About
Articles by Brian
-
Zero Trust for Secure Software Development in the DoD
Zero Trust for Secure Software Development in the DoD
By Brian Gallagher
-
Streamlining DevSecOps: How CodeLock Delivers Unified Security Across Multiple SCM Platforms
Streamlining DevSecOps: How CodeLock Delivers Unified Security Across Multiple SCM Platforms
By Brian Gallagher
-
Malicious AI Model Protection with CodeLock
Malicious AI Model Protection with CodeLock
By Brian Gallagher
Contributions
-
Which code review tools offer the most advanced security features to protect your codebase?
Static Application Security Testing (SAST) is important for finding known vulnerabilities and known threats however, in the days of nation-state attacks and generative artificial intelligence, we are seeing more malware being introduced into software from unknown threats. These are new creations that have not yet made it to a SAST vendors database. It is important to supplement SAST and SCA scanning with tools like CodeLock, that can identify unauthorized changes to your code base, indicating a previously unknown threat.
-
You’ve been tasked with implementing a new AI technology. What’s the first step to ensure success?
The successful adoption of AI technology by humans can largely be attributed to the psychological aspect of human behavior, where the perceived utility, ease of use, and the potential for enhancement in daily tasks play pivotal roles. This psychological perspective underscores the importance of designing AI solutions that resonate with human emotions, needs, and cognitive patterns, ensuring a smoother integration into daily life. By understanding and catering to these human factors, the adoption of AI technology becomes a natural progression rather than a forced assimilation, leading to more effective and widespread use.
Activity
-
A recent incident at KnowBe4 serves as a stark reminder of the importance of thorough vetting and continuous security monitoring when bringing on…
A recent incident at KnowBe4 serves as a stark reminder of the importance of thorough vetting and continuous security monitoring when bringing on…
Liked by Brian Gallagher
-
Every day, I discuss with clients the crucial need to be aware of who is truly behind the keyboard in their organizations. Recently, there was an…
Every day, I discuss with clients the crucial need to be aware of who is truly behind the keyboard in their organizations. Recently, there was an…
Shared by Brian Gallagher
-
Who else is working on their BlackHat 2024 calendar?! I'm a first timer to Black Hat and it's shaping up to be an incredible event ..... I couldn't…
Who else is working on their BlackHat 2024 calendar?! I'm a first timer to Black Hat and it's shaping up to be an incredible event ..... I couldn't…
Liked by Brian Gallagher
Experience & Education
Volunteer Experience
-
Artificial Intelligence and Data Analytics Working Group
ATARC (Advanced Technology Academic Research Center)
- Present 4 years
Science and Technology
The White House Executive Order on American AI Initiative signifies an unquestionable effort to promote AI technology and innovation in the federal government as a whole. This initiative has further translated into agency-level undertakings such as the DOD Joint Artificial Intelligence Center (JAIC), and the GSA Artificial Intelligence Center of Excellence.
The AI ATARC Working Group is advising all federal leaders and their private-sector collaborators to prioritize AI program solutions…The White House Executive Order on American AI Initiative signifies an unquestionable effort to promote AI technology and innovation in the federal government as a whole. This initiative has further translated into agency-level undertakings such as the DOD Joint Artificial Intelligence Center (JAIC), and the GSA Artificial Intelligence Center of Excellence.
The AI ATARC Working Group is advising all federal leaders and their private-sector collaborators to prioritize AI program solutions that should be aligned with improving decision making within citizen services and g2b solutions. Through helping to guide budgeting AI, algorithmic programming in the federal IT plans, ATARC is supporting the key to AI open APIs, and open solutions. -
CEO Member
MindShare Inc.
- Present 4 years 6 months
Mindshare is an exclusive, invitation-only network of chief executive officers (CEOs) from the most promising emerging and high growth technology companies in the Washington, DC region.
Over 1,100 CEO’s of highly innovative and dynamic technology companies have joined forces through the Mindshare Alumni Network to:
1. Drive further growth of individuals and companies by establishing a vibrant community that develops long-term trusted business and personal relationships.
2…Mindshare is an exclusive, invitation-only network of chief executive officers (CEOs) from the most promising emerging and high growth technology companies in the Washington, DC region.
Over 1,100 CEO’s of highly innovative and dynamic technology companies have joined forces through the Mindshare Alumni Network to:
1. Drive further growth of individuals and companies by establishing a vibrant community that develops long-term trusted business and personal relationships.
2. Build a strong peer-to-peer network of CEOs that fosters collaboration and entrepreneurship to build high-growth technology companies.
3. Increase awareness of our region as a technology innovation hotbed to attract investment capital, develop entrepreneurial talent, and share valuable resources.
-
Business Mentor
Alchemist Accelerator
- Present 3 years 6 months
The Alchemist Accelerator Mentor Program brings together leading mentors with the most promising founders. The program aims to foster collaboration between experienced industry leaders and Alchemist Accelerator startups. Great mentors often contribute to the long-term success of startups. Mentors can assist with opening doors, removing barriers, and providing guidance on how to identify risk, which can help startups succeed faster.
-
CEO Member
MissionLink
- Present 2 years 6 months
Science and Technology
MissionLink.Next is a non-profit trade association and exclusive network that includes decision makers, government leaders, top founders and CEOs from across the US who are using and building the most cutting-edge mission-critical capabilities. Their members are companies with capabilities that national security seeks as their key priorities: cyber, artificial intelligence, biotechnology, autonomy, microelectronics, quantum science, space, UAS/drones, 5G, virtual reality, internet of things and…
MissionLink.Next is a non-profit trade association and exclusive network that includes decision makers, government leaders, top founders and CEOs from across the US who are using and building the most cutting-edge mission-critical capabilities. Their members are companies with capabilities that national security seeks as their key priorities: cyber, artificial intelligence, biotechnology, autonomy, microelectronics, quantum science, space, UAS/drones, 5G, virtual reality, internet of things and emerging technologies. MissionLink.Next companies are addressing the next generation of threats in national security, healthcare, financial services, ecommerce, social media, life sciences, automotive and transportation, logistics, supply chain, manufacturing and critical infrastructure.
Publications
-
Stay Cyber Safe: What Every CEO Should Know About Cybersecurity
BookBaby
Stay Cyber Safe: What Every CEO Should Know About Cybersecurity is your jargon-free guide to understanding the cyber threats you face each day. In this brief book, authors JT Kostman and Brian Gallagher introduce CodeLock™ – a revolutionary approach to cybersecurity that provides what the U.S. Department of Homeland Security (DHS) describes as being able to "stop the most sophisticated criminal malware." They will also offer you affordable, practical, and actionable advice on steps you can take…
Stay Cyber Safe: What Every CEO Should Know About Cybersecurity is your jargon-free guide to understanding the cyber threats you face each day. In this brief book, authors JT Kostman and Brian Gallagher introduce CodeLock™ – a revolutionary approach to cybersecurity that provides what the U.S. Department of Homeland Security (DHS) describes as being able to "stop the most sophisticated criminal malware." They will also offer you affordable, practical, and actionable advice on steps you can take today to safeguard your data assets – and keep your company from becoming the next victim of cybercrime to be featured on the nightly news.
Imagine this: You come into the office on Thursday morning, grab a cup of coffee and sit down at your desk to check your email. You log in, and you wait. And wait. Nothing happens for a few seconds. Then your screen turns bright blue. A pop-up banner appears with some devasting news: You've been hacked.
Welcome to the hell known as ransomware.
Now you have a choice to make. Either you can pay the cyber-criminals $150,000 in bitcoin by the end of the day or all your data will be destroyed. All your confidential information and private emails will be released onto the internet. Your customers' personally identifiable information will be sold on the black market. The icing on the cake? The hackers will report this incident to the press.
You can pay the thieves who are holding your data hostage, but there are no guarantees.
If you don't think it could happen to you, think again.
Regardless of your industry, or how many employees you have, if you lead a small or midsized business there is a 48% chance you will become the victim of cybercrime sometime within the next year. That's pretty much the flip of a coin – and it just keeps getting worse.
The approaches and methodologies in this book are crucial for anyone looking to protect themselves or their business by mitigating the risk of cybersecurity threats and ransomware.Other authors -
-
Soft Target Hardening: Protecting People from Attack
CRC Press; 1 edition
Contributed Sections on Church Security and Physical Security (Section Pages: 121 &204)
Winner of ASIS International’s 2015 Security Book of the Year Award
Terrorist attacks occur daily and are increasingly being aimed at civilian populations around the world. Battlefield lines have been redrawn to include churches, schools, hospitals, and malls. This breach of moral boundary is shocking and invokes fear―two primary goals of terrorism.
Although there is an increase in soft…Contributed Sections on Church Security and Physical Security (Section Pages: 121 &204)
Winner of ASIS International’s 2015 Security Book of the Year Award
Terrorist attacks occur daily and are increasingly being aimed at civilian populations around the world. Battlefield lines have been redrawn to include churches, schools, hospitals, and malls. This breach of moral boundary is shocking and invokes fear―two primary goals of terrorism.
Although there is an increase in soft target activity―or attacks on places of worship, study, and leisure―there is hesitation to explore such susceptibility in the United States. Soft Target Hardening: Protecting People from Attack starts the national dialogue by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States. Offering deterrence and mitigation techniques from more than 275 sources, this comprehensive book:
Explores U.S. cultural nuances contributing to the country turning a psychological blind eye toward soft target threats
Assesses the attractiveness of soft target threats presented by foreign and domestic terror groups and drug trafficking organizations
Analyzes the unique vulnerabilities of churches, schools, hospitals, malls, sporting and recreational events, and other soft targets
Gives an overview of soft target hardening tactics from global hotspots, including first-person accounts and photographs
Introduces the concept of effects-based hardening, derived from the military model of effects-based operations
Discusses emerging soft target challenges such as insider threats, kidnapping, and use of human shields
Evaluates the likelihood of the use of weapons of mass destruction against civilian-centric venues
Soft Target Hardening: Protecting People from Attack is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack.
Organizations
-
Association of Former Agents of the U.S. Secret Service (AFAUSSS)
Member
- PresentThe Association of Former Agents of the U.S. Secret Service is an organization comprised of former as well as current employees of the U.S. Secret Service. The mission of this association is to facilitate the professional and social interests of its membership. The association will provide information and services relevant to the interests of its membership via an internet web site, electronic notifications of time sensitive events, publications, conferences and other available means.
-
U.S. Chamber of Commerce - National Security Task Force
Member
- PresentWeb: https://www.uschamber.com/national-security-task-force-0 The National Security Task Force is responsible for the development and advancement of Chamber policy related to homeland security and national security. Chaired by Governor Tom Ridge (the first Secretary of the Department of Homeland Security) the Task Force is comprised of over 170 companies, associations, and state and local chambers, represents a broad spectrum of the American economy the Task Force engages Capitol Hill, the…
Web: https://www.uschamber.com/national-security-task-force-0 The National Security Task Force is responsible for the development and advancement of Chamber policy related to homeland security and national security. Chaired by Governor Tom Ridge (the first Secretary of the Department of Homeland Security) the Task Force is comprised of over 170 companies, associations, and state and local chambers, represents a broad spectrum of the American economy the Task Force engages Capitol Hill, the administration and international governments to advance priorities related to cyber security, supply chain, customs and trade facilitation, public private partnerships and emergency preparedness. The Task Force’s working groups on Cyber Security and Global Supply Chain Security identify current and emerging issues, craft policies and aggressively pursue reforms through advocacy. Among the top priorities include: promoting effective supply chain, customs and trade facilitation policies that support the free movement of goods in the global supply chain to enhance U.S. global competitiveness and engaging policymakers to focus on collaboration, flexibility, and cost reduction as both industry and the administration work to develop a cybersecurity framework.
-
ASIS International
Member
- Presenthttps://www.linkedin.com/company/30614?trk=prof-exp-company-name
Recommendations received
6 people have recommended Brian
Join now to viewMore activity by Brian
-
In light of the CrowdStrike incident, I was thinking about the fundamental connections behind Application Security (#AppSec) and, more specifically…
In light of the CrowdStrike incident, I was thinking about the fundamental connections behind Application Security (#AppSec) and, more specifically…
Shared by Brian Gallagher
-
Open Source Maintainers aren’t your “Suppliers”. Increasingly the industry is waking up to the realization that most of the code they use is coming…
Open Source Maintainers aren’t your “Suppliers”. Increasingly the industry is waking up to the realization that most of the code they use is coming…
Liked by Brian Gallagher
-
Great Wired article on the ongoing massive outage caused by the perfect storm of a Microsoft’s #Azure outage and a CrowdStrike update. Matt Suiche…
Great Wired article on the ongoing massive outage caused by the perfect storm of a Microsoft’s #Azure outage and a CrowdStrike update. Matt Suiche…
Liked by Brian Gallagher
-
On Friday we failed you, and for that I'm deeply sorry. I’ve been in my professional life for almost 40 years, and my North Star has always been to…
On Friday we failed you, and for that I'm deeply sorry. I’ve been in my professional life for almost 40 years, and my North Star has always been to…
Liked by Brian Gallagher
-
Today, I am incredibly excited to share that ICONIQ Growth has closed our seventh flagship fund. With $5.75B in committed capital, we are thrilled to…
Today, I am incredibly excited to share that ICONIQ Growth has closed our seventh flagship fund. With $5.75B in committed capital, we are thrilled to…
Liked by Brian Gallagher
-
I'm working with a large enterprise client ($4BN) that needs a new GRC solution. It's funded, high priority and needs to get done A$AP Rocky. 😁…
I'm working with a large enterprise client ($4BN) that needs a new GRC solution. It's funded, high priority and needs to get done A$AP Rocky. 😁…
Liked by Brian Gallagher
-
The Cyber Bytes Foundation is excited to announce our new partnership with JCTM! We are eager to forge innovation with this new strategic…
The Cyber Bytes Foundation is excited to announce our new partnership with JCTM! We are eager to forge innovation with this new strategic…
Liked by Brian Gallagher
-
These are currently the screens at Dulles International Airport in Ashburn, VA. Was this a cyber attack or a simple mistake?
These are currently the screens at Dulles International Airport in Ashburn, VA. Was this a cyber attack or a simple mistake?
Shared by Brian Gallagher
-
Crowdstrike Windows Outage This one is having a massive impact this morning. It's reported that major U.S. airlines are grounding flights, it is…
Crowdstrike Windows Outage This one is having a massive impact this morning. It's reported that major U.S. airlines are grounding flights, it is…
Liked by Brian Gallagher
-
Good policy makers need good intelligence to make good decisions — a simple yet powerful truth echoed within the walls of the International Spy…
Good policy makers need good intelligence to make good decisions — a simple yet powerful truth echoed within the walls of the International Spy…
Liked by Brian Gallagher
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Brian Gallagher in United States
641 others named Brian Gallagher in United States are on LinkedIn
See others named Brian Gallagher