David Ross Speaks at Gartner Catalyst Conference

General Dynamics Commercial Cyber Services was featured as a premier sponsor at the Gartner Catalyst Conference in San Diego, August 10-13.

On August 10, David Ross, general manager of General Dynamics Commercial Cyber Services, led the speaking session, “From Tools to Intelligence, Operationalizing Cyber Security.” The session discussed how to create a powerful operational cyber environment focused on business outcomes. David’s presentation highlighted how to achieve this goal with the RCAP process, utilizing a variety of techniques and best practices.

During the session, David provided three real-life case studies from General Dynamics Information Technology’s work with the DoD and Intelligence Community.

Watch the session below, and apply the RCAP process to drive significant improvements to your cyber programs.

As Cyber Attacks Increase, Talent Gap Widens

Over the past few years, cyber-attacks on American businesses have increased at an exponential rate – with few industries being spared. In the past week alone, officials from the UCLA Health System announced that sensitive personal or medical information on as many as 4.5 million individuals was accessed in a criminal cyber-attack, while CVS’s online photo service, CVSphoto.com, fell victim to a similar breach where customer credit card information may have been collected.

While cyber-attacks continue to hit the front pages of our newspapers and enterprises from Wall Street to Main Street, a glaring skills gap has emerged: a severe lack of highly-skilled cyber warriors to combat the ever-increasing threats.

In the 2015 Black Hat Attendee Survey of over 450 respondents of top-level security expertsreleased last week, “73 percent of Black Hat attendees say it is likely that they will have to respond to a significant compromise in the coming year: 13 percent say they have ‘no doubt’ about it, 24 percent say that it’s ‘highly likely,’ and 36 percent say that it’s ‘somewhat likely.’”

Out of these same security professionals, only 27 percent of respondents said they have “enough staff to defend itself against current threats” while “nearly a quarter (22 percent) described their security departments as being ‘completely underwater.’”

While many companies and industries have committed to increased spending on IT security, the ability to find highly-trained and skilled workers is keeping companies from securing their critical I.P.

"We don't have enough expertise in the right places now," said Peter Singer, former director of the Center for 21st Century Security and Intelligence at Brookings Institute and a strategist at the New American Foundation. "We often frame cybersecurity as a technology problem. It is a human problem."

At General Dynamics Commercial Cyber Services, we are retaining, recruiting and investing in a workforce we think is unmatched in the private sector. The depth and expertise of our cyber security staff is bolstered by our vast reach-back we have access to the larger General Dynamics organization that taps into the expertise of employees who provide support to key government agencies – something we have been doing for over 40 years. Now, many in the private sector are looking to recruit similarly trained cyber personnel.

Source: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?hp&action=click&pgtype=Homepage&module=second-column-region®ion=top-news&WT.nav=top-news&_r=1

Congraulations to Nick Leshock

I would like to congratulate Nick Leshock on his newly announced role as Chief Information Officer of General Dynamics. Nick is a recognized expert of cyber security and currently serves as the Chief Information Security Officer at General Dynamics Information Technology (GDIT).

As Cyber security is becoming more of a strategic issue and becoming more prevalent in the board room Nick will be a huge asset to General Dynamics.


Cybercrime Can Give Attackers 1,425% Return on Investment

In a report released by Trustwave, attackers using a standard ransomware campaign can earn a 1,425 percent ROI, while security professionals are struggling to earn a ROI at all. Earnings for a 30 day campaign, assuming a 10% infection rate, a payout rate of .5%, and a $300 ransom, would total $90,000. Trustwave’s scanners also found that 98% of applications had vulnerabilities. As surprising as this is, we need to step up our cybersecurity game.


Source: http://www.darkreading.com/analytics/cybercrime-can-give-attackers-1425--return-on-investment/d/d-id/1320756

Hacking and the Future of Warfare

After the security breach of as many as 14 million, it has become clear that we need to crack down on our nation’s cybersecurity. 11 out of 47 computer systems that were supposed to be certified as “safe to use” last year were not “operating with a valid authorization”. The United States needs to take initiative by being more forceful when taking on hackers and shutting them down. If the government does not shut the hackers down then it is easier for them to acquire information from a larger scale of individuals including family members and government contractors.



Nicomachus’ Theorem

In 100 C.E., Nicomachus of Gerasa observed that

13 + 23 + 33 + … + n3 = (1 + 2 + 3 + … + n)2

Or “the sum of the cubes of 1 to n is the same as the square of their sum.” The diagram above demonstrates this neatly: Counting the individual squares shows that

1 × 12 + 2 × 22 + 3 × 32 + 4 × 42 + 5 × 52 + 6 × 62 = 13 + 23 + 33 + 43 + 53 + 63 = (1 + 2 + 3 + 4 + 5 + 6)2