News & Updates

The information in this section includes discussion of new attacks, technologies, or controversies of interest to the information assurance and security community. We encourage interactivity in the discussion and ask that you participate and that you share the link with anyone who may have something to contribute to the conversation. Send any suggestions for items to mbrown@capella.edu or sbrown@capella.edu

(ISC)2 webinar – From the Trenches: BYOD Program Deployments

Posted on by jacquiolson

(ISC)2 webinar – From the Trenches: BYOD Program Deployments

Capella employee, Matt Pellowski, is participating as a speaker in this roundtable discussion.
 
DATE: April 10th
TIME: 12:00 PM Central

Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you in partnership with Capella University.
 
(ISC)2 members can earn a free Continuing Professional Education (CPE) credit.
 
Registration link – https://www.brighttalk.com/webcast/5385/106149
 
An on-demand recording will also be available after the live event has occurred.

Tags: , , ,
Posted in Education, Event-News, Events, Events-News, News, Security, Training and Seminars | | 1 Comment

ISACA Webinar: Data-Driven Security – Using “Big Data” to protect the Enterprise

Posted on by jacquiolson

ISACA Webinar – Sponsored by Capella

DATE: March 27th
TIME: 11:00 Central
TITLE:  Data-Driven Security – Using “Big Data” to Protect the Enterprise                                                                     
SPEAKER: Pete Lindstrom, Principal, Spire Security, LLC
ABSTRACT: Data – big, small, or the perfect size for Goldilocks – is revolutionizing the way we think about security. For some, it provides a way to identify risky behavior or activity and react quickly, with an opportunity for fewer false positives. To others, it represents a change in paradigms as they shift from a preventive model to one that strives for resilience. In all cases, the term can be ambiguous or hollow as people miscommunicate with each other about their needs and interests.
 
This webcast will drill down into all of the different flavors of “big data.” It will identify the sources and types of data that may be brought to bear on problems, the outputs and actions that are possible with a big data program, and the steps needed to get to a robust, data-driven security program.
 
ISACA members can earn a free Continuing Professional Education (CPE) credit.
 
Here is the link to register for the event: http://www.isaca.org/Education/Online-Learning/Pages/Data-Driven-Security.aspx
 
An on-demand recording will also be available after the live event has occurred.

Posted in Education, Event-News, Events, Events-News, News, Security, Training and Seminars, Uncategorized | | Leave a comment

Capella University Announces New Grants and Savings of up to $13,725 for New Students

Posted on by jacquiolson

As part of its ongoing effort to make higher education more affordable, Capella is offering an updated series of grant opportunities for new students.

For prospective students affiliated with the military, Capella is offering a new grant of $10,000 for new students who enroll in any business or IT doctoral program by Sept. 8, 2014, and meet other requirements. In addition, new students who start their program between April and June of 2014, and pass their first course are eligible to receive a $4,000 Master’s in Information Systems and Technology Management Grant. Click here to view complete list of grants available.

NSA Job Openings

Posted on by Mary Brown

The National Security Agency (NSA) currently has a number of openings for full-time positions in all our mission areas. Students receiving degrees in Computer Science, Computer Engineering, Electrical Engineering, Software Engineering, Systems Engineering, or other Information Security and Cyber-related disciplines are encouraged to apply.

NSA’s Information Assurance Directorate (IAD) believes students from the NSA/DHS National Centers of Academic Excellence may be particularly interested in the following positions:

· 1043479 – Cyber National Mission Force Targeting Analyst
· 1041718 – Cyber National Mission Force Mitigation Analyst
· 1042292 – Trusted Engineering Solutions – Architecture and Engineering Development
· 1043394 – Software Project Manager
· 1043995 – Network System Engineer
· 1043482 – Network Vulnerability Analyst
· 1043477 – Information Assurance Fulltime Development Programs
· 1037523 – Information Assurance Professionals

Students may apply for these positions by visiting www.nsa.gov/careers and looking for the position numbers listed above.

Please Note:
- U.S. Citizenship is required for all applicants
- Reasonable accommodations will be provided to applicants with disabilities during the application and hiring process where appropriate.
- NSA is an equal opportunity employer and abides by applicable employment laws and regulations.

For questions concerning the application process, please contact NSA Recruitment & Staffing at:
1-866-NSA-HIRE (1-866-672-4473) or e-mail customercare@NSA.gov

*********************

Scholarship for Women Studying Information Security

Posted on by Mary Brown

 

Since 2011, ACSA has provided scholarships to women studying for their B.S. and M.S. degrees in fields relating to information security.  These $5000 to $10,000 scholarships provide assistance to women at formative stages of their careers.  With the addition of HP’s multi-year financial commitment to this program starting with the 2014-15 academic year, ACSA will be able to increase the number of scholarships, in turn helping to increase the number of women in the field.

Also new for the 2014-15 academic year, the Committee on the Status of Women in Computing Research (CRA-W), an arm of the Computing Research Alliance, is joining the SWSIS program.  CRA-W will participate in SWSIS publicity and in selecting scholarship winners through their extensive network of faculty members in the field.

Use the link below for more information about applying for the scholarship.

http://swsis.wordpress.com/applying-for-scholarships/

 

RSA conference controversy

Posted on by Mary Brown

The RSA conference, which has typically been one of the hottest security conferences held each year, has been embroiled in controversy since the Snowden revelation that RSA was working with the NSA to compromise some encryption functionality.  Some speakers chose to cancel their presentations and others decided to attend and protest as their response to these accusations.  Stephen Colbert addressed his reasons for choosing to show up and address the crowd.  If you are interested in his rather amusing, if a bit controversial, comments, see the link below.

http://www.cnn.com/2014/03/01/tech/colbert-rsa-keynote/index.html

 

 

CISSE – Call For Papers

Posted on by Mary Brown

The Colloquium for Information Systems Security Education has posted a call for papers to be submitted in relationship with their conference in San Diego in June. Paper submission deadline is March 15th, 2014. Details are in the link below:

http://us6.campaign-archive1.com/?=4f21661f1350898b24c6690f0&id=5014c96432&e=ee54fe0c58

NSA information security research paper competition

Posted on by Mary Brown

The NSA is holding a competition for authors of information security focused research papers. See the attached document for details. NSA_paper_compads-12.20

Intelligence Community Virtual Career Fair

Posted on by Mary Brown

On February 26, 2014, the Intelligence Community (IC) will be hosting a Virtual Career Fair. Those interested will be able to explore career opportunities, chat with recruiters and subject matter experts, and learn how to apply for job openings.

Participating IC Agencies include:
· Central Intelligence Agency (CIA)
· Federal Bureau of Investigation Language Services Section (FBI LSS)
· National Geospatial-Intelligence Agency (NGA)
· National Security Agency (NSA)
· National Virtual Translation Center (NVTC)
· Office of the Director of National Intelligence (ODNI)

For more information or to register for this event, please visit: http://www.icvirtualfair.com/.

NIST Framework 1.0 and Road Map

Posted on by Mary Brown

Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.

← Older posts