Universities Are Stepping Up Training For More Front-Line Workers

If you recall the Colonial Pipeline cyber-attack in 2021 that targeted the network’s digital systems, it wreaked havoc on consumers, gas prices, airline travel, and commerce throughout the country. The breach of this critical infrastructure, consisting of 5,500 miles of pipeline that moved oil from the Gulf of Mexico throughout much of the Northeast, was considered a national security threat. For good reason.

It was so worrisome, in fact, that President Joe Biden declared a National State of Emergency. The federal government’s three-letter agencies - the FBI, Department of Homeland Security, Department of Homeland Security, among others - were notified and private security firms were dispatched so that Colonial Pipeline could regain control of its systems. But not before a ransom was paid.

Sadly, cyber-attacks are increasingly on the rise and showing no signs of slowing – and they are costing industry trillions of dollars -- $10.5 trillion by 2025, by some estimates. Over 353 million people were affected by data compromises in 2023, according to Statista. In real terms - or damages closer to your own wallet – financial losses can range from thousands of dollars to tens of thousands.  

Banks. Hospitals. Water systems. Infrastructure. They are all vulnerable. We are all vulnerable in a myriad of ways against looming threats of phishing scams, malware attacks, and hacks designed to create chaos and cause great disruptions in our lives.

You don’t need to be a rocket scientist to know that cybersecurity is essential in a digital age, but every company, government entity, organization, and individual needs protection. We need front-line cyber-defenders the same way we need emergency responders like police officers, firefighters, nurses, and military personnel. If recent history has taught us anything, cyber defense is a national security matter that hits incredibly close to home.

Why? Because the threats are growing from state-sponsored groups, organized syndicates, and cyber-crooks who are using it as a tool of warfare, terror, political destabilization, and outright theft. New threats created by artificial intelligence and deepfake technologies will only exacerbate the challenges.

For these reasons, the demand for such jobs is on the rise. Cybersecurity jobs will grow by 32 percent through 2032, or 16,800 jobs, according to the U.S. Bureau of Labor Statistics, with more than half a million job openings in recent years.

At Pace University, where I am the dean of the Seidenberg School of Computer Science and Information Systems, we partner with the federal government on a program that provides scholarships to students in exchange for post-graduate service. It’s called CyberCorps®: Scholarship for Service, and it’s somewhat modeled like the U.S. Military Academies where students earn a bachelor’s or master’s (or both) with the help of scholarships, they then go on to work for the government, often in security agencies.

We aren’t alone in training cyber-warriors. Pace is joined by the likes of Rochester Institute of Technology, Northeastern, New York University, Carnegie Mellon, Drexel University, The Citadel, Penn State, and many others throughout the country, all of whom partner with the federal government to fortify our armies that protect our digital and critical infrastructure. At Pace’s Pleasantville campus, we recently opened a Cyber Range, or what I like to call a CIA-style war room where faculty teach our students the ins-and-outs of identifying, defending, and mitigating cyber-attacks in a simulated setting. In real time. Under real pressure. It’s as hands-on and experiential as education gets.

Recently, students were engaged in an exercise where hackers were trying to breach a dam by jamming up the IT systems that controlled water release. On a series of screens and dashboard appeared coding loaded with clues – invisible to a layperson - that cyber-predators were looking for system vulnerabilities. The task for our students was to shore up the systems.

All of this may sound like a Tom Clancy plot with international intrigue and espionage. In many ways, it is. But the challenges we face are not fiction: Cybersecurity is not a luxury. It is essential for fortifying our digital landscape and infrastructure  and securing our global security.

Dr. Jonathan Hill is Dean of the Seidenberg School of Computer Science and Information Systems at Pace University

Imge: Ideogram

You Might Also Read: 

British University Data Breaches Are A Lesson For All:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Lost Vital Data
The Changing Role Of The CISO  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.