News & Updates

The information in this section includes discussion of new attacks, technologies, or controversies of interest to the information assurance and security community. We encourage interactivity in the discussion and ask that you participate and that you share the link with anyone who may have something to contribute to the conversation. Send any suggestions for items to mbrown@capella.edu or sbrown@capella.edu

NIST Framework 1.0 and Road Map

Posted on by Mary Brown

Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.

Alumni Association February 2014 Event

Posted on by Mary Brown

The Minnesota Schools IT student and alumni association is holding their February 2014 event in St. Paul on February 11th at 5:30. If you are interested in attending go to the URL below to register.

Session Title:

Emerging technologies and YOU! What does it mean to be an IT pro in 2014?

Featured Speaker is:

Ryan Carlson, Technology Evangelist and Co-President, The Nerdery

Register at: http://www.advanceitmn.org/blog

ISC2 foundation scholarships

Posted on by Mary Brown

The ISC2 foundation offers a number of scholarships in the field of Information Assurance and Security. See the info at the link below if you are interested:

http://www.isc2cares.org/scholarships/

NIST proposes security infrastructure framework

Posted on by Mary Brown

NIST has a proposal for a framework that public and private entities would follow in order to create a secure infrastructure.  They are looking for comments so if you have an interest in how these rules turn out, I encourage you to get involved.

http://www.nist.gov/itl/cybersecurity-102213.cfm

 

Bruce Schneier on taking back the Internet

Posted on by Mary Brown

Bruce Schneier, creator of some of the earlier encryption methodologies, has posted an interesting discussion about changes needed to restore trust in the concept of encryption that has taken some hard hits lately.

http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying

 

Twin Cities ISC2 Chapter Get Together July 22nd

Posted on by Mary Brown
July 22: Social Get Together hosted by the Twin Cities Area (ISC)2 Chapter – 3pm at Hell’s Kitchen  which is located at 80 S 9th St in Mpls 55402

Info can be found on the chapter website: http://www.isc2tc.org/

Link to BrightTalk webinar on ‘Big Data’

Posted on by Mary Brown

Charlie McClain, one of our excellent faculty who teaches in the School of Technology recently participated in an ISC2 sponsored webinar.  For those who missed it, here is a link to the recorded presentation.

https://www.brighttalk.com/webcast/5385/72993

ISC2 Foundation IAS Scholarship for Military Learners

Posted on by Mary Brown

ISC2 is offering a scholarship in IAS for those who have served in the military.  Here is the criteria to qualify:

  • Applicant Qualifications:
  1. Honorably discharged from one of the five branches of the United States Military
    (Supply copy of DD214 short form)
  2. End service date must be between 7/1/2008 and 7/1/2013
  3. Worked at any of the following levels: IAT I, IAT II, or IAM I. (Note: holding a certification within those levels does not prohibit an applicant from applying for this program. This program is designed to assist returning service people to “train up” to the SSCP, CISSP, CAP or CSSLP certifications)
    3a. Performed 5 or more of the tasks listed on the attached spreadsheet as part of their
    military duties
    3b. All 5 tasks do not have to be within the same technical level
  4. Possess work experience as required by the certification the applicant is seeking (attach resume: see specific instructions in F1 of application)
  5. Submit to a background check if awarded a U.S.A. Cyber Warrior Scholarship
  6. Must complete education and exam no later than 12 months from the time the scholarship is awarded at the end of October 2013.

If you meet the criteria and are interested, you can apply at:

https://www.isc2cares.org/usa-cyber-warrior-scholarship/default.aspx

 

Security and Privacy Implications of Skype?

Posted on by Mary Brown

http://www.h-online.com/security/news/item/Skype-with-care-Microsoft-is-reading-everything-you-write-1862870.html

Interesting article on Skype privacy and security – do those of you who use Skype have risk management strategies that they can recommend?

Tags:
Posted in Security | | Leave a comment

Healthcare Participation in Federal Cyber Security Guidance

Posted on by Mary Brown

The push towards moving the healthcare industry conversion to electronic collection and storage of health encounter data has increased concern for the potential impact on patient privacy.  This has generated increased interest by various healthcare stakeholders in providing input to the overall federal efforts on cybersecurity.

http://www.hitechanswers.net/hitrust-offers-new-guidance-for-assessing-cyber-security-preparedness/

Posted in Security | | Leave a comment
← Older posts Newer posts →