From the Summer 2014 Issue

Implementing Continuous Monitoring to Combat the Nation’s Cyber Threat

Author(s):

Matt Brown, Vice President, Homeland Security and Cyber Solutions Knowledge Consulting Group (KCG)

Cyber attacks on federal government systems are increasing in volume, vigor and complexity. In fiscal 2012 alone, there were 48,562 cybersecurity incidents at federal agencies reported to the U.S. Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC). That’s a 782 percent increase over … Read more

From the Summer 2014 Issue

It’s What’s Inside That Counts – The War From Within

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, CEO, U.S., CyberCX

“Tis not so deep as a well nor so wide as a church-door, but ‘tis enough, ‘twill suffice” — (Romeo and Juliet by William Shakespeare, Act III, Scene 1)  It is no surprise that with the continuing advancements in data mobility, increasing demands of regulatory compliance, and sharing amongst the global community, that securing our nations … Read more

From the Summer 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings and Welcome!   In this 21st Century digital world we live in, the cold-calloused cybercriminals, yes, our enemies, continue to commit credit theft, identity theft, extortion. Right here in the United States of America. Through social media, the cybercriminal offenders are preying on our children and teens. Our children are being exploited. Human trafficking … Read more

From the Spring 2014 Issue

THE (SLOWLY) EVOLVING LANDSCAPE OF SECURITY CLEARANCES IN THE CYBERWORLD AFTER SNOWDEN

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

Shortly after Edward Snowden burst onto the scene in May 2013, we learned — too late — that there were multiple “red flags” in his background investigation that should have prevented him from gaining access to the countless numbers of classified National Security Agency (NSA) documents that he leaked. Although Snowden has caused untold damage … Read more

From the Spring 2014 Issue

The Effects of Data Breaches on the Modern Consumer

Author(s):

Michael Finney, , Mystic Waters Media

Information Security in the Public Eye  While IT security specialists have been diligently watching the industry evolve for years now, the average citizen has only recently become aware of the day-to-day risks. Residing in the most popular gaming devices, mobile apps & stores are threats that could compromise users’ personal data. Many times, without a … Read more

From the Spring 2014 Issue

Near-Term Vision of IT Security Threat Monitors

Author(s):

Benjamin Shelton, , Nangwik Services

Don Tobin, ,

Continuously updating, learning and optimizing in an ever-changing “threatscape”   As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There … Read more

From the Spring 2014 Issue

“Cutting through the Chatter – Can the Federal Government Lead in Developing Cybersecurity Standards?”

Author(s):

David Robbins, Chairman, Government Contracts Practice, Shulman Rogers Gandal Pordy & Ecker, P.A.

Cybersecurity has a dirty little secret. Despite all the buzz, nobody knows what cybersecurity actually is. Many people have ideas about what cybersecurity should be. And there are dramatic predictions about market size. But we are not yet at a point where anyone can say, authoritatively, what cybersecurity actually is. We are in the digital … Read more

From the Spring 2014 Issue

Focusing a Leader’s Lens on Cybersecurity Within a Vast Framework Landscape

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Cyber Threats Abound  When dealing with Cybersecurity, a leader must be vigilant and at a moment’s notice be able to evaluate his or her organization’s security posture in regards to cyber threats. Cyber threats are typically viewed from GRC perspectives including governance, risk and compliance but equally important perspectives include policy, value, service, program, and … Read more

From the Spring 2014 Issue

How Not to Become the Next Headline: Wake-Up Call by the Largest Data Breach in History

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

As the largest breach in history unfolded, most executives were both disappointed that it occurred to a great American brand and relieved that it missed them…for now.  Breach! The massive data breach and its resulting fallout is a stark reminder to senior executives and Boards of U.S. companies that they will remain vulnerable 24x7x365 until … Read more

From the Spring 2014 Issue

Preventing Friends and Foes from CyberSpying on YOU

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

We all are well aware that cyber attacks continue to increase in complexity, frequency and severity. These malicious cyber activities continue to grow at an unprecedented rate, severely threatening the nation’s public and private information infrastructure, as well as our very essence – our identities, our data, our personal conversations, our finances, and all aspects … Read more