News & Events


A recent digital attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. And while security researchers offered some analysis last month of the malware used in the attack, called Triton or Trisis, newly revealed details of how it works expose just how vulnerable industrial plants—and their failsafe mechanisms—could be to manipulation.

Full Article
Commercial advancements in artificial intelligence and machine learning could level the playing field and lower the barrier of entry for smaller nation states, as well as non-state actors. (Andrzej Wojcicki)

Full Article
There are numerous articles and memos deal with the topic of incident response, business continuity, and crisis communication plans. Many have been distributed through media outlets even. So you may be asking: why us, why now, and what more could we possible offer in this space?

Full Article
IT security provider Netwrix Corp. of Irvine, Calif. recently published its assessment of the top cyber risks in government.

The company found that the main threat comes from within.

All government entities surveyed named their own employees as the biggest cyber risk. “The main reason is bad experiences. In 2016, human errors caused security incidents in 57 percent of government entities,” the authors note.

Full Article
The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 industry professionals, out of the 100 questioned, said they thought the first AI-enhanced cyberattack could come in the next 12 months.

This doesn’t mean robots will be marching down Main Street. Rather, artificial intelligence will make existing cyberattack efforts — things like identity theft, denial-of-service attacks and password cracking — more powerful and more efficient. This is dangerous enough — this type of hacking can steal money, cause emotional harm, and even injure or kill people. Larger attacks can cut power to hundreds of thousands of people, shut down hospitals and even affect national security.

Full Article
Regent University recently hosted its first ever Air Force Association’s (AFA) CyberCamp on campus in Virginia Beach, Virginia. High school students from area public and private schools attended the five-day event to learn about cyber ethics, online safety, cyber threats and cybersecurity principles.

Full Article
Officials with the Institute for Cybersecurity at Regent University, an academic center and training facility dedicated to equipping the next generation of cybersecurity professionals in industry, government, military and academia, announced today that Regent is building a state-of-the-art cyber range training facility.

Full Article


College of Arts and Sciences Cybersecurity / Computer Science Forum

Wednesday, October 25 | 7 PM
COM 105

Mr. Jeff Silver is a Senior Security Engineer at Symantec, helping enterprises to increase their security posture. In this forum, Mr. Silver Jeff did a terrific job of helping the students understand what a career in cybersecurity might look like, and included descriptions of the following jobs: • Developer • Forensics Analyst • Administration • Law Enforcement/DoD • Implementation (post sales) • Security Operations Center Analyst • SE (pre sales)

Cybersecurity Summit

Thursday, February 15 | 9 am - 2 pm
Save the date

Leading cyber experts will discuss threats facing your organization and offer practical solutions.

Registration Opens November 15, 2017

Download PDF

Early Synthetic Prototyping

Wednesday, November 8 | 7 pm
COM 105

LTC Brian Vogt, Early Synthetic Prototyping Project Lead (ESP), gave a detailed explanation of the Early Synthetic Prototyping project, including issues related to building a coalition (when you don’t have a budget!), working with partners from all sorts of different academic and military organizations, overcoming passive bureaucratic resistance and ‘we’ve never done it that way’ attitudes, etc. He also showed videos of actual games, discussed the use of commercial game analytics to gather feedback, and indicated that they would use 3D video in the future (the Unreal 4 engine they are using will support 3D). The event ran long (both questions from the group, and those who lingered to continue the discussion).

5th National Women in Cybersecurity Conference

Friday, March 23 | 8am-5pm, 23-24 March
Hilton Chicago Downtown

Jointly organized by Tennessee Tech and Illinois Institute of Technology, the WiCyS conference is intended to generate interest among students to consider cybersecurity as a viable and promising career option. Any individual or organization interested in supporting recruiting and retention efforts for women in cybersecurity is encouraged to participate. Beyond the annual conference, WiCyS is a community of engagement, encouragement and support for women in cybersecurity. Scholarships are available for students; the deadline to apply is 1 November.

Learn More

The International Information Systems Security Certification Consortium Meeting

Wednesday, September 27 | 6 - 8 PM
Freeman Building, Room 202, Christopher Newport University

The Hampton Roads ISSA group Meeting

Tuesday, October 3 | 6 - 8 PM
Booz Allen Hamilton Building, Suite 450, 5800 Lake Wright Dr., Norfolk, VA 23502

The Yorktown ISSA group group Meeting

Tuesday, October 10 | 6 - 8 PM
ECPI building in Newport News

Take the Next Step