From the Fall 2015 Issue

Navigating the Cybersecurity Workforce Development Landscape

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The increasing need for advancements in cybersecurity creates new business opportunities, impacts the way mature organizations operate, and changes the way individuals conduct their personal and professional lives. These conditions create tremendous opportunities for organizations and jobseekers alike. However, due to the nature of the cybersecurity workforce landscape, jobseekers often have a difficult time understanding … Read more

From the Fall 2015 Issue

INSPIRING OUR FUTURE STEM WORKFORCE

Author(s):

Clark ‘Corky’ Graham, Ph.D., Founder & CEO, LET’S GO Boys & Girls, Inc.

THE STRUGGLE OF SUPPLY & DEMAND WITHIN THE STEM WORKFORCE In 2013, President Obama drew attention to the growing importance of science, technology, engineering, and mathematics (STEM) careers in our country. In the President’s five-year strategic plan for STEM education, the National Science & Technology Office recognized the increasingly important role that STEM plays in … Read more

From the Fall 2015 Issue

Why Education in the Law and Policy of Cybersecurity Is a Must

Author(s):

Markus Rauschecker, J.D., Cybersecurity Program Manager, University of Maryland Center for Health and Homeland Security

Cybersecurity is no longer within the sole purview of information technologists –its increased prominence has made it an interdisciplinary problem. Solutionsrequire involvement from many stakeholders. Organizational leaders, includingCEOs, financial and privacy officers, lawyers, human resources specialists,policymakers, and many others in both the public and private sectors, mustall have a basic understanding of cybersecurity issues if … Read more

From the Fall 2015 Issue

SPECIALIZED TALENT: National Cyber Analyst Challenge Focuses on Recruiting University Students

Author(s):

Chris Kearns, Vice President of Enterprise IT Solutions, Lockheed Martin

Identifying, hiring and retaining cyber specialists is becoming increasingly competitive in today’s marketplace. Corporations, government, and other organizations are actively seeking skilled information technologists with cybersecurity specialties such as intelligence analysis and identification, forensics, and fusion. In fact, more than 26,980 cybersecurity-related positions were open in April 2015 on the popular job-seeking website SimplyHired.com. Those … Read more

From the Fall 2015 Issue

MARYLAND’S CYBER DNA

Author(s):

Tom Sadowski, President & CEO, Economic Alliance of Greater Baltimore

The Greater Baltimore region of Maryland has become one of the most densely concentrated cybersecurity markets in the world. There are more than 211,000 skilled professionals employed in this market, developing the latest in cyber-related technology and innovative commercial products.1 With nearly 20,000 cybersecurity jobs available, Baltimore comes in just slightly behind Palo Alto and … Read more

From the Fall 2015 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,   We are pleased to announce that the publication of the Fall 2015 issue of the United States Cybersecurity Magazine marks our third anniversary. Just as it did when we started publishing the Magazine, our release coincides with National Cybersecurity Awareness Month. While much has changed in the cybersecurity field and in the pages … Read more

From the Summer 2015 Issue

Playing Both Sides of the Field: An Offensive and Defensive Approach to Cybersecurity

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, CEO, U.S., CyberCX

In our mobile and ever-changing cyber world, traditional static security solutions are simply not enough to defend against the complex, multi-dimensional threats to digital security. While securing network borders is unquestionably key in maintaining a protected system, all too often organizations ignore the serious threat insiders pose to cybersecurity. Through negligent or malicious means, insiders … Read more

From the Summer 2015 Issue

Strategizing for Data Breach Risk Management

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

Organizations are struggling to handle data breaches, as their frequency in the news indicates. According to the Ponemon Institute and IBM’s 2014 report on corporate data loss prevention, the average cost of a data breach to a company was $3.5 million – 15 percent more than what it cost in 2013.1  It is evident from the … Read more

From the Summer 2015 Issue

Get Tested: Penetration Testing as an Integral Part of Your Company’s Cybersecurity Plan

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Cybersecurity is now more than ever a business requirement in every industry.  The 2015 Verizon Data Breach Report estimates 700 million compromised records in all of 2014.1  Worse yet, that number only represents known/reported breaches. A survey of attendees at the 2008 RSA Conference indicated that 89% of breaches they were aware of went unreported.2 If … Read more