Universities Are Stepping Up Training For More Front-Line Workers

If you recall the Colonial Pipeline cyber-attack in 2021 that targeted the network’s digital systems, it wreaked havoc on consumers, gas prices, airline travel, and commerce throughout the country. The breach of this critical infrastructure, consisting of 5,500 miles of pipeline that moved oil from the Gulf of Mexico throughout much of the Northeast, was considered a national security threat. For good reason.

It was so worrisome, in fact, that President Joe Biden declared a National State of Emergency. The federal government’s three-letter agencies - the FBI, Department of Homeland Security, Department of Homeland Security, among others - were notified and private security firms were dispatched so that Colonial Pipeline could regain control of its systems. But not before a ransom was paid.

Sadly, cyber-attacks are increasingly on the rise and showing no signs of slowing – and they are costing industry trillions of dollars -- $10.5 trillion by 2025, by some estimates. Over 353 million people were affected by data compromises in 2023, according to Statista. In real terms - or damages closer to your own wallet – financial losses can range from thousands of dollars to tens of thousands.  

Banks. Hospitals. Water systems. Infrastructure. They are all vulnerable. We are all vulnerable in a myriad of ways against looming threats of phishing scams, malware attacks, and hacks designed to create chaos and cause great disruptions in our lives.

You don’t need to be a rocket scientist to know that cybersecurity is essential in a digital age, but every company, government entity, organization, and individual needs protection. We need front-line cyber-defenders the same way we need emergency responders like police officers, firefighters, nurses, and military personnel. If recent history has taught us anything, cyber defense is a national security matter that hits incredibly close to home.

Why? Because the threats are growing from state-sponsored groups, organized syndicates, and cyber-crooks who are using it as a tool of warfare, terror, political destabilization, and outright theft. New threats created by artificial intelligence and deepfake technologies will only exacerbate the challenges.

For these reasons, the demand for such jobs is on the rise. Cybersecurity jobs will grow by 32 percent through 2032, or 16,800 jobs, according to the U.S. Bureau of Labor Statistics, with more than half a million job openings in recent years.

At Pace University, where I am the dean of the Seidenberg School of Computer Science and Information Systems, we partner with the federal government on a program that provides scholarships to students in exchange for post-graduate service. It’s called CyberCorps®: Scholarship for Service, and it’s somewhat modeled like the U.S. Military Academies where students earn a bachelor’s or master’s (or both) with the help of scholarships, they then go on to work for the government, often in security agencies.

We aren’t alone in training cyber-warriors. Pace is joined by the likes of Rochester Institute of Technology, Northeastern, New York University, Carnegie Mellon, Drexel University, The Citadel, Penn State, and many others throughout the country, all of whom partner with the federal government to fortify our armies that protect our digital and critical infrastructure. At Pace’s Pleasantville campus, we recently opened a Cyber Range, or what I like to call a CIA-style war room where faculty teach our students the ins-and-outs of identifying, defending, and mitigating cyber-attacks in a simulated setting. In real time. Under real pressure. It’s as hands-on and experiential as education gets.

Recently, students were engaged in an exercise where hackers were trying to breach a dam by jamming up the IT systems that controlled water release. On a series of screens and dashboard appeared coding loaded with clues – invisible to a layperson - that cyber-predators were looking for system vulnerabilities. The task for our students was to shore up the systems.

All of this may sound like a Tom Clancy plot with international intrigue and espionage. In many ways, it is. But the challenges we face are not fiction: Cybersecurity is not a luxury. It is essential for fortifying our digital landscape and infrastructure  and securing our global security.

Dr. Jonathan Hill is Dean of the Seidenberg School of Computer Science and Information Systems at Pace University

Imge: Ideogram

You Might Also Read: 

British University Data Breaches Are A Lesson For All:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Lost Vital Data
The Changing Role Of The CISO  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

National Initiative for Cybersecurity Education (NICE) - USA

National Initiative for Cybersecurity Education (NICE) - USA

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.