The Contracting Education Academy

Contracting Academy Logo
  • Home
  • Training & Education
  • Services
  • Contact Us
You are here: Home / Archives for cyber

January 2, 2014 By AMK

Georgia Tech expands cyber security educational offerings into certificate program

Georgia Tech Professional Education (GTPE), in cooperation with the Georgia Tech Research Institute (GTRI), now offers a Cyber Security Certificate that offers participants a more in-depth approach, including a focus on policy-making, people issues and engineering frameworks for cyber security.

The five-course certificate is composed of one required course and four electives, and applies systems engineering principles to create a holistic approach to cyber security. Choosing from seven courses, participants can customize their certificate to give a unique focus to particular topics.

According to Terrye Schaetzel, director of Educational Outreach with GTRI, this course will help organizations move their cyber security efforts from a reactive approach to a predictive model.

“Cyber Security is not just an information technology (IT) function,” said Schaetzel, who works with GTRI’s Cyber Technology and Information Security Laboratory (CTISL). “It is becoming a core strategic function of any organization. This certificate and courses enable people to take a broader look at the whole picture of cyber security.”

Designed for technical professionals who lead cyber security efforts and aspire to be CISO’s (Chief Information Security Officers), the courses also enable participants to further develop critical thinking skills. Hands-on labs and exercises provide a deeper understanding of solutions to help counter increasing threats to cyber security.

Each course takes roughly three to four days, which allows for a relatively quick turnaround for the certificate. All requirements for the certificate must be completed within six years from the date of completion of the first course.

For more information, please visit: www.pe.gatech.edu/cybersecurity

Filed Under: Georgia Tech News Tagged With: cyber, cybersecurity, Georgia Tech, GTPE, GTRI, information technology, IT, professional development, technology

December 6, 2013 By AMK

Pentagon tightens cybersecurity rules for defense contractors

The Pentagon has approved new rules that would require defense contractors to tighten their computer security procedures and to report any cyber intrusions that resulted in the loss of controlled technical information.

An amendment to defense acquisition rules published on Nov. 18, 2013 would require defense contractors to incorporate established information security standards on their unclassified networks and to report any intrusions that result in loss of technical information on those networks, a Pentagon statement said.

The statement said the rules would apply to all new contracts that use or generate unclassified but valuable technical information, such as data concerning defense system requirements, designs, engineering, production and manufacturing capabilities.

Keep reading this article at: http://www.reuters.com/article/2013/11/19/us-usa-defense-cyber-idUSBRE9AI17O20131119 

Filed Under: Government Contracting News Tagged With: cyber, cybersecurity, defense contractors, DoD, intellectual property

November 11, 2013 By AMK

Georgia Tech warns of threats to cloud data storage and mobile devices in report of ‘emerging cyber threats’

As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.

These concerns are among findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today’s release of the Georgia Tech Emerging Cyber Threats Report for 2014. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.
“With recent revelations of data collection by the federal government, we will continue to see a focus on cloud security,” said Wenke Lee, director of GTISC. “But encryption in the cloud often impacts data accessibility and processing speed. So we are likely to see increased debate about the tradeoffs between security, functionality and efficiency.”

Encryption challenges were a focus at this year’s summit, which featured some of the nation’s top information security experts. These included keynote speaker Martin Hellman, professor emeritus at Stanford University and one of the inventors of public key cryptography, a way of securing communications without relying on pre-shared secrets.

In related findings, the report reveals security issues involving the “Internet of Things,” referring to the notion that the increase of Internet-capable devices could create opportunities remote hacking and data leakage. With everything from home automation to smartphones and other personal devices becoming connected to the Internet, these devices will capture more real-world information and could permit outside parties, companies, and governments to misuse that information.

In the mobile space, even though designers of mobile devices and tablets have developed a robust ecosystem to prevent large-scale device compromises, the report finds that the threat of malicious and potentially targeted use remains. Earlier this year, researchers at Georgia Tech reported that they found ways to bypass the vetting process of Apple’s App Store and subsequently showed how malicious USB chargers can be used to infect Apple iOS devices.

“No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cyber security a global issue for years to come,” said Bo Rotoloni, director of GTRI’s Cyber Technology and Information Security Laboratory (CTISL). “We must remain vigilant. The purpose of this Summit and Report is to raise awareness, create educational opportunities and maintain an ongoing dialogue among industry, academia and government.”

The Georgia Tech Cyber Security Summit is a forum for the IT security ecosystem to gather together, discuss and debate the evolving nature of cyber threats, and to chart the course for creating collaborative solutions.

In addition to Hellman’s keynote address, the 2013 Summit included a panel of security experts from Microsoft, Splunk, Dell Secureworks, Solera Networks and Georgia Tech.

The Georgia Institute of Technology is one of the nation’s leading public research universities and the home of cyber security research and education initiatives through GTISC, GTRI and other facilities across campus. These efforts focus on producing technology and innovations that help drive economic growth and improve daily life on a global scale.

The report is available for download at gtsecuritysummit.com.

Filed Under: Georgia Tech News Tagged With: cloud, cyber, cybersecurity, Georgia Tech, GTISC, GTRI, innovation, IT, research, technology

November 1, 2013 By AMK

Army cyber chief meets buyers In pursuit of faster acquisition

The Army’s top cyber commander, Lt. Gen. Edward Cardon, met with acquisition officials for several days last week eager to find ways to buy capabilities within three years or less.

Cardon told reporters at a roundtable here that he wanted to buy “faster, better, quicker” since the cyber realm doesn’t really allow for the seven to 10 years a standard acquisition program usually takes.

He noted the hierarchy of acquisition, with DARPA producing really cool stuff when it hits the sweet spot, standard acquisition doing what it does, rapid equipping filling in combat gaps and in-house projects.

One of the difficulties with figuring out just what works best now is that Army Cyber Command and its equivalents are very new and are still not generating many requirements. “We have to, because that’s what drives the system,” he said.

On other fronts, Cardon says Army Secretary John McHugh is “very close” to making a final decision on establishment of an Army cyber center of excellence (approved in July by Army Chief of Staff Gen. Ray Odierno). The center, likely based at Fort Gordon, Ga., would be the one place where all Army cyber warriors received their training.

Keep reading this article at: http://breakingdefense.com/2013/10/22/army-cyber-chief-meets-buyers-in-pursuit-of-faster-acquisition

Filed Under: Government Contracting News Tagged With: acquisition strategy, acquisition workforce, Army, cyber, DARPA, procurement reform

February 15, 2012 By AMK

Air Force cyber chief: Speed up acquisitions already

Gen. William Shelton, commander of the Air Force Space Command, engaged Tuesday in what he called a “soapbox rant” to decry the military’s Industrial Age approach to acquiring cyber capabilities. He was speaking at a symposium sponsored by the Rocky Mountain chapter of the Armed Forces Communications and Electronics Association, an industry group.

Shelton, who oversees Air Force space and cyberspace operations, said the Defense Department acquires cyber capabilities the same way it buys aircraft or satellites — a process that can take years, while new developments in computer hardware and software can happen in days or months. “I am frustrated by the lack of speed,” in cyber acquisitions, Shelton told an audience of more than 1,000 people at the symposium.

The current cyber acquisition system threatens the military’s cyber mission. He said the Electronic Systems Center at Hanscom Air Force Base, Mass., which manages acquisition of information technology and cyber systems for the service, has started to develop capabilities to fill technology gaps “within hours or weeks,” but he did not provide any details.

The Air Force also must develop better situational awareness of potential threats in cyberspace because “we can’t defend [against] what we can’t see,” Shelton said, and dependence on networks has made them an attractive target for attackers.

Protecting those networks means the Air Force needs to move from a purely defensive posture to develop more resilient networks that can automatically reroute traffic when they come under attack, he added.

The Air Force requires technically trained personnel to handle its cyber mission and Shelton said the continuing lack of science, technology, engineering and math students who are U.S. citizens has created a “national security issue.” He proposed various incentives, including changes to the G.I. Bill, to boost the number of graduates in those critical fields.

Incentives may not help the Air Force meet its requirements, as Nextgov reported Monday that only 3 percent of science, technology, engineering and math students plan to work for the federal government.

by Bob Brewin – NextGov – Feb. 8, 2012 at http://www.nextgov.com/nextgov/ng_20120208_8266.php?oref=rss.

Filed Under: Government Contracting News Tagged With: acquisition strategy, acquisition workforce, Air Force, cyber, DoD, national security

  • « Previous Page
  • 1
  • …
  • 9
  • 10
  • 11

Popular Topics

abuse acquisition reform acquisition strategy acquisition training acquisition workforce Air Force Army AT&L bid protest budget budget cuts competition cybersecurity DAU DFARS DHS DoD DOJ FAR fraud GAO Georgia Tech GSA GSA Schedule GSA Schedules IG industrial base information technology innovation IT Justice Dept. Navy NDAA OFPP OMB OTA Pentagon procurement reform protest SBA sequestration small business spending technology VA
Contracting Academy Logo
75 Fifth Street, NW, Suite 300
Atlanta, GA 30308
info@ContractingAcademy.gatech.edu
Phone: 404-894-6109
Fax: 404-410-6885

RSS Twitter

Search this Website

Copyright © 2021 · Georgia Tech - Enterprise Innovation Institute