Mark B.

Mark B.

Hilliard, Ohio, United States
1K followers 500+ connections

About

Cybersecurity technical leader with significant experience and expertise in security and…

Activity

Join now to see all activity

Licenses & Certifications

  • Certified Information Systems Security Professional (CISSP) Graphic

    Certified Information Systems Security Professional (CISSP)

    (ISC)²

    Issued
    Credential ID 385334

Volunteer Experience

  • Judge

    OHI/O Hackathon

    Education

  • Parent volunteer

    Hilliard Avery Elementary School

    Education

Publications

  • TCG Trusted Network Connect: TNC Architecture for Interoperability, Version 1.0

    Trusted Computing Group

    The Trusted Network Connect Sub Group (TNC-SG) is working to define and promote an open solution architecture that enables network operators to enforce policies regarding the security 4etate of endpoints in order to determine whether to grant access to a requested network infrastructure. Endpoint integrity policies may involve integrity par eters spanning a range ofsystem components (hardware, firmware, software and application settings), and may or may not include evidence of a Trusted…

    The Trusted Network Connect Sub Group (TNC-SG) is working to define and promote an open solution architecture that enables network operators to enforce policies regarding the security 4etate of endpoints in order to determine whether to grant access to a requested network infrastructure. Endpoint integrity policies may involve integrity par eters spanning a range ofsystem components (hardware, firmware, software and application settings), and may or may not include evidence of a Trusted Platform Module (TPM).

    Other authors
    See publication
  • The Network Access Identifier

    IETF RFC 4282

    This document defines the syntax for the Network Access Identifier (NAI), the user identity submitted by the client during network authentication.

    Other authors
    See publication
  • TCG Trusted Network Connect TNC IF-IMV

    Trusted Computing Group

    This document describes and specifies IF-IMV, a critical interface in the Trusted Computing Group’s Trusted Network Connect (TNC) architecture. IF-IMV is the interface between Integrity Measurement Verifiers (IMVs) and a TNC Server (TNCS).

    Other authors
    • editor
    See publication
  • Criteria for Evaluating Network Access Server Protocols

    IETF RFC 3169

    This document defines requirements for protocols used by Network Access Servers (NAS).

    Other authors
    See publication
  • Criteria for Evaluating AAA Protocols for Network Access

    IETF RFC 2989

    This document represents a summary of Authentication, Authorization, Accounting (AAA) protocol requirements for network access.

    Other authors
    See publication
  • Network Access Server equirements Next Generation (NASREQNG) NAS Model.

    IETF RFC 2881

    This document describes the terminology and gives a model of typical Network Access Server (NAS). The purpose of this effort is to set the reference space for describing and evaluating NAS service protocols, such as RADIUS (RFCs 2865, 2866) [1], [2] and follow-on efforts like AAA Working Group, and the Diameter protocol [3]. These are protocols for carrying user service information for authentication, authorization, accounting, and auditing, between a Network Access Server which desires to…

    This document describes the terminology and gives a model of typical Network Access Server (NAS). The purpose of this effort is to set the reference space for describing and evaluating NAS service protocols, such as RADIUS (RFCs 2865, 2866) [1], [2] and follow-on efforts like AAA Working Group, and the Diameter protocol [3]. These are protocols for carrying user service information for authentication, authorization, accounting, and auditing, between a Network Access Server which desires to authenticate its incomingdcalls and a shared authentication server.

    Other authors
    See publication

Patents

  • Selection and Storage of Policies in Network Management

    Issued US 7,882,152

    User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the…

    User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren't specified, a base configuration creator creates a policy with minimal attributes. In another aspect, the logic layer also contains a device control console, which allows bypassing the policy creating and configuring to allow a user to directly access a device for configuration.

    Other inventors
    • Kevin Russo
    • Ken Mulh
    • Bill Emerick
    • Raymond J Bell
    See patent
  • Selection and storage of policies in network management

    Issued US 7,840,599

    A method of accessing a network device under control of a policy-based network management system.

    Other inventors
    • Bill Emerick
    • Ken Mulh
    • Kevin Russo
    • Raymond J Bell
    See patent
  • Device plug-in system for configuring network device over a public network.

    Issued US 7,284,042

    Provides device configuration and policy configuration data to network devices over a public network, e.g., the internet. A secure communication link is first established over the public network to the network device. Next, policy and configuration information is downloaded to the network device using that secure communication link.t.

    Other inventors
    See patent
  • Policy engine for modular generation of policy for a flat, per-device database.

    Issued US 7,159,125

    A policy engine in a policy-based, outsourced, network management system.

    Other inventors
    See patent
  • Selection and storage of policies in network management

    Issued US 7,130,854

    User interface and policy loading aspects of a policy-based, outsourced, network management system.

    Other inventors
    See patent

Languages

  • English

    Native or bilingual proficiency

  • Polish

    Limited working proficiency

  • Spanish

    Professional working proficiency

  • French

    Limited working proficiency

  • C++

    Full professional proficiency

  • PHP

    Full professional proficiency

  • CSS

    Full professional proficiency

Organizations

  • Ohio Cyber Collaboration Committee (OC3)

    Chair, Cyber Range Subcommittee

    -

    At the request of Ohio’s governor to strengthen cybersecurity in the state, the Ohio National Guard has brought together more than 200 representatives from public, private, military and educational organizations to form the Ohio Cyber Collaboration Committee (OC3). The OC3 mission is to provide a collaborative environment to develop a stronger cybersecurity infrastructure and workforce. One of the committee’s initiatives is the creation of the Ohio Cyber Range — a virtual environment used for…

    At the request of Ohio’s governor to strengthen cybersecurity in the state, the Ohio National Guard has brought together more than 200 representatives from public, private, military and educational organizations to form the Ohio Cyber Collaboration Committee (OC3). The OC3 mission is to provide a collaborative environment to develop a stronger cybersecurity infrastructure and workforce. One of the committee’s initiatives is the creation of the Ohio Cyber Range — a virtual environment used for cybersecurity training and technology development. * Conduct cybersecurity exercises and competitions to hone cross organizational incident response capabilities and develop future cybersecurity professionals. * Research and test industry-standard best practices. * Facilitate the evaluation and testing of innovative technologies and processes. d. Enable a training environment for the current and future cybersecurity workforce, including National Guard personnel, state and local government personnel, faculty and students in the education community, and private sector entities.

  • Trusted Computing Group

    Member, Trusted Network Connect Working Group

    -

    Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits…

    Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security. More than a billion devices include TCG technologies. Virtually all enterprise PCs, many servers and embedded systems include the TPM; while networking equipment, drives and other devices and systems deploy other TCG specifications, including self-encrypting drives and network security specifications.

  • Internet Engineering Task Force

    BOF Chair, Working Group Chair

    -

    Co-chairman of Network Access Server Requirements (NASREQ) Next Generation BOF and NASREQ Working Group, Internet Engineering Task Force

Recommendations received

More activity by Mark

View Mark’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mark directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mark B. in United States

Add new skills with these courses