April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Cyber Security

Best Data Security/Loss Management Solution won by Kingston Technology in Government Security News Awards

Kingston’s line of encrypted USB Flash drives are this year’s winner for the Government Security News 2017 Airport/Seaport/Border Security “Best Data Security/Loss Management Solution” award.   

The robustness of Kingston’s product offering impressed the judges.  From the DataTraveler 2000, with alphanumeric keypad for someone simply wanting to protect personal data such as medical records or tax information, to the IronKey S1000 for the most sensitive of data, Kingston has solutions for every type of user.

The IronKey S1000 uses fast USB 3.0 performance to integrate military-grade 256-bit AES hardware-based encryption in XTS mode and an on-device Cryptochip encryption key management to serve as dual layer protection.  Its epoxy-filled rugged anodized aluminum case construction creates another layer of physical tampering security to withstand the elements for almost any application or intrusion.  Additionally, the drive uses digitally-signed firmware and locks down after a brute force attack of ten invalid password attempts, providing options to either reformat or destroy the drive.

Government, defense and intelligence agencies, as well as the civilian companies that contract with them are under intense scrutiny and pressure to comply with a lengthening list of legislative requirements and protocols designed to protect sensitive data in transit and at rest.  IronKey S1000 is designed specifically to meet the strictest standards and most demanding data protection needs of sensitive military, government and enterprise information. With Kingston Technology’s S1000, one can manage threats, reduce risks, and comply with U.S. legislative requirements such as the Federal Information Security Management Act (FISMA), OMB M06-16 Mandate, Federal Desktop Core Configuration (FDCC) mandates, and the Director of Central Intelligence Directive (CDID) 6/3.

In addition to the Basic model qualities, the S1000 Enterprise version offers central administration of drive access and usage across thousands of IronKey enterprise drives with the intuitive, easy to use, secure online interface.  The IronKey Enterprise Management Service* (EMS) efficiently and cost-effectively protects data by administering usage and encryption policies, password restrictions, and more from a central console. 
When it comes the best in data security and loss management, Kingston Technology provides quality encrypted USB solutions that cater to a multitude of data protection needs.

Career Advancement Opportunities for Cybersecurity Professionals

Over 340,000 cybersecurity jobs available in U.S. in 2017*
Unfilled cybersecurity positions to grow to 1.8M globally by 2022**

According to U.S. national intelligence officials, the cyber threat is the greatest challenge facing the United States. Cyberattacks, security breaches, compliance challenges, and new technologies (e.g., cloud, mobile, social media, and Internet of Things) continually fuel the demand for qualified cybersecurity professionals. Thus, for experienced cybersecurity professionals, especially those who hold a security clearance and DoD 8570–compliant certification, the opportunities for career advancement are extraordinary.

Cybersecurity Career Path Focused Advancement Program

MCI partners with universities to offer graduate-level degree programs to help professionals enter the expanding cybersecurity field and to continue to advance along the cybersecurity career path. These programs are designed to: 

  • Train professionals, including veterans, to become cybersecurity job-ready
  • Provide relevant, hands-on project experience through virtual practicums/internships
  • Help professionals advance in the highly compensated cybersecurity sector
  • Help employers cost-effectively reduce the shortage of job-ready cybersecurity professionals

These programs provide the following to students:

  • Graduate cybersecurity courses developed and taught by expert practitioners
  • DoD 8570–compliant certification preparation (e.g., CEH, CISSP, CAP)

Learn how you can advance to more senior cybersecurity positions here.

*CyberSeek, 2017
**Center for Cyber Safety and Education, Global Information Security Workforce Study (GISWS), 2017

CenturyLink signs cybersecurity sales agreement with King & Union

Company to sell cyber analysis collaboration platform

CenturyLink, Inc. (NYSE: CTL) recently signed an agreement authorizing it to sell King & Union’s Avalon, a cyber analysis collaboration platform and service, to the company’s commercial and government clients.


King & Union’s Avalon platform gives customers better situational awareness and a contextual picture of the cyber threat environment via dynamic graphing and threat visualization. It removes information sharing barriers, empowers threat analysts to collaborate within and across teams, and provides unique insights and intelligence with automated threat enrichment services using proprietary and sensitive data sources.


“CenturyLink is excited to be King & Union’s first reseller and go-to-market partner for its cyber analysis collaboration platform,” said Erich Sanchack, CenturyLink senior vice president and general manager, federal solutions. “We’re committed to the nation’s cybersecurity mission and to providing customers with industry-leading cybersecurity measures and analysis that improve an organization’s cyber risk posture. Avalon complements CenturyLink’s managed security services offerings, including CenturyLink’s Enhanced Cybersecurity Services offering authorized by the U.S. Department of Homeland Security.”


“King & Union is thrilled to be working with CenturyLink, an established leader in public-private cyber information sharing efforts and an innovative provider of security services,” said King & Union President John Cassidy. 


Avalon helps build an interactive community of cyber analysts. It helps users rapidly collaborate with trusted peers on cyber investigations and findings, provides unique insights, and sets up fast action events for remediation. It provides one workspace for threat hunters to work through their analysis together, while interacting with each other and data in near real time, thus improving collaboration among commercial and government cybersecurity operation teams.


Avalon’s cyber analysis collaboration platform also allows teams to collaborate on investigations and findings with each other without sharing sensitive and classified threat information, which is a big benefit to information sharing and analysis organizations and their respective members. 


By supplying cybersecurity, cloud, managed hosting and IT services over its carrier-class network, CenturyLink provides government agencies with the security and reliability they need to carry out their important missions. 


CenturyLink’s Managed Security Services Suite, available either as a stand-alone service or as an add-on for customers buying hosting, networking, cloud and colocation services, enables organizations to improve their security posture and respond more efficiently to cyber attacks.


CenturyLink is currently ranked No. 35 on Washington Technology’s 2017 Top 100 list of federal government IT contractors.


About CenturyLink

CenturyLink (NYSE: CTL) is a global communications and IT services company focused on connecting its customers to the power of the digital world. CenturyLink offers network and data systems management, big data analytics, managed security services, hosting, cloud, and IT consulting services. The company provides broadband, voice, video, advanced data and managed network services over a robust 265,000-route-mile U.S. fiber network and a 360,000-route-mile international transport network. Visit CenturyLink for more information.

About King & Union
King & Union is a cybersecurity company based in Alexandria, Va., that has built and designed Avalon, a cyber analysis collaboration platform.  Visit King & Union at kingandunion.com or email [email protected] for more information. 

Unix/Linux Privilege Management: What a Financial Services CISO Cares About

WEDNESDAY, SEPTEMBER 27, 2017 | 11:00 AM PT / 2:00 PM ET

Featuring guest speaker, SVP & CISO, Private National Mortgage Acceptance Corp (PennyMac), Nikolay Chernavsky

Hardly a week goes by without a major cyber security event effecting millions of users – and the financial industry is particularly vulnerable.

The 2017 Verizon Data Breach Investigations Report identified “Insider and Privilege Misuse” as a major incident pattern resulting in confirmed data breaches. According to Verizon, 62% of all breaches featured hacking, and of those, 81% leveraged stolen and/or weak passwords—giving the attacker the same privileges as a trusted insider.

At the heart of the problem lies a simple fact that many organizations fail to follow the basic information security principle of Least Privilege with trusted insiders having access to both highly sensitive and mission-critical information. As a result, accidental or deliberate misuse of a credential can lead to a breach. Companies in the financial industry are prime targets for such attacks because of the large potential payout of critical information.

While many tools have been developed to address Least Privilege issues on Windows-based systems, Linux/Unix systems were largely neglected. Unix/Linux systems are serving critical roles for many financial organizations, from storing highly sensitive information to processing millions of transactions between institutions. Being able to tightly control access to these systems is a critical security need.

This webinar will provide CISOs in financial services and other sectors:

  • A CISO’s first-hand experiences regarding the challenges faced in securing access to critical Unix and Linux systems
  • Real-world insights on how Unix and Linux Privileged Access Management (PAM) helps CISOs bolster security with granular access controls while also meeting compliance requirements
  • Guidance on selecting technologies that enable CISOs to meet their business objectives while remaining nimble
  • An executive view on where the market is headed in relation to PAM


**Can't attend the live webinar? 
Register anyway and we'll email you the recording**



Register Now

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Digital Fly Unveils New Anti-Bullying and Student Vaping Detection Smart Cloud Based Sensor and Alert System For Schools

Digital Fly new Fly Sense technology detects and alerts school staff when students are vaping, bullying or fighting

Hauppauge, NY; August 11, 2017 - Digital Fly, a nationally respected school safety products and technology developer, introduced today its latest innovation, Fly Sense, a new cloud-based “Internet Of Things” (IOT) anti-bullying and vaping detector/sensor that is the only product on the market to offer combined vaping chemical detection and decibel level monitoring specifically designed for schools. Fly Sense is a cloud-based platform that detects and sends alerts to school officials when bullying or vaping is taking place in bathrooms, isolated areas as well as classrooms and lunch rooms of schools. When the sensor detects decibel level anomalies caused by bullying or chemicals from vaping, it sends an immediate notification to one or many school officials’ computers or mobile devices.

The release of Fly Sense comes just days after New York State adopted legislation making vaping and the use of e-cigarettes illegal on public and private school property across the state.  

According to both a recent U.S. Surgeon General's report and a survey from the New York State Department of Health e-cigarette use by high school students is rapidly rising.

The Fly Sense platform represents a revolutionary advancement in school safety. The platform consists of a front-end edge detection sensor called Fly Sensor with a backend logic processing server.  Each Fly Sensor can work independently or in conjunction with a network of two or more Fly Sensors.

“Expanding on our extensive line of high tech school safety products allows us to make a real impact on issues relating to bullying, fighting and using vaping devices and e-cigarettes in schools. Fly Sense is designed specifically for the education market,” said Derek Peterson, CEO at Digital Fly. “Fly Sense is a unique product and approach which creates effective ways for schools to protect and ensure the safety of students.”

“We believe this product is a game changer for schools and falls directly in-line with the new law recently signed by Gov. Andrew Cuomo which bans vaping and e-cigarettes in schools in New York State. Vaping and e-cigarette use is dangerous to the health of students and can be a gateway to the use of illegal drugs or tobacco smoking,” said Mike Richez, Executive Vice President at OSC World.

OSC World, the marketing and sales partner of Digital Fly, is available to provide information and arrange a demonstration of a Fly Sense sensor or Digital Fly’s social media awareness platform. For more information, visit www.digitalfly.net or call Mike Richez at (516) 247-5321.

About Digital Fly
Based in Hauppauge, NY, Digital Fly creates technology that helps keep schools safe. Its Digital Fly School Safety Suite assists schools with mitigating and gaining insight into potential dangers. Digital Fly develops and delivers technology for improved social media awareness to create safer schools and communities.  Digital Fly is used by more than 400 schools internationally as an early warning system to improve school safety and has a proven record of identifying and preventing threats.  For more information, visit www.digitalfly.net.      

About OSC World
In business since 1991, OSC World is a leading company providing test scanning, test scoring and education sector technology consulting services. The company is a partner and the marketing arm for Digital Fly, a nationally respected school safety products and technology developer.  Digital Fly offers the education market social media awareness software and anti-bullying and vaping technology.  OSC World developed and patented FAST (Fast Accurate Capture Technology Solutions) one of the only data capture systems which automatically processes all documents. OSC World’s Document Management Systems allow for image indexing for all forms/documents in any industry. For more information, please visit www.oscworld.com

Taking First Steps to Compliance with the New Cyber Executive Order

By Shawn Campbell
It’s going to be a busy summer for federal IT and cybersecurity employees. On May 11, 2017 President Trump issued the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The earliest milestones for compliance are already looming on the horizon, with initial reports and plans due back to the President in the next couple months.

Specifically, the Executive Order (EO) addresses three areas:

1. Cybersecurity of Federal Networks, particularly cybersecurity risk management and IT modernization;

2. Cybersecurity of Critical Infrastructure, focusing on federal support for owners and operators of critical infrastructure (an additional goal in this area is to promote market transparency of cybersecurity risk management practices); and
3. Cybersecurity for the Nation, emphasizing consumer cybersecurity and the growth of a cybersecurity-trained workforce.

Among the compliance measures expressed in the EO, the Office of Management and Budget and the Department of Homeland Security are expected to review agency-wide self-assessments on risk management. Sixty days later, these two organizations, with input from the Commerce Department and the General Services Administration, must submit a plan to the President to strengthen security – including reviewing budget needs and reassessing those budget needs on a regular basis.

By this fall, the Department of Commerce and the Department of Homeland Security are expected to provide recommendations on “how to support the growth and sustainment of the Nation's cybersecurity workforce in both the public and private sectors.”
Of course, providing advice on how to comply fully with such a far-reaching order would take more than just one column like this. Instead, let’s spend some time understanding what it will take to reach a basic level of compliance with the first goal of the EO – namely the Cybersecurity of Federal Networks.

As a starting point, agencies will need to assess their enterprise IT based on the NIST Framework for Improving Critical Infrastructure Cybersecurity (commonly referred to as the “Cybersecurity Framework”). 
Part of those assessments requires identifying “target profiles” based on NIST 800-53 (a catalog of security controls for all U.S. federal information systems, except those related to national security). Agencies also will use other related security control requirements and guidance to determine any insufficiencies or gaps in their enterprise.

After identifying any such gaps and insufficiencies, especially those related to information systems, agencies will have to work with their Information Technology and Operations Technology partners – as well as suppliers – to address their self-assessments and to identify mitigating security solutions.  

Ultimately, the actions taken in response to this EO will lead all agencies, or a subset of agencies, to transition to one or more consolidated network architectures, and to employ more shared IT services, including email, cloud, and cybersecurity services (where those are not already in place).
Agencies transitioning to consolidated network architectures and shared IT services will need several technologies to ensure success, to include:

1. Cryptographic key management. These solutions enable agencies to securely partition shared infrastructures and provide access controls through encryption

2. High assurance authentication. Authentication solutions provide common assured (certificate-based) identities to access converged network and IT. 
3. Cross-domain security. Cross domain solutions facilitate information sharing across shared services and infrastructure.

The goal of this EO is laudable: To build and maintain a modern, secure, and more resilient IT architecture, Internet, and communications ecosystem. That will protect both data and IT hardware and software from unauthorized access and other cyber threats, and greatly reduce threats from bad actors using automated and distributed attacks.

But it’s no small job. Agencies are still assessing their compliance annually with the Federal Information Technology Acquisition Reform Act (FITARA), which to this point has shown halting progress among agencies in identifying and consolidating IT assets across departments. It’s easy to see how a lack of understanding in these areas could affect assessment of cybersecurity vulnerabilities in general.

Let’s hope that the agencies that have charted progress in FITARA will be able to channel that success into the assessments required by the EO. As we said, it’s going to be a busy summer.

BIO Shawn Campbell is Director of Product Management, SafeNet Assured Technologies, a provider of cybersecurity solutions to the government. He can be reached at [email protected]Additional information can be found at www.safenetat.com

Survey finds cyber staffs overlook vulnerable target


BETHESDA, MD July 19, 2017 Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for damage, according to a new survey to be released by SANS Institute on August 1.

As security protecting organizations from outside attack gets more formidable, attackers look for easier targets – users who already have access to an organization's most sensitive data, for example, and aren't as hard to fool as security systems.

"While deliberate/malicious insider are always a concern, what many organizations fail to realize is that an external attack will often target a legitimate insider and trick them into causing harm," according to SANS instructor and survey report author Eric Cole, PhD. "This accidental/unintentional insider could be used as an avenue by the adversary to walk out with an organization's most sensitive data without fanfare or drama, and few organizations would be able to even know it had happened."

While these attacks are devastating, few organizations seem to realize that even when the origin of an attack is external, the ultimate entry point for the attacker was an insider who was tricked or manipulated to causing harm. Survey respondents understand the risk. When asked to rank attackers according to the amount of damage they could do, only 23% of respondents said attackers from outside would do the most damage; 36% said the worst breaches would come from unintentional insiders and 40% said malicious insiders would cause the greatest damage.

Few seemed to have any idea how much damage was involved, however. Forty-five percent of respondents said the cost of a potential loss was "Unknown," while 33% said they had no specific estimate of cost.

That seems surprising, but few organizations reported having insider-detection programs thorough enough to reliably detect insider threats, according to Cole. That same lack of visibility would make it difficult to identify the scope of a potential insider attack or estimate the cost of recovering from it.

Data showing 62% of respondents have never experienced an insider attack probably also indicate low visibility, but not low risk, according to Cole. Thirty-eight percent of respondents said the systems and methods they use to monitor insider activity are ineffective, which makes it even less likely that they could identify an insider attack in progress.

Inability to see is one thing; reluctance to prepare is another. Only 18% of respondents said they have formal incident-response plans that include potential insider attacks, though 49% said they are developing such a plan; 31% of respondents said they have no formal program in place or preparations to deal with threats from insiders.

"Malicious insiders have always been a threat, but the risk is increasing from 'unintentional' insiders that are tricked into giving their login information to callers from fake help desks or clicking on attachments that release password-stealing malware," according to Cole. "Every organization is only one click away from a potential compromise."

Eric Cole will discuss the full results of the survey and his analysis in a webcast August 1 at 1 PM EDT, sponsored by Dtex SystemsHaystax Technology and Rapid7, and hosted by SANS. Register to attend the webcast at www.sans.org/u/ui9

Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and insider threat expert, Eric Cole, PhD.

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master's degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org)

Cirrus Insight co-founder to emcee upcoming national cybersecurity conference


KNOXVILLE, TN July 20, 2017 The EDGE2017 Security Conference, a world-class cybersecurity conference, announced today that Brandon Bruce, COO and co-founder of Cirrus Insight, will be the emcee at this year’s conference. Cirrus Insight is a sales software company that ranked 41st on the Inc. 5000 list of fastest growing U.S. companies in 2016.

EDGE2017 will be held on October 17-18 at the Knoxville Convention Center in Knoxville, Tennessee, and aims to tackle the most vexing security challenges of today and tomorrow by bringing together security visionaries, industry leaders, and technology researchers.

“The EDGE Security Conference is fast emerging as a must-attend information security event, and I’m thrilled to be involved,” Bruce said. “I’ll be welcoming to Knoxville a speaker lineup that is a who’s who of cybersecurity experts and attendees from all over the country.”

Keynote speakers at the conference include 33-year Air Force veteran and former director of operations for U.S. Cyber Command, Maj. Gen. Brett T. Williams, and renowned “white hat” hackers Charlie Miller and Chris Valasek. Miller and Valasek are best known for their remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle, exposing serious security flaws. The results of this breach led Fiat Chrysler to recall 1.4 million vehicles.

“Brandon has an engaging personality and is a creative tech entrepreneur,” said John McNeely, president of Sword & Shield Enterprise Security, the cybersecurity firm hosting EDGE2017. “He has already contributed some great ideas for making EDGE2017 a more fun and interactive conference, and I look forward seeing him guide attendees through everything we have to offer this year.”

For more information about EDGE2017, visit:  https://edgesecurityconference.com/.

For information about sponsorship opportunities, visit:  https://edgesecurityconference.com/expo-sponsors/.

About EDGE2017

EDGE2017 Security Conference is the second offering of the annual EDGE Security Conferences presented by Sword & Shield Enterprise Security, Inc. EDGE2017 is focused on exploring real-world solutions to today’s toughest cybersecurity challenges. Dedicated to advancing the security industry through comprehensive world-class sessions, EDGE2017 is designed to educate business professionals and encourage information security professionals to openly discuss the issues that are facing their industry to foster a community of creative problem solvers. 

To learn more about EDGE2017 and to sign up, visit:  https://edgesecurityconference.com/.

About Sword & Shield Enterprise Security

Protecting critical data for 20 years, Sword & Shield Enterprise Security, Inc. is a nationally recognized cybersecurity provider with solutions designed to meet the needs of a dynamic security and compliance landscape. Headquartered in Knoxville, Tennessee, Sword & Shield specializes in security, risk and compliance assessment, managed security services, enterprise security consulting, security incident response and forensics, and technical solutions. Sword & Shield services a broad spectrum of industries, including healthcare, retail, legal, banking and finance, manufacturing, and the public sector.

Sword & Shield hosts the EDGE Security Conference, a world-class cybersecurity conference where complex business problems meet real world solutions. EDGE2017 will take place on Oct. 17-18, 2017 at the Knoxville Convention Center. To learn more about EDGE2017 and to sign up, visit https://edgesecurityconference.com/.

For more information about Sword & Shield Enterprise Security, visit https://www.swordshield.com/.

Cyber risk management firm expands offerings to include IoT device coverage

SUNNYVALE, CA and ALBUQUERQUE, NM July 19, 2017 RiskSense®, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validationcapabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization's cyber risk exposure.

Organizations are already faced with monitoring and protecting a wide and deep attack surface that spans the network, endpoints, applications, cloud services, and mobile devices. The advent of microservices, connected IoT devices, and erosion of the air-gap security perimeter around industrial control systems (ICS) is extending this surface area exponentially.

"For decades, organizations have focused their security efforts on network perimeter defenses to protect servers, endpoints, and network equipment," said Dr. Srinivas Mukkamala, co-founder and CEO at RiskSense. "However, in an interconnected world, a 'hardware-defined' approach has lost its relevance. As organizations transition to software-defined networks, they need to look beyond the network layer to protect their IT assets. RiskSense's expanded Attack Surface Validation was designed to address this visibility gap and the risks associated with it."

RiskSense has expanded its Attack Surface Validation capabilities to cover the following technologies and environments:

  • Microservices and containers;
  • Smart logistic systems (i.e., smart vending machines);
  • Internet of Things (i.e., irrigation systems; traffic guidance systems);
  • Proprietary healthcare systems (i.e., pacemakers);
  • Internet-connected physical access control systems (i.e., mobile keyless entry systems);
  • Industrial control systems (i.e., electrical grid distribution control systems); and
  • Self-driving car technology and automotive control systems.

RiskSense has already implemented these capabilities with customers in key industry sectors. The RiskSense Attack Surface Validation Service provides a fully-managed assessment of vulnerabilities most likely to be exploited by cyber adversaries to infiltrate an organization and carry out lateral attacks inside the network. This service provides the visibility, prioritization, and actionable remediation recommendations to shrink an organization's attack surface and reduce overall cyber risk exposure.  

The RiskSense Attack Surface Validation Service is delivered via the company's award-winning RiskSense Platform, which contextualizes scanned data with external threat information. The resulting threat intelligence is then supplemented with human-interactive machine learning analysis. This leads to a more accurate prioritization of risk impacts. In addition, the RiskSense Platform provides synchronous access to findings in real-time and can be used to quickly orchestrate remediation actions and monitor the results. The platform is supported by a deep bench of industry-leading security researchers and exploit writers. 

About RiskSense
RiskSense®, Inc., is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

The company's Software-as-a-Service (SaaS) platform transforms cyber risk management into a more pro-active, collaborative, and real-time discipline. The RiskSense Platform™ embodies the expertise and intimate knowledge gained from real world experience in defending critical networks from the world's most dangerous cyber adversaries.

By leveraging RiskSense cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, reduce costs, and ultimately minimize cyber risks. For more information, please visit www.risksense.com or follow us on Twitter at @RiskSense.

Regent University to build cyber training facility at its Virginia Beach campus

VIRGINIA BEACH, VA July 18, 2017 Officials with the Institute for Cybersecurity at Regent University, an academic center and training facility dedicated to equipping the next generation of cybersecurity professionals in the industry, government, military and academia, announced today that Regent is building a state-of-the-art cyber range training facility.

As one of only a few stand-alone cyber range facilities at a university, and perhaps the only one in the nation at a private university, The Regent Cyber Range will open on Q4 2017 and will offer hands-on training programs where students will acquire the highest level of skills needed for careers in cybersecurity. Regent's Cyber Range will also be a leading-edge training hub for enterprises, consultancies, government and military organizations, offering several certificate programs at all levels.

According to industry reports, cybersecurity is one of the fastest growing career fields, with demand expected to rise to 6 million jobs globally in 2019 and a projected shortfall of employees for 1.5 million job openings. Median pay for an entry-level position for people with a bachelor's degree is currently $88,890, according to the Bureau of Labor Statistics, with the highest 10 percent of cybersecurity professionals earning more than $140,000.

"A severe skill shortage exists in the workforce, while at the same time the threats to our country's security grow ever more sophisticated," said Regent's Chancellor and CEO, Dr. M.G. "Pat" Robertson. "Regent's new training center will address the nation's need for thousands of additional cybersecurity experts to defend government and commercial networks from cyber attacks."

Regent will utilize the Cyberbit Range platform created by Cyberbit Ltd., the world's leading provider of cybersecurity training and simulation platforms. It offers a realistic training experience where trainees are exposed to various attack scenarios and security breaches to improve their hands-on skills. The range can simulate large-scale virtual networks and attacks based on real-world incidents, and can also pinpoint system vulnerabilities and help users develop countermeasures and improved protocols for dealing with cyber attacks on critical network systems. The platform offers numerous security tools and systems, including risk assessment tools, monitoring systems, security information and event management systems, forensic tools and supporting databases, as well as other network, security and cyber components.

"Regent will be among the first in Christian higher education, and one of the few colleges and universities nationwide, to offer hands-on cybersecurity training," said Dr. Gerson Moreno-Riaño, executive vice president for academic affairs. "This facility will allow Regent to offer complex, system-level training at the highest level, and graduates will emerge with hands-on testing and training that is unmatched in higher education. We've found the Cyberbit Range platform to deliver the highest level of training experience that will enable us to achieve our goals, coupled with the unparalleled support of the Cyberbit team."

"We are excited to partner with Regent University to build their new training facility based on the Cyberbit Range," said Adi Dar, CEO, of Cyberbit Ltd. "This training program firmly positions Regent as a leader in cybersecurity training in America today, not only for its students at the graduate and undergraduate levels, but also as a destination for businesses, government and military organizations."

Currently, Regent University offers a Master of Science in Cybersecurity, as well as undergraduate degrees in Information Systems Technology, Computer Science, Cyber & Digital Forensics and Cybersecurity.

Early next year, Regent will also host a Cyber Summit (Spring, 2018) featuring industry and government leaders to discuss innovation and future cybersecurity risks. Details will be announced soon.

For more information please visit: http://www.regent.edu/institutes/cybersecurity

About Regent University 

Founded in 1978, Regent University has 10,000 students studying on its 70-acre campus in Virginia Beach, Va., and online around the world. The university offers associate, bachelor's, master's and doctoral degrees from a Christian perspective in 128 program areas including business, communication, the arts, divinity, education, government, law, leadership, and psychology. Currently, Regent University tops the list of Best Online Bachelor's Programs in Virginia by U.S. News & World Report. Visit http://www.regent.edu

About Cyberbit 

Created to protect the most high-risk organizations in the world, Cyberbit secures enterprises and critical infrastructure against advanced cyberthreats. The company's battle-hardened cybersecurity solutions detect, analyze and respond to the most advanced, complex and targeted threats. Cyberbit employs a formidable and diverse team from both the public and private sector, including PhDs, hackers, former CISOs and SOC managers, as well as seasoned veterans of the intelligence and military communities. With offices in Texas, Munich and Israel, and presence worldwide, Cyberbit is a subsidiary of Elbit Systems Ltd. (NASDAQ: ESLT and TASE: ESLT) and has more than 500 personnel in the United States, Europe and Asia. To learn more about how Cyberbit maximizes protection against today's signature-less threats, visit http://www.cyberbit.com.



Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...