From the Fall 2018 Issue

Cybersecurity Incident Response Planning

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Redmond-article-header

Cybersecurity Incident Response Plan (CIRP) is a crucial consideration for today’s information technology leadership. Attacks are rising in both frequency and severity. The impact is often severe; organizations are disrupted with resulting downtime losses. Although preventative measures can be taken, not all incidents are stopped. Effective incident response capabilities are necessary to rapidly detect and … Read more

From the Summer 2018 Issue

Tell it to the Marines: Leadership Principles and Network Security

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Tom Costello, Network & Systems Technician, XR Trading LLC

BAMCIS

It’s after-hours on a Friday. You are talking a remote employee through installing a next-generation firewall. No traffic is passing through the network and now you’re stuck on the project until it’s fixed. Weekend off-hours maintenance windows in the name of improving cybersecurity posture can be some of the most high-stress, high-risk, low-morale projects undertaken … Read more

From the Summer 2018 Issue

Tackling the Gorilla: The C-Suite’s Role in Cyber Risk

Author(s):

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

tackling-the-gorilla-header

Over the last five years, cyber risk management has become one of the top five organizational challenges facing organizations in all sectors, globally.1 Advances in information and computing technology have outpaced the capabilities of enterprise security protections. Understanding cyber risks is critical to the survival of enterprises in a globally linked marketplace. To tackle the … Read more

From the Spring 2018 Issue

,

Aberdeen Proving Ground Speaks on Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Feature image APG

  The trust put into any network is reliant on three main components: reliable hardware, strong software, and capable, aware people. Network trust, whether implicit or direct, is important for holding the fabric of any infrastructure together, especially during periods of distress or danger. The significant need for network trust especially applies to the cyber-realm, … Read more

From the Spring 2018 Issue

Cybersecurity Workforce Development: A Regional Model for the Nation

Author(s):

Kevin Nolten, Director of Academic Outreach, CYBER.ORG

Nolten feature image

To build the cyber-educated workforce capable of supporting the needs of government, industry and academia, communities across the country are adapting to the evolving economic and technological landscape. Louisiana, for example, has seen its economic base transform from one that was historically focused on oil and gas, agriculture and gaming, to a diversified 21st century … Read more

From the Winter 2018 Issue

The Cybersecurity Technical Workforce: Clarity Needed

Author(s):

Chad Carroll, Chief Strategy Officer, Chiron Technology Services, Inc.

Chiron Header Image

When the United States Government published the Comprehensive National Cybersecurity Initiative in 2008, cyber education was identified as a critical area of improvement. By 2010, the National Initiative for Cybersecurity Education (NICE) was created.  The NICE Team identified four distinct components of the cybersecurity education mission:  Awareness, Formal Education (K-20), WorkforceStructure (HR Framework), and Professional … Read more

From the Summer 2017 Issue

Passport to the Future: A Secondary School Cyber Education Case Study

Author(s):

Owen Haiber, Student,

Steve Morrill, CIO & Director of Cyber Science, Loyola Blakefield

Developing and maintaining a cyber-capable workforce is a significant challenge for the United States. Currently, a significant gap exists between the demand for skilled cybersecurity professionals and the number of such people being produced by American talent pipelines. The cybersecurity job market, according to a joint report by Frost & Sullivan and (ISC)2, will see … Read more

From the Summer 2017 Issue

Developing Cybersecurity Leadership – From Art to SCIENCE

Author(s):

Sallie Sweeney, Director/Tech Enablement, KPMG

Finding cyber leaders who have the right amount of technical depth, strength of character, dedication to the mission, and loyalty to the team is like finding a needle in a haystack. Traditional leadership development curricula and frameworks need to address this gap to prepare our future cyber leaders. Cybersecurity teams are often managed by someone … Read more