Not too long ago I embarked on a creating a podcast series that would provide more regularity than the blog. Beyond the Perimeter has been a tremendous amount of fun and as we just posted our 50th podcast I wanted to reflect on some of the highlights and wonderful guests we have been honored to have joined us.
Posts Tagged ‘Cyber Command’
Posted in Security, tagged 451 group, Aaron Bawcom, Adam Shostack, Adobe Systems, Al HUger, Alex Hutton, Andy Purdy, antivirus, Arbor Networks, Ben Natan, beyond the perimeter, BigFix, Black Hat, Brad Arkin, Charles Dodd, Cisco, Concord Hospital, Conficker, Cyber Command, Dan Philpott, Dave Watson, David Mortman, Defcon, Doug Washburn, Dr. Peter Tippet, Economics, eIQ networks, EMA, EMC, Enterprise Management Associates, FAIR, FCRA, FIPS, FISMA, Forrester Research, Gartner, government security, Guardium, Hackers for Charity, HIPAA, IBM, Immunet, Information Security, ISS, Jack Daniel, Jeff Jones, Jeremiah Grossman, Johnny Long, Jose Nazario, Joshua Corman, Kaiser, Kaspersky, malware, Mark Starry, Mede Finance, Melissa Hathaway, Men in black, Michael Dahn, Michael Santarcangelo, Michael Smith, Microsoft, Mike Rothman, Nick Selby, NICOR, NIST, patch management, Patric Peterson, Paul Roberts, PCI, Peter Kuper, podcast, Project Quant, Reflex systems, Rich Mogull, Rick Wesson, Risk, RSA, Ryan Russell, Sam Curry, Scott Crawford, Scott Johnson, Sean Goings, Security b-sides, Securosis, Situational awareness, stelaing the network, Support Intelligence, TAC Americas, Technical Publishing, Timothy Mullen, Verizon Business Services, Virtualization, virtualizaton, Web Applicaiton Security, White Hat Security on September 21, 2009| Leave a Comment »
Posted in Politics, Security, tagged Air Force, Center for Strategic and International Studies, CSIS, Cyber Command, cyber security, DC3, digital forensics, DoD, DoD Cyber Crime Center, FBI, National Security Agency, network security, President Obama, SANS Institute, US Cyber Challenge, US Cyber Policy on August 4, 2009| 5 Comments »
As part of the administrations continuing efforts to actually do something tangible to improve the security posture of US critical infrastructure and to better deal with a severe lack of technical talent the CSIS (Center for Strategic and International Studies) announced the US Cyber Challenge (here) to identify and develop 10,000 cyber security specialists.
One of the fundamental deficiencies of the current US critical infrastructure protection programs (there are many of them), is the astonishing lack of qualified technical security specialists. This program aims to develop the next generation of technically advanced cyber warriors and security specialists.
The United States Cyber Challenge
The US Cyber Challenge is a national talent search and skills development program. Its purpose is to find 10,000 young Americans with the interest and skills to fill the ranks of cyber security practitioners, researchers and warriors. Some will, we hope, become the top guns in cyber security. The program will nurture and develop their skills, and enable them to get access to advanced education and exercises, and where appropriate, enable them to be recognized by employers where their skills can be of the greatest value to their nation.
Improving our private and public sector security posture will be an ongoing process as we adopt new technology innovations and as the dynamic global environment shifts between hostile and friendly actors. Recruiting the next generation of technically advanced security specialists and developing the skills today to deal with tomorrows threats is key to ensuring we have a population of talent to enable continued growth and prosperity of the United States and its citizens. Like so many times in our history, the hopes of an aging nation rest on the shoulders of America’s youth.