• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

National Center of Academic Excellence in Cybersecurity

Temple University NCAE-C

  • Home
  • Programs of study
    • Graduate Programs
      • IT Auditing and Cybersecurity (NSA Validated)
        • Master of Science
        • Graduate Certificate
        • Point of Contact
        • Video
      • Cyber Defense and Information Assurance
        • Professional Science Master’s
        • Graduate Certificate
        • Point of Contact
        • Video
    • Undergraduate Programs
      • Computer Security and Digital Forensics Certificate
      • Cybersecurity and Human Behavior Certificate
  • Program Faculties
    • ITACS Faculty
    • CyberDIA Faculty
  • Industry Advisors
    • ITACS Advisory Council
      • Industry Advisors
      • Mentor Program
    • CyberDIA Advisory Board
  • Events
    • Webinars/Workshops
    • Competitions
    • Community
  • EMPLOYMENT
    • Current Jobs
    • Past Jobs
    • Career Resources
  • Resources
    • CAE Community
    • CARE LAB
      • Social Engineering Resources
      • Critical Infrastructure Ransomware Attacks
      • CARE Lab Director
    • Professional Communities
    • Training
    • October Awareness Month
    • Temple University Trainings

News

Talk Show- Applying AI to Global Cybersecurity: Complement or Complication

Join the World Affairs Council of Philadelphia to hear from a panel of industry, regulatory, and security professionals for a moderated discussion and audience Q&A about the opportunities and risks of increased reliance on AI in cybersecurity. Location: Racquet Club of Philadelphia, 215 S. 16th St., Philadelphia, PA 19102 Date: Nov 08, 2023 11:30 a.m. […]

Community- BSides Philly2023

2023 BSidesPhilly 2023: Philly’s cybersecurity gathering where hackers, tech enthusiasts, and industry leaders come together to learn and network More details Friday, December 8th, 2023 In-Person at Netrality Data Center North Broad Street, Philadelphia, PA, USA 401 North Broad Street Philadelphia, PA 19108 Get Your Tickets Here 

Competition- Summer Social Engineering Competition (SEC)

The SEC allows students to compete in a purely social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the relevance of social engineering across […]

Competition- Haiku Meet Your Cyber Competition

Cybersecurity Student Competition: Tuesday, Oct 17, 2023, 2 pm ET ‘Meet Your Cyber Competition’ Agenda: Welcoming remarks Cybersecurity Training Game Presentation Hope you can join in! Register here with your @temple.edu email account only. Do not use gmail!

Community- Montgomery College Cybersecurity Awareness Month Discussion

Montgomery College Cybersecurity Awareness Month Discussion You are invited to the online talk: Blue Team Uses of Attack Frameworks By Prof. David Vargas, Cybersecurity Professor, Montgomery College Center of Academic Excellence in Cyber Description: Organizations are constantly under attack. Attack frameworks are used by cybersecurity professionals to identify and describe intrusions so that they can be more […]

Webinar- New SEC Cybersecurity Reporting Rules for Public Companies

Description: This presentation will cover rules public companies need to follow for disclosing cybersecurity incidents and risk management strategy and governance.  Register here Date/Time: 25th October 2023, 3:30 pm -4:30 pm | Location: In-person – 1810 Liacouras Walk, Room 520 & Online Zoom webinar Presenter: Thu Nguyen Thu Nguyen is currently part of the Audit Leadership Management team at Wells Fargo, a […]

Share:

  • Email
  • Print
  • Tweet

Webinar – Changing of the Paradigms: Control Test Automation

Watch Webinar Audit, Risk, and Compliance departments want to use automation to reduce costs, create efficiencies and enhance their value proposition to the business when managing risk; however, they do not have the internal capabilities to execute. Monitoring controls and control testing are often inefficient, expensive, and burdensome for organizations; however, many organizations do not […]

Share:

  • Email
  • Print
  • Tweet

Webinar- Potential Career Paths for IT Auditors

Join us to learn more about the role and career path opportunities of an IT Auditor. We will explore a typical day in our professional lives and share insights on what skills and experiences one can gain working in Internal Audit. Khaleque Ismail and Ramir Austin, both IT Auditors at Chubb, will share their personal […]

Share:

  • Email
  • Print
  • Tweet

Webinar- Third Party Risk Management

Senior managers and board directors are ultimately responsible for identifying and controlling IT risks arising from relationships with third parties such as vendors, sub-contractors, customers, joint-ventures, and other external entities. Such risk may include: strategic risk, reputational risk, operational risk, compliance risk, credit risk, and other risks.  This presentation will introduce and discuss the importance […]

Share:

  • Email
  • Print
  • Tweet

ITACS grad Shahla Raei applies practical skills in IT audit career

Share:

  • Email
  • Print
  • Tweet

Webinar- IT Auditor’s Role: Assessing IT Security Controls within Enterprise Resource Planning [ERP] Implementations

This webinar will provide a brief background and high-level overview of performing IT security control assessments on ERP implementations. Several practical industry use cases will be provided including risk/reward and lessons’-learned. When: December 10th, 12:00 – 1:00 PM Presented by: James D. Baranello | Managing Principle Consultant, Technology & Risk Management Services | Comcast  

Share:

  • Email
  • Print
  • Tweet

Webinar- Blockchain – The Distributed Ledger System

ITACS Webinar Series Blockchain (cryptocurrency) is the technology that is most likely to cause the largest impact on the future of business. While the technology is complex, the idea is simple. At its core, blockchain is a globally distributed database operating simultaneously on millions of devices and is open to anyone. In these databases, anything […]

Share:

  • Email
  • Print
  • Tweet

Student shares successful job search experience

I am Binju Gaire. I am a Master of Science graduate student in the IT Auditing and Cyber-Security (ITACS) Program and will complete my degree in August 2018. Prior to joining the ITACS Program I worked as a staff Auditor at Office of the Missouri State Auditor conducting compliance, financial and IT audits of local […]

Webinar- Robotic Process Automation and the Future of Risk

Robotic Process Automation and the Future of Risk This webinar will provide a brief background and high-level overview of Robotic Process Automation, ways in which it can be leveraged for Risk and Security, some practical use cases including lessons learned. Presented by: Amanda Cuccinello | Advisory Services Ernst & Young, LLP Recorded: November 29, 2017 Watch the […]

ITACS Spans Continents With New Expansion into China

Temple University – Beijing National Accounting Institute for international ITACS educational partnership

ITACS Students Win ISACA Philadelphia Chapter’s 2017 Scholarship Competition!

ITACS Students win 1st and 2nd place in ISACA Philadelphia Chapter’s 2017 Scholarship Competition! 1st  Place – $2,500 Scholarship awarded to Ioannis (“Yanni”) Haviaras  (read Yanni’s essay here) 2nd Place – $1,500 awarded to Paul Linkchorst (read Paul’s essay here)  The competition’s announcement asked participants to select and write an essay on one of the 3 topics […]

Threats & Opportunities in Geographic Information Systems (GIS)

The IBIT Report – Threats & Opportunities in Geographic Information Systems (GIS) authored by ITACS Director David Lanter provides an insightful history of the development of GIS and related technologies, outlines a framework for classifying sensitive geospatial data based on factors of risk and value, and provides a processing for recognizing, governing and mitigating cyber security risks. […]

« Previous Page

Primary Sidebar

EVENTS

EventsCheck Here For More

CYBERSECURITY CAREER PATHWAYS

Cybersecurity Career Pathways ToolAccess Career Pathways Tool

SECURITY CONSULTING & EDUCATION

Cybersecurity Career Pathways ToolCybersecurity Resources

Copyright © 2025 Department of Management Information Systems · Fox School of Business · Temple University