How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, Jesse Mayer and RobbMayeski.

Size: px
Start display at page:

Download "How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski."

Transcription

1 How Do We Prepare the Next Generation ofcyber Warrior? Education v. Experience April 30, 2014 Jesse Mayer and RobbMayeski Northrop Grumman Cyber Security Operations Center

2 Overview Who are we? Introduction The next generation Current education standards Competitive programs What to look for when recruiting

3 Who are we? Northrop Grumman CSOC Lead Analysts Mid Atlantic CCDC participants Student Teams Red and White team members Cyber Patriot Presenters DC3 Cyber Forensics Challenge Specialties in Cyber Security and Information Assurance

4 Introduction The big questions: What does it take to prepare yourself for the cyber industry? Is a college degree enough? Is there more? What should I really be looking for when recruiting OOC (out of college)? College Graduate with 0 work experience Graduates with 1-2 years of work experience Graduates with internship experience

5 The next generation Technology is not a commodity, it s a lifestyle. For average user, security is assumed and often overlooked Safety net assumption, a degree does NOT equal a job Higher Education is often required Master Degree is becoming the new standard What should students do to be well-rounded and competitive in this field? Applicable knowledge Certification courses that do hands on training

6 Get Educated Many programs are a hybrid of computer science and computer information systems. Most require classes in ethics, policy and project management. Teach the logical processes behind: Protecting networks from cyber attacks Performing forensics in a corporate environment Understanding criminal investigation and how to maintain legal organization Why are there so few programs? College s have little input from the professional industry on shaping these programs Without professional direction, there is no current standard (other thandodcertified center of excellence)

7 Top Programs Each of the following universities are certified National Centers of Academic Excellence in Information Assurance Education by the National Security Agency and Department of Homeland Security. Northeastern University UMASS Amherst Towson University University of Maryland, College Park Mississippi State University Oklahoma State Syracuse University of Pittsburgh

8 Get Competitive There is nothing like taking all of that education and putting it to good use. Some programs start as early as high school, such ascyberpatriot Education goes as far as the door, practical application is needed just as much as an internship at a leading company. Not all Internships are made equal Many programs, such as CCDC and DC3 Forensics Competition have the best in the world behind the curtains, giving them legitimacy.

9 CCDC The Collegiate Cyber Defense Competition instills several core values that you never get as a student. Practical application of core knowledge in real time scenarios On the clock pressure to perform while leveraging business needs with security Working in a team, communicating, and performing as a single unit instead of an individual Scored based on their ability to detect and respond to outside threats, maintain the availability of core services, respond to business request and balance their security needs against the business needs. This year the team operated in a disaster recovery scenario where they have to input names of victims, and are additionally graded for how many people are saved

10 DC3 DC3 Cyber Forensics Competition 1,254 teams from around the world 181 undergraduate programs, 37 community colleges, 79 graduate teams Everyone competes inside their bracket, and against everyone else for the Grand Champion spot 40 Forensic Activities Levels Ranging from basic forensics concepts like password discovery to developing new tools 2013 developed tools for TrueCrypt, HPA, BitLocker, OTFE, andiosdevices Prepares students by requiring out-of-the-box thought, and looking at the problem in depth before deciding on a solution. Things are rarely black and white, and require on the fly innovation to be successful

11 Building a Legacy Companies are looking to get a younger, more innovative work force Balance between proven work ability and learning curve Learning Curve Balance between education, competitive programs, and internships ADAPTABILITY INNOVATION Diverse Degrees Shift from mainframe and hardware to SAAS / Remote ability Training Curve Amount of time to create an independently functioning analyst

12 Points for Recruitment Where does our money go when we invest in collegiate programs? What s the ROI for our cash flow? Are we investing in the programs that we want to recruit from? What do we currently look for? A solid resume doesn t just show education, internships, or competition experience but an active balance across all three. Not all internships are equal Are you an intern, or are you an INTERN? Look at interns across all sectors of your company, not just your security programs.

13 Future Initiatives Be more engaged in the schools that you invest in Visit their program space and do demos / tech talks Invest in creating a cyber security lab for research initiatives Sponsorship Have a presence at competitive programs Sponsor programs at universities to get name recognition Mentor students and engage competitive teams Volunteering to mentor students goes a long way Cyber CAPSTONE Create a program for graduating seniors that allows them to work in a SOC environment

14 Questions?

15

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Quarterly Cybersecurity BILT Meeting October 10, 2012 Meeting Minutes ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Stephen

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

DoD Cyber Crime Center

DoD Cyber Crime Center DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

2 0 0 7 Sponsorship Packet On behalf of The Center for Infrastructure Assurance and Security (CIAS) I would like to invite you to participate through sponsorship at our second National Collegiate Cyber

More information

Exploring a National Cyber Security Exercise for Community Colleges

Exploring a National Cyber Security Exercise for Community Colleges Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise

More information

Small-Scale Cyber Security Competitions

Small-Scale Cyber Security Competitions Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Building a Successful Cyber-security Program

Building a Successful Cyber-security Program Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 dampier@dasi.msstate.edu

More information

School of Criminal Justice & Social Sciences Assessment Plan BA Psychology Major

School of Criminal Justice & Social Sciences Assessment Plan BA Psychology Major School of Criminal Justice & Social Sciences Assessment Plan BA Major School of Criminal Justice and Social Sciences Mission Statement The School of Criminal Justice and Social Sciences educates our graduates

More information

Master of Science in Information Security and Assurance

Master of Science in Information Security and Assurance Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are

More information

Securing Networks, Securing Futures

Securing Networks, Securing Futures CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in

More information

Master of Science in Information Assurance: Department of Information Assurance, College of Information, Science & Technology

Master of Science in Information Assurance: Department of Information Assurance, College of Information, Science & Technology www.unomaha.edu/graduate www.facebook.com/unograduatestudies 402-554-2341 gradschool@unomaha.edu Master of Science in Information Assurance: Department of Information Assurance, College of Information,

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Certified Digital Forensics Examiner (CDFE)

Certified Digital Forensics Examiner (CDFE) Certified Digital Forensics Examiner (CDFE) Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Digital Forensics Examiner (CDFE) Certified Job 1 2 Write a review to receive

More information

Evolution Of Cyber Threats & Defense Approaches

Evolution Of Cyber Threats & Defense Approaches Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution

More information

Copyright 2015 EMC Corporation. All rights reserved. 1

Copyright 2015 EMC Corporation. All rights reserved. 1 Copyright 2015 EMC Corporation. All rights reserved. 1 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and undertakes no obligations with regard to product planning information, anticipated

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Master of Science Degree INFORMATION SYSTEMS. Engaging Minds. Embracing the World.

Master of Science Degree INFORMATION SYSTEMS. Engaging Minds. Embracing the World. Master of Science Degree INFORMATION SYSTEMS Engaging Minds. Embracing the World. A DEGREE THAT LEADS TO JOB SECURITY La Roche College helps you to move ahead in a global economy by offering a cutting-edge

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Leann Atoigue Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015 Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College debasisb@hawaii.edu

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Important Steps to a Masters or PhD in Public Health

Important Steps to a Masters or PhD in Public Health Important Steps to a Masters or PhD in Public Health 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods, Stats): Courses related to public

More information

Metasploit The Elixir of Network Security

Metasploit The Elixir of Network Security Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal

More information

If your schedule allows you might consider joining ROTC.

If your schedule allows you might consider joining ROTC. Important Steps to Becoming an MA/MS or PhD in Military Psychology 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods, Stats): Personality

More information

ARTICULATION AGREEMENT WITH ITT TECHNICAL INSTITUTE

ARTICULATION AGREEMENT WITH ITT TECHNICAL INSTITUTE ARTICULATION AGREEMENT WITH Ashford University and ITT Technical Institute have entered into this Articulation Agreement in the spirit of cooperation and to mutually recognize each other as quality institutions

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Take back the initiative

Take back the initiative Take back the initiative IT S TIME TO FOCUS ON OUTCOMES. NOT TOOLS. CEO VANTAGE POINT CHRIS DRAKE FOUNDER & CEO ARMOR @ARMOR ARMOR.COM PAGE PAGE 1 1 A prologue: defending the chocolate makers Imagine any

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Symantec Cyber Security Services: A Recipe for Disaster

Symantec Cyber Security Services: A Recipe for Disaster When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training

More information

How To Become A Cybersecurity Consultant

How To Become A Cybersecurity Consultant Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Important Steps to Becoming an MA/MS or PhD in Educational Psychology. 2. It is critical to do well in your courses

Important Steps to Becoming an MA/MS or PhD in Educational Psychology. 2. It is critical to do well in your courses Important Steps to Becoming an MA/MS or PhD in Educational Psychology 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods, Stats): Any Education

More information

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education

More information

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Important Steps to Becoming an MA/MS or PhD in Engineering Psychology and Human Factors

Important Steps to Becoming an MA/MS or PhD in Engineering Psychology and Human Factors Important Steps to Becoming an MA/MS or PhD in Engineering Psychology and Human Factors 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods,

More information

Building the Next Generation of Cyber Defenders

Building the Next Generation of Cyber Defenders Building the Next Generation of Cyber Defenders Tapping into the League of Wounded Warriors to help Protect and Defend the Nation s Information Systems Sam Maroon Jim Wiggins Speaker Introduction Mr. Sam

More information

Implementing Security Education at a Small Community College

Implementing Security Education at a Small Community College PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications

More information

Important Steps to a Career in Higher Education (MA/MS or or PhD)

Important Steps to a Career in Higher Education (MA/MS or or PhD) Important Steps to a Career in Higher Education (MA/MS or or PhD) 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods, Stats): PSY courses

More information

University-Industry Work Group: Education

University-Industry Work Group: Education University-Industry Work Group: Education Tanya Zlateva Director, Center for Reliable Information Systems and Cyber Security (RISCS) Associate Dean for Academic Programs, Metropolitan College (MET) Boston

More information

Your company protected against cybercrime

Your company protected against cybercrime Your company protected against cybercrime SMEs are easy prey for cyber criminals Which entrepreneur doesn t sometimes become aware of the trouble a burglary in his company would cause? Solid locks on doors

More information

APPENDIX 3 TO SCHEDULE 8.1

APPENDIX 3 TO SCHEDULE 8.1 APPENDIX 3 TO SCHEDULE 8.1 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT 1.0 Transition Services and Affected Employees The highest priority in the design of Northrop Grumman s transition plan is to transfer

More information

Innovation, Partnership, Development

Innovation, Partnership, Development Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case Securing Industrial Control Systems in the Chemical Sector Roadmap Awareness Initiative Making the Business Case Developed by the Chemical Sector Coordinating Council in partnership with The U.S. Department

More information

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Policing Together. A quick guide for businesses to Information Security and Cyber Crime Policing Together A quick guide for businesses to Information Security and Cyber Crime This leaflet has been produced by the Surrey and Sussex Cyber Crime Unit Who is this leaflet for? This leaflet will

More information

Important Steps to Becoming a Masters of Social Work (MSW)

Important Steps to Becoming a Masters of Social Work (MSW) Important Steps to Becoming a Masters of Social Work (MSW) 1. Take the right courses Courses to take as an undergraduate, besides typical PSY courses (Intro, Research Methods, Stats): Personality Clinical

More information

Is It the Field of Study for You? A Presentation by the CIS Department Prince George s Community College

Is It the Field of Study for You? A Presentation by the CIS Department Prince George s Community College Is It the Field of Study for You? A Presentation by the CIS Department Prince George s Community College Two hundred years ago, you probably would have made a living i in agriculture. One hundred years

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education

More information

Thomas J. Schlagel Chief Information Officer, BNL

Thomas J. Schlagel Chief Information Officer, BNL Thomas J. Schlagel Chief Information Officer, BNL PhD in Nuclear Physics from the University of Illinois at Urbana-Champaign in 1990 Joined BNL in 1990 as a Postdoctoral Associate in the Nuclear Theory

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

Participants: Introduction:

Participants: Introduction: National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Transition from VAR to MSP. A Publication of the CA Service Provider Center of Excellence

Transition from VAR to MSP. A Publication of the CA Service Provider Center of Excellence Transition from VAR to MSP A Publication of the CA Service Provider Center of Excellence transition from VAR to MSP There is NO magic potion! There is no instant transformation This is a process that will

More information

Homeland Security Graduate Programs

Homeland Security Graduate Programs Homeland Security Graduate Programs TABLE OF CONTENTS Homeland Security Portfolio...3 Homeland Security Master s Degree Base Program and Graduate Certificate... 4 5 Public Health Preparedness... 6 7 Geospatial

More information

PROGRAMS STUDY. Information Technology

PROGRAMS STUDY. Information Technology PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating

More information

UKE MASTER OF ENGINEERING MANAGEMENT PROGRAM LOW-RESIDENCY DISTANCE OPTION FOR WORKING PROFESSIONALS

UKE MASTER OF ENGINEERING MANAGEMENT PROGRAM LOW-RESIDENCY DISTANCE OPTION FOR WORKING PROFESSIONALS UKE MASTER OF ENGINEERING MANAGEMENT PROGRAM LOW-RESIDENCY DISTANCE OPTION FOR WORKING PROFESSIONALS You re ready to take the next step. But, you want to choose path. Master of Engineering Program 1 So,

More information

Excellence in Graduate Education: Programmatic Issues

Excellence in Graduate Education: Programmatic Issues Excellence in Graduate Education: Programmatic Issues William G. Roy, the Committee on Degree Programs, and the Graduate Council Excellence in graduate education depends upon outstanding performance at

More information

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation

The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium Bruce J. Bakis, The MITRE Corporation Outline Essence Goals Member value proposition Organization Milestones Sharing

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Outcomes Assessment Year End Report BS Degree

Outcomes Assessment Year End Report BS Degree International Assembly for Collegiate Business Education Outcomes Assessment Year End Report BS Degree Institution: Academic Business Unit: Academic Year: 2013-2014 Cazenovia College Business & Management

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab Cloud Security VS Cybercrime Economy: The Kaspersky Vision Eugene Kaspersky Co-founder & CEO, Kaspersky Lab The Digital World is Under Attack 20 000 000 The last five years have become the 18 000 000 Golden

More information

PH.D. IN BUSINESS ADMINISTRATION

PH.D. IN BUSINESS ADMINISTRATION PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions The Need to Be Innovative and Agile Bridging the IT/OT Divide Using Software-defined Solutions IT & OT Think & Behave Differently IT View We run the network OT is the wild, wild west OT doesn t understand

More information

Information Technologies for Homeland Security Program Assessment Plan 5/3/2011

Information Technologies for Homeland Security Program Assessment Plan 5/3/2011 Last Revised 5/3/2011 Catalog Description The Computer Information Systems (CIS) Associate Degree program is designed to provide a solid foundation in the fundamental skills that are generally required

More information

Cyber Security Overview Madison County Career Technical Center February 17, 2014. Timothy Mullican Cyber Defense Analyst, Aleta Technologies

Cyber Security Overview Madison County Career Technical Center February 17, 2014. Timothy Mullican Cyber Defense Analyst, Aleta Technologies Cyber Security Overview Madison County Career Technical Center February 17, 2014 Timothy Mullican Cyber Defense Analyst, Aleta Technologies #whoami Timothy Mullican, 17 years old Cyber Defense Analyst

More information

CONSIDERING CLOUD and ON-PREMISE ACCOUNTING SOLUTIONS. A Guide to Put Things in Focus

CONSIDERING CLOUD and ON-PREMISE ACCOUNTING SOLUTIONS. A Guide to Put Things in Focus CONSIDERING CLOUD and ON-PREMISE ACCOUNTING SOLUTIONS INTRODUCTION As the world increasingly embraces a 24/7, borderless model for business, the demands on finance have never been greater. Unfortunately,

More information

GOING BEYOND BLOCKING AN ATTACK

GOING BEYOND BLOCKING AN ATTACK Websense Executive Summary GOING BEYOND BLOCKING AN ATTACK WEBSENSE TRITON VERSION 7.7 Introduction We recently announced several new advanced malware and data theft protection capabilities in version

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Background (2011-2013)

Background (2011-2013) 2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,

More information

USEReady Introduction

USEReady Introduction USEReady is a Data as a Service (DaaS) provider with offices and staff in New York metro area. We enable both IT and end users to manage through the data revolution by combining these elements: BI SaaS,

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

2011-2012 JEF Grant Cyber Range Cyber Defense Training Flint Campus Technology Center Room S100

2011-2012 JEF Grant Cyber Range Cyber Defense Training Flint Campus Technology Center Room S100 2011-2012 JEF Grant Cyber Range Cyber Defense Training Flint Campus Technology Center Room S100 Morris Fulcher Associate Dean CIS aker College of Flint 1050 W. ristol Rd. Flint, MI 38507 810 766-8798 Morris.fulcher@baker.edu

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

TOP TEN TRENDS FOR CONTACT CENTERS IN 2013

TOP TEN TRENDS FOR CONTACT CENTERS IN 2013 TOP TEN TRENDS FOR CONTACT CENTERS IN 2013 by Jeremy Puent, Clarity Consulting January 7, 2013 1 OF 6 INTRODUCTION: Humans resist change. Some organizations are slow to adapt. Change and innovation seem

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Mesa Community College Supporting Actions for Engagement (SAFE) Project Service Learning Homeland Security Projects Overview

Mesa Community College Supporting Actions for Engagement (SAFE) Project Service Learning Homeland Security Projects Overview Mesa Community College SPRING 2004 Project Title: Connector Program Instructor/Trainer: Michelle Denton Faculty Advisor: Lewis Jones Fire Science FSC 282 AC Prior to being enrolled in this course, students

More information

MIT Events and Key Dates

MIT Events and Key Dates MIT Events and Key Dates You ve worked hard for your degree. Now put your degree to work with an organization offering greater opportunity, greater challenge and greater satisfaction. Accenture, one of

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

IT Manager's Handbook

IT Manager's Handbook IT Manager's Handbook Getting your new job done Third Edition Bill Holtsnider Brian D. Jaffe AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information