From the Summer 2015 Issue

BRIDGING THE CYBER TALENT GAP, IASCA

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Passionate about a Problem Montana Williams has been described before as a cyber-evangelist, and after only a few minutes of speaking to him it’s easy to see why. His passion for cybersecurity, technology, and workforce development has taken him from a pivotal role in our nation’s nascent stages of cyber-warfare and cybersecurity to becoming one … Read more

From the Summer 2015 Issue

Growing the Silver Bullet

Author(s):

Chris Cook, Associate Director, CyberTexas

If America is ever able to adequately address today’s modern cybersecurity threats, it will mean that someone has discovered the “silver bullet” or, more realistically, that we’ve grown the workforce needed to successfully address the problem of a critical shortage of trained cybersecurity professionals.  San Antonio’s educational, governmental, and industrial institutions have taken a comprehensive … Read more

From the Summer 2015 Issue

Looking under the Hood of Cybersecurity Education

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Students in a computer security class are often taught about a new concept by action rather than explanation. By taking the actions they’re taught, they are actually part of the security solution, not just observers of a process. This also adds to their sense of accomplishment, since they are responsible for the outcome of the … Read more

From the Summer 2015 Issue

America’s Cyber Warriors: Appropriate Training at the Forefront

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

Professor William Butler, Cyber Security Program Chair, Capitol Technology University

Warrior: A man (or woman) engaged  or experienced in warfare;  broadly: a person engaged in some struggle or conflict.1 There are many challenges in building and developing a cyber army, from the senior leadership to the technical workforce. The term “Cyber Warrior” is being used by the media and throughout the Department of Defense to … Read more

From the Summer 2015 Issue

A-ISAC Cooperating to Protect Our Skies

Author(s):

Faye Francy, Executive Director, Aviation Information Sharing and Analysis Center

The aviation sector plays such a critical role in the world economy that it has become an attractive target for a variety of malign actor groups. Each year, the air transportation system carries over 2.6 billion passengers and 48 million tons of freight, making it the world’s greatest source of international trade, tourism, and economic … Read more

From the Summer 2015 Issue

The Need for Increased Cyber Threat Intelligence in the Electricity Sector

Author(s):

Brian Harrell, CPP, Director, Energy Security, Navigant

The electricity sector is in the midst of a fundamental cultural change with respect to cybersecurity. While the electricity sector has been the only critical infrastructure sector that has had mandatory and enforceable cybersecurity standards to date, this minimum level of protection is not enough to battle the continuous onslaught of malicious code and targeted … Read more

From the Summer 2015 Issue

The Next Big Data Breach: Don’t Let It Be You!

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Protection of information and data has always been one of the top priorities for organizations, governments, and businesses. For example, small restaurants have their “secret recipes” that set them apart from their competition. Larger organizations like Coca-Cola guard their product formulae and protect them like the Crown Jewels of England. On the government side, the … Read more

From the Summer 2015 Issue

Exploring Behavioral and Neuroscience Approaches to Cybersecurity: A Study of Phishing

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The behavioral factors that contribute to users falling victim to phishing attacks include a lack of understanding of how computer systems work, lack of attention, and phishers’ increasingly sophisticated methods of visual deception.  Attacks on our computer systems continue to increase in frequency and sophistication. Organizations invest significant resources in the development of cyber protection … Read more

From the Summer 2015 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,    Welcome to the Summer 2015 issue of the United States Cybersecurity Magazine! Now more than ever, threats from a wide variety of malicious entities with a vast range of motivations stream across the oceans, penetrating the defenses of every level of business and government. A widespread lack of awareness of the threats we … Read more