Ross A. Leo

Ross A. Leo

Greater Houston
500+ connections

About

Expert in Information Security architecture, engineering, and assurance; Disaster…

Services

Experience

  • ObservSmart Invisalert Solutions, Inc. Graphic
  • -

    United States

  • -

    Houston, TX

  • -

    United States

  • -

    Houston, Texas, United States

  • -

    Clear Lake City, Houston, TX

  • -

    United States

  • -

    Houston, Texas Area

  • -

  • -

  • -

  • -

  • -

    USA

  • -

  • -

    Houston, Texas Area

Education

Licenses & Certifications

Publications

  • NISTIR 8006, Cloud Computing Forensic Science Challenges

    National Institute of Standards and Technology

    An outstanding team led by Drs. Iorga and Martin of NIST collaborated to produce this work. Mitigating these challenges is important for cloud-based system owners, cloud forensic tool developers, and forensic investigators, as well as for the development of forensic-ready solutions. This effort will support the criminal justice and civil litigation systems and provide capabilities for security incident response and internal enterprise operations. NISTIR 8006 includes a preliminary analysis of…

    An outstanding team led by Drs. Iorga and Martin of NIST collaborated to produce this work. Mitigating these challenges is important for cloud-based system owners, cloud forensic tool developers, and forensic investigators, as well as for the development of forensic-ready solutions. This effort will support the criminal justice and civil litigation systems and provide capabilities for security incident response and internal enterprise operations. NISTIR 8006 includes a preliminary analysis of the challenges by addressing (1) the relationship between each challenge and the five essential characteristics of cloud computing as defined by the NIST cloud computing model, (2) how the challenges correlate to cloud technology by considering their relationship to the Cloud Security Alliance’s Enterprise Architecture, (3) the nine categories to which the challenges belong, and (4) the potential results of overcoming each challenge. It also provides some analysis of logging data, data in media, and issues associated with time, location, and sensitive data. This document is intended to initiate dialogue within the cloud computing community to understand forensic science concerns and challenges in cloud ecosystems and identify the technologies and standards that can mitigate these challenges.

    See publication
  • The Encyclopedia of Information Systems and Technology

    Taylor & Francis

    My entry: "The Health Insurance Portability and Accountability Act”, commonly referred to as HIPAA, and its amendment known as “HITECH”, have been heralded as bringing vital attention to the matters or the privacy and security to patient information. They have also brought controversy to the general discussion of information protection, its cost, the associated burden of program management, breach reporting and related topics. Much remains to be clarified before truly effective and…

    My entry: "The Health Insurance Portability and Accountability Act”, commonly referred to as HIPAA, and its amendment known as “HITECH”, have been heralded as bringing vital attention to the matters or the privacy and security to patient information. They have also brought controversy to the general discussion of information protection, its cost, the associated burden of program management, breach reporting and related topics. Much remains to be clarified before truly effective and cost-efficient programs can be designed and institutionalized. This article addresses these issues and provides clarity on how to achieve the objective for protecting the privacy and security of patient information. It lays the foundation for defining IT controls, implementation and operational guidance, and the interdependence of them. It provides examples of effective options to achieve the goals without breaking the bank or adversely impacting the delivery of timely, appropriate and high-quality healthcare. It enlarges on the requirements of these important laws, their impacts on the enterprise, and elaborates on the manner in which they must be addressed so that this vital program of protection can be brought about quickly and efficiently, without excessive cost or adding unacceptable overhead, in an evolutionary, rather than revolutionary, manner.

    See publication
  • Preserving Electronic Evidence for Trial, 1st Edition

    Syngress, an Elsevier Brand, ISBN 9780128093351

    I am NOT the author - I served as technical editor/SME for this volume following Mr. Rojas' passing.

    The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic…

    I am NOT the author - I served as technical editor/SME for this volume following Mr. Rojas' passing.

    The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence.

    Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold – identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence.

    Other authors
    • Ann Ziegler
    • Ernesto Rojas
    See publication
  • Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce

    Council on Cybersecurity

    Along with the ongoing refinement of cybersecurity roles at the individual level, the Council supports workforce management at the enterprise level. In line with that goal, the Council has produced the Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce." This handbook is designed to be a ready reference for executives, hiring managers‒often in information technology (IT) and security functions‒and human resources (HR) professionals charged with managing the planning,…

    Along with the ongoing refinement of cybersecurity roles at the individual level, the Council supports workforce management at the enterprise level. In line with that goal, the Council has produced the Cybersecurity Workforce Handbook: A Practical Guide to Managing Your Workforce." This handbook is designed to be a ready reference for executives, hiring managers‒often in information technology (IT) and security functions‒and human resources (HR) professionals charged with managing the planning, sourcing, hiring, training, development, career progression, and sustainment of the cybersecurity workforce.

    Other authors
    See publication
  • The Center for National Threat Asessment Series

    Auerbach/Taylor&Francis

    This is an ongoing series of books and compendia volumes covering the interrelated areas of Critical Infrastructure and Cybersecurity focusing primarily on the interdependency of the one upon the other and co-related issues. This series serves as the publisher for the Board and members of the Center for National Threat Assessment.

  • Information Security Management Handbook, 6th Edition - Tipton and Krause

    Auerbach/Taylor & Young

    This piece discusses the vital aspects and security value of Single Sign-On technology, with regard for design, implementation and management issues.

    See publication
  • The HIPAA Program Reference Handbook

    Auerbach/Taylor&Francis

    The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues.

    See publication
  • Single Sign-On

    Information Security Management Handbook, 4th Edition

    Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems. This new volume of the all-important handbook addresses emerging trends and new concepts in information security, along with security methodologies for evolving technologies.

    Chapter 1 covers thoroughly the subject of SSO technologies in a very advanced discussion of this then-fledgling application.

    See publication
  • Cloud Computing Forensics Reference Architecture SP 800-201

    National Institute of Standards and Technology

    In previous work, the NIST Cloud Computing Forensic Science Working Group (NCC FSWG) published NISTIR 8006: ”NIST Cloud Computing Forensic Science Challenges” [REF NISTIR8006]. This effort resulted from a collaboration of volunteers from the private and public sector. The document highlights the digital forensics challenges triggered by the specific characteristics and business model of public cloud computing services.

    Our approach in examining forensics in this context was to first…

    In previous work, the NIST Cloud Computing Forensic Science Working Group (NCC FSWG) published NISTIR 8006: ”NIST Cloud Computing Forensic Science Challenges” [REF NISTIR8006]. This effort resulted from a collaboration of volunteers from the private and public sector. The document highlights the digital forensics challenges triggered by the specific characteristics and business model of public cloud computing services.

    Our approach in examining forensics in this context was to first examine this environment to discover and crystalize the unique characteristics of it, as these play a significant part in three aspects of operation: normal operations, adverse operations when under cyberattack, and operations during criminal exploitation of cloud computing resources.

    The importance of this work is to clarify how forensics in the cloud can achieve the same acceptance as forensics have found in traditional computing models. This document and the efforts contained herein, along with NISTIR 8006, represent the beginnings of that achievement. The White House Executive Order of May 12, 2021, entitled “Executive Order on Improving the Nation’s Cybersecurity” [https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/], points out the importance of having forensic-ready information systems, including cloud systems, to improve the nation’s cybersecurity.

Honors & Awards

  • Top Ten Most Influential CISO of 2022

    CIO Views

    Award for outstanding performance as a CISO successfully guiding InvisALERT Solutions security program and to obtaining HITRUST Certification. The main contribution is demonstrating that sound and compliant privacy and security programs are strong differentiators that add high trust in our service delivery.

  • ABCHS Featured Lecturer, ES23

    American Board for Certification in Homeland Security

    Featured Lecturer at the Executive Summit 2015 held at University of California, Santa Barbara, on the issues associated with the presence and impact of CyberSecurity in Critical Infrastructure Protection.

  • ABCHS Featured Lecturer, ES22

    American Board for Certification in Homeland Security

    CyberSecurity, The Third Generation - this presentation discussed the evolution of the Information Security profession and the professional over the last 30 years; from where it started to where we are today. It discussed the issues and the challenges facing today's ITSec professional as they work to overcome a highly active aggressors and defend the target-rich environment they seek to exploit.

  • Certificate of Appreciation

    American Board for Certification in Homeland Security

    Presented in grateful acknowledgement of personal commitment as a Sustaining Member of ABCHS to advance the principles of the Program and to the maintenance of high personal professionalism in advancing the field of Homeland Security.

  • Letter of Recommendation

    Karl Rove, Senior Advisor to the President

    Recommendation for Cybersecurity Chief, Department of Homeland Security.

  • Letter of Recommendation

    Tom DeLay, Member of Congress, Texas

    Recommendation for Cybersecurity Chief, Department of Homeland Security.

  • JSC Mission Systems Group Achievement Award

    NASA JSC Mission Systems

    For significant and essential contributions to the successful implementation and operation of the Storefront mentoring environment at Prairie A&M.

  • Certificate of Recognition

    US Department of Defense

    In recognition of service during the Cold War Period (1945-1991) and for promoting peace and stability in the United States of America through out it.

  • Public Service Achievement Award

    NASA-HQ

    For outstanding performance in mission support activities for the NASA Return to Flight and contributions to program success.

  • STS-26 Return to Flight: Recognition of Readiness Award

    Rockwell Shuttle Operations Company

    For personal contributions for the safety and success of achieving the Return-to-Flight program commitments and objectives.

  • Jesse H. Jones Scholarship Award

    Jess H. Jones Foundation

    Academic Scholarship awarded for Master's Degree program in Business and MIS at UHCL.

Organizations

  • EC Council Digital Forensics Global Advisory Board

    Member, SME

    - Present

    As a nominated member of this board, I provide SME insight on various questions and issues presented. Our focus is to understand the requirements of the profession, and the needs of the practicing professional in order to prepare them to perform at the highest level of technical proficiency and maintain that excellence. Acting in this role, our Board will assist ECC in its efforts to lead this field with the highest quality education and professional development resources.

  • American Board for CyberSecurity and Information Assurance (ABCIA)

    Board Chairman

    - Present

    Advisory board of Information Security and Forensics SMEs to the American Board for Certification in Homeland Security (ABCHS) of the Center for National Threat Assessment (CNTA): concerned with furthering the education and proficiency of security and forensic professionals in Critical Infrastructure roles.

  • InfraGard

    Member

    - Present

    Member of local chapter and Healthcare CI SIG.

  • National Board of Information Security Examiners (NBISE)

    Board Member

    - Present

    Member of project team working on InfoSec qualifications (educational and experiential) for practicing professionals in Critical Infrastructure roles, sponsored by DoE, DoD, DHS.

  • American Board for Certified in Homeland Security (ABCHS)

    Fellow (FABCHS)

    - Present

    Fellow and Certified member. Frequent speaker at national Executive Summit events.

  • University of Houston Clear Lake CyberSecurity Institute (CSI)

    Director

    -

    Our Mission: The Cyber Security Institute will serve as a focal point of collaborations between the academia, the federal agencies, and the local governmental and business organizations in the greater Houston area. The UHCL-CSI has three primary missions: Research & Development, Education, and Services.

  • DeVry University

    Board Member

    -

    Advisory Board member for Computer & Information Science programs specializing in web expertise and Information Assurance related to e-Commerce.

Recommendations received

View Ross A.’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ross A. directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses