This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » University of Arkansas Researchers Awarded $4.6M Grant for Cybersecurity Progam
Cyber Security NewsSecurity Leadership and ManagementCyberSecurity Education & TrainingEducation:UniversitySecurity Newswire

University of Arkansas Researchers Awarded $4.6M Grant for Cybersecurity Progam

education 2 responsive default
July 17, 2019
KEYWORDS cyber security / cybersecurity / education & training
Reprints
No Comments

A five-year, $4.63 million award from the National Science Foundation will enable a multi-disciplinary team of researchers at the University of Arkansas to recruit, educate and train the next generation of cybersecurity professionals.

The program will provide the knowledge and tools necessary to protect network and computer systems in three cybersecurity, transportation security, and critical infrastructure security.

“The federal agencies that support these industries – all critical to our nation’s security and economic health – understand that new cybersecurity challenges are met with an increasingly insufficient security workforce,” said Jia Di, professor of computer science and computer engineering and principal investigator for the program. “But people at these agencies also understand that our university, with its specific research strengths, is uniquely positioned to expand the pool of highly skilled professionals who can address these challenges.”

The “Cyber-Centric Multidisciplinary Security Workforce Development” program will draw on faculty research expertise in the departments of Computer Science and Computer Engineering, Electrical Engineering, and Industrial Engineering. Faculty members will design curriculum focused on cybersecurity in the areas of computer and information systems, transportation and critical infrastructure with specific focus on the electrical power grid. The program will provide job training and research opportunities for graduate and undergraduate students, and all students will be offered internships at government agencies, where additional training could lead to job placement.

The program will focus on attracting students from underrepresented populations and will partner with Northwest Arkansas Community College to open paths for its students to pursue bachelors’ and advanced degrees at the university.

The program will address a national shortage of a highly skilled cybersecurity professionals. Over a one-year period, from September 2017 to August 2018, for example, there were more than 300,000 open cybersecurity jobs in the United States, Di said. Professionals at these companies cited lack of education as the reason for this shortage. To qualify for these jobs, students must understand not only computer systems, networks and software, but also data storage protection, cryptography, malware and software vulnerabilities, as well as the nature of cyber-crimes and other threats to infrastructure.

Led by the Arkansas Security Research and Education Institute, which Di directs, the “Cyber-Centric Multidisciplinary Security Workforce Development”program will include investigators affiliated with several U of A research centers – Center for Information Security and Reliability, Mack-Blackwell Transportation Center and Cybersecurity Center for Secure Evolvable Energy Delivery Systems. Students will conduct research at these centers.

Co-principal investigators for the program are Brajendra Panda, professor of computer science and computer engineering; Alan Mantooth, Distinguished Professor of electrical engineering; Dale Thompson, associate professor of computer science and computer engineering; and Chase Rainwater, associate professor of industrial engineering.

Subscribe to Security Magazine

Related Articles

University of Arizona $3M Grant will Create Cybersecurity Modeled After Human Body

U.S. Department of Education Announces New Grant Awards for School Safety and Mental Health Services

Gary Kuty, Grant Lecky Awarded the Bill Zalud Memorial Award for Professional Excellence

Related Products

The Database Hacker's Handbook: Defending Database Servers

Related Events

A4M 27th Annual World Congress

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing