From the Summer 2015 Issue

Don’t Become Extinct: The Evolution of Information Security, Part Two

Author(s):

Will Janssen, Business Development Director, Signals Defense

In Part One of this series, the idea of the three waves of security was introduced, with the Physical Security 1st Wave having established the principles and ideas of security used in the next two Waves. The 2nd Wave is “Wired” IT Security, which is maturing with standards, technologies, and operational approaches and is being … Read more

From the Summer 2015 Issue

A Time for American Leadership in Cybersecurity

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Fellows of non-partisan think tank ICIT1 frequently get called upon to provide expert cybersecurity advice and analyses to congressional members and government leaders.  On the evening of April 30th, 2015, we participated in a fascinating discussion with Michael Echols, Director of the Cyber Joint Program Management Office.2 This discussion made one thing clear to me: … Read more

From the Summer 2015 Issue

How to Increase Your CEO and Board’s Cybersecurity Literacy

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Current State As 2015 unfolds, cybersecurity is the hot topic in boardrooms today. According to Forbes, 2014 was the year of the data breach, and we would be wise to brace for more in 2015.1 FireEye CEO Dave DeWalt stated, “The trend of massive data breaches are now the new norm as 97% of companies … Read more

From the Summer 2015 Issue

A CIRO’s-Eye View of Digital Risk Management

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

The 2015 RSA Conference made plenty of headlines.  One of the larger news items was the official unveiling of Optiv Security – the new brand name for recently merged resellers Accuvant and Fishnet. In the current merger and acquisition market, this one was huge. Optiv Security is now one of North America’s largest cybersecurity services … Read more

From the Summer 2015 Issue

SOME UNINTENDED CONSEQUENCES OF COLLABORATING

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Disclaimer: Nothing contained in this article is intended to be legal advice or to predict the outcome in any instance. As stated herein, the outcome in any instance depends greatly upon a) the laws of the applicable jurisdiction, and b) the particular facts involved. A tale of unintended consequences – one resulting in unexpected riches … Read more

From the Summer 2015 Issue

Improving Your Cybersecurity Posture with Enterprise Architecture

Author(s):

Didier M. Perdu, Ph.D., , LMI

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Roxanne Everetts, D.M., , National Defense University

Introduction  Managing risks to mission accomplishment is what cybersecurity is all about. Most everyone in a given organization can agree on this as a goal, but getting mission owners, information technology (IT) providers, and security personnel to come together on how it should be done is another matter. Mission owners focus on results: bombs on … Read more

From the Summer 2015 Issue

Colorado Springs: A Beautiful City for Cybersecurity

Author(s):

Dr. Patrick J. Laverty, Senior Cybersecurity Engineer, TASC, An Engility Company

Why Colorado Springs? Situated in some of the most picturesque land in our nation, the beautiful city of Colorado Springs is home to four major Department of Defense (DoD) installations. The units on these installations serve many diverse missions, including: Training our future Air Force leaders at the Air Force Academy Air Force Space Command … Read more

From the Summer 2015 Issue

BRIDGING THE CYBER TALENT GAP, IASCA

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Passionate about a Problem Montana Williams has been described before as a cyber-evangelist, and after only a few minutes of speaking to him it’s easy to see why. His passion for cybersecurity, technology, and workforce development has taken him from a pivotal role in our nation’s nascent stages of cyber-warfare and cybersecurity to becoming one … Read more

From the Summer 2015 Issue

Growing the Silver Bullet

Author(s):

Chris Cook, Associate Director, CyberTexas

If America is ever able to adequately address today’s modern cybersecurity threats, it will mean that someone has discovered the “silver bullet” or, more realistically, that we’ve grown the workforce needed to successfully address the problem of a critical shortage of trained cybersecurity professionals.  San Antonio’s educational, governmental, and industrial institutions have taken a comprehensive … Read more

From the Summer 2015 Issue

Looking under the Hood of Cybersecurity Education

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Students in a computer security class are often taught about a new concept by action rather than explanation. By taking the actions they’re taught, they are actually part of the security solution, not just observers of a process. This also adds to their sense of accomplishment, since they are responsible for the outcome of the … Read more