May 18, 2015    /    by

Cyber Terrorism: How Dangerous is the ISIS Cyber Caliphate Threat?

Industry experts disagree on whether the Islamic State’s ability to mount a dangerous cyberattack is a top concern or an emerging online threat or completely overblown. But one thing is not in doubt, ISIS is making news headlines in 2015 for their exploits in cyberspace. In my view, ISIS is an emerging online threat to keep a close watch on. Here’s why.

“The electronic war has not yet begun.”

That was one message released in video on Monday, May 11, 2015, from a hacker group that claimed to be affiliated with the Islamic State. According to the International Business Times: READ MORE

May 11, 2015    /    by

Federal Cybersecurity Legislation

The latest bills, privacy concerns and information-sharing actions.

This has been a busy few months inside the Washington, D.C., Beltway for policy topics related to cybersecurity. President Obama signed an executive order in February regarding the promotion of private-sector information sharing. The U.S. Congress is now debating several bills, as both sides of the political aisle agree that addressing cybersecurity is an urgent issue.

According to “President Obama recently called cyberattacks a “national emergency,” and the cybersecurity legislation has moved through the Republican-controlled Congress relatively quickly because leaders from both political parties recognize that cybercrime threatens us all in a very big way. Now.” READ MORE

May 3, 2015    /    by

Middle East Cybersecurity and Infrastructure: Dubai Offers a Different Model

I traveled to the United Arab Emirates (UAE) this past week to present the opening keynote at the Gulf Information Security Expo & Conference (GISEC 2015) in Dubai. The event offered a refreshing mix of leading global voices on security and technology topics. But most surprising, the Gulf region's public and private sector executive leaders who presented, the companies exhibiting and the amazing city as a whole offered attendees a different perspective and a positive model for the current cybersecurity and technology infrastructure challenges in the Middle East and the world as a whole.

What are the cybersecurity and infrastructure challenges facing the Middle East? How are companies and governments in the region responding to cyberattacks? Are governments in the region working together with Western nations in the global battle on cybercrime? Why is Dubai considered to be a model “smart city” in the world? Is traveling in the Middle East even safe right now? READ MORE

April 24, 2015    /    by

At RSA Conference 2015: Government Announcements Top Highlights

Attendance records were probably broken, and there were numerous very good sessions. Still, surprisingly, government announcements may have been the highlight of the week.

RSA top

As we look back at another year at the RSA Conference in San Francisco, there was a noticeable absence of the cybersecurity 'WOW-factor.' Yes, the show was as huge, and one might even say overwhelming, as ever. Attendance records were probably broken, and there were numerous very good sessions. Still, surprisingly, government announcements may have been the highlight of the week. READ MORE

April 19, 2015    /    by

Security is Job One for Washington State Government Technology Leadership

We are continuing the series of interviews with leading state government CIOs and CISOs from around the nation. This week, we turn to Washington state and its security priorities and technology plans.

Michael Cockrill

Washington State Chief Information Officer Michael Cockrill, credit: Washington State Government READ MORE

April 11, 2015    /    by

Hacking Critical Infrastructure is Accelerating and More Destructive

A new report released this week by Trend Micro and the Organization of American States (OAS) shows a dramatic increase in cyberattacks directed against critical infrastructure owners and operators.

critical infrastructure

Photo Credit: Trend Micro & Organization of American States READ MORE

April 5, 2015    /    by

Seven Ways to Gain Support for Cyber Programs in Government

Are you having trouble getting the needed resources for your cybersecurity program or key projects in government? Is staffing, funding or gaining executive support not adequate to get the job done right? Do you want to strengthen your influence and trust with management? While there are no easy answers, these ideas may help.

dot-gov picture

Credit: Shutterstock/dencg READ MORE

March 29, 2015    /    by

Enterprises Prepare for Windows 10: Microsoft IE to Become New Legacy Replacement

Just as many government organizations wrap up enterprise XP migrations a year after initially planned, it's time to start ramping up another major infrastructure effort. Microsoft Windows 10 will be arriving this summer. What new features are coming and is it time to prepare your strategic upgrade plan?

Microsoft HQ

credit: James Marvin Phelps / READ MORE

March 22, 2015    /    by

Oakland University Cyber Summit: A Unique, Inspiring Model Run by the Students

On Friday, March 20, 2015, CyberOU, the student cybersecurity club at Oakland University, held its second annual Cyber Summit in Michigan. Here's why CyberOU is a student-run organization for others around the world to emulate.

CyberOU 2015

CyberOU Team and Panelists at Oakland University Cyber Summit 2015 READ MORE

March 15, 2015    /    by

How Do the Technology Leaders at the Port of Portland Protect Sensitive Data?

We are continuing a series of educational interviews with state and local government technology and security leaders around the nation. This week we visit an intriguing local government in the Pacific Northwest part of the country to learn more about its overall mission and how it keeps customer data safe.

Port of Portland image

Port of Portland CIO Mark Greinke with CISO Theresa Masse   READ MORE