Skip to Main Content

Rockie Brockway

EXPERIENCE

Drawing on more than 30 years of experience as an InfoSec and risk practitioner and trusted advisor, Rockie Brockway performs Chief Information Security Officer (CISO) activities for a multitude of mid-sized to global enterprise organizations, focusing on:

  • Program maturity and development
  • Measuring organizational effectiveness
  • Business risk (likelihood and financial impact)

Rockie is a trusted third-party security advisor who specializes in effectively communicating IT, security, and enterprise risks to leadership and aligning the protection of business-critical data with business needs and requirements to ensure brand protection and continued innovation.

EDUCATION & CERTIFICATIONS

Case Western Reserve University, Bachelor of Arts, Computer Science

PROFESSIONAL AFFILIATIONS

  • President, Secure Cleveland
  • Governing Board Cleveland CISO Executive Summit
  • BSides Cleveland Conference Organizer (2014-2022)
  • InfraGard member (since 1998)
  • SANS GIAC Security Essentials (GSEC) Mentor (taught 3 times)
  • Cisco Partner Technology Advisory Board, Security

INDUSTRY CONTRIBUTIONS

Security Conference Speaker at DerbyCon, GrrCON, CircleCityCon, RVAsec, Converge Detroit, ShowMeCon, Information Security Summit, BSides Boston/Rochester/Cleveland/Detroit/Flood City and Ohio ETech.

PASSION FOR SECURITY

Even before his first computer at the age of 12 (Apple II+), Rockie has been fascinated by and drawn toward figuring out how things work and if they can be made to do unexpected things. Early exposure to a computer quickly led to changing settings on games with sector editors and programming rudimentary programs in BASIC.

While attending Case Western Reserve University to study Computer Science, Rockie was lucky enough to be introduced to Dr. Peter Tippett and interned at his company Certus International in 1992. Certus was one of the first anti-virus companies (later sold to Norton), and once Rockie was exposed to the underground BBS world of computer virus sharing, reverse engineering, and assembly code, there was no turning back.

Rockie's network, systems, and scripting basics were honed in the 1990s when he became the first employee of one of Ohio’s first ISPs. In 2000, Rockie started his own security consulting company where he cultivated higher-level skills of penetration testing, incident response, and forensics while owning and running a business.

Today, Rockie's focus is on helping organizations strengthen their security posture by better aligning security with business needs and requirements. This process ultimately leads to challenging questions: Why is security so hard? Why does the business look at security as an obstacle rather than an enabler? How does this relate to basic human nature?

Risk became an obsession and led to a better understanding of the ties to group theory, natural systems, decentralization, and adaptation. For more than a decade, Rockie has been working out these and other theories and applying them in real-world enterprises as a strategic and tactical advisor. He believes weaving these theories into security programs provides the most value when looking at larger strategic business outcomes.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog November 07 2023

The Triforce of Initial Access

LootWhile Red Teamers love to discuss and almost poetically describe their C2 feature sets, EDR evasion capabilities, and fast weaponizing of N-day exploits,…

Read about this article
Blog November 02 2023

JS-Tap: Weaponizing JavaScript for Red Teams

How do you use malicious JavaScript to attack an application you know nothing about?Application penetration testers often create custom weaponized JavaScript…

Read about this article
Blog October 17 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 3)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this third and final…

Read about this article
Blog October 12 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 2)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionThis is a continuation of A…

Read about this article
Blog October 11 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1B)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this continuation to our first…

Read about this article
Blog October 10 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIf you were to collectively ask any…

Read about this article
Blog September 21 2023

Basic Authentication Versus CSRF

I was recently involved in an engagement where access was controlled by Basic Authentication. One (1) of the findings I discovered was a Cross-Site Request…

Read about this article
Blog September 18 2023

Okta for Red Teamers

For a long time, Red Teamers have been preaching the mantra “Don’t make Domain Admin the goal of the assessment” and it appears that customers are listening.…

Read about this article
Blog September 05 2023

Creative Process Enumeration

Very often in engagements, you'll want to list out processes running on a host. One thing that is beneficial is to know is if the processes is a 64-bit or…

Read about this article
Blog August 31 2023

Crafting Emails with HTML Injection

Have you ever wanted to send an email from a domain you don’t have SMTP credentials for? With some HTML injection, we may be able to do just that. From time to…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.