Insight By Booz Allen Hamilton

Cyber Engineering: Performance vs. Security of evolving technology

The number and magnitude of cyber vulnerable systems has never been as great as it is today. This is in large part a result of increasingly outdated technology paired with the evolution of innovative threat vectors.

Problems with cybersecurity and the potential solutions both exist where the physical hardware and software meet. To find these fixes, we look to cyber engineers in both industry and in government. These technicians use their time to craft new systems and code to avoid risks, and to make technology easier on the consumer.

One important consideration during the designing phase of a cyber system is to pay close attention to potential vulnerabilities or holes that could affect the process, or the consumer, later on. Agencies and businesses must also pay attention to how they store and dispense confidential information and whom they are recruiting for their teams.

The growing number of threats to even the most secure systems shines the light on the need for a larger cyber talent pool that understands emerging technology.

Definition of Cyber Engineering

We actually brought the cybersecurity engineers into the requirements process … from there they were able to determine if there would be vulnerabilities that they can kind of foreshadow before the design actually happens.

Mobile Security Engineering and Emerging Technologies

We’re looking at the information that we can obtain from using all sorts of devices and what we can learn about individuals and environments based on those … So it’s going to be on both the consumers who are using them [and] the organizations that are creating the devices to really think that through … and be able to figure that out before the information gets in the hands of people who might do something wrong with it.


Exposing them to the joy that can be derived from solving some of the hardest problems … we have to start as young as we possibly can. I think we need to reach them as soon as possible. And then we need to make sure that we’re out there serving as role models.

Panel of experts

  • Dr. Stacey Dixon

    Deputy Director, Intelligence Advanced Research Projects Activity

  • Jean Schaffer

    CISO and Chief of Cyber and Enterprise Operations, Defense Intelligence Agency

  • Debbie Bucci

    Lead IT Architect, Office of the National Coordinator for Health IT, Department of Health and Human Services

  • Naomi Escoffery

    Chief, Business Operations Division for the Deputy Assistant Director for Information Operations, Defense Health Agency

  • Trish Goforth

    Executive Vice President, Booz Allen Hamilton

  • Gigi Schumm

    Host of Women of Washington, Federal News Radio