The NSA is holding a competition for authors of information security focused research papers. See the attached document for details. NSA_paper_compads-12.20
News & Updates
The information in this section includes discussion of new attacks, technologies, or controversies of interest to the information assurance and security community. We encourage interactivity in the discussion and ask that you participate and that you share the link with anyone who may have something to contribute to the conversation. Send any suggestions for items to email@example.com or firstname.lastname@example.org
On February 26, 2014, the Intelligence Community (IC) will be hosting a Virtual Career Fair. Those interested will be able to explore career opportunities, chat with recruiters and subject matter experts, and learn how to apply for job openings.
Participating IC Agencies include:
· Central Intelligence Agency (CIA)
· Federal Bureau of Investigation Language Services Section (FBI LSS)
· National Geospatial-Intelligence Agency (NGA)
· National Security Agency (NSA)
· National Virtual Translation Center (NVTC)
· Office of the Director of National Intelligence (ODNI)
For more information or to register for this event, please visit: http://www.icvirtualfair.com/.
Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.
The Minnesota Schools IT student and alumni association is holding their February 2014 event in St. Paul on February 11th at 5:30. If you are interested in attending go to the URL below to register.
Emerging technologies and YOU! What does it mean to be an IT pro in 2014?
Featured Speaker is:
Ryan Carlson, Technology Evangelist and Co-President, The Nerdery
Register at: http://www.advanceitmn.org/blog
The ISC2 foundation offers a number of scholarships in the field of Information Assurance and Security. See the info at the link below if you are interested:
NIST has a proposal for a framework that public and private entities would follow in order to create a secure infrastructure. They are looking for comments so if you have an interest in how these rules turn out, I encourage you to get involved.
Bruce Schneier, creator of some of the earlier encryption methodologies, has posted an interesting discussion about changes needed to restore trust in the concept of encryption that has taken some hard hits lately.
Charlie McClain, one of our excellent faculty who teaches in the School of Technology recently participated in an ISC2 sponsored webinar. For those who missed it, here is a link to the recorded presentation.
ISC2 is offering a scholarship in IAS for those who have served in the military. Here is the criteria to qualify:
- Applicant Qualifications:
- Honorably discharged from one of the five branches of the United States Military
(Supply copy of DD214 short form)
- End service date must be between 7/1/2008 and 7/1/2013
- Worked at any of the following levels: IAT I, IAT II, or IAM I. (Note: holding a certification within those levels does not prohibit an applicant from applying for this program. This program is designed to assist returning service people to “train up” to the SSCP, CISSP, CAP or CSSLP certifications)
3a. Performed 5 or more of the tasks listed on the attached spreadsheet as part of their
3b. All 5 tasks do not have to be within the same technical level
- Possess work experience as required by the certification the applicant is seeking (attach resume: see specific instructions in F1 of application)
- Submit to a background check if awarded a U.S.A. Cyber Warrior Scholarship
- Must complete education and exam no later than 12 months from the time the scholarship is awarded at the end of October 2013.
If you meet the criteria and are interested, you can apply at: