“Ross is extremely knowledgeable about how to prepare and sustain a healthcare organization to securely manage PHI against HIPAA or HiTrust requirements. He also has a very good rapport with customers--- pleasure to work with!”
About
Expert in Information Security architecture, engineering, and assurance; Disaster…
Services
Experience
Education
Licenses & Certifications
-
Certified Forensic Consultant (CFC)
American Board for Certification in Homeland Security (ABCHS)
IssuedCredential ID 104546 -
Fellow, ABCHS (FABCHS)
American Board for Certification in Homeland Security (ABCHS)
IssuedCredential ID 104546 -
Sensitive Security Information Handling (SSIC)
American Board for Certification in Homeland Security (ABCHS)
IssuedCredential ID 104546 -
Certified in Information Assurance (CIA)
American Board for CyberSecurity and Information Assurance (ABCIA)
IssuedCredential ID 104546 -
Certified in Forensic Engineering and Technology
American Board of Forensic Engineering and Technology (ABFET)
IssuedCredential ID 104546 -
Associate Business Contiuity Professional (ABCP)
Disaster Recovery Institute International (DRII)
Issued -
Certified Security Compliance Specialist (CSCS)
ecFirst
Issued ExpiresCredential ID CSCS-401-0001130 -
Certified HIPAA Privacy and Security Expert (CHPSE)
Supremus Group
Issued Expires -
Certified HITRUST CSF Practitioner (CCSFP)
HITRUST Alliance
Issued ExpiresCredential ID 58186
Publications
-
NISTIR 8006, Cloud Computing Forensic Science Challenges
National Institute of Standards and Technology
An outstanding team led by Drs. Iorga and Martin of NIST collaborated to produce this work. Mitigating these challenges is important for cloud-based system owners, cloud forensic tool developers, and forensic investigators, as well as for the development of forensic-ready solutions. This effort will support the criminal justice and civil litigation systems and provide capabilities for security incident response and internal enterprise operations. NISTIR 8006 includes a preliminary analysis of…
An outstanding team led by Drs. Iorga and Martin of NIST collaborated to produce this work. Mitigating these challenges is important for cloud-based system owners, cloud forensic tool developers, and forensic investigators, as well as for the development of forensic-ready solutions. This effort will support the criminal justice and civil litigation systems and provide capabilities for security incident response and internal enterprise operations. NISTIR 8006 includes a preliminary analysis of the challenges by addressing (1) the relationship between each challenge and the five essential characteristics of cloud computing as defined by the NIST cloud computing model, (2) how the challenges correlate to cloud technology by considering their relationship to the Cloud Security Alliance’s Enterprise Architecture, (3) the nine categories to which the challenges belong, and (4) the potential results of overcoming each challenge. It also provides some analysis of logging data, data in media, and issues associated with time, location, and sensitive data. This document is intended to initiate dialogue within the cloud computing community to understand forensic science concerns and challenges in cloud ecosystems and identify the technologies and standards that can mitigate these challenges.
-
The Encyclopedia of Information Systems and Technology
Taylor & Francis
My entry: "The Health Insurance Portability and Accountability Act”, commonly referred to as HIPAA, and its amendment known as “HITECH”, have been heralded as bringing vital attention to the matters or the privacy and security to patient information. They have also brought controversy to the general discussion of information protection, its cost, the associated burden of program management, breach reporting and related topics. Much remains to be clarified before truly effective and…
My entry: "The Health Insurance Portability and Accountability Act”, commonly referred to as HIPAA, and its amendment known as “HITECH”, have been heralded as bringing vital attention to the matters or the privacy and security to patient information. They have also brought controversy to the general discussion of information protection, its cost, the associated burden of program management, breach reporting and related topics. Much remains to be clarified before truly effective and cost-efficient programs can be designed and institutionalized. This article addresses these issues and provides clarity on how to achieve the objective for protecting the privacy and security of patient information. It lays the foundation for defining IT controls, implementation and operational guidance, and the interdependence of them. It provides examples of effective options to achieve the goals without breaking the bank or adversely impacting the delivery of timely, appropriate and high-quality healthcare. It enlarges on the requirements of these important laws, their impacts on the enterprise, and elaborates on the manner in which they must be addressed so that this vital program of protection can be brought about quickly and efficiently, without excessive cost or adding unacceptable overhead, in an evolutionary, rather than revolutionary, manner.
-
Preserving Electronic Evidence for Trial, 1st Edition
Syngress, an Elsevier Brand, ISBN 9780128093351
I am NOT the author - I served as technical editor/SME for this volume following Mr. Rojas' passing.
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic…I am NOT the author - I served as technical editor/SME for this volume following Mr. Rojas' passing.
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence.
Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold – identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence.Other authors -
Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce
Council on Cybersecurity
Along with the ongoing refinement of cybersecurity roles at the individual level, the Council supports workforce management at the enterprise level. In line with that goal, the Council has produced the Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce." This handbook is designed to be a ready reference for executives, hiring managers‒often in information technology (IT) and security functions‒and human resources (HR) professionals charged with managing the planning,…
Along with the ongoing refinement of cybersecurity roles at the individual level, the Council supports workforce management at the enterprise level. In line with that goal, the Council has produced the Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce." This handbook is designed to be a ready reference for executives, hiring managers‒often in information technology (IT) and security functions‒and human resources (HR) professionals charged with managing the planning, sourcing, hiring, training, development, career progression, and sustainment of the cybersecurity workforce.
Other authorsSee publication -
The Center for National Threat Asessment Series
Auerbach/Taylor&Francis
This is an ongoing series of books and compendia volumes covering the interrelated areas of Critical Infrastructure and Cybersecurity focusing primarily on the interdependency of the one upon the other and co-related issues. This series serves as the publisher for the Board and members of the Center for National Threat Assessment.
-
Information Security Management Handbook, 6th Edition - Tipton and Krause
Auerbach/Taylor & Young
This piece discusses the vital aspects and security value of Single Sign-On technology, with regard for design, implementation and management issues.
-
The HIPAA Program Reference Handbook
Auerbach/Taylor&Francis
The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues.
-
Single Sign-On
Information Security Management Handbook, 4th Edition
Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems. This new volume of the all-important handbook addresses emerging trends and new concepts in information security, along with security methodologies for evolving technologies.
Chapter 1 covers thoroughly the subject of SSO technologies in a very advanced discussion of this then-fledgling application. -
Cloud Computing Forensics Reference Architecture SP 800-201
National Institute of Standards and Technology
In previous work, the NIST Cloud Computing Forensic Science Working Group (NCC FSWG) published NISTIR 8006: ”NIST Cloud Computing Forensic Science Challenges” [REF NISTIR8006]. This effort resulted from a collaboration of volunteers from the private and public sector. The document highlights the digital forensics challenges triggered by the specific characteristics and business model of public cloud computing services.
Our approach in examining forensics in this context was to first…In previous work, the NIST Cloud Computing Forensic Science Working Group (NCC FSWG) published NISTIR 8006: ”NIST Cloud Computing Forensic Science Challenges” [REF NISTIR8006]. This effort resulted from a collaboration of volunteers from the private and public sector. The document highlights the digital forensics challenges triggered by the specific characteristics and business model of public cloud computing services.
Our approach in examining forensics in this context was to first examine this environment to discover and crystalize the unique characteristics of it, as these play a significant part in three aspects of operation: normal operations, adverse operations when under cyberattack, and operations during criminal exploitation of cloud computing resources.
The importance of this work is to clarify how forensics in the cloud can achieve the same acceptance as forensics have found in traditional computing models. This document and the efforts contained herein, along with NISTIR 8006, represent the beginnings of that achievement. The White House Executive Order of May 12, 2021, entitled “Executive Order on Improving the Nation’s Cybersecurity” [https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/], points out the importance of having forensic-ready information systems, including cloud systems, to improve the nation’s cybersecurity.
Honors & Awards
-
Top Ten Most Influential CISO of 2022
CIO Views
Award for outstanding performance as a CISO successfully guiding InvisALERT Solutions security program and to obtaining HITRUST Certification. The main contribution is demonstrating that sound and compliant privacy and security programs are strong differentiators that add high trust in our service delivery.
-
ABCHS Featured Lecturer, ES23
American Board for Certification in Homeland Security
Featured Lecturer at the Executive Summit 2015 held at University of California, Santa Barbara, on the issues associated with the presence and impact of CyberSecurity in Critical Infrastructure Protection.
-
ABCHS Featured Lecturer, ES22
American Board for Certification in Homeland Security
CyberSecurity, The Third Generation - this presentation discussed the evolution of the Information Security profession and the professional over the last 30 years; from where it started to where we are today. It discussed the issues and the challenges facing today's ITSec professional as they work to overcome a highly active aggressors and defend the target-rich environment they seek to exploit.
-
Certificate of Appreciation
American Board for Certification in Homeland Security
Presented in grateful acknowledgement of personal commitment as a Sustaining Member of ABCHS to advance the principles of the Program and to the maintenance of high personal professionalism in advancing the field of Homeland Security.
-
Letter of Recommendation
Karl Rove, Senior Advisor to the President
Recommendation for Cybersecurity Chief, Department of Homeland Security.
-
Letter of Recommendation
Tom DeLay, Member of Congress, Texas
Recommendation for Cybersecurity Chief, Department of Homeland Security.
-
JSC Mission Systems Group Achievement Award
NASA JSC Mission Systems
For significant and essential contributions to the successful implementation and operation of the Storefront mentoring environment at Prairie A&M.
-
Certificate of Recognition
US Department of Defense
In recognition of service during the Cold War Period (1945-1991) and for promoting peace and stability in the United States of America through out it.
-
Public Service Achievement Award
NASA-HQ
For outstanding performance in mission support activities for the NASA Return to Flight and contributions to program success.
-
STS-26 Return to Flight: Recognition of Readiness Award
Rockwell Shuttle Operations Company
For personal contributions for the safety and success of achieving the Return-to-Flight program commitments and objectives.
-
Jesse H. Jones Scholarship Award
Jess H. Jones Foundation
Academic Scholarship awarded for Master's Degree program in Business and MIS at UHCL.
Organizations
-
EC Council Digital Forensics Global Advisory Board
Member, SME
- PresentAs a nominated member of this board, I provide SME insight on various questions and issues presented. Our focus is to understand the requirements of the profession, and the needs of the practicing professional in order to prepare them to perform at the highest level of technical proficiency and maintain that excellence. Acting in this role, our Board will assist ECC in its efforts to lead this field with the highest quality education and professional development resources.
-
American Board for CyberSecurity and Information Assurance (ABCIA)
Board Chairman
- PresentAdvisory board of Information Security and Forensics SMEs to the American Board for Certification in Homeland Security (ABCHS) of the Center for National Threat Assessment (CNTA): concerned with furthering the education and proficiency of security and forensic professionals in Critical Infrastructure roles.
-
InfraGard
Member
- PresentMember of local chapter and Healthcare CI SIG.
-
National Board of Information Security Examiners (NBISE)
Board Member
- PresentMember of project team working on InfoSec qualifications (educational and experiential) for practicing professionals in Critical Infrastructure roles, sponsored by DoE, DoD, DHS.
-
American Board for Certified in Homeland Security (ABCHS)
Fellow (FABCHS)
- PresentFellow and Certified member. Frequent speaker at national Executive Summit events.
-
University of Houston Clear Lake CyberSecurity Institute (CSI)
Director
-Our Mission: The Cyber Security Institute will serve as a focal point of collaborations between the academia, the federal agencies, and the local governmental and business organizations in the greater Houston area. The UHCL-CSI has three primary missions: Research & Development, Education, and Services.
-
DeVry University
Board Member
-Advisory Board member for Computer & Information Science programs specializing in web expertise and Information Assurance related to e-Commerce.
Recommendations received
14 people have recommended Ross A.
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More