From the Summer 2015 Issue

Get Tested: Penetration Testing as an Integral Part of Your Company’s Cybersecurity Plan

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Cybersecurity is now more than ever a business requirement in every industry.  The 2015 Verizon Data Breach Report estimates 700 million compromised records in all of 2014.1  Worse yet, that number only represents known/reported breaches. A survey of attendees at the 2008 RSA Conference indicated that 89% of breaches they were aware of went unreported.2 If … Read more

From the Summer 2015 Issue

Don’t Become Extinct: The Evolution of Information Security, Part Two

Author(s):

Will Janssen, Business Development Director, Signals Defense

In Part One of this series, the idea of the three waves of security was introduced, with the Physical Security 1st Wave having established the principles and ideas of security used in the next two Waves. The 2nd Wave is “Wired” IT Security, which is maturing with standards, technologies, and operational approaches and is being … Read more

From the Summer 2015 Issue

Improving Your Cybersecurity Posture with Enterprise Architecture

Author(s):

Didier M. Perdu, Ph.D., , LMI

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Roxanne Everetts, D.M., , National Defense University

Introduction  Managing risks to mission accomplishment is what cybersecurity is all about. Most everyone in a given organization can agree on this as a goal, but getting mission owners, information technology (IT) providers, and security personnel to come together on how it should be done is another matter. Mission owners focus on results: bombs on … Read more

From the Spring 2015 Issue

In 2015, It’s All about the Data

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

A New World  2014 taught us that massive security breaches are the new normal for U.S. companies, government agencies, and universities. Some of the most prominent were Target, Home Depot, Neiman Marcus, Apple’s iCloud, Michaels, the U.S. Postal Service, the IRS, Community Health Services, UPS, Staples, the State Department, Sands Casinos, USIS, eBay, PF Chang’s, … Read more

From the Spring 2015 Issue

Diving into the Deep Web

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

With all of the recent advancements in technology, including the ability for anyone to know what is going on around the world with just a few keystrokes or finger swipes, it is amazing that anything can be a mystery anymore. When I was young, you had to rely on the newspaper, nightly news programs on … Read more

From the Winter 2015 Issue

Next Generation Espionage

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

As we enter the new year we approach the one year anniversary of the Target corporation hack. Their CEO is out of a job, their board of directors is being sued, and the brand has suffered, by some estimates, $1 billion in damages. Unfortunately the Target Corporation is not an isolated example. Recently the headlines, … Read more

From the Winter 2015 Issue

Applying Analytical Tools to Cybersecurity

Author(s):

Joseph Lukowski, President, Laredo Technical Services, Inc.

There is a Method to the Madness of Criminal Intent  Late last summer, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major US contractor for security background investigations for the US Government. Initial estimates indicate that the hacking included more … Read more

From the Winter 2015 Issue

DEVELOPING CYBER SKILLS WITH PUZZLES AND HACKING CHALLENGES

Author(s):

Nikolas Roby, Security/Defense Research Analyst, Parrot Labs - KEYW Corporation

I meet a variety of people trying to enter into the information security and forensics fields. Many of them come straight out of college and have a great deal of theoretical knowledge, but often lack any real world skills. Unfortunately, to gain these skills you need to work real world scenarios, which are hard to … Read more

From the Fall 2014 Issue

INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

In recent years, two significant developments — (1) the sabotage of centrifuges and Programmable Logic Controllers at Iran’s secret Natanz nuclear fuel-enrichment facility by the Stuxnet worm, and (2) the accelerating growth in the tremendous investment by American information technology (“IT”) giants in Israel — have come to epitomize the close cooperation between the U.S. … Read more