From the Summer 2018 Issue

It’s Time for Digital Health and Hygiene

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

digital-hygiene-header

Physical health and hygiene education in primary and secondary schools is taken as a given now, but it wasn’t always so. It was not until 1840 that Rhode Island legislation made health education mandatory.1 The 1850 publication by school teacher Lemuel Shattuck, of the Report of a General Plan for the Promotion of Public and … Read more

From the Summer 2018 Issue

National Cybersecurity Center of Excellence

Author(s):

William C. Barker, NIST Guest Researcher, Dakota Consulting

wbarker-header

American information infrastructure is subject to continuous attack by malicious actors. The national security and economic consequences of these threats have motivated the national security community to develop a set of cybersecurity policies and supporting technologies. Many of these initiatives have been led by the National Security Agency, U.S. Cyber Command, the Defense Information Systems … Read more

From the Summer 2018 Issue

The Criticality of Context in Threat Intelligence

Author(s):

Gary R. Hayslip, Deputy Director and CISO, City of San Diego

Organizations commonly associate the purchase of the latest security technology to create a sense of protection from attacks. Unfortunately, cybersecurity is more than just hardware, software, or a new cloud service. Deploying security without context gives organizations a false sense of protection, making them less resilient and more vulnerable to the cyber incidents that they … Read more

From the Summer 2018 Issue

The Executive Case for Active Insider Threat Management

Author(s):

Dr. Rebecca Wynn, Head of Information Security, Matrix Medical Network

rwynn-header

Every company will face an insider-related security incident sooner or later, regardless of whether it will be caused by a malicious action or an honest mistake. Key Considerations for Dealing with Senior Management Where The Information Security Leader Fits Within the Organization: Without the appropriate title, support and platform, success will be difficult to attain. … Read more

From the Summer 2018 Issue

Tell it to the Marines: Leadership Principles and Network Security

Author(s):

Henry J. Sienkiewicz, Author,

Tom Costello, Network & Systems Technician, XR Trading LLC

BAMCIS

It’s after-hours on a Friday. You are talking a remote employee through installing a next-generation firewall. No traffic is passing through the network and now you’re stuck on the project until it’s fixed. Weekend off-hours maintenance windows in the name of improving cybersecurity posture can be some of the most high-stress, high-risk, low-morale projects undertaken … Read more

From the Summer 2018 Issue

Tackling the Gorilla: The C-Suite’s Role in Cyber Risk

Author(s):

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

tackling-the-gorilla-header

Over the last five years, cyber risk management has become one of the top five organizational challenges facing organizations in all sectors, globally.1 Advances in information and computing technology have outpaced the capabilities of enterprise security protections. Understanding cyber risks is critical to the survival of enterprises in a globally linked marketplace. To tackle the … Read more

From the Summer 2018 Issue

Cybersecurity Compliance: Defending Your Small Business

Author(s):

Joy Galliford, Vice President of Cyber Programs, Joy Galliford

Young-hacker-in-data-security--168105173

We see it in the news almost daily — malicious cyber activity, security breaches, and privacy violations. But that only impacts large enterprises like Target, Citibank, and Facebook, right? Wrong. In an ever-evolving digital world, small businesses have their own set of cybersecurity responsibilities that must be met in order to do business. This is … Read more

From the Summer 2018 Issue

Building a Security Program for Small to Medium Businesses

Author(s):

Wilson Bautista, Director of Information Technology and Information Security, i3 Microsystems, a division of i3 Electronics

programer-block-header

According to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there … Read more

From the Summer 2018 Issue

Data Classification is the Key to Data Protection, Part I

Author(s):

Bill Bonney, CISO Desk Reference Guide, CISO DRG Venture

bill-bonney-data-protection

“No, no!” said the Queen. “Sentence first – verdict afterwards.” “Stuff and nonsense!” said Alice loudly. “The idea of having the sentence first!” The value proposition for data is not in its protection (sentence), but in its use (verdict). In this series of articles, we’re going to explore an alternate value proposition for data classification … Read more

From the Summer 2018 Issue

An Outsider’s Look at the United States Cyber Command: The 10TH Unified and 4TH Functional Combatant Command

Author(s):

Cesar Pie, President and CEO, CSIOS Corporation

cybercommand

The 10TH Unified and 4TH Functional Combatant Command The United States (U.S.), along with its allies and potential foes, are witnessing an unprecedented fast–paced evolution of the 21st century cyberspace domain landscape. As it relates to our military advancements, key milestones have included: the establishment of the U.S. Cyber Command or USCYBERCOM on June 23, … Read more