by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 30, 2015
Back to School designated it a Nation- al Center of Academic Excellence in Informa- tion Assurance. 2. University of Maryland University College Before its partnership with Champlain Col- lege, OPM worked with the Universi- ty of Maryland University College to offer discounts on training for federal employees. Washington, D.C.-area public tran- sit riders will be familiar with UMUC advertisements touting its cybersecu- rity credentials, and the college con- tends that it was one of the first to build cybersecurity into its curriculum. “UMUC recognized the crisis that we were having with human capital in the cybersecurity-related area,” said retired Lt. Gen. Harry Raduege Jr., for- mer director of the Defense Informa- tion Systems Agency, in a promotional video for the college. “I was impressed by that because others may have rec- ognized it, but they weren’t bold in moving and committing so many uni- versity resources to addressing this growing area of concern.” UMUC also boasts partnerships with industry heavyweights, including Cisco, Google and SAIC. NSA and DISA are among the cyber- related agencies based in Maryland, and UMUC notes that a good number of cybersecurity jobs (about 5 percent as of 2014) are in that state. 3. Louisiana Tech Research Institute Louisiana Tech University and the Cyber Innovation Center, a research and development outfit in Bossier City, La., announced the creation of the non- profit Louisiana Tech Research Insti- tute in July. It will provide office and lab space for research, “workforce development efforts and external partnerships with industry and govern- ment,” according to the announcement. The institute will be located at the Cyber Innovation Center’s headquarters at the 3,000-acre National Cyber Research Park, which is already home to several large firms, defense contractors and cybersecurity startups. Computer Sci- ences Corp., meanwhile, is building a technology center next door. It is all part of the plan to build an ecosystem of innovation, Louisiana Tech University officials said. In the statement announcing the institute, officials said: “This integra- tion of academia and industry is critical to support the overall ‘ecosystem’ that furthers innovation, creates entrepre- neurship and spin-off companies, and attracts additional federal research funding — all of which drives the expansion of a knowledge-based, 21st- century economy.” 4. University of San Diego The University of San Diego’s new Center for Cyber Security Engineering and Technology will support master’s 16 August 30, 2015 FCW.COM Requirements: At least three years of cumulative experience incorporating three of five performance areas: risk identification, assessment and evalu- ation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and main- tenance. Certifying organization: ISACA (isaca.org) Certified Information Security Manager Audience: Information security managers Focus: Ability to develop, build and manage enterprise information security programs Requirements: At least five years of experience in information security, three of which must have been served as an information security manager. Exams are offered annually in June, September and December. Certifying organization: ISACA (isaca.org) Certified Information Systems Security Professional Audience: Security managers, audi- tors, network architects, chief infor- mation security officers and similarly skilled professionals Focus: Managerial competence and the technical aptitude to design, engi- neer, implement and oversee informa- tion security programs Requirements: At least five years of cumulative work experience in two of the following eight areas: security and risk management, asset security, secu- rity engineering, communications and network security, identity and access management, security assessment and testing, security operations, and soft- ware development security Certifying organization: (ISC)2 (isc2.org) professionalcertifications Champlain College 16 August 30, 2015 FCW.COM 0830fcw_014-026.indd 16 8/12/15 9:26 AM
August 15, 2015
September 15, 2015