From the Spring 2015 Issue

The Blueprint to Cybersecurity Government Contracting: Phase One

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

The road to government contracts can seem complicated, even to a seasoned professional government contractor. It does not have to be that way. In this article I will attempt to simplify government contracting business development and explain its initial phases honestly and simply. Identify your capabilities by using government-recognized criteria. Capabilities statements are necessary in … Read more

From the Spring 2015 Issue

Getting Cybersecurity off the Back Burner and into the Boardroom

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Maybe it was the Sony hack, with corporate executives initially bowing to hacker demands while trying to recover from a multi-million dollar virtual smash-and-grab. Maybe it was the compromise of the Navy network and the resulting necessity of a task force to assess and shore up their defenses. Maybe it was the loss of 80 … Read more

From the Winter 2015 Issue

3 Simple Steps to Protect Your Business from Cybersecurity Losses

Author(s):

Matt Bergman, Shareholder, Shulman Rogers

Does your business accept credit card payments from customers? Does it purchase products or services from vendors or suppliers? If the answer is “yes” to either of these questions, read on. Virtually every business that uses a computer with internet access has already been hacked. Fortunately, most businesses have yet to experience the type of … Read more

From the Winter 2015 Issue

Cybersecurity and the C-Suite: 10 questions every executive should be able to answer

Author(s):

Jeff Peters, Editor, SurfWatch Labs

As cyber threats proliferate and become a bigger part of the public discourse, the management and responsibility of those threats is increasingly moving towards the highest levels of an organization – corporate executives and the board of directors. Yet many of those in the C-Suite do not have a sufficient high-level understanding of the risks … Read more

From the Winter 2015 Issue

THE TOP 12 SECURITY BREACH FACTS EVERY C-LEVEL EXECUTIVE AND BOARD MEMBER MUST KNOW

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Magnitude of the Threat  Over $500B of innovation and trade secrets secretly stolen each year: this means nearly every company with trade secrets is constantly targeted and compromised. The equivalent of $5 Trillion in total economic value removed from the U.S. economy each year (USA 2013 GDP: approx. $17 Trillion)  250,000+ cyber soldiers and nearly … Read more

From the Fall 2014 Issue

Maryland – Cash Investments and Tax Credits Add Up to Business Success for Cybersecurity Companies

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

The Internet Age has changed the business environment in the world. For instance, Silicon Valley in California has become the home to many high-tech business giants. New businesses attracted to Silicon Valley have brought high-paying jobs and with the jobs comes tax revenue for the state. With the changeover from a manufacturing economy to a … Read more

From the Fall 2014 Issue

Why Your Business Should Use Two-Factor Authentication

Author(s):

Greg Gunther, Software Engineer, Visionist, Inc.

A 2011 study by University of Cambridge computer security researcher Joseph Bonneau uncovered a shocking reality. Bonneau compared two password databases leaked from popular websites (Gawker and rootkit.com.) He discovered that over 31% of users who had an account on both sites reused the same password1. Equally troubling is the recent news that a Russian … Read more

From the Summer 2014 Issue

Cybersecurity Operations Strategy

Author(s):

B.B. Shariati, Cybersecurity faculty in the Department of Computer Science and Electrical Engineering (CSEE) UMBC, UMBC’s GPD Cybersecurity program at The Universities at Shady Grove

Don Bowers, Chief Scientist, National Security Operation, Leidos Corporation

Executive Summary  Cyber threat is pervasive, growing and real. Whether you are dealing with it professionally as a cyber-warrior or have been touched by cybercrime in your personal life. The “cyber threat is one of the most serious economic and national security challenges we face as a nation” (Obama, 2009). Cyber-attacks such as Advanced Persistent … Read more

From the Summer 2014 Issue

Above the Noise Floor: Security Measures in Your Network

Author(s):

Marc Milligan, Cyber Threat Analyst, Visionist, Inc.

In network security, a noise floor is a baseline or an acceptable percentage of false positives (when the system cries wolf) and false negatives (when it misses an actual security event) from your security products. No monitoring solution is fool proof, so you will need to develop a method of sorting out the good, the … Read more