0%

Science

In my view, technology is best served up with a heaping side of science.  This is especially true when it comes to computer security where a distinct absence of science is a problem.

I began my career at Reliable Software Technologies (Cigital) in 1995 as a research scientist, and the early days of Cigital Labs are still close to my heart.  I spent most of my 21 years at Cigital helping run things and advising other businesses on technology issues.  Though I remain active in the computer science research community and interact closely with academics all over the world, I am best known as an active technologist in the corporate world.   Cigital was acquired by Synopsys in 2016.

My approach during graduate school at Indiana University way back in the day was to master a subject by publishing a set of peer reviewed articles. Neural networks, genetic algorithms, case-based reasoning, robotics, and Doug Hofstadter’s models were all important targets.  When I first started working in computer security I did the same publishing thing.  But the world has changed since then, and so have I.

I continue to believe that giving back to academia is essential. I try to deliver a handful of academic talks at various schools every year, with periodic stops at: University of Maryland, Indiana University, Johns Hopkins, North Carolina State University, James Madison University, Purdue, Waterloo, Stanford, and other schools.  If I am on the road for business reasons, I try to seek out a great nearby school to visit.

I have acted as an official Advisor to the Computer Science Department at UC Davis and the Computer Science Department at the University of Virginia (where we created a BA in the College of Arts and Sciences). I continue to serve on the Dean’s Advisory Council of the School of Informatics at Indiana University.  In 2013 I was awarded a Career Achievement Award from Indiana.

Back in 1999, I was asked to chair the Infosec Research Council’s study on Malicious Code. The result of that collaborative effort was a paper published in IEEE Software called Attacking Malicious Code: A Report to the Infosec Research Council. In 2009, that paper was chosen as one of IEEE Software’s 25th-Aniversary Top Picks, meaning it was one of 35 recommended papers selected from a pool of over 1200.

In 2005, I was elected to a three year term on the Board of Governors of the IEEE Computer Society.

BSIMM 133x75In 2009, we released the first iteration of the Building Security In Maturity Model (BSIMM).  The BSIMM project soon escaped the test tube and is quickly becoming a de facto standard for measuring software security. BSIMM8 was built built directly out of data observed in 109 software security initiatives, from firms including: Adobe, Aetna, Amgen, ANDA, Autodesk, Axway, Bank of America, Betfair, BMO Financial Group, Black Knight Financial Services, Box, Canadian Imperial Bank of Commerce, Capital One, City National Bank, Cisco, Citigroup, Citizen’s Bank, Comerica Bank, Cryptography Research (a division of Rambus), Dell EMC, Depository Trust & Clearing Corporation, Elavon, Ellucian, Epsilon, Experian, F-Secure, Fannie Mae, Fidelity, Freddie Mac, General Electric, Genetec, Highmark Health Solutions, Horizon Healthcare Services, Inc., HPE Fortify, HSBC, Independent Health, iPipeline, JPMorgan Chase & Co., Lenovo, LGE, LinkedIn, McKesson, Medtronic, Morningstar, Navient, NetApp, NVIDIA, NXP Semiconductors, Oracle, NSGBU, PayPal, Principal Financial Group, Qualcomm, Royal Bank of Canada, Scientific Games, Siemens, Sony Mobile, Splunk, Symantec, Synopsys SIG, Target, TD Ameritrade, The Advisory Board, The Home Depot, The Vanguard Group, Trainline, Trane, U.S. Bank, Veritas, Verizon, Wells Fargo, Zendesk, and Zephyr Health. Download a copy of the BSIMM for yourself and use it under the Creative Commons license.

ieee-csd-smallIn 2014 I helped to found the IEEE Center for Secure Design through the IEEE Computer Society.  The first IEEE CSD report (which was the first IEEE publication ever to be released under the Creative Commons) is called Avoiding the Top Ten Software Security Design Flaws.

 After two years of study, the CISO Report was publicly released in January 2018. The report describeds data gathered in a series of extended in-person interviews with 25 CISOs. The firms we chose to study include ADP, Aetna, Allergan, Bank of America, Cisco, Citizens Bank, Eli Lilly, Facebook, Fannie Mae, Goldman Sachs, HSBC, Human Longevity, JPMorgan Chase, LifeLock, Morningstar, Starbucks, and U.S. Bank. Collectively, our population represents just under 150 years of experience in the CISO role.  This is joint work with Sammy Migues and Brian Chess.

The report is available from the Synopsys website.  (Also here.)

Peer Reviewed Publications

My curriculum vita (PDF) includes a complete list of publications and a partial list of important lectures.

A collection/archive of early peer reviewed articles written while at Cigital Labs (1996-2011).

These days, I spend more of my time writing popular technology columns than I do writing scientific publications.  My popular press writings have been collected elsewhere.

Pre-1996 papers are available in an out-of-date publications archive, where you can find abstracts and links to postscript files.

My completed thesis devoted to creativity and AI is available on my thesis page. Please feel free to send me questions and/or comments about what you see.

without
https://www.garymcgraw.com/wp-content/themes/yunik/
https://www.garymcgraw.com/
#EDB44D
style4
default
Loading posts...
#555555
on
none
loading
#555555
Sort Gallery
https://www.garymcgraw.com/wp-content/themes/yunik
on
yes
yes
off
off
off
off