Saturday, February 23, 2013

Is your alumni on the list. Stats on Colleges & Universities with Homeland Security and Emergency Management Programs.


v     Hi Ed Statistical Update for February 2013:


·        Emergency Management Higher Education Programs – 265
o       67 - Certificate, Diploma, Focus-Area, Minor in EM Collegiate Programs
o       50 - Schools Offer Associate Degree Programs
o       51 - Schools Offer Bachelor Degree Programs
o       88 - Schools with Master-Level/Concentrations/Tracks/Specializations/Emphasis
 Areas/Degrees
o       9 - Schools Offer Doctoral-Level Programs
·        132 - U.S. Homeland Security/Defense and Terrorism Hi Ed Programs 
·        16 - U.S. International Disaster Relief/Humanitarian Assistance Programs 
·        31 - Public Health, Medical and Related Program 
·        29 - Listing of Related Programs

FEMA Student and Career Opportunities


Students: Review information regarding the new Pathways Program Internships, Recent Graduates and Presidential Management Fellows on OPM.gov at the following link: http://www.opm.gov/hiringreform/pathways/.

Call for Nominations. White House Champions of Change


U.S. Department of Homeland Security
                     Federal Emergency Management Agency

FEMA ANNOUNCES HURRICANE SANDY WHITE HOUSE CHAMPIONS OF CHANGE CALL FOR NOMINATIONS
WASHINGTON—Today the Federal Emergency Management Agency (FEMA), in partnership with the White House Office of Public Engagement, announced that the nomination period for the Hurricane Sandy White House Champions of Change is now open.

On April 24, 2013, the White House will host a Champions of Change event to recognize outstanding leaders and hidden heroes that contributed to the ongoing response and recovery of Hurricane Sandy.  The innovative, collaborative, and solutions-based work of local heroes has significantly contributed to response and recovery efforts.  FEMA is accepting nominations of individuals, community leaders, neighborhood groups, small businesses, and members of academia that implemented creative solutions to problems facing disaster survivors. Nominations will be accepted until Wednesday, March 6, 2013.

“While Superstorm Sandy devastated many communities along its path, it also brought out the best in us, as neighbors helped neighbors to survive and recover,” said FEMA Administrator Craig Fugate. “As we continue to rebuild after this storm, help us recognize Champions of Change who went above and beyond to help others.”

The White House’s Champions of Change is an initiative of the Obama Administration to honor ordinary Americans using innovative, creative solutions to address challenges in their community. The Champions of Change program highlights the stories and examples of citizens across the country who are “Winning the Future” with projects and initiatives that move their communities forward.  Each week, the White House Office of Public Engagement hosts an event to honor those who are working to empower and inspire other members of their communities.  Agency representatives and White House Policy Offices participate in the events, and host discussions on amplifying best practices learned in each area. 

Additional information on the Champions of Change program can be found at www.whitehouse.gov/champions. To submit a nomination, visit http://www.fema.gov/library/viewRecord.do?id=6995, download the nomination form and e-mail it to: FEMA-Sandy-Champions@fema.dhs.gov. Nominations will be accepted through March 6, 2013. 


An Afternoon with the NCR's Protective Security Advisors & Fusion Center representatives - 03/14/2013 from 1:00p - 3:00p



InfraGard National Capital Region monthly meeting - An Afternoon with the NCR's Protective Security Advisors & Fusion Center representatives - 03/14/2013 from 1:00p - 3:00p

InfraGard - National Capital Region Members Alliance

Thursday, March 14, 2013 from 1:00 PM to 3:00 PM (EDT)

Washington, DC



Who:  InfraGard Members and Guests (this meeting is open to the public)
What:  Updates from the NCR's Protective Security Advisors and DC's Fusion Center
When:  Thurs., 03/14/13 from 1:00p - 3:00p
Where:  Metropolitan Washington Council of Governments, 777 North Capitol Street, NE, Suite 300, Washington, DC 20002.  (Directions can be found here: 

http://www.mwcog.org/contact/directions/default.asp)

Why:  As the center of our military and government, the National Capital Region faces unique challenges in protecting its critical infrastructure.  Come hear the NCR's Protective Security Advisors (PSA) from DHS speak about the Office of Infrastructure Protection and their roles as PSAs, specifically within the NCR.  Additionally, we will hear from the Washington, DC fusion center - the Washington Regional Threat and Analysis Center (WRTAC) - as they discuss their mission and functions within the NCR.

How:  Register at http://incrma031413.eventbrite.com.  There is a $10 fee to attend. Coffee will be provided.  **While there are no refunds, we welcome substitutions if the original registrant is unable to attend.**

**Please note there are new security procedures now in place at the MWCOG building.  When you arrive, you will go to a self-service security wall terminal in the lobby where you will be asked to scan your driver's license or other form of identification.  The terminal will print out a one day pass enabling you to pass the security officers and go to the elevator and to the 3rd floor.  If you park in the garage, you will need to get off the elevator at the lobby level and get your pass.  Building security officers in the lobby will verify your pass and assist if you have any questions.**

Agenda:
1:00 - 1:15  Welcome and Introductions
1:15 - 2:00  DHS Office of Infrastructure Protection overview and Protective Security Advisor program
2:00 - 2:30  Washington Regional Threat Assessment Center (WRTAC) Updates (DC's Fusion Center)
2:30 - 2:50  Q & A
2:50 - 3:00  Wrap-up & Adjournment
Our speakers for this program are:

WRTAC Representative (bio forthcoming)

NCR Protective Security Advisors

Kelly Wilson and Matthew Wombacher currently serve as the Protective Security Advisors (PSA) for the National Capital Region Region within DHS's Office of Infrastructure Protection. They support homeland security efforts, serving in an advising and reach-back capacity for State and District Homeland Security Advisors. They contribute to the development of the national risk picture by assisting with the identification, assessment, monitoring, and minimizing of risk to critical assets at the local level. As a PSA, Ms. Wilson and Mr. Wombacher facilitate, coordinate, and perform vulnerability assessments for local critical infrastructures and assets, and act as physical and technical security advisor to Federal, State, and local law enforcement agencies.

Ms. Wilson (additional bio forthcoming)

Mr. Wombacher served in the United States Secret Service for nine years prior to becoming a PSA. He served in the Technical Security Division, the component of the Office of Protective Research within the Secret Service which operates as the focal point regarding countermeasures for all environmental threats to Secret Service protected persons and facilities. Disciplines included in this field are counter-explosives and counter-IED measures, CBRN incident prevention and mitigation, Fire/Life/Safety and physical security planning, and continuity of operations planning among other countermeasures programs. This routinely involved domestic and worldwide travel as a member of Presidential Advance teams.

Mr. Wombacher brings extensive experience, comprehensive knowledge, in-depth training, and instructional aptitude with regard to the areas of security operations and planning. While assigned to the US Secret Service, Mr. Wombacher coordinated several key training programs for the Technical Security Division.
Prior to employment in the US Secret Service, Mr. Wombacher served eight years in the US Coast Guard performing a variety of assignments. Highlights include selection for duty assignment to the Presidential Honor Guard, and serving as Air Navigator onboard the HC-130H long range aircraft. Mr. Wombacher holds additional professional certification from the ASIS International organization as a Certified Protection Professional.

Newsletter: Multi-State Info Sharing & Analysis Center

MSISAC
Monthly Security Tips
NEWSLETTER

February 2013


Volume 8, Issue 2
How Do I Protect the Information on My Smartphone?

From the Desk of William F. Pelgrin, Chair

We’ve come to depend on our smartphones so heavily it is hard to remember what we did before we had them. If you have a smartphone, you now carry a fully functional computer in your pocket or purse. That’s a tremendous amount of information at your fingertips! Therefore, it is paramount that you safeguard the smartphone.

Common Risks for Smartphones

Take a moment to consider each of these areas:

  • Loss of device and information theft. Smartphones are small and can easily be lost or stolen. Unauthorized users may access your accounts, address lists, photos, and more to scam, harm or embarrass you or your friends; they may leverage stored passwords to access your bank and credit card accounts, steal your money or make credit card charges; gain access to sensitive material, and more.

  • Social Engineering. A common mobile threat is social engineering. Whether via text message, image, or application to download, an incoming communication may be an attempt to gain access to your information.  A current example consists of a text message that comes from an unknown number, telling you that if you click on the link provided, you’ll have access to thousands of free ringtones.  If this sounds too good to be true, that’s because it is.  The link is in fact a malicious link.  Clicking on it will compromise the security of your smartphone.

  • TMI (Too Much Information). Guidelines for protecting privacy, safety, and reputation when sharing via computers also apply when sharing via smartphones. Mobile devices enable instantaneous capturing, posting, and distribution of images, videos, and information. They may also broadcast location information.

  • Public Wi-Fi. Smartphones are susceptible to malware and hacking when leveraging unsecured public networks.

  • Bluetooth and Near Field Communications (NFC). Bluetooth is a wireless network technology that uses short-wave radio transmissions to transmit voice and data. NFC allows for smartphones to communicate with each other by simply touching another smartphone, or being in proximity to another smartphone with NFC capabilities or a NFC device.  Risks with using NFC and Bluetooth include eavesdropping, through which the cyber criminal can intercept data transmission, such as credit card numbers.  NFC also has the risk of transferring viruses or other malware from one NFC-enabled device to another.

Simple Steps to Protect Your Smartphone:

  1. Update the operating system. Smartphones are computing devices that need to be updated. Updates often provide you with enhanced functionality and enriched features, as well as fixes to critical security vulnerabilities. Your smartphone manufacturer should notify you whenever an update is available.

  1. Use of security software is a must.  As the smartphone market is increasing, so too is the amount of malware designed to attack smartphones. The software security solutions that are available for desktops and laptops are not as widely available for smartphones. A key protection is to use mobile security software and keep it up-to-date. Many of these programs can also locate a missing or stolen phone, will back up your data, and even remotely wipe all data from the phone if it is reported stolen.

  1. Password-protect your device. Enable strong password protection on your device and include a timeout requiring authentication after a period of inactivity. Secure the smartphone with a unique password – not the default one it came with. Do not share your password with others.

  1. Think before you click, download, forward, or open. Before responding, registering, downloading or providing information, get the facts. No matter how tempting the text, image, or application is, if the download isn’t from a legitimate app store or the site of a trusted company, don’t engage with the message.

  1. Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your personal information.  If the app requires more access to your account and/or device than is needed to run the service, do not continue. In addition, be aware that terms can change over time.  Review your terms of use often.

  1. Be cautious with public Wi-Fi. Many smartphone users use free Wi-Fi hotspots to access data (and keep their phone plan costs down). There are numerous threats associated with Wi-Fi hotspots. To be safe, avoid logging into accounts, especially financial accounts, when using public wireless networks.

  1. Disable Bluetooth and Near Field Communication (NFC) capabilities when not in use. Capabilities such as Bluetooth and NFC can provide ease and convenience in using your smartphone. They can also provide an easy way for a nearby, unauthorized user to gain access to your data.  Turn these features off when they are not required.

  1. Enable encryption.  Enabling encryption on your smartphone is one of the best ways to safeguard information stored on the device, thwarting unauthorized access.

  1. Securely dispose of your device.  With the constant changes and upgrades in the smartphone market, many are upgrading their devices on a regular basis.  It is important that you wipe the information from your smartphone before disposal.  Additionally, make sure any SD cards are removed and erased. If you are not redeploying the SIM card to another device, then make sure your personal information stored on the SIM card is erased or destroyed.

For More Information:

For additional information about securing mobile devices, please utilize the following resources:
  
<!--[if !supportLists]-->·       <!--[endif]-->About.com 14 Ways to Find a Stolen or Lost iPhone: http://ipod.about.com/od/iphonetroubleshooting/tp/14-Ways-To-Find-A-Lost-Or-Stolen-Iphone.htm
<!--[if !supportLists]-->·       <!--[endif]-->FTC – How to Dispose Your Mobile Device Securely: http://www.consumer.ftc.gov/articles/0200-disposing-your-mobile-device
<!--[if !supportLists]-->·       <!--[endif]-->University of Northern Colorado:  http://www.unco.edu/cybersecurity/students/mobile.html
<!--[if !supportLists]-->·       <!--[endif]-->US-CERT – Cyber Threats to Mobile Phones: http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf
<!--[if !supportLists]-->·       <!--[endif]-->Sophos – Android Tool:  http://www.sophos.com/androidsecurity
<!--[if !supportLists]-->·       <!--[endif]-->Microsoft – Secure Your Smartphone: http://www.microsoft.com/security/online-privacy/mobile-phone-safety.aspx

RECOMMENDED READING LIST

Search This Blog

ARCHIVE List 2011 - Present