Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.
The company, a supplier to the semiconductor industry, has begun to recover its production capabilities and is working to upgrade its cyber defenses. MKS Instruments is facing a class action lawsuit in California in connection with a February ransomware attack that forced the company to suspend part of its manufacturing capacity, according to the company’s annual 10-K filed Tuesday with the Securities and Exchange Commission. The lawsuit was filed March 3 in the Orange County Superior Court in California seeking unspecified damages. The company said it plans a vigorous defense. MKS late last month warned the attack, which disrupted its photonics and vacuum solutions divisions, would result in more than a $200 million hit to quarterly revenue during the first quarter. The company was previously expecting to reach $1 billion in revenue for the period. A Moody’s analyst said the ransomware attack is credit negative for the company, which is a key supplier to the semiconductor industry. “The financial ramifications, temporary manufacturing delays and the class-action lawsuit underscore the potential cascading impacts of any cyber incident and the need to bolster cybersecurity across the industry,” Terry Dennehy, VP and senior credit officer at Moody’s, said in a statement. Moody’s officials said the comment should not be considered an official ratings downgrade of the company, but more of an assessment of the financial impact. MKS said an investigation shows ransomware actors encrypted some of its systems by deploying malware, according to the regulatory filing. The company has since restored many of its IT systems and reopened certain manufacturing and service operations. The company retained security specialists to help assess and remediate the company’s IT controls, and is strengthening access requirements and threat detection capabilities. MKS is also implementing procedures to facilitate a more timely restoration of its financial reporting capabilities. The company delayed release of its quarterly earnings report following the attack. MKS has cybersecurity risk insurance coverage, but the coverage may not cover all of the costs related to the attack, the company said. Get the free daily newsletter read by industry experts The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart’s operations speaks to the lengths enterprises must go to remain secure. The password manager warned customers to lookout for brute force attacks, phishing or credential stuffing. Subscribe to Cybersecurity Dive for top news, trends & analysis Get the free daily newsletter read by industry experts The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart’s operations speaks to the lengths enterprises must go to remain secure. The password manager warned customers to lookout for brute force attacks, phishing or credential stuffing. The free newsletter covering the top industry headlines
Hyderabad: Telangana State Council of Higher Education (TSCHE) has announced that all the universities in the state offering undergraduate courses will also be incorporating cyber security courses from the next academic year. Designed and developed by experts from Osmania University and NALSAR University of Law, the course will be availed by the students while they pursue BSc or BA. TSCHE chairman Prof. R Limbadri chaired a meeting with the revenue principal, commissioner of technical and collegiate education Navin Mittal and vice chancellors of six conventional universities on Thursday. Convening the meeting, Prof. Limbadri said, “Not just creating awareness on the cybercrimes, the new cyber security course will help students with employability opportunities.” Apart from cyber security, the university will also be offering BSc (Honours) in Computer Science as a major and artificial intelligence and machine learning as minor subjects from the next academic year. Another decision was that private affiliated degree colleges will be granted generic affiliation instead of course-wise affiliation from the next academic year. This meant all the BSc Life Sciences or Physical Sciences will be given a single affiliation instead of course-wise as is being done now. The affiliation process will be through the university management system. During the meeting, officials reviewed the bucket system that enables students to choose their subject as per their interest. TSCHE on Thursday further decided to encourage all higher educational institutions to go for National Assessment and Accreditation Council (NAAC) grading. A seed fund of Rs 1 lakh to the college desirous, will be provided by the council to go for the grading. To implement the new initiative, the council will reportedly hold workshops and seminars with resource persons from the NAAC Bangalore on creating awareness of the grading system. Get the news updates on WhatsApp & Telegram by subscribing to our channels. For all the latest Hyderabad updates, download our app Android and iOS.
Not enough people are educated about cybersecurity and that leaves everyone vulnerable. Here’s why and how we can address this issue. Our reliance on the internet and associated devices takes work, leisure, and convenience to a whole new level. But it comes with the downside of creating more opportunities for cyberattacks. And with the rising cybersecurity skills gap in society, cyberattackers can do more damage by escalating cyber threats and vulnerabilities. How can we stop them? Cyber threat actors are committed to discovering ways to exploit the new security problems technology presents. Such a high level of dedication is missing on our part to secure our digital environment as a society. Let’s look at some factors responsible for the cybersecurity skills gap. Cybersecurity isn’t a common topic of discussion among everyday people. Those who often talk about it either have a vested interest or are affiliated in one way or the other. Yet cybersecurity affects everyone. Many people learn the hard way, notably when they fall victim to cyberattacks. The lack of interest in cybersecurity stems from a perception that it’s complex, that it's rocket science. This misunderstanding reduces the number of people who want to build a career in cybersecurity. In the long run, there are fewer professionals to manage the rising cyber threats. Threat actors focus on specific areas to hone their skills. They deploy their expertise to launch attacks based on the uniqueness of a vulnerability or attack. Cyber experts, on the other hand, lack the resources and training to specialize in specific areas of cybersecurity. No security team can have one expert in every single vector. As a result of this, they don’t always have the specialized skills and technical know-how to match the attackers. Social biases among cybersecurity executives and gatekeepers contribute to the cybersecurity skills gap too. When you mention a cybersecurity worker, people might assume that you are referring to a middle-class man. Even in movies, the tech gurus that work around the clock to stop the bad guys from compromising networks are mostly men. This narrative discourages women and other people of different societal backgrounds from joining the workforce because they feel like they don’t belong there. There’s an exaggerated sense of importance among cybersecurity leaders. Driving a narrative of complexity about the profession, they set overly high requirements for prospective workers, thereby narrowing the entry path. In addition to having a college degree in a security-related course, cybersecurity employers demand that users must have a series of certifications and ample experience (a catch-22 situation) to qualify for jobs in the industry. These requirements discourage prospects who want to secure a job in cybersecurity and force them to seek other career opportunities. Cybersecurity affects all of us either directly or indirectly so resolving its skills gap is in all of our best interests. The ways to resolve the cybersecurity skills gap in society include improving accessibility, training, and opportunities. Younger people have more affinity for technology. Typically, the digital-age generations have a grasp of how technology works and how to use it a lot more than their older counterparts, but fall short in terms of cybersecurity knowledge. Stakeholders seem to believe that cybersecurity is a serious business meant for older minds by not exposing children to cybersecurity at an early age. But if young people can use digital technology with ease, they can also master the skills needed to know how to stay secure while using it. The relevant authorities must take up the responsibility to provide cybersecurity classes at lower education levels. Introducing young people to cybersecurity only at higher education isn't the best approach because they may have already developed other career interests or developed sloppy habits. You frequently hear about data breaches and leaks in the news. So you would think that cybersecurity training would be readily available and accessible, but that’s not the case. There aren’t that many training platforms and the few ones are expensive, i.e. inaccessible to people without high financial means. Incessant attacks make society less habitable—an indication that the government has failed in its responsibility to secure its citizens. To correct this, government agencies need to collaborate with cybersecurity institutions and professionals to offer training to interested parties at subsidized rates. There are fewer people from minority groups working in cybersecurity. Misconceptions over gender, age, and ablities will continue to prevail until the relevant institutions create opportunities for more demographics to come into the field. Cybersecurity opportunities must extend to creating a conducive work environment for everyone to thrive. Part of this is to establish standard compensations for workers regardless of societal biases. For instance, in racially diverse societies, people of color should have the same cybersecurity training and job opportunities their white counterparts have. Financial gains and benefits naturally play a huge role in making a job attractive. Most people would gravitate towards jobs with high financial rewards. Closing the cybersecurity skills gap doesn’t end with training people in cybersecurity and creating job opportunities. If the salaries and remunerations aren’t high, people would look elsewhere. There must be clearly defined career paths. Instead of putting everybody under one umbrella, there should be outlined fields in which practitioners can specialize, grow, and explore. There's a high reliance on academic performance in cybersecurity employment. But the job is more practical-based than theory. The essential skills one needs to excel on the job are not exclusive to formal learning. Employers need to review their academic job requirements and adopt more flexible methods. If the job requirements include a college cybersecurity degree, several cybersecurity certifications, and years of experience, many young people don’t stand a chance. We might argue that hackers are winning the cybersecurity battle. They focus on getting the job done and avoid trivial distractions. As a society, we can only be a match for them when we work together. Closing the cybersecurity skills gap will give us a more secure digital environment where we can go about our interactions and business without the fear of losing our valuable and sensitive data. Chris Odogwu is committed to imparting knowledge through his writing. With more than a decade of experience as a writer, he has mastered the art of simplifying the most complex subjects for easy comprehension. He loves to read, dance and watch interesting movies.
Sivan Tehila, director of the Katz School’s master’s program in cybersecurity, at its newly opened Security Operations Center Yeshiva University Katz School of Science and Health has unveiled New York’s first security operations center to help students gain experience and allow businesses to practice for potential events. The center is a response to the increasing number of cybersecurity threats to businesses.
“The idea is to have them see what it feels like to respond immediately to security incidents,” said Sivan Tehila, director of the Katz School’s master’s program in cybersecurity. The center provides hands-on experience for students, including immersive simulations where they actually feel as though their company is under attack in real time. The facility is not just for students. All around the city, small- and midsize businesses without dedicated security teams are encountering hacks and security threats. They will be able to access the center to get help when facing security threats.
The launch of the center comes at a time when cybersecurity is in the news as a business and consumer threat—but also an economic development opportunity because of the increasing number of jobs in the sector. This week, the New York City Economic Development Corp. also made headway in cybersecurity plans, launching a pilot program to facilitate paid internships in cybersecurity positions. Companies can request to be a part of the program here.
Last year Mayor Eric Adams’ Blueprint for Economic Recovery noted that cybersecurity was, along with life sciences, an increasingly important area of growth for the city. There are about 60,000 people working at more than 300 companies in the industry, according to the economic development corporation.
About two years ago, Yeshiva began thinking about adding a security center so that program graduates would have real-world experience monitoring, said Paul Russo, the university’s vice provost and dean of its Katz School.
“They can understand the hacker viewpoint, to understand the company and assess vulnerabilities,” he said.
In the meantime the cyber program at Katz continues to grow. Its online program is ranked second in the nation, and enrollment is expected to grow in the coming years. In four years enrollment in the cybersecurity master’s program has increased from eight students to 70, Tehila said, and the school expects to double that within a few years. She said graduates work at JPMorgan, Deloitte and EY, among others. “Our real work is building the workforce that powers New York City,” Russo said.
View the discussion thread. Staying current is easy with Crain's news delivered straight to your inbox, free of charge. Click below to see everything we have to offer. Don't miss the chance to get the biggest news first! Stay connected to New York business news in print and online Our Mission Crain’s New York Business is the trusted voice of the New York business community—connecting businesses across the five boroughs by providing analysis and opinion on how to navigate New York’s complex business and political landscape. 685 Third Avenue New York, NY 10017 (212) 210-0100 Contact us/ Help Center Staff directory Crain jobs
DUBLIN–(BUSINESS WIRE)–The “Deep Tech Leadership Certificate (DTLC)” training has been added to ResearchAndMarkets.com’s offering. Enjoy being involved in the cutting edge of business development The Deep Tech Leadership Certificate is designed to bring Board Directors and C-Suite Executives up to date in the key Deep Tech competencies of our time. This will enable them to: This is the technology decade (Techade) and those that do not engage will be left behind and become commercially redundant. Understanding Deep Tech in the boardroom is of equal importance to profit and loss. The key areas to master are covered by the below four masterclasses: For more information about this training visit https://www.researchandmarkets.com/r/i1ywq1 About ResearchAndMarkets.com ResearchAndMarkets.com is the world’s leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends. ResearchAndMarkets.com Laura Wood, Senior Press Manager press@researchandmarkets.com For E.S.T Office Hours Call 1-917-300-0470 For U.S./ CAN Toll Free Call 1-800-526-8630 For GMT Office Hours Call +353-1-416-8900 ResearchAndMarkets.com Laura Wood, Senior Press Manager press@researchandmarkets.com For E.S.T Office Hours Call 1-917-300-0470 For U.S./ CAN Toll Free Call 1-800-526-8630 For GMT Office Hours Call +353-1-416-8900
The third party vendor AudienceView, which Middleury uses for event ticketing, experienced a nation-wide data breach and notified the school about it on Feb. 23, the college told the community on Sunday. Though administrators were initially told the breach had not impacted anyone affiliated with the college, they later began to receive reports from students that their credit card information appeared to have been stolen. Ticket sales through middlebury.universitytickets.com have been suspended until further notice, Interim Assistant Vice President for Information Technology Services (ITS) Chris Norris wrote in an email to the Middlebury community. Since then, Audience View has suspended all online sales for all schools, noting new security breach concerns. On Feb. 28, AudienceView sent an email to some Middlebury community members it believed might have been impacted by the breach, providing additional information about the incident and what users could do. In an email to The Campus, Norris advised anyone who received this letter from AudienceView to assume they were exposed, whether or not they have noticed fraud on their account, and to cancel and replace their card as soon as possible. AudienceViews, formerly called University Ticket, noticed suspicious activity within their product on Feb. 21 and began investigating, according to the email they sent to potentially exposed individuals. “The investigation determined that between February 17, 2023, and February 21, 2023, certain individuals’ information may have been subject to unauthorized access and acquisition,” the email said. The college is working to independently verify the relevant dates, and Norris told The Campus in his Wednesday statement that the vendor is now extending the date range of the investigation. Norris’ email to Middlebury community members encouraged anyone who had purchased tickets at any point last month to check their accounts for fraudulent activity. For the Feb. 17 to 21 timeframe, AudienceView identified 665 individuals whose information might have been exposed in the breach — 594 college community members and 71 from the surrounding community — according to Norris. The data breach includes personal information such as names, billing addresses, email addresses, phone numbers and payment information, according Norris’ all-school email. The breach did not impact in-person Box Office sales or other Middlebury systems, the college clarified. AudienceView informed users of the data breach, which has impacted many higher education institutions. These include Worcester Polytechnic Institute, which addressed the issue on their web page. A number of students at Virginia Tech also recently reported credit card theft, and university police are investigating the matter in relation to the AudienceView breach, according to WDBJ7. Some Middlebury students spoke to The Campus about credit or debit card fraud on their accounts following the AudienceView security breach. Bailey Walker ’24.5 got an alert from his bank on Feb. 21 that there was fraud detected on his debit card. There was a $300 charge for online fast fashion retailer Shein, and the fraudster attempted another $1,000 charge at Best Buy after Walker froze his card. “I get that these things happen, and I'm grateful that my situation resolved itself, but I’m annoyed that this happened because I was participating in school events like the Winter Ball,” Walker said, referring to the Winter Carnival Ball, which took place on Feb. 18. More than 600 students bought tickets for the ball, with many using the college Box Office website, which uses AudienceView, to make their purchases. “I initially thought it was from a bad purchase I made online, but I already think it’s kind of ridiculous that we have to pay $5 for small things like the Ball or thesis productions and on top of that the service lost our data and may have cost people a lot of money,” Walker said. Tiffany Li ’26 had $994 charged to her account when a fraudster tried to make a purchase at New Life Cardio Equipment. She is currently waiting for a new card to be shipped to her. “I’m glad that for me it got caught and I didn’t actually lose money, but it’s been a little inconvenient when I need to use my card for purchases,” Li said. Halsey Smith ’23 is also getting a new card after her bank detected a fraudulent charge for $5,364 to California benefit overpayment services. Her bank is reimbursing her for the charge. As the college has paused use of AudienceView, ticketing for many upcoming events will take place in person at the Box Office. For the “Choral Chameleon: Music for Chameleons” concert taking place on Feb. 3, the college said the Box Office will open at 6:30 p.m. so attendees can buy tickets in person at the door. Other upcoming events will also rely on in-person or phone ticket sales for the time being, according to Norris.
Abigail Chang ’23 (she/her) is the Editor in Chief. She previously served as a managing editor, Senior News Editor, News Editor and co-host of The Campus’ weekly news radio show. Chang is majoring in English and minoring in linguistics. She is a member of the Media Portrayals of Minorities Project, a Middlebury lab that uses computer-assisted and human coding techniques to analyze bulk newspaper data. Throughout last year, Chang worked on source diversity and content audits for different media properties as an intern for Impact Architects LLC. Chang spent summer 2021 in Vermont, working as a general assignment reporter for statewide digital newspaper VTDigger. Chang is also a member of the Middlebury Paradiddles, an a cappella group. Lily Jones ’23 is an online editor and senior writer. She previously served as a Senior News Writer and SGA Correspondent. Jones is double majoring in Philosophy and Political Science. She also is an intern for the Rohatyn Center for Global Affairs and on the ultimate frisbee team. The Middlebury Campus is the student-run weekly newspaper of Middlebury College. Founded in 1905, our staff has published thousands of stories pertaining to the campus and surrounding community.
BrianAJackson/Getty Images Sign up for our newsletter
Stay Connected By Kaitlyn Levinson While cybersecurity may be second nature to IT professionals, instilling it across an agency may be an uphill battle without a human-centered approach, one expert says. IT staff must be able to communicate cybersecurity terms and concepts in ways the average person can understand, according to Julie Haney, computer scientist and usable security researcher at the National Institute of Standards and Technology. Otherwise, agency staff may ignore proper cyber hygiene if they feel their lack of understanding will be belittled or judged by IT professionals, Haney wrote in a November 2022 paper titled, “Users are not stupid: Six cyber security pitfalls overturned.” Before security teams initiate cybersecurity training or communications, they should test their explanations with people who are not experts and who “can say, ‘I have no idea what this means, you might want to change this,’” she said in an interview. When agency staff fully understand the security issues and context, they are more likely to absorb the information and integrate cybersecurity into their normal workflows, she said. Agencies should also leverage tech-based solutions that detect and prevent cyberattacks to prevent their users from developing security fatigue—a sense of resignation, weariness, frustration or loss of control over their own cybersecurity, Haney wrote in the paper. “Don’t always put all the responsibility on people if you don’t have to,” Haney said. For example, IT staff can deploy or improve email filters to catch phishing messages to reduce end users’ cybersecurity burden. “The more you can [offload that to the backend], the better.” Other ways to avoid security fatigue include running training campaigns throughout the year rather than ahead of a single deadline. IT staff should also offer different ways staff can meet security benchmarks such as cyber incident simulations and educational events with certified speakers, she added. But these education efforts would be useless without a way to measure how well staff retain cybersecurity knowledge. While many organizations use metrics on how many employees complete a training session to gauge their staff’s cyber awareness, IT staff must dig deeper, Haney said. For instance, IT managers can monitor how often cyber incidents involve user error or evaluate click rates on simulated phishing attacks. “These metrics can be very helpful to see if people are responding appropriately to those phishing emails, but [they] have to be put in context as well,” she added. Data may reveal that click rates increased significantly from one quarter to the next, so IT managers should investigate what caused that spike before proposing a solution. Furthermore, IT personnel should consider loosening elaborate password requirements such as minimum character counts and the use of special characters and numbers, Haney said. Though weak passwords remain a major threat to cybersecurity, “complex password policies can inspire poor decisions, such as using the same password across multiple accounts,” the paper stated. Related articles How one state’s phishing training evolves with threats Unpatched, known vulnerabilities still key driver of cyberattacks Cyber training expands to local leaders “We’re human, right? We can only recall so many things,” Haney said. Passphrases, which are typically longer in length, are easier to remember and type in compared to complex passwords. Another solution is dialing down how frequently users must update their passwords. While some organizations prompt staff to change their credentials every 60 to 90 days, Haney said changes could be made on an as-needed basis if, for example, IT staff believe the system has been compromised. Two-factor authentication can add another layer of defense without burdening staff. With this method, users may present a physical device such as a security token in addition to a PIN, which may be easier to recall, she said. For IT managers to understand staff’s pain points, feedback is vital. Open-ended surveys that ask staff how effective a training session was or what they struggle with when it comes to cybersecurity provides qualitative data that IT workers need to implement effective solutions, Haney said. “It’s hard for security people to put themselves in the shoes of non-security people because … we have an expertise that we can’t forget,” she said. NEXT STORY: Turning hackers’ behavior against them Do Not Sell My Personal Information When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link. Manage Consent Preferences Strictly Necessary Cookies – Always Active We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more. Sale of Personal Data, Targeting & Social Media Cookies Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences. Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Save Settings
Cookie List A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes: Strictly Necessary Cookies We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more. Functional Cookies We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more. Performance Cookies We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more. Sale of Personal Data We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website. Social Media Cookies We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website. Targeting Cookies We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website. Help us tailor content specifically for you:
SOUTHFIELD–Tooling U-SME, the workforce training and development arm of SME, and CyManII, the cybersecurity mnufacturing inovation Institute, have partnered to deliver “CyManII Sealed” – endorsed cybersecurity training for manufacturers. As cyberattacks grow increasingly sophisticated and threat landscapes expand, organizations and their employees need to understand how to raise awareness and take actionable preventative measures to protect against the new vulnerabilities. “Cybersecurity is highly reliant on people,” said Jeannine Kunz, chief workforce development officer at SME. “Preventing cyberattacks on our supply chain only works when everyone is a part of the solution. This is even more important in the context of our current skills gap. Our vision, as two nonprofit organizations, includes a focus on securing manufacturers from threats by equipping the industry with the necessary cybersecurity skills.” Tooling U-SME through the CyManII Sealed cybersecurity training program will provide the additional knowledge needed to prepare manufacturers for the growing vulnerabilities inherent with emerging operational and processes technologies. The web-based training is presented in an engaging and interactive format for organizations of all sizes. Together, CyManII and Tooling U-SME will set a new benchmark for developing educational resources that remain current with rapidly changing cyberthreats and democratizing access to training on cybersecurity awareness. With increased adoptions of Industry 4.0 technologies, and the increased digital connectivity throughout our facilities, a fundamental understanding of cybersecurity is becoming more critical to preventing losses due to cyberattacks. The United States Government Cybersecurity and Infrastructure Security Agency identifies manufacturing as one of the 16 critical U.S. infrastructures. Consequently, ensuring the strength and integrity of this sector is crucial to national safety and security. “In the height of the Industry 4.0 transformation that the workforce is facing, it is imperative that Tooling U-SME and CyManII partner to provide learning solutions needed to develop a workforce that is trained and upskilled in the areas of operational technology and cybersecurity to protect our nation’s most vulnerable assets,” said Ty Middleton, director of education and workforce development at CyManII. Tooling U-SME will provide immediate access to the industrial base and pipeline of future workers, delivering necessary cybersecurity training to thousands of OEMs, suppliers, and schools across our country. The training material, with review and input from CyManII, America Makes (National Additive Manufacturing Innovation Institute) and CESMII (The Smart Manufacturing Institute), and was also supported by the U.S. Office of Naval Research under awards N00014-18-1-2881 led by the National Center for Defense Manufacturing and Machining and N00014-19-1-2742 led by SME. CyManII is a national institute with government, industry, academic and nonprofit thought leaders in cybersecurity and smart, energy-efficient manufacturing, and deep expertise in supply chains, factory automation and workforce development. Learn more at cymanii.org, Tooling U-SME delivers learning and development solutions to the manufacturing community, working with thousands of companies, including more than half of all Fortune 500 manufacturers, as well as 900 educational institutions across the country. Tooling U-SME partners with customers to build high performers who help their companies drive quality, productivity, innovation, and employee satisfaction. It’s a division of SME, formerly known as the Society of Manufacturing Engineers. More at www.toolingu.com.