From the Fall 2018 Issue

Compliance: Complexity to Simplicity

Author(s):

Ryan Brady, Cybersecurity Analyst, ProObject

compliance header

Simplifying NIST SP 800-171 Compliance Process Since the contracting community has grown substantially, it also has led to a series of high profile breaches. These breaches involved the exfiltration of government data from contractors who were victims of hacks or insider threats. Incident response and forensics usually find the contractor was not updating systems regularly … Read more

From the Fall 2018 Issue

What’s the Big Hurry? The Urgency of Breach Notification

Author(s):

Ellen Cornelius, J.D., Senior Law & Policy Analyst, The Center for Health & Homeland Security

bigstock-Security-Breach-Cyber-Attack-C-129175730.jpg

Globally, about 5 million data records are lost or stolen each day. For each theft, consumers spend an average of 20 hours and $770 to attempt to rectify their losses. Individuals’ reputations suffer, sometimes permanently. Consumers should take action after they are notified of a data breach because there is a good chance that criminals … Read more

From the Fall 2018 Issue

Maryland’s Landmark Legislation: Cybersecurity Now More Attainable for Small Business

Author(s):

Mike Binko, CAMI Board Member - Policy & Legislative Affairs | Chairperson, StartUp Maryland | Founder & CEO

MD CAMI Heade

It is no secret that most small businesses nationwide are vulnerable to cyber-attacks, and fortunately for Maryland, stakeholders wanted to do something about it. Championed by elected officials – both Republicans and Democrats – with support from the Cybersecurity Association of Maryland, Inc. (CAMI), the Better Business Bureau (BBB) of Greater Maryland, the Maryland Department … Read more

From the Summer 2018 Issue

An Outsider’s Look at the United States Cyber Command: The 10TH Unified and 4TH Functional Combatant Command

Author(s):

Cesar Pie, President and CEO, CSIOS Corporation

cybercommand

The 10TH Unified and 4TH Functional Combatant Command The United States (U.S.), along with its allies and potential foes, are witnessing an unprecedented fast–paced evolution of the 21st century cyberspace domain landscape. As it relates to our military advancements, key milestones have included: the establishment of the U.S. Cyber Command or USCYBERCOM on June 23, … Read more

From the Summer 2018 Issue

BEARING THE BREACH: The Buzz About Cyber Insurance

Author(s):

Morgan Holmes, Commercial Property & Casualty Broker, Insurance Force

MH-Bearing-the-breach-heading

Is your data connection really safe? What happens if your secure Internet connection is not so secure? What are the chances of a breach happening to you? Would your company be able to recover from a data breach? No matter what your primary business market is or your company’s size, in today’s marketplace, electronic communications … Read more

From the Spring 2018 Issue

Cybersecurity Impacts of the EU GDPR

Author(s):

Henry J. Sienkiewicz, Author,

GDPR FEATURE IMAGE

Cybersecurity Considerations Around General Data Protection Regulation (GDPR) Data breaches and cyber-attacks have become commonplace. Every organization, regardless of the type of business or size, is a target. Safeguarding data (and it is data that is the ultimate target) is the challenge, a challenge that spans technical, military, political, and law enforcement concerns within a … Read more

From the Winter 2018 Issue

Closing the Gap: Supply Chain Risk Management

Author(s):

Christopher Jones, Senior IT Project Manager , CACI

Henry J. Sienkiewicz, Author,

Closing the Gap image

The growing sophistication of Information Technology (IT) and the proliferation of Internet of Things (IoT) devices continue to exacerbate vulnerabilities leading to cybersecurity risks. With the supply chain globalization and continued reliance on outsourcing, organizations depend heavily on diverse networks of partners and suppliers. Whether manufacturing sensors for industrial control systems (ICS) or developing software code, … Read more

From the Fall 2017 Issue

Cyber Deterrence and Active Cyber Defense

Author(s):

Colby Proffitt, Senior Analyst, NetCentrics Corporation

A necessary combination in a continuously evolving cyberspace The Roman Empire ruled the ancient world because it built and maintained roads1. Britain ruled the world for most of the 19th century because it had the largest and most powerful navy2, and the U.S. became recognized as a military superpower3 because of the atomic bomb. Each … Read more