Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Thomas Brown Joins Berkeley Research Group

March 1, 2016

Berkeley Research Group announced the addition of five of the world’s foremost cyber security experts. Thomas Brown, who leads the group, has been named as BRG’s Global Leader of Cyber Security/Investigations, while Matthew Edman, Ph.D. and Christopher Tarbell will be directors. Ilhwan Yum and Thomas Kiernan join as associate directors.

Brown, a former federal prosecutor at the U.S. Attorney’s Office for the Southern District of New York, teamed with Tarbell, Edman, Yum and Kiernan—then with the FBI—on some of the most significant cyber investigations of the Internet era. The group spearheaded the investigation, arrest and prosecution of the operators of Silk Road, a notorious $1.2 billion underground drug website. They also investigated and prosecuted the leadership of the prolific “hacktivist” groups Anonymous and LulzSec. A movie based on the Silk Road case is currently in production by 21st Century Fox.

At the Southern District of New York, where Brown supervised the Complex Frauds and Cyber Crime Unit, he developed and led a range of cutting-edge and technologically complex investigations. They included the hacks of NASDAQ, Citibank and PNC Bank; Rove Digital, a massive botnet of more than four million computers; Liberty Reserve, an online digital currency used by criminals worldwide to launder over $6 billion in illegal proceeds; and Samarth Agrawal, who stole high-frequency trading code from Société Générale. Aside from his extensive cyber experience, Brown also led significant investigations and prosecutions of a wide variety of white collar offenses, including FCPA violations, tax fraud, economic espionage and theft of trade secrets, money laundering, securities fraud, bankruptcy fraud, identity theft, and criminal copyright theft, among others. He was also responsible for creating an innovative strategy to combat online piracy, which formed the basis for a continuing international intellectual property rights enforcement program by the Department of Homeland Security.

Brown told Security magazine:  "Even in an age of both an increased awareness of the cyber threat and spending on information security, companies still face major cyber risks. We see companies still vulnerable to attacks by insiders who take advantage of their privileged access within a secured system to steal or destroy data. Moreover, many high tech attacks start through low tech means: a simple phone call, for example, requesting a password or a social security number can be all that a hacker needs to breach the most carefully protected network and cause havoc and mayhem. Finally, we see the Internet of Things as presenting an increasing security challenge. Although digitally connecting devices may simply users’ lives, at the same time it may complicate their online security. Every connected device must be protected at all the times for the whole to be secure, while an attacker need only breach a single connected device just one time to gain access to multiple sources of user data."

After leaving government service, Brown, Tarbell, Edman, Yum and Kiernan joined the private sector at an international consulting firm, where for two years they advised private- and public-sector clients on cyber security management and investigations. The group also regularly consults with government agencies seeking their expertise on cyber security matters.

“Clients value our unique insight and proven track record, so BRG’s depth of talent and breadth of knowledge are exciting for us—they give us the opportunity to create synergies across various practice groups and capabilities,” said Brown. “Our strength lies in our experience—not only in critical cyber security issues and crises, but in working together—and we’re confident this will lead to top-notch results for our clients.”

Edman is a computer scientist who specializes in cyber security and investigations. He previously worked as a lead cyber security engineer for a federally funded research and development center, where he provided specialized computer network security research and development to federal law enforcement on a number of cases. He also worked as a senior vulnerability engineer for a global financial services, software and media company based in New York. He has been recognized within law enforcement and the U.S. intelligence community as a subject-matter expert on cyber investigations related to anonymous communication systems, such as Tor, and virtual currencies like Bitcoin.

Tarbell buttresses his vast law-enforcement experience with a master’s degree in computer science and information security. His work as part of the FBI’s preeminent cyber crime squad allowed him to develop deep working relationships with law enforcement partners around the world. Tarbell regularly teaches cyber investigative techniques to law enforcement officers and lectures to business and government groups on various cyber threats.

Yum is practiced in cyber-event response and analysis, and also regularly provides trial support and data analysis for high-profile cyber investigations for the U.S. government. As a special agent with the FBI, Yum led numerous investigations, including many involving botnets, attacks on financial infrastructure by Eastern European-based cyber criminals, and hacktivists.

Kiernan worked as a computer scientist for nearly 25 years at the FBI, where he supported numerous cyber crime, terrorism and national security investigations by analyzing electronic evidence and conducting extensive technical research. In recognition of his exceptional talent and experience, Kiernan has been a recipient of both the U.S. Attorney General’s Award and the FBI Director’s Award for Outstanding Cyber Investigation.
 

KEYWORDS: cyber attack cyber security enforcement Government Security security investigations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • thomas barkhuff

    Financial Industry Veteran Thomas Barkhuff Joins CLS as Chief Information Officer

    See More
  • Vivek Mohan

    Leading privacy lawyer Vivek Mohan joins Mayer Brown in Northern California

    See More
  • Lianne Kennedy-Boudali

    Lianne Kennedy-Boudali joins Control Risks' crisis & security consulting group as Principal

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products

Events

View AllSubmit An Event
  • May 22, 2012

    Teleconference: Business Continuity Best Practices Group

    Join this collection of security practitioners and become part of the next generation of business continuity and crisis management program development.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing