Cybersecurity Becomes a Career Choice - InformationWeek
IoT
IoT
Government
News
9/21/2017
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Cybersecurity Becomes a Career Choice

Young people can't ignore the news. Data breaches are everywhere and they're beginning to realize that it's up to them to keep our personal and national information private.

Elizabeth Spoehel is 21 years old and just a month into her second year at The Citadel, The Military College of South Carolina. Up until 1996, The Citadel didn’t even admit women, and despite the gender disparity that still exists at the military college today, the first Citadel student to ever receive the Department of Defense’s (DoD) Information Assurance Scholarship Program (IASP) is Cadet Spoehel.

The scholarship is only offered at schools that achieve the designation as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) by the National Security Agency and Department of Homeland Security (NSA/DHS) and is for students interested in pursuing a career in cybersecurity at the Department of Defense. The Citadel was awarded this designation last year and this is the first year that students have been allowed to apply for the scholarship.

In addition to being the first student to be awarded this scholarship from The Citadel, Spoehel was also the first Citadel student to apply.

“I was one of the few people in our class whose GPA would be applicable and who didn’t have a military contract already,” says Spoehel, who is originally from Florida but also spent time living in McClean, Virginia.

Students who apply must have a GPA of 3.2 or above to qualify.

“I think mine is a 3.7 [GPA] right now,” says the Computer Science and Mathematics major and cybersecurity minor.

Image: The Citadel
Image: The Citadel

When a student receives the scholarship, they’re signing a contract with the DoD that they’ll work there as many years as they receive funding from the scholarship. Upon graduating in 2020, Spoehel will take a job with the Department. of Defense Space and Naval Warfare Center (SPAWAR).

Spoehel has been interested in STEM subjects from a young age. She was fortunate to go to an elementary school that offered computer classes nearly every day and even learned HTML and some robotics programming with Legos while she was there. In high school, she says she took the computer science course her senior year. Despite her interest in CS and math, Spoehel started her college career at a different university and as an education major, but quickly realized that wasn’t the field for her. She made a 180-degree turn after a semester off and applied to The Citadel.

Professor Shankar Banik, head of The Citadel’s NSA/DHS CAE cyber defense education program says he is seeing a growing interest in cybersecurity from the students in recent years, and he thinks this new designation will only help grow interest among Citadel students. “Young people are understanding the impact of cyber in our daily lives,” says Banik, and they’re responding to the demand for [cybersecurity] jobs in the federal government and private industry.

Image: The Citadel
Image: The Citadel

“Because there’s this designation and scholarship, we’re seeing more interest in the [computer science] major and [cybersecurity] minor combo,” says Banik, who is also The Citadel graduate program director of computer science, co-director for Citadel Center for Cyber, Intelligence and Security Studies, and a network security researcher. The Citadel even has a cybersecurity club run by students to help them learn “ethical hacking,” says Spoehel.

“We have students from other departments, they also want to learn cybersecurity,” says Banik.

While there does seem to be a strong interest in cybersecurity among Citadel students, Cadet Spoehel says she thinks these students are a little more clued in than your average college student. “National issues get talked about a lot,” says Spoehel, but adds that “we’re a lot more sensitive to what’s going on in the world.”

Emily Johnson is the digital content editor for InformationWeek. Prior to this role, Emily worked within UBM America's technology group as an associate editor on their content marketing team. Emily started her career at UBM in 2011 and spent four and a half years in content ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
9/23/2017 | 3:41:05 AM
Cyber Security as a Career
Given the number of malware attacks, this seems a reasonable idea. However, I'm not convinced that simply having computer science training, however thorough, as I see it is enough for this job  for two reasons  at least:

1. It assumes that cyber attacks will always be with us in ever increasing numbers and thus a great career path (defeatist). Part of such careers must be aimed at attack and defeat rather than simply defend. This is a mindset I do not see today. Moreover, I also see people for whom the current status of cybersecurity is a nice little earner; you know, the ex-hackers advising all and sundry for nice fees.

2. From my short research in it, the curricula for computer science degrees does not match the overall spectrum of current computing environments where malware flourishes so that sort of 'coal face' IT training to my mind is a must. To follow a 'computer science is enough' route is like having a good cardiac surgeon who has absolutely no other medical training. There are areas where CS knowledge is a good fit but only if the practitioner knows the territory in which he/she is operating.

Option 1 requires a radical rethink of cyber security beyond 'patch and hope' as it seems to me current SW can't cope if it is patched every 2 minutes. Crrent country and IT body initiatives in cybersecurity are all going in different directions and I hate to see how they will work globally when implemented (look at US and UK initiatives as a starter). It what we call in the UK 'a dogs breakfast'.

An architecture and SW to implement that architecture is needed. If your boat is leaking, you don't employ ever more balers with bigger buckets, you design a virtually hole-proof hull (architecture and HW and SW) and have a plan (DR) for dealing with it when it  does get breached. If not, like the poor, it will always be with us.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll