IT News

Dynetics Introduces Enterprise Cyber Threat Monitoring Solution

Published: June 04, 2015

According to the 2014 SANS Security Analytics and Intelligence Survey, 36 percent of businesses cite an inability to recognize potential threat activity in their IT environment. Thirty percent cite the lack of people, skills and resources necessary to analyze potential threat activity. And many businesses don’t know they’ve been hacked until law enforcement notifies them. Dynetics representatives are describing at the Southeastern Cyber Security Summit being held in Huntsville this week how NetAlert can help.

"NetAlert is a cost-effective cyber threat monitoring solution developed by Dynetics to provide the visibility and expertise small and mid-sized businesses need to identify, detect and defend against cyber threats,” officials explain. Part of the Dynetics Cyber RiskScope™ portfolio of cyber risk management solutions, NetAlert is available immediately

NetAlert uses a non-intrusive monitoring device installed in the customer’s IT environment to send threat activity alerts to Dynetics cybersecurity analysts and provide analysts access to computer system and network logs. Dynetics cybersecurity analysts then provide validated security incident alerts to customers that enable customers to respond quickly and effectively. Dynetics also provides a monthly analysis of security activities monitored by NetAlert.

"NetAlert is ideal for small to mid-sized businesses that can’t afford to hire a cyber threat analyst, but still need an affordable, continuous cyber situational awareness solution,” said Robert Dowling, Cyber RiskScope product manager. “With NetAlert, Dynetics experts keep watch over networks and systems, while customers run their businesses."

About Cyber RiskScope:

Cyber RiskScope™ is a portfolio of cyber risk management solutions that equips board members, business owners and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

Dynetics Unveils Cyber RiskScope at Southeastern Cyber Security Summit

Published: June 03, 2015

According to the Ponemon Institute's annual "Cost of a Data Breach" study released last week, the average cost of a computer breach at large companies in the U.S. is $6.5 million. Even with statistics such as these, many companies don’t have risk management in place. Dynetics will unveil locally this week Cyber RiskScope™, a portfolio of cyber risk management solutions, at the 7th Annual Southeastern Cyber Security Summit. Cyber RiskScope uses key cyber risk indicators to discover answers to critical questions about the impact of potential cyber incidents, today’s most likely cyber threats and the appropriate levels of cybersecurity needed for enterprises. The Southeastern Cyber Security Summit will be held June 3-4 at Huntsville’s Von Braun Center.

The Cyber RiskScope portfolio includes several different solutions, including SelfAssure,QuickLook, DeepDive and NetAlert. SelfAssure is an online cyber risk self-assessment portal, based on the NIST cybersecurity framework, designed to cost-effectively provide small- and medium-sized businesses comprehensive cyber risk assessments and expert recommendation and decision aids to address weaknesses and enhance cybersecurity.

QuickLook is an executive-level cyber risk assessment solution that provides business owners, board members and senior managers the information needed to make informed cyber risk decisions. QuickLook deliverables include an executive-level report with cyber risk profile and top-level observation and recommendations.

DeepDive services offer an independently validated, comprehensive cyber risk assessment that is fully tailored to an enterprise’s priorities and budget. It provides the deepest level of information, including a business impact analysis, a cyber threat assessment and a cybersecurity assessment.

NetAlert is a cyber threat monitoring solution for customer IT environments. Dynetics cybersecurity analysts monitor threat activity and provide customers with validated security incident alerts to enable cost-effective, rapid response to cyber threats targeting small- and medium-sized businesses.

Dynetics is a Diamond Exhibitor at the Cyber Security Summit. Dynetics Chief Technical Officer Tom Baumbach will help kick off the event on June 3, while Shane Hammett, senior cybersecurity risk consultant for the company, will participate on a cyber risk management panel June 4.

"It is exciting to see how much the Cyber Security Summit has continued to grow," said Jonathan Whitcomb, Dynetics vice president of Enterprise Solutions. “We’re pleased to be a sponsor and look forward to showcasing our Cyber RiskScope cyber risk management solutions.”

About Cyber RiskScope:

Cyber RiskScope™ is a portfolio of cyber risk management solutions that equips board members, business owners and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

Grissom National Cyber Competition Winners and Dynetics Interns Will Demonstrate Malware Detection Tool at Southeastern Cyber Security Summit

Published: June 02, 2015

Three members of the Grissom CyberSloths champion cybersecurity team, and also Dynetics interns, will demonstrate Malfunction, their malware analysis tool, at the Southeastern Cyber Security Summit this week. James Brahm, Morgan Wagner and Matthew Rogers, who were part of the high school team that won the 2015 CyberPatriot VII National Finals Competition, helped developed Malfunction as interns at Dynetics.

A large amount of advanced persistent threat (APT) malware bypasses normal scanners. Malfunction uses function-based fuzzy hashing to detect malware in network security and in the cloud.

The students will perform demonstrations of Malfunction and other work they have done for Dynetics at a booth beside the company at the 7th Annual Southeastern Cyber Security Summit June 3-4 at the Von Braun Center in Huntsville. The conference, presented by the North Alabama ISSA and Cyber Huntsville, will feature cyber training, education and workforce development for the evolving threat. Dynetics is the Diamond Sponsor for the event.

Dynetics sponsored a trip to Montgomery to the capitol in May for the Grissom students, along with New Century High School and Challenger Middle School students, to recognize them for their success in the CyberPatriot competition. The students had an opportunity to meet with Gov. Robert Bentley.

"We are very proud of these students and their accomplishments," said Dynetics Chief Technical Officer Tom Baumbach. "The students who came to us as interns have been a real asset to Dynetics during their time here."

Dynetics and Lockton Collaborate to Offer Cyber RiskScope™ Executive-level Cyber Risk Assessments

Published: May 26, 2015

Dynetics, a 40-year provider of leading technology solutions, and the Washington, D.C., operations of Lockton Companies, the world's largest privately held insurance brokerage firm, have announced an alliance that provides Lockton’s clients direct access to QuickLook, a cost-effective, executive-level cyber risk assessment service. Part of Dynetics’ Cyber RiskScope™ portfolio of cyber risk management solutions, QuickLook is immediately available to Lockton clients in the U.S. and abroad who are seeking to better understand and manage cyber risk. QuickLook risk assessment services can be completed quickly and affordably to provide organizations with an initial analysis of potential business impacts resulting from cyber attacks, along with a cyber threat assessment based on relevant industry intelligence. QuickLook includes delivery of an expert assessment incorporating the NIST Cybersecurity Framework and an executive-level report with intuitive graphics and top-level observations and recommendations.

“We’ve developed Cyber RiskScope to help businesses answer today’s big cyber questions,” said Jonathan Whitcomb, Dynetics vice president of Enterprise Solutions. “What’s the impact of a cyber threat? What are my most likely threats? How much cybersecurity is enough for my enterprise? Working with Lockton clients, we can make it easy to answer these business-critical questions.”

Robert Dowling, Cyber RiskScope product manager, added, “Whether a client has an existing cybersecurity program or needs a place to start, QuickLook provides valuable insight into a client’s cyber risks. We look forward to collaborating with Lockton to provide its clients with the insight they need to understand, visualize and manage cyber risk.”

Ben Beeson, cybersecurity practice leader for Lockton in Washington, D.C., said, “Cybersecurity is emerging as a major governance issue for our clients. Partnering with Dynetics will support our focus in providing boards of directors and senior executives the solutions that they need to manage cyber risk across the enterprise.”

About Cyber RiskScope:

Cyber RiskScope™ is a portfolio of cyber risk management solutions that equips board members, business owners and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

About Lockton:

More than 5,300 professionals at Lockton provide 41,000 clients around the world with risk management, insurance and employee benefits consulting services that improve their businesses. From its founding in 1966 in Kansas City, Mo., Lockton has attracted entrepreneurial professionals who have driven its growth to become the largest privately held, independent insurance broker in the world and 10th largest overall. Independent researcher Greenwich Associates has awarded Lockton its Service Excellence Award for risk management for large companies. For six consecutive years, Business Insurance magazine has recognized Lockton as a "Best Place to Work in Insurance." To see the latest insights from Lockton's experts, check Lockton Market Update.

Dynetics Introduces Cyber Risk Portal That Provides Economical Assessment of Users’ Cybersecurity

Published: May 22, 2015

Part of the Dynetics Cyber RiskScope™ portfolio of cyber risk management solutions, SelfAssure is an online, guided cyber risk self-assessment portal that enables users to assess the effectiveness of their organization’s cybersecurity relative to the threats they are most likely to encounter. By leveraging Dynetics’ 16 years of defending IT enterprises ranging from small businesses to national security agencies, SelfAssure goes beyond traditional cybersecurity compliance audits to provide high-value risk assessments of customers’ cybersecurity implementation. SelfAssure is available immediately.

Via an intuitive web interface, SelfAssure leads one or more users through a series of expertly crafted multiple-choice questions, the answers to which indicate how well their enterprise is meeting important cybersecurity objectives, explained Robert Dowling, Cyber RiskScope product manager. “The result is an economical, easy-to-grasp cyber risk assessment that serves as a great starting point for incorporating cyber risk management best practices into the enterprise.”

SelfAssure delivers a cyber risk profile that reveals the likelihood that a customer’s enterprise will encounter a breach, along with graphs that detail specific strengths and weaknesses and tailored recommendations for improving cybersecurity.

User support options designed to ensure successful self-assessments include embedded self-help, a service desk and an expert support line for cybersecurity questions. The solution is based on the NIST Cybersecurity Framework.

“We’ve developed Cyber RiskScope to help companies answer business-critical questions related to cybersecurity,” said Jonathan Whitcomb, Dynetics vice president of Enterprise Solutions. “Additional offerings in the Cyber RiskScope portfolio of cyber risk management solutions include enterprise security monitoring and cybersecurity analysis services, executive-level risk assessments and comprehensive risk assessment and mitigation services.”

About Cyber RiskScope:

Cyber RiskScope™ is a portfolio of cyber risk management solutions that equips board members, business owners and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

Upcoming Cybersecurity Event to Feature Information Protection Expert

Published: May 12, 2015

TakeDownCon Rocket City to Bring Computer Virus Pioneer:

Fred Cohen, best known as the person who defined the term “computer virus,” is the inventor of some of the most widely used computer virus defense techniques and a leader in advancing the science of digital forensic evidence examination. The EC-Council will bring this expert of many areas as part of a lineup of internationally renowned cybersecurity experts to TakeDownCon Rocket City 2015, scheduled for July 20-21 at Dynetics.

Dynetics is also the premier sponsor for the third consecutive year of TakeDownCon Rocket City, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits and the current security threats. Four days of training will precede the two-day conference which focuses on the “Attack” one day and “Defense” the next.

In the 1970s, Cohen designed network protocols for secure digital networks carrying voice, video and data; and he helped develop and prototype the electronic cashwatch for implementing personal digital money systems. In the 1980s, he developed integrity mechanisms for secure operating systems, consulted for many major corporations and taught short courses in information protection to more than 10,000 students worldwide. In 1989, he won the prestigious international Information Technology Award for his work on integrity protection.

In the 1990s, Cohen developed protection testing and audit techniques and systems that now help defend more than three quarters of the computers in the world, including the core technologies used in antivirus mechanisms and trusted platform modules.

Cohen has authored more than 200 invited, refereed and other scientific and management research articles, and he has produced several patented and copyrighted technologies. He has worked in critical infrastructure protection with law enforcement and the intelligence community to help improve their ability to deal with computer-related crime and emerging threats to national security. He has worked on issues of digital forensics, including work for many large corporations, testimony in federal and state criminal and civil matters and pro bono and state-funded work for indigent defendants. In 2002, he won the “Techno-Security Industry Professional of the Year” Award. In 2009, he was named the “most famous hacker” of all time by ABC News.

Cohen has participated in and created numerous strategic scenario games, including the first Internet-based strategic information warfare wargame; the Internet game for information security policy development, training and awareness in corporate, educational and government environments; and a sexual harassment game, which helps train employees on sexual harassment policies and processes. He has also developed several strategic scenarios for government and private use and operated strategic scenarios in university classes as a fun path to better understanding.

Today, Cohen is CEO of Fred Cohen & Associates, a firm that does research and advisory services exclusively for the U.S. government; CEO of Management Analytics, a firm specializing in research and advisory services and litigation support for non-federal customers; and a senior partner at Fearless Security, LLC, a firm specializing in examination and specification of information protection. He is also acting director of the Webster University CyberLab.

Dynetics Chief Technology Officer Tom Baumbach said, “Hearing Fred Cohen speak is worth the price of this conference. But in addition to him, you’ll get several other world-class speakers, all with various specialties. We are fortunate to bring this group of high-caliber presenters to Huntsville.”

For more information about the event and the current lineup of speakers, visitwww.takedowncon.com/.

About TakeDownCon:

TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. World-class industry insiders come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most protected systems can be breached. Day 2 is dedicated to Defense, and delegates will learn if their defense mechanisms are on par to thwart nefarious and persistent attacks. TakeDownCon provides the most sought after technical training and certification classes offered through Hacker Halted Academy by top training companies and led by well-respected instructors. For more information, visit www.takedowncon.com/rocketcity.

About EC-Council Foundation:

EC-Council Foundation is a not-for-profit initiative by EC-Council to raise awareness of online safety issues for the global community while unifying global cyber defense. EC-Council Foundation’s mission is to unify global cyber defense by fostering collaboration and participation of online computer users to become advocates for safe on-line activities for youth and adults alike through education and training programs. Visit http://foundation.eccouncil.org/.

Upcoming Cybersecurity Event to Feature Internationally Known Speakers

Published: May 06, 2015

Attila Marosi and Winn Schwartau are new speakers joining the TakeDownCon Rocket City lineup this year, as organizers expect to have an even larger turnout than for past events. The EC-Council Foundation is bringing this globally recognized cybersecurity conference to Huntsville for the third year in partnership with Dynetics, the premier sponsor and host. The event will be held July 20-21, along with a pre-conference training academy July 16-19, in the Dynetics Solutions Complex at 1004 Explorer Blvd. in Cummings Research Park.

Marosi has worked in information security since he entered the IT field. As a lieutenant on active duty in the Hungarian military, he worked for almost a decade on special information security tasks occurring within the Special Service for National Security. Later, he was transferred to the newly established GovCERT-Hungary, which is an additional national level in the internationally known system of CERT offices. Now he works for the SophosLab as a senior threat researcher on the Emerging Threat Team to provide novel solutions for the newest threats.

Marosi has several international certificates including Certified Ethical Hacker (CEH), EC Council Certified Security Analyst (ECSA), Offensive Security Certified Professional (OSCP) and Offensive Security Certified Expert (OSCE). During his free time he reads lections and teaches at different levels, specializing in training for white hat hackers. He has presented at several security conferences including HackerHalted, hack.lu, DeepSEC, AusCERT, Hacktivity, Troopers and NullCon.

Schwartau, in security for almost 30 years, is known for his originality in thought, writing and presentations on all aspects of security. In addition to being called “The Civilian Architect of Information Warfare,” he is one of the country’s most sought-after experts on information security, infrastructure protection and electronic privacy.

Eric Lopez, EC-Council’s director of conferences and events, said, “We are excited to work with Dynetics for the third consecutive year to bring to Huntsville some of the most well-known and highly respected experts in the field of cybersecurity, including Attila and Winn. We expect to have additional exciting announcements, so watch the website for updates.”

“We anticipate another great TakeDownCon this year,” said Jonathan Whitcomb, Dynetics’ vice president of Enterprise Solutions. “Last year, the number of attendees, at about 260, increased by double digits from our inaugural event in 2013. The training sessions were booked to capacity at 78. We look forward to an even more successful event in 2015.”

TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits and the current security threats. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most protected systems can be breached. Day 2 is dedicated to Defense, and delegates will learn if their defense mechanisms are on par to thwart nefarious and persistent attacks.

For more information about the event and the current lineup of speakers, visitwww.takedowncon.com/.

About TakeDownCon:

TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits and the current security threats. World-class industry insiders come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most protected systems can be breached. Day 2 is dedicated to Defense, and delegates will learn if their defense mechanisms are on par to thwart nefarious and persistent attacks. TakeDownCon provides the most sought after technical training and certification classes offered through Hacker Halted Academy by top training companies and led by well-respected instructors. For more information, visit www.takedowncon.com/rocketcity.

About EC-Council Foundation:

EC-Council Foundation is a not-for-profit initiative by EC-Council to raise awareness of online safety issues for the global community while unifying global cyber defense. EC-Council Foundation’s mission is to unify global cyber defense by fostering collaboration and participation of online computer users to become advocates for safe on-line activities for youth and adults alike through education and training programs. Visit http://foundation.eccouncil.org/.

Greg Jackson to Present "Implementing a Framework" at IT Symposium

Published: April 17, 2015

Greg Jackson, a senior cybersecurity analyst at Dynetics, will present “Implementing a Framework” at the 44thTennessee Higher Education Information Technology Symposium 2015 in Chattanooga, Tenn., April 19-21, 2015.

Information technology has an influence on all aspects of university business whether it relates to student success, compliance or efficiency and effectiveness.

Implementing security mechanisms without a framework can result in over-securing non-sensitive data or, more importantly, under-securing sensitive data. Jackson will discuss how to implement a framework that defines and prioritizes security actions based on the needs of an organization. He will explain how to move beyond security policies to a well-defined and enforceable security system.

For more information, visit the conference website.

TakeDownCon Rocket City Will Offer Hands-On Hacker Training

Published: April 16, 2015

Recognizing the growing demand for information security education and training, the EC-Council Foundation and Dynetics announced today some of the most sought-after technical training and certification classes offered by top training companies and led by well-respected instructors. TakeDownCon Academy will feature hands-on, “deep dive” hacking classes at the Dynetics Solutions Complex, 1004 Explorer Blvd., in Huntsville’s Cummings Research Park July 16-19, prior to the TakeDownCon Rocket City conference.

TakeDownCon Academy training participants will receive a complimentary pass to the conference, official courseware (for EC-Council and CAST training), a complimentary exam voucher (for EC-Council certification training), a certificate of attendance and lunch and coffee breaks throughout the training.

Training Academy will offer such classes as Certified Ethical Hacker (CEH) v8, Certified Chief Information Security Officer (CCISO), Certified Hacking Forensic Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), “Securing Cisco Networks with Threat Detection and Analysis (SCYBER) 1” and the master class, “Hacking and Securing Windows Infrastructure Bootcamp.”

The CEH program, highly in demand in the cyber security field, certifies individuals in the specific network security discipline of ethical hacking from a vendor-neutral perspective. The CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators and others who are concerned about the integrity of a network’s infrastructure. A certified ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Dynetics Vice President Jonathan Whitcomb, Enterprise Solutions, said, “We are pleased to again partner with the EC-Council foundation to offer some of the most highly acclaimed cybersecurity classes and a world-class conference, all in one venue and at a very reasonable price.”

Discounts for training are available to EC-Council members, government employees and college students and professors. An early bird rate applies through June 15.

The TakeDownCon Rocket City conference is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits and current security threats. The best and the brightest in the cybersecurity field will share their expertise, giving attendees an opportunity to learn about the industry’s most current and important issues.

For more information about the training and conference, including registration, visitwww.takedowncon.com/2015/rocketcity.

About TakeDownCon & EC-Council Foundation:

This highly technical IT security conference is a no-frills and topic-focused conference that is targeted toward IT and security professionals of all levels. The topical theme of this unique event is broken up into two days and exposes some of the most talked-about security issues such as web application security, SCADA and critical infrastructures, cloud security, mobile hacking and more. TakeDownCon Rocket City is organized by the EC-Council Foundation, which is a charitable and educational organization dedicated to educating and training individuals in cyber security. Established in 2012 by EC-Council, the foundation seeks to raise awareness, build capacity across nations and ultimately unify global cyber defense. EC-Council Foundation is the creator and organizer of Global CyberLympics, Hacker Halted, TakeDownCon, The Global CISO Form and Live.Learn.Secure., an education and training program. For more information regarding EC-Council Foundation or any of its programs, visit www.eccouncilfoundation.org.

Dynetics to Host Third TakeDownCon Rocket City in July

Published: April 06, 2015

EC-Council Foundation’s TakeDownCon Rocket City IT security conference will return to Dynetics this summer for a third consecutive year. Pre-conference training will be July 16-19, and the two-day conference will be July 20-21. Both the conference and the training will take place in the Dynetics Solutions Complex, 1004 Explorer Blvd., in Huntsville’s Cummings Research Park.

TakeDownCon Rocket City is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits and current security threats. The best and the brightest in the cybersecurity field will share their expertise, giving attendees an opportunity to learn about the industry’s most current and important issues.

TakeDownCon brings together information security researchers and technical experts from corporate to underground industries for this unique “ethical hacking” conference. In two days, they will present and debate the latest security threats, disclose current vulnerabilities and share information crucial to the technical profession.

The Training Academy held before the conference will offer such classes as EC-Council’s Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), Certified Security Analyst (ECSA), Certified Chief Information Security Officer (CCISO) and a master class on Hacking and Securing Windows Infrastructure Bootcamp.

Training attendees will receive free admission to the conference as well as official courseware (for EC-Council and CAST training), a complimentary exam voucher (for EC-Council certification training), a certificate of attendance and lunch and coffee breaks throughout the training.

Discounts for training are available to EC-Council members, government employees and college students and professors.

About TakeDownCon & EC-Council Foundation

This highly technical IT security conference is a no-frills and topic-focused conference that is targeted toward IT and security professionals of all levels. The topical theme of this unique event is broken up into two days and exposes some of the most talked-about security issues such as web application security, SCADA and critical infrastructures, cloud security, mobile hacking and more. TakeDownCon Rocket City is organized by the EC-Council Foundation, which is a charitable and educational organization dedicated to educating and training individuals in cyber security. Established in 2012 by EC-Council, the foundation seeks to raise awareness, build capacity across nations and ultimately unify global cyber defense. EC-Council Foundation is the creator and organizer of Global CyberLympics, Hacker Halted, TakeDownCon, The Global CISO Form and Live.Learn.Secure. an education and training program. For more information regarding EC-Council Foundation or any of its programs, visitwww.eccouncilfoundation.org.

Dynetics Offers Affordable, Collaborative Assessment to Help Cyber Risk Stakeholders Determine Threat Risk

Published: March 31, 2015

As part of its Cyber RiskScope™ portfolio of cyber risk management solutions, Dynetics announces QuickLook, an executive-level, collaborative cyber risk assessment that can be accomplished quickly, straightforwardly and affordably. This service includes an initial analysis of potential business impacts resulting from cyber-attack; relevant, intelligence-based cyber threat assessment; and an executive-level report with current cyber risk profile and top-level observations and recommendations.

With QuickLook, clients complete business impact and cybersecurity self-assessments before engaging with a Dynetics consultant who will work onsite with the client for one to two days. The end results will be an initial cyber risk assessment provided as expertly prepared, intuitive reports that equip clients to better understand their cyber risk.

“QuickLook allows our consultants to work with clients to prepare an analysis of their current situation and recommendations,” said Robert Dowling, Cyber RiskScope product manager. “This is one of a range of Cyber RiskScope products and services we are rolling out to clients who can select the right solution based on their security requirements and budgets.”

For more information about Cyber RiskScope, visit www.dynetics.com/riskscope.

About Cyber RiskScope:

Cyber RiskScopeTM is a portfolio of cyber risk management solutions that equips board members, business owners, and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

Dynetics Announces Cyber RiskScope: A Portfolio of Cyber Risk Management Solutions

Published: March 26, 2015

Business owners, board members and senior managers – along with insurance, legal and risk advisors – need accurate, intuitive information to make informed cyber risk decisions. Dynetics has developed Cyber RiskScope™, a portfolio of cyber risk management solutions, to help cyber risk stakeholders discover answers to critical questions about the following: the impact of potential cyber incidents, the most likely cyber threats facing today’s enterprises and the appropriate levels of cybersecurity needed for those enterprises.

“Cyber RiskScope leverages Dynetics’ cyber expertise, best-of-breed technologies and skillful analysis of key cyber risk indicators,” said Jonathan Whitcomb, Dynetics vice president of enterprise solutions.

Cyber RiskScope solutions can be tailored to match a client’s budget by controlling the depth of analysis and the extent of Dynetics expertise applied to a cyber risk assessment.

A key benefit of Cyber RiskScope is its use of innovative infographics that enhance decision- making for cyber risk management programs. “The Cyber Risk Profile is a variant of the familiar 5x5 risk matrix that enables stakeholders to visualize the business impact of potential cyber threats to the enterprise, as well as the enterprise’s current threat and cybersecurity levels,” said Robert Dowling, Cyber RiskScope product manager. “The Cyber RiskScope graphs provide for even deeper visibility and analysis of cyber risks by incorporating the NIST Cybersecurity Framework. The graphs give clients the ability to align the management of risk with the outcomes defined by the Framework, as it becomes the de facto standard for addressing cyber risk.”

According to Whitcomb, Cyber RiskScope is particularly beneficial for the cyber insurance industry. “Many stakeholders are already involved in this space, either as clients purchasing cyber insurance or as insurance providers or advisors,” he said. “For each of these groups, cyber risk is a growing concern, and our Cyber RiskScope solution will equip them with the insight they need to understand and manage risk.”

For more information about Cyber RiskScope, visit www.dynetics.com/riskscope.

About Cyber RiskScope:

Cyber RiskScopeTM is a portfolio of cyber risk management solutions that equips board members, business owners, and managers to easily understand cyber risk. Enterprise stakeholders can visualize the impact of cyber incidents, the likely threats they face and cybersecurity investments needed to meet security and budget requirements. Developed by Dynetics, a 40-year provider of advanced engineering and IT solutions to a range of government and commercial sectors, Cyber RiskScope’s offerings include an online self-assessment portal, executive-level assessments, comprehensive assessment and mitigation services, and enterprise security monitoring services. For more information, visit www.dynetics.com/riskscope.

Second BSides Huntsville to Offer Cybersecurity Training Courses

Published: February 04, 2015

The second annual BSides Huntsville will feature training opportunities at a great value. “CybatiWorks ‘Mission: Control Systems’” (taught by CYBATI) and “Intro to Threat Intelligence” (provided by Dragos Security) will be offered on Friday, Feb. 6, at $25 each. The security conference is scheduled for Saturday, Feb. 7. Both events will be held at Dynetics in Cummings Research Park.

Similar two-day classes in the state have been advertised recently for as much as almost $1,600.

Matt Luallen, president and co-founder of CYBATI, will teach the industrial control systems class, giving participants a rapid-fire introduction to control systems, where they are, how they communicate, the attack surface and mitigating control opportunities. It will address, for example, how to ensure that attacks against spreadsheets, slide presentations and databases do not expand to cycling a home or business internet-connected HVAC.

Luallen is a researcher, instructor and author, in addition to his role at CYBATI, a strategic and practical educational and consulting company. He is also a certified instructor for the SANS Institute. He is a graduate of National Technological University with a master’s degree in computer science, and he holds a bachelor’s degree in industrial engineering from the University of Illinois, Urbana.

“Intro to Threat Intelligence,” taught by BSides conference keynote speaker Robert M. Lee, will teach students analysis skills and give them an understanding of intelligence tradecraft that can be made applicable to any type of work – especially network security. Lee is an Air Force cyber warfare operations officer and co-founder of Dragos Security, a critical infrastructure cybersecurity company. He is an adjunct lecturer at Utica College and is a SANS instructor. Lee received a bachelor’s degree from the U.S. Air Force Academy and a master’s in cybersecurity in digital forensics from Utica College. He is currently pursuing his Ph.D. at King’s College London. He authored the book “SCADA and Me” to educate and inform about supervisory control and data acquisition (SCADA) systems.

Jonathan Whitcomb, Dynetics vice president, Enterprise Solutions, said, “The training available at BSides Huntsville is an incredible value. We are excited to offer these classes in Huntsville with such qualified instructors.”

BSides is a community-driven framework for building events for and by information security community members. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration on the most current topics with regards to cybersecurity. It is an intense event with discussions, demonstrations and interaction from participants. BSides conferences are held all over the world.

For more information about the classes and a link to register, visit the website.

About BSides:

Security BSides is the first grass roots, DIY, open security conference in the world. It is a combination of two event styles: structured anchor events and grass-roots geocentric events. Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos and interaction from participants. It is where conversations for the next-big-thing are happening. For more information, visit www.securitybsides.com.

Second BSides Huntsville to Offer a Range of Speakers and Topics

Published: February 03, 2015

Cybersecurity Conference Open to Professionals, Students and Parents:

The second annual BSides Huntsville security conference will feature speakers ranging from award-winning local high school students to renowned international presenters. Two simultaneous tracks will allow conference attendees to choose the sessions they wish to attend. The conference, scheduled for Feb. 7, 2015, at Dynetics in Cummings Research Park, is open to professionals, students and parents of students. BSides will offer training sessions on Feb. 6. The cost to attend the Saturday conference is $10, including lunch, and the Friday classes are $25 each.

Nineteen speakers for 16 different sessions are confirmed for the conference, and registration is already up to about 150 people. Presenters will come from Brazil and France and from all over the United States.

Robert M. Lee will open up the conference with the keynote presentation. He is an Air Force cyber warfare operations officer and co-founder of @DragosSecurity.

Adrian Crenshaw, an internationally known cybersecurity expert, will demonstrate “lock picking, but bypass is easier,” explaining the basics of security locks and their security features and bypasses.

Marcos Cicero will travel all the way from Brazil to Huntsville to enlighten conference attendees on how inside distributed denial-of-service (DDos) amplification attacks can be used to overwhelm internet service providers (ISPs) without external resources by using internal open resolvers. His presentation will be entitled “Bring Your Own DNS: on the ISP inner amplification attacks.”

James Brahm, Matthew Rogers and Morgan Wagner, seniors at Grissom High School, where they are part of the nationally ranked cybersecurity team, and also malware researchers at Dynetics, will present “So Easy a High-Schooler Could Do It: Static Malware Analysis Using Function-Level Signatures.”

“We are very pleased with the response we’ve gotten from both presenters and attendees,” said Paul Coggin, a senior principal cybersecurity analyst with Dynetics and organizer of the event. Coggin, who presents at conferences all over the world, will speak on “Hijacking Label Switched Networks in the Cloud.”

For a complete schedule, visit the BSides Huntsville website.

Jonathan Whitcomb, Dynetics vice president, Enterprise Solutions, said, “We are seeing a growing number of quality cybersecurity conferences in Huntsville. Dynetics is pleased to sponsor and host BSides, along with Rocket City TakeDownCon and the Southeast Cyber Security Summit. These venues offer excellent opportunities to network and learn about the latest in cybersecurity technology.”

BSides is a community-driven framework for building events for and by information security community members. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration on the most current topics with regards to cybersecurity. It is an intense event with discussions, demonstrations and interaction from participants. BSides conferences are held all over the world.

For more information about BSides Huntsville, including a registration link, visit the website.

About BSides:

Security BSides is the first grass roots, DIY, open security conference in the world. It is a combination of two event styles: structured anchor events and grass-roots geocentric events. Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos and interaction from participants. It is where conversations for the next-big-thing are happening. For more information, visit www.securitybsides.com.

Cybersecurity Conference Open to Professionals, Students and Parents

Published: January 07, 2015

Dynetics today announced it will host and sponsor the second annual BSides Huntsville security conference at its Cummings Research Park Solutions Complex Feb. 6-7, 2015. Training will be available on Friday, and the conference on Saturday will feature local, national and international speakers. The cost to attend the conference is $10, including lunch, and the classes are $25 each.

Sixteen speakers are confirmed for the conference, with more expected. Presenters will come from Brazil and France and from Massachusetts, Arizona, Texas, Kentucky, Missouri, Louisiana and Mississippi in the United States. In addition, high school students, Dynetics cybersecurity experts and other local professionals are on the agenda.

High school and college students interested in a cybersecurity career, along with their parents, are invited to register, as well as professionals.

The training schedule includes “Intro to Threat Intelligence” (provided by Dragos Security) and "CybatiWorks ‘Mission: Control Systems’" (taught by Cybati).

A variety of security-related topics will be covered at the conference such as threat and vulnerability management, the deep web and cloud security.

BSides is a community-driven framework for building events for and by information security community members, according to Paul Coggin, a Dynetics senior principal cybersecurity analyst and organizer of the event. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration on the most current topics with regards to cybersecurity. It is an intense event with discussions, demos and interaction from participants. BSides conferences are held all over the world.

Jonathan Whitcomb, Dynetics vice president, Enterprise Solutions, said, “Dynetics is pleased to be part of BSides for the second year. It was a success last year and will be even bigger in 2015. Along with the Rocket City TakeDownCon and the Southeast Cyber Security Summit, which we have sponsored the past two years, BSides represents an excellent venue for networking and learning about technical cybersecurity-related topics.”

For more information about Security BSides Huntsville, visit http://www.bsideshuntsville.org/.

About BSides:

Security BSides is the first grass roots, DIY, open security conference in the world. It is a combination of two event styles: structured anchor events and grass-roots geocentric events. Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos and interaction from participants. It is where conversations for the next-big-thing are happening. For more information, visit www.securitybsides.com.

Dynetics Cybersecurity Expert to Speak at Utilities Technology Association Conference

Published: January 10, 2015

Greg Jackson, a cybersecurity expert at Dynetics, will speak at the Utility Technology Association’s (UTA’s) Fall 2014 IT Conference, Oct. 22-24, 2014, at the Johnson City Power Board in Johnson City, Tenn. He will explain how to implement an effective security framework, emphasizing the National Institute of Standards and Technology Risk Management Framework (NIST) cybersecurity framework, released earlier this year.

Implementing security mechanisms without a framework can result in over-securing non-sensitive data or, more importantly, under-securing sensitive data. Jackson will discuss how to implement a framework based on the needs of a business owner or enterprise. He will explain how to move beyond security policies to a well-defined security system based on industry best practices.

Jackson, a certified information systems security professional (CISSP), manages the Enterprise Security group at Dynetics, which performs cybersecurity risk assessments and penetration testing, and provides managed security services.

Since retiring from the Air Force in 2001, Jackson has served a range of U.S. government and contractor customers working within various cybersecurity regulatory organizations, including Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP), the NIST Risk Management Framework (RMF) and the Federal Information Security Management Act (FISMA). He serves as chief architect of the data-centric approach that Dynetics takes to certification and accreditation and risk management.

UTA, originally formed in 1981 as UDPO (Utility Data Processing Organization), is a technology support group looking for new and innovative ideas to ensure strength and growth in the utility business world.

To find out more about the conference, visit http://www.utilitytechnology.org/events.aspx.

For more information, visit www.dynetics.com/information-technology.

Dynetics Partners with Citrix to Offer Cloud Solutions

Published: December 15, 2014

With an increasingly mobile workforce, people want the ability to access their apps and desktops on a growing number of devices. Dynetics, which offers IT solutions in its portfolio of products and services, announced today it has become a Citrix Silver Solution Advisor. This partnership will allow the company to offer customers virtual desktop deployments, mobile workspaces and access to applications anywhere from their devices through cloud networking and cloud platforms.

As a Silver Solution Advisor, Dynetics is a part of the new Citrix SaaS Advisor program, which will allow the company to deliver Citrix SaaS applications as a standalone offering or as part of a broader solution.

“We are very excited to join with Citrix to enhance our IT offerings to our clients,” said Nichole O’Brien, Dynetics Information Engineering branch manager. “This partnership will provide multiple options for virtualization to our customers.” O’Brien said Citrix offers a cost-effective solution for these services that are continuing to be more in demand.

Virtualization solutions, such as those offered by Citrix, simplify desktop management by centralizing Windows apps and desktops and, in turn, reduce IT administration costs, O’Brien explained. Updating, installing and troubleshooting are all done from a single image. “Optimization, security and mobility are all benefits,” she said. “Through this partnership, our customers will benefit from a solution that gives employees the ability to securely access apps and desktops from anywhere on any device, giving them flexibility in their work time and location.