Cybersecurity
Resources
New Career Pathway Programs
General Resources
Overview
- Virginia Cyber Range
(Virginia Tech)
- Cybersecurity (U.S. Department of Homeland Security)
- Cyber Security Information Portal (Commonwealth of Virginia)
- Law Enforcement Cyber Center (International Association of Chiefs of Police)
- Cyber Security Primer (University of Maryland)
Current News (journals, newsletters online)
Trends & Issues
- State of Cybersecurity—Implications for 2016 (ISACA, formerly Information Systems Audit and Control Association)
- The Global Risks Report 2016, 11th Ed. (World Economic Forum)
- The Global State of Information Security Survey 2016 (PricewaterhouseCoopers)
- Global Economic Crime Survey 2016: US Results (PricewaterhouseCoopers)
- Cybersecurity [in Federal Agencies] (U.S. Government Accounting Office)
- Why Corporate Directors Need to Get Real about Cyber Security (CIO)
- 5 Cybersecurity Trends to Watch for 2016 (NetworkWorld)
- 10 Cyberthreat Predictions for 2016 (Risk Management)
Cybersecurity Education
- NICERC Curricula (National Integrated Cyber Education Research Center)
- National CyberWatch Center K-12 (National Science Foundation)
- Cybersecurity Competency Model (CareerOneStop: Competency Model Clearinghouse)
- iForce Curriculum (Institute for Cyber Education)
- CyberPatriot: The National Youth Cyber Education Program (Air Force Association)
- Saving the World with CS--Cyber Security learning standards (Computer Science Teachers Association)
- OnGuardOnline.gov: Computer Security (Federal Trade Commission, et al.)
Student Safety Online
- StaySafeOnline (National Cyber Security Alliance)
- A Parent’s Guide to Internet Safety (U.S. Federal Bureau of Investigation)
- OnGuard Online (U.S. Federal Trade Commission)
- ISC2 Center for Cyber Safety and Education (International Information Systems Security Certification Consortium)
- Cybersecurity 101 video (Education World)
- Cyberbullying Research Center (Cyberbullying.org)
Careers in Cybersecurity
- NICCS: Careers (U.S. Department of Homeland Security)
- National Cybersecurity Workforce Framework (U.S. Department of Homeland Security)
- CyberCorps: Scholarships for Service (U.S. Office of Personnel Management)
- Cyber Surety (U.S. Air Force)
- Security Pros in High Demand, Highly Paid, and Highly Selective (CIO)
- Women in Security: Wisely Positioned for the Future of InfoSec (ISC2 study)
- How to Land a Cybersecurity Job (Network World)
- So You Want to Work in Cybersecurity (National Cyber Security Alliance)
- Careers in Cybersecurity (Lord Fairfax Community College)
- Occupation Profile (Virginia): Information Security Analysts (CareerOneStop)
- Information Security Analyst (U.S.News & World Report—Careers)
- Information Security Analysts (Virginia Career VIEW) Note: Click on Career Search and search for Information Security Analysts.
Cybersecurity in Career Clusters
Agriculture, Food, and Natural Resources
- Food and Agriculture Sector (U.S. Dept. of Homeland Security)
- Homeland Security News Wire: Agroterrorism is a major threat to America: Experts (U.S. Dept. of Homeland Security)
- Cybersecurity (U.S. Department of Agriculture)
- What Does Cybersecurity Have To Do with Our Food Supply? (National Cybersecurity Institute at Excelsior College)
- Midwest Agriculture Is a Prime Target for Theft of Intellectual Property and Cyber Attacks (Successful Farming)
- Agriculture Giants Boost Cybersecurity to Shield Farm Data (Wall Street Journal)
- Architecture and Construction
- Cybersecurity (Electric Light & Power)
- Cybersecurity in the Construction Industry (Holland & Knight)
- SmartGrid.gov (U.S. Department of Energy)
- Are Smart Homes Cyber-Security Smart? (enisa)
- How Vulnerable Are Smart Buildings to Cyber Attacks? (IFSEC Global)
- Whole Building Design Guide: Cybersecurity (National Institute of Building Sciences)
Arts, Audio/Video Technology and Communications
- Cyber-Security: Computer and Online Safety Tips (Studio Protector, The Artist’s Guide to Emergencies)
- Global Media, Communication Technology, and the War on Terror (Global-e: A Global Studies Journal)
- Computer Crime and Intellectual Property (U.S. Department of Justice)
- New Terrorism and New Media (Wilson Center)
- Digital Security (Global Investigative Journalism Network)
- Going Dark Issue (Federal Bureau of Investigation)
- Communications Sector (U.S. Department of Homeland Security)
Business Management and Administration
- Cybersecurity: The New Business Priority (PricewaterhouseCoopers LLP)
- Cybersecurity for Small Business (Federal Communications Commission)
- Implement a Cybersecurity Plan (National Cyber Security Alliance)
- Cybersecurity Awareness Basics (Federal Deposit Insurance Corporation)
- How to Protect Your Business from Ransomware (Information Security Media Group)
- Keep My Business Safe (StaySafeOnline)
- Cybersecurity (U.S. Small Business Administration)
- Cybersecurity toolkit, including Internet Security Essentials for Business 2.0 (U.S. Chamber of Commerce)
- Electronic Crimes Task Force (U.S. Secret Service)
Education and Training
- National Initiative for Cybersecurity Careers and Studies (National Initiative for Cybersecurity Careers and Studies)
- NICCS Curriculum Resources
- The Teacher’s Guide To Keeping Students Safe Online (Edudemic)
- Cybersecurity at the District Level (AASA)
- Cybersecurity in K-12: Tips for keeping schools, students secure (fedscoop)
- Academic Engagement (U.S. Department of Homeland Security)
- Cyber Games and Programming (National Initiative for Cybersecurity Careers and Studies)
- CloudPassage Study Finds U.S. Universities Failing in Cybersecurity Education (Market Wired)
- Cyber Security and Cyber Forensics Infusion Units (Virginia Department of Education, CTE)
Finance
- Cybersecurity: Balancing Customer Needs with Financial Controls (Association of Chartered Certified Accountants)
- Tax Scams/Consumer Alerts (Internal Revenue Service)
- Financial Services Sector (U.S. Department of Homeland Security)
- Cybersecurity Resource Center (Securities Industry and Financial Markets Association)
- 5 Ways to Improve Your Online Banking Security (USA Today)
- Are you ready for the cybersecurity challenges of 2016? (AmericanBanker)
- Cybersecurity and Identity Theft (National Association of Insurance Commissioners & The Center for Insurance Policy & Resource)
- When It Comes to Cybersecurity Millennials Throw Caution to the Wind (U.S. News & World Report: Money)
- A Bank Customer’s Guide to Cybersecurity (Federal Deposit Insurance Corporation)
- A Guide to Cyber Risk: Managing the Impact of Increasing Interconnectivity (Allianz)
Government & Public Administration
- Cybersecurity Awareness (National Association of State Chief Information Officers)
- CyberVirginia: Cyber Security Information Portal (Commonwealth of Virginia)
- 4 Critical Challenges to State and Local Government Cybersecurity Efforts (Industry Perspective) (Government Technology)
- The Cybersecurity Challenges Facing State and Local Governments (Infosecurity Magazine)
- The Role of Local Law Enforcement Agencies in Preventing and Investigating Cybercrime (Commission on Accreditation for Law Enforcement Agencies, Inc.)
- Why Smart Cities Need to Get Used to Security—and Fast (The Guardian)
- Cybersecurity Insurance (U.S. Department of Homeland Security)
- Office of the Coordinator for Cyber Issues (U.S. Department of State)
Health Science
- Understanding and Preventing Medical Identity Theft (HealthIT.gov)
- Cybersecurity: A Shared Responsibility (HealthIT.gov)
- Top Ten Tips for Cybersecurity in Health Care (HealthIT.gov)
- How the Internet of Things Will Affect Health Care (Hospitals & Health Networks)
- HRI’s Top Ten Health Industry Issues of 2016—Issue 4: Cybersecurity (Pricewaterhouse Coopers)
- Privacy/Security (HCI Healthcare Informatics)
- Hack Attack: Cybersecurity Vulnerability of Medical Devices (American Bar Association)
- Wireless Medical Infusion Pumps Fact Sheet (National Cybersecurity Center of Excellence)
- Wearable Technology for Nurses (Nursing World)
- Cyber Security for Dental Practices (Dentistry Today)
Hospitality & Tourism
- Hospitality & Casinos (Security)
- How To Implement a Cyberattack Protection Plan (Hotel News Now)
- Hospitality Industry: Connecting the Unconnected, The Internet of Everything (Hospitality Upgrade)
- Protect Your Restaurant’s Cybersecurity: A Guide for Restaurants (National Restaurant Association)
- Should I Be Worried about Cybersecurity While Traveling? (Travel+Leisure)
- Guard Your Business Against Data Breaches—and Liability (Travel Weekly)
- Is Your Tourism Business Protected Against a Cyber Attack? (Adventure Travel Trade Association)
- Airbnb: Trust and Safety (airbnb)
- A Framework for Aviation Cybersecurity (American Institute of Aeronautics and Astronautics)
Human Services
- Cyber Terrorism Triggers Severe Psychological, Physical Stress, Haifa Researchers Show (The Jerusalem Post)
- The Impact of Terrorism and Disasters on Children (American Psychological Association)
- FedCyber: Health and Human Services
- Cyber Aware? Know the Top Internet Scams (AARP)
- Aging: Elder Justice (U.S. Department of Health and Human Services)
Information Technology
- Center for Internet Security
- Defining Cyberwarefare…in Hopes of Preventing It (TED Ed Lesson)
- Hackers and Cybercrime Prevention (Computer Weekly)
- Information Technology News (Science Daily)
- Security (Info World)
- Security (InformationWeek)
- ComputerWorld
- Microsoft Safety and Security Center
- Filing a Report with the IC3 (Federal Bureau of Investigation: Internet Crime Complaint Center)
Law, Public Safety, & Corrections
- How the Internet of Things Is Transforming Law Enforcement (Network World)
- Introduction to Biometrics (Biometrics.gov)
- Cyber Crime (Federal Bureau of Investigation)
- Internet Crime Schemes (Federal Bureau of Investigation)
- Combating Cyber Crime (U.S. Department of Homeland Security)
- Homeland Security News Wire
- Cybersecurity (U.S. Department of Homeland Security)
- Virginia State Police: Cyber Security
Manufacturing
- Manufacturing and Cyber Security: A 5-Step Process To Create Internal and Customers’ Peace of Mind (Cerasis)
- NIST Updates ICS Cyber Security Guide (Security Week)
- Countering Advanced Persistent Threats (Computer Sciences Corp.)
- Homeland Security: Critical Manufacturing Sector (U.S. Department of Homeland Security)
- Top Cyber Threats for U.S. Companies (Bloomberg)
- What Manufacturers Need to Know about Cybersecurity (Industry Week)
- Marketing
- What Fashion Needs to Know about Cybersecurity (Business of Fashion)
- Cybersecurity (Small Business Administration)
- Mobile Security (National Retail Foundation)
- Data Security (National Retail Foundation)
- Bank Info Security
- Isis Is Refining Terrorist Marketing, by Jim Armitage (Independent)
- How Terrorist Attacks Influence Consumer Behaviors (Psychology Today)
Science, Technology, Engineering, and Mathematics
- Cybersecurity (IEEE)
- The Future of Anti-Terrorism Technologies (Military & Aerospace Electronics)
- Navy Researchers Issue Laundry List of Anti-terrorism Technologies for Development and Prototyping (Military & Aerospace Electronics)
- The Growing Role of Technology in the Global War on Terrorism (Military & Aerospace Electronics)
- How Biology Is Inspiring the Next Generation of Cybersecurity (GIGAOM)
- Cryptography for Network and Information Security (Microsoft.com)
- Laser Technique Enables Super-fast, Super-secure Quantum Cryptography (Phys.org)
- ASTRA U.S. Innovation: Cybersecurity (Alliance for Science & Technology Research in America)
Transportation, Distribution, and Logistics
- Transportation Security (U.S. Department of Homeland Security)
- Cyber Security and Risk Management in Transportation (Intelligent Transportation Society of America)
- Caution: Cyber Risks Ahead for Connected Cars (Deloitte, Wall St. Journal)
- Secure Assets/Cybersecurity: Aviation Perspectives (PricewaterhouseCoopers)
- Railroad Association Denies Smart Train Cyber Vulnerability (Fortune)
- Uber Launches Hacker Bounty Program (Security)
- Connected Vehicles (U.S. Department of Transportation)
- Intelligent Transportation Systems: Connected Vehicles and Cybersecurity (U.S. Department of Transportation)
- Network Security: How Logistics Partners Can Help (SecurityInfoWatch)
- From Conversation to Implementation: Maritime and Port Security (MarineLog)
Scholarships & Grants