Rob Clyde

Rob Clyde

Spanish Fork, Utah, United States
4K followers 500+ connections

About

A recognized industry leader, Rob has over twenty-five years experience as a Board…

Services

Articles by Rob

Activity

Join now to see all activity

Experience

  • Crypto Quantique Graphic

    Crypto Quantique

    London, England, United Kingdom

  • -

    Miami, Florida, United States

  • -

    Austin, TX

  • -

    Provo, Utah Area

  • -

    Chicago, Illinois, United States

  • -

    Ottawa, Canada

  • -

    San Jose, CA

  • -

    Frisco, TX

  • -

    Provo, Utah Area

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Provo, Utah, United States

  • -

    Bedford, Massachusetts. Orem and Provo, Utah.

  • -

    Waltham and Bedford, Massachusetts.

Licenses & Certifications

Volunteer Experience

  • ISACA Graphic

    Evangalist

    ISACA

    - Present 2 years 1 month

    Science and Technology

    As a former global Board Director and Past Chair and long-time ISACA volunteer, I am honored to be able to continue serving and officially representing ISACA as an ISACA Evangelist.

  • Utah State University - Jon M. Huntsman School of Business Graphic

    DAIS Department Advisory Board

    Utah State University - Jon M. Huntsman School of Business

    - Present 20 years

    Education

    Provide industry advice and assistance on curriculum, fund raising, graduate programs, and faculty for Utah State University's DAIS (formerly known as MIS) Department. The DAIS Department educates the next generation of Information Technology professionals and business leaders and is part of the Jon M. Huntsman School of Business.

  • ISACA Graphic

    Strategic Advisory Committee

    ISACA

    - 2 years 1 month

    Science and Technology

    The Strategic Advisory Committee advised the ISACA Board of Directors on management proposed strategy and providing strategic advice from an industry and professional perspective.

  • U.S. Department of Homeland Security Graphic

    National Infrastructure Advisory Council - Lead staff member for John W. Thompson

    U.S. Department of Homeland Security

    - 2 years 2 months

    Science and Technology

    Served as the lead staff member for John W. Thompson (CEO of Symantec) who was a member of the DHS National Infrastructure Advisory Council as organized under the order of the President of the United States. Served as the lead on behalf of John Thompson on both the Vulnerability Disclosure Framework and the Common Vulnerability Scoring System (CVSS) working groups. Worked closely with the staff leads from Cisco and other companies and presented formal report to DHS on behalf of John Thompson…

    Served as the lead staff member for John W. Thompson (CEO of Symantec) who was a member of the DHS National Infrastructure Advisory Council as organized under the order of the President of the United States. Served as the lead on behalf of John Thompson on both the Vulnerability Disclosure Framework and the Common Vulnerability Scoring System (CVSS) working groups. Worked closely with the staff leads from Cisco and other companies and presented formal report to DHS on behalf of John Thompson with John Champers (CEO of Cisco).

  • SAFECode.org Graphic

    Founding Board Director

    SAFECode.org

    - 2 years 6 months

    Science and Technology

    Founding Board Director for SAFECode, an industry alliance dedicated to promoting and providing education for building secure software.

  • IT-ISAC Graphic

    Founding Board Director, Treasurer

    IT-ISAC

    - 8 years 6 months

    Science and Technology

    Served as a founding board director and also the Treasurer for the IT-ISAC (Information Technology Information Sharing and Analysis Center). Was part of the team that created the IT-ISAC in 2001.

  • Member Of The Board Of Advisors

    Information Technology and Governance Institute (ITGI)

    - 2 years 1 month

    Science and Technology

    Advised ITGI on strategic direction. The IT Governance Institute (ITGI) was a subsidiary of ISACA, an independent, nonprofit, global association engaged in the development, adoption and use of globally accepted information system (IS) knowledge and practices.

  • ISACA Graphic

    ISACA Global Conference Committee Member

    ISACA

    - 3 years 1 month

    Education

    Member of the ISACA committee that planned conferences, including the themes, agendas, tracks, and speakers.

  • MITRE Graphic

    Founding CVE Board Member

    MITRE

    - 2 years 1 month

    Science and Technology

    Served as a founding Board member for the Mitre CVE (Common Vulnerabilities and Exposures) Board.
    See https://www.cve.org/. Program Organization/Board. Since its founding Mitre CVE has turned into the premier source for reporting security vulnerabilities and exposures.

  • The Church of Jesus Christ of Latter-day Saints Graphic

    Missionary in the Belgium Brussels mission

    The Church of Jesus Christ of Latter-day Saints

    - 2 years

    Education

    Served in Brussels, Belgium and Lille, France.

Publications

Join now to see all publications

Patents

  • Detecting Malware by Linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) Activities to A Source Program

    Issued US 11,727,111 B1

    Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program. Using send Advanced Local Procedure Call (ALPC) messages and receive ALPC messages, source programs that initiate the creation of temporary files and perform defined operations may be identified. If the source programs responsible for the temporary files and defined operations are determined to be malware programs, a security action may be performed on the…

    Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program. Using send Advanced Local Procedure Call (ALPC) messages and receive ALPC messages, source programs that initiate the creation of temporary files and perform defined operations may be identified. If the source programs responsible for the temporary files and defined operations are determined to be malware programs, a security action may be performed on the source programs.

    Other inventors
    See patent
  • Controlling Access to a Computing Device with a Wireless Device Using Wireless Signal Strength Measurements

    Issued US 11,246,029 B1

    A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points. A handshake operation involving the computing device and a key device may then be per-formed. The method further includes receiving, at the computing device and during a calibration phase, wireless sig-nals transmitted by the key device wherein during the calibration phase the computing device determines an approximate signal strength corresponding to a…

    A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points. A handshake operation involving the computing device and a key device may then be per-formed. The method further includes receiving, at the computing device and during a calibration phase, wireless sig-nals transmitted by the key device wherein during the calibration phase the computing device determines an approximate signal strength corresponding to a desired distance between the computing device and the key device. Subsequent to the calibration phase, other wireless signals transmitted by the key device are received at the computing device. The method further includes detecting, based upon a received signal strength of the other wireless signals, that the computing device and the key device are separated by at least the desired distance and, in response, electronically locking or otherwise inhibiting user access to the computing device.

    Other inventors
    See patent
  • Controlling access to a computing device with a wireless device using wireless signal strength measurements

    Issued US 11,051,166 B1

    A method for controlling access to a computing device which involves detecting, at a key device, one or more wireless devices configured as wireless access points. A handshake operation involving the key device and the computing device is performed wherein the computing device is included among the one or more wireless devices. Wireless signals transmitted by the computing device are received, during a calibration phase, at the key device. During the calibration phase the key device determines…

    A method for controlling access to a computing device which involves detecting, at a key device, one or more wireless devices configured as wireless access points. A handshake operation involving the key device and the computing device is performed wherein the computing device is included among the one or more wireless devices. Wireless signals transmitted by the computing device are received, during a calibration phase, at the key device. During the calibration phase the key device determines an approximate signal strength corresponding to a desired distance between the key device and the computing device. Based upon a received signal strength of other wireless signals transmitted by the computing device, it may be detected that the key device and the computing device are separated by at least the desired distance. If so, the computing device may be electronically locked or user access to it otherwise inhibited.

    Other inventors
    See patent
  • SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES TO A GAME PROCESS

    Issued US 10639550 B2

    A method of allocating computer resources in a computer system including a multicore processor having a plurality of cores. The method includes monitoring usage of the com­puter resources by processes executing on the computer system and determining, based upon the monitoring, that one of the processes is a high-utilization process consuming greater than a predefined threshold of the computer resources and corresponds to an application in an interactive state. One or more of the plurality of…

    A method of allocating computer resources in a computer system including a multicore processor having a plurality of cores. The method includes monitoring usage of the com­puter resources by processes executing on the computer system and determining, based upon the monitoring, that one of the processes is a high-utilization process consuming greater than a predefined threshold of the computer resources and corresponds to an application in an interactive state. One or more of the plurality of cores are allocated to the high-utilization process and other of the plurality of cores are allocated to remaining processes, thereby improv­ing performance of the high-utilization process. Upon detecting the application has transitioned from the interac­tive state, one or more of the cores are previously allocated to the high-utilization process are enabled to be allocated to other than the high-utilization process.

    See patent
  • SECURE APPLICATION STREAMING

    Issued US 8353041 B2

    A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module for providing the blocks to a client on request, and a module for adding to each block an indication of whether the associated application has already been determined to be free of malware. A client includes a module for requesting blocks of a streamed application from the server. When the client…

    A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module for providing the blocks to a client on request, and a module for adding to each block an indication of whether the associated application has already been determined to be free of malware. A client includes a module for requesting blocks of a streamed application from the server. When the client receives a block, it employs a module for verifying that the associated applications have been determined to be free of malware by examining the indication provided by the server. If verification is successful, then the block's code is executed without first receiving and scanning any additional blocks from the server.

    Other inventors
    See patent
  • SERVER SIDE VERIFICATION OF DIGITAL SIGNATURES IN STREAMING ENVIRONMENTS

    Issued US 8112633 B1

    When an executable file cannot be run on a client computer until the digital signature has been verified, the streaming server performs the verification if the entire file is not present on the client. More specifically, the client detects requests to verify digital signatures on executable files before allowing them to run. The client determines whether the entire execut­able file is present, and whether the server is trusted to verify digital signatures. If the entire file is not present…

    When an executable file cannot be run on a client computer until the digital signature has been verified, the streaming server performs the verification if the entire file is not present on the client. More specifically, the client detects requests to verify digital signatures on executable files before allowing them to run. The client determines whether the entire execut­able file is present, and whether the server is trusted to verify digital signatures. If the entire file is not present locally and the server is trusted, the request to verify the digital signature is passed to the server. The server verifies the digital signature on its complete copy of the executable file, and returns the result to the client.

    Other inventors
    See patent
  • Systems and methods for determining the trustworthiness of a server in a streaming environment

    Issued US 8108536 B1

    A computer-implemented method for determining the trustworthiness of a server may comprise: 1) identifying a streaming application that originates from a server, 2) determining a trust level for the server, and then 3) determining, based on the trust level, whether to stream the streaming application from the server. The trust level for the server may be determined by comparing current streams (or portions of current streams) received from the server with prior streams to detect change, by…

    A computer-implemented method for determining the trustworthiness of a server may comprise: 1) identifying a streaming application that originates from a server, 2) determining a trust level for the server, and then 3) determining, based on the trust level, whether to stream the streaming application from the server. The trust level for the server may be determined by comparing current streams (or portions of current streams) received from the server with prior streams to detect change, by communicating with peer computing systems or reputation services, and/or by analyzing locally stored information. Corresponding systems and computer-readable media are also disclosed.

    Other inventors
    See patent
  • SYSTEM FOR EFFECTIVELY PARALLELING COMPUTER TERMINAL DEVICES

    Issued US 4701848

    In a digital computing system such as the Digital Equip­ment Corporation's VAX computer system which uses the VMS operating system in which terminal devices are connected to the system through terminal depen­dent device drivers coupled to terminal independent device drivers so that the operating system of the com­puter system need not be modified each time a terminal device is added or subtracted, a system and method is provided for effectively paralleling an auxiliary termi­nal with a selected…

    In a digital computing system such as the Digital Equip­ment Corporation's VAX computer system which uses the VMS operating system in which terminal devices are connected to the system through terminal depen­dent device drivers coupled to terminal independent device drivers so that the operating system of the com­puter system need not be modified each time a terminal device is added or subtracted, a system and method is provided for effectively paralleling an auxiliary termi­nal with a selected terminal of the system so that the selected terminal can be monitored for instruction, secu­rity, audit, or other purposes, by creating a user control­ling driver and a user controlling device coupled thereto, and coupling the user controlling driver and user controlling device combination between the termi­nal independent device driver and the terminal depen­dent device driver associated with the terminal device to be paralleled so that the output of the terminal inde­pendent device driver intended for the terminal depen­dent device driver passes through the user controlling driver and user controlling device before arriving at the terminal dependent device driver and the output of the terminal dependent device driver intended for the ter­minal independent device driver passes through the user controlling driver and user controlling device be­fore arriving at the terminal independent device driver and making the information passing through the user controlling driver available to the auxiliary terminal device.

    See patent

Honors & Awards

  • Wasserman Award

    ISACA NY Metro Chapter

    This prestigious award recognizes Outstanding Achievement and Contribution to the Information Systems Audit, Control, Security, Risk Management, and/or Governance professions (the “Community”).

    http://www.isaca.org/chapters2/New-York-Metropolitan/aboutus/Pages/page2.aspx

  • CRN Top 50 Technology Innovators

    CRN Magazine

    https://www.crn.com/features/channel-programs/54202023/technology-innovators-top-50.htm

  • ISACA John Kuyers Award for Best Speaker

    ISACA

    http://www.isaca.org/About-ISACA/Volunteering/Pages/Previous-Award-Winners.aspx

  • Best Computer Science Dept. Graduate

    BYU

    Selected by the faculty for the "Best Computer Science" graduate for the class of 1984. Awarded at graduation ceremony.

Languages

  • English

    Native or bilingual proficiency

  • French

    -

Recommendations received

More activity by Rob

View Rob’s full profile

  • See who you know in common
  • Get introduced
  • Contact Rob directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Rob Clyde in United States

Add new skills with these courses