About
A recognized industry leader, Rob has over twenty-five years experience as a Board…
Services
Articles by Rob
Activity
-
Looking forward to a packed programme in Kuala Lumpur - ISACA Malaysia Chapter [1] 2 Days Workshop on Auditing AI [2] Conference - Plenary Session…
Looking forward to a packed programme in Kuala Lumpur - ISACA Malaysia Chapter [1] 2 Days Workshop on Auditing AI [2] Conference - Plenary Session…
Liked by Rob Clyde
-
Today marks my 20th Anniversary as Executive Director of the IT-ISAC. At times I wonder where the time went and at other times I wonder how I ever…
Today marks my 20th Anniversary as Executive Director of the IT-ISAC. At times I wonder where the time went and at other times I wonder how I ever…
Liked by Rob Clyde
Experience
Licenses & Certifications
Volunteer Experience
-
Evangalist
ISACA
- Present 2 years 1 month
Science and Technology
As a former global Board Director and Past Chair and long-time ISACA volunteer, I am honored to be able to continue serving and officially representing ISACA as an ISACA Evangelist.
-
DAIS Department Advisory Board
Utah State University - Jon M. Huntsman School of Business
- Present 20 years
Education
Provide industry advice and assistance on curriculum, fund raising, graduate programs, and faculty for Utah State University's DAIS (formerly known as MIS) Department. The DAIS Department educates the next generation of Information Technology professionals and business leaders and is part of the Jon M. Huntsman School of Business.
-
Strategic Advisory Committee
ISACA
- 2 years 1 month
Science and Technology
The Strategic Advisory Committee advised the ISACA Board of Directors on management proposed strategy and providing strategic advice from an industry and professional perspective.
-
National Infrastructure Advisory Council - Lead staff member for John W. Thompson
U.S. Department of Homeland Security
- 2 years 2 months
Science and Technology
Served as the lead staff member for John W. Thompson (CEO of Symantec) who was a member of the DHS National Infrastructure Advisory Council as organized under the order of the President of the United States. Served as the lead on behalf of John Thompson on both the Vulnerability Disclosure Framework and the Common Vulnerability Scoring System (CVSS) working groups. Worked closely with the staff leads from Cisco and other companies and presented formal report to DHS on behalf of John Thompson…
Served as the lead staff member for John W. Thompson (CEO of Symantec) who was a member of the DHS National Infrastructure Advisory Council as organized under the order of the President of the United States. Served as the lead on behalf of John Thompson on both the Vulnerability Disclosure Framework and the Common Vulnerability Scoring System (CVSS) working groups. Worked closely with the staff leads from Cisco and other companies and presented formal report to DHS on behalf of John Thompson with John Champers (CEO of Cisco).
-
Founding Board Director
SAFECode.org
- 2 years 6 months
Science and Technology
Founding Board Director for SAFECode, an industry alliance dedicated to promoting and providing education for building secure software.
-
Founding Board Director, Treasurer
IT-ISAC
- 8 years 6 months
Science and Technology
Served as a founding board director and also the Treasurer for the IT-ISAC (Information Technology Information Sharing and Analysis Center). Was part of the team that created the IT-ISAC in 2001.
-
Member Of The Board Of Advisors
Information Technology and Governance Institute (ITGI)
- 2 years 1 month
Science and Technology
Advised ITGI on strategic direction. The IT Governance Institute (ITGI) was a subsidiary of ISACA, an independent, nonprofit, global association engaged in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
-
ISACA Global Conference Committee Member
ISACA
- 3 years 1 month
Education
Member of the ISACA committee that planned conferences, including the themes, agendas, tracks, and speakers.
-
Founding CVE Board Member
MITRE
- 2 years 1 month
Science and Technology
Served as a founding Board member for the Mitre CVE (Common Vulnerabilities and Exposures) Board.
See https://www.cve.org/. Program Organization/Board. Since its founding Mitre CVE has turned into the premier source for reporting security vulnerabilities and exposures. -
Missionary in the Belgium Brussels mission
The Church of Jesus Christ of Latter-day Saints
- 2 years
Education
Served in Brussels, Belgium and Lille, France.
Publications
-
AI Progress in Security is Impressive Enough Without Embellishment
Infosecurity Magazine
Any claims that products and solutions are magically all-powerful due to AI are counterproductive.
-
Securing Software: The Root Cause Conundrum
Infosecurity Magazine
DevSecOps is part of the answer to producing secure software, but it's not enough.
-
Network Comparison Application Security Testing (NCAST) – A Crucial Tool for Modern DevOps
LinkedIn Pulse
Network Comparison Application Security Testing (NCAST) is a useful and necessary addition to the DevOps tools organizations use. NCAST can both speed the creation of unit, API, regression, and other tests and significantly improve the security and quality of software.
-
Proactive Approach to Soft Skills Gap Needed in Security Industry
Infosecurity Magazine
There are huge opportunities in the security industry for those who develop their soft skills.
-
Questions Enterprises Should Be Asking as they Migrate to the Cloud
InfoSecurty Magazine
What steps should orgs take to ensure a secure move to the cloud?
-
For Most Companies, Securing Remote Work is Unfinished Business
Infosecurity Magazine
-
A New Path for Data Protection
Infosecurity Magazine
Any organization dealing with sensitive data, particular if stored in the cloud, should strongly consider the importance of privacy certifications and microsharding technology.
-
Microsharding: An Innovative Way to Protect Cloud Data
LinkedIn Pulse
An innovative way to protect data, particularly cloud data, using microshard technology. While sharding has been around for a while to improve I/O performance by splitting files into multiple location, microsharding splits files into extremely small pieces (often only 4 bytes) which has profound implications on data privacy and protection.
-
Timely Opportunities Exist to Address Longstanding Security Gaps
Infosecurity
Article on taking advantage of opportunities presented by the COVID situation to address long-standing cybersecurity gaps.
-
Security Think Tank: Base cloud security posture on your data footprint
ComputerWeekly.com
Misconfigured cloud environments are increasingly identified as the source of damaging data breaches and leaks, raising serious questions for enterprises. Where does responsibility for data security in the cloud lie, and how can security professionals best work with their teams and cloud providers to resolve the problem?
Patents
-
Detecting Malware by Linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) Activities to A Source Program
Issued US 11,727,111 B1
Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program. Using send Advanced Local Procedure Call (ALPC) messages and receive ALPC messages, source programs that initiate the creation of temporary files and perform defined operations may be identified. If the source programs responsible for the temporary files and defined operations are determined to be malware programs, a security action may be performed on the…
Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program. Using send Advanced Local Procedure Call (ALPC) messages and receive ALPC messages, source programs that initiate the creation of temporary files and perform defined operations may be identified. If the source programs responsible for the temporary files and defined operations are determined to be malware programs, a security action may be performed on the source programs.
Other inventorsSee patent -
Controlling Access to a Computing Device with a Wireless Device Using Wireless Signal Strength Measurements
Issued US 11,246,029 B1
A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points. A handshake operation involving the computing device and a key device may then be per-formed. The method further includes receiving, at the computing device and during a calibration phase, wireless sig-nals transmitted by the key device wherein during the calibration phase the computing device determines an approximate signal strength corresponding to a…
A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points. A handshake operation involving the computing device and a key device may then be per-formed. The method further includes receiving, at the computing device and during a calibration phase, wireless sig-nals transmitted by the key device wherein during the calibration phase the computing device determines an approximate signal strength corresponding to a desired distance between the computing device and the key device. Subsequent to the calibration phase, other wireless signals transmitted by the key device are received at the computing device. The method further includes detecting, based upon a received signal strength of the other wireless signals, that the computing device and the key device are separated by at least the desired distance and, in response, electronically locking or otherwise inhibiting user access to the computing device.
Other inventorsSee patent -
Controlling access to a computing device with a wireless device using wireless signal strength measurements
Issued US 11,051,166 B1
A method for controlling access to a computing device which involves detecting, at a key device, one or more wireless devices configured as wireless access points. A handshake operation involving the key device and the computing device is performed wherein the computing device is included among the one or more wireless devices. Wireless signals transmitted by the computing device are received, during a calibration phase, at the key device. During the calibration phase the key device determines…
A method for controlling access to a computing device which involves detecting, at a key device, one or more wireless devices configured as wireless access points. A handshake operation involving the key device and the computing device is performed wherein the computing device is included among the one or more wireless devices. Wireless signals transmitted by the computing device are received, during a calibration phase, at the key device. During the calibration phase the key device determines an approximate signal strength corresponding to a desired distance between the key device and the computing device. Based upon a received signal strength of other wireless signals transmitted by the computing device, it may be detected that the key device and the computing device are separated by at least the desired distance. If so, the computing device may be electronically locked or user access to it otherwise inhibited.
Other inventorsSee patent -
SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES TO A GAME PROCESS
Issued US 10639550 B2
A method of allocating computer resources in a computer system including a multicore processor having a plurality of cores. The method includes monitoring usage of the computer resources by processes executing on the computer system and determining, based upon the monitoring, that one of the processes is a high-utilization process consuming greater than a predefined threshold of the computer resources and corresponds to an application in an interactive state. One or more of the plurality of…
A method of allocating computer resources in a computer system including a multicore processor having a plurality of cores. The method includes monitoring usage of the computer resources by processes executing on the computer system and determining, based upon the monitoring, that one of the processes is a high-utilization process consuming greater than a predefined threshold of the computer resources and corresponds to an application in an interactive state. One or more of the plurality of cores are allocated to the high-utilization process and other of the plurality of cores are allocated to remaining processes, thereby improving performance of the high-utilization process. Upon detecting the application has transitioned from the interactive state, one or more of the cores are previously allocated to the high-utilization process are enabled to be allocated to other than the high-utilization process.
-
SECURE APPLICATION STREAMING
Issued US 8353041 B2
A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module for providing the blocks to a client on request, and a module for adding to each block an indication of whether the associated application has already been determined to be free of malware. A client includes a module for requesting blocks of a streamed application from the server. When the client…
A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module for providing the blocks to a client on request, and a module for adding to each block an indication of whether the associated application has already been determined to be free of malware. A client includes a module for requesting blocks of a streamed application from the server. When the client receives a block, it employs a module for verifying that the associated applications have been determined to be free of malware by examining the indication provided by the server. If verification is successful, then the block's code is executed without first receiving and scanning any additional blocks from the server.
Other inventorsSee patent -
SERVER SIDE VERIFICATION OF DIGITAL SIGNATURES IN STREAMING ENVIRONMENTS
Issued US 8112633 B1
When an executable file cannot be run on a client computer until the digital signature has been verified, the streaming server performs the verification if the entire file is not present on the client. More specifically, the client detects requests to verify digital signatures on executable files before allowing them to run. The client determines whether the entire executable file is present, and whether the server is trusted to verify digital signatures. If the entire file is not present…
When an executable file cannot be run on a client computer until the digital signature has been verified, the streaming server performs the verification if the entire file is not present on the client. More specifically, the client detects requests to verify digital signatures on executable files before allowing them to run. The client determines whether the entire executable file is present, and whether the server is trusted to verify digital signatures. If the entire file is not present locally and the server is trusted, the request to verify the digital signature is passed to the server. The server verifies the digital signature on its complete copy of the executable file, and returns the result to the client.
Other inventorsSee patent -
Systems and methods for determining the trustworthiness of a server in a streaming environment
Issued US 8108536 B1
A computer-implemented method for determining the trustworthiness of a server may comprise: 1) identifying a streaming application that originates from a server, 2) determining a trust level for the server, and then 3) determining, based on the trust level, whether to stream the streaming application from the server. The trust level for the server may be determined by comparing current streams (or portions of current streams) received from the server with prior streams to detect change, by…
A computer-implemented method for determining the trustworthiness of a server may comprise: 1) identifying a streaming application that originates from a server, 2) determining a trust level for the server, and then 3) determining, based on the trust level, whether to stream the streaming application from the server. The trust level for the server may be determined by comparing current streams (or portions of current streams) received from the server with prior streams to detect change, by communicating with peer computing systems or reputation services, and/or by analyzing locally stored information. Corresponding systems and computer-readable media are also disclosed.
Other inventorsSee patent -
SYSTEM FOR EFFECTIVELY PARALLELING COMPUTER TERMINAL DEVICES
Issued US 4701848
In a digital computing system such as the Digital Equipment Corporation's VAX computer system which uses the VMS operating system in which terminal devices are connected to the system through terminal dependent device drivers coupled to terminal independent device drivers so that the operating system of the computer system need not be modified each time a terminal device is added or subtracted, a system and method is provided for effectively paralleling an auxiliary terminal with a selected…
In a digital computing system such as the Digital Equipment Corporation's VAX computer system which uses the VMS operating system in which terminal devices are connected to the system through terminal dependent device drivers coupled to terminal independent device drivers so that the operating system of the computer system need not be modified each time a terminal device is added or subtracted, a system and method is provided for effectively paralleling an auxiliary terminal with a selected terminal of the system so that the selected terminal can be monitored for instruction, security, audit, or other purposes, by creating a user controlling driver and a user controlling device coupled thereto, and coupling the user controlling driver and user controlling device combination between the terminal independent device driver and the terminal dependent device driver associated with the terminal device to be paralleled so that the output of the terminal independent device driver intended for the terminal dependent device driver passes through the user controlling driver and user controlling device before arriving at the terminal dependent device driver and the output of the terminal dependent device driver intended for the terminal independent device driver passes through the user controlling driver and user controlling device before arriving at the terminal independent device driver and making the information passing through the user controlling driver available to the auxiliary terminal device.
Honors & Awards
-
Wasserman Award
ISACA NY Metro Chapter
This prestigious award recognizes Outstanding Achievement and Contribution to the Information Systems Audit, Control, Security, Risk Management, and/or Governance professions (the “Community”).
http://www.isaca.org/chapters2/New-York-Metropolitan/aboutus/Pages/page2.aspx -
CRN Top 50 Technology Innovators
CRN Magazine
https://www.crn.com/features/channel-programs/54202023/technology-innovators-top-50.htm
-
ISACA John Kuyers Award for Best Speaker
ISACA
http://www.isaca.org/About-ISACA/Volunteering/Pages/Previous-Award-Winners.aspx
-
Best Computer Science Dept. Graduate
BYU
Selected by the faculty for the "Best Computer Science" graduate for the class of 1984. Awarded at graduation ceremony.
Languages
-
English
Native or bilingual proficiency
-
French
-
Recommendations received
5 people have recommended Rob
Join now to viewMore activity by Rob
-
This week, three fantastic ISACA volunteers reviewed updates to the Spanish-language #CISM exam: Luis Capua, ISRAEL DIAZ DOMINGUEZ, and Christian…
This week, three fantastic ISACA volunteers reviewed updates to the Spanish-language #CISM exam: Luis Capua, ISRAEL DIAZ DOMINGUEZ, and Christian…
Liked by Rob Clyde
-
There is a lot of chatter today about Google indexing ChatGPT shared links. It’s a real risk, sure, but not a new one. I spent 12 years at Digital…
There is a lot of chatter today about Google indexing ChatGPT shared links. It’s a real risk, sure, but not a new one. I spent 12 years at Digital…
Liked by Rob Clyde
-
Looking forward to being in Cambridge this week at Arm HQ. It will be a great opportunity to dive into the latest in hardware security and platform…
Looking forward to being in Cambridge this week at Arm HQ. It will be a great opportunity to dive into the latest in hardware security and platform…
Liked by Rob Clyde
-
Take a look at ISACA Board Director Jamie Norton’s insights about AI’s impact on GRC strategy!
Take a look at ISACA Board Director Jamie Norton’s insights about AI’s impact on GRC strategy!
Liked by Rob Clyde
-
Attaining the #AAIA credential has completely transformed how Isheanesu Sithole sees his role as an IT audit professional. He explains why on the…
Attaining the #AAIA credential has completely transformed how Isheanesu Sithole sees his role as an IT audit professional. He explains why on the…
Liked by Rob Clyde
-
Last week, Gartner quietly introduced something new: AI Usage Control (AI-UC). While SSE is sliding deeper into the trough of disillusionment (and…
Last week, Gartner quietly introduced something new: AI Usage Control (AI-UC). While SSE is sliding deeper into the trough of disillusionment (and…
Liked by Rob Clyde
-
Explore how the groundbreaking ISACA Advanced in AI Audit (#AAIA) certification can empower experienced auditors to level up their careers for the…
Explore how the groundbreaking ISACA Advanced in AI Audit (#AAIA) certification can empower experienced auditors to level up their careers for the…
Liked by Rob Clyde
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Rob Clyde in United States
-
Rob Clyde
Chief Content Officer, Executive Producer for Galaxy Media Ventures
-
Rob Clyde
HVAC
-
Rob Clyde
Independent Marketing and Advertising Professional
-
Robert Clyde
Economics and Environmental Studies Student at Hobart College
21 others named Rob Clyde in United States are on LinkedIn
See others named Rob Clyde