About
Jeff solves complex information, technology, risk, and innovation management challenges…
Articles by Jeff
Activity
-
Excited to be back on campus where I just met up with one of my favorite mentors, Robert E. Siegel. His expertise in Entrepreneurship, Leadership…
Excited to be back on campus where I just met up with one of my favorite mentors, Robert E. Siegel. His expertise in Entrepreneurship, Leadership…
Liked by Jeff K.
-
Truly honored to be recognized. Thank you to Cyber Defense Magazine and most importantly to the amazing Information Security Team at Stanford…
Truly honored to be recognized. Thank you to Cyber Defense Magazine and most importantly to the amazing Information Security Team at Stanford…
Liked by Jeff K.
-
I am looking forward to moderating this session on Cyber Resilience next week at the San Francisco Gartner CISO Community Executive Summit. I hope to…
I am looking forward to moderating this session on Cyber Resilience next week at the San Francisco Gartner CISO Community Executive Summit. I hope to…
Liked by Jeff K.
Experience
Education
Licenses & Certifications
Volunteer Experience
-
Design_CODE_Build "Rock Star" presenter to middle school kids
Computer History Museum
- Present 10 years 4 months
Education
-
Judge and Mentor
Empathy Hackathon
- Present 4 years 2 months
Civil Rights and Social Action
I serve as a mentor and judge with the Second Chances and Empathy Hackathon, sponsored by the Paper Prisons Initiative (www.paperprisons.org), which seeks to solve not only technical problems of social justice organizations working to help people reenter society successfully but also, through empathy and proximity, break down social silos through direct contact with and increased exposure to the issues facing systems impacted people. Previous solutions range from a tool for helping people…
I serve as a mentor and judge with the Second Chances and Empathy Hackathon, sponsored by the Paper Prisons Initiative (www.paperprisons.org), which seeks to solve not only technical problems of social justice organizations working to help people reenter society successfully but also, through empathy and proximity, break down social silos through direct contact with and increased exposure to the issues facing systems impacted people. Previous solutions range from a tool for helping people obtain an ID tool after leaving prison to a website redesign of the National Justice Impacted Bar Association to videos about sentencing reform for educating lawmakers; this year, in addition to our reentry focus and focus on racial justice in the criminal justice system, we're also partnering with a humanitarian Afghan refugee project.
-
Producer
Cinequest
- Present 6 years 10 months
Arts and Culture
As a speaker and moderator, my role is to elevate the typical Q&A experience and get artists talking about their passions, lives, and the people/places/moments that inspire them. I create memorable and entertaining experiences for audiences and artists with interesting and thought provoking questions.
As a producer, my role is to empower Cinequest to continue as a pioneer in innovation (we hosted the first-ever online film festival in 2005-2007), and deliver brilliant, transformative…As a speaker and moderator, my role is to elevate the typical Q&A experience and get artists talking about their passions, lives, and the people/places/moments that inspire them. I create memorable and entertaining experiences for audiences and artists with interesting and thought provoking questions.
As a producer, my role is to empower Cinequest to continue as a pioneer in innovation (we hosted the first-ever online film festival in 2005-2007), and deliver brilliant, transformative experiences for our communities.
Broadly, Cinequest fuses innovation with the arts to empower great creations and to connect audiences, youth, artists, and innovators with these creations and with each other—forging community, joy, and our future. Set in Silicon Valley, Cinequest’s uniqueness, impact, and legacy result from applying this powerful integration of creativity, technology, and community to inspire and transform lives. Cinequest does this through the Cinequest Film & Creativity Festival, Mavericks Studio, and Picture The Possibilities youth services.
Publications
-
Mobile Medicine Overcoming People, Culture, and Governance
Productivity Press / Routledge (Taylor & Francis)
An actionable and practical resource to accelerate mobile computing in medicine.
No topic in healthcare technology is more urgent yet more elusive to date than mobile computing in medicine. It adheres to no boundaries, stagnates in silos, and demands not just the attention of dedicated professionals, but also teams of teams.
A rich resource, this book shares hard won lessons and primary research for better understanding, management and execution of key mobile computing initiatives…An actionable and practical resource to accelerate mobile computing in medicine.
No topic in healthcare technology is more urgent yet more elusive to date than mobile computing in medicine. It adheres to no boundaries, stagnates in silos, and demands not just the attention of dedicated professionals, but also teams of teams.
A rich resource, this book shares hard won lessons and primary research for better understanding, management and execution of key mobile computing initiatives in medicine [that can save patient lives by reducing delays in medical information].
It provides an action planning reference guide for mobile medicine stakeholders, including health system and insurance decision makers, clinicians, and investors.
Foundational and groundbreaking in its knowledge set and combination, it also provides a unique and rare perspective, drawing from 27 distinct experts across disciplines from legal to medicine, informatics, organizational psychology, cybersecurity to engineering -- the building blocks needed to catalyze a comprehensive mobile medicine strategy for your health system or investment thesis.
Considering we lose a family member, colleague, or someone else every nine minutes due to a delay in medical information, according to the Institute for Healthcare Improvement, this book makes significant strides in efficiently conveying foundational knowledge that can contribute to implementing mobile computing safely and cost-effectively while improving clinician and patient experiences in healthcare. These insights will accelerate the reader’s ability to conceptualize the real opportunities via mobile computing in medicine.Other authorsSee publication -
California Cybersecurity Workforce Development and Education Strategy (2020-2030): Framework and Recommendations for a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP)
California Governor’s Office of Emergency Services (Cal OES) | California Cybersecurity Task Force
Well-prepared cybersecurity professionals are essential given the dynamic change in scope and breadth of threats and vectors in today’s cybersecurity environment. Thus, we seek a framework to design, develop, and implement a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP) to prepare 50,000 statewide entry-level cybersecurity
professionals from 2020-2030 and reduce current/future state workforce capability skills/gaps. In order to maximize efficiency and…Well-prepared cybersecurity professionals are essential given the dynamic change in scope and breadth of threats and vectors in today’s cybersecurity environment. Thus, we seek a framework to design, develop, and implement a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP) to prepare 50,000 statewide entry-level cybersecurity
professionals from 2020-2030 and reduce current/future state workforce capability skills/gaps. In order to maximize efficiency and availability of workforce development and education/training programs (and meet diverse key stakeholder needs), we seek innovative ways to balance rigorous
academic and professional needs in cybersecurity programs and achieve enhanced student access to quality, cost-efficient, and available cyber-security programs statewide.
This report provides 15 recommendations for a blueprint and template to design, develop, and implement the CCCEPPP and additional educational institution toolkits to enhance statewide cybersecurity workforce development and education capabilities.
The California Cybersecurity Workforce Development and Education Strategy
facilitates and coordinates a statewide pipeline/pathway at all levels of education (K-12, Associates, Bachelors, Graduate, and Professional Certification/Training).Other authorsSee publication -
Selected Solutions of Law, Business and Technologies Preventing Crimes
Institute of Justice Publishing House, Warsaw
Overview of crime-related issues present in the financial, insurance, and energy sectors, and in the field of human resources management. This report focuses on factors in technological development, innovations, and the influence of the operating environments which facilitate criminal behavior. Information is included on various safeguards and cutting edge detection methods by means of behavioral analysis, big data analysis, artificial intelligence, and other machine learning methods.
Other authorsSee publication -
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
McGraw-Hill
The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book provides an overview of attack and breach types, strategies for assessing an organization, types of plans, and case examples. Tips for keeping data contained, reputations defended, and recognizing and handling the magnitude of any given threat are included.
Other authors -
-
Eight Ways to Secure VoIP
Security Technology Executive Magazine (Cygnus Publishing)
See publicationVoice over IP telephony systems can be vulnerable to multiple network-based attacks. Here are eight approaches that enterprises can leverage to mitigate vulnerability and transform VoIP security.
-
Creating Organizational Digital Forensic Investigation Capabilities
Silicon Valley (ISACA) Information Systems Audit and Control Association
See publicationTo measure the potential success of any investigation, consider an organization's internal investigative capabilities.
This 15 minute clip from Jeff's expert panel presentation outlines key points to consider in establishing and enhancing an organization's internal capacity to perform digital forensics, internal investigations, and incident reponse. -
Information Security: A Legal, Business, and Technical Handbook
American Bar Association
The handbook will give clear and comprehensive guidance to anyone who wants a basic understanding of information security threats and the legal issues related to them.
Other authorsSee publication
Patents
-
Multimodal help agent for network administrator
Issued US 10,050,868
See patentNetwork management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management technology interprets human user interactions, such as gestures, conversational natural language dialog, and combinations of gestures and natural language dialog, as network directives. The technology can implement the network directives to, for example, facilitate analysis of network activity or to respond to…
Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management technology interprets human user interactions, such as gestures, conversational natural language dialog, and combinations of gestures and natural language dialog, as network directives. The technology can implement the network directives to, for example, facilitate analysis of network activity or to respond to network security events.
-
NATURAL LANGUAGE DIALOG-BASED SECURITY HELP AGENT FOR NETWORK ADMINISTRATOR
Filed US 20160219048
-
IMPACT ANALYZER FOR A COMPUTER NETWORK
Filed US 20160218933
Network management technology performs an impact analysis of actual or hypothetical network commands, and presents the impact analysis results to facilitate the user's understanding of the predicted consequences of the actual or hypothetical commands on network operations, management, or security.
Recommendations received
27 people have recommended Jeff
Join now to viewMore activity by Jeff
-
To my founder friends: I’m working with the Washington Post to launch the WP Incubator - a new program backing founders who are building what’s next…
To my founder friends: I’m working with the Washington Post to launch the WP Incubator - a new program backing founders who are building what’s next…
Liked by Jeff K.
-
Thank you, Lauren A. for having me on a panel at the Women in Cyber Security "Command and Control" event. I loved the Laughing Yoga led by Poonam…
Thank you, Lauren A. for having me on a panel at the Women in Cyber Security "Command and Control" event. I loved the Laughing Yoga led by Poonam…
Liked by Jeff K.
-
I'm pleased to be part of the advisory board for the Institute for Digital Innovation at George Mason Univ. Seeking an associate director to support…
I'm pleased to be part of the advisory board for the Institute for Digital Innovation at George Mason Univ. Seeking an associate director to support…
Liked by Jeff K.
-
I extend my sincere gratitude to the CDM team and esteemed colleagues for this exceptional recognition. This award is a testament to the exceptional…
I extend my sincere gratitude to the CDM team and esteemed colleagues for this exceptional recognition. This award is a testament to the exceptional…
Liked by Jeff K.
-
Excited to join the Founder Mode panel today at the HUMAN + HUMANOID event at Seattle AI Week, hosted by Peter Chee and joined by Darian Parrish…
Excited to join the Founder Mode panel today at the HUMAN + HUMANOID event at Seattle AI Week, hosted by Peter Chee and joined by Darian Parrish…
Liked by Jeff K.
-
Aloha everyone. A little over two months ago, I was diagnosed with colon cancer. Went through surgery last month and recovery and now... back in the…
Aloha everyone. A little over two months ago, I was diagnosed with colon cancer. Went through surgery last month and recovery and now... back in the…
Liked by Jeff K.
-
I’m excited to share that I'm now a part of the JanoLife team! Our mission is to radically change the future of women’s health by empowering women…
I’m excited to share that I'm now a part of the JanoLife team! Our mission is to radically change the future of women’s health by empowering women…
Liked by Jeff K.
-
I am quoted in this KQED article: https://lnkd.in/gK6MYKdm #ethics #internet #law #AI #chatbots #business #contentmoderation
I am quoted in this KQED article: https://lnkd.in/gK6MYKdm #ethics #internet #law #AI #chatbots #business #contentmoderation
Liked by Jeff K.
-
California's chief privacy regulator says residents of the Golden State soon will have access to a "game-changing" platform that will allow them to…
California's chief privacy regulator says residents of the Golden State soon will have access to a "game-changing" platform that will allow them to…
Liked by Jeff K.
-
Today marks my first day at RBC, where I have joined as Chief Security Officer. After years leading cybersecurity, data, and technology resilience…
Today marks my first day at RBC, where I have joined as Chief Security Officer. After years leading cybersecurity, data, and technology resilience…
Liked by Jeff K.
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Jeff K.
-
Jeff Boston
Jeff is well known for taking on, and hands-on leading companies through the toughest business challenges...while serving as CXO and/or Board Director.
-
Jeff K
COO Canadian National Pharma Group
-
Jeff K.
-
Jeff K
CFO at USC
-
Jeff K.
Lead Embedded Hardware Engineer @ U.S. Army DEVCOM Army Research Laboratory
507 others named Jeff K. are on LinkedIn
See others named Jeff K.