United States Cybersecurity Magazine

ProcessBolt
From the Winter 2016 Issue

The New Chief Information and Security Officer: A Disruptive Agent of Translation

Author(s):

Siobhan MacDermott, Principal, Ernst & Young LLP

Globalization and the Internet of Things have raised the business world’s connectedness to unprecedented levels. As a result of this always-on environment, consumers are demanding immediate and secure access to all kinds of information across multiple platforms and devices. Take that environment and the rapid digitization of information and we have a new world of … Read more

From the Winter 2016 Issue

Cutting through the Noise for Smarter Cybersecurity

Author(s):

James Jasinski, Vice President, Federal Business Development, Fortinet, Inc

Procurement can be challenging in any organization. Gathering requirements, assessing needs, determining the most cost-effective solutions, and finding reliable and trustworthy vendors can tax the savviest of IT organizations. Adding the layers of regulation faced by federal agencies and contractors only compounds procurement issues and decision-making difficulties. Five agencies in the Federal Government (DISA, NSA, … Read more

From the Winter 2016 Issue

EMERGING OPPORTUNITIES IN GOVERNMENT CONTRACTING

Author(s):

Robert Craig, Managing Director, Government Contracting Advisory Services, BDO USA

Shahryar Shaghaghi, National Leader of Technology Services, BDO USA

Amid the aftermath of troubling cybersecurity breaches at various government agencies—including the Office of Personnel Management— the United States government and Congress have pushed for a major increase in government focus and spending on cyber protection. Earlier this year, the White House Office of Management and Budget (OMB) launched a 30-day Cybersecurity Sprint to assess … Read more

From the Winter 2016 Issue

Swipe Right for Cyber

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

It’s beginning to be a universally acknowledged truth that cybersecurity is a necessity for every organization, from top-secret government bureaus to local bars. Thanks to its harmonious convergence of government agencies, top-notch educational institutions and booming business development efforts, Maryland is uniquely positioned to succeed in the cybersecurity arena. All it needs is a little … Read more

From the Winter 2016 Issue

The Future of Cyber Coverage Disputes

Author(s):

Thomas Bick, Chair, Insurance Coverage Specialty Team, Butzel Long P.C.

These days businesses large and small are trying to decide whether to buy insurance against data breaches and other kinds of “cyber liability.” They must also determine the type and degree of coverage that they need. Those decisions will no doubt be complicated by disputes between insurers and policyholders over the intended coverage provided by … Read more

From the Winter 2016 Issue

DFARS Implementation and Compliance: The New Interim Rule

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

In response to recent Executive orders and mounting pressure after high-profile government data breaches, the Department of Defense (DoD) approved an interim rule Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services for the Defense Federal Acquisition System (DFARS Case 2013–D018), taking immediate effect. The rule, which will affect many government … Read more

From the Winter 2016 Issue

BUREAUCRATIZING INNOVATION TO BETTER SECURE CYBERSPACE

Author(s):

J. L. Billingsley, Advisory Board Member, Cyber Security Forum Initiative

For those entrusted with defending the nation against increasing cyberspace-related threats while operating in a fiscally constrained environment, the need to innovate is clear. One way to manage the inherent risk associated with the imbalance between ends and means is to embrace innovation.1 While many in the defense community equate innovation with integrating private sector … Read more

From the Winter 2016 Issue

The Inheritable Cloud Security Model

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Dr. Merrick S. Watchorn, DMIST, Cloud Security Solutions Architect / SME, Science Applications International Corporation (SAIC)

The influence of the cloud on the IT industry continues to grow in direct proportion to cost-cutting measures and profitability. The cloud concept enables those in charge to agree on a total cost of ownership (TCO) pricing model or the concept of shared costs, which includes acquisition, exchange, and post-possession.1 Additionally, the cloud provides pools … Read more

From the Winter 2016 Issue

Building a Cyber Lifecycle: The CyberTexas Foundation

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

The creation of a cyber warrior involves every element of an individual’s community: the schools that train them, the businesses that hire them, and the government that develops, enables, and protects the infrastructure necessary to sustain this evolution. But it’s not some neat assembly-line process, each budding cyber expert moving from school to work to … Read more

From the Winter 2016 Issue

Social Insecurity

Author(s):

Natalie Blackbourne, President, Blackbourne Worldwide

Influence and manipulation occur every day. Deadlines at work are accomplished because your boss used their influence to get things done; somehow that adorable Scout talked you into buying an extra box of cookies; or your annoying coworker magically got you to do an extra hour of work after buying you a latte. All of … Read more