ProcessBolt
From the Spring 2022 Issue

Cyber Talent: Hiding in Plain Sight

Author(s):

Dr. Jason Edwards, Director of Cybersecurity Strategy and Planning, USAA

Griffin Weaver, Senior Legal Counsel, Dell Technologies

We live in a time when ransomware attacks, nation-state “cyber warfare,” and having a remote workforce is the norm rather than the exception. If you ask most company executives, particularly those responsible for protecting company information and systems, Cybersecurity has never been more important. It’s essential to have the right tools, the proper funding, and, … Read more

From the Spring 2022 Issue

CECOM SEC’s Women of Cyber

Author(s):

Ron Lee, CECOM SEC Strategic Communications Specialist, CECOM SEC

Aberdeen Proving Ground, MD – The true strength of the U.S. military comes from its diversity. There is not just a diversity of weaponry, equipment, and tactics used on the battlefield with the widely adopted concept of multi-domain operations, but also, diversity in representation, perspectives, and thought. More than ever in its history, women in … Read more

From the Winter 2022 Issue

THE U.S. ARMY C5ISR CENTER CSSP ATTAINS ISO 9001 CERTIFICATION STATUS

Author(s):

Kristi S. Halford, Founder, C3 Visionary Strategies

In its ongoing pursuit of cyber excellence that maintains the U.S. Army Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center Cybersecurity Service Provider (CSSP), a trendsetter and premier leader for the advancement of Defensive Cyberspace Operations (DCO) within the Department of Defense (DOD), the C5ISR Center CSSP has attained International Organization for … Read more

From the Spring 2022 Issue

U.S. Army C5ISR Center CSSP: Leading the Way to a Defend Forward Stance

Author(s):

Bill Christman, Chief, Defensive Cyber Solutions Branch

Cesar Pie, Strategist, Defensive Cyber Solutions Branch

Clinton Hackney, Strategist, Defensive Cyber Solutions Branch

Greg Weaver, Team Lead, Defensive Cyber Solutions Branch

DOD CSSP Program: A Plateau Difficult to Overcome Since its establishment in 2001, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program (hereafter Program) has progressively and systematically matured to become one of the most critical components of the Department’s Defense–in–depth strategy. Today, 27 authorized (certified) DOD CSSPs are responsible for provisioning 24x7x365 cybersecurity … Read more

From the Spring 2022 Issue

Moving Toward a “Continuous Adaptive Trust”

Author(s):

James Christiansen, VP, Cloud Security Transformation, Netskope

The term “Zero Trust” is the lack of implicit trust. When we started with “zero trust,” we no longer trusted users because they weren’t on our network domain.  As our staff went remote, we had to input stronger authentication to move from Zero Trust to some level of implicit trust. The problem is that trust is all or … Read more

From the Spring 2022 Issue

4 Regulatory Frameworks: Retain and Grow Your Client Base

Author(s):

Erin Birckhead, Audit Senior Manager, SC&H Group

4 Regulatory Frameworks

When it comes to data security and compliance, both domestically and internationally, companies must appropriately structure and properly equip their internal environments to mitigate risk and issues. In doing so, companies demonstrate that security is a top priority, which can help strengthen their relationships with current clients and elevate their ability to attract and recruit … Read more

From the Winter 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Winter 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Winter 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Tell me that at least one of you out there in cyber land is a classic movie buff?  And no, classic doesn’t mean something that was produced by Netflix for Netflix in 2018.  Since I can hear the sound of that pin dropping , I’m forced to conclude that, once again… Lonely is the … Read more

From the Winter 2022 Issue

Back to Basics: The Vulnerabilities You’re Overlooking

Author(s):

Gabrielle Hempel, Systems Engineer, RSA Security

By now, data breaches are commonplace. Almost every day, there seems to be a new one—it has become a regular occurrence. Often, these breaches involve ransomware, which has become a much larger problem in recent years. Ransomware is concerning because it preys upon both Information Technology (IT) and Operational Technology (OT), which is disruptive to … Read more

From the Winter 2022 Issue

Cybersecurity in the Information Environment

Author(s):

Jack Koons, Author,

Today’s cybersecurity is much more than simply a conversation about information technology, operational technology, and data protection. It’s a world of maneuver inside and across the cognitive, virtual, and physical space – the information environment. Today’s security professionals must become comfortable with operating and defending across all three layers, as well as the impact and … Read more