From the Fall 2020 Issue

SEIZE THE MOMENT: NOW IS THE TIME FOR WOMEN IN CYBERSECURITY

Author(s):

Diane M Janosek, Esq., CISSP, President, Women in Cybersecurity Mid-Atlantic Affiliate

Women in Cybersecurity

The Women in Cybersecurity (WiCyS) annual conference was set to take place in March 2020 in Denver, Colorado. It’s a celebratory event that many women in the cyber industry and academia look forward to – a chance to collaborate, learn, network, and invigorate themselves as a sort of small-but-mighty force in the cyber realm. After … Read more

From the Winter 2020 Issue

Reassessing the Cyber Workforce Gap

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF Workforce Gap image

Epidemiology, with respect to public health, is often used as an analogy when discussing cybersecurity.  The two are strikingly similar, encompassing notions of impacted populations, specialist expertise, containment, and cure. Education is acknowledged as a primary means of reducing epidemiological risk, especially with respect to HIV/AIDS.1  It has this effect by generating an ability to … Read more

From the Fall 2019 Issue

The Maryland National Guard: Cybersecurity From Army to Air

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

175th Cyberspace Operations Group

The Maryland National Guard is a state defense team that has over 300 cyber personnel who bring cutting-edge military training and their civilian capabilities to support state and federal missions. The United States Cybersecurity Magazine had the opportunity to partake in a round table discussion with Col. Reid Novotny, Joint Staff/J6-C4 & Cyber, Col. Vic … Read more

From the Spring 2019 Issue

Female Veterans–Ready to Fill Cybersecurity Jobs!

Author(s):

Dr. Amelia Estwick, Program Director, National Cybersecurity Institute at Excelsior College

Female Veterans

Current State of the Cybersecurity Industry Our nation’s robust cybersecurity industry will grow from $75 billion in 2015 to $170 billion by 20201. Additionally, the United States White House Administration’s 2019 budget has allocated approximately $15 billion in spending to fund critical initiatives and research in the cybersecurity space, up from $14.4 billion in 2018 … Read more

From the Winter 2019 Issue

The Art of the Feminine in a Masculine World of Cybersecurity

Author(s):

Jothi Dugar, C|CISO, CISSP, HCIPP, Author

JothiDugar-feature-image-wn19

The Psychology of Cybersecurity What is the psychology of cybersecurity, and the role that the Feminine (aka Women) play in it? Why is this important to understand? What does psychology have to do with cybersecurity you may wonder, and what do we mean by the Feminine? Cybersecurity is often miscategorized as predominantly a technical field, … Read more

From the Winter 2019 Issue

Ladies! Be the Energy in Cybersecurity

Author(s):

Diane M Janosek, Esq., CISSP, President, Women in Cybersecurity Mid-Atlantic Affiliate

Dianne-Janosek-feature-image-wn19

Did you know that women represent only eleven to fourteen percent of the cybersecurity workforce – and that there has been no real progress in increasing that percentage over the last two years? Women make up only eleven to fourteen percent of the cybersecurity workforce – hard to believe when you consider how many ladies … Read more

From the Fall 2018 Issue

Cyber Warfare: Are We at DEFCON 1?

Author(s):

Tyler Cohen Wood, Executive Director Cyber Workforce Training, CyberVista

cohen-wood-article-header

The days where war only exists on the battlefield are long gone. Today some of the greatest risks we face are in cyberspace, carried out by nation-state sponsored attackers. What are the threats to individuals, businesses, and our country? Just how realistic are they? How can we ensure we are armed with the knowledge to … Read more

From the Fall 2018 Issue

Cybersecurity Incident Response Planning

Author(s):

Dr. Michael C. Redmond, Director, IT and GRC Consulting and Audit, EFPR Group

Redmond-article-header

Cybersecurity Incident Response Plan (CIRP) is a crucial consideration for today’s information technology leadership. Attacks are rising in both frequency and severity. The impact is often severe; organizations are disrupted with resulting downtime losses. Although preventative measures can be taken, not all incidents are stopped. Effective incident response capabilities are necessary to rapidly detect and … Read more