About
Transformative Go-to-Market Executive with a proven track record of driving exponential…
Articles by Brian
Activity
-
Join me! In just 2 weeks I'll be taking part in a virtual panel discussion about Security and Posture Management in the cloud, sharing the stage with…
Join me! In just 2 weeks I'll be taking part in a virtual panel discussion about Security and Posture Management in the cloud, sharing the stage with…
Liked by Brian Laing
-
Let’s shift the narrative. It’s always 'how neurodivergent people can adapt.' “Tips for managing sensory overload.” “Strategies for improving…
Let’s shift the narrative. It’s always 'how neurodivergent people can adapt.' “Tips for managing sensory overload.” “Strategies for improving…
Liked by Brian Laing
Experience
Licenses & Certifications
Patents
-
Methods and apparatus for prioritization of remediation techniques for network security risks
Issued US 8,132,260
A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location, determining a vulnerability security risk for the server location, determining remediation actions including a first action and a second action in response to the vulnerability, determining updated security risks associated with the server location including an first updated security risk for a first action and a second updated security risk for,…
A method for a computer system includes receiving a topology of a network including a server location and a threat server at a threat server location, determining a vulnerability security risk for the server location, determining remediation actions including a first action and a second action in response to the vulnerability, determining updated security risks associated with the server location including an first updated security risk for a first action and a second updated security risk for, and displaying a prioritized list of remediation actions on the display, wherein the first remediation action is prioritized over the second remediation action when the first updated security risk value with respect to the security risk value shows a greater improvement in risk than the second updated security risk value with respect to the security risk value.
-
Network security visualization methods, apparatus and graphical user interfaces
Issued US 7,890,869
A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric…
A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric associated with the servers, and wherein an appearance of the shapes are determined in response to a second security metric from the plurality of security metrics associated with the servers.
-
Methods and apparatus for determining network risk based upon incomplete network configuration data
Issued US 8307444
A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a…
A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a security exposure of the first server location with respect to the threat server in response to the configuration data, the topology, and to the configuration data associated the host server location, determining a vulnerability certainty for the first server location with respect the vulnerability in response to the configuration data associated the host server location, and outputting a visual representation of the security exposure and the vulnerability certainty on a display
-
Adaptive risk analysis methods and apparatus
Issued US 8321944
A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host…
A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.
Projects
Recommendations received
18 people have recommended Brian
Join now to viewMore activity by Brian
-
Excited to be gearing up for RSA in San Francisco! Looking forward to exploring the expo floor, and most importantly, reconnecting with industry…
Excited to be gearing up for RSA in San Francisco! Looking forward to exploring the expo floor, and most importantly, reconnecting with industry…
Posted by Brian Laing
-
Stop evil before it stops you! RedSeal is bringing proactive threat exposure management to #RSA2025, and we’re going to show you how to outsmart…
Stop evil before it stops you! RedSeal is bringing proactive threat exposure management to #RSA2025, and we’re going to show you how to outsmart…
Liked by Brian Laing
-
What if the solution wasn’t another firewall but human resilience? Cybersecurity isn’t just a tech issue, it’s a human issue. And the cost is…
What if the solution wasn’t another firewall but human resilience? Cybersecurity isn’t just a tech issue, it’s a human issue. And the cost is…
Liked by Brian Laing
-
Great team!!! Let’s collect the best research!
Great team!!! Let’s collect the best research!
Shared by Brian Laing
-
🚨 Cyber pros, we need YOU! 🚨 Alongside Jasmine Eskenzi and the brilliant Holly Foxcroft, we’re kicking off research into stress and cyber to…
🚨 Cyber pros, we need YOU! 🚨 Alongside Jasmine Eskenzi and the brilliant Holly Foxcroft, we’re kicking off research into stress and cyber to…
Liked by Brian Laing
-
Supporting mental health and cyber resilience through wellbeing has been a talking point for me for a while… so this announcement is EXTRA special ✨…
Supporting mental health and cyber resilience through wellbeing has been a talking point for me for a while… so this announcement is EXTRA special ✨…
Liked by Brian Laing
-
Heading to #RSA25 in a few weeks? Meet 1:1 with Orca Security's executives in a quiet spot steps from the crowds at the Moscone Center. Check out the…
Heading to #RSA25 in a few weeks? Meet 1:1 with Orca Security's executives in a quiet spot steps from the crowds at the Moscone Center. Check out the…
Liked by Brian Laing
-
The cyber security industry spoke, and we listened... Behind the scenes, my sister Jade and I have been working hard to address how shifting our…
The cyber security industry spoke, and we listened... Behind the scenes, my sister Jade and I have been working hard to address how shifting our…
Liked by Brian Laing
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Brian Laing in United States
32 others named Brian Laing in United States are on LinkedIn
See others named Brian Laing