From the Winter 2016 Issue

EMERGING OPPORTUNITIES IN GOVERNMENT CONTRACTING

Author(s):

Robert Craig, Managing Director, Government Contracting Advisory Services, BDO USA

Shahryar Shaghaghi, National Leader of Technology Services, BDO USA

Amid the aftermath of troubling cybersecurity breaches at various government agencies—including the Office of Personnel Management— the United States government and Congress have pushed for a major increase in government focus and spending on cyber protection. Earlier this year, the White House Office of Management and Budget (OMB) launched a 30-day Cybersecurity Sprint to assess … Read more

From the Winter 2016 Issue

Swipe Right for Cyber

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

It’s beginning to be a universally acknowledged truth that cybersecurity is a necessity for every organization, from top-secret government bureaus to local bars. Thanks to its harmonious convergence of government agencies, top-notch educational institutions and booming business development efforts, Maryland is uniquely positioned to succeed in the cybersecurity arena. All it needs is a little … Read more

From the Winter 2016 Issue

The Future of Cyber Coverage Disputes

Author(s):

Thomas Bick, Chair, Insurance Coverage Specialty Team, Butzel Long P.C.

These days businesses large and small are trying to decide whether to buy insurance against data breaches and other kinds of “cyber liability.” They must also determine the type and degree of coverage that they need. Those decisions will no doubt be complicated by disputes between insurers and policyholders over the intended coverage provided by … Read more

From the Winter 2016 Issue

DFARS Implementation and Compliance: The New Interim Rule

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

In response to recent Executive orders and mounting pressure after high-profile government data breaches, the Department of Defense (DoD) approved an interim rule Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services for the Defense Federal Acquisition System (DFARS Case 2013–D018), taking immediate effect. The rule, which will affect many government … Read more

From the Winter 2016 Issue

BUREAUCRATIZING INNOVATION TO BETTER SECURE CYBERSPACE

Author(s):

J. L. Billingsley, Advisory Board Member, Cyber Security Forum Initiative

For those entrusted with defending the nation against increasing cyberspace-related threats while operating in a fiscally constrained environment, the need to innovate is clear. One way to manage the inherent risk associated with the imbalance between ends and means is to embrace innovation.1 While many in the defense community equate innovation with integrating private sector … Read more

From the Winter 2016 Issue

The Inheritable Cloud Security Model

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Dr. Merrick S. Watchorn, DMIST, Cloud Security Solutions Architect / SME, Science Applications International Corporation (SAIC)

The influence of the cloud on the IT industry continues to grow in direct proportion to cost-cutting measures and profitability. The cloud concept enables those in charge to agree on a total cost of ownership (TCO) pricing model or the concept of shared costs, which includes acquisition, exchange, and post-possession.1 Additionally, the cloud provides pools … Read more

From the Winter 2016 Issue

Building a Cyber Lifecycle: The CyberTexas Foundation

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

The creation of a cyber warrior involves every element of an individual’s community: the schools that train them, the businesses that hire them, and the government that develops, enables, and protects the infrastructure necessary to sustain this evolution. But it’s not some neat assembly-line process, each budding cyber expert moving from school to work to … Read more

From the Winter 2016 Issue

Social Insecurity

Author(s):

Natalie Blackbourne, President, Blackbourne Worldwide

Influence and manipulation occur every day. Deadlines at work are accomplished because your boss used their influence to get things done; somehow that adorable Scout talked you into buying an extra box of cookies; or your annoying coworker magically got you to do an extra hour of work after buying you a latte. All of … Read more

From the Winter 2016 Issue

Cybersecurity Takes the Right Person

Author(s):

Don Watson, CISSP, Senior Cyber Instructor/Senior Software Engineer, VOR Technology

There is unprecedented demand right now for qualified cyber specialists to fill the ranks of government and civilian positions.1 Although there are many people with expertise in advanced computer and network technologies, many of these workers lack experience in the security-related aspects of these technologies. As a programmer I wasn’t taught how to write secure … Read more

From the Winter 2016 Issue

How to Gain Allies and Infuence Your Services Team’s Success

Author(s):

Michelle Covert, Manager, Production Support SILA-C, Vertafore

The information security and customer service groups within an organization often make for odd bedfellows, due to the competing and often divergent goals between the two groups. Security teams’ goals are to protect and prevent the loss of customer data, information, proprietary code, or practices; services teams are focused on resolving customer-reported issues as quickly … Read more