From the Summer 2021 Issue

How Do We Take the Sting Out of Being Stung?

Author(s):

-Larry Letow, Executive Vice President, Myriddian LLC , Operating Partner, Interprise Partners

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

how-do-we-take-the-sting-out-of-being-stung

With cyber-attacks and ransomware making the mainstream news, and consequences rippling out far past single layers of users or customers, how can we collectively take the sting out of getting stung by a common cyber-heist?  Attacks against networks, data stores, and business processes are not new by any means. Indeed, without getting too deep into … Read more

From the Winter 2021 Issue

Security-In-Motion, Complacency at Rest

Author(s):

-Larry Letow, Executive Vice President, Myriddian LLC , Operating Partner, Interprise Partners

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

Security-in-motion

2020 introduced a slew of new conversation topics for most people, few more so than among IT security professionals. While there are new technical challenges to consider for most in the business world, we cyber-minded folks find ourselves continuing to address the age-old question in data security – how can we provide more of EVERYTHING … Read more

From the Fall 2015 Issue

Getting Compliance and Security Right: The Importance of an Integrated, Effective, and Efficient Plan

Author(s):

Celia David, Director, Energy Practice, Navigant

Kenneth Lotterhos, Managing Director, Energy Practice, Navigant

Matthew M. Blizard, Director, Energy Practice, Navigant

The Challenges of the Bulk Electric System  Protecting the nation’s interstate power grid has never been more challenging or more important. Cyber and physical attacks are on the rise and digital equipment is proliferating on the grid, simultaneously enhancing reliability through automation and increasing the potential for vulnerability from cyber intrusions. Reversing the digital trend … Read more

From the Fall 2015 Issue

PLANNING AND EXECUTING AN EFFECTIVE DATA BREACH EXERCISE

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Why Regular Data Breach Exercises Are Required  Data breaches continue to trend up exponentially for all U.S. companies, government agencies, universities, and research facilities. Today, even our smartphones, public Wi-Fi, and homes are consistently being hacked for access to sensitive data. Nation states and privateer hackers have grown dramatically in numbers and capability over the … Read more

From the Fall 2015 Issue

Nobody’s Perfect: Why You Should Be Focused on Detection, Containment, and Response

Author(s):

Paul Caiazzo, Principal, TruShield Security Solutions, Inc.

Target. The United States Office of Personnel Management. Home Depot. UCLA. United Airlines. On the surface, these organizations seem to have more differences than similarities. But while they may operate in very different industries across the public and private sectors, these organizations do share a number of key commonalities which, when viewed together, illustrate a … Read more