ProcessBolt
From the Spring 2014 Issue

THE (SLOWLY) EVOLVING LANDSCAPE OF SECURITY CLEARANCES IN THE CYBERWORLD AFTER SNOWDEN

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

Shortly after Edward Snowden burst onto the scene in May 2013, we learned — too late — that there were multiple “red flags” in his background investigation that should have prevented him from gaining access to the countless numbers of classified National Security Agency (NSA) documents that he leaked. Although Snowden has caused untold damage … Read more

From the Spring 2014 Issue

The Effects of Data Breaches on the Modern Consumer

Author(s):

Michael Finney, , Mystic Waters Media

Information Security in the Public Eye  While IT security specialists have been diligently watching the industry evolve for years now, the average citizen has only recently become aware of the day-to-day risks. Residing in the most popular gaming devices, mobile apps & stores are threats that could compromise users’ personal data. Many times, without a … Read more

From the Spring 2014 Issue

Near-Term Vision of IT Security Threat Monitors

Author(s):

Benjamin Shelton, , Nangwik Services

Don Tobin, ,

Continuously updating, learning and optimizing in an ever-changing “threatscape”   As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There … Read more

From the Spring 2014 Issue

“Cutting through the Chatter – Can the Federal Government Lead in Developing Cybersecurity Standards?”

Author(s):

David Robbins, Chairman, Government Contracts Practice, Shulman Rogers Gandal Pordy & Ecker, P.A.

Cybersecurity has a dirty little secret. Despite all the buzz, nobody knows what cybersecurity actually is. Many people have ideas about what cybersecurity should be. And there are dramatic predictions about market size. But we are not yet at a point where anyone can say, authoritatively, what cybersecurity actually is. We are in the digital … Read more

From the Spring 2014 Issue

Focusing a Leader’s Lens on Cybersecurity Within a Vast Framework Landscape

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Cyber Threats Abound  When dealing with Cybersecurity, a leader must be vigilant and at a moment’s notice be able to evaluate his or her organization’s security posture in regards to cyber threats. Cyber threats are typically viewed from GRC perspectives including governance, risk and compliance but equally important perspectives include policy, value, service, program, and … Read more

From the Spring 2014 Issue

How Not to Become the Next Headline: Wake-Up Call by the Largest Data Breach in History

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

As the largest breach in history unfolded, most executives were both disappointed that it occurred to a great American brand and relieved that it missed them…for now.  Breach! The massive data breach and its resulting fallout is a stark reminder to senior executives and Boards of U.S. companies that they will remain vulnerable 24x7x365 until … Read more

From the Spring 2014 Issue

Preventing Friends and Foes from CyberSpying on YOU

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

We all are well aware that cyber attacks continue to increase in complexity, frequency and severity. These malicious cyber activities continue to grow at an unprecedented rate, severely threatening the nation’s public and private information infrastructure, as well as our very essence – our identities, our data, our personal conversations, our finances, and all aspects … Read more

From the Spring 2014 Issue

A Unique Approach to Strengthening Our Nation’s Security and Resiliency

Author(s):

Maureen Thomas, Editorial Board, GovConnects

There are many challenges facing the homeland security enterprise, from enhancing coordination among government agencies and facilitating more effective public-private partnerships, to businesses struggling to succeed in the homeland security marketplace and the challenge with the public and private sectors developing better, cost-effective solutions for our federal, state and local first responders and critical infrastructure … Read more

From the Spring 2014 Issue

Time to DOD Cybersecurity

Author(s):

Jeffrey R. Cook, CPA, CITP, CIPP, IT Audit and Advisory Services Lead, Government Contract Services Group, Aronson LLC

IMPLEMENTING AND PAYING FOR THE NEW DFARS UCTI SAFEGUARDING CONTRACT CLAUSE  Historically, information security on contracts with the Department of Defense was considered necessary for classified but not other types of information. That changed on November 18, 2013, when DoD issued a final rule in the Federal Register that Unclassified Controlled Technical Information (UCTI) is … Read more