From the Spring 2024 Issue

Brown Paper Packages Tied Up With Cyber – the Consumer Package Goods Industry and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

introduction A doorbell rings, a text message arrives- a package has been delivered to a front porch or loading dock. The Consumer Packaged Goods (CPG) industry delivers a wide range of products sold to consumers – safely, reliably, and routinely – from grocery stores to department stores. The CPG industry comprises businesses involved in producing, … Read more

From the Spring 2024 Issue

The Evolution of DoD‘s Cybersecurity Service Provider Program Evaluator Scoring Metrics

Author(s):

Roston Fyle, Cyber Strategist, CSIOS Corporation

Tyson Gee, Chief Compliance Officer, CSIOS Corporation

Introduction In the fast–paced world of cybersecurity, staying ahead of emerging cyber threats is not simply a necessity but an essential, constant challenge. Since its inception, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program has been at the forefront of the Department’s cyberwarfare battleground. Over the years, the Program has morphed significantly and … Read more

From the Fall 2023 Issue

Importance of a Project Plan with Cybersecurity Initiatives

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

project plan with cybersecurity initiatives

Cybersecurity Initiatives are all the rage with every new, trending buzzword and with each active threat or breach that makes its way into the common conversation pool – “We don’t know what it is, but we know we don’t want it!” comes close enough to discussions that happen in board rooms, team chats, and weekly … Read more

From the Fall 2023 Issue

The Significance of a Global Perspective/Team in Cybersecurity Planning

Author(s):

Larry Letow, CEO, U.S., CyberCX

Global Perspective/ Team in Cybersecurity

As technology progresses and even more of our daily activities become digitized, global issues continue to grow in complexity and pervasiveness. In our increasingly interconnected world, where information flows seamlessly across borders, the imperative for a global team and a comprehensive approach to cybersecurity has risen to a paramount level. A cyber-attack that originates thousands … Read more

Ransomware: Harbinger of the Future

Author(s):

Scott Blough | Associate Professor of Criminal Justice & Security Studies at Tiffin University, ,

Ransomware

The recent spate of ransomware attacks on Texas municipalities is a harbinger for the future of cyber-crime. In fact, according to various news sources, as of August 23rd, 2019, at least 22 municipalities in Texas have been affected by this recent ransomware outbreak. Although not all of those affected have gone public, there have been … Read more

From the Fall 2016 Issue

Cybersecurity Attacks Threaten 9-1-1 Response

Author(s):

Timothy Lorello, President & CEO, SecuLore Solutions

Our public safety infrastructure is under cyber-attack! Like every other part of the internet-based economy, these systems are continuously exposed to attacks that have been increasing at an alarming rate.  Over 240 million 9-1-1 calls are made every year, with over 75% coming from wireless phones.1,2 Almost 6,000 public-safety answering points (PSAPs) field the calls … Read more

From the Fall 2016 Issue

Illuminating Issues of Grid Cybersecurity

Author(s):

Joseph S. Abrenio, Vice President of Commercial Services, Delta Risk LLC

Introduction  Ongoing cyber-attacks are the new normal. Whether they’re the work of politically or criminally-motivated individuals, or the coordinated efforts of nation-state actors, our nation’s critical assets will continue to be bombarded by digital attacks. Those protecting our critical infrastructure must be vigilant to the ever-evolving cyber threats to the industry. Many of these threats … Read more

From the Fall 2016 Issue

Safeguarding American Democracy: Outcome-Based Cybersecurity in Election 2016

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

If you’re asking how foreign hackers can be prevented from manipulating the election, you’re asking the wrong question.  On May 31st, 1916, the British battlecruisers Indefatigable, Queen Mary, and Invincible were sunk within two and a half hours by the Imperial German Navy’s High Seas Fleet during the Battle of Jutland. In response to the … Read more