Coast Guard Academy Creates New Cybersystems Program

The US Coast Guard Academy is now offering an academic program in cyber systems, its first new major  initiative in a quarter century.

The program beginning this fall reflects the maritime service's evolution toward conducting operations in cyberspace as it does at sea and by air, said Capt. Lee Petty, chief of the Coast Guard's Office of Cyberspace Forces in Washington.

"This is a new domain and we're approaching it in a similar vein as we do in these physical domains," Petty said.

The academy in New London is opening a cyber lab with dedicated servers, a new laboratory and a specially designed classroom to support the program. Kurt Colella, the academy's dean of academics, said the program will incorporate elements of fields including policy, law, ethics, operating systems, software design and intelligence.

Cadets attend the academy tuition-free and graduate as Coast Guard officers with a bachelor of science degree and a requirement to spend five years in the service. Nearly 300 students enroll annually.

The new academic program is the first since the addition of mechanical engineering as a major in 1993.

Last year was the first time that new graduates from the academy were assigned to the Coast Guard's cyber command. Some graduates who major in cyber systems will report to the same command, while others will report to the fleet, Petty said.

The academy also has a cyber team that participates in competitions among service academies organized by the National Security Agency. It operates as a club sports team.

A Coast Guard Cyber Strategy issued in 2015 identified strategic priorities of defending cyberspace by protecting the service's information technology networks, enabling operations by applying cyber knowledge to its traditional missions and protecting infrastructure that's critical to maritime transportation systems.

KVEO.com:

You Might Also Read:

Cybersecurity At Sea:

Maritime Cybersecurity: No Substitute for Testing:

 

« Breakthrough Technologies To Combat Insider Threats
Russia Will Keep Up Cyber Attacks For Geo-Political Influence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Firedome

Firedome

Firedome's tailormade solution for IoT companies is designed to proactively prevent, detect, and respond to inevitable vulnerabilities in connected devices.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.