Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsEducation:UniversityGovernment: Federal, State and Local

UWF Cybersecurity Director Appointed to Florida Cybersecurity Task Force

Dr. Eman El-Sheikh
October 4, 2019

Dr. Eman El-Sheikh, director of the University of West Florida Center for Cybersecurity, will serve on the newly established Florida Cybersecurity Task Force.
 
Fla. Gov. Ron DeSantis appointed El-Sheikh, the only higher education Gubernatorial appointee on the task force. The task force will be chaired by Lt. Gov. Jeanette Nuñez and includes the state chief information officer, state chief information security officer and representatives from the Florida Department of Law Enforcement and Division of Cybersecurity Management. Cybersecurity executives from Florida Blue, Memorial Healthcare System, NextEra Energy, PartsHawk, Publix and Walt Disney World Resort will join El-Sheikh on the task force. 
 
“Dr. El-Sheikh has provided tremendous guidance in many aspects of cybersecurity for UWF and the community,” said UWF President Martha D. Saunders. “We're not surprised she was chosen as a member of the Florida Cybersecurity Task Force as securing our state becomes increasingly important.”
 
Florida law requires the task force to review and assess the state’s cybersecurity infrastructure, governance and operations. The task force will analyze and identify potential improvements of state government cybersecurity programs, including individual state agencies, and prioritize the risks posed by identified threats.
  
“I'm truly honored to be appointed to the Florida Cybersecurity Task Force by Gov. DeSantis,” El-Sheikh said. “Enhancing cybersecurity across state government is essential for economic prosperity and securing the data of Florida's citizens. I look forward to serving on the task force and supporting efforts to enhance cybersecurity for our state and citizens and advance Florida as a leader in cybersecurity.” 
 
El-Sheikh serves as a professor of computer science and the director for the UWF Center for Cybersecurity, guiding UWF’s efforts as one of eight cybersecurity regional hubs in the nation. The National Security Agency and Department of Homeland Security designated UWF as the Centers of Academic Excellence Regional Resource Center for the Southeast U.S. As the Southeast region hub, UWF provides leadership to advance cyber defense education among colleges and universities in Alabama, Florida, Georgia, Mississippi, Puerto Rico and South Carolina.
 
Under El-Sheikh’s guidance, the UWF Center for Cybersecurity also supports cybersecurity workforce development for the State of Florida, including training programs for State personnel in partnership with the Florida Department of Management Services and the Florida Department of State. Last year, the Center provided cybersecurity training to personnel across all state agencies and county elections offices. In September, the Center launched the Cybersecurity for All® program, courses developed to provide accelerated, flexible education and training pathways for organizations of all sizes and across sectors, including government, defense and the private sector.
 
El-Sheikh has extensive expertise in cybersecurity education, research and workforce development and conducts research on artificial intelligence and machine learning for cybersecurity. El-Sheikh earned her bachelor’s degree in computer science from the American University in Cairo and her master’s and doctorate degrees in computer science from Michigan State University. 

 

KEYWORDS: cyber security cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Atlantic Health System Security Director Appointed to NJ State Task Force

    See More
  • New York Cyber Task Force launches report revealing national cybersecurity response readiness

    See More
  • Defense Industry Companies Launch Supply Chain Cybersecurity Task Force

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing