From the Spring 2018 Issue

A Disciplined Approach to Cybersecurity Program Management

Author(s):

Brian Hubbard, Director of Commercial Strategic Business and Cybersecurity Solutions, Edwards Performance Solutions

Brian Hubbard feature image

In many organizations, the Chief Information Security Officer (CISO) and their team understands the need for a strategic approach to managing an enterprise information security program. However, continual tactical “fire drills” rarely allow time to be dedicated to strategic objectives. Given typical CISO resource constraints, efficient and effective operations are critical to success. Running a … Read more

From the Spring 2018 Issue

Cybersecurity Impacts of the EU GDPR

Author(s):

Henry J. Sienkiewicz, Author,

GDPR FEATURE IMAGE

Cybersecurity Considerations Around General Data Protection Regulation (GDPR) Data breaches and cyber-attacks have become commonplace. Every organization, regardless of the type of business or size, is a target. Safeguarding data (and it is data that is the ultimate target) is the challenge, a challenge that spans technical, military, political, and law enforcement concerns within a … Read more

From the Spring 2018 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, If you haven’t seen the Beatles’ 1968 animated masterpiece Yellow Submarine, you’re missing out on one of the great treasures of 20th-century cinema. There’s a scene in which Ringo and George are discussing George’s driving off in what Ringo says is his car: Ringo: Hey, that’s my car, lad. George: How do you know … Read more

From the Spring 2018 Issue

from the {PUBLISHER}

Author(s):

Karen Austin, Publisher, United States Cybersecurity Magazine

Greetings, Welcome to the Spring 2018 issue of the United States Cybersecurity Magazine! As always, we’d like to take a moment to express our heartfelt gratitude to our supporters, our members, our sponsors, our contributors and everyone else who makes the magazine possible. All of us here at the United States Cybersecurity Magazine will continue … Read more