<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 26 Apr 2026 04:13:19 -0400" url="https://my3.my.umbc.edu/groups/doit/posts.xml?tag=miic">
<NewsItem contentIssues="false" id="156039" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/156039">
<Title>Launching Maryland's State Tech Talent</Title>
<Tagline>How the MIIC is Transforming Students &amp; Modernizing Agencies</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61257" alt="Student standing in front of the Maryland Department of Transportation sign with green trees in the background." style="max-width: 100%; height: auto;"></p><p>The digital landscape of government is changing rapidly, and
    the State of Maryland is taking proactive steps to ensure it has the talent to
    keep pace. At the heart of this effort is the <a href="https://miic.umbc.edu/" rel="nofollow external" class="bo"><strong>Maryland Institute for
    Innovative Computing (MIIC)</strong> </a>program, a vital initiative administered by the
    University of Maryland, Baltimore County's (UMBC) <a href="https://careers.umbc.edu/" rel="nofollow external" class="bo">Career Center</a> and supported
    by state funding.</p>
    
    <p><img src="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61258" alt="Jack Suess is writing notes when speaking with a student about potential job opportunities." style="max-width: 100%; height: auto;"></p><p>The MIIC concept was spearheaded by <strong><a href="https://doit.umbc.edu/about/vp-cio/" rel="nofollow external" class="bo">Jack Suess, UMBC's Vice President and Chief Information Officer</a></strong>, who recognized the critical need to create a
    dedicated pipeline for technical talent within state agencies. His vision has
    been instrumental in making this program a reality.</p>
    
    <p>More than just an internship program, MIIC is a comprehensive
    strategy to recruit, compensate, mentor, and ultimately retain top college
    students in impactful technical careers right here in Maryland.</p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61261" alt="Student discussing positions with a State Agency Representative." style="max-width: 100%; height: auto;"></p>
    
    <p>Between the summer of 2024 and the summer of 2025, MIIC
    successfully funded <strong>34 technical internships</strong> across <strong>eight Maryland
    state agencies</strong>, representing an investment of nearly <strong>$174,000</strong> in the
    state's emerging workforce. In total 178 interns have been supported by the
    program since its inception in 2022, totaling over $805,000 in state funds. </p>
    
    <p>This commitment to fostering a local talent pipeline has
    yielded significant results. Every single participating agency—including the
    Maryland Department of Information Technology (MD DoIT), the Comptroller of
    Maryland, and the Maryland State Archives—reported that their intern
    contributed directly to organizational improvement.</p>
    
    <p>Agencies are quick to highlight the dual benefit. Not only
    does the program allow them to "discover and retain new talent," but it also
    provides crucial financial relief. One agency head noted the program provides
    "extra dollars saved" that can be redirected toward "other strategic security
    goals." Another supervisor praised the added efficiency, stating the intern
    helped them "tackle some administrative burdens."</p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61263" alt="Multiple Maryland State Agency Representatives are having a conversation at an MIIC recruiting event." style="max-width: 100%; height: auto;"></p>
    
    <p>The 34 students who participated came from a diverse mix of
    backgrounds, boasting a strong average GPA of <strong>3.59</strong> and representing
    seven in-state and two out-of-state institutions. Their majors read like a
    blueprint for the modern technical workforce: Cybersecurity, Data Science,
    Computer Science, Information Systems, and Software Engineering.</p>
    
    <p>For these students, the internships were a critical bridge
    between academic theory and real-world application.</p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61265" alt="Maryland Agency representative discussing opportunities with a student." style="max-width: 100%; height: auto;"></p>
    
    <p>"This internship has been an extremely valuable experience
    for me as an Information Systems major. It has allowed me to gain <strong>hands-on
    experience in a field that I am passionate about</strong> and has helped me to
    develop both professionally and personally."<br>- MIIC Intern</p>
    
    <p>In short, MIIC is not just finding great students; it's
    actively helping agencies become more secure, efficient, and productive.</p>
    
    <p> </p>
    
    </div>
]]>
</Body>
<Summary>The digital landscape of government is changing rapidly, and the State of Maryland is taking proactive steps to ensure it has the talent to keep pace. At the heart of this effort is the Maryland...</Summary>
<AttachmentKind>Image</AttachmentKind>
<AttachmentUrl>https://assets1-my.umbc.edu/system/shared/attachments/d5203ac7e024e121261fec6dacf2746b/69edc91f/news/000/156/039/b6d9cf9a38d8218beee65136aec5fce8/Nadja-Franklin-MDOT MIIC Photo 1.jpg?1769802544</AttachmentUrl>
<Attachments>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61257"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61258"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61261"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61263"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/156039/attachments/61265"></Attachment>
</Attachments>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/156039/guest@my.umbc.edu/e29d25b12db84a5a6a84f69e20218661/api/pixel</TrackingUrl>
<Tag>interns</Tag>
<Tag>jobs</Tag>
<Tag>maryland</Tag>
<Tag>miic</Tag>
<Tag>news</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/xxlarge.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/xlarge.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/large.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/medium.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/small.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/xsmall.jpg?1770393557</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/156/039/1cb5308f38d6887ad9afbf9fa205b0d5/xxsmall.jpg?1770393557</ThumbnailUrl>
<ThumbnailAltText>Maryland state flag with the text "Maryland Institute for Innovative Computing"</ThumbnailAltText>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 09 Feb 2026 09:41:59 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="152837" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/152837">
<Title>Maryland Institute for Innovative Computing: U.S. Cyber Range</Title>
<Tagline>Explore our First Newsletter - September 2025 Edition</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><strong>Welcome </strong>to the Maryland Institute for Innovative Computing (MIIC) newsletter.</p><p>MIIC's purpose is to bring together researchers, educators, industry, and government to address challenges in areas such as cybersecurity, artificial intelligence, and cloud computing. Our goal is to keep Maryland at the forefront of discovery while providing opportunities for students, educators, and professionals to develop the skills needed in today's technology-driven world.</p><p><em>"The Range is a perfect fit for student-driven projects—whether they're preparing for competitions or building their own capture-the-flag challenges." </em></p><div>- Paul Thompson</div><div><br></div><p>In this first issue, we highlight one of our flagship initiatives: Maryland's access to the U.S. Cyber Range. This cloud-based training environment provides hands-on cybersecurity learning without the need for local infrastructure.</p><p>Thanks to state support, K–12 school systems and public higher education institutions can use the platform at no cost.</p><p>This newsletter will feature updates, events, and opportunities to engage with MIIC. We look forward to building this community together! </p><p><em><strong>For the complete newsletter, please check out the flyer attached!</strong></em></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58948" alt="MIIC September Newsletter Sample page 1" style="max-width: 100%; height: auto;"></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58949" alt="MIIC September Newsletter Sample page 2" style="max-width: 100%; height: auto;"></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58950" alt="MIIC September Newsletter Sample page 3" style="max-width: 100%; height: auto;"></p><p><strong></strong></p><p></p><p></p><p></p><p><strong></strong></p><div><p></p></div></div>
]]>
</Body>
<Summary>Welcome to the Maryland Institute for Innovative Computing (MIIC) newsletter.  MIIC's purpose is to bring together researchers, educators, industry, and government to address challenges in areas...</Summary>
<AttachmentKind>Newsletter</AttachmentKind>
<AttachmentUrl>https://assets4-my.umbc.edu/system/shared/attachments/2396e4295a721d36e7939b7f7d523586/69edc91f/news/000/152/837/d2477fc4bf0dc177f12260233f22eff2/September 2025 MIIC Newsletter.pdf?1758660844</AttachmentUrl>
<Attachments>
<Attachment kind="Newsletter" url="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58939"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58948"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58949"></Attachment>
<Attachment kind="Image" url="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58950"></Attachment>
</Attachments>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/152837/guest@my.umbc.edu/d5531e02fa6f8df054abcfc5aeef739a/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>maryland</Tag>
<Tag>miic</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xxlarge.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xlarge.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/large.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/medium.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/small.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xsmall.jpg?1758720037</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xxsmall.jpg?1758720037</ThumbnailUrl>
<ThumbnailAltText>MIIC US Cyber Range Newsletter with a laptop running code displayed</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 24 Sep 2025 09:51:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="150425" important="false" status="posted" url="https://my3.my.umbc.edu/groups/doit/posts/150425">
<Title>UMBC Student experience at The Consortium of Cybersecurity Clinics</Title>
<Tagline>Event Recap: Spring 2025 &#8220;Clinic of Clinics&#8221;</Tagline>
<Body>
<![CDATA[
    <div class="html-content"> <div><span>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County</span> | <span>May 15, 2025</span></div> <div><p><br></p><p>On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics” event, bringing together over 140 students from more than 40 Cybersecurity Clinics across the world. This is a biannual event held each semester and gives students who are working in their school’s cybersecurity clinic a chance to connect with peers and learn from top experts in the field.</p><p>The Consortium of Cybersecurity Clinics is a collaborative network of higher education-based cybersecurity clinics focused on serving community organizations. The Consortium plays a key role in connecting these clinics, sharing resources, and assessing the impact of clinics on students and the communities they serve.</p><h4><span>General (Ret.) Paul M. Nakasone</span></h4><p>The highlight of the event was a keynote by <a href="https://engineering.vanderbilt.edu/bio/?pid=paul-nakasone" rel="nofollow external" class="bo">General (Ret.) Paul M. Nakasone</a>, who led as the former Director of the National Security Agency (NSA) and Commander at U.S. Cyber Command. He is now the founding director of <a href="https://www.vanderbilt.edu/national-security/" rel="nofollow external" class="bo">Vanderbilt University’s Institute for National Security</a>.</p><h4><span>Inside the NSA and U.S. Cyber Command</span></h4><div><img width="538" height="542" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/paul-nakasone-headshot.png" alt="General (Ret.) Paul M. Nakasone" style="max-width: 100%; height: auto;">Paul M. Nakasone</div><p>General Nakasone started the keynote with a powerful and inspiring statement for the students in attendance, “The future is about talent, and you represent that talent.” He then shared his experiences in the former roles at the National Security Agency (NSA) and U.S. Cyber Command, two organizations that play a very crucial role in securing the nation’s digital infrastructure. He explained the simple yet powerful mission of the NSA: “We make code, and we break code.” The NSA develops cryptographic keys, codes, and encryption technologies in order to protect the country’s most sensitive communications and defense platforms. NSA also plays a critical role in national intelligence by monitoring adversarial activity.</p><p>As for U.S. Cyber Command, General Nakasone outlined three core missions:</p><ol><li>Defending Department of Defense networks, data, and weapon systems: Supporting over 4.5 million users and maintaining constant mobility, this infrastructure serves as the foundation for global military operations.</li><li>Providing cyber support to U.S. forces deployed worldwide: From Korea to Iraq and Afghanistan, Cyber Command maintains cyber readiness and protection in active military environments.</li><li>Protecting the nation in cyberspace: Cyber Command works with the Department of Homeland Security (DHS), the FBI, and the private sector to protect US elections and other critical democratic functions from foreign interference.</li></ol><h4><span>Disruptive Technologies and the Importance of Adaptation</span></h4><p>The keynote was structured with three core themes: disruptive technologies, the current state of cybersecurity, and the skill sets needed for tomorrow’s leaders. To demonstrate the impact of disruptive technologies, General Nakasone talked about <a href="https://www.youtube.com/watch?v=MnrJzXM7a6o" rel="nofollow external" class="bo">Steve Jobs’ 2007 announcement of the iPhone</a>, which he described as “the most disruptive technology of the 21st century.” He compared the companies that embraced the adoption of and adaptation to mobile innovation, like Amazon and Google, with those that ignored the shift, such as Blockbuster, Blackberry, and Nokia. Through this comparison, he explained how early action can shape long-term relevance and success for companies in a world with rapidly evolving technologies, “You can adopt, adapt, or avoid. Choose wisely.”</p><img width="1024" height="572" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-2-1024x572.png" alt="A hexagonal collage showing logos and phone screens for Meta AI, Anthropic, Google Gemini, Apple Intelligence, Microsoft Copilot, and OpenAI ChatGPT." style="max-width: 100%; height: auto;"><h4><span>Artificial Intelligence: Promise and Risk</span></h4><p>General Nakasone explained how today’s biggest disruptive technology, Artificial Intelligence, presents both huge opportunities and serious concerns. He then reflected on the launch of ChatGPT, noting its quick growth: over 1 million users in just five days, and 100 million within two months—a pace that significantly exceeded the internet’s initial expansion, which took seven years to reach 50 million users. He called the capabilities of current AI models as “truly outstanding,” citing their quick developments in areas like coding, reasoning, deep research, and even image generation. While he found the new technology to be exciting, he highlighted the need for responsible advancement and called for national investment in talent, energy, compute, chips, and data that would ensure the safe development and application of AI. With regard to cybersecurity, he mentioned several concerns, including the emergence of deepfakes. Fortunately, defense against malicious deepfakes outperformed offense in the 2024 U.S. presidential election.  Additionally, he expressed worries about the possibility of backdoors in open-source AI models, a recent example would be DeepSeek, and the danger of data poisoning during AI model training, vulnerabilities that may be used to infiltrate critical systems. Despite these risks, he maintained his optimism that AI would advance industries like national defense, education, and medicine, stating that the technology has him “riveted on the future.”</p><h4><span>The Geopolitical Landscape: Three Arcs of Global Security</span></h4><p>Shifting to a broader strategic view, General Nakasone defined today’s global security environment through what he described as three arcs of geopolitics. In the first arc, he explained the rise of China, showing how it went from a $114 billion economy in 1972 to a $17 trillion global power with expanding diplomatic, informational, and military influence today. The second arc focused on active conflicts, such as the Russia-Ukraine War, and ongoing instability in the Middle East. He explained how digital capabilities, like laptops connected through satellite internet, have made it possible for unprecedented disruption, pointing out that Ukraine has disabled more than half of Russia’s Black Sea Fleet despite having no navy. “This is the future of conflict,” he said, where non-kinetic cyber operations increasingly shape kinetic outcomes. The third arc addressed the threats that cross borders, such as pandemics, climate change, and cybersecurity itself, reminding us all that geographic boundaries no longer protect countries from cyberattacks. When combined, these three arcs show how intricately cyberspace has woven itself into both national security and international relations.</p><img src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-1.png" alt="A collage featuring images of a street in Asia, war destruction, city skyline, shipping, computer chip, military tank, cybersecurity, and a masked person." style="max-width: 100%; height: auto;"><h4><span>A Closer Look at Today’s Cybersecurity Threats</span></h4><p>General Nakasone also talked about the current cybersecurity threats. Last year, there were over 5,000 recorded ransomware attacks in the United States, which is a 15% increase from the prior year. He shared that when companies like Microsoft release updates, the attackers are able to exploit vulnerabilities within just five days, putting intense pressure on organizations to patch systems quickly. What’s even more concerning is that it takes an average of 194 days to detect an intrusion and 58 days to remove it. These three elements present a very challenging picture as we think about cybersecurity today and into the future.</p><h4><span>The Four Basics That Defeat 96% of Threats</span></h4><p>To tackle these challenges, General Nakasone stressed the importance of renewed commitment to “defense in depth,” urging cybersecurity experts to actively look for threats, conduct penetration tests, and prioritize patching. He also shared the four simple practices that can provide protection against 96% of known adversaries. Those four practices are:</p><ol><li>Keeping the systems updated.</li><li>Using strong passwords</li><li>Recognizing phishing attempts</li><li>Enabling multi-factor authentication (MFA)</li></ol><h4><span>What Makes a Great Cybersecurity Leader?</span></h4><p>General Nakasone concluded his presentation by outlining the three traits a cybersecurity professional must have: </p><ol><li>Critical thinking</li><li>Communication skills</li><li>Character</li></ol><p>He shared about this experience about how no one asked him what he majored in after college. Instead, they wanted to see if he could break down a complex problem, communicate clearly, and hold strong values. “Character,” he said, “is what you are in the dark. It’s what you stand for when no one’s watching.”</p><h4><span>Q&amp;A Session</span></h4><p>After the keynote, students from clinics across the world got the chance to ask questions directly to General Nakasone. The Q&amp;A session turned out to be one of the most captivating parts of the event, with questions ranging from privacy and national security to AI regulation, policy and career advice.</p><p>Key Takeaways from the Q&amp;A Session:</p><ol><li>Collaboration is key: Effective cybersecurity requires coordination between the government, the private sector, and academia. Each brings together strengths to solve complex challenges.</li><li>Technical leaders are in demand: “We need leaders who code, and coders who can lead.”</li><li>Strategic government investment in education, talent, and infrastructure can drive innovation, just as it did with the interstate highway system and GPS.</li></ol><h4><span>Breakout Sessions: Peer Connections and Takeaways</span></h4><p>After the conclusion of the keynote and Q&amp;A, the students were moved to breakout rooms, where they discussed engaging prompts. These sessions allowed everyone to make personal connections, share stories, and think about their clinic work from a new perspective.</p><h4><span>Final Reflections</span></h4><p>The Spring 2025 “Clinic of Clinics” was an insightful event where students connected with each other and learned how cybersecurity relies on people driven by shared values, teamwork, and a desire to learn. General Nakasone’s keynote shed light on today’s most critical challenges and sparked inspiration about the future we’re creating together. In his closing remarks, he quoted Steve Jobs, <em>“Everyone here has a sense that right now is one of the moments that we are influencing the future.” </em></p><p>Listening to his keynote certainly made us all feel we were in one.</p><p>The original post can be found at <a href="https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/" rel="nofollow external" class="bo">The Consortium of Cybersecurity Clinics</a>.</p></div></div>
]]>
</Body>
<Summary>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County | May 15, 2025       On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics”...</Summary>
<Website>https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/150425/guest@my.umbc.edu/b8b76075328f4671f1f7facc7eae2baa/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>miic</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxlarge.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xlarge.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/large.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/medium.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/small.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xsmall.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxsmall.jpg?1748375268</ThumbnailUrl>
<ThumbnailAltText>The Consortium of Cybersecurity Clinics logo displayed on a purple gradient background with digital glitch-style lines on the left side.</ThumbnailAltText>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 28 May 2025 08:34:42 -0400</PostedAt>
</NewsItem>

</News>
