The IAEA offers 21 free online learning modules in nuclear security. Each module is based on the IAEA Nuclear Security Series and other guidance documents and is estimated to take one to four hours to complete. The modules target a wide range of professionals with nuclear security responsibilities and others interested. To access the modules, please visit the IAEA’s e-learning platform.
The responsibility for nuclear security within a State rests entirely with the State. The Agency contributes to global efforts to achieve security in activities or facilities that involve the use, storage or transport of nuclear and other radioactive material. It does so by supporting States, upon request, in their efforts to meet their national responsibilities and international obligations, to reduce risks and to respond appropriately to threats.
Human resource development is a key component of a robust and sustainable national nuclear security regime. The IAEA assists States in developing nuclear security expertise through training, including e-learning modules that introduce aspects of nuclear security. E-learning complements face-to-face trainings and supports efforts to ensure competence, skills and strong nuclear security culture.
The 21 modules are divided into four topical categories:
The Nuclear Security e-learning is available here. Participants need to create an account and log in – instructions are available on the IAEA e-learning platform. For further information please send an email.
At Symantec, we believe Cyber Resilience is about the management--not the elimination--of risk. We recognise that security needs to go beyond systems, software or IT departments. Cyber Resilience puts the power in the hands of people, and arms them with the ability to recognise risks, draw on the collective intelligence of others, and take preventive or corrective action.
We believe Cyber Resilience calls for strategic action. Now. To help achieve this we propose a new strategic partnership between the security function and business leaders, to balance competitive advantage against the inescapable Cyber Risk of today. Our integrated portfolio of solutions helps your people:
It is time to raise the stakes.
Through learning communities, you have a great opportunity to connect with other students who share your interests and get to know faculty.
Students who participate in a learning community earn higher grades and have increased exposure to university resources and the Greater Lafayette community.
Over 3,000 first-year students and 1,000 current students who participate in learning communities every year! Don't be left out!
Incoming students to Purdue for Fall 2023, can apply to a learning community starting January 18th - July 5th. April 15th is the priority application deadline to be placed in a learning community. Applications submitted or modified after April 15th will be considered based on availability following the initial placement period.
Students who apply for a Learning Community by the April 15th priority deadline will be notified of their placement status through their Purdue email account by the end of the first full week in May.
A housing contract with University Residences must be completed prior to applying for a learning community. After accepting your offer of admission, allow up to two business days to gain access to the housing contract portal.
The DataMine application for 2023-2024 Academic Year for current Purdue students is now open. Click here to apply.
Apply Today »Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the debut of its Cyber Security Brief Podcast. Hosted by threat researchers from Symantec’s Security Technology and Response (STAR) division, the new podcast provides a weekly update on the latest cyber security news and intelligence.
Symantec’s STAR division plays a central role in harnessing telemetry from the world’s largest civilian threat network. The team has published extensive and ground-breaking research on the world’s most insidious, costly, and complex cyber-attacks, including Stuxnet, WannaCry, and Dragonfly to name just a few. STAR has also collaborated with law enforcement in the arrest and prosecution of hundreds of cybercriminals over the years.
“Symantec’s STAR organization is composed of security engineers, virus hunters, threat analysts and researchers around the globe. They are the industry’s eyes and ears when it comes to surveying and keeping a finger on the pulse of the security threat landscape,” said Orla Cox, Director of Symantec Security Response. “The Cyber Security Brief Podcast provides a first-hand perspective from these world-class researchers on the cyber security landscape and the existing Symantec research, as well as their experiences working to protect companies and individuals around the world.”
The debut season includes the following episodes so far:
To listen and subscribe to the podcast, please visit the Symantec Cyber Security Brief Podcast page.
Anti-virus software works by comparing the files on your computers and those you access online to a database of known viruses, known as virus definitions. Without regularly updated definitions, an anti-virus program won't protect your computers and office workstations against new viruses. All paid anti-virus programs, including Symantec's Norton AntiVirus and their business editions, sell definition updates through subscription plans, and no longer update the definitions once the subscription expires. Unlike some other brands however, current versions of Symantec's programs will completely stop functioning -- even with old definitions -- after the subscription ends, leaving the computers on your network unprotected.
A professional writer since 1998 with a Bachelor of Arts in journalism, John Lister ran the press department for the Plain English Campaign until 2005. He then worked as a freelance writer with credits including national newspapers, magazines and online work. He specializes in technology and communications.
Modern Identity Is Pushing the Boundaries of Government Services
The American public relies on digital technology daily. From online banking to distance learning, many run their lives from mobile devices to access everything. Naturally, behind the widespread adoption of consumer technology is the need for convenience and ease of use. At the same time, security is fundamental to optimal experiences. A secure Identity is at the start and center of people’s confidence and ability to access entitled services and benefits. In fact, for access to data, Identity is a vital line of defense.
Individuals share an enormous amount of personal data online and with government agencies. If this data falls into the wrong hands, it can have severe consequences, including Identity theft and fraud.
The potential harm caused by these breaches can lead to significant financial and emotional damage for the individual and have repercussions in the community. To build trust with their residents, state and local governments must prioritize modern security controls to protect their personal information.
Modern Digital Government and Legacy Services
Digital technologies are always evolving to be better and faster. However, legacy applications, built years ago, aren’t keeping pace. Simply put, outdated applications cannot support digital transformation. Not only are outdated services significant security risks, from a user experience perspective, they’re usually found to be flawed and inadequate.
Several factors drive a modern digital government,
including:
1. Inefficient, manual systems and processes.
Administrative systems are overburdened; manual systems can’t keep up with the volume of administrative paperwork. Complex legacy systems and the costs to maintain them are creating bottlenecks in communications with residents. In times of crisis, such as disaster recovery, individuals may need to wait weeks or even months to process their benefits, and the lost time is a considerable cost or “time tax” for the parties involved, namely, survivors, contractors, and case workers.
2. Following the Federal roadmap.
Required actions for the federal government can create a voluntary approach and model for state and local partners to Strengthen their digital service delivery.
3. Expanding attack surface.
Protecting the privacy of the public is top-of- mind. The National Association of State Chief Information Officers (NASCIO) released their list of State CIO Top 10 Priorities for 2023. Number one was cybersecurity and risk management. As the technology gets easier to access and the number of users increases, so do cyber threats. Legacy applications are more vulnerable to attacks than systems utilizing modern Identity and Access Management (IAM). Modern IAM centralizes and manages user access seamlessly, with additional safeguards when required, and at speed. Having Identity and cybersecurity experts constantly mitigating new threats can make a significant difference.
Identity Access Management to Build Trust
“Attackers don’t have any more hoops to jump through to get to my website than my users do,” said Sean Frazier, federal chief security officer at Okta, when describing the need for a transparent security posture that can address the diverse users for many government apps. A modern IAM approach works on many levels to shut down intruders as quickly as possible without distracting the intended customer experience.
Those steps include:
Modern data protection tools can enable better service delivery, personalized services, and faster response times. Protecting community members’ personally identifiable information (PII) can help rebuild trust with the American public and increase their interest in using government digital services.
Modern Identity for Residents
Several trends in everyday life have highlighted the need for modern Identity solutions. For starters, the public can access always-on technology, such as unsecured Wi-Fi in coffee shops, parking lots, airports, and more. This creates a dangerous opportunity for security breaches.
There are also frustrations and an increase in fraud in unemployment claims. And new technologies create challenges for many groups of people: those who lack access to them, have limited or no experience with them, or simply choose not to use them. All of these issues open the door for scammers.
These are just a few trends that are driving modern Identity and security for services.
Modern Identity for the Government Workforce:
Daily cybersecurity issues impacting government services make it difficult for workforces to keep up. With fewer resources and training, they can spend long hours trying to fix issues in outdated systems. They also have to serve frustrated community members looking for solutions.
Modernizing government services and systems can dramatically increase the efficiency of the workforce. Eliminating administrative bottlenecks and automating manual processes can free up massive hours for agencies to focus their time, resources, and energy on service delivery that’s in tune with people’s needs.
Modern Identity and Access Management Advantages
Government agencies are committed to restoring public trust, starting with a solid foundation of modern Identity and access management. “Okta’s mission is all about making Identity and access simple for the government,” explained Steve Caimi, Okta’s Director of Public Sector Product Marketing. “So, when you think of Identity as a cloud, it can deliver all the capabilities that make Identity management universal, easy, and reliable.”
Identity and access management systems are categorized as High Impact under the Federal Security Modernization Act (FISMA). Okta’s modern Identity platform achieved FedRAMP High Impact Level Authorization. It is built exclusively for the federal government and its partners. The platform enables agencies to adopt the cloud and allow online services to be continuously delivered to the public with the highest level of security and privacy.
Trust also depends on delivering digital service excellence for the people being served. Apps and mobile devices are simple, intuitive, and widely adopted by the public. Using these digital tools and devices is critical for the government to serve communities effectively.
In a modern digital government, trust is rebuilt through convenient, easy-to-use services that work consistently and quickly for people of all abilities. At the same time, their identities are secure, and their data remains private.
Modern Identity to Strengthen the User Experience
Agencies can create better experiences for their workforce, as well as the communities they serve.
Unique benefits to Okta’s modern Identity platform include:
Okta: Modern Identity and Security for State and Local Government
Modern Identity securely connects communities with a digital government and workforce using the always-on services they demand. Rebuilding trust depends on easily accessible, reliable, and secure government services.
Getting Identity right is critical today, yet it can be challenging. With a trusted partner like Okta, your agency can create better experiences for community members while you Strengthen your security, compliance, and uptime through modern Identity.
Learn more about Okta at: www.okta.com/publicsector