From the Spring 2016 Issue

New Possibilities for Solving CYBERCRIME

Author(s):

William J. Britton, Interim Chief Information Officer and Cybersecurity Center Director, California Polytechnic State University (Cal Poly)

Combatting cybercrime is where we, as a society, find ourselves in uncharted territory.   The criminal of today does not rely on in-person interaction, but on the continually-shifting dynamics of the Internet. It is arguable that every crime involves some sort of cyber component, whether as its culminating element or an intermediary step. In either circumstance, … Read more

From the Spring 2016 Issue

Digital and Physical Security Converged: How to Achieve the Next Generation of Cyber Defense

Author(s):

Christopher Ensey, Chief Operating Officer, Dunbar Security Solutions

With more than 80 million related events occurring annually, cybersecurity is one of the biggest concerns for companies today.1 And since 55 percent of attacks in 2014 were carried out by insiders – actors with either physical or remote internal access to an organization’s systems – it is clear that cyber-attacks do not occur in … Read more

From the Spring 2016 Issue

Cyber-Physical Security for 3D Printing

Author(s):

Sharon Flank, Ph.D., CEO, InfraTrac, Inc.

Counterfeiting threatens profits, compromises brand reputation, and endangers customers. A fake bag or watch may seem like a harmless bargain, but buyers are often unaware that its profits fund organized crime or even terrorism. The dangers of counterfeit medical devices, airplane parts, and truck brakes are another matter entirely. The U.S. economy relies on intellectual … Read more

From the Spring 2016 Issue

Technology and the Tension between Security and Privacy

Author(s):

Connie Uthoff, Asst. Director of Cybersecurity Strategy and Information Management Masters, George Washington University

At the Electronic Privacy Information Center (EPIC) Champions of Freedom event in June 2015, Apple CEO Tim Cook stated, “Like many of you, we at Apple reject the idea that our customers should have to make tradeoffs between privacy and security. We can and we must provide both in equal measure. We believe that people … Read more

From the Spring 2016 Issue

What’s Next for Cybersecurity in Maryland?

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

When asked about his recent transition from Garrison Commander at Fort George G. Meade to Director of Cyber Development in the Maryland Department of Commerce (previously the Maryland Department of Business and Economic Development), Ken McCreedy laughed and said, “It’s been a whirlwind.” The retired U.S. Army colonel has taken on this prestigious role in … Read more

From the Spring 2016 Issue

The Changing Tide of Enterprise IT

Author(s):

Tom Caldwell, Co-Founder/EVP, CyberFlow Analytics

The expansion of network-connected devices that has been dubbed the Internet of Things (IoT) has also brought about a sea change in enterprise information technology (IT). While this change has been occurring over several years, it is now accelerating, drawing increased attention and necessitating adjustment. Traditional enterprise IT shops are often separated into silos containing … Read more

From the Spring 2016 Issue

Reinforcing the Links to Strengthen the Chain: Vendor Risk Management

Author(s):

Jennifer Donaldson, CRISC, Senior Vendor Risk Analyst, FedEx Services

Kimberly Lofties, CRISC, Senior Vendor Risk Analyst, FedEx Services

Housekeeping, landscaping, tax preparation, and automobile services are all best left to the experts. Private individuals outsource because it saves time and money, and businesses do the same. The top reasons companies outsource are to lower operational and labor cost, and to focus on their core business functions.1 Outsourcing relieves the pressures of large monetary … Read more

From the Spring 2016 Issue

Maryland Cybersecurity: We Are Many, We Are One

Author(s):

Gina Palladino, Owner, Silver Tree Consulting, Inc.

Stacey Smith, Executive Director, Cybersecurity Association of Maryland, Inc.

“Maryland has effectively leveraged its existing assets, proximity to the federal government, and strong leadership both at the gubernatorial and congressional delegation level to brand itself as the ‘cybersecurity epicenter’ of the country.” A bit of cybersecurity history In 1903, magician and inventor Nevil Maskelyne disrupted John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s supposedly … Read more

From the Spring 2016 Issue

Information Security: THE CYBER CHESS CLUB

Author(s):

Cait von Schnetlage, MBA, CEO, Full Suite Solutions

Information security doesn’t start and end with business development experts and implementation specialists. It should have its roots within the foundations of a company, its core concept, and its leadership. Information security practices need to be built into all business processes, including how personnel communicate within the organization and externally with customers, vendors, and competition. … Read more

From the Spring 2016 Issue

Can Employee Behavior Indicate an Insider Threat?

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

While technology can play an important role in identifying an insider threat, it is equally important not to overlook behavioral patterns. Malicious employees often provide warning signs as they move from the idea of acting ‘not in accordance with established policies’ to outright data theft. These signs often take the form of changes in attitude … Read more