SlideShare a Scribd company logo
MAGAZINE
TOP CYBER NEWS
NOVEMBER EDITION
HOW CAPITOL TECHNOLOGY UNIVERSITY DEVELOPS THE TALENT AND CONFIDENCE OF ITS STUDENTS,
ENABLING THEM TO USE THEIR EDUCATION FOR ENGINEERING AMAZING CAREER TRAJECTORIES
PRESIDENT, CAPITOL
TECHNOLOGY UNIVERSITY
MOST INFLUENTIAL
EDUCATIONAL LEADER
BY THE EDUCATION MAGAZINE
PRACTICAL EDUCATION
TAUGHT BY INDUSTRY EXPERTS
Dr. BRADFORD SIMS
THE
WINNING STRATEGY
FOR CYBERSECURITY
EXCLUSIVE ARTICLE BY
MATTHEW
ROSENQUIST
“Education has always been a profit-enabler for
individuals and the corporation. Education, both
conception and delivery, must evolve quickly and
radically to keep pace with digital transition.
Education is a part of the digital equation.”
~ Stéphane NAPPO
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 2
About Dr. Bradford SIMS
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 3
Dr. Bradford L. Sims became Capitol Technology University's eighth
president on June 1, 2017. An educator, administrator and construction
project manager, Dr. Sims has extensive experience both in academia and
industry.
Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from
Purdue University, which is also his undergraduate alma mater; he
received his B.S. in Building Construction Management there in 1990.
He also holds a master's of science degree in Building Construction from
the University of Florida. He is a member of the Sigma Lambda Chi
International Construction Honor Society and the American Institute of
Contractors, among many other honors and professional affiliations.
The Education Magazine has selected Dr. Bradford Sims one of the 10
Most Influential Educational Leaders of 2021. He leads Capitol
Technology University with an education laser-focused on STEM or
Management of STEM careers which uniquely positions students for top
roles in the region's booming tech hub.
4
Learn
Build
Succeed
Capitol Technology University is
a private university in South Laurel
Maryland near Washington DC.
The university was founded in 1927
as the Capitol Radio Engineering
Institute by a former US
Navy Radioman. CREI changed its
name to Capitol Institute of
Technology in 1964, changed its
name again to Capitol College in
1987, and assumed its present name
in 2014.
Capitol offers undergraduate and
graduate programs specializing in
engineering, computer science,
information technology, and business.
It is classified among "Special Focus
Institutions-Schools of Engineering“
and is a National Center of Academic
Excellence in Informa tion
Assurance Education.
Capitol
Technology University,
through its Department of Computer
Science, provides degree programs in the
concentration areas of Computer Science,
Artificial Intelligence and Data Science, at
each of the bachelors, masters and doctoral
levels of study.
Capitol Technology University is part of
the job-rich pipeline supplying human
capital to America’s most technologically
advanced government agencies and their
private sector supply chains.
Capitol Tech provides a launch pad to a
better life. It’s because we’re laser-focused
on STEM careers and give students the
hands-on, real-world experience they need
to enter today’s tech job market.
About
the University
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
Education
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 5
GREAT CAREERS
Focused on STEM
CREATING
BUILDING
6
Join our IBM Power Webinar:
Protect your data from core to cloud with IBM Power10
November 17th
, 14:00 CET
Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks alone
are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that the rate of
detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic, forcing companies to
find solutions or be ready to face long recovery times (an average of 23 days), huge costs (more than $4 million per
incident), as well as the loss of customer confidence and satisfaction.
This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation:
persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10 server is
the most secure and reliable in its class, with the Power10 processor-based systems further extending the industry-
leading security and reliability of the Power platform, and adding a special focus on protecting applications and data
in hybrid cloud environments.
Power10 introduces significant innovations along four major dimensions:
✓ Advanced Data Protection
✓ Platform Security
✓ Security Innovation for Modern Threats
✓ Integrated Security Management
Join our experts on Wednesday, November 17th
, to discuss about security challenges and cyber-resilience
strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with no
impact on performance.
Meet our experts:
Register now ➔
Sylvia Scheerová
Director
Cognitive Systems
IBM EMEA
Dimitrios Pendarakis
Distinguished Engineer
Chief Security Engineer
Cognitive Systems
Thomas Harrer
Distinguished Engineer
CTO, Servers & Storage
IBM EMEA
Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks
alone are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that
the rate of detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic,
forcing companies to find solutions or be ready to face long recovery times (an average of 23 days), huge costs
(more than $4 million per incident), as well as the loss of customer confidence and satisfaction.
This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation:
persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10
server is the most secure and reliable in its class, with the Power10 processor-based systems further
extending the industry-leading security and reliability of the Power platform, and adding a special focus on
protecting applications and data in hybrid cloud environments.
Power10 introduces significant innovations along four major dimensions:
✓ Advanced Data Protection
✓ Platform Security
✓ Security Innovation for Modern Threats
✓ Integrated Security Management
Join our experts on Wednesday, November 17th, to discuss about security challenges and cyber-resilience
strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with
no impact on performance.
Meet our experts:
Sylvia Scheerová
Director
Cognitive Systems
IBM EMEA
Dimitrios Pendarakis
Distinguished Engineer
Chief Security Engineer
Cognitive Systems
Thomas Harrer
Distinguished Engineer
CTO, Servers & Storage
IBM EMEA
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
https://event.on24.com/wcc/r/3498648/CC63274212B8BC230FD407CEC5E76FD1
When the Internet was still the
ARPANET it was a relatively closed
system used for research
communication by Universities and
research laboratories.
This changed in the 80s when
commercial used began to expand and
laid the foundation for the Internet we
use today. But while communication
and collaboration has always been a
core tenet of networking, security
wasn’t.
There were warnings like the Morris
worm in the 80s and warez hacks and
phishing of AOL accounts in the 90s,
but it wasn’t until the turn of the
century that network and information
security became a high visibility
priority for most organizations. Many
were simply too trusting - thinking the
technology was so advanced that it
simply couldn’t be attacked.
This was not the case. In the mid-90s it
wasn’t uncommon to hear people
pontificate that (cyber)security will be
solved in a few years. Decades later,
security is sadly, not solved, yet the
reason to secure systems is greater
than ever.
As technology has entered every aspect
of our lives: software and the cloud
power our cars, light up our homes and
towns, and enable doctors to collaborate
across the globe to develop vaccines at
previously unthinkable of speeds.
NATO considers cyberspace as a
military domain and most major
governments have cybersecurity chiefs.
The rapid growth of technology change
has been powered by widespread cloud
adoption, the “shift left” mindset, and
application deployment agility via
containerization.
IaaS enables us to spin up new
workloads and servers quickly, while
the low code/no code revolution allows
us to knit together services to create
innovative workloads.
“Have we solved security?
Unfortunately not - but security
professionals, have been a critical
part of the reason that technology
has been able to grow to where it
is today. Without security, we can’t
benefit from advanced techno-
logy.”
Have we solved security?
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 7
Editorial by Diana Kelley
Co-Founder and CTO of SecurityCurve
Diana KELLEY
Co-Founder & CTO
at SecurityCurve.
Former Global
Executive Security
Advisor at IBM and Cybersecurity Field
CTO at Microsoft. Founding Board
Member & CTO at Sightline Security.
The host of BrightTALK’s The (Security)
Balancing Act. Diana Kelley’s security
career spans over 30 years.
Focused on STEM since its inception in 1927, Capitol Technology University
has developed a robust, practical, and award-winning cybersecurity program
for students at all levels to learn the skills necessary to become industry
Leaders.
Capitol Tech, located in Laurel, Maryland, is home to nationally recognized
cybersecurity degrees, with SC Media naming the university’s cybersecurity
program as the 2020 Best Cybersecurity Program and the Chair of
Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator.
“This year with COVID-19 has been truly challenging for the nation, our
families, students, faculty, and employers. My fellow finalists all worked extra
hard this year to make sure that our students did not experience the “knowledge
gap” or a “lost year” that they could not afford during the pandemic,” said Dr.
Butler. “Capitol Tech has answered the call to deliver excellent hands-on
cybersecurity education for over 20 years and this individual award actually
recognizes excellence in our students, faculty, staff, alumni and our leadership
as a whole.”
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
Practical Education
Taught By Industry Experts
8
Author: Dr. Bradford Sims
‘The education of the next generation of Cyber experts
must start now’, include all those that have historically
been limited to be part of this defence of our ways of life.
~ Dr. Ian McAndrew
Since 2003, the Department of Homeland Security (DHS) and the National
Security Agency (NSA) also recognized the program as a Center of Academic
Excellence in Cyber-Defense, and in 2021 the university was selected by the
NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university
will mentor hundreds of institutions offering cybersecurity programs across 14
states and the District of Columbia to develop or enhance their cybersecurity
programs.
This new title allows Capitol Tech to continue mentoring other universities in
cyber program creation in addition to opportunities the preexisting CAE
designation afforded the university. These include being selected by the NSA to
supplement their development program for new security engineers with
master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars,
and by the National Science Foundation (NSF) for two major multi-year grants
to address the shortage of cybersecurity professionals.
Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 9
Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are
immersed in a hands-on education led by industry experts to learn in-demand
skills. Undergraduate students learn UNIX O/S, C programming, networking,
virtual machines, vulnerability scanning, packet capture and analysis, and
password cracking during their first semester.
When combined with the aforementioned skills and the ability to earn
Security+, Certified Ethical Hacker, and Forensics certifications during their
time at Capitol Tech, most undergrad students are employable by their junior
year. Master's students learn advanced topics including cyberlaw, penetration
testing, forensics, vulnerability mitigation, and participate in a risk assessment
capstone.
This year, Capitol added cyber data analytics to address the growing need for
cyber analysts. Doctoral students learn skills necessary to succeed in
challenging careers such as security researcher and chief cyber strategist. This
year the university also addressed a huge gap by introducing a new PhD in
cybersecurity leadership. Kierra Jiles, a 2017 graduate of the Bachelor’s in
Cyber and Information Security program, fulfilled her seventh-grade self’s
dream when she landed the job of Site Reliability Engineer at Microsoft using
her previous experience in software and computer engineering for government
agencies including the U.S. Department of State, NASA, and the CIA.
“All the tools we used in our cybersecurity courses were relevant to what we’d
be doing in the real world,” says Jiles. “I’m still constantly getting job
interviews and opportunities even when I’m not looking. It’s nice to have that
job security—to know I’m still wanted in the career force and that’s strictly
because of my degree and the skills that my Capitol Tech education provided
me with.”
Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 10
Kierra Jiles, a 2017 graduate of the
Bachelor’s in Cyber and Information
Security program, fulfilled her
seventh-grade self’s dream when she
landed the job of Site Reliability
Engineer at Microsoft using her
previous experience in software and
computer engineering for
government agencies including the
U.S. Department of State, NASA,
and the CIA.
Author: Dr. Bradford Sims
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 11
Capitol Tech’s hands-on education provides students the unique ability to learn
and work in a variety of labs dedicated to cyber, forensics, identity
credentialing, Internet of Things, quantum computing, and security operations.
Through labs, sponsored projects, and clubs, students can work across
disciplines simulating real-world work environments. For example, cyber and
engineering students can collaboratively build and program robots for
competitions.
Undergraduate students can also participate in the National Security Scholars
Program which provides scholarships, paid internships in the defense and
intelligence industry, and assistance with obtaining a national security
clearance. Current and prospective graduate students benefit from direct access
to internal and external industry experts through two free STEM-focused
webinar series launched this year for working professionals.
These webinars, one of which was a collaboration with the NSA and several
Maryland community colleges led by Capitol Tech, serve as industry
introductions, Q&A sessions, and networking opportunities.
Capitol Tech’s dedication to providing students with a practical education
taught by industry experts has allowed the university to become a leader in
cybersecurity education. Coupled with the university’s many professional
partnerships, students at Capitol Tech are able to find lucrative careers that are
both personally fulfilling and meaningful to their field of interest.
If you are interested in pursuing an undergraduate or graduate degree at Capitol
Technology University
visit www.captechu.edu
or email admissions@captechu.edu
Interview with
Dr. Ian McAndrew
Dean of Doctoral Programs at Capitol Technology University
“Research can be both lonely and rewarding. I would encourage research in
areas that are of interest to the researcher and not that which is currently
popular. Any research of note is not going to happen overnight and your
interest will keep you dedicated.
~ Dr. Ian McAndrew, Dean of Doctoral Programs at Capitol Technology University
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 12
This interview is courtesy of Joe Fields,
Head of Influencer Marketing at Onalytica.com
“We are at the start of a long road”
[Joe Fields] Who is Ian McAndrew?
[Dr. Ian McAndrew] I am a Mechanical
Engineer by background, my qualifications
are a Bachelor's, Master's and a PhD as a
chartered engineer. Then I also did another
degree and qualified as an electrical engineer.
I carried on and did some more research at
Doctorate level and became a fellow of the
Royal Aeronautical Society. I’ve probably
become an over educated person who is best
left in academia rather than the real world.
I worked for the car industry initially, I used
to design car engines. Then I worked at the
University of Hertfordshire in England where
I spent 15-20 years. I then started to work for
Embry-Riddle Aeronautical University
worldwide where I spent 10 years. After that
I transferred to Capital Technology
University in America. I used to work for the
current president of the University I'm at
now, and when he transferred, he asked me to
come and work for him at his university.
Now although it’s an American University
with a campus, I am based in Europe and live
in Europe but I travel there lot. I tend to chair
about a dozen conferences all over the world
each year as an academic expert and a
professor. Now I dedicate my time to
working with doctoral students and I'm the
Dean of doctoral programs at the university.
[Joe Fields] How did you become an expert
in your key topics?
[Dr. Ian McAndrew] Well, it was never
planned it just sort of happened. I think a lot
of it was just committed work, research and
carrying on and eventually you find yourself
in a position of valedictory in that you’re
almost there without thinking about it.
I went to work at a University, involved in
thermodynamics, and then I took over the
aerodynamic area, and then got more and
more involved in aviation. It never really
became a plan, it was life drifting me along.
You get to a stage in academia where you’ve
been there for quite a few years and I
suppose you automatically inherit the title
“expert”. I have over 80 successful PhD
students in my life in my career of
supervising them. I have more than I’m
currently supervising, and it’s the main focus
of what I do and it’s a delight working with
people at that particular level.
[Joe Fields] What topic areas are you most
passionate about?
[Dr. Ian McAndrew] Numerical problem
solving is really something that I enjoy, that’s
what I find a nice mental challenge.
Where there’s a problem this lends itself to
research, solving numerical problems coming
up with answers for unknown areas. Then I
would tag on to that, working with students
and helping them achieve their goals and
becoming educated and successful in their
chosen areas. I have had over 80 PhD
successes and I get just as much of a thrill
out of my current PhD students’ passing as I
did the very first person passing.
That is something which stays with me and
it’s a wonderful part of my job that I’m
helping people achieve what is really for
most people a very, very high level that often
they don’t expect to achieve, because it’s a
sort of the plateau in academia. It’s delightful
to see that and when someone’s completed it
you can say congratulations Doctor.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 13
Interview with Dr. Ian McAndrew
“We are at the start of a long road”
“Knowledge is power. Information is liberating. Education is the premise of
progress, in every society, in every family.”
~ Kofi A. Annan
[Joe Fields] Which influencers influence
you within those key topics?
[Dr. Ian McAndrew] Well, I have to say, I
go back, and this is probably giving my age
away now. Sir Barnes Wallace to me was the
greatest engineer of the 20th century. As a
very young boy, I managed to meet him once
with my Grandfather that knew him. Barnes
Wallace, for those who are not familiar, is
probably most famous for designed the
bouncing bomb for the Dambusters raid. If
you look at his history however, he was also
the person that came up with the material
science for swing wing aircraft, he designed
the R101 Airships. He designed the
Wellington bomber. He designed the largest
non-nuclear bomb that existed up until a
couple of years ago when the Americans
dropped that super bomb in Afghanistan. It’s
amazing the legacy of what that man did
technically in the face of adversity. People
didn’t believe some of his innovative ideas,
but he followed them all the way through.
The bouncing bomb is an example of an
engineer with an innovation that, if they are
committed, they can achieve what they want.
He had a quote in life, and I like this so much
that I put this on the cover page of my first
doctorate which was “The whole joy of life is
in battle – not winning” and I think that’s
very true. If your follow that through to
reading a book for example, if you find a
good book that you are reading, it’s a
disappointment when you get to the end, and
you think now I’ve got to find another good
book. We can apply that to so much of our
life. It’s about enjoying what we’re doing and
not necessarily getting to the endpoint but
enjoying the route as you’re getting there. So
he is the person who is most influential in my
area.
[Joe Fields] Outside of your key topics who
else influences you?
[Dr. Ian McAndrew] I have to say it’s my
grandfather, what an amazing man. He used
to say “you have to look back to enjoy where
you’re going, because you have to see how
far you’ve come”. If you’re trying to learn
something, if you’re trying to solve
something, you can look at it and you can
think to yourself, I’m nowhere near the end.
With my career, you look back and you
realize I’ve come a long way and I’ve done
all that. My grandfather was influential like
that, you should be satisfied with what
you’ve got. For those of us that are in
education we are very, very lucky as we get
to disseminate information and help the next
generation.
Just as we have been successful in our
generations, we’ve done that because we’ve
had people mentoring us, believing in us and
supporting us to achieve those ends. What a
wonderful legacy at the end of your life that
you say you’ve put back more than you’ve
taken out, and you’ve helped a lot of people
achieve their goals. There are people that
I’ve worked with that have gone on to have
very successful careers and achievements
because of their qualifications, and they’re
making the world better through science,
technology and their manipulation of how
organisations work to make the world better
and that’s a great thing.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 14
Interview with Dr. Ian McAndrew
“The mindset of continuous learning is really important as the number one
skillset for our teachers learning how to teach and for our students learning
how to learn. And that’s the mindset we’ve got to get into the curriculum
today.” ~ Robert E. Moritz, Global Chairman of PwC
[Joe Fields] How would you describe your
offline influence?
[Dr. Ian McAndrew] I’ve had the fortune to
travel a lot, I’ve been to over 85 countries in
my life and I think travel is educational, it’s
enlightening and it gives you reason and
logic. If you look at various continents,
cultures and styles of work and how they
work, this gives you an understanding of how
people work, and indeed what is important to
them.
I would have to say my influences are the
people in the world. It’s always a pleasure to
meet people and most people have something
you can learn from them. They have an
experience, a story, knowledge or something
that they’ve done which they want to share
with you that you wouldn’t necessarily want
to repeat, because it didn’t work. Lots of
people have used the phrase “history repeats
itself”, if we don’t learn from mistakes then
we’re not improving. Other people can help
you learn from their mistakes if you listen. I
think there are two types of silences in the
world, when people are listening to the words
you’re saying, and when they’re waiting for
you to stop talking so they may talk again.
The less you say the more you see and you
listen to people around you and there is a
wealth of information to be gained on
various different levels. Then again being
able to disseminate to other people is great.
[Joe Fields] If a brand wanted to work with
you, what activities would you be most
interested in partnering with them on?
[Dr. Ian McAndrew] What I’m really
interested in is numerical problem solving. I
like solving problems. I like finding a
solution to something. I like having a
problem to solve and whether it takes
minutes, hours or even years. That’s what I
really enjoy doing,
Working with a big brand for the sake of it
I’d find rather boring. I’m not interested in
the glory and the fun side of it, I’m interested
in the detail side of it, the innovation side and
thinking up novel ways of working with
things. If I had a chance to work with any
brand on innovation and new ways of doing
things, that is something that I would find
fascinating.
[Joe Fields] What’s your best source of
information for getting ahead of a story?
[Dr. Ian McAndrew] I think by spending
your life reading, gathering information and
being observant gives you a wonderful
foundation. Sometimes a little bit of
information based on what you already
know, gives you a catapult to get to the next
level.
We’re often working in pigeonholes now.
You’re a mechanical engineer, you’re a
marketing expert, you’re finance expert,
you’re a medical person. We don’t integrate
those disciplines enough. and I think that is
where we can push forward. The best source
of information is where we share
information.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 15
Interview with Dr. Ian McAndrew
“Anyone starting out to research for a doctorate degree should remember
that hours of self centered work has the ability to be the spark for others to
progress. All research is potentially useful to open doors or show others that
door does not lead anywhere useful. Advancements happen by building on
others research.” ~ Dr. Ian R. McAndrew
[Dr. Ian McAndrew] There’s a phrase that
we use in engineering called “technology
transfer”, how do we take that knowledge
that I have and give it to other people? We
have universities, education and
qualifications, but how do we capture that
knowledge in industry? If someone said what
would you pass on to your children? You’d
come up with a list, and if you looked at it a
week later, you’d come up with more
information then you constantly add to it.
You can never truly disseminate that
information. If we think about what the best
source of information is, it’s the world, it’s
the people around us, it’s collecting all that
information and integrating it together. We
talk about this as analytics now, and we talk
about analytics as a new science that is
emerging and that never existed before. It
exists in a way now that it’s never existed
before because technology allows us to
process things faster, but we don’t always
know what processing.
There’s a lovely clip in the movie Jurassic
Park with Dr. Ian Malcolm, the chaos theory
expert where he came up with this phrase
“Instead of asking, can we do it? We should
ask first of all, should we do it?” I think
that’s what we have to ask with technology
now, with analytics and with everything else.
Should we be doing this? First thinking about
the ethical side of some of these things we
are doing and then considering how can we
do this?
[Joe Fields] What brands have you
worked with?
[Dr. Ian McAndrew] I’ve worked with some
several major brands in the aviation industry,
some big airline carriers like BA, Virgin,
Iceland Air and Lufthansa at different stages.
I’ve also worked with various militaries such
as the US Air Force and the RAF and other
things at times in my life. I’ve worked for a
lot of companies that wouldn’t be identified
immediately with brands because they’re
very specialist small companies that do very
small work for bigger companies.
[Joe Fields] Which non-paid activities
would you be keen to take part in if the
opportunity raised your profile or
delivered value to your audience?
[Dr. Ian McAndrew] I have to say I
wouldn’t really take part in a non-paid
activity to raise my profile, I think if you do
non-paid activity it should be for the benefit
of society. We should be doing things to help
the community without any payback.
I have to say I wouldn’t really take part in a
non-paid activity to raise my profile, I think
if you do non-paid activity it should be for
the benefit of society. We should be doing
things to help the community without any
payback. I’m a Director and Chair on several
UK charities that sponsor students to be able
to go to university, and I’m involved with a
couple of other little educational charities. I
don’t get paid for it. I don’t do it for money, I
don’t do it for fame or fortune, I do it
because I think in this busy overcrowded
world we should put back things into society.
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 16
Interview with Dr. Ian McAndrew
[Dr. Ian McAndrew] Even little things like putting in a pound coin in a collection box for a
worthy cause, to actually giving up time. Even walking down the street and picking up a piece
of litter and putting it in the bin. If we all put something into society, if we all put something
into where we work and live without taking any credit for it, then we’re all going to live and
work in a better world. We can go back to John F. Kennedy’s quote “Ask not what your country
can do for you, but what you can do for your country” and that’s an important thing that is as
relevant today as ever, and perhaps even more so, at this particular time. People going out and
panic buying, it doesn’t help everyone. We are all in one big society and should be coming
together.
Direct Link:
https://onalytica.com/blog/posts/interview-ian-mcandrew/
More about Dr. Ian McAndrew:
https://www.captechu.edu/blog/interview-dr-ian-mcandrew-dean-of-doctoral-programs
“We are at the start of a long road – although Capitol has a rich history, it is only recently
that we became a university, and we are growing. That’s an exciting place to be. We’re
headed in the right direction and we have an excellent team that is committed to moving us
forward. While on campus, I am always struck by the enthusiasm of people – administrators,
faculty, staff, and students. Whenever I have had a question or needed assistance with
something, people were ready to help. There is a willingness to step up to the plate that you
don’t always encounter at other institutions. It is exciting to work among people who are
committed to the university’s mission and its future.”
~ Dr. Ian McAndrew
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 17
Interview with Dr. Ian McAndrew
Doctoral Programs ranging from Cybersecurity, Analytics, Artificial Intelligence and Technology based at
the Capitol Technology University. Native of England and living in London, Dr. McAndrew is a Fellow of
the Royal Aeronautical Society, an editor of seven international journals and the Chair of 5 international
conferences. Author of six books, conference, and journal publications of 71 over 30 years. Extensive
consultancy experience internationally for multi-nations and organisations. An external examiner on the
worldwide stage (UK, USA, Germany, Italy, Jordan, Japan, Australia, Greece and Kenya).
Keynote speaker on the international stage and experienced external examiner, Dr. McAndrew has delivered
Keynote speeches in over 40 countries around the world. Has supervised 130 students to their doctoral
completion in the USA and all over the world.
Holding An internationally recognized leader in research and expert on low-
speed flight, Dr. McAndrew has five degrees: a PhD, two master’s degrees and
two bachelor’s degrees. He started his career in the automotive industry as an
engine designer and has worked at several universities across the globe. An
extraordinarily academic with immense experience within industry, highly
qualified internationally recognised researcher with extensive teaching
experience at all levels of education, Dean of Doctoral Programs at Capitol
Technology University, Professor Dr. Ian R. McAndrew FRAeS, is leading a
doctorate program in excess of 350 students globally (Taught in over 50
countries as a research, consultant and trainer), being responsible for 23 different
There comes a time when data needs to be shared—whether to evaluate a matter for
research purposes, to test the functionality of a new application, or for an infinite number
of other business purposes. To protect the sensitivity or confidentiality of shared data, it
often needs to be sanitized before it can be distributed and analyzed.
A popular and effective method for sanitizing data is called data anonymization. Also
known as data masking, data cleansing, data obfuscation or data scrambling, data
anonymization is the process of replacing the contents of identifiable fields (such as IP
addresses, usernames, Social Security numbers and zip codes) in a database so records
cannot be associated with a specific individual, project, or company. Unlike the concept of
confidentiality, which often means the subjects’ identities are known but will be protected
by the person evaluating the data, in anonymization, the evaluator does not know the
subjects’ identities. Thus, the anonymization process allows for the dissemination of
detailed data, which permits usage by various entities while providing some level of
privacy for sensitive information.
Data anonymization techniques: There are several data anonymization techniques
that can be used, including data encryption, substitution, shuffling, number or date
variance, and nulling out specific fields or data sets. Data encryption is an anonymization
technique that replaces sensitive data with encrypted data. The process provides effective
data confidentiality, but also transforms data into an unreadable format. For example, once
data encryption is applied to the fields containing usernames, "JohnDoe" may become
"@Gek1ds%#$". Data encryption is suitable from an anonymization perspective, but it’s
often not as suitable for practical use. Other business requirements such as data input
validation or application testing may require a specific data type—such as numbers, cost,
dates, or salary—and when the encrypted data is used, it may appear to be the wrong data
type to the system trying to use it.
Substitution consists of replacing the contents of a database column with data from a
predefined list of factious but similar data types so it cannot be traced to the original
subject. Shuffling is like substitution, except the anonymized data is derived from the
column itself. Both methods have their pros and cons, depending on the size of the
database in use. For example, in the substitution process, the integrity of the information
remains intact (unlike the information resulting from the encryption process). But
substitution can pose a challenge if the records consist of a million usernames that require
substitution. An effective substitution requires a list that is equal to or longer than the
amount of data that requires substitution.
Data Anonymization
A Comparison of Techniques
Author: Dr. Kellep A. CHARLES
“The next Freud will be a data scientist. The next Marx will be a data scientist. The next
Salk might very well be a data scientist.“ ~ Seth Stephens-Davidowitz
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 18
In the shuffling process, the integrity of the data also remains intact and is easy to obtain,
since data is derived from the existing column itself. But shuffling can be an issue if the
number of records is small. Number and date variance are useful data anonymization
techniques for numeric and date columns. The algorithm involves modifying each value in
a column by some random percentage of its real value to significantly alter the data to an
untraceable point.
Nulling out consists of simply removing sensitive data by deleting it from the shared data
set. While this is a simple technique, it may not be suitable if an evaluation needs to be
performed on the data or the fictitious form of the data. For example, it would be difficult to
query customer accounts if vital information such as customer name, address and other
contact details are null values.
Data anonymization tools: I have often used anonymization when working with
various IT vendors for troubleshooting purposes. Data generated from log servers, for
example, cannot be distributed in its original format, so instead traceable information is
anonymized using log management software. By initiating the anonymize function in the
software, I can protect data in our logs, replacing identifying data such as usernames, IP
addresses, domain names, etc. with fictional values that maintain the same word length and
data type. For example, a variable originally defined as “user=johndoe@mysite.com” will
get converted into “user=oranges@uphill.com”. This allows us to share log data with our
vendors without revealing confidential or personal information from our network.
Some interesting tools in the data anonymization space are Anonymous Data by Urban
Software and Anonimatron, which is available on SourceForge.net. Both tools are freeware
and can run on a Windows-based platform, while Anonimatron can also operate on Linux
and Apple OSX systems. In addition, I have worked with many IT security professionals
who prefer to create custom scripts against files to anonymize their data. Whatever your
choice for data anonymization, the goal remains the same: to anonymize sensitive
information. Although these anonymization techniques and tools do not fully guarantee
anonymity in all situations, they provide an effective process to protect personal
information and assist in preserving privacy. With the growing need to share data for
research purposes and the legal implications involved if due diligence is not properly
conducted when releasing information, many organizations are now discovering the
necessity and the benefits of data anonymization.
by Dr. Kellep A. CHARLES
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 19
over 20 years of industry experience in the areas of incident response, computer forensics, security
assessments, malware analyst and security operations. Dr. Charles is the creator of SecurityOrb.com (at
SecurityOrb), an information security & privacy knowledge-based blogsite designed for information
security related users.
Dr. Kellep A. Charles obtained a Doctor of Science in Cybersecurity from
Capitol Technology University. He also holds a Master of Science in
Telecommunication Management from the University of Maryland
University College and a Bachelor of Science in Computer Science from
North Carolina Agriculture and Technical State University. Dr. Charles
works as a government contractor in the Washington, DC area as a
Network Security Analyst and is an Adjunct Professor at Capitol
Technology University in Laurel Maryland where he teaches in the
Computer Science department and holds a CISSP certification. Kellep has
BRING
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 20
BEGINS
CYBERSECURITY STRATEGY
THE BOARDROOM
CISO
your
CISO
INTO
About Matthew ROSENQUIST
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 21
Matthew Rosenquist is the Chief
Information Security Officer (CISO) for
Eclipz, the former Cybersecurity Strategist
for Intel Corp, and benefits from 30
diverse years in the fields of cyber,
physical, and information security. Mr.
Rosenquist specializes in security strategy,
measuring value, developing best
practices for cost-effective capabilities,
and establishing organizations that deliver
optimal levels of cybersecurity, privacy,
ethics, and safety. As a cybersecurity strategist, he identifies emerging risks and
opportunities to help organizations balance threats, costs, and usability factors to
achieve the desired level of security.
Mr. Rosenquist is very active in the industry. He is an experienced keynote
speaker, collaborates with industry partners to tackle pressing problems, and has
published acclaimed articles, white papers, blogs, and videos on a wide range of
cybersecurity topics. Mr. Rosenquist is a member of multiple advisory boards,
consults on best-practices and emerging risks to academic, business, and
government audiences across the globe.
Currently, Mr. Rosenquist is the CISO for Eclipz, a company that provides
innovatively elegant means to establish highly secure Point-to-Point encrypted
tunnels on untrusted endpoints over insecure networks. Independently, he
partners with several firms to provide advisement on cyber-ethics, cybersecurity
strategy, and human resource acquisition in the highly competitive cybersecurity
industry. As a member of multiple Advisory Boards, he helps shape and
implement new technology, security innovation, standards, and guides academic
institutions in preparing the next generation of cybersecurity leaders.
Establishing and maintaining a cybersecurity capability is a daunting endeavor. Leadership
is the key.
Cybersecurity is a difficult, complex, and convoluted struggle that will continue to
challenge the fortitude of digital technology. It is not a short-term tactical exercise, but
rather a long-term engagement that opposes highly skilled, motivated, and intelligent
adversaries who see to undermine value and trust. To maintain an advantage in keeping
the digital world secure, strategic planning is required.
“We manage security through either leadership or crisis. In the
absence of leadership, we are left with crisis.”
For over 30 years I have worked in the fields of cyber, information, and physical security
to build lasting organizations that can effectively predict and interdict attacks. It is an
exercise that must take into account the attackers, their motivations, methods, and target
selection processes as it relates to the vulnerabilities of the assets being protected.
It is easy to do security poorly, but extremely difficult to do it well consistently. It requires
a diversity of people, tools, and processes that are applied in just the right manner. The
challenge requires leadership to both establish a long-lasting well-architected program and
keep it current with the ever-evolving threats.
The winning strategy is to pursue an optimal balance of cyber risk with clear objectives
and acceptance of tradeoffs that support the overarching goals of the organization. The
desired equilibrium is achieved by managing risks, costs, and usability friction that
accompanies security controls.
Experienced organizational leadership can make sense of the chaos, communicate in ways
that align and garner support, plan, and maneuver capabilities to predict, prevent, detect,
and respond to cyber threats. Establishing clear goals, implementing operational functions,
and instituting supporting behaviors within an agile framework are crucial for adapting to
evolving risks.
Highly skilled talent and tools are not enough. They must be crafted into an overall
capability aligned to when, how, and where attackers will strike.
The Winning Strategy
for Cybersecurity
Author: Matthew ROSENQUIST
“Cybersecurity strategy begins with the CISO himself.”
~ Michel CAZENAVE
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 22
The Winning Strategy for Cybersecurity
To prepare a perfect meal requires more than just having the right ingredients and
cookware. A capable chef is needed. The same is true with cybersecurity. Insights,
discipline, communication, and management skills are essential to build a risk management
program that meets the needs of an organization. Such defenses are not static as
cybersecurity goals are continuously evolving to protect the security, privacy, and safety of
digital ecosystems through a combination of adaptive technology, processes, and behaviors.
The single greatest factor for successfully navigating these challenges is the presence of
expert leadership.
“Leadership is key in organizing resources to achieve and maintain an
optimal level of security value.”
Cybersecurity is difficult. It becomes exponentially more problematic when someone who
lacks the necessary mentality or skills comes in and makes it profoundly worse. Cleaning
up an ineffective legacy security program is painful, expensive, and time consuming.
Simultaneously, a poor risk posture opens the door to more attacks and greater impacts until
a capable security program is instituted. We must understand that cybersecurity, like many
other highly specialized roles, requires a depth of insight and experience to lead. I will echo
Sun Tzu’s “…do what is great while it is small” and recommend putting a good leader in
place the first time to build an effective and sustainable cybersecurity organization.
“Let’s all break the silence and openly discuss the cycle of poor
cybersecurity leadership, for everyone’s benefit.”
For more insights on the challenges and required strategic deliverables, read Matthew
Rosenquist’s post Cybersecurity Fails Without Strategy. Interested in more insights,
rants, industry news and experiences? Follow Matthew Rosenquist on Steemit and
LinkedIn for insights and what is going on in cybersecurity.
MATTHEW ROSENQUIST, PUBLISHED/QUOTED IN MEDIA & PERIODICALS
by Matthew ROSENQUIST
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 23
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 24
25
25
Editor-In-Chief
TOP CYBER
NEWS
MAGAZINE
and
RAISE THE
CYBERSECURITY
CURTAIN!
Ludmila Morozova-Buss
Cybersecurity
Woman “Influencer” of the
Year 2020
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 25
MAGAZINE
TOP CYBER NEWS
CYBER FOR GOOD
We communicate
Technology, Innovation, and Cybersecurity
TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 26
“Education as a sector has changed
dramatically over the last decade,
and will continue to change.”
“Fewer students pursue education purely
for the joy of learning or the promise of
transformation of thinking. Many more
students seek a direct connection between
their learning and their career objectives.
Capitol Tech is well-situated to meet the
goals of both today’s students and today’s
industry.”
“…a solid education that enables students
of all ages to obtain a great career and
take care of themselves and their
families.”
“Focused on STEM since its inception in
1927, Capitol Technology University has
developed a robust, practical, and award-
winning cybersecurity program for
students at all levels to learn the skills
necessary to become industry Leaders.”
Dr. BRADFORD SIMS, FRAeS,
President, Capitol Technology University

More Related Content

Similar to Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
Dominic Vogel
 
CCS_AnnualReport_2014
CCS_AnnualReport_2014CCS_AnnualReport_2014
CCS_AnnualReport_2014
Cort Egan
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
Insights success media and technology pvt ltd
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
EY
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
James Nesbitt
 
The Most Influential Leaders in Cyber Security, 2023.pdf
The Most Influential Leaders in Cyber Security, 2023.pdfThe Most Influential Leaders in Cyber Security, 2023.pdf
The Most Influential Leaders in Cyber Security, 2023.pdf
CIO Look Magazine
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
Sutedjo Tjahjadi
 
reStartEvents TS/SCI & Above Employer Directory 3/31
reStartEvents TS/SCI & Above Employer Directory 3/31reStartEvents TS/SCI & Above Employer Directory 3/31
reStartEvents TS/SCI & Above Employer Directory 3/31
Ken Fuller
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
Merry D'souza
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
ARIV4
 
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdfreStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
Ken Fuller
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
Estuate, Inc.
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
Dale Butler
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
cVidya Networks
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
Insights success media and technology pvt ltd
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
caesar92
 

Similar to Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
CCS_AnnualReport_2014
CCS_AnnualReport_2014CCS_AnnualReport_2014
CCS_AnnualReport_2014
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
The Most Influential Leaders in Cyber Security, 2023.pdf
The Most Influential Leaders in Cyber Security, 2023.pdfThe Most Influential Leaders in Cyber Security, 2023.pdf
The Most Influential Leaders in Cyber Security, 2023.pdf
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
reStartEvents TS/SCI & Above Employer Directory 3/31
reStartEvents TS/SCI & Above Employer Directory 3/31reStartEvents TS/SCI & Above Employer Directory 3/31
reStartEvents TS/SCI & Above Employer Directory 3/31
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdfreStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 8/25 Nationwide All-Clearances Employer Directory.pdf
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 

More from TopCyberNewsMAGAZINE

Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
TopCyberNewsMAGAZINE
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
TopCyberNewsMAGAZINE
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBE
TopCyberNewsMAGAZINE
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE
 
Top Cyber News Magazine. Stewart Skomra
Top Cyber News Magazine. Stewart Skomra Top Cyber News Magazine. Stewart Skomra
Top Cyber News Magazine. Stewart Skomra
TopCyberNewsMAGAZINE
 
Top Cyber News Magazine. Carmen Marsh
Top Cyber News Magazine. Carmen MarshTop Cyber News Magazine. Carmen Marsh
Top Cyber News Magazine. Carmen Marsh
TopCyberNewsMAGAZINE
 

More from TopCyberNewsMAGAZINE (8)

Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBE
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Top Cyber News Magazine. Stewart Skomra
Top Cyber News Magazine. Stewart Skomra Top Cyber News Magazine. Stewart Skomra
Top Cyber News Magazine. Stewart Skomra
 
Top Cyber News Magazine. Carmen Marsh
Top Cyber News Magazine. Carmen MarshTop Cyber News Magazine. Carmen Marsh
Top Cyber News Magazine. Carmen Marsh
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University

  • 1. MAGAZINE TOP CYBER NEWS NOVEMBER EDITION HOW CAPITOL TECHNOLOGY UNIVERSITY DEVELOPS THE TALENT AND CONFIDENCE OF ITS STUDENTS, ENABLING THEM TO USE THEIR EDUCATION FOR ENGINEERING AMAZING CAREER TRAJECTORIES PRESIDENT, CAPITOL TECHNOLOGY UNIVERSITY MOST INFLUENTIAL EDUCATIONAL LEADER BY THE EDUCATION MAGAZINE PRACTICAL EDUCATION TAUGHT BY INDUSTRY EXPERTS Dr. BRADFORD SIMS THE WINNING STRATEGY FOR CYBERSECURITY EXCLUSIVE ARTICLE BY MATTHEW ROSENQUIST
  • 2. “Education has always been a profit-enabler for individuals and the corporation. Education, both conception and delivery, must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.” ~ Stéphane NAPPO TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 2
  • 3. About Dr. Bradford SIMS TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 3 Dr. Bradford L. Sims became Capitol Technology University's eighth president on June 1, 2017. An educator, administrator and construction project manager, Dr. Sims has extensive experience both in academia and industry. Dr. Sims earned a Ph.D. in Curriculum and Instruction in 1999 from Purdue University, which is also his undergraduate alma mater; he received his B.S. in Building Construction Management there in 1990. He also holds a master's of science degree in Building Construction from the University of Florida. He is a member of the Sigma Lambda Chi International Construction Honor Society and the American Institute of Contractors, among many other honors and professional affiliations. The Education Magazine has selected Dr. Bradford Sims one of the 10 Most Influential Educational Leaders of 2021. He leads Capitol Technology University with an education laser-focused on STEM or Management of STEM careers which uniquely positions students for top roles in the region's booming tech hub.
  • 4. 4 Learn Build Succeed Capitol Technology University is a private university in South Laurel Maryland near Washington DC. The university was founded in 1927 as the Capitol Radio Engineering Institute by a former US Navy Radioman. CREI changed its name to Capitol Institute of Technology in 1964, changed its name again to Capitol College in 1987, and assumed its present name in 2014. Capitol offers undergraduate and graduate programs specializing in engineering, computer science, information technology, and business. It is classified among "Special Focus Institutions-Schools of Engineering“ and is a National Center of Academic Excellence in Informa tion Assurance Education. Capitol Technology University, through its Department of Computer Science, provides degree programs in the concentration areas of Computer Science, Artificial Intelligence and Data Science, at each of the bachelors, masters and doctoral levels of study. Capitol Technology University is part of the job-rich pipeline supplying human capital to America’s most technologically advanced government agencies and their private sector supply chains. Capitol Tech provides a launch pad to a better life. It’s because we’re laser-focused on STEM careers and give students the hands-on, real-world experience they need to enter today’s tech job market. About the University TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved
  • 5. Education TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 5 GREAT CAREERS Focused on STEM CREATING BUILDING
  • 6. 6 Join our IBM Power Webinar: Protect your data from core to cloud with IBM Power10 November 17th , 14:00 CET Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks alone are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that the rate of detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic, forcing companies to find solutions or be ready to face long recovery times (an average of 23 days), huge costs (more than $4 million per incident), as well as the loss of customer confidence and satisfaction. This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation: persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10 server is the most secure and reliable in its class, with the Power10 processor-based systems further extending the industry- leading security and reliability of the Power platform, and adding a special focus on protecting applications and data in hybrid cloud environments. Power10 introduces significant innovations along four major dimensions: ✓ Advanced Data Protection ✓ Platform Security ✓ Security Innovation for Modern Threats ✓ Integrated Security Management Join our experts on Wednesday, November 17th , to discuss about security challenges and cyber-resilience strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with no impact on performance. Meet our experts: Register now ➔ Sylvia Scheerová Director Cognitive Systems IBM EMEA Dimitrios Pendarakis Distinguished Engineer Chief Security Engineer Cognitive Systems Thomas Harrer Distinguished Engineer CTO, Servers & Storage IBM EMEA Cyberattacks have been rated as one of the top risks in 2021, and they continue to grow as IoT cyberattacks alone are expected to double by 2025. Plus, the World Economic Forum’s 2020 Global Risk Report states that the rate of detection is as low as 0.05%. Cybercrime is up 600% as a result of the COVID-19 pandemic, forcing companies to find solutions or be ready to face long recovery times (an average of 23 days), huge costs (more than $4 million per incident), as well as the loss of customer confidence and satisfaction. This rapidly evolving cyberthreat landscape makes cyber-resilience a critical concern for any organisation: persistent, end-to-end security is the only way to reduce exposure to threats. The new IBM Power10 server is the most secure and reliable in its class, with the Power10 processor-based systems further extending the industry-leading security and reliability of the Power platform, and adding a special focus on protecting applications and data in hybrid cloud environments. Power10 introduces significant innovations along four major dimensions: ✓ Advanced Data Protection ✓ Platform Security ✓ Security Innovation for Modern Threats ✓ Integrated Security Management Join our experts on Wednesday, November 17th, to discuss about security challenges and cyber-resilience strategies, and learn how the new IBM Power10 platform can help protect your data from core to cloud, with no impact on performance. Meet our experts: Sylvia Scheerová Director Cognitive Systems IBM EMEA Dimitrios Pendarakis Distinguished Engineer Chief Security Engineer Cognitive Systems Thomas Harrer Distinguished Engineer CTO, Servers & Storage IBM EMEA TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved https://event.on24.com/wcc/r/3498648/CC63274212B8BC230FD407CEC5E76FD1
  • 7. When the Internet was still the ARPANET it was a relatively closed system used for research communication by Universities and research laboratories. This changed in the 80s when commercial used began to expand and laid the foundation for the Internet we use today. But while communication and collaboration has always been a core tenet of networking, security wasn’t. There were warnings like the Morris worm in the 80s and warez hacks and phishing of AOL accounts in the 90s, but it wasn’t until the turn of the century that network and information security became a high visibility priority for most organizations. Many were simply too trusting - thinking the technology was so advanced that it simply couldn’t be attacked. This was not the case. In the mid-90s it wasn’t uncommon to hear people pontificate that (cyber)security will be solved in a few years. Decades later, security is sadly, not solved, yet the reason to secure systems is greater than ever. As technology has entered every aspect of our lives: software and the cloud power our cars, light up our homes and towns, and enable doctors to collaborate across the globe to develop vaccines at previously unthinkable of speeds. NATO considers cyberspace as a military domain and most major governments have cybersecurity chiefs. The rapid growth of technology change has been powered by widespread cloud adoption, the “shift left” mindset, and application deployment agility via containerization. IaaS enables us to spin up new workloads and servers quickly, while the low code/no code revolution allows us to knit together services to create innovative workloads. “Have we solved security? Unfortunately not - but security professionals, have been a critical part of the reason that technology has been able to grow to where it is today. Without security, we can’t benefit from advanced techno- logy.” Have we solved security? TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 7 Editorial by Diana Kelley Co-Founder and CTO of SecurityCurve Diana KELLEY Co-Founder & CTO at SecurityCurve. Former Global Executive Security Advisor at IBM and Cybersecurity Field CTO at Microsoft. Founding Board Member & CTO at Sightline Security. The host of BrightTALK’s The (Security) Balancing Act. Diana Kelley’s security career spans over 30 years.
  • 8. Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award-winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders. Capitol Tech, located in Laurel, Maryland, is home to nationally recognized cybersecurity degrees, with SC Media naming the university’s cybersecurity program as the 2020 Best Cybersecurity Program and the Chair of Cybersecurity, Dr. Willliam (Bill) Butler, as the 2021 Outstanding Educator. “This year with COVID-19 has been truly challenging for the nation, our families, students, faculty, and employers. My fellow finalists all worked extra hard this year to make sure that our students did not experience the “knowledge gap” or a “lost year” that they could not afford during the pandemic,” said Dr. Butler. “Capitol Tech has answered the call to deliver excellent hands-on cybersecurity education for over 20 years and this individual award actually recognizes excellence in our students, faculty, staff, alumni and our leadership as a whole.” TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved Practical Education Taught By Industry Experts 8 Author: Dr. Bradford Sims ‘The education of the next generation of Cyber experts must start now’, include all those that have historically been limited to be part of this defence of our ways of life. ~ Dr. Ian McAndrew
  • 9. Since 2003, the Department of Homeland Security (DHS) and the National Security Agency (NSA) also recognized the program as a Center of Academic Excellence in Cyber-Defense, and in 2021 the university was selected by the NSA as the Northeast region’s Cybersecurity Hub. As the Hub, the university will mentor hundreds of institutions offering cybersecurity programs across 14 states and the District of Columbia to develop or enhance their cybersecurity programs. This new title allows Capitol Tech to continue mentoring other universities in cyber program creation in addition to opportunities the preexisting CAE designation afforded the university. These include being selected by the NSA to supplement their development program for new security engineers with master’s courses, by over twenty Cyber Scholarship Program (CySP) scholars, and by the National Science Foundation (NSF) for two major multi-year grants to address the shortage of cybersecurity professionals. Author: Dr. Bradford Sims TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 9
  • 10. Capitol Tech’s cybersecurity bachelor’s, master’s, and doctoral students are immersed in a hands-on education led by industry experts to learn in-demand skills. Undergraduate students learn UNIX O/S, C programming, networking, virtual machines, vulnerability scanning, packet capture and analysis, and password cracking during their first semester. When combined with the aforementioned skills and the ability to earn Security+, Certified Ethical Hacker, and Forensics certifications during their time at Capitol Tech, most undergrad students are employable by their junior year. Master's students learn advanced topics including cyberlaw, penetration testing, forensics, vulnerability mitigation, and participate in a risk assessment capstone. This year, Capitol added cyber data analytics to address the growing need for cyber analysts. Doctoral students learn skills necessary to succeed in challenging careers such as security researcher and chief cyber strategist. This year the university also addressed a huge gap by introducing a new PhD in cybersecurity leadership. Kierra Jiles, a 2017 graduate of the Bachelor’s in Cyber and Information Security program, fulfilled her seventh-grade self’s dream when she landed the job of Site Reliability Engineer at Microsoft using her previous experience in software and computer engineering for government agencies including the U.S. Department of State, NASA, and the CIA. “All the tools we used in our cybersecurity courses were relevant to what we’d be doing in the real world,” says Jiles. “I’m still constantly getting job interviews and opportunities even when I’m not looking. It’s nice to have that job security—to know I’m still wanted in the career force and that’s strictly because of my degree and the skills that my Capitol Tech education provided me with.” Author: Dr. Bradford Sims TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 10 Kierra Jiles, a 2017 graduate of the Bachelor’s in Cyber and Information Security program, fulfilled her seventh-grade self’s dream when she landed the job of Site Reliability Engineer at Microsoft using her previous experience in software and computer engineering for government agencies including the U.S. Department of State, NASA, and the CIA.
  • 11. Author: Dr. Bradford Sims TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 11 Capitol Tech’s hands-on education provides students the unique ability to learn and work in a variety of labs dedicated to cyber, forensics, identity credentialing, Internet of Things, quantum computing, and security operations. Through labs, sponsored projects, and clubs, students can work across disciplines simulating real-world work environments. For example, cyber and engineering students can collaboratively build and program robots for competitions. Undergraduate students can also participate in the National Security Scholars Program which provides scholarships, paid internships in the defense and intelligence industry, and assistance with obtaining a national security clearance. Current and prospective graduate students benefit from direct access to internal and external industry experts through two free STEM-focused webinar series launched this year for working professionals. These webinars, one of which was a collaboration with the NSA and several Maryland community colleges led by Capitol Tech, serve as industry introductions, Q&A sessions, and networking opportunities. Capitol Tech’s dedication to providing students with a practical education taught by industry experts has allowed the university to become a leader in cybersecurity education. Coupled with the university’s many professional partnerships, students at Capitol Tech are able to find lucrative careers that are both personally fulfilling and meaningful to their field of interest. If you are interested in pursuing an undergraduate or graduate degree at Capitol Technology University visit www.captechu.edu or email admissions@captechu.edu
  • 12. Interview with Dr. Ian McAndrew Dean of Doctoral Programs at Capitol Technology University “Research can be both lonely and rewarding. I would encourage research in areas that are of interest to the researcher and not that which is currently popular. Any research of note is not going to happen overnight and your interest will keep you dedicated. ~ Dr. Ian McAndrew, Dean of Doctoral Programs at Capitol Technology University TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 12 This interview is courtesy of Joe Fields, Head of Influencer Marketing at Onalytica.com “We are at the start of a long road”
  • 13. [Joe Fields] Who is Ian McAndrew? [Dr. Ian McAndrew] I am a Mechanical Engineer by background, my qualifications are a Bachelor's, Master's and a PhD as a chartered engineer. Then I also did another degree and qualified as an electrical engineer. I carried on and did some more research at Doctorate level and became a fellow of the Royal Aeronautical Society. I’ve probably become an over educated person who is best left in academia rather than the real world. I worked for the car industry initially, I used to design car engines. Then I worked at the University of Hertfordshire in England where I spent 15-20 years. I then started to work for Embry-Riddle Aeronautical University worldwide where I spent 10 years. After that I transferred to Capital Technology University in America. I used to work for the current president of the University I'm at now, and when he transferred, he asked me to come and work for him at his university. Now although it’s an American University with a campus, I am based in Europe and live in Europe but I travel there lot. I tend to chair about a dozen conferences all over the world each year as an academic expert and a professor. Now I dedicate my time to working with doctoral students and I'm the Dean of doctoral programs at the university. [Joe Fields] How did you become an expert in your key topics? [Dr. Ian McAndrew] Well, it was never planned it just sort of happened. I think a lot of it was just committed work, research and carrying on and eventually you find yourself in a position of valedictory in that you’re almost there without thinking about it. I went to work at a University, involved in thermodynamics, and then I took over the aerodynamic area, and then got more and more involved in aviation. It never really became a plan, it was life drifting me along. You get to a stage in academia where you’ve been there for quite a few years and I suppose you automatically inherit the title “expert”. I have over 80 successful PhD students in my life in my career of supervising them. I have more than I’m currently supervising, and it’s the main focus of what I do and it’s a delight working with people at that particular level. [Joe Fields] What topic areas are you most passionate about? [Dr. Ian McAndrew] Numerical problem solving is really something that I enjoy, that’s what I find a nice mental challenge. Where there’s a problem this lends itself to research, solving numerical problems coming up with answers for unknown areas. Then I would tag on to that, working with students and helping them achieve their goals and becoming educated and successful in their chosen areas. I have had over 80 PhD successes and I get just as much of a thrill out of my current PhD students’ passing as I did the very first person passing. That is something which stays with me and it’s a wonderful part of my job that I’m helping people achieve what is really for most people a very, very high level that often they don’t expect to achieve, because it’s a sort of the plateau in academia. It’s delightful to see that and when someone’s completed it you can say congratulations Doctor. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 13 Interview with Dr. Ian McAndrew “We are at the start of a long road”
  • 14. “Knowledge is power. Information is liberating. Education is the premise of progress, in every society, in every family.” ~ Kofi A. Annan [Joe Fields] Which influencers influence you within those key topics? [Dr. Ian McAndrew] Well, I have to say, I go back, and this is probably giving my age away now. Sir Barnes Wallace to me was the greatest engineer of the 20th century. As a very young boy, I managed to meet him once with my Grandfather that knew him. Barnes Wallace, for those who are not familiar, is probably most famous for designed the bouncing bomb for the Dambusters raid. If you look at his history however, he was also the person that came up with the material science for swing wing aircraft, he designed the R101 Airships. He designed the Wellington bomber. He designed the largest non-nuclear bomb that existed up until a couple of years ago when the Americans dropped that super bomb in Afghanistan. It’s amazing the legacy of what that man did technically in the face of adversity. People didn’t believe some of his innovative ideas, but he followed them all the way through. The bouncing bomb is an example of an engineer with an innovation that, if they are committed, they can achieve what they want. He had a quote in life, and I like this so much that I put this on the cover page of my first doctorate which was “The whole joy of life is in battle – not winning” and I think that’s very true. If your follow that through to reading a book for example, if you find a good book that you are reading, it’s a disappointment when you get to the end, and you think now I’ve got to find another good book. We can apply that to so much of our life. It’s about enjoying what we’re doing and not necessarily getting to the endpoint but enjoying the route as you’re getting there. So he is the person who is most influential in my area. [Joe Fields] Outside of your key topics who else influences you? [Dr. Ian McAndrew] I have to say it’s my grandfather, what an amazing man. He used to say “you have to look back to enjoy where you’re going, because you have to see how far you’ve come”. If you’re trying to learn something, if you’re trying to solve something, you can look at it and you can think to yourself, I’m nowhere near the end. With my career, you look back and you realize I’ve come a long way and I’ve done all that. My grandfather was influential like that, you should be satisfied with what you’ve got. For those of us that are in education we are very, very lucky as we get to disseminate information and help the next generation. Just as we have been successful in our generations, we’ve done that because we’ve had people mentoring us, believing in us and supporting us to achieve those ends. What a wonderful legacy at the end of your life that you say you’ve put back more than you’ve taken out, and you’ve helped a lot of people achieve their goals. There are people that I’ve worked with that have gone on to have very successful careers and achievements because of their qualifications, and they’re making the world better through science, technology and their manipulation of how organisations work to make the world better and that’s a great thing. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 14 Interview with Dr. Ian McAndrew
  • 15. “The mindset of continuous learning is really important as the number one skillset for our teachers learning how to teach and for our students learning how to learn. And that’s the mindset we’ve got to get into the curriculum today.” ~ Robert E. Moritz, Global Chairman of PwC [Joe Fields] How would you describe your offline influence? [Dr. Ian McAndrew] I’ve had the fortune to travel a lot, I’ve been to over 85 countries in my life and I think travel is educational, it’s enlightening and it gives you reason and logic. If you look at various continents, cultures and styles of work and how they work, this gives you an understanding of how people work, and indeed what is important to them. I would have to say my influences are the people in the world. It’s always a pleasure to meet people and most people have something you can learn from them. They have an experience, a story, knowledge or something that they’ve done which they want to share with you that you wouldn’t necessarily want to repeat, because it didn’t work. Lots of people have used the phrase “history repeats itself”, if we don’t learn from mistakes then we’re not improving. Other people can help you learn from their mistakes if you listen. I think there are two types of silences in the world, when people are listening to the words you’re saying, and when they’re waiting for you to stop talking so they may talk again. The less you say the more you see and you listen to people around you and there is a wealth of information to be gained on various different levels. Then again being able to disseminate to other people is great. [Joe Fields] If a brand wanted to work with you, what activities would you be most interested in partnering with them on? [Dr. Ian McAndrew] What I’m really interested in is numerical problem solving. I like solving problems. I like finding a solution to something. I like having a problem to solve and whether it takes minutes, hours or even years. That’s what I really enjoy doing, Working with a big brand for the sake of it I’d find rather boring. I’m not interested in the glory and the fun side of it, I’m interested in the detail side of it, the innovation side and thinking up novel ways of working with things. If I had a chance to work with any brand on innovation and new ways of doing things, that is something that I would find fascinating. [Joe Fields] What’s your best source of information for getting ahead of a story? [Dr. Ian McAndrew] I think by spending your life reading, gathering information and being observant gives you a wonderful foundation. Sometimes a little bit of information based on what you already know, gives you a catapult to get to the next level. We’re often working in pigeonholes now. You’re a mechanical engineer, you’re a marketing expert, you’re finance expert, you’re a medical person. We don’t integrate those disciplines enough. and I think that is where we can push forward. The best source of information is where we share information. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 15 Interview with Dr. Ian McAndrew
  • 16. “Anyone starting out to research for a doctorate degree should remember that hours of self centered work has the ability to be the spark for others to progress. All research is potentially useful to open doors or show others that door does not lead anywhere useful. Advancements happen by building on others research.” ~ Dr. Ian R. McAndrew [Dr. Ian McAndrew] There’s a phrase that we use in engineering called “technology transfer”, how do we take that knowledge that I have and give it to other people? We have universities, education and qualifications, but how do we capture that knowledge in industry? If someone said what would you pass on to your children? You’d come up with a list, and if you looked at it a week later, you’d come up with more information then you constantly add to it. You can never truly disseminate that information. If we think about what the best source of information is, it’s the world, it’s the people around us, it’s collecting all that information and integrating it together. We talk about this as analytics now, and we talk about analytics as a new science that is emerging and that never existed before. It exists in a way now that it’s never existed before because technology allows us to process things faster, but we don’t always know what processing. There’s a lovely clip in the movie Jurassic Park with Dr. Ian Malcolm, the chaos theory expert where he came up with this phrase “Instead of asking, can we do it? We should ask first of all, should we do it?” I think that’s what we have to ask with technology now, with analytics and with everything else. Should we be doing this? First thinking about the ethical side of some of these things we are doing and then considering how can we do this? [Joe Fields] What brands have you worked with? [Dr. Ian McAndrew] I’ve worked with some several major brands in the aviation industry, some big airline carriers like BA, Virgin, Iceland Air and Lufthansa at different stages. I’ve also worked with various militaries such as the US Air Force and the RAF and other things at times in my life. I’ve worked for a lot of companies that wouldn’t be identified immediately with brands because they’re very specialist small companies that do very small work for bigger companies. [Joe Fields] Which non-paid activities would you be keen to take part in if the opportunity raised your profile or delivered value to your audience? [Dr. Ian McAndrew] I have to say I wouldn’t really take part in a non-paid activity to raise my profile, I think if you do non-paid activity it should be for the benefit of society. We should be doing things to help the community without any payback. I have to say I wouldn’t really take part in a non-paid activity to raise my profile, I think if you do non-paid activity it should be for the benefit of society. We should be doing things to help the community without any payback. I’m a Director and Chair on several UK charities that sponsor students to be able to go to university, and I’m involved with a couple of other little educational charities. I don’t get paid for it. I don’t do it for money, I don’t do it for fame or fortune, I do it because I think in this busy overcrowded world we should put back things into society. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 16 Interview with Dr. Ian McAndrew
  • 17. [Dr. Ian McAndrew] Even little things like putting in a pound coin in a collection box for a worthy cause, to actually giving up time. Even walking down the street and picking up a piece of litter and putting it in the bin. If we all put something into society, if we all put something into where we work and live without taking any credit for it, then we’re all going to live and work in a better world. We can go back to John F. Kennedy’s quote “Ask not what your country can do for you, but what you can do for your country” and that’s an important thing that is as relevant today as ever, and perhaps even more so, at this particular time. People going out and panic buying, it doesn’t help everyone. We are all in one big society and should be coming together. Direct Link: https://onalytica.com/blog/posts/interview-ian-mcandrew/ More about Dr. Ian McAndrew: https://www.captechu.edu/blog/interview-dr-ian-mcandrew-dean-of-doctoral-programs “We are at the start of a long road – although Capitol has a rich history, it is only recently that we became a university, and we are growing. That’s an exciting place to be. We’re headed in the right direction and we have an excellent team that is committed to moving us forward. While on campus, I am always struck by the enthusiasm of people – administrators, faculty, staff, and students. Whenever I have had a question or needed assistance with something, people were ready to help. There is a willingness to step up to the plate that you don’t always encounter at other institutions. It is exciting to work among people who are committed to the university’s mission and its future.” ~ Dr. Ian McAndrew TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 17 Interview with Dr. Ian McAndrew Doctoral Programs ranging from Cybersecurity, Analytics, Artificial Intelligence and Technology based at the Capitol Technology University. Native of England and living in London, Dr. McAndrew is a Fellow of the Royal Aeronautical Society, an editor of seven international journals and the Chair of 5 international conferences. Author of six books, conference, and journal publications of 71 over 30 years. Extensive consultancy experience internationally for multi-nations and organisations. An external examiner on the worldwide stage (UK, USA, Germany, Italy, Jordan, Japan, Australia, Greece and Kenya). Keynote speaker on the international stage and experienced external examiner, Dr. McAndrew has delivered Keynote speeches in over 40 countries around the world. Has supervised 130 students to their doctoral completion in the USA and all over the world. Holding An internationally recognized leader in research and expert on low- speed flight, Dr. McAndrew has five degrees: a PhD, two master’s degrees and two bachelor’s degrees. He started his career in the automotive industry as an engine designer and has worked at several universities across the globe. An extraordinarily academic with immense experience within industry, highly qualified internationally recognised researcher with extensive teaching experience at all levels of education, Dean of Doctoral Programs at Capitol Technology University, Professor Dr. Ian R. McAndrew FRAeS, is leading a doctorate program in excess of 350 students globally (Taught in over 50 countries as a research, consultant and trainer), being responsible for 23 different
  • 18. There comes a time when data needs to be shared—whether to evaluate a matter for research purposes, to test the functionality of a new application, or for an infinite number of other business purposes. To protect the sensitivity or confidentiality of shared data, it often needs to be sanitized before it can be distributed and analyzed. A popular and effective method for sanitizing data is called data anonymization. Also known as data masking, data cleansing, data obfuscation or data scrambling, data anonymization is the process of replacing the contents of identifiable fields (such as IP addresses, usernames, Social Security numbers and zip codes) in a database so records cannot be associated with a specific individual, project, or company. Unlike the concept of confidentiality, which often means the subjects’ identities are known but will be protected by the person evaluating the data, in anonymization, the evaluator does not know the subjects’ identities. Thus, the anonymization process allows for the dissemination of detailed data, which permits usage by various entities while providing some level of privacy for sensitive information. Data anonymization techniques: There are several data anonymization techniques that can be used, including data encryption, substitution, shuffling, number or date variance, and nulling out specific fields or data sets. Data encryption is an anonymization technique that replaces sensitive data with encrypted data. The process provides effective data confidentiality, but also transforms data into an unreadable format. For example, once data encryption is applied to the fields containing usernames, "JohnDoe" may become "@Gek1ds%#$". Data encryption is suitable from an anonymization perspective, but it’s often not as suitable for practical use. Other business requirements such as data input validation or application testing may require a specific data type—such as numbers, cost, dates, or salary—and when the encrypted data is used, it may appear to be the wrong data type to the system trying to use it. Substitution consists of replacing the contents of a database column with data from a predefined list of factious but similar data types so it cannot be traced to the original subject. Shuffling is like substitution, except the anonymized data is derived from the column itself. Both methods have their pros and cons, depending on the size of the database in use. For example, in the substitution process, the integrity of the information remains intact (unlike the information resulting from the encryption process). But substitution can pose a challenge if the records consist of a million usernames that require substitution. An effective substitution requires a list that is equal to or longer than the amount of data that requires substitution. Data Anonymization A Comparison of Techniques Author: Dr. Kellep A. CHARLES “The next Freud will be a data scientist. The next Marx will be a data scientist. The next Salk might very well be a data scientist.“ ~ Seth Stephens-Davidowitz TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 18
  • 19. In the shuffling process, the integrity of the data also remains intact and is easy to obtain, since data is derived from the existing column itself. But shuffling can be an issue if the number of records is small. Number and date variance are useful data anonymization techniques for numeric and date columns. The algorithm involves modifying each value in a column by some random percentage of its real value to significantly alter the data to an untraceable point. Nulling out consists of simply removing sensitive data by deleting it from the shared data set. While this is a simple technique, it may not be suitable if an evaluation needs to be performed on the data or the fictitious form of the data. For example, it would be difficult to query customer accounts if vital information such as customer name, address and other contact details are null values. Data anonymization tools: I have often used anonymization when working with various IT vendors for troubleshooting purposes. Data generated from log servers, for example, cannot be distributed in its original format, so instead traceable information is anonymized using log management software. By initiating the anonymize function in the software, I can protect data in our logs, replacing identifying data such as usernames, IP addresses, domain names, etc. with fictional values that maintain the same word length and data type. For example, a variable originally defined as “user=johndoe@mysite.com” will get converted into “user=oranges@uphill.com”. This allows us to share log data with our vendors without revealing confidential or personal information from our network. Some interesting tools in the data anonymization space are Anonymous Data by Urban Software and Anonimatron, which is available on SourceForge.net. Both tools are freeware and can run on a Windows-based platform, while Anonimatron can also operate on Linux and Apple OSX systems. In addition, I have worked with many IT security professionals who prefer to create custom scripts against files to anonymize their data. Whatever your choice for data anonymization, the goal remains the same: to anonymize sensitive information. Although these anonymization techniques and tools do not fully guarantee anonymity in all situations, they provide an effective process to protect personal information and assist in preserving privacy. With the growing need to share data for research purposes and the legal implications involved if due diligence is not properly conducted when releasing information, many organizations are now discovering the necessity and the benefits of data anonymization. by Dr. Kellep A. CHARLES TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 19 over 20 years of industry experience in the areas of incident response, computer forensics, security assessments, malware analyst and security operations. Dr. Charles is the creator of SecurityOrb.com (at SecurityOrb), an information security & privacy knowledge-based blogsite designed for information security related users. Dr. Kellep A. Charles obtained a Doctor of Science in Cybersecurity from Capitol Technology University. He also holds a Master of Science in Telecommunication Management from the University of Maryland University College and a Bachelor of Science in Computer Science from North Carolina Agriculture and Technical State University. Dr. Charles works as a government contractor in the Washington, DC area as a Network Security Analyst and is an Adjunct Professor at Capitol Technology University in Laurel Maryland where he teaches in the Computer Science department and holds a CISSP certification. Kellep has
  • 20. BRING TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 20 BEGINS CYBERSECURITY STRATEGY THE BOARDROOM CISO your CISO INTO
  • 21. About Matthew ROSENQUIST TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 21 Matthew Rosenquist is the Chief Information Security Officer (CISO) for Eclipz, the former Cybersecurity Strategist for Intel Corp, and benefits from 30 diverse years in the fields of cyber, physical, and information security. Mr. Rosenquist specializes in security strategy, measuring value, developing best practices for cost-effective capabilities, and establishing organizations that deliver optimal levels of cybersecurity, privacy, ethics, and safety. As a cybersecurity strategist, he identifies emerging risks and opportunities to help organizations balance threats, costs, and usability factors to achieve the desired level of security. Mr. Rosenquist is very active in the industry. He is an experienced keynote speaker, collaborates with industry partners to tackle pressing problems, and has published acclaimed articles, white papers, blogs, and videos on a wide range of cybersecurity topics. Mr. Rosenquist is a member of multiple advisory boards, consults on best-practices and emerging risks to academic, business, and government audiences across the globe. Currently, Mr. Rosenquist is the CISO for Eclipz, a company that provides innovatively elegant means to establish highly secure Point-to-Point encrypted tunnels on untrusted endpoints over insecure networks. Independently, he partners with several firms to provide advisement on cyber-ethics, cybersecurity strategy, and human resource acquisition in the highly competitive cybersecurity industry. As a member of multiple Advisory Boards, he helps shape and implement new technology, security innovation, standards, and guides academic institutions in preparing the next generation of cybersecurity leaders.
  • 22. Establishing and maintaining a cybersecurity capability is a daunting endeavor. Leadership is the key. Cybersecurity is a difficult, complex, and convoluted struggle that will continue to challenge the fortitude of digital technology. It is not a short-term tactical exercise, but rather a long-term engagement that opposes highly skilled, motivated, and intelligent adversaries who see to undermine value and trust. To maintain an advantage in keeping the digital world secure, strategic planning is required. “We manage security through either leadership or crisis. In the absence of leadership, we are left with crisis.” For over 30 years I have worked in the fields of cyber, information, and physical security to build lasting organizations that can effectively predict and interdict attacks. It is an exercise that must take into account the attackers, their motivations, methods, and target selection processes as it relates to the vulnerabilities of the assets being protected. It is easy to do security poorly, but extremely difficult to do it well consistently. It requires a diversity of people, tools, and processes that are applied in just the right manner. The challenge requires leadership to both establish a long-lasting well-architected program and keep it current with the ever-evolving threats. The winning strategy is to pursue an optimal balance of cyber risk with clear objectives and acceptance of tradeoffs that support the overarching goals of the organization. The desired equilibrium is achieved by managing risks, costs, and usability friction that accompanies security controls. Experienced organizational leadership can make sense of the chaos, communicate in ways that align and garner support, plan, and maneuver capabilities to predict, prevent, detect, and respond to cyber threats. Establishing clear goals, implementing operational functions, and instituting supporting behaviors within an agile framework are crucial for adapting to evolving risks. Highly skilled talent and tools are not enough. They must be crafted into an overall capability aligned to when, how, and where attackers will strike. The Winning Strategy for Cybersecurity Author: Matthew ROSENQUIST “Cybersecurity strategy begins with the CISO himself.” ~ Michel CAZENAVE TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 22
  • 23. The Winning Strategy for Cybersecurity To prepare a perfect meal requires more than just having the right ingredients and cookware. A capable chef is needed. The same is true with cybersecurity. Insights, discipline, communication, and management skills are essential to build a risk management program that meets the needs of an organization. Such defenses are not static as cybersecurity goals are continuously evolving to protect the security, privacy, and safety of digital ecosystems through a combination of adaptive technology, processes, and behaviors. The single greatest factor for successfully navigating these challenges is the presence of expert leadership. “Leadership is key in organizing resources to achieve and maintain an optimal level of security value.” Cybersecurity is difficult. It becomes exponentially more problematic when someone who lacks the necessary mentality or skills comes in and makes it profoundly worse. Cleaning up an ineffective legacy security program is painful, expensive, and time consuming. Simultaneously, a poor risk posture opens the door to more attacks and greater impacts until a capable security program is instituted. We must understand that cybersecurity, like many other highly specialized roles, requires a depth of insight and experience to lead. I will echo Sun Tzu’s “…do what is great while it is small” and recommend putting a good leader in place the first time to build an effective and sustainable cybersecurity organization. “Let’s all break the silence and openly discuss the cycle of poor cybersecurity leadership, for everyone’s benefit.” For more insights on the challenges and required strategic deliverables, read Matthew Rosenquist’s post Cybersecurity Fails Without Strategy. Interested in more insights, rants, industry news and experiences? Follow Matthew Rosenquist on Steemit and LinkedIn for insights and what is going on in cybersecurity. MATTHEW ROSENQUIST, PUBLISHED/QUOTED IN MEDIA & PERIODICALS by Matthew ROSENQUIST TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 23
  • 24. TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 24
  • 25. 25 25 Editor-In-Chief TOP CYBER NEWS MAGAZINE and RAISE THE CYBERSECURITY CURTAIN! Ludmila Morozova-Buss Cybersecurity Woman “Influencer” of the Year 2020 TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 25
  • 26. MAGAZINE TOP CYBER NEWS CYBER FOR GOOD We communicate Technology, Innovation, and Cybersecurity TOP CYBER NEWS MAGAZINE - November 2021 - All rights reserved 26 “Education as a sector has changed dramatically over the last decade, and will continue to change.” “Fewer students pursue education purely for the joy of learning or the promise of transformation of thinking. Many more students seek a direct connection between their learning and their career objectives. Capitol Tech is well-situated to meet the goals of both today’s students and today’s industry.” “…a solid education that enables students of all ages to obtain a great career and take care of themselves and their families.” “Focused on STEM since its inception in 1927, Capitol Technology University has developed a robust, practical, and award- winning cybersecurity program for students at all levels to learn the skills necessary to become industry Leaders.” Dr. BRADFORD SIMS, FRAeS, President, Capitol Technology University