5 Approaches
From the Winter 2021 Issue

Five Approaches and Tools For Organizations to Mitigate Their IoT/ICS Cyber Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

Sam Kendrick, Student – Technology Management Program, Georgetown University (Co-author)

Infrastructure is everything you don’t think about.  The roads you drive on. The rigs and refineries that turn fossil fuel into the gas that makes your car go. The electricity that power the streetlights and … Read more

COVID-19-and cybersecurity
From the Fall 2020 Issue

COVID-19 and Cybersecurity

Author(s):

Connie Uthoff, Program Director, The George Washington University

On January 31, 2020, the U.S. Secretary of Health and Human Services (HHS) declared COVID-19 a public health emergency.[1] As the virus spread around the globe, cybercriminals quickly exploited the crisis for commercial gain. In the … Read more

Hospitality Breach picture of Courtyard Marriott

Hospitality Breaches

Author(s):

Josh Henry, ,

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large … Read more

From the Summer 2016 Issue

Outcome-Based Cyber Defense

Author(s):

Duane Wilson, Director of Strategic Cyber Initiatives, Sabre Systems Inc.

According to CNN Money, more than 317 million new pieces of malware – computer viruses or other malicious software – were created last year. This means nearly one million new threats were released each day. … Read more