ProcessBolt
From the Spring 2015 Issue

Cyber Innovation Center: a Pioneer in Cyber-Education and Workforce Development

Author(s):

G.B. Cazes, Vice President, Cyber Innovation Center

What do you want to be when you grow up? This is a timeless question teachers across the country ask their students. A typical response: doctor, nurse, lawyer, fireman, veterinarian. While these are great occupations, today’s workforce not only includes these professions but also great opportunities for computer and data scientists, cybersecurity directors, digital forensics … Read more

From the Spring 2015 Issue

Creating Your Ultimate Code-Cracker: the Design of Digital Forensic Workstations

Author(s):

John Samborski, CEO, Ace ComputersUnited

Today most records of individuals, businesses, government agencies, and even criminal organizations are stored on various types of electronic media. In order to properly investigate a suspect, evidence needs to be extractable from electronically stored information (ESI) sources without being corrupted. Digital forensics is the acquisition, scientific examination, and analysis of data retrieved from digital … Read more

From the Spring 2015 Issue

Keep It Secret, Keep It Safe: Nine Steps to Maintaining Data Security

Author(s):

Alvita Fitzgerald, Vice President of Administration, Megadata Technology

Jessica Schneider, Strategic Communications Specialist, Megadata Technology

Megadata Technology is a cybersecurity company located in National Harbor, Maryland, just across the river from Washington, DC. As a company whose focus is on securing information for national organizations, it is important for our clients and our staff to always be aware of potential security breaches and ways to avoid them. Our years of … Read more

From the Spring 2015 Issue

Small Business Big Threats: Cybersecurity in Small Enterprise EnvironmentsUnited

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Megan Clark, Help Desk Technician, Bryn Mawr College

Cybersecurity may not seem like a priority for many small enterprise environments – after all, you’re small. Who would want to hack, phish, or spam you? But small enterprise environments face just as much, if not more, threat as large corporations. You need only look at recent news to see why small businesses may be … Read more

From the Spring 2015 Issue

The Blueprint to Cybersecurity Government Contracting: Phase One

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

The road to government contracts can seem complicated, even to a seasoned professional government contractor. It does not have to be that way. In this article I will attempt to simplify government contracting business development and explain its initial phases honestly and simply. Identify your capabilities by using government-recognized criteria. Capabilities statements are necessary in … Read more

From the Spring 2015 Issue

Getting Cybersecurity off the Back Burner and into the Boardroom

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Maybe it was the Sony hack, with corporate executives initially bowing to hacker demands while trying to recover from a multi-million dollar virtual smash-and-grab. Maybe it was the compromise of the Navy network and the resulting necessity of a task force to assess and shore up their defenses. Maybe it was the loss of 80 … Read more

From the Spring 2015 Issue

A SHOPPER’S GUIDE TO CYBER LIABILITY INSURANCE

Author(s):

Holly Winger, Esq., , Brenner, Saltzman & Wallman LLP

As the insurance specialist at Brenner, Saltzman & Wallman, I have reviewed a variety of insurance policies for clients with cybersecurity needs. Some host websites for marketing commercial real estate; others develop software to assist hospitals with monitoring patients for serious chronic conditions, or coordinate billions of credit transactions for retailers. These policies came to … Read more

From the Spring 2015 Issue

The Problem of Attribution in Cyber Attacks: The Sony Example

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

At Fort Sumter, Union troops quickly identified the forces that were bombarding them as newly minted Confederate artillery. Similarly, at Pearl Harbor, the U.S. Navy immediately identified Japan as the source of the bombing raid because of the unmistakable markings on the low-flying aircraft overhead. In attacks involving conventional warfare, “attribution,” or the identification of … Read more

From the Spring 2015 Issue

Looking to Make Your Leap: Protecting Yourself from Threats and Breaches in the Cloud

Author(s):

Vaughan Emery, President & CEO, CENTRI Technology

More businesses are moving their data to the cloud, due to its many attractive benefits: lower capital and operational overhead, faster and more efficient scalability, and increased flexibility, to name a few. According to a RightScale study,1 87 percent of businesses surveyed have migrated some or all of their communications and IT infrastructure to the … Read more