world needs boys and girls with the digital smarts to become Cynjas and keep the Internet safe for all.Crack open the Cynja Field Instruction Manual & learn how to be a…

    An activity book for trainee cyberheroes! Today, our battlefield is a new frontier, one that’s invisible to all but those with cyber powers. It’s time to train a new kind of superhero—one who will protect cyberspace from attack! Join the Cynsei, as he helps you acquire cyber powers to fight zombies, worms and botnets. The world needs boys and girls with the digital smarts to become Cynjas and keep the Internet safe for all.Crack open the Cynja Field Instruction Manual & learn how to be a cyberhero!

    See publication
  • Explaining InfoSec Magic to Kids

    HelpNetSecurity.org

  • How to Talk InfoSec With Kids

    HelpNet Security

    As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like me, chances are you’re concerned about your kids using the Internet.

    See publication
  • Ransomware-A Rising Threat That's Playing for Keeps

    Firehost Inc

    It seems that every day a major brand suffers a data breach. The breach is publicized widely in the news, and the company’s brand, customers, and business plunge immediately into crisis mode. However, far from the media spotlight, a prevailing trend in the seedy world of threat actors is causing numerous companies who are victimized to suffer in silence. Ransomware is one of the fastest-growing threats in today’s world. This is a video demonstration of tactics ransom actors can take to attack…

    It seems that every day a major brand suffers a data breach. The breach is publicized widely in the news, and the company’s brand, customers, and business plunge immediately into crisis mode. However, far from the media spotlight, a prevailing trend in the seedy world of threat actors is causing numerous companies who are victimized to suffer in silence. Ransomware is one of the fastest-growing threats in today’s world. This is a video demonstration of tactics ransom actors can take to attack and victimize businesses. It is a nasty threat that makes it imperative for businesses to carefully select a cloud provider who can reduce risk, protect data and exceed compliance requirements.

    See publication
  • The Cynja

    Blurb Publishing

    A cyber security comic for kids, the story begins:

    Hidden deep inside our planet’s virtual world, lurking in the darkened cyber alleys of our digital neighborhoods, a new generation of bad guys has risen. Zombies, worms, botnets – all threaten our happiness and future. But there is hope. A lone warrior battles this new sinister cyber evil. He is the Cynsei.
    The Cynsei is trying to keep us safe.
    But the guardian of all things noble in cyberspace cannot fight alone. His enemies are…

    A cyber security comic for kids, the story begins:

    Hidden deep inside our planet’s virtual world, lurking in the darkened cyber alleys of our digital neighborhoods, a new generation of bad guys has risen. Zombies, worms, botnets – all threaten our happiness and future. But there is hope. A lone warrior battles this new sinister cyber evil. He is the Cynsei.
    The Cynsei is trying to keep us safe.
    But the guardian of all things noble in cyberspace cannot fight alone. His enemies are too numerous. If the Internet is to escape falling into darkness, the Cynsei needs help. But who would be brave enough to travel into the depths of malicious networks?
    A Cynja, that’s who.

    See publication
  • WILL SCIENCE AND TECHNOLOGY COMBINE TO ELIMINATE INSIDER THREATS?

    Cyber Defense Magazine

    Cybersecurity has gained an unprecedented amount of attention in the last decade. Traditionally, threats
    involve nation state hacking, cybercrime, hacktivism, and malware. However, an increasing number of
    insider threat incidents, which pose potentially greater ramifications to both public and private networks, are
    also causing significant damage.
    The cyber insider threat is not based on unauthorized access by unauthorized individuals, but rather, by…

    Cybersecurity has gained an unprecedented amount of attention in the last decade. Traditionally, threats
    involve nation state hacking, cybercrime, hacktivism, and malware. However, an increasing number of
    insider threat incidents, which pose potentially greater ramifications to both public and private networks, are
    also causing significant damage.
    The cyber insider threat is not based on unauthorized access by unauthorized individuals, but rather, by
    authorized access authorized individuals. Insider threats are currently the number one security problem
    facing most organizations.. According to a study by the US Secret Service and US Computer Emergency
    Readiness Team (CERT), a staggering 83 percent of insider threat cases involve attacks that took place
    from within the insider’s physical offices-- in 70 percent of the cases, the incidents took place during normal
    business hours. Insider attacks are also far more costly to companies than external breaches.

    See publication
  • The Cyber Defence Landscape -A Constantly Changing and Dynamic War Fighting Environment

    MilTech Magazine

    The recent innovations and developments
    in both technologies and tactics from
    the defense and analytic standpoint is
    improving by leaps and bounds as
    intelligence collection and deep
    technology and attack specific tools are
    developed and information is shared,
    but the onslaught of attack will continue.

    See publication
  • The Future of Cyber Analytics

    CyberUnited

    There is a coming change in how cyber security is both perceived and functionally
    performed across all of the cyber security industry. The revolution has been slowly and quietly
    fermenting among small groups of individuals and progressing through focused research projects
    funded by a variety of agencies and individual investors. These industry changing initiatives have
    their basis in ideas and practices that range from advanced algorithmic augmentation and
    machine learning…

    There is a coming change in how cyber security is both perceived and functionally
    performed across all of the cyber security industry. The revolution has been slowly and quietly
    fermenting among small groups of individuals and progressing through focused research projects
    funded by a variety of agencies and individual investors. These industry changing initiatives have
    their basis in ideas and practices that range from advanced algorithmic augmentation and
    machine learning modified to detect and isolate anomalous activity across the breadth of source
    data originating within emails, logs, chat sessions, and other vast lakes and oceans of data. It will
    be these new methods and practices and the resulting technologies that will follow that will truly
    push the boundaries of the realm of the possible within cyber security and will provide quantum
    leaps in additions to the functional comprehension of the realities of the uses of data for truly
    optimized security and next generation prevention of compromises.

    See publication

Patents

  • Extracting and detecting malicious instructions on a virtual machine

    Issued US 10210325

    Abstract: A system that includes a vault management console configured to determine a measurement request for virtual machine operating characteristics metadata. The system further includes a guest virtual machine that includes virtual machine measurement points and a hypervisor control point. The system further includes a hypervisor associated with the guest virtual machine that is configured to communicate the measurement request to the hypervisor control point. The hypervisor is further…

    Abstract: A system that includes a vault management console configured to determine a measurement request for virtual machine operating characteristics metadata. The system further includes a guest virtual machine that includes virtual machine measurement points and a hypervisor control point. The system further includes a hypervisor associated with the guest virtual machine that is configured to communicate the measurement request to the hypervisor control point. The hypervisor is further configured to receive a packet with the virtual machine operating characteristics metadata and to communicate the packet to the virtual vault machine. The hypervisor device driver is configured to receive the packet from the hypervisor and to communicate the virtual machine operating characteristics to an analysis tool.

    Other inventors
    See patent
  • Extracting malicious instructions on a virtual machine in a network environment

    Issued US 10157276

    A system including a guest virtual machine with one or more virtual machine measurement points configured to collect virtual machine operating characteristics metadata and a hypervisor control point configured to receive virtual machine operating characteristics metadata from the virtual machine measurement points. The hypervisor control point is further configured to send the virtual machine operating characteristics metadata to a hypervisor associated with the guest virtual machine. The…

    A system including a guest virtual machine with one or more virtual machine measurement points configured to collect virtual machine operating characteristics metadata and a hypervisor control point configured to receive virtual machine operating characteristics metadata from the virtual machine measurement points. The hypervisor control point is further configured to send the virtual machine operating characteristics metadata to a hypervisor associated with the guest virtual machine. The system further includes the hypervisor configured to receive the virtual machine operating characteristics metadata and to forward the virtual machine operating characteristics metadata to a hypervisor device driver in a virtual vault machine. The system further includes the virtual vault machine configured to determine a classification for the guest virtual machine based on the virtual machine operating characteristics metadata and to send the determined classification to a vault management console.

    Other inventors
    See patent
  • Detecting malicious instructions on a virtual machine

    Issued US 10210324

    A system that includes a hypervisor configured to communicate packets comprising virtual machine operating characteristics metadata for guest virtual machines. The system further includes a virtual vault machine comprising a hypervisor device driver, a hypervisor device driver interface, and an analysis tool. The hypervisor device driver is configured to receive a packet comprising virtual machine operating characteristics metadata for a guest virtual machine and to communicate the virtual…

    A system that includes a hypervisor configured to communicate packets comprising virtual machine operating characteristics metadata for guest virtual machines. The system further includes a virtual vault machine comprising a hypervisor device driver, a hypervisor device driver interface, and an analysis tool. The hypervisor device driver is configured to receive a packet comprising virtual machine operating characteristics metadata for a guest virtual machine and to communicate the virtual machine operating characteristics metadata to an analysis tool using the hypervisor device driver interface. The analysis tool is configured to correlate the virtual machine operating characteristics metadata to one of a cluster of known healthy guest virtual machines or a cluster of known compromised guest virtual machines using a machine learning algorithm and to classify the guest virtual machine.

    Other inventors
    See patent

Projects

  • The Cynja

    The Cynja is an illustrated story introducing kids to the awesome world of cybersecurity and technology.

    See project
  • National Board of Information Security Examiners

    The National Board of Information Security Examiners mission is to improve the performance of the cybersecurity workforce. Through its programs and research, NBISE helps to validate hands-on skills and knowledge in order to reliably predict an individual’s future performance and aptitude for cybersecurity.
    NBISE was formed to leverage the latest advances in assessment and learning science towards the solution of one of the United States’ most critical workforce shortages: cyber security…

    The National Board of Information Security Examiners mission is to improve the performance of the cybersecurity workforce. Through its programs and research, NBISE helps to validate hands-on skills and knowledge in order to reliably predict an individual’s future performance and aptitude for cybersecurity.
    NBISE was formed to leverage the latest advances in assessment and learning science towards the solution of one of the United States’ most critical workforce shortages: cyber security professionals. Through its Advanced Defender Aptitude and Performance Testing and Simulation (ADAPTS) program, NBISE coordinates the work of teams of practitioners, researchers, and educators which develop and validate or enhance existing performance-based learning and assessment vehicles to materially accelerate the acquisition of hands-on skill and tacit knowledge by students and practitioners in collegiate and continuing education programs.

    See project
  • Military Technology Magazine Cyber Contributor

    MILITARY TECHNOLOGY (MILTECH) is the world's leading international tri-service defence monthly magazine in the English language. MILITARY TECHNOLOGY is "Required Reading for Defence Professionals".

    See project
  • The Cynja

    -

    The Cynja is an illustrated story introducing kids to the awesome world of cybersecurity and technology.
    The world needs more heroes. The cyber world is both thrilling and threatening but it doesn’t have it’s own superhero. That’s why we created The Cynja, you know a Cynja is a cyber ninja. The world needs more Cynjas.

    See project

Honors & Awards

  • 2019 Most Influential People in Security

    Security Magazine

    Security magazine is pleased to announce our 2019 Most Influential People in Security – 26 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.

    These security leaders have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and overall positive impact on stakeholders, enterprises, colleagues…

    Security magazine is pleased to announce our 2019 Most Influential People in Security – 26 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.

    These security leaders have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and overall positive impact on stakeholders, enterprises, colleagues, constituents and the general public.

Languages

  • English

    -

  • Russian - basic

    -

Organizations

  • Cleared Professionals

    TS/SCI CI Poly

Recommendations received

More activity by Dr. Chase

View Dr. Chase’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dr. Chase directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses