From the Fall 2014 Issue

CyberMaryland: Creating The Right Adaptive Framework For Cybersecurity

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

With its collection of high-tech commercial assets, academic institutions with expanding cybersecurity programs and its proximity to federal government, Maryland has become the nation’s cybersecurity epicenter. Maryland is home to 50 federal agencies and research facilities, including the National Security Agency (NSA), Cyber Command, the Defense Information Systems Agency (DISA), the National Institute of Standards … Read more

From the Fall 2014 Issue

INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

In recent years, two significant developments — (1) the sabotage of centrifuges and Programmable Logic Controllers at Iran’s secret Natanz nuclear fuel-enrichment facility by the Stuxnet worm, and (2) the accelerating growth in the tremendous investment by American information technology (“IT”) giants in Israel — have come to epitomize the close cooperation between the U.S. … Read more

From the Fall 2014 Issue

Their Own Worst Enemies-DoD Responds to Insider Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

The Department of Defense (DoD) has as part of its mission to prevent and deter national security threats and attacks on the American people – but what if the DoD can’t prevent its own employees and service members from contributing to or causing security breaches? A recent survey1 conducted by SolarWinds and Market Connections found … Read more

From the Fall 2014 Issue

Is Healthcare Ready for BYOD?

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Information Security is a growing concern across all Health and Human Services (HSS) agencies as well as hospitals, doctor offices and any organization dealing with Personal Identifiable Information (PII) or Protected Health Information (PHI). Specifically, the proliferation of mobile devices and their potential for storing and transferring sensitive information requires a new approach to how … Read more

From the Fall 2014 Issue

Strengthening the Brain of the Cyberwarrior: Using Neuroscience to Improve Education

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The domain of cybersecurity has experienced exponential growth within the past several years, and with this growth has come the need for programs to educate and train the personnel employed in the field. A recent search on the internet for “cybersecurity training” returned 25,100,000 results, with options extending across degree and certificate programs at universities … Read more

From the Fall 2014 Issue

Intel and the Internet of Things

Author(s):

Daren Dunkel, Chief of Staff, McAfee

The Internet of Things (IoT) will represent a tectonic shift in the way computing is done.  A megatrend if you will, that impacts high technology and society in general.  This is the consensus of two industry veterans with a combined 28 years of technology experience. IoT was recently defined as “a concept in which electronic … Read more

From the Fall 2014 Issue

America’s Biggest Threat: Economic Espionage and the Theft of Innovation

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Experts Warn U.S. Companies Unwittingly in Full-On Economic War We live in a truly exciting time. Advances in technology permeate every aspect of our lives and enrich nearly everything we are involved in. Along with all the good technology brings us, there is also a dark side.  At the same time, the dark side also … Read more

From the Fall 2014 Issue

Taking the Lead on a Regional Approach to Solving Cybersecurity Workforce Challenges

Author(s):

LeVorn Smalley, Industry Navigator, Cybersecurity & IT, Anne Arundel Workforce Development Corporation

Maryland is a cybersecurity hot spot, with the main cybersecurity industry region radiating from government and defense missions surrounding Ft. Meade in Anne Arundel County. Aberdeen Proving Ground and Patuxent River Naval Air Systems Command have also seen rapid growth in government cybersecurity activity in addition to commercial cybersecurity sector growth in Prince George’s, Baltimore, … Read more

From the Fall 2014 Issue

Chinese Hackers and Their New Target- Federal Employees

Author(s):

Ellen Cornelius, J.D., Senior Law & Policy Analyst, The Center for Health & Homeland Security

Currently, the U.S.  government monitors approximately 20 Chinese hacking groups; however, no system is flawless. Federal agencies reported that in fiscal year 2013, 9,883 malware attacks were launched.1 The number of intrusions was not released. In March 2014, Chinese hackers allegedly infiltrated the networks of the Office of Personnel Management (OPM), the Government Accountability Office … Read more