Closing the Gap image
From the Winter 2018 Issue

Closing the Gap: Supply Chain Risk Management

Author(s):

Christopher Jones, Senior IT Project Manager , CACI

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

The growing sophistication of Information Technology (IT) and the proliferation of Internet of Things (IoT) devices continue to exacerbate vulnerabilities leading to cybersecurity risks. With the supply chain globalization and continued reliance on outsourcing, organizations depend … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine | SIX3RO

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their … Read more

From the Spring 2017 Issue

INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments

Author(s):

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

Cyber professionals generally know one thing – the cyber environment is constantly shifting. New business requirements, end-user needs and technologies change. New devices and applications create or remove vulnerabilities on a daily basis. Attackers respond … Read more