From the Spring 2024 Issue

Brown Paper Packages Tied Up With Cyber – the Consumer Package Goods Industry and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

introduction A doorbell rings, a text message arrives- a package has been delivered to a front porch or loading dock. The Consumer Packaged Goods (CPG) industry delivers a wide range of products sold to consumers – safely, reliably, and routinely – from grocery stores to department stores. The CPG industry comprises businesses involved in producing, … Read more

From the Spring 2024 Issue

Digital Twins: Mirroring Business, Mirroring Cybersecurity Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Digital Twins

A digital twin is a virtual representation of a physical object, process, or system. Digital twins have emerged as a critical technology that fundamentally changes how companies design, monitor, and maintain their physical assets in today’s rapidly evolving industrial landscape. A digital twin is a virtual representation of a physical object, process, or system. Often … Read more

From the Winter 2024 Issue

Flashing Red Lights: Cybersecurity for Intelligent Transportation Systems

Author(s):

Christopher J. Brown, Author ,

Henry J. Sienkiewicz, Faculty, Georgetown University

Red lights, yellow lights, green lights. A flashing light?  A traffic warning sign?  Recognized as a critical infrastructure by the Department of Homeland Security (DHS), the transportation system is essential to modern life. From the skies to the seas to the railways to the roadways, and to bike lanes and pedestrian crossing, this highly complex … Read more

From the Fall 2023 Issue

Cyber Castles – Building Operational Networks and Cybersecurity

Author(s):

Bayron Lopez Pineda, Graduate Student, Georgetown University, School of Continuing Studies

Henry J. Sienkiewicz, Faculty, Georgetown University

Cyber Castles

In the realm of building security, the concept of “security in depth” has evolved from the medieval fortress to the modern office building. Today’s urban landscape features buildings with historic facades with technologically advanced interiors. In the United States, an estimated 97 billion square feet of commercial real estate (CRE) is integrated with technology depending … Read more

From the Fall 2023 Issue

Safe, Reliable: A Cyber Duty of Care and Standard of Practice

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Safe, Reliable

As the alarm clock goes off, a drowsy hand turns on a light switch. Lights go on and lights go off – safely, reliably. Different manufacturers, different processes, same result – safe, reliable. The foundation for this safety and reliability is found in the National Electrical Code, the comprehensive set of rules that govern the … Read more

From the Summer 2023 Issue

Capturing The Sun: Solar and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Thelonious K. Walker II, Alumnus, 2023, Georgetown University

Capturing the Sun

Burning mirrors. Since the seventh century BCE, man has tried to harness the power of the sun. Burning mirrors, magnifying glasses, were used to concentrate the sun’s rays.[1] These burning mirrors were positioned to focus sunlight onto a specific target. The concentrated heat was initially used to light fires; they eventually generated steam, heated fluids, … Read more

From the Winter 2021 Issue

Five Approaches and Tools For Organizations to Mitigate Their IoT/ICS Cyber Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Sam Kendrick, Student – Technology Management Program, Georgetown University (Co-author)

5 Approaches

Infrastructure is everything you don’t think about.  The roads you drive on. The rigs and refineries that turn fossil fuel into the gas that makes your car go. The electricity that power the streetlights and lamps that guide your way. All these technologies that vanish into the oblivians of normalcy.”  Ian Bogost, The Atlantic[1] From … Read more

From the Winter 2019 Issue

Evaluating the Operational Technology Environment: Improving DHSs Cybersecurity Evaluation Tool (CSET)

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

HenrySienkiewicz-feature-image-wn19

Servers, laptops, mobile devices, routers, industrial control systems, fire control systems, elevator operations, are the connected technology components of modern life that perform particular functions, offer ease of use, and that represent risks and vulnerabilities to an organization’s cyber environment. The cyber environment is tied to physical devices, including networking equipment, intrusion detection systems, data … Read more

From the Summer 2018 Issue

Tell it to the Marines: Leadership Principles and Network Security

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Tom Costello, Network & Systems Technician, XR Trading LLC

BAMCIS

It’s after-hours on a Friday. You are talking a remote employee through installing a next-generation firewall. No traffic is passing through the network and now you’re stuck on the project until it’s fixed. Weekend off-hours maintenance windows in the name of improving cybersecurity posture can be some of the most high-stress, high-risk, low-morale projects undertaken … Read more

From the Spring 2018 Issue

Cybersecurity Impacts of the EU GDPR

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

GDPR FEATURE IMAGE

Cybersecurity Considerations Around General Data Protection Regulation (GDPR) Data breaches and cyber-attacks have become commonplace. Every organization, regardless of the type of business or size, is a target. Safeguarding data (and it is data that is the ultimate target) is the challenge, a challenge that spans technical, military, political, and law enforcement concerns within a … Read more