President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s economic prosperity in the 21st century will depend on cybersecurity.”

As a result, the President directed a top-to-bottom review of the Federal Government’s efforts to defend our information and communications infrastructure, which resulted in a report titled the Cyberspace Policy Review. To implement the results of this review, the President has appointed Howard Schmidt to serve at the U.S. Cybersecurity Coordinator and created the Cybersecurity Office within the National Security Staff, which works closely with the Federal Chief Information Officer Steven VanRoekel , the Federal Chief Technology Officer Todd Park, and the National Economic Council.  As per www.whitehouse.gov/cybersecurity.

What is Cybersecurity? It’s really computer security, or better yet, information security applied beyond a single company, enterprise or government. Although the word was coined in 1994, it has recently been used by the media and the U.S. government to define the secure electronic “bubble” that protects a country, therefore the cyber space and cyber security that comes along with it.  This includes not just the traditional traffic of the internet, but also the power grid, transportation and utilities that make computing possible… as well as the protection of the cyber citizens!

When we start the study of its parts, we find that cybersecurity is the body of people, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access (both internal and external.)

The U.S. Department. of Defense (DoD) has a lot to protect and cannot do this alone. It relies on many public and private enterprises to help achieve this critical goal. The number of incidents of documented attacks on computer-based systems and communications systems increases on a daily basis and we call this activity cyberwarfare. The threats are increasing, and the number of jobs relating to cyber security will continue to expand! Which side do you want to be on? Defender or attacker? Well, in cyberwarfare there is room for both! We need defenders as well as some skilled attackers…

A well trained information security professional will be able to detect when intruders attack or be alerted by a central console which is monitoring thousands of sensors placed on servers, network devices and even laptops and desktops. Recently, the network has been extended to protect those “Bring Your Own Device” (BYOD) cases or even mobile and cell phone equipment.  In order for these talented security engineers to perform or even be considered for the position, the U.S. DoD made an official policy in 2004 where it requires any full- or part-time military service member, contractor, or foreign employee with privileged access to a DoD information system, regardless of job or occupational series, to obtain a commercial information security credential accredited by ANSI or equivalent authorized body under the ANSI/ISO/IEC 17024 Standard. The Directive also requires that those same employees maintain their certified status with a certain number of hours of continuing professional education each year. The U.S. DoD Directive 8570 lists about 12 different security certifications among the top 3 is the CISSP. The Certified Information Systems Security Professional continues to be the gold standard in certifications.

Megamind Institute is offering many training opportunities this year for security professionals who want to pursue this highly coveted certification. Check our schedule for details: https://megamindtraining.com/portfolio/cissp-boot-camp-training.