|
|
|
Welcome to the NICE eNewsletter
Welcome! My name is Thomas Hayes and I am a Summer Undergraduate Research Fellow at NIST. I just completed my sophomore year studying Information Systems at the University of North Georgia. My major tightly binds business fundamentals with cyber technology. Cybersecurity is an interesting element of this union. Today, the business world is driven by an information economy which can only prosper with adequate cybersecurity in place. Information Systems studies, with its business and cyber foundation, is more than capable of answering this challenge. The featured article in this quarter’s eNewsletter, Happy 20th Anniversary CAE Program–A Look Back Over the Years, highlights the 270 colleges across the nation designated by the National Security Agency and Department of Homeland Security as a National Center of Academic Excellence (CAE) in Cyber Defense Education. I am fortunate that my university is one of them. A university’s CAE certification ensures that students learn vital knowledge and skills necessary to be effective in cybersecurity. The CAE designation also offers a bachelor’s degree in cybersecurity in addition to a graduate certificate in cybersecurity, which I plan to obtain. I encourage everyone to read and learn more about the programs history in addition to reading the other informative articles on cybersecurity!
|
Thomas Hayes NIST Summer Undergraduate Research Fellow, NICE University of North Georgia
|
|
|
Happy 20th Anniversary CAE Program – A Look Back Over the Years
by Jill Curcio, Events Coordinator, Centers of Academic Excellence in Cyber Defense (CAE-CD) Program Management Office
In 1999, the National Security Agency (NSA) launched a program under which U.S. colleges and universities could be granted a designation known as the Center of Academic Excellence in Information Assurance Education. This program, now known as the Centers of Academic Excellence in Cyber Defense, is celebrating its 20th anniversary!
In May 1999, NSA designated seven institutions as centers of academic excellence: James Madison University, George Mason University, Idaho State University, Iowa State University, Purdue University, University of California at Davis, and the University of Idaho were instrumental in developing information assurance (now cyber) curriculum in its infancy. Textbooks had yet to be written on the topic, so these first seven schools formed a bond and shared resources to begin building a community that has grown to over 270 schools across the country. Read More
|
|
|
|
NICE Framework in Focus |
|
|
|
|
A profile of a cybersecurity practitioner to illustrate application of the NICE Cybersecurity Workforce Framework categories, specialty areas, and work roles.
|
|
CATEGORY: Securely Provision
Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.
|
|
NAME: Tim Nordvedt
TITLE: Cyber Tools Delivery Analyst
ORGANIZATION: Booz Allen Hamilton
SPECIALTY AREA: Technology Research and Development
WORK ROLE: Research and Development Specialist
ACADEMIC DEGREES: Network Security Administration Certificate, Howard Community College; Enrolled in a bachelors degree program (cloud and system administration), Western Governors University
CERTIFICATIONS: GIAC Cyber Security Certification (GSEC); GIAC Certified Incident Handler (GCIH); CompTIA A+; CompTIA Network+; CompTIA Security+; CompTIA Cloud Essentials; CompTIA IT Project+; CompTIA Linux+; Certified Internet Web Professional (CIW) Site Development Associate; and Information Technology Infrastructure Library (ITIL) Foundation Certification for IT Service Management
|
|
|
|
|
NICE Spotlight On |
|
|
CyberPatriot Competition: Tips From the Experts
by Allen Stubblefield, Cyber Defense Teacher and Coach, and Team Troy Tech Support, Troy High School, Fullerton, CA
What do Science Olympiad, Odyssey of the Mind, First Robotics, and CyberPatriot have in common? All are national STEM competitions that encourage students to think critically, develop problem solving, and teamwork skills. These rigorous competitions expand student knowledge in many fields which they may want to pursue in college or as a career. The grueling path to qualify for the national CyberPatriot competition is long and labor-intensive. To make it to the finals is exciting enough; to have multiple teams qualify, and win, year after year is phenomenal. Read More
|
Patient Safety and Cyber Safety: A Shared Responsibility of Healthcare Providers and Security Professionals
By Greg Garcia, Executive Director for Cybersecurity, Healthcare Sector Coordinating Council; and Brandyn Blunt, Sr. Clinical Engineering System Administrator, THCE Medical Equipment Technology and Compliance
There is perhaps no public service whose potential disruption through cyber corruption is felt more viscerally than in healthcare, where hacking the network can put patient safety in jeopardy. The healthcare sector is acutely aware that its cybersecurity readiness requires an all-hands-on-deck collaboration to address the biggest cybersecurity challenges facing it. Read More
|
Workforce Needs to Address the Comprehensive Range of Risks to Individual Privacy
By Ellen Nadeau, Deputy Manager, Privacy Framework, NIST
As organizations increasingly grapple with the challenges of privacy and technology, there’s a growing need for a diverse and well-trained privacy workforce. The National Institute of Standards and Technology (NIST) is currently developing the voluntary Privacy Framework: A Tool for Enterprise Risk Management—and workforce needs are an important part of the discussions. Read More
|
|
|
|
The National CyberWatch Center is looking for subject matter experts for its Information Security Fundamentals Curriculum Standards Panel.
|
|
The NICE Challenge Project now has over 100 unique challenges, including 4 new challenges in the Protect & Defend Work Role.
|
|
The Workforce Management Subgroup has recently created a project team to focus on mapping the guidebook they released last year to the NICE Cybersecurity Workforce Framework.
|
|
|
Subscribe
Sign up here to continue to receive this complimentary eNewsletter.
|
|