Graduate, undergraduate, and women’s scholarships are offered by the Center for Cyber Safety and Education of the International Information System Security Certification Consortium (ISC)². They will begin accepting applications on February 28, 2017 for graduate and undergraduate scholarships of up to $5,000, and are currently accepting applications for women’s scholarships of $8,000 or more. One undergraduate student may also be selected for the Harold F. Tipton Memorial Scholarship; the most recent award recipient for this scholarship is Kyle Dean Murbach from Wheaton, IL. Please see the (ISC)² scholarship page at https://www.isc2cares.org/Scholarships/ for full details.
ITM is happy to be in Boston! In the photo at right, Master of Cyber Forensics and Security alumnus Anthony Ramirez receives the Best Paper Award for the 2016 ACM Research in Information Technology (RIIT) conference in Boston. Anthony and Alfedo Fernandez earned this award for their paper MP3 Stegonography: Analyzing and Detecting TCSteg. This is the third time in five years that Illinois Tech Information Technology and Management researchers have received this award. The School of Applied Technology and the ITM Department are Silver Sponsors for the RIIT conference and the concurrent ACM Special Interest Group in Information Technology Education (SIGITE) conference. ITM Associate Chair Ray Trygstad serves on the SIGITE Executive Committee.
The Women in CyberSecurity (WiCyS) 2017 conference will be held in Tucson, AZ on March 31st-April 1st. Scholarships are available for both faculty and students to attend the conference (details at https://www.csc.tntech.edu/wicys/register/); in the past these scholarships, funded by NSF, have covered airfare and lodging. Student and faculty scholarship applications are now open through November 21st. Notifications will go out December 5th. Conference registration costs are nominal–$30 for students, $150 for faculty.
The Call for Participation for Presentations, Workshops, Birds-of-a-Feather (BOF) Sessions, Lightning Talks, Panels, and Posters is open, and submissions will be accepted until November 6 (details at https://www.csc.tntech.edu/wicys/participate/)
All ITM women enrolled in Cyber Forensics and Security, and all third- and fourth-year undergraduate women, are strongly encouraged to participate—lightning talks and posters are easy and can be drawn from work already done—and to apply for these scholarships.
The U.S. Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education, effective until 2020. Our ability to meet the increasing demands of the program criteria will serve the nation well in contributing to the protection of the National Information Infrastructure. The Presidents’ National Strategy to Secure Cyberspace, February 2003, and the International Strategy for Cyberspace, May 2011, addresses the critical shortage of professionals with these skills and highlights the importance of higher education as a solution to defending America’s cyberspace: “Like all nations, the United States has a compelling interest in defending its vital national assets, as well as our core principles and values, and we are committed to defending against those who would attempt to impede our ability to do so.” Education is the key to promoting these ideals.
This designation recognizes the accomplishments of IIT in the areas of cyber security and digital forensics education, spearheaded by the Department of Information Technology and Management (ITM) and the IIT Center for Cyber Security and Forensics Education (C2SAFE). The ITM Department’s key offering in this area is the Master of Cyber Forensics and Security degree, designed to help students, and experienced information technology professionals become cyber security and forensics practitioners, investigators, managers, and leaders. This degree is intended for students who are interested in cyber security, digital forensics, risk control, and information assurance, and draws on the extensive professional experience of our ITM faculty.
The Center of Academic Excellence (CAE) in Cyber Defense (CD) designation is a new designation based on updated academic criteria for Cybersecurity education and affords each CAE institution the opportunity to distinguish its strengths in specific focus areas. The updated criteria benefit not only the institution, but also students, employers and hiring managers throughout the Nation.
Official letters of notification of IIT’s designation were sent to the university, the Governor of Illinois, Members of Congress, and appropriate Congressional Committees. The official CAE Certificate will be awarded during a ceremony at the CAE Community Meeting being held in conjunction with the NICE (National Initiative for Cybersecurity Education) Conference in San Diego, California, November 3-4, 2015.
Jeremy Hajek’s, Industry Associate Professor of Information Technology and Management, comments appear in the article “Home Security Systems, Peripherals Said to Be Vulnerable to Hacking” in Security Sales & Integration magazine.
CBS Chicago Channel 2 News (WBBM) interviewed ITM Professor Louis McHugh for a story “ATM App Is Convenient, But Is It Secure?” about the security of ATM applications for mobile devices.
Ray Trygstad, ITM Associate Chair, Director of IT and Industry Professor, appeared on WGN News on Thursday, December 18. Professor Trygstad was interviewed for a story on the Sony Pictures cyber attack and the precedent they set by pulling the movie “The Interview.”
See the video (Professor Trygstad appears at the 1:41 mark)
The Best Paper Award at the 3rd annual Association for Computing Machinery’s Research in Information Technology conference was won this year by the IIT ITM student team of Maya Embar, Louis McHugh, and William Wesselman for their paper “Printer Water-Mark Obfuscation”. Also presenting at the conference was ITM student Ben Khodja ( “Probabilistically Detecting Steganography withinMP3 Files” ) and ITM alumnus David Stacey (“Passive Warden Using Statistical Steganalysis”). The IIT papers were presented at a session chaired by Industry Professor Ray Trygstad, Associate Chair of IIT’s Department of Information Technology and Management. The RIIT conference was held in conjunction with the annual conference of the ACM Special Interest Group for Information Technology Education, October 15-18, 2014 in Atlanta, Georgia. Congratulations to Maya, Louis, and Bill for this recognition of their accomplishment.
This is the second year that an IIT paper has won the Best Paper award at RIIT. At last year’s RIIT conference in Orlando, Dr. C. Robert Carlson, Dean of the IIT School of Applied Technology, along with Dr. Sargon Hasso, a former PhD student of Dr. Carlson’s, won the award for their paper “Design Patterns as First-Class Connectors”.
IIT undergraduate Information Technology and Management (ITM) student Eric Tendian competed in the Cyber Aces State Championship offered by the Illinois Department of Employment Security (IDES). The competition featured the top 125 participants from a year-long competition led by Gov. Pat Quinn to identify individuals with skills conducive to seeking a cybersecurity career in the military or private sector.
The competition included NetWars, a simulation utilized by the U.S. Air Force, and a discussion of ethics. NetWars covers topics including system hardening, packet analysis, digital forensics, and vulnerability assessment. The ethics panel consisted of two cybersecurity professionals and one FBI agent in the cyber division, and was facilitated by a former White House-level IT manager.
Eric won two awards in the NetWars tournament – he scored 2nd Overall and was the first to advance to Level 2. Eric was among only 3 participants in the Illinois competition to make it to Level 3 and was the only non-professional to finish in the top 3. Even more impressive is that Eric is a first-year IIT student.
Bill Slater, Adjunct Industry Professor of Information Technology and Management, encouraged Eric to participate in the competition because of his strong cyber security skills. Professor Slater stated “it is impressive that one of our IIT ITM undergraduate students placed 2nd in the state. Especially since Eric competed against cyber security professionals and students with more years of cyber security experience.”
Eric was featured as a 2013 Fifty For The Future award winner from the Illinois Technology Foundation that recognizes 50 of the brightest technology students in Illinois.
Several other IIT students participated in the competition. See the complete results of the Cyber Aces Online course, the precursor to NetWars, at https://online.cyberaces.org/event/results/2013Fall/0?state=IL®type=College.
Registration for the next round of Cyber Aces Online opens August 1st.
More info on the championship can be found at http://www.cyberaces.org/championships/ and http://www.chicagotribune.com/news/local/suburbs/palos/chi-illinois-hacking-competition-draws-cybersecurity-sleuths-of-tomorrow-20140302,0,4349193.story.
By Glenn Ferrell – IIT Alum and owner of gfWEBsoft LLC (http://www.gfwebsoft.com/)
Timing is everything, and students focusing on Information Technology and Management seem to be in exactly the right place at exactly the right time to take advantage of significant growth in cloud computing jobs.
7 Million New Cloud Computing Jobs by 2015
According to a Forbes review of an IDC report, sponsored by Microsoft, demand for “cloud-ready” IT workers will “grow by 26% annually through 2015. IDC expects that as many as 7 million new cloud-related jobs will be available worldwide by that time”. The author of the IDC report (Cushing Anderson) says that “Unlike IT skill shortages in the past, solving this skills gap is extremely challenging, given that cloud brings a new set of skills, which haven’t been needed in the past.”
Cloud-Related Positions Going Unfilled
According to the Forbes article, “lack of training, certification or experience” are the top three reasons cloud positions go un-filled. Anderson says several skill sets are key to building and maintaining cloud capabilities within organizations. These are listed in the table below, along with projected openings for 2015:
|Job Type||Openings by 2015|
|IT systems and operations||630,414|
|Project and program managers||555,591|
|Help desk and end-user support||549,241|
|Application development and maintenance||525,829|
|Network, telecom, security, and web development||481,411|
From IDC Report as Reported in Forbes 12/21/2012
In an earlier article Forbes’ writer Joe McKendrick suggested what IT professionals (future and present) should be learning in order to succeed in cloud-related jobs. His list seems to be right in line with the IDC report:
- Business and financial skills: Know how to make a business case and calculate an ROI for cloud.
- Technical skills: Java, .NET framework skills and knowledge of virtualization are important, and familiarity with open-source tools and languages is also valuable.
- Enterprise architecture and business needs analysis: Be able to build a “roadmap” for which services should be provided by IT and which by an outside provider. Learn to speak the language of business as well as the language of IT professionals
- Project management skills: Managing scope “creep”, contracts, service agreements and risk exposure are just some of the project management skills critical to implementing cloud. Cloud computing can cause end users to “run wild” with feature and service requests, so scope has to be contained. Also, remembering that cloud is supposed to cost less than equivalent on-premises services, skills in negotiating cloud vendors’ contracts, service level agreements and availability are critical to success.
- Security and compliance: Understanding security protocols is important in all types of cloud deployment. Additionally, regulations such as Sarbanes-Oxley and HIPAA have made navigating data-handling laws more complex. IT professionals with an understanding of both can be very valuable.
- Data integration and analysis skills: Inside we have ERP systems, data warehouses, etc. Outside we have cloud-based services. Those who can analyze both sides and implement sound data integration between the two will be in high demand.
- Mobile app development and management: The rise of mobile devices of all kinds has been key driver for the expansion of cloud solutions. A sound understanding of the basics is a valuable skill in cloud-implementation.
So how does the future look for those with a solid grounding in Cloud, Information Technology, and Management? All in all, it looks anything but cloudy.