The Global Research Network on Terrorism and Technology

The Brookings Institution will host the inaugural conference of The Global Research Network on Terrorism and Technology. This is a new independent consortium led by the Royal United Services Institute (RUSI) in the United Kingdom. It seeks to “explore how new technologies enable and constrain terrorist activity”. How do terrorist networks operate online? What are the ethics of content moderation for technology companies? What is the interplay between online content and offline actions?

For those unable to attend they can register to watch the event online.

Federal Virtual Training Environment

The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to U.S. government employees, Federal contractors, and veterans.

FedVTE contains over 60 courses ranging from beginner to advanced, including popular cybersecurity certification preparation courses like Security +, Certified Ethical Hacker (CEH), and Certified Information Systems Security Professional (CISSP). Along with certification prep courses, FedVTE offers training on a variety of introductory topics including 101 Coding, 101 Critical Infrastructure Protection, and 101 Reverse Engineering.

Holding Government Contractors Responsible for Cybersecurity Is Trickier Than It Sounds


The federal government wants to hold defense contractors accountable for the cybersecurity of their supply chains but that’s no easy feat, experts said Tuesday.

Industry representatives told lawmakers on the Senate Armed Services Committee about attempting to tackle cyber threats as a federal contractor. Much of the hearing was focused on one specific issue: increasingly complex levels of supply chains make it difficult for prime contractor to ensure all subcontractors are upholding cybersecurity protections. And that ever-lengthening chain increases the possibility of compromised information or cyberattacks. [Read complete article]

Cybersecurity – Skills Shortage

The International Information Systems Security Certification Consortium (ISC2) conducts an annual study to assess the cybersecurity workforce gap, better understand the barriers facing the cybersecurity professional, and uncover solutions that position these talented individuals to excel in their profession, better secure their organizations’ critical assets and achieve their career goals.

ISC2 recently published results from the 2018 Cybersecurity Workforce Study that raises concerns with the growing shortage of cybersecurity skills and that as the gap between supply and demand continues, it puts organizations at risk. [Read the full report]