Coast Guard Academy Creates New Cybersystems Program

The US Coast Guard Academy is now offering an academic program in cyber systems, its first new major  initiative in a quarter century.

The program beginning this fall reflects the maritime service's evolution toward conducting operations in cyberspace as it does at sea and by air, said Capt. Lee Petty, chief of the Coast Guard's Office of Cyberspace Forces in Washington.

"This is a new domain and we're approaching it in a similar vein as we do in these physical domains," Petty said.

The academy in New London is opening a cyber lab with dedicated servers, a new laboratory and a specially designed classroom to support the program. Kurt Colella, the academy's dean of academics, said the program will incorporate elements of fields including policy, law, ethics, operating systems, software design and intelligence.

Cadets attend the academy tuition-free and graduate as Coast Guard officers with a bachelor of science degree and a requirement to spend five years in the service. Nearly 300 students enroll annually.

The new academic program is the first since the addition of mechanical engineering as a major in 1993.

Last year was the first time that new graduates from the academy were assigned to the Coast Guard's cyber command. Some graduates who major in cyber systems will report to the same command, while others will report to the fleet, Petty said.

The academy also has a cyber team that participates in competitions among service academies organized by the National Security Agency. It operates as a club sports team.

A Coast Guard Cyber Strategy issued in 2015 identified strategic priorities of defending cyberspace by protecting the service's information technology networks, enabling operations by applying cyber knowledge to its traditional missions and protecting infrastructure that's critical to maritime transportation systems.

KVEO.com:

You Might Also Read:

Cybersecurity At Sea:

Maritime Cybersecurity: No Substitute for Testing:

 

« Breakthrough Technologies To Combat Insider Threats
Russia Will Keep Up Cyber Attacks For Geo-Political Influence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.