From the Summer 2018 Issue

BEARING THE BREACH: The Buzz About Cyber Insurance

Author(s):

Morgan Holmes, Commercial Property & Casualty Broker, Insurance Force

MH-Bearing-the-breach-heading

Is your data connection really safe? What happens if your secure Internet connection is not so secure? What are the chances of a breach happening to you? Would your company be able to recover from a data breach? No matter what your primary business market is or your company’s size, in today’s marketplace, electronic communications … Read more

From the Spring 2018 Issue

Cybersecurity Impacts of the EU GDPR

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

GDPR FEATURE IMAGE

Cybersecurity Considerations Around General Data Protection Regulation (GDPR) Data breaches and cyber-attacks have become commonplace. Every organization, regardless of the type of business or size, is a target. Safeguarding data (and it is data that is the ultimate target) is the challenge, a challenge that spans technical, military, political, and law enforcement concerns within a … Read more

From the Winter 2018 Issue

Closing the Gap: Supply Chain Risk Management

Author(s):

Christopher Jones, Senior IT Project Manager , CACI

Henry J. Sienkiewicz, Faculty, Georgetown University

Closing the Gap image

The growing sophistication of Information Technology (IT) and the proliferation of Internet of Things (IoT) devices continue to exacerbate vulnerabilities leading to cybersecurity risks. With the supply chain globalization and continued reliance on outsourcing, organizations depend heavily on diverse networks of partners and suppliers. Whether manufacturing sensors for industrial control systems (ICS) or developing software code, … Read more

From the Fall 2017 Issue

Cyber Deterrence and Active Cyber Defense

Author(s):

Colby Proffitt, Cybersecurity Strategist, Netskope

A necessary combination in a continuously evolving cyberspace The Roman Empire ruled the ancient world because it built and maintained roads1. Britain ruled the world for most of the 19th century because it had the largest and most powerful navy2, and the U.S. became recognized as a military superpower3 because of the atomic bomb. Each … Read more

From the Fall 2017 Issue

Opting in to Cyber Vulnerablity Part 2: Technical Education in America

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In the previous article in the United States Cybersecurity Magazine, Volume 5, Number 16 titled “Opting in to Cyber Vulnerability”, we examined the broad, “opt-in” nature of information insecurity in the United States. This article continues with an examination of the American educational enterprise with respect to preparing American students to safely and securely navigate … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their reliance on cyber operations and asymmetric warfare betrays them as weak players on the international stage, unable to project power … Read more

From the Spring 2017 Issue

Security Through Inclusion

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Larry Letow, CEO, U.S., CyberCX

It’s not the number of people in your security department, but the number of departments into security, that will make you secure. Creating a secure business is not about replacing part of your business with security functions, it’s about integrating security into business operations, as with any other business function. It’s certainly not about believing … Read more

From the Spring 2017 Issue

INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Cyber professionals generally know one thing – the cyber environment is constantly shifting. New business requirements, end-user needs and technologies change. New devices and applications create or remove vulnerabilities on a daily basis. Attackers respond and adapt as they seek to find exploitable weaknesses within the environment in order to reach an organization’s data. As … Read more