From the Spring 2024 Issue

Brown Paper Packages Tied Up With Cyber – the Consumer Package Goods Industry and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

introduction A doorbell rings, a text message arrives- a package has been delivered to a front porch or loading dock. The Consumer Packaged Goods (CPG) industry delivers a wide range of products sold to consumers – safely, reliably, and routinely – from grocery stores to department stores. The CPG industry comprises businesses involved in producing, … Read more

From the Spring 2024 Issue

Microsegmentation’s Role in Compliance: Meeting Regulatory Requirements

Author(s):

Larry Letow, CEO, U.S., CyberCX

Microsegmentation's Role in Compliance

Introduction In today’s interconnected world, regulatory compliance has become a top priority for organizations across various industries. Businesses must adhere to an ever-growing list of laws and regulations designed to protect sensitive data and maintain the security and privacy of customers and stakeholders. One crucial technology that has emerged to assist organizations in achieving regulatory … Read more

From the Spring 2024 Issue

Shielding Projects: Cybersecurity Strategies for PMOs

Author(s):

Rahul Yadav, Founder & CEO, Feasti

In this digital era, organizations face cyber threats with severe consequences. These threats are primarily due to remote working, the usage of unsecured devices or the use of outdated antivirus software. An effective cybersecurity strategy involves risk assessment for effective resource allocation. Moreover, security systems such as encryptions and firewall software stop unauthorized access. Project … Read more

From the Spring 2024 Issue

The Evolving Dynamics of Product and Operational Technology Security Within the Semiconductor Industry

Author(s):

Krishna Chaitanya Tata, Operational Technology Cybersecurity Leader, IBM

Krishna Tata-Spring 2024

Introduction Security within products is the need of the hour across manufacturing organizations, more so within semiconductor manufacturing. Secure by Design is an imperative that organizations are adopting very rapidly. This is very critical for the manufacturing industry as it is the most targeted industry for cybersecurity attacks in the last year. The graphic below … Read more

From the Spring 2024 Issue

What’s Next for CMMC 2.0?

Author(s):

John Kerber, Cybersecurity Assessor, ArCybr

Lauren Beward, Senior Cybersecurity Specialist/ Business Development Manager, ArCybr

What's Next for CMMC 2.0?

How to Ready Your Organization for Forthcoming Implementation Since 2020, the Defense Industrial Base (DIB) has waited for the implementation of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) program anxiously wondering what it means for the contracting community and the future of defense acquisitions.  CMMC will begin implementation by January 2025, so … Read more

From the Spring 2024 Issue

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Author(s):

Gaurav Sharma, Director of Operations, Chetu

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Hackers and nation-state cybercriminals pose a growing threat to the security of our digital world. No one, from individuals to multi-national corporations to governments, is immune from cyberattacks like data breaches, ransomware attacks, and targeted intrusions. The World Economic Forum’s Global Risks Report for 2024 ranks cyberattacks as a top five global risk, right after … Read more

From the Winter 2024 Issue

,

The Unintended Consequences of Connectivity: How a Zero Trust Approach Can Shrink the Attack Surface

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Robert Metcalfe, co-inventor of Ethernet and considered one of the founding fathers of the modern Internet, is renowned for many things, but perhaps none more so than his namesake law: Metcalfe’s Law. Metcalfe’s Law was initially presented in 1980 to describe the intrinsic value of a telecommunications network and has since been popularized as ‘The … Read more

From the Winter 2024 Issue

,

It’s Time for Intelligence Teams to Recommend Operational Changes

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

AJ Nash winter 2022

Increased Focus on Configuration Management and Crown Jewels is Vital to Success Many experts​​ in cybersecurity talk about the need for “intelligence-driven security,” but most consumers don’t know what to do with the Intelligence they are paying for​ or how to measure the value of the actions taken as a result of that Intelligence. This may be somewhat expected for … Read more

From the Winter 2024 Issue

,

What is Cyber Leadership?

Author(s):

Diane M Janosek, PhD, JD, CISSP, LPEC, Senior Legal Advisor, WiCyS Mid-Atlantic

What is Cyber Leadership?

The Case Study of the 2021 Hacking of a Florida Water Treatment Plant We often hear “cyber” and often hear “leadership”. So, what is “cyber leadership” and how is it any different than leading any other senior position in business? First, let us define cyber as a noun with both tangible and intangible aspects.  Cyber … Read more