George J. Silowash completed his M.S. in Information Assurance at Norwich University and received his B.S. in business administration from California University of Pennsylvania.
He holds several industry certifications, including Certified Information Systems Security Professional Information Systems Management Professional (CISSP-ISSMP), Certified Cyber Forensics Professional (CCFP), GIAC Certified Forensics Examiner (GCFE), and GIAC Certified Forensics Analyst (GCFA).
He teaches digital forensics and incident response in the on-campus undergraduate program and the online graduate program. As the CISO for the university, he is responsible for managing cyber risk and the information security program.
Contact Information
Mack 323
This email address is being protected from spambots. You need JavaScript enabled to view it.
Publications
Silowash, D. Cappelli, A. Moore, R. Trzeciak, T. Shimeall, and L. Flynn, "Common Sense Guide to Mitigating Insider Threats, 4th Edition," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Report CMU/SEI-2012-TR-012, 2012.
Silowash, T. Lewellen, J. Burns, and D. Costa, "Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Note CMU/SEI-2013-TN-012, 2013.
Costa, Daniel., Albrethsen, Michael., Collins, Matthew., Perl, Samuel., Silowash, George., & Spooner, Derrick. (2016). An Insider Threat Indicator Ontology (CMU/SEI-2016-TR-007). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Silowash, George. (2013). Insider Threat Attributes and Mitigation Strategies (CMU/SEI-2013-TN-018). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Silowash, George., & King, Christopher. (2013). Insider Threat Control: Understanding Data Loss Prevention (DLP) and Detection by Correlating Events from Multiple Sources (CMU/SEI-2013-TN-002). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Silowash, George., & Lewellen, Todd. (2013). Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders (CMU/SEI-2013-TN-003). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Lewellen, Todd., Silowash, George., & Costa, Daniel. (2013). Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time (CMU/SEI-2013-TN-008). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Flynn, Lori., Huth, Carly., Buttles-Valdez, Palma., Theis, Michael., Silowash, George., Cassidy, Tracy., Wright, Travis., & Trzeciak, Randall. (2014). International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany (CMU/SEI-2014-TR-008). Retrieved June 23, 2016, from the Software Engineering Institute, Carnegie Mellon University website.
Costa, M. Collins, S. Perl, M. Albrethsen, G. Silowash, and D. Spooner, “An Ontology for Insider Threat Indicators,” Proceedings of the Ninth Conference on Semantic Technology for Intelligence, Defense, and Security, STIDS 2014, pages 48–53. CEUR Workshop Proceedings, 2014.
Spooner, Derrick & Silowash, George & Costa, Daniel & Albrethsen, Michael. (2018). Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program. 247-257. 10.1109/SPW.2018.00040.
Related Departments
Norwich University College of Graduate and Continuing Studies