From the Spring 2022 Issue

Comply with Cyber Insurance Requirements and Save: Focus on Your Company’s Risk Profile

Author(s):

François Amigorena, Founder and CEO, IS Decisions

It isn’t a matter of if, but when your organization will come against a cybersecurity threat. And more organizations are seeking cyber insurance to mitigate eventual costs. But with both cyber insurance premiums and the risk of cyber-attacks on the rise, cyber insurance is set to become even more expensive or limited in scope, or … Read more

From the Spring 2022 Issue

Cyber Talent: Hiding in Plain Sight

Author(s):

Dr. Jason Edwards, Director of Cybersecurity Strategy and Planning, USAA

Griffin Weaver, Senior Legal Counsel, Dell Technologies

We live in a time when ransomware attacks, nation-state “cyber warfare,” and having a remote workforce is the norm rather than the exception. If you ask most company executives, particularly those responsible for protecting company information and systems, Cybersecurity has never been more important. It’s essential to have the right tools, the proper funding, and, … Read more

From the Spring 2022 Issue

Information Warfare and Government Policy: Creating a Holistic U.S. Cyber Posture Through Cyber Survivability

Author(s):

Jessica Trombley-Owens, Vice President, System & Mission Engineering, PLEX Solutions, LLC

The Next Pearl Harbor The former director of the CIA and once Defense Secretary, Leon Panetta, warned of the possibility of a “cyber-Pearl Harbor”. More specifically he referenced the use of both cyber and physical attacks on key military and critical infrastructure systems that would result in grave detriment to the U.S. and that the … Read more

From the Spring 2022 Issue

CECOM SEC’s Women of Cyber

Author(s):

Ron Lee, CECOM SEC Strategic Communications Specialist, CECOM SEC

Aberdeen Proving Ground, MD – The true strength of the U.S. military comes from its diversity. There is not just a diversity of weaponry, equipment, and tactics used on the battlefield with the widely adopted concept of multi-domain operations, but also, diversity in representation, perspectives, and thought. More than ever in its history, women in … Read more

From the Spring 2022 Issue

U.S. Army C5ISR Center CSSP: Leading the Way to a Defend Forward Stance

Author(s):

Bill Christman, Chief, Defensive Cyber Solutions Branch

Cesar Pie, Strategist, Defensive Cyber Solutions Branch

Clinton Hackney, Strategist, Defensive Cyber Solutions Branch

Greg Weaver, Team Lead, Defensive Cyber Solutions Branch

DOD CSSP Program: A Plateau Difficult to Overcome Since its establishment in 2001, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program (hereafter Program) has progressively and systematically matured to become one of the most critical components of the Department’s Defense–in–depth strategy. Today, 27 authorized (certified) DOD CSSPs are responsible for provisioning 24x7x365 cybersecurity … Read more

From the Spring 2022 Issue

Moving Toward a “Continuous Adaptive Trust”

Author(s):

James Christiansen, VP, Cloud Security Transformation, Netskope

The term “Zero Trust” is the lack of implicit trust. When we started with “zero trust,” we no longer trusted users because they weren’t on our network domain.  As our staff went remote, we had to input stronger authentication to move from Zero Trust to some level of implicit trust. The problem is that trust is all or … Read more

From the Spring 2022 Issue

4 Regulatory Frameworks: Retain and Grow Your Client Base

Author(s):

Erin Birckhead, Audit Senior Manager, SC&H Group

4 Regulatory Frameworks

When it comes to data security and compliance, both domestically and internationally, companies must appropriately structure and properly equip their internal environments to mitigate risk and issues. In doing so, companies demonstrate that security is a top priority, which can help strengthen their relationships with current clients and elevate their ability to attract and recruit … Read more