ProcessBolt
From the Winter 2015 Issue

THE TOP 12 SECURITY BREACH FACTS EVERY C-LEVEL EXECUTIVE AND BOARD MEMBER MUST KNOW

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Magnitude of the Threat  Over $500B of innovation and trade secrets secretly stolen each year: this means nearly every company with trade secrets is constantly targeted and compromised. The equivalent of $5 Trillion in total economic value removed from the U.S. economy each year (USA 2013 GDP: approx. $17 Trillion)  250,000+ cyber soldiers and nearly … Read more

From the Winter 2015 Issue

Your biggest cyber threat? Naïve end-users

Author(s):

Kelvin O. Medina, Principal Security Consultant, Trustwave

If your end-users lack awareness, your sensitive data will be at risk  Background Approximately 50 percent of all security breaches within the Federal Government are caused by a lack of user compliance, according to a report released last year by MeriTalk and developed in collaboration with Akamai Technologies, Inc.1 This illustrates that even though security … Read more

From the Winter 2015 Issue

CyberTECH: Sharpening the Vision for the West Coast’s Cyber Hub

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

Launched in 2013, CyberTECH is one of the most visible drivers helping to establish San Diego as the West Coast’s cybersecurity hub. The 501(c)(3) non-profit organization operates as a global cybersecurity and Internet of Things (IoT) network ecosystem, providing cybersecurity and IoT resources, strategic programs and quality thought leader IoT forums and events across the … Read more

From the Winter 2015 Issue

Non-Competes in the Cybersecurity Industry

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Usually, you can’t develop cybersecurity products and businesses by yourself. You need to work with others and, in the process, to disclose, to them, confidential information. In doing so, most cybersecurity companies will want to protect their proprietary technology, customer and prospects lists, and other trade secrets as much as possible. Furthermore, many cybersecurity companies … Read more

From the Winter 2015 Issue

Welcome to Security in the 21st Century— Monitoring Employee Behavior

Author(s):

-Larry Letow, President, U.S. Region, CyberCX

Jim Mazotas, Founder, OnGuard Systems LLC

“All human beings have three lives: public, private, and secret.”  — Gabriel García Márquez, Gabriel García Márquez: a Life  “Experience should teach us to be most on our guard to protect liberty when the government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The … Read more

From the Winter 2015 Issue

What You Don’t See Can Hurt You

Author(s):

Peter Velikin, Vice President of Marketing, Pwnie Express

Protecting enterprises from hacks and other malicious activity is a challenge for organizations, both in the public and private sectors. The drumbeat of breaches continues and there are no signs of it slowing. The stakes have never been higher. The types and frequency of attacks are increasing and securing your organization has never been more … Read more

From the Winter 2015 Issue

Applying Analytical Tools to Cybersecurity

Author(s):

Joseph Lukowski, President, Laredo Technical Services, Inc.

There is a Method to the Madness of Criminal Intent  Late last summer, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major US contractor for security background investigations for the US Government. Initial estimates indicate that the hacking included more … Read more

From the Winter 2015 Issue

DEVELOPING CYBER SKILLS WITH PUZZLES AND HACKING CHALLENGES

Author(s):

Nikolas Roby, Security/Defense Research Analyst, Parrot Labs - KEYW Corporation

I meet a variety of people trying to enter into the information security and forensics fields. Many of them come straight out of college and have a great deal of theoretical knowledge, but often lack any real world skills. Unfortunately, to gain these skills you need to work real world scenarios, which are hard to … Read more

From the Winter 2015 Issue

Debunking the Big Bad “Cloud”

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

There are some topics that seem to be shrouded with uncertainty and confusion and the “Cloud” is one of those topics. I was talking with a fellow CISO of a Federal Agency a few weeks back and the topic of “cloud migration” came up. Not unexpectedly, my CISO friend expressed that the biggest obstacles to … Read more

From the Winter 2015 Issue

I’m Not a Hacker, I Just Play One in the Classroom

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Influencing Ethical Behavior by Example  Providing education in the area of information security, cybersecurity, and computer and network security poses numerous challenges. First, there is a great deal of information that must be dispensed to the learners. Second, in addition to presenting the necessary background information, there are practical skills that must be shared with … Read more