This page contains a Flash digital edition of a book.
University of North Carolina at Chapel Hill


Stan Waddell Executive Director and Information Security


Officer


B.S.—Electrical Engineering, Old Dominion University


M.S.—Management and Administration Sciences, University of Texas at Dallas


UNC-Chapel Hill has 29,390 students, and approximately 60,000 computers and related devices. Stan Waddell, 40, the University Information Security Officer, says that he faces the normal threats: web pages hosting malicious code and hacker probing. But UNC’s challenge is sharing ideas, knowledge, and education in an unrestricted environment, requiring open access to resources while also securing assets. Any security program or initiative that hinders the educative goal is in affect a denial of service, and so creative ways to ensure security must be employed. Waddell is an avid reader of peer-reviewed journals like IEEE Security and Privacy, but also likes SC and CSO magazine. He attends the Black Hat, Def Con and the industry- specific Educause Security Professionals Conference. His favor- ite security applications include Web of Trust: a web site rating browser plug-in and IP-COP: a bootable firewall OS that runs on old computer hardware. He also uses Qualys Browser Check: a web page that scans your browser and can make immediate fixes, on all his computers.


to safeguard lives and information via cyberspace. The DOS faces cyber threats on a daily basis, as its international visibility makes its computer networks a target for terrorists, nation-state aggressors, criminals, and global political activists. The Depart- ment has a critical need to secure vital diplomatic information on computer networks to facilitate foreign policy. Daniels, who has been a special agent for seven years, advises students interested in pursuing an information technology security career at the DOS, or one of the many internationally-focused federal depart- ments or agencies to gain an ability to adapt and adjust to chang- ing environments, learn foreign languages, be able to multi-task and to cultivate a spirit of innovation.


U.S. Dept. of Housing and Urban Development


Jerry Williams Chief Information Officer


Accounting, Cheyney State University Public Administration, Troy University


U.S. Department of State


David Daniels Special Agent


B.A.—National Security Policy, University of Pittsburgh


Note: The views expressed are Special Agent David Daniel’s own and not necessarily those of the Department of State (DOS) or the U.S. Government.


For three years, Daniels has been involved in an ongoing di- alogue and exchange with various foreign governments on cyber security and cyber counter-intelligence issues. The assignment combines his language skills and cultural awareness, with his role as a State Department diplomat and federal law enforcement agent to further the Bureau of Diplomatic Security’s key mission


www.blackengineer.com USBE&IT I WINTER 2011 63


At HUD, Williams is responsible for a $379.2 million budget, 270 employees and developing, modernizing and enhancing HUD’s outdated information systems. Previously, he was the deputy CIO at the Department of the Interior and that the department met IT requirements in security, architecture, IT capital investment planning and records management. HUD recently participated in the Administration’s National Public Awareness and Education Campaign to promote cybersecurity. The department also just ended its annual mandatory cyber security review. Williams says he is proud of HUD’s cyber security incident response plan and its response team. The com- mitment to emergency preparedness has allowed the department to address most if not all of the cyber security challenges, from malware to electronic crime to phishing , that it faces. Williams urges students to gain IT training, followed by progressively more challenging and diverse experience that covers multiple IT disciplines. They will also benefits from financial management, project management and acquisition management experience. When he can, Wiliams reads Federal Information Processing Standards, the National Institute of Standards and Technology Interagency Reports, Government Computer News and Federal Computer Week.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88