Universities Are Stepping Up Training For More Front-Line Workers

If you recall the Colonial Pipeline cyber-attack in 2021 that targeted the network’s digital systems, it wreaked havoc on consumers, gas prices, airline travel, and commerce throughout the country. The breach of this critical infrastructure, consisting of 5,500 miles of pipeline that moved oil from the Gulf of Mexico throughout much of the Northeast, was considered a national security threat. For good reason.

It was so worrisome, in fact, that President Joe Biden declared a National State of Emergency. The federal government’s three-letter agencies - the FBI, Department of Homeland Security, Department of Homeland Security, among others - were notified and private security firms were dispatched so that Colonial Pipeline could regain control of its systems. But not before a ransom was paid.

Sadly, cyber-attacks are increasingly on the rise and showing no signs of slowing – and they are costing industry trillions of dollars -- $10.5 trillion by 2025, by some estimates. Over 353 million people were affected by data compromises in 2023, according to Statista. In real terms - or damages closer to your own wallet – financial losses can range from thousands of dollars to tens of thousands.  

Banks. Hospitals. Water systems. Infrastructure. They are all vulnerable. We are all vulnerable in a myriad of ways against looming threats of phishing scams, malware attacks, and hacks designed to create chaos and cause great disruptions in our lives.

You don’t need to be a rocket scientist to know that cybersecurity is essential in a digital age, but every company, government entity, organization, and individual needs protection. We need front-line cyber-defenders the same way we need emergency responders like police officers, firefighters, nurses, and military personnel. If recent history has taught us anything, cyber defense is a national security matter that hits incredibly close to home.

Why? Because the threats are growing from state-sponsored groups, organized syndicates, and cyber-crooks who are using it as a tool of warfare, terror, political destabilization, and outright theft. New threats created by artificial intelligence and deepfake technologies will only exacerbate the challenges.

For these reasons, the demand for such jobs is on the rise. Cybersecurity jobs will grow by 32 percent through 2032, or 16,800 jobs, according to the U.S. Bureau of Labor Statistics, with more than half a million job openings in recent years.

At Pace University, where I am the dean of the Seidenberg School of Computer Science and Information Systems, we partner with the federal government on a program that provides scholarships to students in exchange for post-graduate service. It’s called CyberCorps®: Scholarship for Service, and it’s somewhat modeled like the U.S. Military Academies where students earn a bachelor’s or master’s (or both) with the help of scholarships, they then go on to work for the government, often in security agencies.

We aren’t alone in training cyber-warriors. Pace is joined by the likes of Rochester Institute of Technology, Northeastern, New York University, Carnegie Mellon, Drexel University, The Citadel, Penn State, and many others throughout the country, all of whom partner with the federal government to fortify our armies that protect our digital and critical infrastructure. At Pace’s Pleasantville campus, we recently opened a Cyber Range, or what I like to call a CIA-style war room where faculty teach our students the ins-and-outs of identifying, defending, and mitigating cyber-attacks in a simulated setting. In real time. Under real pressure. It’s as hands-on and experiential as education gets.

Recently, students were engaged in an exercise where hackers were trying to breach a dam by jamming up the IT systems that controlled water release. On a series of screens and dashboard appeared coding loaded with clues – invisible to a layperson - that cyber-predators were looking for system vulnerabilities. The task for our students was to shore up the systems.

All of this may sound like a Tom Clancy plot with international intrigue and espionage. In many ways, it is. But the challenges we face are not fiction: Cybersecurity is not a luxury. It is essential for fortifying our digital landscape and infrastructure  and securing our global security.

Dr. Jonathan Hill is Dean of the Seidenberg School of Computer Science and Information Systems at Pace University

Imge: Ideogram

You Might Also Read: 

British University Data Breaches Are A Lesson For All:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Lost Vital Data
The Changing Role Of The CISO  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.