From the Winter 2014 Issue

It’s Time for a New Approach to Mitigate Insider Threats

Author(s):

Richard Park, Director of Product Management, Hexis Cyber Solutions

Recent high-profile national security breaches, such as the Edward Snowden and Bradley Manning cases, underscore the need for a new approach to detecting and mitigating insider threats. One emerging trend is the importance of big data security analytics and automated response. In a March 2012 report Gartner states that “information security is becoming a big … Read more

From the Winter 2014 Issue

The New Energy Landscape: What Leading Companies Need To Know

Author(s):

Emile Trombetti, Senior Vice President, Booz | Allen | Hamilton

Today’s oil and gas executives often take advantage of emerging energy trends and opportunities when assessing business objectives or striving to differentiate products and services in their highly competitive industry. The trends also influence how leaders across the oil and gas enterprise make decisions in an interconnected landscape of risks and rewards, whether they are … Read more

From the Winter 2014 Issue

CYBERSECURITY AND THE ENERGY SECTOR A Question & Answer Interview with AREVA, Inc.

Author(s):

Maryann Healy Horn, ,

AREVA, Inc. addresses the challenges of helping to protect U.S. energy infrastructure from exploitations and cyber threats. To answer some pertinent questions for our readers about AREVA, Inc., Cybersecurity, and the energy sector, the United States Cybersecurity Magazine conducted a Question & Answer interview with AREVA, Inc. The questions were answered by Erik Dorman, Manager … Read more

From the Winter 2014 Issue

InfraGard’s About Face

Author(s):

Anne Helms, , Federal Bureau of Investigation

In support of the FBI’s mission to dismantle top U.S. criminal and terrorist threats, the Bureau’s InfraGard alliance is making strides—synching the diverse expertise, strategies, and intelligence of government, law enforcement, and public-private sector partners. Partnership as a key resource As Americans, our lifestyle, economy, and national security are supported by a complex framework of … Read more

From the Winter 2014 Issue

Homegrown in Harford County, MD – A Technology Base for the Future

Author(s):

Eric Mc Lauchlin, Chairman, Harford County Economic Development Advisory Board

James C. Richardson, Director of Economic Development, Harford County, Maryland

Technology is perhaps one of the most overused terms in today’s society. Everything is “technology-based” or “technologically advanced.” One of the best explanations of technology comes from a definition for young people and refers to its interaction with life, society and the environment. An article at www.getaheadkids.com.au notes that technology must exist “to contribute to … Read more

From the Winter 2014 Issue

Securely Enabling Bring Your Own Device (BYOD)

Author(s):

Jonathan Halstuch, End User Computing Architect, RackTop Systems, LLC

Companies are allowing and embracing Bring Your Own Device (BYOD) policies within the organization for a multitude of reasons. Reasons for implementing BYOD include increased productivity, simplifying IT, response to employee demand and of course the most popular reason, cost savings. To that end it is important when undertaking the implementation of a BYOD strategy … Read more

From the Winter 2014 Issue

The Contest for Cybersecurity Professionals

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

Globalization is a force for both collaboration and competition. It is also proving to be a contest for resources – both natural and human. In an age during which growth is largely a product of creative and technological advancements, those companies that want to dominate their industries must be able to attract and retain talented … Read more

From the Winter 2014 Issue

CYERSECURITY LIABILITIES, COSTS, AND POTENTIAL SAFE HARBORS

Author(s):

Edward J. Tolchin, Esq., Principal, Cybersecurity and Government Contracting Practice Groups, Offit|Kurman, P.A.

Knowledge of where the law is and where it likely is headed is an important aspect of assessing the financial impacts of Cybersecurity decisions.  The impacts of the law on Cybersecurity corporate planning abound. A few examples will suffice to make the point: the European Commission is considering whether to mandate European Union member states … Read more

From the Winter 2014 Issue

The Data Center of Tomorrow

Author(s):

Mark Gilbert, Director, Business Development, COPT Data Center Solutions

While it might be hard to imagine today, it can be argued that the Data Center of the future will be nothing more than an extremely large USB thumb drive. As absurd as that sounds, with the explosion of connected devices, content creation and Big Data analytics, demand is increasing for storage space. A mind … Read more

From the Winter 2014 Issue

BEST PRACTICES FOR SMALL BUSINESS IN CYBERSECURITY FOR 2014

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, MD) It is the time of year for reviewing your business plan for 2014 and making a few updates to improve operations. Your New Year’s Wish List probably includes the government avoiding another shut-down, or sequestration disappearing in 2014, or perhaps that the Pentagon will figure out its budget priorities, or all of … Read more