From the Winter 2015 Issue

3 Simple Steps to Protect Your Business from Cybersecurity Losses

Author(s):

Matt Bergman, Shareholder, Shulman Rogers

Does your business accept credit card payments from customers? Does it purchase products or services from vendors or suppliers? If the answer is “yes” to either of these questions, read on. Virtually every business that uses a computer with internet access has already been hacked. Fortunately, most businesses have yet to experience the type of … Read more

From the Winter 2015 Issue

Cybersecurity and the C-Suite: 10 questions every executive should be able to answer

Author(s):

Jeff Peters, Editor, SurfWatch Labs

As cyber threats proliferate and become a bigger part of the public discourse, the management and responsibility of those threats is increasingly moving towards the highest levels of an organization – corporate executives and the board of directors. Yet many of those in the C-Suite do not have a sufficient high-level understanding of the risks … Read more

From the Winter 2015 Issue

Seeing the Entire Elephant: Or,You’re Not Secure if You’re Not Completely Secure

Author(s):

Anne Kohnke, Assistant Professor of IT, Lawrence Technological University

Dan Shoemaker, Professor - Center for Cyber Security, University of Detroit Mercy

Almost everybody thinks, or would like to think, that the systems that power our society are secure. That would be a seriously incorrect assumption. The fact is that America’s electronic infrastructure is riddled with the type of vulnerabilities that have allowed computer crime to officially surpass the drug trade in the past decade. To illustrate … Read more

From the Winter 2015 Issue

Cybersecurity’s Three Great Lies – and Five Steps to Avoid the Threats They Enable

Author(s):

Christina Wiegand, Director of Commercial Services, TeleCommunication Systems (TCS) Cyber Intelligence Group

When hackers look for targets, they typically focus on big organizations because they’re the ones with the most credit cards, state secrets and other lucrative hauls, right? Wrong. As the widely reported Target credit card breach shows, hackers often focus on small organizations as a way to attack large enterprises and government agencies. In February … Read more

From the Winter 2015 Issue

THE TOP 12 SECURITY BREACH FACTS EVERY C-LEVEL EXECUTIVE AND BOARD MEMBER MUST KNOW

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Magnitude of the Threat  Over $500B of innovation and trade secrets secretly stolen each year: this means nearly every company with trade secrets is constantly targeted and compromised. The equivalent of $5 Trillion in total economic value removed from the U.S. economy each year (USA 2013 GDP: approx. $17 Trillion)  250,000+ cyber soldiers and nearly … Read more

From the Winter 2015 Issue

Your biggest cyber threat? Naïve end-users

Author(s):

Kelvin O. Medina, Principal Security Consultant, Trustwave

If your end-users lack awareness, your sensitive data will be at risk  Background Approximately 50 percent of all security breaches within the Federal Government are caused by a lack of user compliance, according to a report released last year by MeriTalk and developed in collaboration with Akamai Technologies, Inc.1 This illustrates that even though security … Read more

From the Winter 2015 Issue

CyberTECH: Sharpening the Vision for the West Coast’s Cyber Hub

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

Launched in 2013, CyberTECH is one of the most visible drivers helping to establish San Diego as the West Coast’s cybersecurity hub. The 501(c)(3) non-profit organization operates as a global cybersecurity and Internet of Things (IoT) network ecosystem, providing cybersecurity and IoT resources, strategic programs and quality thought leader IoT forums and events across the … Read more

From the Winter 2015 Issue

Non-Competes in the Cybersecurity Industry

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Usually, you can’t develop cybersecurity products and businesses by yourself. You need to work with others and, in the process, to disclose, to them, confidential information. In doing so, most cybersecurity companies will want to protect their proprietary technology, customer and prospects lists, and other trade secrets as much as possible. Furthermore, many cybersecurity companies … Read more

From the Winter 2015 Issue

Welcome to Security in the 21st Century— Monitoring Employee Behavior

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, CEO, U.S., CyberCX

“All human beings have three lives: public, private, and secret.”  — Gabriel García Márquez, Gabriel García Márquez: a Life  “Experience should teach us to be most on our guard to protect liberty when the government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The … Read more