From the Fall 2014 Issue

Cloud Vulnerability – Scanning Options for Enterprises

Author(s):

Kellep A. Charles, Information Security Analyst/Researcher, SecurityOrb, LLC

Many enterprises wisely consider regular security vulnerability scans on information processing systems to be a vital component of their security programs. They allow the administrator to locate security weaknesses, assist in asset management and, most importantly, comply with regulatory compliance. In a traditional environment, the process is not difficult to carry out, but with the … Read more

From the Fall 2014 Issue

Cybersecurity Culture and Compliance

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

CYBERSECURITY DEFINED While attending several cybersecurity conferences recently I noticed a lack of a common understanding of what cybersecurity is. I also noticed some confusion between cybersecurity and information assurance. I observed that many cybersecurity professionals and even NIST documents were advocating cybersecurity policy based on the 1991 McCumber model of information security (McCumber, 1991) … Read more

From the Fall 2014 Issue

CyberMaryland: Creating The Right Adaptive Framework For Cybersecurity

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

With its collection of high-tech commercial assets, academic institutions with expanding cybersecurity programs and its proximity to federal government, Maryland has become the nation’s cybersecurity epicenter. Maryland is home to 50 federal agencies and research facilities, including the National Security Agency (NSA), Cyber Command, the Defense Information Systems Agency (DISA), the National Institute of Standards … Read more

From the Fall 2014 Issue

INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

In recent years, two significant developments — (1) the sabotage of centrifuges and Programmable Logic Controllers at Iran’s secret Natanz nuclear fuel-enrichment facility by the Stuxnet worm, and (2) the accelerating growth in the tremendous investment by American information technology (“IT”) giants in Israel — have come to epitomize the close cooperation between the U.S. … Read more

From the Fall 2014 Issue

Their Own Worst Enemies-DoD Responds to Insider Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

The Department of Defense (DoD) has as part of its mission to prevent and deter national security threats and attacks on the American people – but what if the DoD can’t prevent its own employees and service members from contributing to or causing security breaches? A recent survey1 conducted by SolarWinds and Market Connections found … Read more

From the Fall 2014 Issue

Is Healthcare Ready for BYOD?

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Information Security is a growing concern across all Health and Human Services (HSS) agencies as well as hospitals, doctor offices and any organization dealing with Personal Identifiable Information (PII) or Protected Health Information (PHI). Specifically, the proliferation of mobile devices and their potential for storing and transferring sensitive information requires a new approach to how … Read more

From the Fall 2014 Issue

Strengthening the Brain of the Cyberwarrior: Using Neuroscience to Improve Education

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The domain of cybersecurity has experienced exponential growth within the past several years, and with this growth has come the need for programs to educate and train the personnel employed in the field. A recent search on the internet for “cybersecurity training” returned 25,100,000 results, with options extending across degree and certificate programs at universities … Read more