Peter Guerra

Washington, District of Columbia, United States
4K followers 500+ connections

Join to view profile

Activity

Join now to see all activity

Experience & Education

  • National Defense University

View Peter’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Coach

    First Lego League

    - 2 years 1 month

    Education

    Introduces younger students to real-world engineering challenges by building LEGO-based robots to complete tasks on a thematic playing surface. FLL teams, guided by their imaginations and adult coaches, discover exciting career possibilities and, through the process, learn to make positive contributions to society.

  • Amazon Web Services (AWS) Graphic

    Disaster Response Team

    Amazon Web Services (AWS)

    - 1 year 2 months

    Disaster and Humanitarian Relief

    Member of the AWS Disaster Response team that donates skills and AWS services for natural disasters around the world.

  • Information Technology Disaster Resource Center (ITDRC) Graphic

    Volunteer

    Information Technology Disaster Resource Center (ITDRC)

    - Present 4 years 4 months

    Disaster and Humanitarian Relief

    Disaster and humanitarian support

Publications

  • Network security using artificial intelligence and high speed computing

    US PTO

    Patent on Network security using artificial intelligence and high speed computing

    See publication
  • Modernizing Cyber Operations with Machine Intelligence

    O'Reilly

    The bad guys have gained a significant advantage in today’s never-ending cyber war. Creative, fast, and opportunistic adversaries have created an ecosystem of advanced persistent threats that is growing in scale and complexity, and evolving too rapidly for most organizations’ cybersecurity capabilities to respond. To keep pace with these threats, organizations must modernize their security operations by incorporating machine intelligence (MI). Ebook that details examples and approach.

    See publication
  • Ten Signs of Data Science Maturity

    O'Reilly

    How well prepared is your organization to innovate, using data science? In this report, two leading data scientists at the consulting firm Booz Allen Hamilton describe ten characteristics of a mature data science capability. After spending years helping clients such as the US government and commercial organizations worldwide build innovative data science capabilities, Peter Guerra and Dr. Kirk Borne identified these characteristics to help you measure your company’s competence in this area.

    Other authors
    See publication
  • Hadoop Summit 2014: Lessons Learned on How to Secure Petabytes of Data

    Hadoop Summit 2014

    Apache Hadoop systems are exploding in popularity and are being widely adopted by organizations to process enormous amount of data. What is often missing from these architectures is an understanding of the security implications and how to protect data at a granular level. Protection of the data requires a different paradigm for these types of architectures. This talk will discuss the security challenges with information storage and retrieval in Hadoop, outline a detailed security design pattern…

    Apache Hadoop systems are exploding in popularity and are being widely adopted by organizations to process enormous amount of data. What is often missing from these architectures is an understanding of the security implications and how to protect data at a granular level. Protection of the data requires a different paradigm for these types of architectures. This talk will discuss the security challenges with information storage and retrieval in Hadoop, outline a detailed security design pattern for combining Apache technologies to enable data protection, providence, and lineage, and give an overview of real world case studies where these patterns have been implemented.

    See publication
  • It’s 2014. Do you know where your data is?

    Gigaom

    As more and more businesses take advantage of the promise of big data, they’re also putting themselves at increased risk of a security breach. They can protect themselves and their data by centralizing it in one location.

    See publication
  • Security, Data, and the Future of Cyberspace

    Gigagom Structure Data Conference

    Exposing data isn’t just a compliance challenge — it can also be creepy. The solution is to tag data and control access, thereby allowing only partial visibility.

    See publication
  • Field Guide to Data Science

    Booz Allen Hamilton

    We created the Field Guide to Data Science to help organizations of all types and missions understand how to make use of data as a resource. The text spells out what Data Science is and why it matters to organizations as well as how to create Data Science teams. Along the way, our team of experts provides field-tested approaches, personal tips and tricks, and real-life case studies.

    See publication
  • Benchmarking Apache Accumulo Big Data Distributed Table Store Using Its Continuous Test Suite

    IEEE Big Data

    Benchmarking Apache Accumulo Big Data Distributed Table Store Using Its Continuous Test Suite

    See publication
  • Cloud Analytics Playbook

    Booz Allen Hamilton

    The Cloud Analytics Playbook details our thinking around Big Data and NoSQL architectures after working with numerous engagements with clients.

    See publication
  • How Economics and Information Security Affects Cyber Crime and What It Means in the Context of a Global Recession

    Black Hat 2009 Conference

    This turbo talk will explore the links between US law, international cybercrime, malware proliferation, and the economics of botnets. During this time, I will present research into the impact the current worldwide economic crisis has had on cybercrime and the impact on security professionals. I will also use economics to link cybercrime activity to emerging markets countries (Brazil, Russia, India, and China) and show research into how the CAN-SPAM act created economic incentives for an…

    This turbo talk will explore the links between US law, international cybercrime, malware proliferation, and the economics of botnets. During this time, I will present research into the impact the current worldwide economic crisis has had on cybercrime and the impact on security professionals. I will also use economics to link cybercrime activity to emerging markets countries (Brazil, Russia, India, and China) and show research into how the CAN-SPAM act created economic incentives for an increase in botnets, spam, malware, and phishing attacks.

    See publication

Organizations

  • ACM

    -

    - Present

    Member of ACM

Recommendations received

More activity by Peter

View Peter’s full profile

  • See who you know in common
  • Get introduced
  • Contact Peter directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Peter Guerra in United States

Add new skills with these courses