Activity
-
NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. Jason Soroko explains this code-based algorithm on the Root…
NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. Jason Soroko explains this code-based algorithm on the Root…
Liked by Jason Soroko
-
There seems to be a lot of code library, code repository and and distribution mechanisms being targeted. I discuss mitigation here:
There seems to be a lot of code library, code repository and and distribution mechanisms being targeted. I discuss mitigation here:
Shared by Jason Soroko
-
While new efforts on #npm such as 2FA & trusted publishing help, you need visibility into how packages behave — not just who is publishing:…
While new efforts on #npm such as 2FA & trusted publishing help, you need visibility into how packages behave — not just who is publishing:…
Liked by Jason Soroko
Experience
Volunteer Experience
-
Photographer
Timmins Humane Society
- Present 14 years
Animal Welfare
Providing promotional photographic services for animals in need. Also volunteering to photograph pets for fundraising activities.
Publications
-
The climate of North America and adjacent ocean waters ca. 6 ka
Canadian Journal of Earth Sciences
See publicationThe climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for…
The climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for continental western North America. Contrary to this, a reconstruction of the distribution of Sphagnum-dominated peatlands in western Canada indicates that they were located north of their modern distribution, suggesting warmer and (or) drier conditions at 6000 BP. This interpretation is strengthened by observations of lower lake levels at 6000 BP in western Canada. This drier climate may have been associated with warmer conditions as indicated by the quantitative climate reconstructions. In general, eastern North America was drier, while western North America was warmer and drier at 6 ka compared to the present. A model of vegetation and carbon storage, when forced using 6 ka Canadian Climate Model and pollen-based climate reconstructions, showed an increase in area covered by boreal forest, extending north and south of the present location. This was not, however, verified by the fossil data. Additionally, the model showed little total change in carbon storage at 6 ka in the terrestrial biosphere. Estimated sea surface temperatures off eastern Canada suggest warmer surface waters at 6 ka, in agreement with reconstructions based on terrestrial records from the eastern seaboard.
-
Creation of a Fixed Route Scheduling Database by the Precision Merging of Schedule, Bus Stop and Base Map Data Sets to Support Scheduling Operations
ESRI Proceedings
See publicationThe project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments…
The project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments and other governmental entities. Discussion will include the resulting procedures, route model, turn table modifications and AML™ tools developed to create routes and sequence bus stops and turn points.
Patents
-
METHOD AND APPARATUS FOR PROVIDING VEHICLE SECURITY
Issued US US2016012653 (A1)
See patentApparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states…
Apparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states include, for example, to disallow all diagnostic system access or to allow diagnostic access for servicing.
Courses
-
Administration Essentials for Experienced Admins (SalesForce.com)
ADM 211
-
Apex & Visualforce Controllers (SalesForce.com)
DEV 501
-
Architecting Highly Secure Applications on Amazon AWS (Trend Micro)
Amazon AWS re:invent 2013
-
Building Applications with Force.com (SalesForce.com)
DEV 401
-
Designing Secure Protocols And Intercepting Secure Communication: Moxie Marlinspike
Black Hat 2013
-
ESRI ArcGIS
-
-
Hunting with Mandiant Incident Response: Mandiant
MIRCon 2013
-
IBM Cognos Authoring Reports with Multidimentional Data
-
-
IBM Cognos BI Administration
-
-
IBM Cognos Design and Develop Models
-
-
IBM Cognos Report Studio
-
-
IBM Cognos TM1 Multidimentional
-
-
Jailbreaking iOS: Jay Freeman - Saurik
JailbreakCon 2013
-
Java
-
-
Mandiant Incident Handling for the Enterprise: Mandiant
Countermeasures 2012
-
Mobile Hacking II: HotWan
Black Hat 2013
-
Modern Botnets: Ken Baylor
Black Hat 2012
-
Powershell for Professionals: Carlos Perez
DerbyCon 2012
-
SANS: Advanced Exploit Development
SEC710
-
SANS: Hacker Techniques, Exploits & Incident Handling
SEC 504
-
SANS: Law of Data Security and Investigations
LEG523
-
SANS: Mobile Device Security and Ethical Hacking
SEC575
-
SCADA Security Training: Red Tiger Security
SANS Barcelona 2012
-
SQL Server BI
-
-
Tactical Exploitation: Attack Research
Black Hat 2012
Projects
-
Webinar - Ensuring a Trusted Internet of Things - Engineers Australia
- Present
See projectWe describe a security approach that unlocks business value by enabling secure access to IoT data. The intent is to ensure the right security level for every device, application, system and user. We ensure that data is usable only by authorized devices, applications and users. This allows you to create trusted IoT ecosystems and safeguard the flow of data across your infrastructure.
-
Speaker - InfoSec Netherlands
- Present
-
Implications of Malware Series
See projectSeries of 5 Webinars.
All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.
The Implications of Malware Webinar Series is designed to help you prevent malware…Series of 5 Webinars.
All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.
The Implications of Malware Webinar Series is designed to help you prevent malware infection/intrusion through education. Join us and discover how the most damaging forms of malware work, and how, by leveraging Entrust’s Government Solutions and Professional Services, you can protect yourself and your colleagues. -
Speaker - 2nd Annual Technology & Innovation - The Future of Security in Financial Services
See projectPlacing Identity at the Centre of Cyber Security
• What are the fundamental weaknesses in desktop operating systems which are abused by attackers?
• Leveraging mobile platforms to enhance security and increase user experience
• Why mobile operating systems are more secure than desktop operating systems
• Zeus Virus Demonstration: learn how key-logging malware and fundamental Windows functionality caught many unawares -
Product Innovation
- Present
Product Innovation at Entrust Datacard
-
eCrime Europe - November 2013
See projectSpeaker presentation on leveraging mobile devices. Explanation of malware techniques, multifactor authentication.
-
Customer Visit Demonstrations / Webinars
- Present
See project-Ongoing customer visits, globally.
-Demonstrations of malware, and how to mitigate malware with Entrust products including mobile smart credential.
Webinars have been presented for:
SC Magazine
BankInfoSecurity
BrightTALK -
Marketing and product management thought leadership - Security
- Present
Ongoing thought leadership for marketing and product management.
-
Mobile Security
- Present
iOS and Android platform security assessments. Supporting product management, marketing and R&D with information regarding mobile architectures, especially security.
-
London, UK Customer Roadshow 2013
-
See projectThe London Cybersecurity Forum was a great success. Attendees gained insight from the world's most trusted security experts, including Sir Dick Evans, former BAE chairman; Andrew Pinder, former government eEnvoy; and Entrust president and CEO Bill Conner.
-
Washington, DC Customer Roadshow
-
See projectJoin the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central…Join the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central Intelligence Agency, will deliver the keynote presentation, "Defining the Legal and Ethical Boundaries of the Cyber Frontier."
This half-day event will explore real examples of the latest malware attacks — including session-riding, key-logging and more — and discuss how to properly combat highly targeted attacks.
More activity by Jason
-
In this Root Causes Podcast episode, Jason Soroko and I define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography…
In this Root Causes Podcast episode, Jason Soroko and I define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography…
Liked by Jason Soroko
-
IBM’s latest announcement about quantum computing raises many questions. I’m quoted asking those questions in: https://lnkd.in/gCD2BsZp
IBM’s latest announcement about quantum computing raises many questions. I’m quoted asking those questions in: https://lnkd.in/gCD2BsZp
Shared by Jason Soroko
-
IBM has achieved a major quantum milestone. Running its core error-mitigation algorithm in real time on AMD chips, marking a leap toward practical…
IBM has achieved a major quantum milestone. Running its core error-mitigation algorithm in real time on AMD chips, marking a leap toward practical…
Liked by Jason Soroko
-
Quantum computing is moving from theory to reality. HSBC’s latest study shows a 34% boost in trade execution predictions using a hybrid…
Quantum computing is moving from theory to reality. HSBC’s latest study shows a 34% boost in trade execution predictions using a hybrid…
Liked by Jason Soroko
-
A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The "two-QWAC architecture" introduces a second certificate…
A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The "two-QWAC architecture" introduces a second certificate…
Liked by Jason Soroko
-
Darktrace has uncovered a stealthy intrusion by China-linked group, Salt Typhoon, on a European telecom provider, exploiting a Citrix vulnerability…
Darktrace has uncovered a stealthy intrusion by China-linked group, Salt Typhoon, on a European telecom provider, exploiting a Citrix vulnerability…
Liked by Jason Soroko
-
In this insightful piece by John Leyden for CSO Online, industry experts weigh in on how organizations can prepare for the quantum leap in…
In this insightful piece by John Leyden for CSO Online, industry experts weigh in on how organizations can prepare for the quantum leap in…
Liked by Jason Soroko
-
The AWS outage suggests that everyone should review your DNS change test plans. I’m quoted in: https://lnkd.in/grTmg--D
The AWS outage suggests that everyone should review your DNS change test plans. I’m quoted in: https://lnkd.in/grTmg--D
Shared by Jason Soroko
-
CISOs face quantum leap in prioritizing quantum resilience http://spr.ly/6048A2VNE
CISOs face quantum leap in prioritizing quantum resilience http://spr.ly/6048A2VNE
Liked by Jason Soroko
-
The adversary is blending into legitimate activity in telecom. I’m quite in: https://lnkd.in/gAs9w4rK
The adversary is blending into legitimate activity in telecom. I’m quite in: https://lnkd.in/gAs9w4rK
Shared by Jason Soroko
-
Big changes are coming to public certificates: 47-day SSL, PQC, and the deprecation of mTLS. Jason Soroko and Tim Callan break down how to navigate…
Big changes are coming to public certificates: 47-day SSL, PQC, and the deprecation of mTLS. Jason Soroko and Tim Callan break down how to navigate…
Liked by Jason Soroko
-
Still relying solely on Active Directory Certificate Services (AD CS) for certificate management? You might be hitting a wall on scalability…
Still relying solely on Active Directory Certificate Services (AD CS) for certificate management? You might be hitting a wall on scalability…
Liked by Jason Soroko
-
An environment in which credentials are extremely predictable could be described as an entropy desert. These are occurring at a global scale. Jason…
An environment in which credentials are extremely predictable could be described as an entropy desert. These are occurring at a global scale. Jason…
Liked by Jason Soroko
-
In this episode Jason Soroko builds on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of…
In this episode Jason Soroko builds on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of…
Liked by Jason Soroko
-
We're thrilled to announce a strategic partnership with Indusface, combining their proven application security expertise with our leadership in…
We're thrilled to announce a strategic partnership with Indusface, combining their proven application security expertise with our leadership in…
Liked by Jason Soroko
-
A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to…
A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to…
Liked by Jason Soroko
-
The CPS must always be a superset of actual practices in a properly running CA. Jason Soroko and I explain why this is a product of good design on…
The CPS must always be a superset of actual practices in a properly running CA. Jason Soroko and I explain why this is a product of good design on…
Liked by Jason Soroko
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jason Soroko
2 others named Jason Soroko are on LinkedIn
See others named Jason Soroko