From the Fall 2019 Issue

The Maryland National Guard: Cybersecurity From Army to Air

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

175th Cyberspace Operations Group

The Maryland National Guard is a state defense team that has over 300 cyber personnel who bring cutting-edge military training and their civilian capabilities to support state and federal missions. The United States Cybersecurity Magazine had the opportunity to partake in a round table discussion with Col. Reid Novotny, Joint Staff/J6-C4 & Cyber, Col. Vic … Read more

From the Spring 2019 Issue

Female Veterans–Ready to Fill Cybersecurity Jobs!

Author(s):

Dr. Amelia Estwick, Program Director, National Cybersecurity Institute at Excelsior College

Female Veterans

Current State of the Cybersecurity Industry Our nation’s robust cybersecurity industry will grow from $75 billion in 2015 to $170 billion by 20201. Additionally, the United States White House Administration’s 2019 budget has allocated approximately $15 billion in spending to fund critical initiatives and research in the cybersecurity space, up from $14.4 billion in 2018 … Read more

From the Winter 2019 Issue

The Art of the Feminine in a Masculine World of Cybersecurity

Author(s):

Jothi Dugar, C|CISO, CISSP, HCIPP, Author

JothiDugar-feature-image-wn19

The Psychology of Cybersecurity What is the psychology of cybersecurity, and the role that the Feminine (aka Women) play in it? Why is this important to understand? What does psychology have to do with cybersecurity you may wonder, and what do we mean by the Feminine? Cybersecurity is often miscategorized as predominantly a technical field, … Read more

From the Winter 2019 Issue

Ladies! Be the Energy in Cybersecurity

Author(s):

Diane Janosek, National Security Agency, Commandant, NCS

Dianne-Janosek-feature-image-wn19

Did you know that women represent only eleven to fourteen percent of the cybersecurity workforce – and that there has been no real progress in increasing that percentage over the last two years? Women make up only eleven to fourteen percent of the cybersecurity workforce – hard to believe when you consider how many ladies … Read more

From the Fall 2018 Issue

Cyber Warfare: Are We at DEFCON 1?

Author(s):

Tyler Cohen Wood, Executive Director Cyber Workforce Training, CyberVista

cohen-wood-article-header

The days where war only exists on the battlefield are long gone. Today some of the greatest risks we face are in cyberspace, carried out by nation-state sponsored attackers. What are the threats to individuals, businesses, and our country? Just how realistic are they? How can we ensure we are armed with the knowledge to … Read more

From the Fall 2018 Issue

Cybersecurity Incident Response Planning

Author(s):

Dr. Michael C. Redmond, Director, IT and GRC Consulting and Audit, EFPR Group

Redmond-article-header

Cybersecurity Incident Response Plan (CIRP) is a crucial consideration for today’s information technology leadership. Attacks are rising in both frequency and severity. The impact is often severe; organizations are disrupted with resulting downtime losses. Although preventative measures can be taken, not all incidents are stopped. Effective incident response capabilities are necessary to rapidly detect and … Read more

From the Summer 2018 Issue

Tell it to the Marines: Leadership Principles and Network Security

Author(s):

Henry J. Sienkiewicz, Author,

Tom Costello, Network & Systems Technician, XR Trading LLC

BAMCIS

It’s after-hours on a Friday. You are talking a remote employee through installing a next-generation firewall. No traffic is passing through the network and now you’re stuck on the project until it’s fixed. Weekend off-hours maintenance windows in the name of improving cybersecurity posture can be some of the most high-stress, high-risk, low-morale projects undertaken … Read more

From the Summer 2018 Issue

Tackling the Gorilla: The C-Suite’s Role in Cyber Risk

Author(s):

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

tackling-the-gorilla-header

Over the last five years, cyber risk management has become one of the top five organizational challenges facing organizations in all sectors, globally.1 Advances in information and computing technology have outpaced the capabilities of enterprise security protections. Understanding cyber risks is critical to the survival of enterprises in a globally linked marketplace. To tackle the … Read more

From the Spring 2018 Issue

,

Aberdeen Proving Ground Speaks on Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Feature image APG

  The trust put into any network is reliant on three main components: reliable hardware, strong software, and capable, aware people. Network trust, whether implicit or direct, is important for holding the fabric of any infrastructure together, especially during periods of distress or danger. The significant need for network trust especially applies to the cyber-realm, … Read more