01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

internet, etc. How much training is sent to the employees? Is it completed, and is it a priority? Do the<br />

employees understand the risks associated with not following proper cybersecurity processes? And is<br />

the example of being a good cybersecurity steward exemplified from the top down—does it begin at<br />

senior levels within the company? This is often the best way <strong>for</strong> culture to be impacted. A great example<br />

of how senior levels can set the example can be taken from Netflix and the implementation of their leave<br />

policy, which is to say they have no complex leave policy. As long as people complete their work and<br />

don’t leave anyone else in the lurch, employees may take leave when and where they’d like. Employees<br />

were initially disbelieving; however, when Reed Hastings, the chairman of Netflix, and the leadership staff<br />

posted photos of their respective vacations, it changed the culture quickly because everyone could see<br />

the boss was embracing the company’s approach to leave. This leave approach certainly wouldn’t work<br />

in all organizations, but that is beside the point. It’s an example of how leaders in an organization can<br />

positively influence their employees.<br />

With predictions that threat actors will weaponize operational technology environments to cause human<br />

casualties by 2025, and with the influx of over-the-air updatable programmable logic controllers and<br />

continued malicious attacks on our SCADA networks, it’s more imperative than ever to learn from and<br />

apply the cybersecurity lessons of the past. We are starting to see more broad negative effects of<br />

breached or attacked systems on administrative networks today. Not only may companies have to stop<br />

operations temporarily, but entire supply chains can be affected, which ultimately can affect the entire<br />

country.<br />

As IT and cybersecurity professionals, it's our duty and challenge to push industry executives to prioritize<br />

cybersecurity as a high-interest item in the funding drills corporations exercise yearly. We must motivate<br />

them to continue to bake-cybersecurity-in from the initial design and conception phases of budgeting<br />

versus tacking it on at the end of the process. To prevent cyber attacks such as those on Sony in 2014<br />

or more recent examples such as Colonial Pipeline or JBS meat processing, we must use all the tools at<br />

our disposal and more effectively apply the cybersecurity lessons of the past. This means not only<br />

budgeting and applying funds to cybersecurity but also cultivating strong cybersecurity processes via<br />

three main components: people, culture and technology. As Gartner pointed out, “99% of vulnerabilities<br />

exploited will continue to be ones that teams knew existed.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 45<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!