News & Events


Commercial advancements in artificial intelligence and machine learning could level the playing field and lower the barrier of entry for smaller nation states, as well as non-state actors. (Andrzej Wojcicki)

Full Article
The National Institute of Standards and Technology (NIST) just reached a significant milestone with the release of the newest version of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework). Since 2011, the NICE Framework has provided a common lexicon to describe cybersecurity roles as well as a blueprint for effectively categorizing, organizing, and describing cybersecurity work. The NICE Framework has also been foundational to the development of cybersecurity training standards and individual career plans across sectors.

Full Article
Major IT company Hewlett Packard Enterprise allowed a source code review of ArcSight, a Pentagon cyber defense software, by a Russian defense agency according to Reuters. ArcSight is implemented across much of the U.S. military in order to alert analysts in real time when computer systems are being attacked.

Full Article
Network breaches should spur a new focus on STEM — and ethics. When the Soviet Union launched Sputnik in 1957, it was the space shot heard around the world. As the first artificial satellite circled the Earth, its radio pulses picked up by ground stations scattered across the globe, Western scientists recognized a technological breakthrough that threatened our national security. The United States answered with a “Space Race” that reshaped our educational system to produce scientists, engineers, and mathematicians. The growing list of major cyberattacks on this country amount to one modern-day Sputnik after another. A wide spectrum of private-sector entities, from banks and credit agencies to the entertainment industry, have faced attacks from foreign governments and intrusions from criminal enterprises. Infrastructure vital to energy, water, and communications is constantly probed by adversaries seeking asymmetric advantage;

Full Article
There are numerous articles and memos deal with the topic of incident response, business continuity, and crisis communication plans. Many have been distributed through media outlets even. So you may be asking: why us, why now, and what more could we possible offer in this space?

Full Article
TALLINN (Reuters) - European Union defense ministers tested their ability to respond to a potential attack by computer hackers in their first cyber war game on Thursday, based on a simulated attack on one of the bloc’s military missions abroad.

In the simulation, hackers sabotaged the EU’s naval mission in the Mediterranean and launched a campaign on social media to discredit the EU operations and provoke protests.

Each of the defense ministers tried to contain the crisis over the course of the 90-minute, closed-door exercise in Tallinn that officials sought to make real by creating mock news videos giving updates on an escalating situation.

Full Article
IT security provider Netwrix Corp. of Irvine, Calif. recently published its assessment of the top cyber risks in government.

The company found that the main threat comes from within.

All government entities surveyed named their own employees as the biggest cyber risk. “The main reason is bad experiences. In 2016, human errors caused security incidents in 57 percent of government entities,” the authors note.

Full Article
Dozens of business executives and technology experts in artificial intelligence and robotics have signed an open letter to the United Nations calling for public deliberation on the potential threats that could arise from “lethal autonomous weapons systems.”

The letter urges a U.N. Group of Governmental Experts “to work hard at finding means to prevent an arms race in these weapons, to protect civilians from their misuse, and to avoid the destabilizing effects of these technologies.” The U.N.’s Conference of the Convention on Certain Conventional Weapons established the GGE, which Ambassador Amandeep Singh Gill of India will chair.

Full Article
The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 industry professionals, out of the 100 questioned, said they thought the first AI-enhanced cyberattack could come in the next 12 months.

This doesn’t mean robots will be marching down Main Street. Rather, artificial intelligence will make existing cyberattack efforts — things like identity theft, denial-of-service attacks and password cracking — more powerful and more efficient. This is dangerous enough — this type of hacking can steal money, cause emotional harm, and even injure or kill people. Larger attacks can cut power to hundreds of thousands of people, shut down hospitals and even affect national security.

Full Article
Regent University recently hosted its first ever Air Force Association’s (AFA) CyberCamp on campus in Virginia Beach, Virginia. High school students from area public and private schools attended the five-day event to learn about cyber ethics, online safety, cyber threats and cybersecurity principles.

Full Article


College of Arts and Sciences Cybersecurity / Computer Science Forum

Wednesday, October 25 | 7 PM
COM 105

Mr. Jeff Silver is a Senior Security Engineer at Symantec, helping enterprises to increase their security posture. In this forum, Mr. Silver Jeff did a terrific job of helping the students understand what a career in cybersecurity might look like, and included descriptions of the following jobs: • Developer • Forensics Analyst • Administration • Law Enforcement/DoD • Implementation (post sales) • Security Operations Center Analyst • SE (pre sales)

Cybersecurity Summit

Thursday, February 15 | 9 am - 2 pm
Save the date

Leading cyber experts will discuss threats facing your organization and offer practical solutions.

Registration Opens November 15, 2017

Download PDF

Early Synthetic Prototyping

Wednesday, November 8 | 7 pm
COM 105

LTC Brian Vogt, Early Synthetic Prototyping Project Lead (ESP), gave a detailed explanation of the Early Synthetic Prototyping project, including issues related to building a coalition (when you don’t have a budget!), working with partners from all sorts of different academic and military organizations, overcoming passive bureaucratic resistance and ‘we’ve never done it that way’ attitudes, etc. He also showed videos of actual games, discussed the use of commercial game analytics to gather feedback, and indicated that they would use 3D video in the future (the Unreal 4 engine they are using will support 3D). The event ran long (both questions from the group, and those who lingered to continue the discussion).

5th National Women in Cybersecurity Conference

Friday, March 23 | 8am-5pm, 23-24 March
Hilton Chicago Downtown

Jointly organized by Tennessee Tech and Illinois Institute of Technology, the WiCyS conference is intended to generate interest among students to consider cybersecurity as a viable and promising career option. Any individual or organization interested in supporting recruiting and retention efforts for women in cybersecurity is encouraged to participate. Beyond the annual conference, WiCyS is a community of engagement, encouragement and support for women in cybersecurity. Scholarships are available for students; the deadline to apply is 1 November.

Learn More

The International Information Systems Security Certification Consortium Meeting

Wednesday, September 27 | 6 - 8 PM
Freeman Building, Room 202, Christopher Newport University

The Hampton Roads ISSA group Meeting

Tuesday, October 3 | 6 - 8 PM
Booz Allen Hamilton Building, Suite 450, 5800 Lake Wright Dr., Norfolk, VA 23502

The Yorktown ISSA group group Meeting

Tuesday, October 10 | 6 - 8 PM
ECPI building in Newport News

Take the Next Step