The Brandeis GPS blog

Insights on online learning, tips for finding balance, and news and updates from Brandeis GPS

Tag: Information Security (page 2 of 3)

Ask the Expert series recap with Barbara McNamara

On April 19, we hosted Barbara McNamara, former Deputy Director of the National Security Agency, for our Ask the Expert series. Ms. McNamara captivated us not only with her deep knowledge of the information security industry, but also by her life story and the doors she has opened for other women in technology.

barbara-mcnamara-ask-the-expert

A graduate from Regis College, the Armed Forces Staff College, and the National War College, Barbara McNamara was the first woman named Deputy Director of Operations of the National Security Agency in 1994. In 1997, she became the agency’s Deputy Director and was just the second woman to hold that position. Three years later, she received the U.S. Intelligence Community’s highest award, the National Intelligence Distinguished Service Medal. At the time, she was one of the highest-ranked women in the U.S. intelligence community.

“People have been protecting their communications since the War of Independence”

Following an introduction by Michael Corn, the chair of the MS in Information Security Leadership program at GPS, Ms. McNamara discussed the history of information security in the United States. She talked about the critical role information security played during the World Wars, particularly focusing on advances in cryptography and code-breaking that occurred during World War II. She then covered the NSA’s role in protecting national security during the decades that followed — this period was characterized by a struggle to get information security equipment to field-based members of the military. While Ms. McNamara constantly stressed the importance of defending and protecting information as technology continuously evolves, another running theme from her conversation and concluding Q&A session is that those with a background in information security industry are “very wanted” and valued by many industries within the workforce.

“People in information assurance are about to enter the most exciting and challenging times of their lives.”

Our Ask the Expert event ended with a Q&A that addressed questions ranging from the measures current high-level security agents take while traveling abroad to U.S. preparedness for a cyberwar to Ms. McNamara’s career advancement in a male-dominated field. Ms. McNamara quipped that despite no plans to write a book, the title of her memoir would be “In a Man’s World.”

It was a pleasure to host Ms. McNamara at GPS and we look forward to our next Ask the Expert event.

Watch our Ask the Expert recording here

Job Opportunity: Blue Cross Blue Shield of Massachusetts

Blue Cross Blue Shield of Massachusetts is hiring an Identity & Access Management Administrator to work out of its Hingham office (with occasional travel to branches in Boston and Quincy).

BCBSMA partners with GPS to offer tuition discounts to their employees, and we are excited to share this opportunity with our community. Apply here.

Identity & Access Management Administrator

We have an exciting opportunity for an IAM Account & Access Administrator, will be responsible for administration of various BCBSMA applications security. This role requires experience working with large scale IAM solutions, developing and executing operational processes and aligning tightly with business needs. The primary deliverable for this person is to govern and administer the accounts and access including mainframe applications.

Responsibilities:

  • The Security Administrator will be accountable for initiating the process for creating user access and timely notification of ID’s and passwords enterprise wide.
  • Provide IT Security governance and collaborate with external vendor Security personnel, Help Desk and BCBSMA business area SME.
  • Administrators to provide effective communication and appropriate authorized access.
  • Coordinate and review reporting/tracking on status of access to legacy systems, remote access, and internal LAN based systems.
  • Support requests for remote access.
  • Streamline and ensure removal of all account access for associates and non-associates that have terminated employment or services with BCBSMA. Must also integrate and maintain HR and audit termination requirements.
  • Implement and support day-to-day computer security controls including but not limited to creating access and control, monitoring, security awareness relating to BCBSMA mainframe, Active Directory, desktop computers, and VPN.
  • Consult, Implement, and manage access associated with e-commerce products.
  • Develop and support audit related reporting to business for protected business groups, products & access types.
  • Other relevant job duties as assigned or required by IT/Business to support environment changes.

Education and Experience

  • Bachelor’s degree in Computer Science, Information Systems or equivalent related field preferred.
  • Minimum of 1 year of experience in Information Technology is required.
  • Experience with Microsoft Windows, Active Directory and LDAP is highly desired.
  • Previous Identity and Access Management (IAM) experience is preferred.
  • Experience with Mainframe, Unix and/or Solaris is a plus.

SPOTLIGHT ON JOBS: Commonwealth Financial Network (Two Positions)

spotlight-CHANGED-300x200SPOTLIGHT ON JOBS

Members of the Brandeis GPS Community may submit job postings from within their industries to advertise exclusively to our community. This is a great way to further connect and seek out opportunities as they come up. If you are interested in posting an opportunity, please complete the following form found here.

Where: Commonwealth Financial Network-Waltham, MA

Position: Information Security Analyst

As part of the Information Security team, you will be helping to ensure that the company’s information resources are secure from unauthorized access and protected from inappropriate alteration, while supporting the needs of Commonwealth users. Doing so will have you operating as an in-house consultant, responsible for designing, implementing, supporting, and maintaining policies and security solutions in both operational and customer-hosted environments.

Click here to view further details on this opportunity!


 

Position: Information Security Marketing and Training Specialist

Raising awareness and educating end users are the two best lines of defense when it comes to protecting a company’s information security. As the marketing and training specialist, you will help the company do just that. By developing, coordinating, and delivering a variety of security-focused training and marketing content, you will be helping to promote Commonwealth and industry best practices throughout the organization.

Click here to view further details on this opportunity!

 

To receive full consideration for these positions, candidates are asked to submit a Resume/CV and cover letter to the careers site.

Please make sure to reference seeing these positions through the Brandeis GPS job spotlight post.

Not subscribed to our blog?

Click here to subscribe!

Footerindesign

In Case You Missed It: Moshe Kai Cavalin our 17-year-old M.S. in Information Security Student

He’s 17, he can’t drive a car, he can’t vote and he can’t have a drink to celebrate his success. Moshe Kai Cavalin is just your typical teenager from San Gabriel, California.

Except he had two college degrees by 15, flies planes and interns at NASA. He graduated from community college at 11, and finished a bachelor’s in math from the University of California, Los Angeles at age 15. Now he is sending his talents to Brandeis Graduate Professional Studies.

Cavalin will be taking online courses in information security shortly after his bouts with NASA (where he is helping develop surveillance technology for airplanes and drones). We cannot wait to welcome such a talented individual into our program. Until then, learn more about Cavalin here.

Footerindesign

Are you protected?

by: Scarlett Huck

Have more questions? Want to learn more? Don’t miss our #AskTheExpert event with Cyber Security Strategist and Evangelist at Intel Corporation, Matthew Rosenquist! You can RSVP here.

2015 has certainly not been deprived of threats and successful hackings into cyberspace. With big business companies such as Home Depot, Target, Staples,  and Sony under fire, it is hard to believe that anyone is safe.

Why does this continue to be a growing concern? Who are behind these attacks? Survey says that more than half of reported incidents were staff-related. These breaches included, but were not limited to: “unauthorized access to data, breach of data protection regulations, and misuse or loss of confidential information”. When dealing with staff-related issues, there are certain precautions that can be taken. The first is to make sure employers are informed of the risks and of the data protection laws and the consequences of breaking them. It is also important to make sure employers are not tricked into divulging secure information via over-the-phone scams.

Attacks
But what about the other half of attacks that are not employee based? These are the attacks that tend to be more deliberate and malicious. For example, take the Impact Team. This is a group of hackers who are hacking for what they believe to be ‘good’. In a quote directly from the group they stated they plan to hack “[a]ny companies that make 100s of millions profiting off pain of others, secrets, and lies. Maybe corrupt politicians. If we do, it will be a long time, but it will be total.” The team is currently best known for their hack of the adultery-encouraging website Ashley Madison. The hackers demanded the site be taken down immediately or the personal information of Ashley Madison’s clients would be released in 30 days. When these terms were not met, a list of names and email addresses of the site’s users was released in order to expose them for their infidelity. Situations like this are becoming known as “hacktivism,” or the act of hacking for a politically or socially motivated purpose.

AttackDist
With attacks occurring every day, it is important to remember to protect yourself. The Department of Homeland Security offers many tips including using proper passwords and privacy settings, thinking before you post on social media and being cautious of what you download. It is also important to be cautious if you run a small business, which are commonly hacked due to lack of security. As far as big business is concerned, larger strides must be taken. Business Insider recommends the steps that must be taken to prevent future attacks, President Obama is currently requesting $14 billion in the 2016 budget proposal in order to tighten government cybersecurity and laws regarding cybersecurity and data protection are becoming stricter. Within the near future, there is hope for the decrease in cyber attacks.

Have more questions? Want to learn more? Don’t miss our #AskTheExpert event with Cyber Security Strategist and Evangelist at Intel Corporation, Matthew Rosenquist! You can RSVP here.

 

Not subscribed to our blog?

Click here to subscribe!

 

Footerindesign

“Ask the Expert” Special Event Webinar

InfoBubblez22

“Ask the Expert: Cyber Security” 

Led by Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corporation

Wednesday, October 21st at 7pm via Adobe Connect

Matt’s areas of expertise include :
  • Security industry advocacy
  • Security strategy and planning
  • Security operations management
  • Platform security product/service development and sustaining operations
  • Emergency/Crisis response command, control, and communications
  • Security policy development, training, and compliance oversight
  • M&A information security strategy and management
  • Security product strategic planning
  • Technical and behavioral risk assessment and threat analysis
  • Determination of security business value and ROI
  • Threat Agent Risk Assessment (TARA) methodology
  • Internal and external investigations
  • Corporate consulting for risk management and strategic alignment
  • Security industry outreach, evangelism, speaker, and champion

 

RSVP here

 

MatthewRosenquist-Oct.21Webinar

Matthew Rosenquist joined Intel Corp in 1996 and benefits from over 20 years in the field of security. Mr. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities and organizations which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this industry leading organization which brings together security across hardware, firmware, software and services.

The community can connect with Matthew via Twitter @Matt_Rosenquist, Intel Blog and LinkedIn.

 

Increasing Interest in Cybersecuirty Education and Careers

Matthew Rosenquist

Written by:  Cybersecurity Strategist and Evangelist at Intel Corporation

The world is facing a growing problem as people’s everyday lives are becoming more digital and increasing our reliance on cybersecurity to protect our interests, yet there are not enough security professionals to fulfill the rising demands.  This leaves gaps in the security of companies and organizations we share information with.  There is hope on the horizon.  Academia is adjusting to increase the training of graduates and there is a rising interest in students to study the variety of cybersecurity domains.  But more students are needed as demand is far outpacing the expected rise in available talent.

All the right elements are in place.  Pay for cybersecurity is on the rise, the needs for an estimated 1.5 million jobs is already growing, and higher education institutions are working collaboratively to establish the training infrastructure necessary for the next generation of security professionals to be prepared for success.  What is missing are the necessary numbers of students.  There simply is not enough.

The good news is millennials are interested, but need more information in order to commit.  Survey results from the Raytheon-NCSA Millennial report show the most prevalent factor for prospective students to increase their interest, is being provided data and expertise to explain what jobs entail.

Providing basic career information is absolutely possible but not as simple as it may seem.  Job roles do morph very rapidly.  Some data suggests as often as every nine months security professionals see their role, expectations, and focus being shifted into new areas or vary radically.  With such a rapid rate of change, cybersecurity is truly a dynamic domain where responsibilities are fluid.  This is not likely to turn off prospective millennials, as they are a generation which embraces diversity.  It may in fact, contribute to the attractiveness of these careers.  Combined with a strong employability and excellent pay, the industry should have no problem filling desk seats in universities.

What is needed right now are for experienced professionals to step up and work with educational institutions to explain the roles and responsibilities to the pool of prospective students.  Open forums, virtual meetings, presentations, in-class instruction, and even simple question-and-answer sessions can go a long way in painting a vivid picture of our industry, opportunities, and challenges which await.  The community should work together to attract applicants to the cyber sciences, especially women and underrepresented minorities who can bring in fresh ideas and perspectives.  I urge higher education institutions to reach out to the security community professionals and ask for help.  Many are willing to share their perspectives and industry knowledge to help inform students and encourage those who might be interested in a career in cybersecurity.  Only together can the private sector and academia help fulfill the needs for the next generation of security professionals.

TwitterIconFollow Matt on Twitter: @Matt_Rosenquist

Interested in Cyber Security? Join our #AskTheExpert session with Matthew Rosenquist! RSVP here

Footerindesign

 

SPOTLIGHT ON JOBS: CIA and U.S Department of State

spotlight-CHANGED-300x200SPOTLIGHT ON JOBS

Members of the Brandeis GPS Community may submit job postings from within their industries to advertise exclusively to our community. This is a great way to further connect and seek out opportunities as they come up. If you are interested in posting an opportunity, please complete the following form found here.

Where: Central Intelligence Agency (CIA) and U.S Department of State, in-person recruiting opportunity

For those students in or around the Waltham, MA area, the Central Intelligence Agency (CIA) and the U.S Department of State are sending recruiters and expert area professionals to Brandeis in the next couple of weeks to recruit students. In particular, the CIA is looking for students with foreign language, economic and STEM experience.

Please see the recruiting sessions listed below and make sure to register.  You can find a map of the Brandeis Campus here.

Central Intelligence Agency (CIA) Information Session – all majors and programs

Central Intelligence Agency (CIA) Tech Information Session

U.S. Department of State Information Session – all students, majors

Make sure to reference seeing this position through the Brandeis GPS job spotlight post.

Not subscribed to our blog?

Click here to subscribe!

Footerindesign

An Educational Journey

Written by: Sivasankar Veerabhadran, May 2015 graduate from Brandeis GPS‘ M.S. in Information Security and Consultant Solutions Engineer at EMC

Twenty-five years ago, I received my Bachelor’s degree in Electronics and Communication Engineering from a university in India. Ever since graduating I wanted to pursue my Master’s degree from a highly regarded university in the United States. My dream finally came true this spring as a result of the commitment to continuing education for working professionals (like myself)from both EMC Corporation & Brandeis University.

Working in Information Technology, it is extremely important to keep up-to-date with the technology and skills needed to excel in the current global market. I strongly felt that I should not invest my time and effort on education at this stage of my life just to get another degree. Instead, my education should guide me and give me the confidence to take my career to the next level. In addition, if it is SankarBlog2in one of the relevant technical fields like Information Security from a highly regarded university like Brandeis, it is a huge plus.

Some of the following courses offered as  part of my Master’s degree program are my favorite ones. In addition to learning from the professors, text books, and related materials, I learned a lot from fellow students and their real world working experiences, who all are professionals with extensive knowledge in their respective fields.

I have to say this, while looking for the options to continue my education at various universities, the integration of Brandeis GPS courses with our internal Educational Services portal at EMC, and the related approval work flow model was one of the reasons I have decided to start and continue my professional studies with Brandeis University. The process was as easy as signing up for any internal training courses.

SankarBlog

Sankar & his student advisor, Janice

I really would like to express my thanks and appreciation to our student advisor Janice Steinberg for all the advice provided to me during the entire program. I really thought that after all these years getting the “Education Credential Evaluation” done for all my old school diplomas and college degrees completed in India must be a huge process.  Janice helped me with the whole process and made it so simple  that I could apply for the actual program after a long break with 4 courses.

Along with my wife, kids, family, and parents, my manager Charlie Dellacona also motivated me a lot to complete this degree. He always insisted on the importance of education along with experience for professionals like us to advance our career to the next level. A bit of his advice, “Sankar, education is the best investment you can make for yourself and also for your family, which is always  yours no matter where life takes you,” this was the greatest motivational factor.

As per my professor’s advice, I am currently working on  getting “Certificate of Cloud Security Knowledge (CCSK) “ & Certified Information Systems Security Professional (CISSP) certifications. I am looking forward to contribute a lot to Cloud security based initiatives.

Click here to subscribe to our blog!

Footerindesign

 

Brandeis GPS Commencement Wrap-Up

Written by: Kelsey Whitaker, A Senior at Brandeis University

StudentMarshall

Amyntrah Maxwell & Rabb VP Karen Muncaster

On May 17th, to the sounds of “Pomp and Circumstance”, the Rabb School of Graduate Professional Studies‘ class of 2015 donned their caps and gowns and received their diplomas. The ceremony awarded Master’s degrees in various fields  including: Bioinformatics, Health and Medical Informatics, Information SecurityIT ManagementProject & Program Management and Software Engineering. Students sat proudly and  enjoyed the student and main commencement speaker’s words of wisdom for their future.   As working professionals in their respective fields, each degree recipient juggled work, school, and personal  matters in order to earn their master’s degree.

Luis

Student speaker, Louis Rosa III

The student speaker for the day was Louis Rosa III, who earned his Doctor of Medicine from Georgetown University’s School of Medicine and has over 30 years of experience in the fields of neurosurgery and radiation therapy. However, the day of commencement Rosa walked out with a newly earned diploma in Health and Medical Informatics. After all of his experience, why did Rosa pursue his degree from Brandeis GPS? “No matter how many patients I saw, I couldn’t have enough of an impact,” Rosa explained. Rosa went on to explain the impact his new degree would have on his career and his life.

The main Commencement speaker, Curtis H. Tearte, is a 1973 Brandeis graduate and also a  current Board of Trustees member. Tearte has vast experience in technology and business as former director, vice president and general manager of IBM “My experience at Brandeis exponentially changed the arc of my life,” he explained to the graduates. Tearte is also the founder of Tearte Associates, a firm dedicated to seeking out students with academic potential to become Tearte Scholars through his Family Foundation. His advice to the graduates was, “Keep putting out good and it will come back to us tenfold in unexpected ways.”

Commencement speaker, Curtis H. Tearte

In addition to the speakers, the Outstanding Teacher Award Recipient was presented to Leanne Bateman. Teaching at Brandeis since 2007, Bateman serves as Academic Program Chair and a faculty member for Project and Program Management and Strategic Analytics. Congrats, Leanne!

Congratulations to the 2015 graduates! You did it! Good luck in all your future plans and endeavors.

Want to see the live stream of commencement? You’re in luck! Watch it here.

Click here to subscribe to our blog!

Footerindesign

 

« Older posts Newer posts »

Protected by Akismet
Blog with WordPress

Welcome Guest | Login (Brandeis Members Only)