Thomas Edison Cyber Defense Center
The Cyber Defense Center (CDC) serves as the focal point of our cybersecurity efforts and provides a central hub for students and faculty, and public to learn about our programs, cybersecurity initiatives, news, and best practices. CDC tries to promote collaboration, increase awareness, and reach out to the external community through various communication channels.
Almost 15 million records were exposed worldwide during the third quarter of 2022. In the same year, 600 data breaches were reported in the U.S. alone with an average cost of $9.44M per breach. With the ever-increasing integration of smart devices along with the mass exodus of almost all services to online platforms, we only expect to see the numbers grow. That is why cybersecurity education and awareness become more important than ever before. For years, Thomas Edison State University has played a significant role on this front by offering a myriad of undergraduate and graduate cybersecurity degrees and certificates. For more information, please visit our Cybersecurity Academic Programs.
-
Cyber Programs
Our Cyber Defense Program of Studies (CDPOS) provide theoretical and practical skills required for a wide range of cybersecurity positions through rigorous curricula. Learning objectives and programs’ details can be found here:
-
Meet The Team
Mentors
Some highlights of our mentors exceptional professional track record:
Dr. Dale Cline
- Founder and CEO of CYBERShark Inc, Marlton, NJ
- Former President of the Americas, McAfee / Network Associates, NJ
- Former President and CEO of NetForensics Inc, Edison, NJ
- Former President of Global Knowledge, Morristown, NJ
Dr. Susan Cole
- CISSP, ISC2 Certification Number 309858,
- CCSK (Certificate of Cloud Security Knowledge), 2012
- C|EH (Certified Ethical Hacker)
- C|NDA (Certified Network Defense Architect)
- E|CIH (Certified Incident Handler), EC Council
- Managed and mentored 9 full-time and two part-time ISSOs within the DC region over a period of 5 years
Dr. Michael A. Silas
- JP Morgan Chase Cyber Security Data Engineer and Data Scientist
- US Government Data Scientist
Dan Reddy
- Former chair of Global Outreach and Standards Harmonization at Open Group’s Trusted Technology Provider Standard development (ISO/IEC-20243)
- Institute for Defense Analysis. Consultant for Supply Chain Assurance
- EMC Corp. Product Manager, Product Security Office, Director of Information Security and Assurance
- Certified Secure Software Lifecycle Professional
- Member of Association for Computing Machinery
Dr. Larry Feldman
- Certified Ethical Hacker
- Microsoft Certified Systems Engineer (McSE)
- Certified Information Systems Security Professional (CISSP)
- Certified SCADA Security Architect (CSSA)
- 15+ years of experience in Industrial Control System reliability and security research
- 10+ years of experience support planning, designing, and implementing organizations’ cybersecurity program strategy and risk management
- Involved in developing multi-domain risk management approaches to achieve trustworthiness of Internet of Things (IoT), Industrial IoT (IIoT), and Cyber-Physical Systems (CPS)
- Involved in developing cybersecurity guidance/standards for public and private sectors (NIST, OASIS)
Jelena Vucetic
- President and Founder of Alpha Mission, Inc.
- Former Principal Consultant of Syntek Systems Corp.
- Former President and Founder of Dynamic Telecommunications, Inc.
- Head of Software Engineering Section, Wireless Telecommunications Operations at Watkins-Johnson Corp
- AWS Practitioner and Educator Certificate
- CompTIA Cloud+ Certificate
Selected Talks and Presentation by TESU mentors
- “Automation and Artificial Intelligence (AI): The effect on future business” at Chattanooga PMI Lunch and Learn, August 2022
- “Dark Web” at PMI Baltimore Chapter 2020 Virtual Professional Development Event, Sept 2020
- Tech Careers at River Ridge Middle School’s Great American Teach In, Nov 2018
- “Dark Web” at CENTCOM’s Cybersecurity Awareness Month Event, Oct 2018
- “Security the Internet of Things (IoT)” at PMI PDE – Baltimore Conference, April 2017; cybergamut Technical Tuesday, Nov 2016; PMI Luncheon, Annapolis Junction Chapter, Dec 2016
- “A History of Risk” at PMI PDE – Baltimore Conference, April 2016
- “The Truth About Securing Your System” at cybergamut Technical Tuesday, June 2015; PMI PDE – Baltimore Conference, Apr 2015
- “Cloud Security: Considerations and Concerns” at PMI Luncheon, Annapolis Junction Chapter, March 2014; PMI PDE – Baltimore Conference, March 2014; cybergamut Technical Tuesday, Feb 2013
- “Cloud Security: Are We There Yet” at CAISSWG Meeting, Oct 2012; Grace Hopper Conference, Oct 2012; Exceptional Software’s TechTalk, Aug 2012
- Cybersecurity in the Northeast Region Symposium (TESU)
- UCONN Center for Hardware Assurance, Security and Engineering (CHASE) Conference
- Trustworthy Suppliers Framework Forum (@ NIST, (Panel Member)
- RSA Conference (NIST Cybersecurity Framework and Suppliers
Selected Publications by TESU Mentors
- K. Musa, J. Vucetic: " Secure Cloud Computing Services using Hyper Cloud Framework", Excelsior College, The Journal of Business and Technology, Vol. 4 No.1, August 2019
- Posted to https://cybersentinel.tech/blog/ 2018 - 2019
- The Importance of Continuous Monitoring; Women in Cybersecurity; CyberSurveillance; Is the Dark Web All Bad?; The Importance of PS-3 (Personnel Screening); Importance of Continuous Monitoring; Cybersecurity Stress; Mortgage Mayhem; Ethics and Technology; Technology and Privacy (co-written with Dr. Dana Hudnall)
- Dan Reddy, Institute for Defense Analyses, Securely Using Software Assurance (SwA) Tools in the Software Development Environment (co-author with David A. Wheeler), 2018
- Dan Reddy, Technovation, Special Issue on Supply Chain “Criticality Analysis and the Supply Chain: Leveraging Representational Assurance”, 2014
- Dan ReddyCrossTalk, The Journal of Defense Software Engineering, “Collaborating Across the Supply Chain to Address Taint and Counterfeit”, 2014
- NIST SP 800-221, Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio, July 2022
- NIST SP 800-221A, Information and Communications Technology (ICT) Risk Outcomes: Integrating ICT Risk Management Programs with the Enterprise 6 Risk Portfolio, July 2022
- NISTIR 8286D, Using Business Impact Analysis to Inform Risk Prioritization and Response, June 2022
- NISTIR 8286A, Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM), November 2021
- NISTIR 8170, Approaches for Federal Agencies to Use the Cybersecurity Framework, March 2020
- NIST Technical Note 2051, Cybersecurity Framework Smart Grid Profile, July 2019
- NIST SP 500-325, Fog Computing Conceptual Model, March 2018
- NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, April 2016.
- NISTIR 7756, CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model, January 2012
- NISTIR 7799, Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications, January 201
-
Contact Us
To learn more, please reach out to:
Dr. Saeed Esmaili Sardari
Associate Dean
e: ssardari@tesu.edu
p: (609) 874-0117Questions?
General queries and questions can be sent to cdc@tesu.edu.
-
News and Resouces
Internal News and Resources
View presentation on the design of the TESU MS in Cybersecurity program
Journal for Women and Minorities in Technology
Edison Sound Stage podcast by a member of the Advisory Board
Read Adam Eisenstadt’s blog for Cybersecurity month:
See Yourself in Cyber: Developing Cybersecurity Professionals to be Workforce Ready (Oct. 27, 2022)External Links and Resources
- National Security Agency/Central Security Service
- Homeland Security
- Cybersecurity and Infrastructure Security Agency
- New Jersey Cybersecurity and Communications Integration Cell
- Cybersecurity | NIST
- Cybersecurity Framework | NIST
- A Hub for National Centers of Academic Excellence
- U.S. Cyber Range
- What is Cybersecurity?