Stephen Brewster is a graduate of Capitol Technology University with a Masters in Information Assurance Engineering. Stephen has expertise in software assurance, systems integration and testing, and cybersecurity governance and risk management. Mr. Brewster developed software for military logistics planning shortly after finishing his bachelors in Computer Science. He was instrumental in leading Unmanned Systems contractor organizations through the integration of software assurance tools, standards, and processes. Mr. Brewster later provided his expertise, as the cybersecurity manager of the federal division of a leading provider of facility related control systems (FRCS). He has presented on the topic of risk management framework of FRCS around the world in support of the Army Corps of Engineers, NAVY, AIRFORCE and ARMY. Mr. Brewster holds the following industry certifications: ISC2 CISSP, ISACA CISM & CISA, SANS GICSP, and CompTIA Security Plus.
Podcasts / Webinars
Historically, an organization developed a Cybersecurity program to achieve compliance. It has been our experience, organizations which achieve full compliance cannot continue to operate because of strict Compliance requirements and the lack of a functional Cybersecurity program. The lack of…
In part one of the RMF Categorization podcast series, the SMEs discuss what a security program is and why it is important. A security program defines the people, processes and technologies used to manage cybersecurity risk to the environment in which your system operates. This document serves as the blueprint for how your system operates and responds to the ever changing threat landscape.
In part two of the RMF Categorization podcast series, the SMEs discuss the process of accurately identifying information types. The identification of the information types establishes the foundation for the system security program. The information types serve as the baseline by which the mission owner as well as the adversary both measure success. Information types allow the system owner to respond to cybersecurity risks by utilizing specified security requirements.
In part three of the RMF Categorization podcast series, the SMEs discuss the process of aligning the security objectives. The security objectives provide a common understanding of the impact levels on the information types as well as a common viewpoint of a system compromise and its organizational impact. The security objectives allow the system owner to identify security requirements in order to mitigate and reduce risks to the system.
In part four of the RMF Categorization podcast series, the SMEs discuss the various roles and responsibilities as well as the operating environment. Any individual that interacts with a system has a certain role or responsibility in the implementation of the system security program. These roles and responsibilities are propagated across three tiers: 1) the organization, 2) mission/business processes and 3) information systems. The operating environment consists of the system authorization boundary as well as all external entities interacting with the system information types. The operating environment should result in a specific implementation of prescribed security requirements and provide a measurement of a security program’s effectiveness.