Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.
News & Updates
The information in this section includes discussion of new attacks, technologies, or controversies of interest to the information assurance and security community. We encourage interactivity in the discussion and ask that you participate and that you share the link with anyone who may have something to contribute to the conversation. Send any suggestions for items to firstname.lastname@example.org or email@example.com
The Minnesota Schools IT student and alumni association is holding their February 2014 event in St. Paul on February 11th at 5:30. If you are interested in attending go to the URL below to register.
Emerging technologies and YOU! What does it mean to be an IT pro in 2014?
Featured Speaker is:
Ryan Carlson, Technology Evangelist and Co-President, The Nerdery
Register at: http://www.advanceitmn.org/blog
The ISC2 foundation offers a number of scholarships in the field of Information Assurance and Security. See the info at the link below if you are interested:
NIST has a proposal for a framework that public and private entities would follow in order to create a secure infrastructure. They are looking for comments so if you have an interest in how these rules turn out, I encourage you to get involved.
Bruce Schneier, creator of some of the earlier encryption methodologies, has posted an interesting discussion about changes needed to restore trust in the concept of encryption that has taken some hard hits lately.
Charlie McClain, one of our excellent faculty who teaches in the School of Technology recently participated in an ISC2 sponsored webinar. For those who missed it, here is a link to the recorded presentation.
ISC2 is offering a scholarship in IAS for those who have served in the military. Here is the criteria to qualify:
- Applicant Qualifications:
- Honorably discharged from one of the five branches of the United States Military
(Supply copy of DD214 short form)
- End service date must be between 7/1/2008 and 7/1/2013
- Worked at any of the following levels: IAT I, IAT II, or IAM I. (Note: holding a certification within those levels does not prohibit an applicant from applying for this program. This program is designed to assist returning service people to “train up” to the SSCP, CISSP, CAP or CSSLP certifications)
3a. Performed 5 or more of the tasks listed on the attached spreadsheet as part of their
3b. All 5 tasks do not have to be within the same technical level
- Possess work experience as required by the certification the applicant is seeking (attach resume: see specific instructions in F1 of application)
- Submit to a background check if awarded a U.S.A. Cyber Warrior Scholarship
- Must complete education and exam no later than 12 months from the time the scholarship is awarded at the end of October 2013.
If you meet the criteria and are interested, you can apply at:
Interesting article on Skype privacy and security – do those of you who use Skype have risk management strategies that they can recommend?
The push towards moving the healthcare industry conversion to electronic collection and storage of health encounter data has increased concern for the potential impact on patient privacy. This has generated increased interest by various healthcare stakeholders in providing input to the overall federal efforts on cybersecurity.