Career Transition Services Director at Red Rock Job Corps
Location:
Philadelphia, Pennsylvania
Industry:
Professional Training & Coaching
Work:
Red Rock Job Corps - Greater Philadelphia Area since Dec 2012
Career Transition Services Director
Shriver Job Corps Oct 2010 - Dec 2012
Outreach and Admissions / Career Transition Services Director
Shriver Job Corps Nov 2009 - Oct 2010
Career Transition Readiness Instructor
More Than Words Feb 2008 - Oct 2009
Transitions Manager
Straight Ahead Ministries Feb 2007 - Oct 2007
Program Director
Education:
Gordon College 1998 - 2002
BA, Youth Ministries
Skills:
Public Speaking Community Outreach Program Development Youth Development Leadership Project Management Higher Education
Us Patents
Methods And Systems For Accurately Assessing Application Access Risk
- Los Altos CA, US Marc Woolward - Bude, GB Hsi-Sheng Wang - Taipei, TW Keith Stewart - San Francisco CA, US Jason Parry - San Francisco CA, US
International Classification:
H04L 29/06 G06F 16/901 G06F 16/23
Abstract:
Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
- Mountain View CA, US Keith Stewart - San Francisco CA, US Timothy Eades - Redwood City CA, US Meng Xu - Los Altos CA, US Myo Zarny - Bayside Hills NY, US Matthew M. Williamson - Marblehead MA, US Jason Parry - San Francisco CA, US Hong Xiao - San Jose CA, US Hsisheng Wang - Fremont CA, US Cheng-Lin Hou - San Jose CA, US
International Classification:
H04L 12/24 G06F 16/17 G06F 16/901 G06F 16/906
Abstract:
Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.