Cybersecurity Acronyms – A Practical Glossary

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Acronyms

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having dual meanings – think IP address and IP for Intellectual Property – and some acronyms having very slight differences. Here, … Read more

From the Summer 2015 Issue

A Time for American Leadership in Cybersecurity

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Fellows of non-partisan think tank ICIT1 frequently get called upon to provide expert cybersecurity advice and analyses to congressional members and government leaders.  On the evening of April 30th, 2015, we participated in a fascinating discussion with Michael Echols, Director of the Cyber Joint Program Management Office.2 This discussion made one thing clear to me: … Read more

From the Summer 2015 Issue

How to Increase Your CEO and Board’s Cybersecurity Literacy

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Current State As 2015 unfolds, cybersecurity is the hot topic in boardrooms today. According to Forbes, 2014 was the year of the data breach, and we would be wise to brace for more in 2015.1 FireEye CEO Dave DeWalt stated, “The trend of massive data breaches are now the new norm as 97% of companies … Read more

From the Summer 2015 Issue

A CIRO’s-Eye View of Digital Risk Management

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

The 2015 RSA Conference made plenty of headlines.  One of the larger news items was the official unveiling of Optiv Security – the new brand name for recently merged resellers Accuvant and Fishnet. In the current merger and acquisition market, this one was huge. Optiv Security is now one of North America’s largest cybersecurity services … Read more

From the Summer 2015 Issue

SOME UNINTENDED CONSEQUENCES OF COLLABORATING

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Disclaimer: Nothing contained in this article is intended to be legal advice or to predict the outcome in any instance. As stated herein, the outcome in any instance depends greatly upon a) the laws of the applicable jurisdiction, and b) the particular facts involved. A tale of unintended consequences – one resulting in unexpected riches … Read more

From the Summer 2015 Issue

Improving Your Cybersecurity Posture with Enterprise Architecture

Author(s):

Didier M. Perdu, Ph.D., , LMI

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Roxanne Everetts, D.M., , National Defense University

Introduction  Managing risks to mission accomplishment is what cybersecurity is all about. Most everyone in a given organization can agree on this as a goal, but getting mission owners, information technology (IT) providers, and security personnel to come together on how it should be done is another matter. Mission owners focus on results: bombs on … Read more

From the Summer 2015 Issue

Colorado Springs: A Beautiful City for Cybersecurity

Author(s):

Dr. Patrick J. Laverty, Senior Cybersecurity Engineer, TASC, An Engility Company

Why Colorado Springs? Situated in some of the most picturesque land in our nation, the beautiful city of Colorado Springs is home to four major Department of Defense (DoD) installations. The units on these installations serve many diverse missions, including: Training our future Air Force leaders at the Air Force Academy Air Force Space Command … Read more