cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Industry News

Tech-savvy students learn new skills at Cybersecurity Seminar

The next generation of cybersecurity defenders might have been sitting in a Las Vegas conference room Sunday. The Colloquium for Information Systems Security Education, or CISSE, hosted local middle and high school students at the JW Marriott for an interactive seminar to spark interest in cybersecurity careers.

Read more...

The CyberFed Show

The CyberFed Show is the latest addition to the Cybersecurity Competition Federation. Hosted by Dr. Dan Manson, the CyberFed show was created to provide the latest insights on cyber competitions and threats, throughout the digital landscape. Join us on a fun-filled journey behind the scenes of the latest in cybersecurity competition news, player developments and competition design.

Read more...

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.

As a 501(c)(3), CISSE relies on member support. If you value our mission of service, please consider making a donation.

Donate Today

Recent Posts

  • 17 April 2021 Cyberspace Solarium Commission - Full 2020 Report The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending…
  • 03 March 2021 HAFNIUM targeting Exchange Servers with 0-day exploits Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these…