Coast Guard Academy Creates New Cybersystems Program

The US Coast Guard Academy is now offering an academic program in cyber systems, its first new major  initiative in a quarter century.

The program beginning this fall reflects the maritime service's evolution toward conducting operations in cyberspace as it does at sea and by air, said Capt. Lee Petty, chief of the Coast Guard's Office of Cyberspace Forces in Washington.

"This is a new domain and we're approaching it in a similar vein as we do in these physical domains," Petty said.

The academy in New London is opening a cyber lab with dedicated servers, a new laboratory and a specially designed classroom to support the program. Kurt Colella, the academy's dean of academics, said the program will incorporate elements of fields including policy, law, ethics, operating systems, software design and intelligence.

Cadets attend the academy tuition-free and graduate as Coast Guard officers with a bachelor of science degree and a requirement to spend five years in the service. Nearly 300 students enroll annually.

The new academic program is the first since the addition of mechanical engineering as a major in 1993.

Last year was the first time that new graduates from the academy were assigned to the Coast Guard's cyber command. Some graduates who major in cyber systems will report to the same command, while others will report to the fleet, Petty said.

The academy also has a cyber team that participates in competitions among service academies organized by the National Security Agency. It operates as a club sports team.

A Coast Guard Cyber Strategy issued in 2015 identified strategic priorities of defending cyberspace by protecting the service's information technology networks, enabling operations by applying cyber knowledge to its traditional missions and protecting infrastructure that's critical to maritime transportation systems.

KVEO.com:

You Might Also Read:

Cybersecurity At Sea:

Maritime Cybersecurity: No Substitute for Testing:

 

« Breakthrough Technologies To Combat Insider Threats
Russia Will Keep Up Cyber Attacks For Geo-Political Influence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies