From the Fall 2025 Issue

Enhanced Cybersecurity and Digital Transformation: Critical Solutions for Successful Business Transformation in the Digital Age

Author(s):

Candy Ferguson-Phillips, CISO, ISO 27001 practitioner, and founder of the Risk to ROI™ Resilience Framework, Global Business Information Systems

Dr. Michael C. Redmond, PhD, MBA, ISO Certifications, CEO and Sr. Lead Implementer and Sr. Lead Auditor , Redmond Worldwide

Susan Augustine, Communications and Technology Manager, BVI Ports Authority

Digital transformation is a key component of the modern business landscape. And, with the expansion and prevalence of digital devices, networks and systems – comes an ever-greater risk of cybersecurity threats that could potentially create major disruptions or downsides. This emphasizes that organizations must strategically address cybersecurity in their digital transformations, to ensure the successful … Read more

From the Fall 2025 Issue

AI-Powered Software Factories: Accelerating The Mission in the Era of Great Power Competition

Author(s):

Danny Gershman, Founder and CEO, Radius Method

In December 2020, the cybersecurity world was rocked by the discovery of the SolarWinds breach, a sophisticated supply chain attack that compromised thousands of organizations, including critical U.S. government agencies. It was a stark reminder that in the 21st century, the frontlines are not just geographical—they are digital. Today’s conflicts are waged in cyberspace, where … Read more

From the Fall 2025 Issue

Unified Linkage Models: Recontextualizing Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

Unified Linkage Models

I. Introduction Cybersecurity frameworks have traditionally relied on a hierarchical approach to map assets, threats, and controls, mappings often done in a static, linear fashion.  While enormously useful and highly effective for baseline security posture, these models often fail to account for the dynamic and evolving relationships between system components. This is in part because … Read more

From the Fall 2025 Issue

States, Stakes and Your Stack

Author(s):

Chris Pogue, Director, Digital Forensics and Incident Response, CyberCX

Geopolitics isn’t background noise anymore; it’s in your threat model.  State-backed operators target the same clouds, identity systems, and vendors you rely on every day.  As Assistant Director of FBI Cyber Brett Leatherman put it: “Who among you can stand up to the PLA?  I hope you don’t think you can … because you can’t.” … Read more

From the Fall 2025 Issue

AI and Robotics Are Reshaping Security — But Humans Still Hold the Line

Author(s):

Scott R. Gane, CPP, President and Chief Security Officer (CSO), Huffmaster

We have passed the point of novelty; we’re beyond speculation, and we’re now squarely in a world where AI, most commonly in robots, as well as cameras and access control are an integral and necessary component of security infrastructure. In a time when sophisticated AI-driven threats are challenging traditional security, the human security officer needs … Read more

From the Fall 2025 Issue

Unmasking the Encrypted Threat: Reclaiming Visibility in TLS 1.3 & QUIC Era

Author(s):

Gurdeep Gill, Software Engineer Technical Leader, CISCO Systems

Unmasking the Encrypted Threat - CISCO

For decades, encryption has served as the foundational pillar of digital security. It has rigorously safeguarded sensitive data and ensuring privacy across global networks. However, this core technology, while engineered as a protective measure, has counter-intuitively introduced a significant operational hurdle for modern cybersecurity teams. The widespread adoption of advanced protocols like TLS 1.3 and … Read more

From the Fall 2025 Issue

Rhizomatic Threats in Practice: Applied Cybersecurity Modeling for Emergent Threat Landscapes

Author(s):

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

Introduction The rise of decentralized digital infrastructures and flexible adversary ecosystems has destabilized traditional cybersecurity assumptions. Threat actors today often operate not within rigid hierarchies but through fluid, self-organizing networks resembling rhizomes—a concept introduced by philosophers Gilles Deleuze and Félix Guattari (1987).[1] A rhizome, as described in A Thousand Plateaus, is a non-hierarchical, horizontally propagating … Read more

From the Fall 2025 Issue

It’s Not If or How, But When You Will Be Subject to a Cyber Attack

Author(s):

Jacqui Magnes, CEO and Owner, COMSO, Inc. dba CISPOINT

CISPOINT

Gone Are the Days of Having a Lone ‘IT Guy’ Understanding the Inevitable The rapid evolution of cyber threats means that every organization, from multinational corporations to small nonprofits, is in the crosshairs. Cybercrime costs are projected to reach $10.5 trillion annually by 2025, according to Cybersecurity Ventures. Attackers are armed with automated tools that … Read more

From the Fall 2025 Issue

From On-Premises to the Cloud: Transforming Cyber Resilience for Mission-Critical Systems

Author(s):

Josh Salmanson, Vice President, Defensive Cyber Practice, Chair of the WashingtonExec Cyber Council, Leidos

Organizations across environments such as military platforms, base operations, industrial control systems/supervisory control and data acquisition (ICS/SCADA), internet of things (IoT), and operational technology (OT) systems face an evolving threat landscape driven by advancements in technology, increased interconnectivity, and the sophistication of adversaries. Cloud computing can significantly enhance the operations and resilience of systems across … Read more

From the Fall 2025 Issue

From Computer Security Incident Response Team (CSIRT) to Cybersecurity Service Provider (CSSP)

Author(s):

-Zemma Chachu, Program Manager, Leidos

Cesar Pie, Strategist, CSIOS

The 30 Year Journey of the U.S. Army’s C5ISR (Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance) Center CSSP Since 1996, the C5ISR Center CSSP has cemented its position as one of the top Federal CSSPs protecting and defending a portion of the Department of War (DoW) cyberspace domain. In recognition of its upcoming … Read more