Since 2011, SANS has been celebrating those "Difference Makers" whose innovation, skill and effort have driven real increases in information security. There is no shortage of publicity around failures in security - constant headlines detailing breaches and vulnerabilities at companies and government agencies. However, what you never hear about are the many organizations who aren't in the news because their security staff have found ways to meet business and mission needs while protecting customer and business data from attackers. There are thousands of security practitioners out there who are quietly succeeding and making breakthroughs in advancing security.
On Tuesday, December 16th at the SANS Cyber Defense Initiative ® Training Event in Washington DC, SANS celebrated 2014's "Difference Makers." The 2014 list of cybersecurity Difference Makers include:
Freedom Mortgage National Operations and Control Center
The team at Freedom Mortgage was able to both support business
demand for BYOD and mobility and to build out a NOC capability to
securely monitor operations. They had 10 monitoring tools and 5 major
apps in use. They were able to develop their own central monitoring
capability, using SharePoint and their own smarts, reducing hundreds of
thousands of security alerts per day down to an average of twenty events
per day that required action.
Laks Prabhala, CISO, US Department of Justice Office of Justice Programs
Laks has been CISO at OJP since 2009 and has been the driving force
behind the OJP's Next Generation Security implementation and their
Secure Cloud initiative. He quickly pulled together a cross-department
team that focused on the Critical Security Controls to define the OJP
"Secure Cloud Initiative" and focused on early wins to demonstrated
immediate security improvement.
AES Corporation Advanced Targeted Threat Team
The AES (Fortune 200) team was able pilot an approach to advanced
targeted threat prevention to rapidly recognize the threat posed to AES
by advanced targeted attacks which detected 100 active threats that had
gone undetected. Over a nine month period they demonstrated an approach
to detect and mitigate those attacks, demonstrating avoidance of over
$10M in incident impact and response costs. They were able to
demonstrate to management both the need and the benefit, but also were
able to rapidly implement the solution in a complex organizational
environment.
Department of Homeland Security National Cybersecurity Assessment
and Technical Services, Team Members: Rob Karas, Sean McAfee, Dave Link,
John Bush, Mark Feldhousen, Jason Hill, Willio Jean-Paul, Lorenzo
Miller, Teodorico Trajano, Ken Vrooman, Scott Wallace, Joshua
McAllister, Dave Redmin
The DHS NCATS team uses a proactive approach to provide
vulnerability assessment and risk analysis services to DHS and other
agencies. By showing how vulnerability scanning could be increased from
quarterly to weekly, the team showed an 86% reduction in critical
vulnerabilities. NCATS lead the response to the Heartbleed vulnerability
and coordinated a response effort that mitigated 99% of all
vulnerabilities within 3 weeks
Cheryl Conley, Lockheed Martin, Corporate Information Security, Security Education and Awareness
Lockheed Martin has been a trailblazer in effective employee
security awareness and education. Cheryl Conley has lead that program
since 2008, and been with LMSC since 1983. Her program at LMSC has
included very innovative work both in defining Undesired Action Rate
metrics and optimizing security awareness investments to show real
security improvements. She has been tireless is collaborating with other
security leaders to share her ideas and to support other efforts.
Cheryl was recently appointed Business Area Information Security
Officer.
Joyce Brocaglia, CEO Alta Associates
Joyce has long been a force in helping skilled cybersecurity
professionals move up to CISO positions. She founded Alta Associates in
1986, helping information security professionals find management
positions before the term CISO was known, let alone cool. She also
established the Executive Women's Forum in 2002, exposing more women to
IT and cybersecurity, and personally funding several scholarships.
Scholarships for Women Studying Information Security, Applied
Computer Security Associates (ACSA) and HP Diane Pearson, Director-
Federal Channel Partners, HP Enterprise Security
ACSA, a non-profit organization that has been in existence wince
1985, founded the SWSIS program in 2011 to help address the shortage of
skilled people in the cybersecurity field and to especially focus on
encouraging young women to consider careers in security. In 2014, with
funding from HP, and involvement from the Committee on the Status of
Women in Computing Research (CRA-W), an arm of the Computing Research
Alliance the SWSIS program has awarded scholarships to 11 young women.
Mike Knight, Naval Network Warfare Command (NNWC) (NETWARCOM)
Mike was instrumental in making the DoD 8570 implementation produce
meaningful results in increasing the skills of those getting 8570
certification. This effort not only facilitated increasing information
assurance workforce skills, but delineated a career path that increases
personnel retention and continual improvement of skills.
Dr. Martin Carlisle, Professor and Head, Department of Computer Science, United States Air Force Academy
Dr. Carlisle was instrumental in adding a cybersecurity major to the
Air Force Academy curriculum, even as other areas were being reduced.
He also created and has led the USADA Cyber Competition Team.
Sarah Edwards SANS Institute DFIR Instructor Team
Sarah Edwards has put SANS on the map with cutting edge Mac OSX and
file system forensic expertise. Throughout 2014, she has contributed her
time at national Law Enforcement industry events, regional B-Sides and
national technical conferences, educating fellow professionals in her
area of expertise.
Michele D. Guel, Distinguished Engineer, Cisco
Michele lead the development and implementation of Cisco's Security
Knowledge Empowerment (SKE) program that produced tremendous gains
ensuring continuous adoption of security into the DNA of all areas of
Cisco's operations.
Heather Mahalik, SANS Institute DFIR Instructor Team
Heather played a key role in revitalizing mobile forensics training.
She also spent her free time teaching workshops at the CyberJutsu Women
in Tech group, and even participated in the Cyber girls outreach
training, ensuring middle school and high school girls would have the confidence to pursue whatever profession they so desire.
Cindy Murphy, SANS Institute DFIR Instructor Team
Cindy also played a key role in developing SANS groundbreaking
mobile forensics training course. She also volunteered much of her time
to provide guidance and mentoring to cybersecurity investigators in the
Law Enforcement community, as well as serving as a mentor for new SANS
instructors.
Tyler Williams, ICS Solution Manager, Shell
Tyler was the leading force in the development of the Process
Control Design and IT Security Domain Competency Guidelines that defined
the specific security skill areas needed in Industrial Control System
environments. Tyler chaired the broad industry consortium that turned
this into the basic for the Global Industrial Cyber Security
Professional (GICSP) certification.