United States Cybersecurity Magazine

ProcessBolt
From the Summer 2015 Issue

Playing Both Sides of the Field: An Offensive and Defensive Approach to Cybersecurity

Author(s):

-Larry Letow, President, U.S. Region, CyberCX

Jim Mazotas, Founder, OnGuard Systems LLC

In our mobile and ever-changing cyber world, traditional static security solutions are simply not enough to defend against the complex, multi-dimensional threats to digital security. While securing network borders is unquestionably key in maintaining a protected system, all too often organizations ignore the serious threat insiders pose to cybersecurity. Through negligent or malicious means, insiders … Read more

From the Summer 2015 Issue

Strategizing for Data Breach Risk Management

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

Organizations are struggling to handle data breaches, as their frequency in the news indicates. According to the Ponemon Institute and IBM’s 2014 report on corporate data loss prevention, the average cost of a data breach to a company was $3.5 million – 15 percent more than what it cost in 2013.1  It is evident from the … Read more

From the Summer 2015 Issue

Get Tested: Penetration Testing as an Integral Part of Your Company’s Cybersecurity Plan

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Cybersecurity is now more than ever a business requirement in every industry.  The 2015 Verizon Data Breach Report estimates 700 million compromised records in all of 2014.1  Worse yet, that number only represents known/reported breaches. A survey of attendees at the 2008 RSA Conference indicated that 89% of breaches they were aware of went unreported.2 If … Read more

From the Summer 2015 Issue

Don’t Become Extinct: The Evolution of Information Security, Part Two

Author(s):

Will Janssen, Business Development Director, Signals Defense

In Part One of this series, the idea of the three waves of security was introduced, with the Physical Security 1st Wave having established the principles and ideas of security used in the next two Waves. The 2nd Wave is “Wired” IT Security, which is maturing with standards, technologies, and operational approaches and is being … Read more

From the Summer 2015 Issue

A Time for American Leadership in Cybersecurity

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Fellows of non-partisan think tank ICIT1 frequently get called upon to provide expert cybersecurity advice and analyses to congressional members and government leaders.  On the evening of April 30th, 2015, we participated in a fascinating discussion with Michael Echols, Director of the Cyber Joint Program Management Office.2 This discussion made one thing clear to me: … Read more

From the Summer 2015 Issue

How to Increase Your CEO and Board’s Cybersecurity Literacy

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Current State As 2015 unfolds, cybersecurity is the hot topic in boardrooms today. According to Forbes, 2014 was the year of the data breach, and we would be wise to brace for more in 2015.1 FireEye CEO Dave DeWalt stated, “The trend of massive data breaches are now the new norm as 97% of companies … Read more

From the Summer 2015 Issue

A CIRO’s-Eye View of Digital Risk Management

Author(s):

Daren Dunkel, Chief of Staff, McAfee

The 2015 RSA Conference made plenty of headlines.  One of the larger news items was the official unveiling of Optiv Security – the new brand name for recently merged resellers Accuvant and Fishnet. In the current merger and acquisition market, this one was huge. Optiv Security is now one of North America’s largest cybersecurity services … Read more

From the Summer 2015 Issue

SOME UNINTENDED CONSEQUENCES OF COLLABORATING

Author(s):

Kenneth L. Samuelson, Esq., , Samuelson Law Offices, LLC

Disclaimer: Nothing contained in this article is intended to be legal advice or to predict the outcome in any instance. As stated herein, the outcome in any instance depends greatly upon a) the laws of the applicable jurisdiction, and b) the particular facts involved. A tale of unintended consequences – one resulting in unexpected riches … Read more

From the Summer 2015 Issue

Improving Your Cybersecurity Posture with Enterprise Architecture

Author(s):

Didier M. Perdu, Ph.D., , LMI

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Roxanne Everetts, D.M., , National Defense University

Introduction  Managing risks to mission accomplishment is what cybersecurity is all about. Most everyone in a given organization can agree on this as a goal, but getting mission owners, information technology (IT) providers, and security personnel to come together on how it should be done is another matter. Mission owners focus on results: bombs on … Read more

From the Summer 2015 Issue

Colorado Springs: A Beautiful City for Cybersecurity

Author(s):

Dr. Patrick J. Laverty, Senior Cybersecurity Engineer, TASC, An Engility Company

Why Colorado Springs? Situated in some of the most picturesque land in our nation, the beautiful city of Colorado Springs is home to four major Department of Defense (DoD) installations. The units on these installations serve many diverse missions, including: Training our future Air Force leaders at the Air Force Academy Air Force Space Command … Read more