SlideShare a Scribd company logo
1 of 2
Download to read offline
Reprinted with permission from
The Business Monthly, Inc.
August 2013
Holistic Approach to Cybersecurity:
Being Engineered By Maryland Companies
By George Berkheimer, Senior
Writer
	 A trio of Maryland compa-
nies has combined their comple-
mentary focuses to develop one
of the first holistic approaches to
cybersecurity in the nation.
	 Established in May, cy-
ber-oriented alliance combines
the construction expertise of
Wilhelm Commercial Builders
(WCB) of Annapolis Junction,
the privacy-boosting window
coatings and monitoring sensors
of Owings Mills-based Signals
Defenses (SD) and the vulner-
ability assessment capabilities
of KCI Protection Technologies
(KCI), headquartered in Sparks.
	 With that mixture of skill
sets, the associated companies
are ably positioned to not only
identify the weak spots in any
given business’s physical and
network security precautions,
but also to engineer and build the
solution.
	 Targeting both existing fa-
cilities and new construction
projects, the partners assert they
can handle anything from shield-
ing a small conference room
to hardening entire multi-story
buildings against electronic in-
trusion.
	 In cybersecurity jargon, this
new defense concept is called
a Secure Work Environment
(SWE), said WCB CEO Wayne
Wilhelm, and its benefits are
obvious.
	 “The threats that we are
facing from the use and demand
of progressive technology is
staggering, and the world is not
becoming a safer place anytime
soon,” Wilhelm said. “It is our
mission to help [clients] … pre-
serve the integrity of information
and provide the proper counter-
measures to secure privacy of
information in the workplace.”
Understanding and
Adapting
	 Wilhelm’s general contract-
ing company boasts more than
20 years of experience providing
construction services to commer-
cial and government customers
at the classified and unclassified
levels, which include Sensitive
Compartmented Information Fa-
cilities (SCIFs) and Tempest-cer-
tified projects.
	 “Partnering with [SD and
KCI] provides the additional
resources and technology nec-
essary to produce a turn-key ap-
proach … by providing consult-
ing services, protective products
and monitoring and detection
systems to ensure protection at
all threat levels,” he said.
	 At the Howard County
Chamber of Commerce’s Cy-
ber 4.01 conference in June,
representatives from the three
companies conducted a presen-
tation that spelled out just how
vulnerable most businesses are,
even to some decidedly low-tech
forms of intrusion.
	 “A sufficiently determined,
not necessarily well-funded
adversary can gain access into
almost any organization,” said
KCI President John Fannin.
	 More common ploys include
bugs planted inside buildings by
people posing as contractors,
vendors and employees; laser lis-
tening and recording devices that
can convert window vibrations
back into clear speech; and even
simple photography of exposed
documents through a window
from the parking lot.
	 KCI’s red-teaming efforts —
attempts to gain malicious entry
into a client company’s physical
and cyber assets with permis-
sion from its leadership cadre
to validate its security program
effectiveness — consistently
succeed in finding ways to breach
security.
	 Vulnerability assessments
like these make up the core of
an effective security program,
Fannin said. “They can help
companies understand, anticipate
and adapt.”
What Haystack?
	 Among the solutions SD
offers are optically-clear film
coatings that make windows
resistant to radio frequency and
infrared exploitation, and are
even blast-resistant in some cas-
es.
	 Additionally, the company
is currently working out the life-
cycle support components of its
new SD Gabriel system, which
is scheduled to hit the market in
the coming weeks.
	 The low-cost, real-time mon-
itoring system uses high-quality
radio frequency (RF) sensors
whose affordability, until re-
cently, was limited to federal
government and military clients
with deep pockets.
	 “This will be a real differ-
entiator in the marketplace …
costing on the order of magnitude
of seven times less than current
technology,” said Tom Jones,
director of SD’s Secure Work
Environment Services division.
“We built a demonstration SWE
facility where we plan to begin
on-site demonstrations for po-
tential clients in late July.”
	 Used in combination with
construction techniques that
reduce the RF energy infiltrating
or emanating from a building,
the sensors can easily identify
and defend against attacks using
clandestine technology such
as laser microphones and even
hard-to-detect frequency-hop-
ping bugs.
	 “We’ve got to control the RF
battlefield,” said Ron Waranows-
ki, managing director at SD.
“You can’t economically do
Tempest any more, you have to
do the next best thing. When you
build a SWE, you cut the weeds
down and the threat sticks out
quickly.”
Game Changer
	 Hospitality, banking and
manufacturing businesses have
Continued on pg. 2
Reprinted with permission from
The Business Monthly, Inc.
August 2013
Holistic Approach to Cybersecurity:
Being Engineered By Maryland Companies
want to be held hostage.”
	 As businesses warm to the
SWE concept, Jones said the
team of companies is typically
seeing requests to turn confer-
ence rooms into soft SCIFs at
the moment, but anticipates the
demand for more robust projects
will grow soon.
	 “We’ve met with some sig-
nificant Fortune 100 companies,
and 10 companies are doing
beta testing with our technology
now,” Wilhelm said. “This is
really the beginning of some
incredible stuff. We’re set up to
be international in scope, and
in two years we’re anticipating
increased revenues of more than
$20 million annually because of
this opportunity.”
	 Part of the trio’s appeal,
Fannin said, is its ability to offer
clients whatever level of service
and product they want, or can
afford, ranging from just an
assessment up to a full-design,
turn-key SWE.
	 “Some companies just want
to know what they can do to
improve their layers of protec-
tion, and we can provide them
with a prioritized list,” Fannin
said, adding that every client has
different thresholds of need and
may find some risks acceptable.
	 “Real-time monitoring is
the big game changer,” Wilhelm
said. “With Tempest, nobody
knew what was happening in
between accreditation cycles
unless they were doing periodic
bug sweeps. Now they can have
24/7 coverage if they want it.”
Continued from pg. 1
long been targets of corporate
espionage techniques, and legal
and accounting firms are equally
at risk, said Jones.
	 “A growing number of other
businesses have expressed ex-
treme interest in getting these
types of technology and defense
deployed in their environments,”
he said. “It’s been estimated that
corporations lose between $200
and $250 billion in intellectual
property each year. They don’t

More Related Content

What's hot

Design and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage systemDesign and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage systemIJCSEA Journal
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2CMR WORLD TECH
 
Reprint cio review-india recognition
Reprint  cio review-india recognitionReprint  cio review-india recognition
Reprint cio review-india recognitionMerlinaS
 
Technology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingTechnology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingPier Paolo Mucelli
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paperjtiblier
 

What's hot (8)

Design and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage systemDesign and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage system
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2
 
Reprint cio review-india recognition
Reprint  cio review-india recognitionReprint  cio review-india recognition
Reprint cio review-india recognition
 
Samsung_FCW GameChanger
Samsung_FCW GameChangerSamsung_FCW GameChanger
Samsung_FCW GameChanger
 
Technology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud ComputingTechnology Forecast - Driving Growth With Cloud Computing
Technology Forecast - Driving Growth With Cloud Computing
 
Next Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2MNext Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2M
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paper
 

Viewers also liked

Fn 493 ppp (1)
Fn 493 ppp (1)Fn 493 ppp (1)
Fn 493 ppp (1)subodh2044
 
thong tac cong tai ba dinh/,'0988998331
thong tac cong tai ba dinh/,'0988998331thong tac cong tai ba dinh/,'0988998331
thong tac cong tai ba dinh/,'0988998331Trần Hòa
 
READY, SET, GO! Quality Programming From the Beginning to End!
READY, SET, GO! Quality Programming From the Beginning to End! READY, SET, GO! Quality Programming From the Beginning to End!
READY, SET, GO! Quality Programming From the Beginning to End! Shawn C. Petty
 
Adaptive technology
Adaptive technologyAdaptive technology
Adaptive technologyPammy5983
 
Prophet of doom_11_satans_bargain
Prophet of doom_11_satans_bargainProphet of doom_11_satans_bargain
Prophet of doom_11_satans_bargainArabBibles
 
meeting in Sweden
meeting in Swedenmeeting in Sweden
meeting in Swedenmiel19
 
Sms et telephonie mobile en politique
Sms et telephonie mobile en politiqueSms et telephonie mobile en politique
Sms et telephonie mobile en politiqueAbdelhafidh
 

Viewers also liked (11)

Pictures
PicturesPictures
Pictures
 
Fn 493 ppp (1)
Fn 493 ppp (1)Fn 493 ppp (1)
Fn 493 ppp (1)
 
thong tac cong tai ba dinh/,'0988998331
thong tac cong tai ba dinh/,'0988998331thong tac cong tai ba dinh/,'0988998331
thong tac cong tai ba dinh/,'0988998331
 
READY, SET, GO! Quality Programming From the Beginning to End!
READY, SET, GO! Quality Programming From the Beginning to End! READY, SET, GO! Quality Programming From the Beginning to End!
READY, SET, GO! Quality Programming From the Beginning to End!
 
Adaptive technology
Adaptive technologyAdaptive technology
Adaptive technology
 
Prophet of doom_11_satans_bargain
Prophet of doom_11_satans_bargainProphet of doom_11_satans_bargain
Prophet of doom_11_satans_bargain
 
2ème dimanche du carême
2ème dimanche du carême2ème dimanche du carême
2ème dimanche du carême
 
meeting in Sweden
meeting in Swedenmeeting in Sweden
meeting in Sweden
 
Sms et telephonie mobile en politique
Sms et telephonie mobile en politiqueSms et telephonie mobile en politique
Sms et telephonie mobile en politique
 
Thái hưng goodbye
Thái hưng goodbyeThái hưng goodbye
Thái hưng goodbye
 
Libro1(1)
Libro1(1)Libro1(1)
Libro1(1)
 

Similar to Holistic approach to cybersecurity being engineered by maryland companies 8-13

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentIRJET Journal
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Scott Satterwhite
 
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...Capgemini
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsJose Lopez
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Daniel L. Cruz
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportCensornet
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 

Similar to Holistic approach to cybersecurity being engineered by maryland companies 8-13 (20)

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
User Authentication Technique for Office Environment
User Authentication Technique for Office EnvironmentUser Authentication Technique for Office Environment
User Authentication Technique for Office Environment
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]
 
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...
New Security: A $4-Billion Market in 2011 - Changing the Game: Monthly Techno...
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Raconteur: Cloud for Business Report
Raconteur: Cloud for Business ReportRaconteur: Cloud for Business Report
Raconteur: Cloud for Business Report
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 

More from Signals Defense, LLC

Technology White Paper: Creating RF Predictable Environments for In-Buildin...
Technology White Paper:   Creating RF Predictable Environments for In-Buildin...Technology White Paper:   Creating RF Predictable Environments for In-Buildin...
Technology White Paper: Creating RF Predictable Environments for In-Buildin...Signals Defense, LLC
 
Signals Defense Capability Statement rev2016
Signals Defense Capability Statement  rev2016Signals Defense Capability Statement  rev2016
Signals Defense Capability Statement rev2016Signals Defense, LLC
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingSignals Defense, LLC
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Signals Defense, LLC
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Signals Defense, LLC
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13Signals Defense, LLC
 

More from Signals Defense, LLC (7)

Technology White Paper: Creating RF Predictable Environments for In-Buildin...
Technology White Paper:   Creating RF Predictable Environments for In-Buildin...Technology White Paper:   Creating RF Predictable Environments for In-Buildin...
Technology White Paper: Creating RF Predictable Environments for In-Buildin...
 
Signals Defense Capability Statement rev2016
Signals Defense Capability Statement  rev2016Signals Defense Capability Statement  rev2016
Signals Defense Capability Statement rev2016
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Holistic approach to cybersecurity being engineered by maryland companies 8-13

  • 1. Reprinted with permission from The Business Monthly, Inc. August 2013 Holistic Approach to Cybersecurity: Being Engineered By Maryland Companies By George Berkheimer, Senior Writer A trio of Maryland compa- nies has combined their comple- mentary focuses to develop one of the first holistic approaches to cybersecurity in the nation. Established in May, cy- ber-oriented alliance combines the construction expertise of Wilhelm Commercial Builders (WCB) of Annapolis Junction, the privacy-boosting window coatings and monitoring sensors of Owings Mills-based Signals Defenses (SD) and the vulner- ability assessment capabilities of KCI Protection Technologies (KCI), headquartered in Sparks. With that mixture of skill sets, the associated companies are ably positioned to not only identify the weak spots in any given business’s physical and network security precautions, but also to engineer and build the solution. Targeting both existing fa- cilities and new construction projects, the partners assert they can handle anything from shield- ing a small conference room to hardening entire multi-story buildings against electronic in- trusion. In cybersecurity jargon, this new defense concept is called a Secure Work Environment (SWE), said WCB CEO Wayne Wilhelm, and its benefits are obvious. “The threats that we are facing from the use and demand of progressive technology is staggering, and the world is not becoming a safer place anytime soon,” Wilhelm said. “It is our mission to help [clients] … pre- serve the integrity of information and provide the proper counter- measures to secure privacy of information in the workplace.” Understanding and Adapting Wilhelm’s general contract- ing company boasts more than 20 years of experience providing construction services to commer- cial and government customers at the classified and unclassified levels, which include Sensitive Compartmented Information Fa- cilities (SCIFs) and Tempest-cer- tified projects. “Partnering with [SD and KCI] provides the additional resources and technology nec- essary to produce a turn-key ap- proach … by providing consult- ing services, protective products and monitoring and detection systems to ensure protection at all threat levels,” he said. At the Howard County Chamber of Commerce’s Cy- ber 4.01 conference in June, representatives from the three companies conducted a presen- tation that spelled out just how vulnerable most businesses are, even to some decidedly low-tech forms of intrusion. “A sufficiently determined, not necessarily well-funded adversary can gain access into almost any organization,” said KCI President John Fannin. More common ploys include bugs planted inside buildings by people posing as contractors, vendors and employees; laser lis- tening and recording devices that can convert window vibrations back into clear speech; and even simple photography of exposed documents through a window from the parking lot. KCI’s red-teaming efforts — attempts to gain malicious entry into a client company’s physical and cyber assets with permis- sion from its leadership cadre to validate its security program effectiveness — consistently succeed in finding ways to breach security. Vulnerability assessments like these make up the core of an effective security program, Fannin said. “They can help companies understand, anticipate and adapt.” What Haystack? Among the solutions SD offers are optically-clear film coatings that make windows resistant to radio frequency and infrared exploitation, and are even blast-resistant in some cas- es. Additionally, the company is currently working out the life- cycle support components of its new SD Gabriel system, which is scheduled to hit the market in the coming weeks. The low-cost, real-time mon- itoring system uses high-quality radio frequency (RF) sensors whose affordability, until re- cently, was limited to federal government and military clients with deep pockets. “This will be a real differ- entiator in the marketplace … costing on the order of magnitude of seven times less than current technology,” said Tom Jones, director of SD’s Secure Work Environment Services division. “We built a demonstration SWE facility where we plan to begin on-site demonstrations for po- tential clients in late July.” Used in combination with construction techniques that reduce the RF energy infiltrating or emanating from a building, the sensors can easily identify and defend against attacks using clandestine technology such as laser microphones and even hard-to-detect frequency-hop- ping bugs. “We’ve got to control the RF battlefield,” said Ron Waranows- ki, managing director at SD. “You can’t economically do Tempest any more, you have to do the next best thing. When you build a SWE, you cut the weeds down and the threat sticks out quickly.” Game Changer Hospitality, banking and manufacturing businesses have Continued on pg. 2
  • 2. Reprinted with permission from The Business Monthly, Inc. August 2013 Holistic Approach to Cybersecurity: Being Engineered By Maryland Companies want to be held hostage.” As businesses warm to the SWE concept, Jones said the team of companies is typically seeing requests to turn confer- ence rooms into soft SCIFs at the moment, but anticipates the demand for more robust projects will grow soon. “We’ve met with some sig- nificant Fortune 100 companies, and 10 companies are doing beta testing with our technology now,” Wilhelm said. “This is really the beginning of some incredible stuff. We’re set up to be international in scope, and in two years we’re anticipating increased revenues of more than $20 million annually because of this opportunity.” Part of the trio’s appeal, Fannin said, is its ability to offer clients whatever level of service and product they want, or can afford, ranging from just an assessment up to a full-design, turn-key SWE. “Some companies just want to know what they can do to improve their layers of protec- tion, and we can provide them with a prioritized list,” Fannin said, adding that every client has different thresholds of need and may find some risks acceptable. “Real-time monitoring is the big game changer,” Wilhelm said. “With Tempest, nobody knew what was happening in between accreditation cycles unless they were doing periodic bug sweeps. Now they can have 24/7 coverage if they want it.” Continued from pg. 1 long been targets of corporate espionage techniques, and legal and accounting firms are equally at risk, said Jones. “A growing number of other businesses have expressed ex- treme interest in getting these types of technology and defense deployed in their environments,” he said. “It’s been estimated that corporations lose between $200 and $250 billion in intellectual property each year. They don’t