Chris Hockings

Chris Hockings

Australia
9K followers 500+ connections

About

I continue to fulfil a lifetime mission securing global online and critical…

Articles by Chris

Activity

Join now to see all activity

Experience

  • IBM Graphic
  • -

    Asia Pacific

  • -

  • -

    Australia and New Zealand

  • -

  • -

    Asia Pacific

  • -

    Worldwide

  • -

    Asia Pacific

  • -

    Worldwide

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

Publications

Join now to see all publications

Patents

  • SOCIAL PROFILE ASSESSMENT

    Issued US 20100004940

    Other inventors
    See patent
  • Method for managing shared accounts in an identity management system

    Filed US 20110277016

    This disclosure describes a method of and system for provisioning of shared account credentials to provide authorized access to shared or delegated accounts. Preferably, an enterprise single sign-on (E-SSO) system is used to manage the shared account or control delegation of account access, and preferably the shared or delegated account credential is not exposed to the end user. The described technique enables temporary delegation of account privileges to a member of a shared role. Using the…

    This disclosure describes a method of and system for provisioning of shared account credentials to provide authorized access to shared or delegated accounts. Preferably, an enterprise single sign-on (E-SSO) system is used to manage the shared account or control delegation of account access, and preferably the shared or delegated account credential is not exposed to the end user. The described technique enables temporary delegation of account privileges to a member of a shared role. Using the described approach, an information technology (IT) account may be shared so that a user who needs to perform a shared duty can do so in the context of a shared role and without having control over the account itself. The approach facilitates delegating the use of a single account to one of a member of the shared role.

    Other inventors
    See patent
  • MANAGEMENT OF CREDENTIALS USED BY SOFTWARE APPLICATIONS

    Filed US 20100175115

    Other inventors
    See patent
  • Automated Role And Entitlements Mining Using Network Observations

    Filed US US 2014/0109168 Al

    A role and entitlements mining system uses network intelligence
    to facilitate role definition. The system records traffic
    on a network. The traffic is analyzed to identify the user and
    application involved. The matched data is then provided to an
    analytics engine, which analyzes that data to attempt to derive
    an initial set of one or more roles and the application entitlements
    for each role. Each role derived by the analytics engine
    identifies one or more users who are…

    A role and entitlements mining system uses network intelligence
    to facilitate role definition. The system records traffic
    on a network. The traffic is analyzed to identify the user and
    application involved. The matched data is then provided to an
    analytics engine, which analyzes that data to attempt to derive
    an initial set of one or more roles and the application entitlements
    for each role. Each role derived by the analytics engine
    identifies one or more users who are identified as belonging to
    the role, as well as one or more application entitlements.
    Preferably, one or more directory services are then interrogated
    for known group and user relationships to detect
    whether the roles identified by the analytics engine can be
    modified or enriched. Evaluation of the known group and user
    relationships provides a way to identify a more granular set of
    role definitions. A role-based access control policy is then
    generated.

    Other inventors
  • TRANSACTION AUTHORIZATION

    Filed US 20100023454

    Other inventors
    • Scott Exton
    • Paul Jensen
    See patent
  • Method and system for automatic generation of cache directives for security policy

    Filed US US20120311674 A1

    An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not…

    An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.

    Other inventors
    See patent

Projects

  • IT Specialist Profession Leader

    I am the IT Specialist profession lead for all of APAC, which includes the profession of tens of thousands of certified and aspiring technical specialists across IBM. These professionals deliver technical expertise across Data, Applications, Network, AI, Quantum and CyberSecurity. This program is aligned with the Open Group IT Specialist certification scheme, and issues badges, assesses individual for certification (promotion prerequisites) and supports management in guiding technical…

    I am the IT Specialist profession lead for all of APAC, which includes the profession of tens of thousands of certified and aspiring technical specialists across IBM. These professionals deliver technical expertise across Data, Applications, Network, AI, Quantum and CyberSecurity. This program is aligned with the Open Group IT Specialist certification scheme, and issues badges, assesses individual for certification (promotion prerequisites) and supports management in guiding technical professionals.

  • Workplace and Executive Culture Coach

    -

    I am a trained and accredited leadership coach, focused on developing executive leaders and teams on projecting a positive and growth engagement style. This role requires me to review and communicate 1:1 360 degree feedback to executives and managers, and to help align brands within IBM. This accreditation is aligned with Human Synergistics.

Honors & Awards

  • 100% Club

    IBM

    I was awarded Club for overachieving technical sales targets.

  • Management Excellence

    IBM

    Recognised as one of IBM's top people manager of 2013.

  • Master Inventor (Security)

    IBM

    Global appointment recognising development, mentoring and leadership for patents in IBM Security. This reflects an active role in mentoring, reviewing and writing patents (45 in total).

  • Outstanding Technical Achievement Awards (OTAA) and Share Grants

    IBM

    Over the years, within the development organisation, I was granted many awards for client impact. These were normally cash awards and helped in my promotions through the different bands. I was also periodically granted IBM stock options as a continuous strong performer.

Recommendations received

6 people have recommended Chris

Join now to view

More activity by Chris

View Chris’ full profile

  • See who you know in common
  • Get introduced
  • Contact Chris directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More