Home » Digital Security » Silent Defenders: The Next Generation of Cyber Security
Digital Security

Silent Defenders: The Next Generation of Cyber Security

In every interaction I have with students, at all levels, they are surprised and intrigued by the cyber security work done by the Department of Homeland Security (DHS). As technology and threats change, we are constantly building a team to match. Today’s students will be tomorrow’s protectors of cyberspace.

Cyber everywhere

Cyberspace is a general term for our modern interdependent network of information and communications technology infrastructures, including the Internet. Today, cyberspace has become an integral part of life in America. Billions of computers and devices—ranging from mobile phones to the industrial controls used in power plants—provide enormous benefits to our society and economy.

The Nation now faces myriad cyber threats from criminals, including individual hackers and organized criminal groups, as well as technologically advanced nation-states. Sophisticated attacks are the new norm, with even the most protected networks of the government and private sector experiencing intrusions. Attacks result in the loss of intellectual property, the compromise of personal data and potential threats to public safety.

New challenges daily

Every day, leading cyber experts at the Department protect DHS technology and networks to ensure the effective execution of our many homeland security missions, including preventing terrorism, securing our borders and responding to natural disasters. Other DHS experts focus on specialized cyber security work in areas such as digital forensics, incident response, secure coding, cyber intelligence analysis and cybercrime investigation.

In future years, the number of opportunities at DHS—and outside of government—will continue to grow. I commend those students that are considering a career in the evolving field of cyber security, and I encourage educators and current cyber professionals to join us in promoting the cyber security opportunities available in both the public and private sectors.

Next article