From the Summer 2015 Issue

Strategizing for Data Breach Risk Management

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

Organizations are struggling to handle data breaches, as their frequency in the news indicates. According to the Ponemon Institute and IBM’s 2014 report on corporate data loss prevention, the average cost of a data breach to a company was $3.5 million – 15 percent more than what it cost in 2013.1  It is evident from the … Read more

From the Summer 2015 Issue

A Time for American Leadership in Cybersecurity

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Fellows of non-partisan think tank ICIT1 frequently get called upon to provide expert cybersecurity advice and analyses to congressional members and government leaders.  On the evening of April 30th, 2015, we participated in a fascinating discussion with Michael Echols, Director of the Cyber Joint Program Management Office.2 This discussion made one thing clear to me: … Read more

From the Summer 2015 Issue

How to Increase Your CEO and Board’s Cybersecurity Literacy

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Current State As 2015 unfolds, cybersecurity is the hot topic in boardrooms today. According to Forbes, 2014 was the year of the data breach, and we would be wise to brace for more in 2015.1 FireEye CEO Dave DeWalt stated, “The trend of massive data breaches are now the new norm as 97% of companies … Read more

From the Summer 2015 Issue

A CIRO’s-Eye View of Digital Risk Management

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

The 2015 RSA Conference made plenty of headlines.  One of the larger news items was the official unveiling of Optiv Security – the new brand name for recently merged resellers Accuvant and Fishnet. In the current merger and acquisition market, this one was huge. Optiv Security is now one of North America’s largest cybersecurity services … Read more

From the Summer 2015 Issue

SOME UNINTENDED CONSEQUENCES OF COLLABORATING

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Disclaimer: Nothing contained in this article is intended to be legal advice or to predict the outcome in any instance. As stated herein, the outcome in any instance depends greatly upon a) the laws of the applicable jurisdiction, and b) the particular facts involved. A tale of unintended consequences – one resulting in unexpected riches … Read more

From the Summer 2015 Issue

Colorado Springs: A Beautiful City for Cybersecurity

Author(s):

Dr. Patrick J. Laverty, Senior Cybersecurity Engineer, TASC, An Engility Company

Why Colorado Springs? Situated in some of the most picturesque land in our nation, the beautiful city of Colorado Springs is home to four major Department of Defense (DoD) installations. The units on these installations serve many diverse missions, including: Training our future Air Force leaders at the Air Force Academy Air Force Space Command … Read more

From the Summer 2015 Issue

BRIDGING THE CYBER TALENT GAP, IASCA

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Passionate about a Problem Montana Williams has been described before as a cyber-evangelist, and after only a few minutes of speaking to him it’s easy to see why. His passion for cybersecurity, technology, and workforce development has taken him from a pivotal role in our nation’s nascent stages of cyber-warfare and cybersecurity to becoming one … Read more

From the Summer 2015 Issue

Growing the Silver Bullet

Author(s):

Chris Cook, Associate Director, CyberTexas

If America is ever able to adequately address today’s modern cybersecurity threats, it will mean that someone has discovered the “silver bullet” or, more realistically, that we’ve grown the workforce needed to successfully address the problem of a critical shortage of trained cybersecurity professionals.  San Antonio’s educational, governmental, and industrial institutions have taken a comprehensive … Read more

From the Summer 2015 Issue

Looking under the Hood of Cybersecurity Education

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Students in a computer security class are often taught about a new concept by action rather than explanation. By taking the actions they’re taught, they are actually part of the security solution, not just observers of a process. This also adds to their sense of accomplishment, since they are responsible for the outcome of the … Read more

From the Summer 2015 Issue

America’s Cyber Warriors: Appropriate Training at the Forefront

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

Professor William Butler, Cyber Security Program Chair, Capitol Technology University

Warrior: A man (or woman) engaged  or experienced in warfare;  broadly: a person engaged in some struggle or conflict.1 There are many challenges in building and developing a cyber army, from the senior leadership to the technical workforce. The term “Cyber Warrior” is being used by the media and throughout the Department of Defense to … Read more