Teaching Cybersecurity: How has academia changed in the last two years? Which method do students prefer to study? (physical attendance, online learning, etc.)
It really depends on the type of student: I’ve found that online learning takes away the fear of speaking up or sharing an opinion on a topic matter. As a teacher, it is harder to teach online since you cannot read your students’ body language or emotions to adjust your teaching style or content.
Is there a need for more people in the cybersecurity sector?
YES, especially for women!!! There also is a need for professionals and academics in the cybersecurity and international affairs space. It is important to have these bigger-picture discussions on cybersecurity to create globally agreed-upon norms and to find collective ways of tackling future or emerging problems and threats.
According to your experience, what professions do you see booming now and in the next few years?
Creative/Cultural Technologists, Cyber Diplomats, Data Privacy experts, Cryptographers, Tech Lawyers
What do you advise young people when they tell you they want to study cybersecurity? What are the steps they need to follow?
If you don’t think you are technical enough, don’t worry, and please don’t carry around the “I’m-not-technical-enough imposter syndrome.” There are plenty of non-technical jobs in cybersecurity. You don’t need a degree in cybersecurity; prove that you can do the job you’re in.
Fail as much as you can, meet a ton of people and make a lot of messes. It won’t matter later on. To change the tech world, you must possess a holistic set of skills and thinking to galvanize movement toward a common goal and impact. Instead of changing jobs, try on many hats within a company or organization.
What advice do you give everyday people on protecting themselves from cyberattacks?
Practice cyber hygiene like you would your everyday hygiene:
- Change your passwords every month (and make them fun/funny so you remember them).
- Install a firewall (or start a literal fire around your computer…just kidding).
- Use multiple VPNs.
- Read the privacy disclaimer.
- Don’t share your personal information (especially locations on social media), and if your grandma calls and says a man is on the phone and wants money for your ransom.
- Make sure to teach her too.
You are teaching “Applications of Cybersecurity to International Relations,” in a few words can you explain to us what this course consists of?
Students of this course will learn the basic concepts and theories of cybersecurity applied to International Relations. They will comprehend international cybersecurity governance norms, policies, and legal processes; understand the interaction between the internet governance ecosystem, online communities, and the global digital south; leverage understanding of the intersection of information, diplomacy, digital human rights, and global governance; evaluate what government information operations tell us about a nation-state’s geopolitical objectives; formulate ways on how to protect citizens from cyber warfare, disinformation and e-crime; critically think and engage in cutting-edge cyber-security solutions to national governments, international institutions, and private sector industry.
My sales pitch
Imagine the power grids are down, access to financial banking is disabled…the lights go out. Can you imagine a future where the President hits the internet Kill Switch, a hacker poisons the water or conducts massive surveillance of all personal data; or how about a scenario where each country controls their own cyber sovereign internet? News flash, these are all events which have already happened.
This class will teach you about the future, your future, and how you can work with other nations, private sector companies, and organizations to keep freedom of speech and the economy literally online. Each international relations theory will be carefully applied and crafted to view the world through a new cyber lens. The outcome of this course will give you the tools, as a future government leader or CEO or simply as a citizen, to make the right decisions to manage the future of the internet across borders while fighting criminals in cyberspace.