About
I continue to fulfil a lifetime mission securing global online and critical…
Articles by Chris
Activity
-
I’m pleased to welcome Melanie E. as partner, distribution and industrial leader for East Australia. Melanie brings more than 20 years of experience…
I’m pleased to welcome Melanie E. as partner, distribution and industrial leader for East Australia. Melanie brings more than 20 years of experience…
Liked by Chris Hockings
-
On this day of festival of Lights, Diwali 🪔, I extend my warmest wishes to my team, colleagues, clients, partners and friends across the…
On this day of festival of Lights, Diwali 🪔, I extend my warmest wishes to my team, colleagues, clients, partners and friends across the…
Liked by Chris Hockings
-
I’m very excited to be joining the board of the Queensland Manufacturing Institute (QMI). By embracing emerging technologies, supporting regional…
I’m very excited to be joining the board of the Queensland Manufacturing Institute (QMI). By embracing emerging technologies, supporting regional…
Liked by Chris Hockings
Experience
Education
Licenses & Certifications
Volunteer Experience
Publications
-
Extending IBM Business Process Manager to the Mobile Enterprise with IBM Worklight
IBM Redbooks
In today’s business in motion environments, workers expect to be connected to their critical business processes while on-the-go. It is imperative to deliver more meaningful user engagements by extending business processes to the mobile working environments.
This IBM Redbooks publicatin provides an overview of the market forces that push organizations to re-invent their process with Mobile in mind. It describes IBM Mobile Smarter Process and explains how the capabilities provided by the…In today’s business in motion environments, workers expect to be connected to their critical business processes while on-the-go. It is imperative to deliver more meaningful user engagements by extending business processes to the mobile working environments.
This IBM Redbooks publicatin provides an overview of the market forces that push organizations to re-invent their process with Mobile in mind. It describes IBM Mobile Smarter Process and explains how the capabilities provided by the offering help organizations to mobile-enabled their processes.Other authorsSee publication -
IBM Security Access Manager: Protect websites with context-based access
IBM developerworks
This article describes a method for adding mutli-factor authentication to a web site protected by the IBM Security Access Manager appliance using Risk Based Access Control and One Time Password capabilities.
Other authorsSee publication -
Enable bring-your-own-identity authentication
IBM devWorks
This is a technical article that will allow you to learn about ways to use open security standards to simplify consumer identity lifecycle operations leveraging the social network providers. The proposed implementation satisfies the end users' desires for BYO-ID, while maintaining security compliance mandates by leveraging IBM® Security Systems products within the enterprise.
Other authorsSee publication -
Enterprise Security Architecture Using Tivoli Security Products
Patents
-
METHOD AND SYSTEM FOR AUTOMATING SECURITY POLICY DEFINITION BASED ON RECORDED TRANSACTIONS
Issued US US 8640195 B2
-
AUTOMATICALLY ASSESSING DRUG INTERACTIONS WHILE PROTECTING PATIENT PRIVACY
Issued US 20100274586
-
Method for managing shared accounts in an identity management system
Filed US 20110277016
This disclosure describes a method of and system for provisioning of shared account credentials to provide authorized access to shared or delegated accounts. Preferably, an enterprise single sign-on (E-SSO) system is used to manage the shared account or control delegation of account access, and preferably the shared or delegated account credential is not exposed to the end user. The described technique enables temporary delegation of account privileges to a member of a shared role. Using the…
This disclosure describes a method of and system for provisioning of shared account credentials to provide authorized access to shared or delegated accounts. Preferably, an enterprise single sign-on (E-SSO) system is used to manage the shared account or control delegation of account access, and preferably the shared or delegated account credential is not exposed to the end user. The described technique enables temporary delegation of account privileges to a member of a shared role. Using the described approach, an information technology (IT) account may be shared so that a user who needs to perform a shared duty can do so in the context of a shared role and without having control over the account itself. The approach facilitates delegating the use of a single account to one of a member of the shared role.
Other inventorsSee patent -
MANAGEMENT OF CREDENTIALS USED BY SOFTWARE APPLICATIONS
Filed US 20100175115
-
Automated Role And Entitlements Mining Using Network Observations
Filed US US 2014/0109168 Al
A role and entitlements mining system uses network intelligence
to facilitate role definition. The system records traffic
on a network. The traffic is analyzed to identify the user and
application involved. The matched data is then provided to an
analytics engine, which analyzes that data to attempt to derive
an initial set of one or more roles and the application entitlements
for each role. Each role derived by the analytics engine
identifies one or more users who are…A role and entitlements mining system uses network intelligence
to facilitate role definition. The system records traffic
on a network. The traffic is analyzed to identify the user and
application involved. The matched data is then provided to an
analytics engine, which analyzes that data to attempt to derive
an initial set of one or more roles and the application entitlements
for each role. Each role derived by the analytics engine
identifies one or more users who are identified as belonging to
the role, as well as one or more application entitlements.
Preferably, one or more directory services are then interrogated
for known group and user relationships to detect
whether the roles identified by the analytics engine can be
modified or enriched. Evaluation of the known group and user
relationships provides a way to identify a more granular set of
role definitions. A role-based access control policy is then
generated.Other inventors -
Method and system for automatic generation of cache directives for security policy
Filed US US20120311674 A1
An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not…
An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.
Other inventorsSee patent -
METHOD FOR NOTIFICATION UPON EXPOSURE TO OFFENSIVE BEHAVIOURAL PATTERNS IN COLLABORATION
US US 2010/0175129 A1
Projects
-
IT Specialist Profession Leader
I am the IT Specialist profession lead for all of APAC, which includes the profession of tens of thousands of certified and aspiring technical specialists across IBM. These professionals deliver technical expertise across Data, Applications, Network, AI, Quantum and CyberSecurity. This program is aligned with the Open Group IT Specialist certification scheme, and issues badges, assesses individual for certification (promotion prerequisites) and supports management in guiding technical…
I am the IT Specialist profession lead for all of APAC, which includes the profession of tens of thousands of certified and aspiring technical specialists across IBM. These professionals deliver technical expertise across Data, Applications, Network, AI, Quantum and CyberSecurity. This program is aligned with the Open Group IT Specialist certification scheme, and issues badges, assesses individual for certification (promotion prerequisites) and supports management in guiding technical professionals.
-
Workplace and Executive Culture Coach
-
I am a trained and accredited leadership coach, focused on developing executive leaders and teams on projecting a positive and growth engagement style. This role requires me to review and communicate 1:1 360 degree feedback to executives and managers, and to help align brands within IBM. This accreditation is aligned with Human Synergistics.
Honors & Awards
-
100% Club
IBM
I was awarded Club for overachieving technical sales targets.
-
Management Excellence
IBM
Recognised as one of IBM's top people manager of 2013.
-
Master Inventor (Security)
IBM
Global appointment recognising development, mentoring and leadership for patents in IBM Security. This reflects an active role in mentoring, reviewing and writing patents (45 in total).
-
Outstanding Technical Achievement Awards (OTAA) and Share Grants
IBM
Over the years, within the development organisation, I was granted many awards for client impact. These were normally cash awards and helped in my promotions through the different bands. I was also periodically granted IBM stock options as a continuous strong performer.
Recommendations received
-
LinkedIn User
6 people have recommended Chris
Join now to viewMore activity by Chris
-
IBM and the Queensland Government share a long history of collaboration and we are so so delighted to share this news that after 12 years, we are…
IBM and the Queensland Government share a long history of collaboration and we are so so delighted to share this news that after 12 years, we are…
Liked by Chris Hockings
-
I'm pleased to share the news that the Queensland Government has elected to amend its decade-long suspension of IBM from state ICT contracts — a…
I'm pleased to share the news that the Queensland Government has elected to amend its decade-long suspension of IBM from state ICT contracts — a…
Liked by Chris Hockings
-
IBM congratulates Darío Gil on his swearing in as Undersecretary for Science at the U.S. Department of Energy. I’ve had the privilege of working with…
IBM congratulates Darío Gil on his swearing in as Undersecretary for Science at the U.S. Department of Energy. I’ve had the privilege of working with…
Liked by Chris Hockings
-
🔐 "One PAP to rule them all?" Working recently on Zero-Trust, ABAC or Zero Standing Privilege projects, I really see the maturity of everyone going…
🔐 "One PAP to rule them all?" Working recently on Zero-Trust, ABAC or Zero Standing Privilege projects, I really see the maturity of everyone going…
Liked by Chris Hockings
-
Most people won't remember your presentation. We're emotional creatures first, rational second. References in <comments> to help you get…
Most people won't remember your presentation. We're emotional creatures first, rational second. References in <comments> to help you get…
Liked by Chris Hockings
-
Roberto Ferraro drops a powerful visual on meeting realities...I wrote a piece a bit ago that can help avoid the below. Link in comments for ya!
Roberto Ferraro drops a powerful visual on meeting realities...I wrote a piece a bit ago that can help avoid the below. Link in comments for ya!
Liked by Chris Hockings
-
Want to study an MBA with the chance to complete a 12-month leadership program with top organisations such as Future Women?
Want to study an MBA with the chance to complete a 12-month leadership program with top organisations such as Future Women?
Liked by Chris Hockings
-
Had a great evening judging and sharing feedback to hackathon participants at “AI in education” hackathon at Southern Cross University Great to see…
Had a great evening judging and sharing feedback to hackathon participants at “AI in education” hackathon at Southern Cross University Great to see…
Liked by Chris Hockings
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More