From the Fall 2016 Issue

Elevating Cybersecurity to an Organizational Risk Management Function

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The environment of cybersecurity is complex and uncertain, but it is at times framed in the context of a game that is predictable and defined by rules. This approach can lead to an overreliance on advanced cybersecurity tools to predict and prevent incidents. It may also result in placing too much pressure on IT experts … Read more

From the Fall 2016 Issue

Cybersecurity for Wireless Devices and Networks

Author(s):

Philip Green, President/CEO, INNOPLEX, LLC

In the cybersecurity environment, the role a cyber-attacker plays in a given scenario is much easier to execute than that of a defender. This assertion is a basic tenet of cybersecurity operations that most security professionals around the world acknowledge. In general terms, an attacker needs to find only one weakness or intrusion opportunity, while … Read more

From the Fall 2016 Issue

Signals and Noise: Examining Flaws in SS7

Author(s):

Connie Uthoff, Program Director, The George Washington University

In mid-August of 2016, a hacker referred to as “Guccifer 2.0” allegedly released documents stolen from the Democratic Congressional Campaign Committee (DCCC), including the personal cell phone numbers and email addresses of nearly all Democrats in the House of Representatives. The same hacker claimed credit for the recent Democratic National Committee (DNC) hacks; which resulted … Read more

From the Fall 2016 Issue

Incentivize Me: The Story of IoT & Malware

Author(s):

Craig Harper, Chief Technology Officer, Sysorex

Wow-factor. It’s one of the best parts of new technology. Childhood dreams and impossible ideas have not only come to exist, but are highly integrated into our daily lives. The Internet of Things (IoT) phenomenon has the wow-factor that so many seek and try to harness in their ideas and products. But those who are … Read more

From the Fall 2016 Issue

Counting Down from Zero

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

“Zero-day.”  The word is enough to strike fear into the hearts of even the most seasoned cyber-warriors. If a zero-day vulnerability has been uncovered in the system they’re supposed to be defending, all of their training and preparation, their work hardening the network to attacks, has been rendered null and void. There’s no point in … Read more

From the Fall 2016 Issue

Cybersecurity Attacks Threaten 9-1-1 Response

Author(s):

Timothy Lorello, President & CEO, SecuLore Solutions

Our public safety infrastructure is under cyber-attack! Like every other part of the internet-based economy, these systems are continuously exposed to attacks that have been increasing at an alarming rate.  Over 240 million 9-1-1 calls are made every year, with over 75% coming from wireless phones.1,2 Almost 6,000 public-safety answering points (PSAPs) field the calls … Read more

From the Fall 2016 Issue

Illuminating Issues of Grid Cybersecurity

Author(s):

Joseph S. Abrenio, Vice President of Commercial Services, Delta Risk LLC

Introduction  Ongoing cyber-attacks are the new normal. Whether they’re the work of politically or criminally-motivated individuals, or the coordinated efforts of nation-state actors, our nation’s critical assets will continue to be bombarded by digital attacks. Those protecting our critical infrastructure must be vigilant to the ever-evolving cyber threats to the industry. Many of these threats … Read more

From the Fall 2016 Issue

Safeguarding American Democracy: Outcome-Based Cybersecurity in Election 2016

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

If you’re asking how foreign hackers can be prevented from manipulating the election, you’re asking the wrong question.  On May 31st, 1916, the British battlecruisers Indefatigable, Queen Mary, and Invincible were sunk within two and a half hours by the Imperial German Navy’s High Seas Fleet during the Battle of Jutland. In response to the … Read more

From the Fall 2016 Issue

SDN FORENSICS – A CHALLENGE

Author(s):

Chris Christou, , Booz | Allen | Hamilton

Emre Ertekin, , Booz | Allen | Hamilton

Greg Starkey, , Booz | Allen | Hamilton

Joseph Bull, , Booz | Allen | Hamilton

Michael Lundberg, , Booz | Allen | Hamilton

Michael McAlister, , Booz | Allen | Hamilton

Tyler Duquette, , Booz | Allen | Hamilton

Winfield Arnott, , Booz | Allen | Hamilton

SOFTWARE DEFINED NETWORKING – A NEW PARADIGM  Software-defined networking (SDN) provides a new approach to networking by separating the functions of data switching and switch control. SDN permits better global network configuration and control by consolidating network topology and control information into a single controller. Information that is typically found distributed across routing and switching … Read more

From the Fall 2016 Issue

The Next Generation of Cybersecurity Experts

Author(s):

Dr. Hamilton Turner, Senior Director, Research and Engineering, OptioLabs, Inc.

William Thornhill, Summer Intern, OptioLabs, Inc.

I have always been captivated by technology. Whether it be playing video games, spending hours messing around on my computer, or always having a mobile device in my hand, I have always had an interest in all things tech. As a freshman at Loyola Blakefield, I discovered the blossoming Cyber Security Club (CSC). My involvement … Read more