Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Similar documents
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Cybersecurity in Higher Ed

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Which Side Are You On?

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

Opening Doors to Cyber and Homeland Security Careers

CYBER RESILIENCE & INCIDENT RESPONSE

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

LeAnn Estep Director, Career & Technology Amarillo ISD

A new approach to Cyber Security

Bad Idea: Creating a U.S. Department of Cybersecurity

Building the IA Workforce

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

CALIFORNIA CYBERSECURITY TASK FORCE

Cybersecurity and Hospitals: A Board Perspective

THE CYBERSECURITY LITERACY CONFIDENCE GAP

ISAO SO Product Outline

5 Things to Know About Certification

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

An Overview of Mobile Security

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Kaspersky Security Awareness

CYBERSECURITY: Scholarship and Job Opportunities

TEL2813/IS2820 Security Management

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Academic Program Review Cyber Security College of Southern Nevada 2017

IOT Security More than just the network..

Training and Certifying Security Testers Beyond Penetration Testing

Security Standards for Electric Market Participants

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

College Of. Technological Innovation

Strengthening Capacity in Cyber Talent sans.org/cybertalent

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

Building cyber resilience into our railway s DNA. Matthew Simpson. Technical Director, Cyber Security

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Breaking Out the Cybersecurity Workforce Framework

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

IT & DATA SECURITY BREACH PREVENTION

The University of Queensland

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Information Security Controls Policy

UNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT

Digital Forensics. Graduate Certificate

Getting Started with Cybersecurity

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

THE POWER OF TECH-SAVVY BOARDS:

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Strategy for information security in Sweden

Caribbean Cyber Security: Not Only Government s Responsibility

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

University Labs Put Cybersecurity Under the Microscope

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

Standard Course Outline IS 656 Information Systems Security and Assurance

Why the Security Workforce Needs More Women and Men

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cybersecurity, safety and resilience - Airline perspective

The GenCyber Program. By Chris Ralph

Effective Cyber Incident Response in Insurance Companies

What It Takes to be a CISO in 2017

CSR Computer Policy Statement

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Cyber Resilience. Think18. Felicity March IBM Corporation

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Security Management Models And Practices Feb 5, 2008

Panel on Cloud Services Security and Safety in Cloud-based Systems and Services

The Widening Talent Gap: The greatest security challenge of our time

Collaboration on Cybersecurity program between California University and Shippensburg University

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Department of Homeland Security Updates

Securing Your Campus

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

Why you MUST protect your customer data

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

THALES DATA THREAT REPORT

Shaping the Future of Cybersecurity Education

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Sharing of Information & Intelligence on the Importation & Transportation of Food

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Media Kit. California Cybersecurity Institute

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

Transcription:

CORNELIUS FORTUNE THURSDAY, FEBRUARY 11, 2016 HTTP://WWW.SECONDWAVEMEDIA.COM/METROMODE/FEATURES/MICHIGAN- COLLEGES-CYBER-SECURITY-021116.ASPX Michigan colleges lead the pack in cyber security education SHARE Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy A computer lab at Walsh College in Troy Page 1 of 5

Walsh College in Troy This story is the third in a statewide series about cyber security and small businesses, supported by the Michigan Small Business Development Center. [Read the rest of the series here.] As our lives become more technologically connected, our sensitive information is increasingly at risk. Whether personal or business, networks are vulnerable to attacks every day. Fortunately for local small businesses, Michigan has been recognized as a state with serious cyber security credentials. Designated by the National Security Agency (NSA) as National Centers of Academic Excellence in Information Assurance, five Michigan colleges Walsh College, University of Detroit Mercy, Eastern Michigan University, Davenport University and Ferris State University are leading the pack when it comes providing students with tools they need to work in the burgeoning field of cyber security. The NSA and the Department of Homeland Security (DHS) jointly announced in 2009 that the Michigan colleges are among the first 44 institutions designated as NSA/DHS National Centers of Academic Excellence (CAE) in Information Assurance (IA)/Cyber Defense (CD). The updated criteria benefit not only the institution, but also students, employers and hiring managers throughout the nation. What this means for local small business owners is that they needn t seek information from across the country, or around the world, to keep themselves and their customers safe from cyber-attacks. Everything they need is right here in Michigan. Having the Internet of everything (IOE) When breaches do occur, whether on the personal level, or the business level, having a Page 2 of 5

contingency plan allows you to address them, says Dr. Pamela Imperato, the dean of Davenport University s College of Business Leadership. Davenport University received its designation in 2011. We do have the Internet of everything (IOE), and we really want people to participate in the new economy as much as it is important for companies to protect their networks, for us to provide those technical assurance, there s also that intended responsibilities for us as educators for us as community members and community members to not have people fear the new frontier. That s a profound and interesting challenge, she continues. Obtaining the NSA designation was part of rising to that challenge. Initially, the part of getting the designation was just to reinforce that our curriculum was on target with what our students needed to learn to work in the industry, says Professor Lonnie Decker, department chair of networking in College of Technology at Davenport. Since then, it s really become a part of us being part of the cyber defense community. With over 200 Centers of Academic Excellence designated by the NSA, Decker adds, they work together to advance the cyber security needs of the country. Part of the role of this community is to provide graduates, to fill these needs in private sectors as well as government. The biggest challenge, says Bob Clarkson, associate dean of the College of Business Leadership at Davenport, is ensuring that the curriculum is broad enough to cover all aspects of the industry. Risk security For Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy, the NSA designation is key to Michigan s success. Walsh was one of the first universities in Michigan to actually achieve that designation of a Center of Academic Excellence in Information Assurance, Ciaramitaro says. In 2013, the NSA tightened its requirements. What the NSA and the Department of Defense and Department of Homeland Security said was we no longer want to treat it as a silo, Ciaramitaro says. We want you to integrate these concepts into all of your courses. One of the things we did at Walsh was redesign our undergrad and graduate programs. In a way, that allowed us to fully integrate cyber security into all of our courses. Ciaramitaro says it s not just about data breaches anymore. It s about connectivity. Connected videos. Connected electric grids. Home alarms. Billions of devices are connected to the Internet, and what s alarming, he says, is that a majority of those devices have no security protection at all. What I think people don t realize is that connectivity is a playground for cyber criminals and Page 3 of 5

other types of malicious attacks, Ciaramitaro says. Some companies are signing up for cyber risk insurance, and that might seem attractive for small business owners, however there are things to be aware of. When you look for cyber risk insurance, make sure that you truly understand what is required, what is covered, what is excluded, Ciaramitaro says. Most cyber insurance companies want you to follow a certain set of what they would call best practices or controls. You have to be vigilant. Not just an IT issue The ISI (information security and intelligence) program at Ferris State in Big Rapids, was the first university program in the United States to receive Department of Defense Cyber Crime Center and Air Force Office of Special Investigations Center designation as a National Center of Digital Forensics Academic Excellence. You have to map to certain competencies, says Dr. Greg Gogolin, professor and program director for information and security at Ferris State. You ve got to show that the faculty is competent to deliver the curriculum. I thought that was an important step. You ve got to have a minimal number of points, and minimal number of points overall to be certified. It helps to ensure a level of quality. Overall, Gogolin finds that small businesses are not always prepared. And often, they re not looking at cyber security from the proper perspective. Within an organization, a lot of people view it as an IT issue, Gogolin says. Awareness is actually the number one challenge facing organizations in that everyday practices, most people don t understand the impact of a lack of good practices. You can really put a lot of time and effort into our security, but you re kind of at the mercy of other people or other organizations. Having a 'security mindset Eastern Michigan University (EMU) has been a Center of Excellence in Information Assurance Education since 2005. They recently re-designated under the new criteria (an updated version in 2015). It s important to our school because it gives confidence to our students and their parents and helps us recruit students, says Dr. Xiangdong Sean Che, assistant professor, CISSP, School of Information Security and Applied Computing. This branding is going to be a shining point in their resumes when they try to look for a job. Also, this designation is often a requirement for the school to apply for more research and educational grants. It s a big deal for everybody especially our students. Page 4 of 5

Che says that the designation is a group effort led by the school and fully supported by the faculty, staff, and administrators from all over the university. The university as a whole needs to comply with the NSA s information security standards and follow all the policies commanded by NSA. Small business owners need cyber awareness and should always be aware that no matter how small your business is, you can be a target, says Che. "It s all about having a security mindset," he adds. Many times, it s not the user s fault, but the software itself, says Che. In his experience, software developers should make their software more secure and less prone to malicious activities; however, many software companies will put productivity and profit before security and try to make money as fast as possible. This is an issue for the whole industry. They need to have a security mindset while they re thinking about money. Basic passwords such as 12345 are also part of the problem. Without a security mindset, your system might be compromised sooner or later, Che says. All in all, the efforts to secure Michigan s businesses particularly small businesses and employees have been robust, an evolving series of steps for the ultimate goal: protecting our sensitive data. The effect is cyclical. Institutions such as Walsh College, University of Detroit Mercy, Eastern Michigan University, Davenport University and Ferris State University are educating the cyber security experts of the future (and present). Bottom line: It doesn t matter what sector you work in, or how well you might safeguard your information. Everyone s at risk. Businesses are struggling to identify the threats when they come in, Ciaramitaro says. It s not if, it s when. This story is a part of a statewide series about cyber security and small businesses edited by Lauren Fay Carlson. Support for this series is provided by the Small Business Development Center, which has just launched a free online security assessment tool and resources atwww.smallbusinessbigthreat.com to help small businesses measure their cyber security preparedness. Page 5 of 5