From the Winter 2015 Issue

Designing A Cybersecurity Solution: Security Reference Architectures

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Security reference architectures come in many flavors including industry-based, technology-based and enterprise-specific. When looking for some directional guidance when designing a cybersecurity solution, a cybersecurity professional can leverage the security reference architecture. The cybersecurity solution design may take the form of prevention and/or remediation of a particular prioritized risk found within the risk register. For … Read more

From the Winter 2015 Issue

Preparing the Cybersecurity Workforce Through Creative Partnering

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

Cybersecurity is an industry that is quickly emerging in the new “Creative Economy” and community colleges are stepping in to prepare the workforce of the future. Just as we have seen in the past, as the economy shifts and workforce needs change, the approach to education and training also must evolve. In this new economic … Read more

From the Winter 2015 Issue

Cybersecurity is a STEMB Field … … and the B Isn’t Silent!

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Put together a bunch of passionate academics, government officials, and industry leaders who love to discuss their niche in the vast, exciting, multi-disciplinary field of cybersecurity – and sparks are bound to fly! And this is exactly what happened at the National Initiative for Cybersecurity Education (NICE) conference held in Columbia, Maryland, November 5-6, 2014. … Read more

From the Winter 2015 Issue

Next Generation Espionage

Author(s):

Daren Dunkel, Chief of Staff, McAfee

As we enter the new year we approach the one year anniversary of the Target corporation hack. Their CEO is out of a job, their board of directors is being sued, and the brand has suffered, by some estimates, $1 billion in damages. Unfortunately the Target Corporation is not an isolated example. Recently the headlines, … Read more

From the Winter 2015 Issue

Addressing the Growing Shortage of Cybersecurity Professionals By Creating a Cybersecurity Talent Pipeline

Author(s):

V. N. Berlin, PhD, President, Mission Critical Institute

Accelerating Demand for Cybersecurity Professionals  The demand for job-ready cybersecurity professionals to address the ever-increasing incidents of cyber threats and breaches in both the public and private sectors is projected to grow at a CAGR (Compound Annual Growth Rate) of 13% through 2017. Thus, with over 150K new cybersecurity positions added annually through 2017, industry … Read more

From the Winter 2015 Issue

3 Simple Steps to Protect Your Business from Cybersecurity Losses

Author(s):

Matt Bergman, Shareholder, Shulman Rogers

Does your business accept credit card payments from customers? Does it purchase products or services from vendors or suppliers? If the answer is “yes” to either of these questions, read on. Virtually every business that uses a computer with internet access has already been hacked. Fortunately, most businesses have yet to experience the type of … Read more

From the Winter 2015 Issue

Cybersecurity and the C-Suite: 10 questions every executive should be able to answer

Author(s):

Jeff Peters, Editor, SurfWatch Labs

As cyber threats proliferate and become a bigger part of the public discourse, the management and responsibility of those threats is increasingly moving towards the highest levels of an organization – corporate executives and the board of directors. Yet many of those in the C-Suite do not have a sufficient high-level understanding of the risks … Read more

From the Winter 2015 Issue

Seeing the Entire Elephant: Or,You’re Not Secure if You’re Not Completely Secure

Author(s):

Anne Kohnke, Assistant Professor of IT, Lawrence Technological University

Dan Shoemaker, Professor - Center for Cyber Security, University of Detroit Mercy

Almost everybody thinks, or would like to think, that the systems that power our society are secure. That would be a seriously incorrect assumption. The fact is that America’s electronic infrastructure is riddled with the type of vulnerabilities that have allowed computer crime to officially surpass the drug trade in the past decade. To illustrate … Read more

From the Winter 2015 Issue

Cybersecurity’s Three Great Lies – and Five Steps to Avoid the Threats They Enable

Author(s):

Christina Wiegand, Director of Commercial Services, TeleCommunication Systems (TCS) Cyber Intelligence Group

When hackers look for targets, they typically focus on big organizations because they’re the ones with the most credit cards, state secrets and other lucrative hauls, right? Wrong. As the widely reported Target credit card breach shows, hackers often focus on small organizations as a way to attack large enterprises and government agencies. In February … Read more