Samuel Visner & Beth Musumeci

Profile of Samuel Visner & Beth Musumeci

Senior VP, General Manager & Senior VP, ICF Commercial Cybersecurity Practice
News & Commentary Posts: 1

Samuel Visner joined ICF in 2014 and has more than 35 years of experience in the national security and cybersecurity domains for the private sector and for the US federal government. Previously, Sam was vice president and general manager of CSC Global Cybersecurity and was senior vice president at SAIC. Sam also served as chief, signals intelligence programs, at the National Security Agency.  Sam is actively involved in and provides leadership to industry organizations, including the National Intelligence Council, the Cyber R&D Task Force of the Intelligence, National Security Alliance and Cyber Committee of the Armed Forces Communications, and Electronics Association.

Sam presents and writes on cybersecurity issues and is an adjunct professor at Georgetown University where he teaches cybersecurity policy and operations. He has a master's degree in telecommunications from George Washington University and a bachelor's degree in international politics from Georgetown University

Beth Musumeci is the senior vice president of ICF's commercial cybersecurity practice.  She joined ICF International in 2015 and has more than 20 years of experience in cybersecurity work for the private sector and for the US federal government. Prior to ICF, Beth led strategy and transformation, and was the general manager for CSC's global commercial cyber security practice.  She was an early pioneer in establishing security operations centers, and led the establishment of their global logical security operations center spanning five continents and serving hundreds of customers. 

Early in her career, Beth was a practitioner in the chemical, energy and natural resources industry as a lead information risk manager.  She began her career at the DuPont Company. Beth is based in Delaware and travels globally to foster partnerships and serve as a trusted advisor to clients worldwide.


Articles by Samuel Visner & Beth Musumeci
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.