From the Spring 2015 Issue

The Blueprint to Cybersecurity Government Contracting: Phase One

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

The road to government contracts can seem complicated, even to a seasoned professional government contractor. It does not have to be that way. In this article I will attempt to simplify government contracting business development and explain its initial phases honestly and simply. Identify your capabilities by using government-recognized criteria. Capabilities statements are necessary in … Read more

From the Spring 2015 Issue

Getting Cybersecurity off the Back Burner and into the Boardroom

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Maybe it was the Sony hack, with corporate executives initially bowing to hacker demands while trying to recover from a multi-million dollar virtual smash-and-grab. Maybe it was the compromise of the Navy network and the resulting necessity of a task force to assess and shore up their defenses. Maybe it was the loss of 80 … Read more

From the Spring 2015 Issue

A SHOPPER’S GUIDE TO CYBER LIABILITY INSURANCE

Author(s):

Holly Winger, Esq., , Brenner, Saltzman & Wallman LLP

As the insurance specialist at Brenner, Saltzman & Wallman, I have reviewed a variety of insurance policies for clients with cybersecurity needs. Some host websites for marketing commercial real estate; others develop software to assist hospitals with monitoring patients for serious chronic conditions, or coordinate billions of credit transactions for retailers. These policies came to … Read more

From the Spring 2015 Issue

The Problem of Attribution in Cyber Attacks: The Sony Example

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

At Fort Sumter, Union troops quickly identified the forces that were bombarding them as newly minted Confederate artillery. Similarly, at Pearl Harbor, the U.S. Navy immediately identified Japan as the source of the bombing raid because of the unmistakable markings on the low-flying aircraft overhead. In attacks involving conventional warfare, “attribution,” or the identification of … Read more

From the Spring 2015 Issue

Looking to Make Your Leap: Protecting Yourself from Threats and Breaches in the Cloud

Author(s):

Vaughan Emery, President & CEO, CENTRI Technology

More businesses are moving their data to the cloud, due to its many attractive benefits: lower capital and operational overhead, faster and more efficient scalability, and increased flexibility, to name a few. According to a RightScale study,1 87 percent of businesses surveyed have migrated some or all of their communications and IT infrastructure to the … Read more

From the Spring 2015 Issue

How Connected Is Too Connected? Cybersecurity for a Fully Networked World

Author(s):

Darin Andersen, Chairman & Founder, CyberTECH

The Internet of Things (IoT) has become one of the hottest topics among security and privacy experts in the last two years. In October 2013, when CyberTECH produced “Securing the Internet of Things,” the first “think tank” event on the topic, most people where just coming to terms with what the IoT was and what … Read more

From the Spring 2015 Issue

The Evolution of Information Security, Part One

Author(s):

Will Janssen, Business Development Director, Signals Defense

In 1980 Alvin Toffler famously declared that there are three waves of civilization – Agricultural (lasted centuries), Industrial (lasted decades), and the Information Age (now).1 Each new wave pushes the preceding wave aside. Information security operates in the Physical, “Wired” IT (information technology), and Radio Frequency (RF) operational domains. So, in a similar vein to … Read more

From the Spring 2015 Issue

Defense in the Age of Cyber-Warfare: the Cyber Security Forum Initiative

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Paul de Souza was the Chief Security Engineer for AT&T when he started noticing that the cyber-attacks he saw out in the field were changing, transitioning from what we think of as “traditional” cybercrime – done for money, information, or just “the lulz” – to something far more potent: attacks that were political in nature, … Read more

From the Spring 2015 Issue

Living on the Edge: Pushing the Boundaries of Cybersecurity for the Marine Corps Forces Cyber Command

Author(s):

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

Background Marine Corps Forces Cyber Command (MFCC) faces a big challenge often experienced by other cyber agencies: achieving a clear and consolidated picture of the cyberspace domain. MFCC plans, coordinates, integrates, synchronizes, and directs the full spectrum of Marine Corps cyberspace operations, including Department of Defense Global Information Grid operations and defensive cyber operations. When … Read more

From the Spring 2015 Issue

How to Win at Cyber-Chess: Leveraging Neuro Analytics in Your Cyberspace

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

The cyber domain presents limitless opportunities for cyber threat actors while causing significant challenges for cybersecurity professionals. While our current time might be construed by historians as the golden age of cybercrime, it is also an age that offers new ways and means to counter these crimes. Neuro-behavior forensics is such a means, permitting the … Read more