From the Spring 2015 Issue

How Connected Is Too Connected? Cybersecurity for a Fully Networked World

Author(s):

Darin Andersen, Chairman & Founder, CyberTECH

The Internet of Things (IoT) has become one of the hottest topics among security and privacy experts in the last two years. In October 2013, when CyberTECH produced “Securing the Internet of Things,” the first “think tank” event on the topic, most people where just coming to terms with what the IoT was and what … Read more

From the Spring 2015 Issue

The Evolution of Information Security, Part One

Author(s):

Will Janssen, Business Development Director, Signals Defense

In 1980 Alvin Toffler famously declared that there are three waves of civilization – Agricultural (lasted centuries), Industrial (lasted decades), and the Information Age (now).1 Each new wave pushes the preceding wave aside. Information security operates in the Physical, “Wired” IT (information technology), and Radio Frequency (RF) operational domains. So, in a similar vein to … Read more

From the Spring 2015 Issue

Defense in the Age of Cyber-Warfare: the Cyber Security Forum Initiative

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Paul de Souza was the Chief Security Engineer for AT&T when he started noticing that the cyber-attacks he saw out in the field were changing, transitioning from what we think of as “traditional” cybercrime – done for money, information, or just “the lulz” – to something far more potent: attacks that were political in nature, … Read more

From the Spring 2015 Issue

Living on the Edge: Pushing the Boundaries of Cybersecurity for the Marine Corps Forces Cyber Command

Author(s):

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

Background Marine Corps Forces Cyber Command (MFCC) faces a big challenge often experienced by other cyber agencies: achieving a clear and consolidated picture of the cyberspace domain. MFCC plans, coordinates, integrates, synchronizes, and directs the full spectrum of Marine Corps cyberspace operations, including Department of Defense Global Information Grid operations and defensive cyber operations. When … Read more

From the Spring 2015 Issue

How to Win at Cyber-Chess: Leveraging Neuro Analytics in Your Cyberspace

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

The cyber domain presents limitless opportunities for cyber threat actors while causing significant challenges for cybersecurity professionals. While our current time might be construed by historians as the golden age of cybercrime, it is also an age that offers new ways and means to counter these crimes. Neuro-behavior forensics is such a means, permitting the … Read more

From the Spring 2015 Issue

In 2015, It’s All about the Data

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

A New World  2014 taught us that massive security breaches are the new normal for U.S. companies, government agencies, and universities. Some of the most prominent were Target, Home Depot, Neiman Marcus, Apple’s iCloud, Michaels, the U.S. Postal Service, the IRS, Community Health Services, UPS, Staples, the State Department, Sands Casinos, USIS, eBay, PF Chang’s, … Read more

From the Spring 2015 Issue

Cyber Maturity It’s Time to Be Accountable for Our Own Destiny

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Security professionals are a quiet bunch. It’s rare for them to publicly discuss known vulnerabilities used to attack targeted organizations. There are many reasons for this reticence. For one, a professionally laconic demeanor is standard issue in a group for whom operational security is a way of life. For another, today’s victim may very well … Read more

From the Spring 2015 Issue

Opening the Door for Women in Cybersecurity

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

As an industry, cybersecurity encompasses everything from government programs to healthcare, from power plants to automobiles. It touches nearly every aspect of our lives. Cybersecurity no longer is a separate industry but one that permeates every other industry. Previously the only defensive posture we had to take was with our military, business, or intellectual property, … Read more

From the Spring 2015 Issue

Eyes on Employees: Federal Agencies’ Top Assets and Biggest Security Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

Federal employees play a huge part in keeping our country running safely and efficiently, from gathering intelligence to protecting our borders to running our national parks. That said, they are also an increasing source of concern for IT security departments. In December 2014, market research firm Market Connections, in conjunction with SolarWinds, conducted a survey1 … Read more