Dr. Bradford L. Sims became Capitol Technology University's eighth president on June 1, 2017. An educator, administrator and construction project manager, Dr. Sims has extensive experience both in academia and industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from Purdue University, which is also his undergraduate alma mater; he received his B.S. in Building Construction Management there in 1990. He also holds a master's of science degree in Building Construction from the University of Florida. He is a member of the Sigma Lambda Chi International Construction Honor Society and the American Institute of Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10 Most Influential Educational Leaders of 2021. He leads Capitol Technology University with an education laser-focused on STEM or Management of STEM careers which uniquely positions students for top roles in the region's booming tech hub.
‘The education of the next generation of Cyber experts must start now’, include all those that have historically been limited to be part of this defence of our ways of life. ~ Dr. Ian McAndrew
Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award-winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized cybersecurity degrees, with SC Media naming the university’s cybersecurity program as the 2020 Best Cybersecurity Program and the Chair of Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
Since 2003, the Department of Homeland Security (DHS) and the National Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university will mentor hundreds of institutions offering cybersecurity programs across 14 states and the District of Columbia to develop or enhance their cybersecurity programs.
This new title allows Capitol Tech to continue mentoring other universities in cyber program creation in addition to opportunities the preexisting CAE designation afforded the university. These include being selected by the NSA to supplement their development program for new security engineers with master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars, and by the National Science Foundation (NSF) for two major multi-year grants to address the shortage of cybersecurity professionals.
Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are immersed in a hands-on education led by industry experts to learn in-demand skills. Undergraduate students learn UNIX O/S, C programming, networking, virtual machines, vulnerability scanning, packet capture and analysis,
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Community Healthcare System transformed its IT infrastructure by standardizing systems, implementing shared services, and adopting cloud technologies. This replaced the old, fragmented infrastructure with a modern, efficient environment that improved operations and reduced costs.
Industrial Control Cyber Security Europe 2015 James Nesbitt
The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce discussion on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
This document provides an agenda for an IoT Applications for Defense workshop and conference to take place on August 15, 2017 at Trident Technical College in North Charleston, SC. The all-day event will include keynote speeches, breakout sessions, and a reception on topics related to applying IoT technologies to defense and military applications, including security practices, data analytics, emerging technologies, energy management, and connectivity. Presenters will represent organizations working in this space, such as M.C. Dean, IBM, Real Time Innovations, Bridgera, Agilis Energy, and Verizon.
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.
Thomas Harrer holds the title of Distinguished Engineer and the Chief Technology Officer Server & Storage EMEA at IBM. He is a member of the IBM Academy of Technology (AoT), (Board) Member TEC DACH, and a computer scientist with a strong background in mathematics, computer architecture and application architecture.
In the mid-nineties, through his groundbreaking diploma thesis, he combined the world of genomics and Artificial Intelligence by leveraging the power of neural networks for analysing genes in the human genome. He is very open-minded and especially interested in cross-collaboration between different areas of expertise.
Since 1995, Thomas Harrer has been working with IBM as a client engineer and architect focused on infrastructure architecture helping clients to innovate with technology increasing cross-platform efficiency.
Starting 2017, Thomas has taken over the responsibilities of Chief Technology Officer for IBM Servers and Storage for Europe and more recently extended them to EMEA. In this technical leadership role, Thomas Harrer and his team deliver innovation with hybrid clouds and AI, leveraging all types of data and evolving the technology that enables clients to achieve business success.
With a strong foundation in computer/data science and extensive experience in IT infrastructure and technology, Thomas enjoys bringing different elements together to build the architecture of the future. He loves to discuss technology, trends, AI, data, blockchains and architectures for mission-critical hybrid cloud solutions.
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
Industrial Control Cybersecurity USA October 6th and 7th
Sacramento California USA
Identify, protect, detect, respond and recover.
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector.
Community Healthcare System transformed its IT infrastructure by standardizing systems, implementing shared services, and adopting cloud technologies. This replaced the old, fragmented infrastructure with a modern, efficient environment that improved operations and reduced costs.
Industrial Control Cyber Security Europe 2015 James Nesbitt
The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce discussion on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
This document provides an agenda for an IoT Applications for Defense workshop and conference to take place on August 15, 2017 at Trident Technical College in North Charleston, SC. The all-day event will include keynote speeches, breakout sessions, and a reception on topics related to applying IoT technologies to defense and military applications, including security practices, data analytics, emerging technologies, energy management, and connectivity. Presenters will represent organizations working in this space, such as M.C. Dean, IBM, Real Time Innovations, Bridgera, Agilis Energy, and Verizon.
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.
Thomas Harrer holds the title of Distinguished Engineer and the Chief Technology Officer Server & Storage EMEA at IBM. He is a member of the IBM Academy of Technology (AoT), (Board) Member TEC DACH, and a computer scientist with a strong background in mathematics, computer architecture and application architecture.
In the mid-nineties, through his groundbreaking diploma thesis, he combined the world of genomics and Artificial Intelligence by leveraging the power of neural networks for analysing genes in the human genome. He is very open-minded and especially interested in cross-collaboration between different areas of expertise.
Since 1995, Thomas Harrer has been working with IBM as a client engineer and architect focused on infrastructure architecture helping clients to innovate with technology increasing cross-platform efficiency.
Starting 2017, Thomas has taken over the responsibilities of Chief Technology Officer for IBM Servers and Storage for Europe and more recently extended them to EMEA. In this technical leadership role, Thomas Harrer and his team deliver innovation with hybrid clouds and AI, leveraging all types of data and evolving the technology that enables clients to achieve business success.
With a strong foundation in computer/data science and extensive experience in IT infrastructure and technology, Thomas enjoys bringing different elements together to build the architecture of the future. He loves to discuss technology, trends, AI, data, blockchains and architectures for mission-critical hybrid cloud solutions.
This document provides information about the InfoSec World 2017 Conference & Expo taking place April 3-5, 2017 in Orlando, Florida. The conference will feature over 70 sessions across 7 tracks, 10 workshops, and keynote speakers discussing topics such as DevSecOps, cloud security, risk management, and more. Pre-conference and post-conference workshops will be offered on topics including mainframe security, red team/blue team techniques, incident response, and malware analysis.
The document summarizes the Computing and Communications Services (CCS) annual report at the University of Guelph. It discusses how CCS has increasingly focused on partnerships across campus to provide IT services and support a variety of projects. These partnerships help CCS leverage opportunities from technological advances while addressing challenges. The report highlights CCS' focus on people, technology, and partnerships. It provides examples of successful partnerships between CCS and other departments to develop solutions and improve processes through technology.
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty.
In his session at 16th Cloud Expo, Denny Heaberlin, Security Product Manager with Windstream's Cloud and Data Center Marketing team, discussed how to manage these concerns and how choose the right cloud vendor, an essential part of any cloud strategy.
"In this issue of “The 10 Most Trusted Companies in
Enterprise Security” Insights Success has shortlisted
those enterprise security providers which are providing
solutions that are systematically profile and
contextualize security threats with a level of detail and
granularity that has never been achieved before."
The 5 most trusted cyber security companies to watch.Merry D'souza
Through this latest edition of Insights Success, we wish to feature organizations that are quite adept in utilizing and adopting these tech-trends in their operations. ‘The 5 Most Trusted Cyber Security Companies to Watch,’ is an edition which will take you on a journey towards the digital security space. So, give it a read and enjoy articles curated by our in-house editorial team.
Evolution of cyber threats and the development of new security architectureEY
EY presented at the 22 World Petroleum Congress, focusing on the current cyber threats for oil and gas companies, the impact of new security architecture and the rise of IIOT.
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
This document provides information about the Industrial Control Cybersecurity conference to be held on October 13-14, 2015 in Sacramento, California. The conference will address key topics such as vulnerability detection and mitigation in critical infrastructure sectors like energy, oil, gas, electric and water. It will feature presentations from industry and government leaders as well as cybersecurity experts. The goal is to enhance public-private collaboration and information sharing to improve security of national infrastructure systems.
The Most Influential Leaders in Cyber Security, 2023.pdfCIO Look Magazine
This edition features a handful of The Most Influential Leaders in Cyber Security that are leading us to a better future
Read More: https://ciolook.com/the-most-influential-leaders-in-cyber-security-2023-july2023/
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
Datacomm Cloud Business Overview
Making Indonesia 4.0
Digital Transformation in Banking Industry
Introduction to Cloud Computing
Big Data Analytics Introduction
Big Data Analytics Application in Banking
Do you possess an active TS/SCI, CI Poly or Full Scope Poly Security Clearance & looking for your next Cleared Career Opportunity?
Join us at the reStartEvents Nationwide TS/SCI & Above Cleared Virtual Career Fair on March 31st and engage with hiring managers and recruiters from a dozens of the nations leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one day at reStart!
reStart Nationwide TS/SCI & Above Cleared Virtual Career Fair
Thursday, March 31st, 2022
2pm - 5pm est
Details & Registration: https://tinyurl.com/yc6dzbnb
An Active TS/SCI or Above Security Clearance IS Required For This Event
Companies Interviewing:
• Leidos
• Northrop Grumman
• Abacus Technology Corporation
• Air Force Civilian Service
• Amazon Web Services
• AnaVation
• Applied Integrated Technologies
• Cisco
• Cubic Mission and Performance Solutions
• ICF
• Jacobs
• Lumen
• Markon Solutions
• Oasis Systems
• Oracle
• Solidus Technical Solutions
• Watermark Risk Management
• Xcellent Technology Solutions
Whether you are transitioning from the military or federal government, actively seeking employment, your contract is coming to an end or window shopping and want to see what else is out there for you, This Is The Event For You!
Positions available include: Software Engineers, Help Desk, Web Developers, Budget Analysts, Program / Project Managers, Acquisition Specialist, Cyber Security, DevOps Engineer, Storage Engineers, Aerospace Engineer, Systems Engineers, SharePoint Developer, Reverse Engineers, Intelligence Analysts, Network Engineers, Penetration Testers, JAVA Programmers, Data Scientist, Cloud Engineer, Information Systems Security, Administrative Assistants, Network Admins, Linguists, Full Stack Developers, LINUX Systems Admins and much more....
This event will be accessible to job seeking professionals with a minimum TS/SCI Security Clearance from coast to coast and will offer Cleared career opportunities both CONUS & OCONUS.
Please share this unprecedented event with ALL your TS/SCI & Polygraph Tested Security Cleared friends and colleagues.
Looking forward to having you join us online on March 31st
This whitepaper will help you to answer key questions such as: How will your organization protect itself from advanced cyber-attacks? What are you doing to detect suspicious behavior within the organization and beyond? What processes and tools will you implement to quickly respond to threats and quickly recover from the effects of an attack?
The 10 most trusted networking and security solution providersMerry D'souza
Any system that provides its user with a reasonable degree of protection again real or perceived threats, physical attacks, unwanted intrusion, disrupted operations, fires & thefts come under “Security System”. With the market flooded with a variety of security products; choosing the best-fitted solution for the customer is the biggest challenge today.
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
Microsoft Strategic Initiative
Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling
Good afternoon everyone. My name is Charles, this is Lizzie, Andres, and Kyle. Today, we are going to present a strategic initiative plan for microsoft for the 2018 fiscal year and beyond.
Cybersecurity
The topic we want to focus on and bring to the business’s attention today is cybersecurity. For those who are unfamiliar, Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack and unauthorized access.
Cybercrime Portfolio
Cyber attacks
Security vulnerabilities
Disclosure of personal data
Network outages and data loss
Disruption of online services
All threaten long-term customer loyalty, security, firm revenue, and firm reliability
Activities that cybersecurity tries to prevent include but are not limited to cyber attacks, etc etc. which all threaten customer relations, security of our firm, our revenue, as well as firm reliability.
Increasing Prevalence
The reason why cybersecurity has come on our radar now is because of the steady increases of attacks in the last few years. The two biggest reasons for this are the boom of the internet of things as well as the underground market. When we implement software in all areas of our life, there will be more opportunities for cybercriminals to target.
Cybercrime Costs
Cybersecurity spending to exceed $1 trillion from 2017-2021
Cybersecurity Costs
Average cost of ~$12 – $17M per incident
Data Breaches
Overall costs to hit $6 trillion annually by 2021
Cybercrime Costs
$325M in damages caused by global ransomware
Damaged caused by global ransomware to surpass $5B in 2017. A 15x from 2015
Global Ransomware
Cybersecurity- Our Business Segments
Personal Computing
Windows OS
82.96% market share
Dependence on the OS by customers like the U.S. Department of Defense or the biggest banks in the world like JP Morgan Chase
A bug that restricts computer usage or alters functions could cause damage to millions of devices and users’ information
Apple macOS password glitch this week; hurts their sales
Intelligent Cloud
Azure, Dynamics 365
Links multiple networks and is the backbone of the firm’s infrastructure
Stores business and personal data
Leaks or hacks can expose personal banking or other sensitive information
Late 2010, Microsoft cloud breach allowed anybody to see employee information
Productivity & Business Processes
Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM
Office (Commercial and 365)
Over 1 billion users
Excel contains financial information that can benefit hackers
Powerpoint can contain interfirm information that is not public yet
Office 365 breach June 2016
57% of users affected
Ransom note that also included an audio warning
Next Steps
The
Solution
Acquire new resources to boost cyber security through:
Organic
Internal departmental growth
Acquisitions
Complete control of external resources
Alliances
P ...
Looking for your next Cleared Career Opportunity?
Join us at the reStart Nationwide ALL-Clearances Virtual Career Fair on August 25th and engage with hiring managers and recruiters from some of the nation's leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one day at reStart!
reStart Nationwide Cleared Virtual Career Fair
Thursday, August 25th, 2022
2pm - 5pm est
Details & Registration: https://tinyurl.com/9apn5xp8
An Active Security Clearance IS Required For This Event
Companies Interviewing:
• Leidos
• Northrop Grumman
• Abacus Technology Corporation
• Accenture Federal Services
• ACT1
• Axient
• Booz Allen Hamilton
• Cognosante
• Defense Contract Management Agency
• Google
• JANUS Research
• Lawrence Livermore National Laboratory
• LinQuest Corporation
• Oasis Systems
• Odyssey Systems
• Palo Alto Networks
• Raytheon Technologies
• Sabre Systems
Whether you are transitioning from the military or federal government, furloughed, actively seeking employment, your contract is coming to an end or window shopping and want to see what else is out there for you, This Is The Event For You!
Positions available include: Software Engineers, Help Desk, Web Developers, Budget Analysts, Program / Project Managers, Cyber CounterIntelligence Specialists, Storage Engineers, Business Analytics, Systems Engineers, SharePoint Developer, Reverse Engineers, Intelligence Analysts, Network Engineers, CNO Analysts, Penetration Testers, JAVA Programmers, Cloud Engineer, Information Systems Security, Administrative Assistants, Network Admins, Linguists, Full Stack Developers, LINUX Systems Admins and much more....
This event will be accessible to job seeking professionals from coast to coast and will offer Cleared career opportunities both CONUS & OCONUS.
Please share this unprecedented event with ALL your Security Cleared friends and colleagues.
Looking forward to having you join us online on August 25th
The first brochure for SMi Group's 3rd annual Oil & Gas Cyber Security conference & exhibition is here. Don't miss the Early Bird deadline and contact Alia Malick if you want to get involved.
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
The document summarizes a panel discussion on resolving the paradox between trust and uptake of cloud services. The panel, moderated by Nava Levy of cVidya Networks, includes experts from CSA, TOA Technologies, Salesforce.com, RSA, and cVidya Networks. They will discuss the roots of the trust vs uptake paradox, trust issues providers must address, and whether it presents an opportunity or threat. The goal is to understand customer security and data concerns and how addressing them can drive cloud adoption.
Executive panel discussion at the 2010 BDPA Technology Conference on "Federal IT Initiatives".
Panel members: John James (US Navy), Bob Whitkp (US Navy), Tony McMahon (IRS) and Dr. Anthony Junior (US Navy)
Insights Success is The Best Business Magazine in the world for enterprises. Being a platform of 10 most trusted networking solution provider companies.
Forcepoint was created in 2016 to commercialize defense-grade cybersecurity technologies for large enterprises. It is one of the largest private cybersecurity companies with over 13,000 customers in more than 150 countries. Trillions of dollars have been spent on cybersecurity over the past 7 years, but attackers still have a 95% success rate. Digital transformation unlocks value but also introduces new cybersecurity challenges. Forcepoint takes a human-centric approach to security focused on users and data to address these challenges in the new digital era.
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
Chuck D. BROOKS, President of Brooks Consulting International
Mr. Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles.
In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck has been a featured speaker at dozens of conferences and webinars (Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity). and has published more than 200 articles and blogs on cybersecurity, homeland security and technology issues. His writings have appeared on AT&T, IBM, Microsoft, General Dynamics, Xerox, Cylance, Checkpoint, and many other blogs.
Troels Ørting Jørgensen, Chairman at Bullwall, Expert Member at INTERPOL
Mr. Ørting is a globally recognized Cyber Security Expert. He has been working in cybersecurity ‘first line’ for over 4 decades. Throughout career, Mr. Ørting has been working with governments and corporations to advise on how they react to the increasing international cyber threats, and worked closely with law enforcement, intelligence services and cyber security businesses.
Formerly, with the Danish National Police, first as Director, Head of the Serious Organised Crime Agency and then as Director of Operations, Danish Security Intelligence Service; Deputy Head, ICT Department and Deputy Head, OC Department, Europol, EU’s Police Agency; Head of European Cybercrime Centre and Head of Europol Counter Terrorist and Financial Intelligence Centre. 2015-18, Group Chief Information Security Officer (CISO), Barclays. Chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has very strong experience in cyber security. Since 2018, Head of the Centre for Cybersecurity, World Economic Forum. Chairman of the Board of World Economic Forum Centre for Cybersecurity (C4C).
Troels Oerting
“WE, IN SECURITY, SHOULD NOT PROMOTE FEAR – BUT PROTECT HOPE”
BEFORE THE GLOBAL PANDEMIC HIT THE WORLD IN SPRING 2020, the digital transformation increased speed and magnitude. Fuelled by super-drivers like mobile/5G, IoT, Cloud and AI the number of users, applications, storage, connections and algorithms outpaced what we had seen before. The huge possibilities provided by the Internet created a ‘tech’ environment attracting the best brains the World could produce and geopolitical tensions between China, Russia, EU and US intensified the regional competition on ‘who controls the Internet’ and the subsequent influence, growth and wealth.
THE GLOBAL COVID PANDEMIC FORCED US TO MOVE APPROXIMATELY 1.2 BN WORKERS FROM THEIR OFFICES to work from homes in order to keep the wheels spinning. Internet enabled communication tools substituted physical meetings, teaching, marketing, trading, reading, accounting, watching and demand for online services surged and Accenture has estimated that globally we went through 3 years normal speedy digital transformation in just 3 months. This will continue. We will not go back to the ‘old days’ even after we get a vaccine. We will continue to work remotely – not necessarily from home but from anywhere. Both employers and employees have seen the benefits of this new flexible work-regime providing support from working both from offices and from anywhere.
“In the future everything will be connected, everything will be sensing, everything will be stored and everything will be used, sold or utilised in other ways”
THE FUTURE will provide more positive opportunities for the global, and connected, citizen – for businesses, education, healthcare, sustainability, climate, transparency and democracy. But it will also present challenges to security, privacy...
More Related Content
Similar to Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
This document provides information about the InfoSec World 2017 Conference & Expo taking place April 3-5, 2017 in Orlando, Florida. The conference will feature over 70 sessions across 7 tracks, 10 workshops, and keynote speakers discussing topics such as DevSecOps, cloud security, risk management, and more. Pre-conference and post-conference workshops will be offered on topics including mainframe security, red team/blue team techniques, incident response, and malware analysis.
The document summarizes the Computing and Communications Services (CCS) annual report at the University of Guelph. It discusses how CCS has increasingly focused on partnerships across campus to provide IT services and support a variety of projects. These partnerships help CCS leverage opportunities from technological advances while addressing challenges. The report highlights CCS' focus on people, technology, and partnerships. It provides examples of successful partnerships between CCS and other departments to develop solutions and improve processes through technology.
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty.
In his session at 16th Cloud Expo, Denny Heaberlin, Security Product Manager with Windstream's Cloud and Data Center Marketing team, discussed how to manage these concerns and how choose the right cloud vendor, an essential part of any cloud strategy.
"In this issue of “The 10 Most Trusted Companies in
Enterprise Security” Insights Success has shortlisted
those enterprise security providers which are providing
solutions that are systematically profile and
contextualize security threats with a level of detail and
granularity that has never been achieved before."
The 5 most trusted cyber security companies to watch.Merry D'souza
Through this latest edition of Insights Success, we wish to feature organizations that are quite adept in utilizing and adopting these tech-trends in their operations. ‘The 5 Most Trusted Cyber Security Companies to Watch,’ is an edition which will take you on a journey towards the digital security space. So, give it a read and enjoy articles curated by our in-house editorial team.
Evolution of cyber threats and the development of new security architectureEY
EY presented at the 22 World Petroleum Congress, focusing on the current cyber threats for oil and gas companies, the impact of new security architecture and the rise of IIOT.
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
This document provides information about the Industrial Control Cybersecurity conference to be held on October 13-14, 2015 in Sacramento, California. The conference will address key topics such as vulnerability detection and mitigation in critical infrastructure sectors like energy, oil, gas, electric and water. It will feature presentations from industry and government leaders as well as cybersecurity experts. The goal is to enhance public-private collaboration and information sharing to improve security of national infrastructure systems.
The Most Influential Leaders in Cyber Security, 2023.pdfCIO Look Magazine
This edition features a handful of The Most Influential Leaders in Cyber Security that are leading us to a better future
Read More: https://ciolook.com/the-most-influential-leaders-in-cyber-security-2023-july2023/
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
Datacomm Cloud Business Overview
Making Indonesia 4.0
Digital Transformation in Banking Industry
Introduction to Cloud Computing
Big Data Analytics Introduction
Big Data Analytics Application in Banking
Do you possess an active TS/SCI, CI Poly or Full Scope Poly Security Clearance & looking for your next Cleared Career Opportunity?
Join us at the reStartEvents Nationwide TS/SCI & Above Cleared Virtual Career Fair on March 31st and engage with hiring managers and recruiters from a dozens of the nations leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one day at reStart!
reStart Nationwide TS/SCI & Above Cleared Virtual Career Fair
Thursday, March 31st, 2022
2pm - 5pm est
Details & Registration: https://tinyurl.com/yc6dzbnb
An Active TS/SCI or Above Security Clearance IS Required For This Event
Companies Interviewing:
• Leidos
• Northrop Grumman
• Abacus Technology Corporation
• Air Force Civilian Service
• Amazon Web Services
• AnaVation
• Applied Integrated Technologies
• Cisco
• Cubic Mission and Performance Solutions
• ICF
• Jacobs
• Lumen
• Markon Solutions
• Oasis Systems
• Oracle
• Solidus Technical Solutions
• Watermark Risk Management
• Xcellent Technology Solutions
Whether you are transitioning from the military or federal government, actively seeking employment, your contract is coming to an end or window shopping and want to see what else is out there for you, This Is The Event For You!
Positions available include: Software Engineers, Help Desk, Web Developers, Budget Analysts, Program / Project Managers, Acquisition Specialist, Cyber Security, DevOps Engineer, Storage Engineers, Aerospace Engineer, Systems Engineers, SharePoint Developer, Reverse Engineers, Intelligence Analysts, Network Engineers, Penetration Testers, JAVA Programmers, Data Scientist, Cloud Engineer, Information Systems Security, Administrative Assistants, Network Admins, Linguists, Full Stack Developers, LINUX Systems Admins and much more....
This event will be accessible to job seeking professionals with a minimum TS/SCI Security Clearance from coast to coast and will offer Cleared career opportunities both CONUS & OCONUS.
Please share this unprecedented event with ALL your TS/SCI & Polygraph Tested Security Cleared friends and colleagues.
Looking forward to having you join us online on March 31st
This whitepaper will help you to answer key questions such as: How will your organization protect itself from advanced cyber-attacks? What are you doing to detect suspicious behavior within the organization and beyond? What processes and tools will you implement to quickly respond to threats and quickly recover from the effects of an attack?
The 10 most trusted networking and security solution providersMerry D'souza
Any system that provides its user with a reasonable degree of protection again real or perceived threats, physical attacks, unwanted intrusion, disrupted operations, fires & thefts come under “Security System”. With the market flooded with a variety of security products; choosing the best-fitted solution for the customer is the biggest challenge today.
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
Microsoft Strategic Initiative
Charls Yang, Yining Xie, Andres Hoberman, Kyle Pauling
Good afternoon everyone. My name is Charles, this is Lizzie, Andres, and Kyle. Today, we are going to present a strategic initiative plan for microsoft for the 2018 fiscal year and beyond.
Cybersecurity
The topic we want to focus on and bring to the business’s attention today is cybersecurity. For those who are unfamiliar, Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs, and data from attack and unauthorized access.
Cybercrime Portfolio
Cyber attacks
Security vulnerabilities
Disclosure of personal data
Network outages and data loss
Disruption of online services
All threaten long-term customer loyalty, security, firm revenue, and firm reliability
Activities that cybersecurity tries to prevent include but are not limited to cyber attacks, etc etc. which all threaten customer relations, security of our firm, our revenue, as well as firm reliability.
Increasing Prevalence
The reason why cybersecurity has come on our radar now is because of the steady increases of attacks in the last few years. The two biggest reasons for this are the boom of the internet of things as well as the underground market. When we implement software in all areas of our life, there will be more opportunities for cybercriminals to target.
Cybercrime Costs
Cybersecurity spending to exceed $1 trillion from 2017-2021
Cybersecurity Costs
Average cost of ~$12 – $17M per incident
Data Breaches
Overall costs to hit $6 trillion annually by 2021
Cybercrime Costs
$325M in damages caused by global ransomware
Damaged caused by global ransomware to surpass $5B in 2017. A 15x from 2015
Global Ransomware
Cybersecurity- Our Business Segments
Personal Computing
Windows OS
82.96% market share
Dependence on the OS by customers like the U.S. Department of Defense or the biggest banks in the world like JP Morgan Chase
A bug that restricts computer usage or alters functions could cause damage to millions of devices and users’ information
Apple macOS password glitch this week; hurts their sales
Intelligent Cloud
Azure, Dynamics 365
Links multiple networks and is the backbone of the firm’s infrastructure
Stores business and personal data
Leaks or hacks can expose personal banking or other sensitive information
Late 2010, Microsoft cloud breach allowed anybody to see employee information
Productivity & Business Processes
Office, Exchange, Skype, Outlook, LinkedIn, ERP, CRM
Office (Commercial and 365)
Over 1 billion users
Excel contains financial information that can benefit hackers
Powerpoint can contain interfirm information that is not public yet
Office 365 breach June 2016
57% of users affected
Ransom note that also included an audio warning
Next Steps
The
Solution
Acquire new resources to boost cyber security through:
Organic
Internal departmental growth
Acquisitions
Complete control of external resources
Alliances
P ...
Looking for your next Cleared Career Opportunity?
Join us at the reStart Nationwide ALL-Clearances Virtual Career Fair on August 25th and engage with hiring managers and recruiters from some of the nation's leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one day at reStart!
reStart Nationwide Cleared Virtual Career Fair
Thursday, August 25th, 2022
2pm - 5pm est
Details & Registration: https://tinyurl.com/9apn5xp8
An Active Security Clearance IS Required For This Event
Companies Interviewing:
• Leidos
• Northrop Grumman
• Abacus Technology Corporation
• Accenture Federal Services
• ACT1
• Axient
• Booz Allen Hamilton
• Cognosante
• Defense Contract Management Agency
• Google
• JANUS Research
• Lawrence Livermore National Laboratory
• LinQuest Corporation
• Oasis Systems
• Odyssey Systems
• Palo Alto Networks
• Raytheon Technologies
• Sabre Systems
Whether you are transitioning from the military or federal government, furloughed, actively seeking employment, your contract is coming to an end or window shopping and want to see what else is out there for you, This Is The Event For You!
Positions available include: Software Engineers, Help Desk, Web Developers, Budget Analysts, Program / Project Managers, Cyber CounterIntelligence Specialists, Storage Engineers, Business Analytics, Systems Engineers, SharePoint Developer, Reverse Engineers, Intelligence Analysts, Network Engineers, CNO Analysts, Penetration Testers, JAVA Programmers, Cloud Engineer, Information Systems Security, Administrative Assistants, Network Admins, Linguists, Full Stack Developers, LINUX Systems Admins and much more....
This event will be accessible to job seeking professionals from coast to coast and will offer Cleared career opportunities both CONUS & OCONUS.
Please share this unprecedented event with ALL your Security Cleared friends and colleagues.
Looking forward to having you join us online on August 25th
The first brochure for SMi Group's 3rd annual Oil & Gas Cyber Security conference & exhibition is here. Don't miss the Early Bird deadline and contact Alia Malick if you want to get involved.
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
The document summarizes a panel discussion on resolving the paradox between trust and uptake of cloud services. The panel, moderated by Nava Levy of cVidya Networks, includes experts from CSA, TOA Technologies, Salesforce.com, RSA, and cVidya Networks. They will discuss the roots of the trust vs uptake paradox, trust issues providers must address, and whether it presents an opportunity or threat. The goal is to understand customer security and data concerns and how addressing them can drive cloud adoption.
Executive panel discussion at the 2010 BDPA Technology Conference on "Federal IT Initiatives".
Panel members: John James (US Navy), Bob Whitkp (US Navy), Tony McMahon (IRS) and Dr. Anthony Junior (US Navy)
Insights Success is The Best Business Magazine in the world for enterprises. Being a platform of 10 most trusted networking solution provider companies.
Forcepoint was created in 2016 to commercialize defense-grade cybersecurity technologies for large enterprises. It is one of the largest private cybersecurity companies with over 13,000 customers in more than 150 countries. Trillions of dollars have been spent on cybersecurity over the past 7 years, but attackers still have a 95% success rate. Digital transformation unlocks value but also introduces new cybersecurity challenges. Forcepoint takes a human-centric approach to security focused on users and data to address these challenges in the new digital era.
Similar to Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University (20)
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
Chuck D. BROOKS, President of Brooks Consulting International
Mr. Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles.
In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck has been a featured speaker at dozens of conferences and webinars (Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity). and has published more than 200 articles and blogs on cybersecurity, homeland security and technology issues. His writings have appeared on AT&T, IBM, Microsoft, General Dynamics, Xerox, Cylance, Checkpoint, and many other blogs.
Troels Ørting Jørgensen, Chairman at Bullwall, Expert Member at INTERPOL
Mr. Ørting is a globally recognized Cyber Security Expert. He has been working in cybersecurity ‘first line’ for over 4 decades. Throughout career, Mr. Ørting has been working with governments and corporations to advise on how they react to the increasing international cyber threats, and worked closely with law enforcement, intelligence services and cyber security businesses.
Formerly, with the Danish National Police, first as Director, Head of the Serious Organised Crime Agency and then as Director of Operations, Danish Security Intelligence Service; Deputy Head, ICT Department and Deputy Head, OC Department, Europol, EU’s Police Agency; Head of European Cybercrime Centre and Head of Europol Counter Terrorist and Financial Intelligence Centre. 2015-18, Group Chief Information Security Officer (CISO), Barclays. Chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has very strong experience in cyber security. Since 2018, Head of the Centre for Cybersecurity, World Economic Forum. Chairman of the Board of World Economic Forum Centre for Cybersecurity (C4C).
Troels Oerting
“WE, IN SECURITY, SHOULD NOT PROMOTE FEAR – BUT PROTECT HOPE”
BEFORE THE GLOBAL PANDEMIC HIT THE WORLD IN SPRING 2020, the digital transformation increased speed and magnitude. Fuelled by super-drivers like mobile/5G, IoT, Cloud and AI the number of users, applications, storage, connections and algorithms outpaced what we had seen before. The huge possibilities provided by the Internet created a ‘tech’ environment attracting the best brains the World could produce and geopolitical tensions between China, Russia, EU and US intensified the regional competition on ‘who controls the Internet’ and the subsequent influence, growth and wealth.
THE GLOBAL COVID PANDEMIC FORCED US TO MOVE APPROXIMATELY 1.2 BN WORKERS FROM THEIR OFFICES to work from homes in order to keep the wheels spinning. Internet enabled communication tools substituted physical meetings, teaching, marketing, trading, reading, accounting, watching and demand for online services surged and Accenture has estimated that globally we went through 3 years normal speedy digital transformation in just 3 months. This will continue. We will not go back to the ‘old days’ even after we get a vaccine. We will continue to work remotely – not necessarily from home but from anywhere. Both employers and employees have seen the benefits of this new flexible work-regime providing support from working both from offices and from anywhere.
“In the future everything will be connected, everything will be sensing, everything will be stored and everything will be used, sold or utilised in other ways”
THE FUTURE will provide more positive opportunities for the global, and connected, citizen – for businesses, education, healthcare, sustainability, climate, transparency and democracy. But it will also present challenges to security, privacy...
This document is a magazine highlighting outstanding cybersecurity professionals from around the world. It contains short profiles and articles on various topics related to cybersecurity.
The magazine includes an editorial emphasizing the need for cybersecurity training focused on front-line roles to address skills shortages. It also contains articles on the importance of raising public awareness of cybersecurity, seeing cybersecurity as a journey rather than a destination, integrating other fields like psychology into cybersecurity, and taking a business-first approach to cybersecurity. The magazine profiles 19 cybersecurity professionals from different countries and continents working to create a more secure digital future.
Margo KONIUSZEWSKI’s motto in tackling cyber challenges is « Cybersecurity education is like a marathon, not a sprint. It calls for a sustained effort, crosscutting approach and questions that lead to novel thinking and action! »
She champions digital literacy, cybersecurity and lifelong learning as the new imperatives of Economy 4.0, from junior to senior.
Her Cybersecurity Challenge, that took place despite the COVID crisis, was the world’s first competition to bring together multi-disciplinary “tiger groups” - student teams from IT/engineering, business, law, medicine and military academies in tackling a massive and far-reaching cyber-crisis.
Building on this success she launched a Regional Cyber Labs network run by students for students and the wider community as centers of cyber competence to raise awareness and educate.
The project went worldwide with the Global Cyber Lab to promote cross-sectoral action between the private/public sectors, academia, and diplomats. Her « New Roadmap for Cybersecurity Education » report was adopted and commended by the United Nations Open Ended Working Group on Cybersecurity as a benchmark in cyber capacity-building for all 193 Member States to take-up to boost their cybersecurity landscape.
She then organized the first Global Cybersecurity Roadshow 2021-22 event as part of a year-long program of exchanges between university students from all continents and world class cybersecurity champions. She is now touring Poland with events and conferences around her new audiobook: “Striptease in the age of apps and algos” on technology and how the digital transformation is impacting every aspect of our lives.
For Margo, cybersecurity is too important to leave in the hands of bureaucrats or technicians. We must get everyone on board!
------------------------------------
Adam KONIUSZEWSKI is Adam Koniuszewski serves as President of the Warsaw Security Hub of the Swiss Embassy in Poland and as Executive in Residence at the Geneva Center for Security Policy (GCSP), an international think-tank on global affairs diplomacy to promote security and cooperation.
A social entrepreneur and philanthropist, he launched The Bridge Foundation with his wife Margo to promote awareness and cooperative action on pressing security, economic and social challenges.
Adam has extensive experience in a wide range of sectors including Big Four, Fortune 100, and global non-profit in close cooperation with the United Nations and international organizations. For close to a decade, he worked with President Mikhail Gorbachev as executive director of his international initiative to address global security and sustainability. He was particularly successful in developing partnerships with the private sector to implement development projects around the world.
Adam is actively engaged with the CPA and CFA organizations to promote the highest ethical standards and professional compliance for their members.
Adam holds a Graduate Diploma and ...
Officer of the Order of the British Empire for Business (OBE), Christiane Wuillamie OBE started her technology career in 1980 after working for UNCHR setting up a resettlement camp for Vietnamese refugees.
Christiane has done every job in IT from coding, to running a software house, to being CIO in Financial Services. A transformational leader, she built and operationalised a strong, high performance culture in every role and every turnaround project.
She leverages technology to solve business challenges through developing people and joined-up process that deliver a competitive advantage. Her cyber security and technology management skills make her a valued Board member and advisor on digital transformation.
In the fast-changing cyber world, Christiane believes that only a strong culture of collaboration, transparency and responsible leadership can deliver safety and security for all.
Besides being a Non-Executive Board member, Christiane is the co-founder of a technology firm, PYXIS Culture Technologies that is quantifying the linkage between corporate culture, leadership and business results and helping senior leaders understand how culture impacts cyber security, safety, conduct risk, innovation and customer satisfaction.
“It’s time for the role of the CISO to change from information security to enterprise security.”
Christiane WUILLAMIE OBE
PYXIS Culture Technologies, Ltd is your business partner for cyber security. We differ from traditional consulting firms in two important areas. We combine over 40 years of experience in how culture impacts performance with deep operational experience in technology management, digital transformation, cyber security, and business turnarounds.
At PYXIS Culture Technologies we have pioneered an ecosystem modelling approach for understanding, measuring, and managing cyber security risks to improve business performance. Using systems analytics and proprietary algorithms along with internal company data, we can identify and map the causal factors inside your organization that have a significant impact on cyber security and business performance.
Find out more about PYXIS at www.pyxisculture.com
Or contact: info@pyxisculture.com
John R Childress is a pioneer in the field of leadership and corporate culture, advising CEOs and senior teams on the impact of company culture on business performance for almost 40 years.
Born in the Cascade Mountains of Oregon, he lived in Carmel Highlands, California during most of his early business career, before moving to London, England in 1996. John is a Phi Beta Kappa scholar with a BA degree (Magna cum Laude) from the University of California, a Masters Degree from Harvard University and was a PhD candidate at the University of Hawaii before deciding on a career as a business entrepreneur in the mid-70s. In 1968-69 he attended the American University of Beirut and it was there that his interest in cultures, leadership and group dynamics began to take shape.
Daniel Ehrenreich, BSc. is a leading Industrial Control System (ICS) expert and acting as consultant and lecturer at Secure Communications and Control Experts (SCCE) consulting entity, based in Israel.
Periodically conducting workshop sessions via Internet and in person for educating international participants on ICS cyber security risks and defense measures for a broad range of ICS verticals.
Studied CISSP in 2014 and is certified as a Lead Auditor for the ISO 27001-2013 standard by the Israeli Institute of Standards.
Daniel has over 30 years of engineering experience with ICS for: electricity, water, oil and gas and power plants as part of his activities at: Tadiran Electronics, Motorola Solutions, Siemens and Waterfall Security.
Reselected as the Chairman for the 6th ICS Cybersec AI&ML 2021 hybrid conference, organized by People and Computers.
Stewart A. Skomra is a rare individual defining the adage “experience trumps theory.”
He has immersed himself deep within myriad industries spanning multiple initiatives, cultures, and countries; accumulating knowledge and experience ‘walking-the-walk’ to support ‘talking-the-talk’ with a deep conviction of an ever-brighter, technology-enhanced, continually improving human experience.
Our collaboration on topics ranging from the sanctity of the individual to macro cyclical trends resulting from the confluence of Societal-Economic-Technology factors has enabled each of us to advance our thinking much further than we ever could have individually.
I look forward to continuing our journey to realize the vision of an ever-expanding, continually vibrant future.
We welcome all individuals oriented toward the pursuit of good built on a foundation of truth to join with us.
Top Cyber News Magazine. Carmen Marsh
The technologies of tomorrow are at the heart of our daily life and work, touching all aspects of our lives in countless ways. Organizations and individuals that prioritize digital innovation are achieving remarkable results. The advancement of technologies has seen new digital highways emerge, and on these highways, we desperately need to foster greater cybersecurity. Digitalization and cybersecurity must evolve hand in hand.
Cybersecurity is becoming the most important security topic of the future. The threat landscape is changing constantly and, probably, by the time you have finished reading this article, a new vulnerability was discovered. It is for this reason that the foundation of knowledge and best strategies is so important, and the need for skilled cybersecurity professionals is more crucial than ever.
In cybersecurity, and in tech in general the need to gather diverse input and perspective to meet cyber-threats and technology road-blocks grows by the minute.
To close industry’s skills gap, to continue developing the world’s cyber workforce of the future, we must make cybersecurity education an integral part of our culture, taught and evangelized across genders, ages, and organizational sectors. For statistically, global shortages in talent affecting 82% of organizations.
Now is the time for women to step into emerging technologies and cybersecurity industries. Reskilling is a great issue. Inclusion is as important as innovation. We will have to go into learning mode, be willing to be taught.
Founded by Carmen Marsh, 100 Women in 100 Days Cybersecurity Career Accelerator creates more career pathways for women wanting to further build security expertise, advance their security knowledge or start a career in cybersecurity.
Talented and highly qualified technologist, born leader and role model, Mrs. Carmen March invests her passion, knowledge and faith to educate and mentor women in cybersecurity.
The brightest stars are those who shine for the benefit of others. Carmen Marsh is this star.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
1. MAGAZINE
TOP CYBER NEWS
NOVEMBER EDITION
HOW CAPITOL TECHNOLOGY UNIVERSITY DEVELOPS THE TALENT AND CONFIDENCE OF ITS STUDENTS,
ENABLING THEM TO USE THEIR EDUCATION FOR ENGINEERING AMAZING CAREER TRAJECTORIES
PRESIDENT, CAPITOL
TECHNOLOGY UNIVERSITY
MOST INFLUENTIAL
EDUCATIONAL LEADER
BY THE EDUCATION MAGAZINE
PRACTICAL EDUCATION
TAUGHT BY INDUSTRY EXPERTS
Dr. BRADFORD SIMS
THE
WINNING STRATEGY
FOR CYBERSECURITY
EXCLUSIVE ARTICLE BY
MATTHEW
ROSENQUIST
2. “Education has always been a profit-enabler for
individuals and the corporation. Education, both
conception and delivery, must evolve quickly and
radically to keep pace with digital transition.
Education is a part of the digital equation.”
~ Stéphane NAPPO
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 2
3. About Dr. Bradford SIMS
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 3
Dr. Bradford L. Sims became Capitol Technology University's eighth
president on June 1, 2017. An educator, administrator and construction
project manager, Dr. Sims has extensive experience both in academia and
industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from
Purdue University, which is also his undergraduate alma mater; he
received his B.S. in Building Construction Management there in 1990.
He also holds a master's of science degree in Building Construction from
the University of Florida. He is a member of the Sigma Lambda Chi
International Construction Honor Society and the American Institute of
Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10
Most Influential Educational Leaders of 2021. He leads Capitol
Technology University with an education laser-focused on STEM or
Management of STEM careers which uniquely positions students for top
roles in the region's booming tech hub.
4. 4
Learn
Build
Succeed
Capitol Technology University is
a private university in South Laurel
Maryland near Washington DC.
The university was founded in 1927
as the Capitol Radio Engineering
Institute by a former US
Navy Radioman. CREI changed its
name to Capitol Institute of
Technology in 1964, changed its
name again to Capitol College in
1987, and assumed its present name
in 2014.
Capitol offers undergraduate and
graduate programs specializing in
engineering, computer science,
information technology, and business.
It is classified among "Special Focus
Institutions-Schools of Engineering“
and is a National Center of Academic
Excellence in Informa tion
Assurance Education.
Capitol
Technology University,
through its Department of Computer
Science, provides degree programs in the
concentration areas of Computer Science,
Artificial Intelligence and Data Science, at
each of the bachelors, masters and doctoral
levels of study.
Capitol Technology University is part of
the job-rich pipeline supplying human
capital to America’s most technologically
advanced government agencies and their
private sector supply chains.
Capitol Tech provides a launch pad to a
better life. It’s because we’re laser-focused
on STEM careers and give students the
hands-on, real-world experience they need
to enter today’s tech job market.
About
the University
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
5. Education
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 5
GREAT CAREERS
Focused on STEM
CREATING
BUILDING
6. 6
Join our IBM Power Webinar:
Protect your data from core to cloud with IBM Power10
November 17th
, 14:00 CET
Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks alone
are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that the rate of
detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic, forcing companies to
find solutions or be ready to face long recovery times (an average of 23 days), huge costs (more than $4 million per
incident), as well as the loss of customer confidence and satisfaction.
This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation:
persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10 server is
the most secure and reliable in its class, with the Power10 processor-based systems further extending the industry-
leading security and reliability of the Power platform, and adding a special focus on protecting applications and data
in hybrid cloud environments.
Power10 introduces significant innovations along four major dimensions:
✓ Advanced Data Protection
✓ Platform Security
✓ Security Innovation for Modern Threats
✓ Integrated Security Management
Join our experts on Wednesday, November 17th
, to discuss about security challenges and cyber-resilience
strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with no
impact on performance.
Meet our experts:
Register now ➔
Sylvia Scheerová
Director
Cognitive Systems
IBM EMEA
Dimitrios Pendarakis
Distinguished Engineer
Chief Security Engineer
Cognitive Systems
Thomas Harrer
Distinguished Engineer
CTO, Servers & Storage
IBM EMEA
Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks
alone are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that
the rate of detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic,
forcing companies to find solutions or be ready to face long recovery times (an average of 23 days), huge costs
(more than $4 million per incident), as well as the loss of customer confidence and satisfaction.
This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation:
persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10
server is the most secure and reliable in its class, with the Power10 processor-based systems further
extending the industry-leading security and reliability of the Power platform, and adding a special focus on
protecting applications and data in hybrid cloud environments.
Power10 introduces significant innovations along four major dimensions:
✓ Advanced Data Protection
✓ Platform Security
✓ Security Innovation for Modern Threats
✓ Integrated Security Management
Join our experts on Wednesday, November 17th, to discuss about security challenges and cyber-resilience
strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with
no impact on performance.
Meet our experts:
Sylvia Scheerová
Director
Cognitive Systems
IBM EMEA
Dimitrios Pendarakis
Distinguished Engineer
Chief Security Engineer
Cognitive Systems
Thomas Harrer
Distinguished Engineer
CTO, Servers & Storage
IBM EMEA
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
https://event.on24.com/wcc/r/3498648/CC63274212B8BC230FD407CEC5E76FD1
7. When the Internet was still the
ARPANET it was a relatively closed
system used for research
communication by Universities and
research laboratories.
This changed in the 80s when
commercial used began to expand and
laid the foundation for the Internet we
use today. But while communication
and collaboration has always been a
core tenet of networking, security
wasn’t.
There were warnings like the Morris
worm in the 80s and warez hacks and
phishing of AOL accounts in the 90s,
but it wasn’t until the turn of the
century that network and information
security became a high visibility
priority for most organizations. Many
were simply too trusting - thinking the
technology was so advanced that it
simply couldn’t be attacked.
This was not the case. In the mid-90s it
wasn’t uncommon to hear people
pontificate that (cyber)security will be
solved in a few years. Decades later,
security is sadly, not solved, yet the
reason to secure systems is greater
than ever.
As technology has entered every aspect
of our lives: software and the cloud
power our cars, light up our homes and
towns, and enable doctors to collaborate
across the globe to develop vaccines at
previously unthinkable of speeds.
NATO considers cyberspace as a
military domain and most major
governments have cybersecurity chiefs.
The rapid growth of technology change
has been powered by widespread cloud
adoption, the “shift left” mindset, and
application deployment agility via
containerization.
IaaS enables us to spin up new
workloads and servers quickly, while
the low code/no code revolution allows
us to knit together services to create
innovative workloads.
“Have we solved security?
Unfortunately not - but security
professionals, have been a critical
part of the reason that technology
has been able to grow to where it
is today. Without security, we can’t
benefit from advanced techno-
logy.”
Have we solved security?
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 7
Editorial by Diana Kelley
Co-Founder and CTO of SecurityCurve
Diana KELLEY
Co-Founder & CTO
at SecurityCurve.
Former Global
Executive Security
Advisor at IBM and Cybersecurity Field
CTO at Microsoft. Founding Board
Member & CTO at Sightline Security.
The host of BrightTALK’s The (Security)
Balancing Act. Diana Kelley’s security
career spans over 30 years.
8. Focused on STEM since its inception in 1927, Capitol Technology University
has developed a robust, practical, and award-winning cybersecurity program
for students at all levels to learn the skills necessary to become industry
Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized
cybersecurity degrees, with SC Media naming the university’s cybersecurity
program as the 2020 Best Cybersecurity Program and the Chair of
Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
“This year with COVID-19 has been truly challenging for the nation, our
families, students, faculty, and employers. My fellow finalists all worked extra
hard this year to make sure that our students did not experience the “knowledge
gap” or a “lost year” that they could not afford during the pandemic,” said Dr.
Butler. “Capitol Tech has answered the call to deliver excellent hands-on
cybersecurity education for over 20 years and this individual award actually
recognizes excellence in our students, faculty, staff, alumni and our leadership
as a whole.”
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
Practical Education
Taught By Industry Experts
8
Author: Dr. Bradford Sims
‘The education of the next generation of Cyber experts
must start now’, include all those that have historically
been limited to be part of this defence of our ways of life.
~ Dr. Ian McAndrew
9. Since 2003, the Department of Homeland Security (DHS) and the National
Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the
NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university
will mentor hundreds of institutions offering cybersecurity programs across 14
states and the District of Columbia to develop or enhance their cybersecurity
programs.
This new title allows Capitol Tech to continue mentoring other universities in
cyber program creation in addition to opportunities the preexisting CAE
designation afforded the university. These include being selected by the NSA to
supplement their development program for new security engineers with
master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars,
and by the National Science Foundation (NSF) for two major multi-year grants
to address the shortage of cybersecurity professionals.
Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 9
10. Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are
immersed in a hands-on education led by industry experts to learn in-demand
skills. Undergraduate students learn UNIX O/S, C programming, networking,
virtual machines, vulnerability scanning, packet capture and analysis, and
password cracking during their first semester.
When combined with the aforementioned skills and the ability to earn
Security+, Certified Ethical Hacker, and Forensics certifications during their
time at Capitol Tech, most undergrad students are employable by their junior
year. Master's students learn advanced topics including cyberlaw, penetration
testing, forensics, vulnerability mitigation, and participate in a risk assessment
capstone.
This year, Capitol added cyber data analytics to address the growing need for
cyber analysts. Doctoral students learn skills necessary to succeed in
challenging careers such as security researcher and chief cyber strategist. This
year the university also addressed a huge gap by introducing a new PhD in
cybersecurity leadership. Kierra Jiles, a 2017 graduate of the Bachelor’s in
Cyber and Information Security program, fulfilled her seventh-grade self’s
dream when she landed the job of Site Reliability Engineer at Microsoft using
her previous experience in software and computer engineering for government
agencies including the U.S. Department of State, NASA, and the CIA.
“All the tools we used in our cybersecurity courses were relevant to what we’d
be doing in the real world,” says Jiles. “I’m still constantly getting job
interviews and opportunities even when I’m not looking. It’s nice to have that
job security—to know I’m still wanted in the career force and that’s strictly
because of my degree and the skills that my Capitol Tech education provided
me with.”
Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 10
Kierra Jiles, a 2017 graduate of the
Bachelor’s in Cyber and Information
Security program, fulfilled her
seventh-grade self’s dream when she
landed the job of Site Reliability
Engineer at Microsoft using her
previous experience in software and
computer engineering for
government agencies including the
U.S. Department of State, NASA,
and the CIA.
11. Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 11
Capitol Tech’s hands-on education provides students the unique ability to learn
and work in a variety of labs dedicated to cyber, forensics, identity
credentialing, Internet of Things, quantum computing, and security operations.
Through labs, sponsored projects, and clubs, students can work across
disciplines simulating real-world work environments. For example, cyber and
engineering students can collaboratively build and program robots for
competitions.
Undergraduate students can also participate in the National Security Scholars
Program which provides scholarships, paid internships in the defense and
intelligence industry, and assistance with obtaining a national security
clearance. Current and prospective graduate students benefit from direct access
to internal and external industry experts through two free STEM-focused
webinar series launched this year for working professionals.
These webinars, one of which was a collaboration with the NSA and several
Maryland community colleges led by Capitol Tech, serve as industry
introductions, Q&A sessions, and networking opportunities.
Capitol Tech’s dedication to providing students with a practical education
taught by industry experts has allowed the university to become a leader in
cybersecurity education. Coupled with the university’s many professional
partnerships, students at Capitol Tech are able to find lucrative careers that are
both personally fulfilling and meaningful to their field of interest.
If you are interested in pursuing an undergraduate or graduate degree at Capitol
Technology University
visit www.captechu.edu
or email admissions@captechu.edu
12. Interview with
Dr. Ian McAndrew
Dean of Doctoral Programs at Capitol Technology University
“Research can be both lonely and rewarding. I would encourage research in
areas that are of interest to the researcher and not that which is currently
popular. Any research of note is not going to happen overnight and your
interest will keep you dedicated.
~ Dr. Ian McAndrew, Dean of Doctoral Programs at Capitol Technology University
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 12
This interview is courtesy of Joe Fields,
Head of Influencer Marketing at Onalytica.com
“We are at the start of a long road”
13. [Joe Fields] Who is Ian McAndrew?
[Dr. Ian McAndrew] I am a Mechanical
Engineer by background, my qualifications
are a Bachelor's, Master's and a PhD as a
chartered engineer. Then I also did another
degree and qualified as an electrical engineer.
I carried on and did some more research at
Doctorate level and became a fellow of the
Royal Aeronautical Society. I’ve probably
become an over educated person who is best
left in academia rather than the real world.
I worked for the car industry initially, I used
to design car engines. Then I worked at the
University of Hertfordshire in England where
I spent 15-20 years. I then started to work for
Embry-Riddle Aeronautical University
worldwide where I spent 10 years. After that
I transferred to Capital Technology
University in America. I used to work for the
current president of the University I'm at
now, and when he transferred, he asked me to
come and work for him at his university.
Now although it’s an American University
with a campus, I am based in Europe and live
in Europe but I travel there lot. I tend to chair
about a dozen conferences all over the world
each year as an academic expert and a
professor. Now I dedicate my time to
working with doctoral students and I'm the
Dean of doctoral programs at the university.
[Joe Fields] How did you become an expert
in your key topics?
[Dr. Ian McAndrew] Well, it was never
planned it just sort of happened. I think a lot
of it was just committed work, research and
carrying on and eventually you find yourself
in a position of valedictory in that you’re
almost there without thinking about it.
I went to work at a University, involved in
thermodynamics, and then I took over the
aerodynamic area, and then got more and
more involved in aviation. It never really
became a plan, it was life drifting me along.
You get to a stage in academia where you’ve
been there for quite a few years and I
suppose you automatically inherit the title
“expert”. I have over 80 successful PhD
students in my life in my career of
supervising them. I have more than I’m
currently supervising, and it’s the main focus
of what I do and it’s a delight working with
people at that particular level.
[Joe Fields] What topic areas are you most
passionate about?
[Dr. Ian McAndrew] Numerical problem
solving is really something that I enjoy, that’s
what I find a nice mental challenge.
Where there’s a problem this lends itself to
research, solving numerical problems coming
up with answers for unknown areas. Then I
would tag on to that, working with students
and helping them achieve their goals and
becoming educated and successful in their
chosen areas. I have had over 80 PhD
successes and I get just as much of a thrill
out of my current PhD students’ passing as I
did the very first person passing.
That is something which stays with me and
it’s a wonderful part of my job that I’m
helping people achieve what is really for
most people a very, very high level that often
they don’t expect to achieve, because it’s a
sort of the plateau in academia. It’s delightful
to see that and when someone’s completed it
you can say congratulations Doctor.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 13
Interview with Dr. Ian McAndrew
“We are at the start of a long road”
14. “Knowledge is power. Information is liberating. Education is the premise of
progress, in every society, in every family.”
~ Kofi A. Annan
[Joe Fields] Which influencers influence
you within those key topics?
[Dr. Ian McAndrew] Well, I have to say, I
go back, and this is probably giving my age
away now. Sir Barnes Wallace to me was the
greatest engineer of the 20th century. As a
very young boy, I managed to meet him once
with my Grandfather that knew him. Barnes
Wallace, for those who are not familiar, is
probably most famous for designed the
bouncing bomb for the Dambusters raid. If
you look at his history however, he was also
the person that came up with the material
science for swing wing aircraft, he designed
the R101 Airships. He designed the
Wellington bomber. He designed the largest
non-nuclear bomb that existed up until a
couple of years ago when the Americans
dropped that super bomb in Afghanistan. It’s
amazing the legacy of what that man did
technically in the face of adversity. People
didn’t believe some of his innovative ideas,
but he followed them all the way through.
The bouncing bomb is an example of an
engineer with an innovation that, if they are
committed, they can achieve what they want.
He had a quote in life, and I like this so much
that I put this on the cover page of my first
doctorate which was “The whole joy of life is
in battle – not winning” and I think that’s
very true. If your follow that through to
reading a book for example, if you find a
good book that you are reading, it’s a
disappointment when you get to the end, and
you think now I’ve got to find another good
book. We can apply that to so much of our
life. It’s about enjoying what we’re doing and
not necessarily getting to the endpoint but
enjoying the route as you’re getting there. So
he is the person who is most influential in my
area.
[Joe Fields] Outside of your key topics who
else influences you?
[Dr. Ian McAndrew] I have to say it’s my
grandfather, what an amazing man. He used
to say “you have to look back to enjoy where
you’re going, because you have to see how
far you’ve come”. If you’re trying to learn
something, if you’re trying to solve
something, you can look at it and you can
think to yourself, I’m nowhere near the end.
With my career, you look back and you
realize I’ve come a long way and I’ve done
all that. My grandfather was influential like
that, you should be satisfied with what
you’ve got. For those of us that are in
education we are very, very lucky as we get
to disseminate information and help the next
generation.
Just as we have been successful in our
generations, we’ve done that because we’ve
had people mentoring us, believing in us and
supporting us to achieve those ends. What a
wonderful legacy at the end of your life that
you say you’ve put back more than you’ve
taken out, and you’ve helped a lot of people
achieve their goals. There are people that
I’ve worked with that have gone on to have
very successful careers and achievements
because of their qualifications, and they’re
making the world better through science,
technology and their manipulation of how
organisations work to make the world better
and that’s a great thing.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 14
Interview with Dr. Ian McAndrew
15. “The mindset of continuous learning is really important as the number one
skillset for our teachers learning how to teach and for our students learning
how to learn. And that’s the mindset we’ve got to get into the curriculum
today.” ~ Robert E. Moritz, Global Chairman of PwC
[Joe Fields] How would you describe your
offline influence?
[Dr. Ian McAndrew] I’ve had the fortune to
travel a lot, I’ve been to over 85 countries in
my life and I think travel is educational, it’s
enlightening and it gives you reason and
logic. If you look at various continents,
cultures and styles of work and how they
work, this gives you an understanding of how
people work, and indeed what is important to
them.
I would have to say my influences are the
people in the world. It’s always a pleasure to
meet people and most people have something
you can learn from them. They have an
experience, a story, knowledge or something
that they’ve done which they want to share
with you that you wouldn’t necessarily want
to repeat, because it didn’t work. Lots of
people have used the phrase “history repeats
itself”, if we don’t learn from mistakes then
we’re not improving. Other people can help
you learn from their mistakes if you listen. I
think there are two types of silences in the
world, when people are listening to the words
you’re saying, and when they’re waiting for
you to stop talking so they may talk again.
The less you say the more you see and you
listen to people around you and there is a
wealth of information to be gained on
various different levels. Then again being
able to disseminate to other people is great.
[Joe Fields] If a brand wanted to work with
you, what activities would you be most
interested in partnering with them on?
[Dr. Ian McAndrew] What I’m really
interested in is numerical problem solving. I
like solving problems. I like finding a
solution to something. I like having a
problem to solve and whether it takes
minutes, hours or even years. That’s what I
really enjoy doing,
Working with a big brand for the sake of it
I’d find rather boring. I’m not interested in
the glory and the fun side of it, I’m interested
in the detail side of it, the innovation side and
thinking up novel ways of working with
things. If I had a chance to work with any
brand on innovation and new ways of doing
things, that is something that I would find
fascinating.
[Joe Fields] What’s your best source of
information for getting ahead of a story?
[Dr. Ian McAndrew] I think by spending
your life reading, gathering information and
being observant gives you a wonderful
foundation. Sometimes a little bit of
information based on what you already
know, gives you a catapult to get to the next
level.
We’re often working in pigeonholes now.
You’re a mechanical engineer, you’re a
marketing expert, you’re finance expert,
you’re a medical person. We don’t integrate
those disciplines enough. and I think that is
where we can push forward. The best source
of information is where we share
information.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 15
Interview with Dr. Ian McAndrew
16. “Anyone starting out to research for a doctorate degree should remember
that hours of self centered work has the ability to be the spark for others to
progress. All research is potentially useful to open doors or show others that
door does not lead anywhere useful. Advancements happen by building on
others research.” ~ Dr. Ian R. McAndrew
[Dr. Ian McAndrew] There’s a phrase that
we use in engineering called “technology
transfer”, how do we take that knowledge
that I have and give it to other people? We
have universities, education and
qualifications, but how do we capture that
knowledge in industry? If someone said what
would you pass on to your children? You’d
come up with a list, and if you looked at it a
week later, you’d come up with more
information then you constantly add to it.
You can never truly disseminate that
information. If we think about what the best
source of information is, it’s the world, it’s
the people around us, it’s collecting all that
information and integrating it together. We
talk about this as analytics now, and we talk
about analytics as a new science that is
emerging and that never existed before. It
exists in a way now that it’s never existed
before because technology allows us to
process things faster, but we don’t always
know what processing.
There’s a lovely clip in the movie Jurassic
Park with Dr. Ian Malcolm, the chaos theory
expert where he came up with this phrase
“Instead of asking, can we do it? We should
ask first of all, should we do it?” I think
that’s what we have to ask with technology
now, with analytics and with everything else.
Should we be doing this? First thinking about
the ethical side of some of these things we
are doing and then considering how can we
do this?
[Joe Fields] What brands have you
worked with?
[Dr. Ian McAndrew] I’ve worked with some
several major brands in the aviation industry,
some big airline carriers like BA, Virgin,
Iceland Air and Lufthansa at different stages.
I’ve also worked with various militaries such
as the US Air Force and the RAF and other
things at times in my life. I’ve worked for a
lot of companies that wouldn’t be identified
immediately with brands because they’re
very specialist small companies that do very
small work for bigger companies.
[Joe Fields] Which non-paid activities
would you be keen to take part in if the
opportunity raised your profile or
delivered value to your audience?
[Dr. Ian McAndrew] I have to say I
wouldn’t really take part in a non-paid
activity to raise my profile, I think if you do
non-paid activity it should be for the benefit
of society. We should be doing things to help
the community without any payback.
I have to say I wouldn’t really take part in a
non-paid activity to raise my profile, I think
if you do non-paid activity it should be for
the benefit of society. We should be doing
things to help the community without any
payback. I’m a Director and Chair on several
UK charities that sponsor students to be able
to go to university, and I’m involved with a
couple of other little educational charities. I
don’t get paid for it. I don’t do it for money, I
don’t do it for fame or fortune, I do it
because I think in this busy overcrowded
world we should put back things into society.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 16
Interview with Dr. Ian McAndrew
17. [Dr. Ian McAndrew] Even little things like putting in a pound coin in a collection box for a
worthy cause, to actually giving up time. Even walking down the street and picking up a piece
of litter and putting it in the bin. If we all put something into society, if we all put something
into where we work and live without taking any credit for it, then we’re all going to live and
work in a better world. We can go back to John F. Kennedy’s quote “Ask not what your country
can do for you, but what you can do for your country” and that’s an important thing that is as
relevant today as ever, and perhaps even more so, at this particular time. People going out and
panic buying, it doesn’t help everyone. We are all in one big society and should be coming
together.
Direct Link:
https://onalytica.com/blog/posts/interview-ian-mcandrew/
More about Dr. Ian McAndrew:
https://www.captechu.edu/blog/interview-dr-ian-mcandrew-dean-of-doctoral-programs
“We are at the start of a long road – although Capitol has a rich history, it is only recently
that we became a university, and we are growing. That’s an exciting place to be. We’re
headed in the right direction and we have an excellent team that is committed to moving us
forward. While on campus, I am always struck by the enthusiasm of people – administrators,
faculty, staff, and students. Whenever I have had a question or needed assistance with
something, people were ready to help. There is a willingness to step up to the plate that you
don’t always encounter at other institutions. It is exciting to work among people who are
committed to the university’s mission and its future.”
~ Dr. Ian McAndrew
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 17
Interview with Dr. Ian McAndrew
Doctoral Programs ranging from Cybersecurity, Analytics, Artificial Intelligence and Technology based at
the Capitol Technology University. Native of England and living in London, Dr. McAndrew is a Fellow of
the Royal Aeronautical Society, an editor of seven international journals and the Chair of 5 international
conferences. Author of six books, conference, and journal publications of 71 over 30 years. Extensive
consultancy experience internationally for multi-nations and organisations. An external examiner on the
worldwide stage (UK, USA, Germany, Italy, Jordan, Japan, Australia, Greece and Kenya).
Keynote speaker on the international stage and experienced external examiner, Dr. McAndrew has delivered
Keynote speeches in over 40 countries around the world. Has supervised 130 students to their doctoral
completion in the USA and all over the world.
Holding An internationally recognized leader in research and expert on low-
speed flight, Dr. McAndrew has five degrees: a PhD, two master’s degrees and
two bachelor’s degrees. He started his career in the automotive industry as an
engine designer and has worked at several universities across the globe. An
extraordinarily academic with immense experience within industry, highly
qualified internationally recognised researcher with extensive teaching
experience at all levels of education, Dean of Doctoral Programs at Capitol
Technology University, Professor Dr. Ian R. McAndrew FRAeS, is leading a
doctorate program in excess of 350 students globally (Taught in over 50
countries as a research, consultant and trainer), being responsible for 23 different
18. There comes a time when data needs to be shared—whether to evaluate a matter for
research purposes, to test the functionality of a new application, or for an infinite number
of other business purposes. To protect the sensitivity or confidentiality of shared data, it
often needs to be sanitized before it can be distributed and analyzed.
A popular and effective method for sanitizing data is called data anonymization. Also
known as data masking, data cleansing, data obfuscation or data scrambling, data
anonymization is the process of replacing the contents of identifiable fields (such as IP
addresses, usernames, Social Security numbers and zip codes) in a database so records
cannot be associated with a specific individual, project, or company. Unlike the concept of
confidentiality, which often means the subjects’ identities are known but will be protected
by the person evaluating the data, in anonymization, the evaluator does not know the
subjects’ identities. Thus, the anonymization process allows for the dissemination of
detailed data, which permits usage by various entities while providing some level of
privacy for sensitive information.
Data anonymization techniques: There are several data anonymization techniques
that can be used, including data encryption, substitution, shuffling, number or date
variance, and nulling out specific fields or data sets. Data encryption is an anonymization
technique that replaces sensitive data with encrypted data. The process provides effective
data confidentiality, but also transforms data into an unreadable format. For example, once
data encryption is applied to the fields containing usernames, "JohnDoe" may become
"@Gek1ds%#$". Data encryption is suitable from an anonymization perspective, but it’s
often not as suitable for practical use. Other business requirements such as data input
validation or application testing may require a specific data type—such as numbers, cost,
dates, or salary—and when the encrypted data is used, it may appear to be the wrong data
type to the system trying to use it.
Substitution consists of replacing the contents of a database column with data from a
predefined list of factious but similar data types so it cannot be traced to the original
subject. Shuffling is like substitution, except the anonymized data is derived from the
column itself. Both methods have their pros and cons, depending on the size of the
database in use. For example, in the substitution process, the integrity of the information
remains intact (unlike the information resulting from the encryption process). But
substitution can pose a challenge if the records consist of a million usernames that require
substitution. An effective substitution requires a list that is equal to or longer than the
amount of data that requires substitution.
Data Anonymization
A Comparison of Techniques
Author: Dr. Kellep A. CHARLES
“The next Freud will be a data scientist. The next Marx will be a data scientist. The next
Salk might very well be a data scientist.“ ~ Seth Stephens-Davidowitz
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 18
19. In the shuffling process, the integrity of the data also remains intact and is easy to obtain,
since data is derived from the existing column itself. But shuffling can be an issue if the
number of records is small. Number and date variance are useful data anonymization
techniques for numeric and date columns. The algorithm involves modifying each value in
a column by some random percentage of its real value to significantly alter the data to an
untraceable point.
Nulling out consists of simply removing sensitive data by deleting it from the shared data
set. While this is a simple technique, it may not be suitable if an evaluation needs to be
performed on the data or the fictitious form of the data. For example, it would be difficult to
query customer accounts if vital information such as customer name, address and other
contact details are null values.
Data anonymization tools: I have often used anonymization when working with
various IT vendors for troubleshooting purposes. Data generated from log servers, for
example, cannot be distributed in its original format, so instead traceable information is
anonymized using log management software. By initiating the anonymize function in the
software, I can protect data in our logs, replacing identifying data such as usernames, IP
addresses, domain names, etc. with fictional values that maintain the same word length and
data type. For example, a variable originally defined as “user=johndoe@mysite.com” will
get converted into “user=oranges@uphill.com”. This allows us to share log data with our
vendors without revealing confidential or personal information from our network.
Some interesting tools in the data anonymization space are Anonymous Data by Urban
Software and Anonimatron, which is available on SourceForge.net. Both tools are freeware
and can run on a Windows-based platform, while Anonimatron can also operate on Linux
and Apple OSX systems. In addition, I have worked with many IT security professionals
who prefer to create custom scripts against files to anonymize their data. Whatever your
choice for data anonymization, the goal remains the same: to anonymize sensitive
information. Although these anonymization techniques and tools do not fully guarantee
anonymity in all situations, they provide an effective process to protect personal
information and assist in preserving privacy. With the growing need to share data for
research purposes and the legal implications involved if due diligence is not properly
conducted when releasing information, many organizations are now discovering the
necessity and the benefits of data anonymization.
by Dr. Kellep A. CHARLES
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 19
over 20 years of industry experience in the areas of incident response, computer forensics, security
assessments, malware analyst and security operations. Dr. Charles is the creator of SecurityOrb.com (at
SecurityOrb), an information security & privacy knowledge-based blogsite designed for information
security related users.
Dr. Kellep A. Charles obtained a Doctor of Science in Cybersecurity from
Capitol Technology University. He also holds a Master of Science in
Telecommunication Management from the University of Maryland
University College and a Bachelor of Science in Computer Science from
North Carolina Agriculture and Technical State University. Dr. Charles
works as a government contractor in the Washington, DC area as a
Network Security Analyst and is an Adjunct Professor at Capitol
Technology University in Laurel Maryland where he teaches in the
Computer Science department and holds a CISSP certification. Kellep has
20. BRING
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 20
BEGINS
CYBERSECURITY STRATEGY
THE BOARDROOM
CISO
your
CISO
INTO
21. About Matthew ROSENQUIST
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 21
Matthew Rosenquist is the Chief
Information Security Officer (CISO) for
Eclipz, the former Cybersecurity Strategist
for Intel Corp, and benefits from 30
diverse years in the fields of cyber,
physical, and information security. Mr.
Rosenquist specializes in security strategy,
measuring value, developing best
practices for cost-effective capabilities,
and establishing organizations that deliver
optimal levels of cybersecurity, privacy,
ethics, and safety. As a cybersecurity strategist, he identifies emerging risks and
opportunities to help organizations balance threats, costs, and usability factors to
achieve the desired level of security.
Mr. Rosenquist is very active in the industry. He is an experienced keynote
speaker, collaborates with industry partners to tackle pressing problems, and has
published acclaimed articles, white papers, blogs, and videos on a wide range of
cybersecurity topics. Mr. Rosenquist is a member of multiple advisory boards,
consults on best-practices and emerging risks to academic, business, and
government audiences across the globe.
Currently, Mr. Rosenquist is the CISO for Eclipz, a company that provides
innovatively elegant means to establish highly secure Point-to-Point encrypted
tunnels on untrusted endpoints over insecure networks. Independently, he
partners with several firms to provide advisement on cyber-ethics, cybersecurity
strategy, and human resource acquisition in the highly competitive cybersecurity
industry. As a member of multiple Advisory Boards, he helps shape and
implement new technology, security innovation, standards, and guides academic
institutions in preparing the next generation of cybersecurity leaders.
22. Establishing and maintaining a cybersecurity capability is a daunting endeavor. Leadership
is the key.
Cybersecurity is a difficult, complex, and convoluted struggle that will continue to
challenge the fortitude of digital technology. It is not a short-term tactical exercise, but
rather a long-term engagement that opposes highly skilled, motivated, and intelligent
adversaries who see to undermine value and trust. To maintain an advantage in keeping
the digital world secure, strategic planning is required.
“We manage security through either leadership or crisis. In the
absence of leadership, we are left with crisis.”
For over 30 years I have worked in the fields of cyber, information, and physical security
to build lasting organizations that can effectively predict and interdict attacks. It is an
exercise that must take into account the attackers, their motivations, methods, and target
selection processes as it relates to the vulnerabilities of the assets being protected.
It is easy to do security poorly, but extremely difficult to do it well consistently. It requires
a diversity of people, tools, and processes that are applied in just the right manner. The
challenge requires leadership to both establish a long-lasting well-architected program and
keep it current with the ever-evolving threats.
The winning strategy is to pursue an optimal balance of cyber risk with clear objectives
and acceptance of tradeoffs that support the overarching goals of the organization. The
desired equilibrium is achieved by managing risks, costs, and usability friction that
accompanies security controls.
Experienced organizational leadership can make sense of the chaos, communicate in ways
that align and garner support, plan, and maneuver capabilities to predict, prevent, detect,
and respond to cyber threats. Establishing clear goals, implementing operational functions,
and instituting supporting behaviors within an agile framework are crucial for adapting to
evolving risks.
Highly skilled talent and tools are not enough. They must be crafted into an overall
capability aligned to when, how, and where attackers will strike.
The Winning Strategy
for Cybersecurity
Author: Matthew ROSENQUIST
“Cybersecurity strategy begins with the CISO himself.”
~ Michel CAZENAVE
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 22
23. The Winning Strategy for Cybersecurity
To prepare a perfect meal requires more than just having the right ingredients and
cookware. A capable chef is needed. The same is true with cybersecurity. Insights,
discipline, communication, and management skills are essential to build a risk management
program that meets the needs of an organization. Such defenses are not static as
cybersecurity goals are continuously evolving to protect the security, privacy, and safety of
digital ecosystems through a combination of adaptive technology, processes, and behaviors.
The single greatest factor for successfully navigating these challenges is the presence of
expert leadership.
“Leadership is key in organizing resources to achieve and maintain an
optimal level of security value.”
Cybersecurity is difficult. It becomes exponentially more problematic when someone who
lacks the necessary mentality or skills comes in and makes it profoundly worse. Cleaning
up an ineffective legacy security program is painful, expensive, and time consuming.
Simultaneously, a poor risk posture opens the door to more attacks and greater impacts until
a capable security program is instituted. We must understand that cybersecurity, like many
other highly specialized roles, requires a depth of insight and experience to lead. I will echo
Sun Tzu’s “…do what is great while it is small” and recommend putting a good leader in
place the first time to build an effective and sustainable cybersecurity organization.
“Let’s all break the silence and openly discuss the cycle of poor
cybersecurity leadership, for everyone’s benefit.”
For more insights on the challenges and required strategic deliverables, read Matthew
Rosenquist’s post Cybersecurity Fails Without Strategy. Interested in more insights,
rants, industry news and experiences? Follow Matthew Rosenquist on Steemit and
LinkedIn for insights and what is going on in cybersecurity.
MATTHEW ROSENQUIST, PUBLISHED/QUOTED IN MEDIA & PERIODICALS
by Matthew ROSENQUIST
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 23
24. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 24
26. MAGAZINE
TOP CYBER NEWS
CYBER FOR GOOD
We communicate
Technology, Innovation, and Cybersecurity
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 26
“Education as a sector has changed
dramatically over the last decade,
and will continue to change.”
“Fewer students pursue education purely
for the joy of learning or the promise of
transformation of thinking. Many more
students seek a direct connection between
their learning and their career objectives.
Capitol Tech is well-situated to meet the
goals of both today’s students and today’s
industry.”
“…a solid education that enables students
of all ages to obtain a great career and
take care of themselves and their
families.”
“Focused on STEM since its inception in
1927, Capitol Technology University has
developed a robust, practical, and award-
winning cybersecurity program for
students at all levels to learn the skills
necessary to become industry Leaders.”
Dr. BRADFORD SIMS, FRAeS,
President, Capitol Technology University