Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.
VIEWPOINT: The Importance of Showing Thought Leadership
Many professionals understand the significance of building awareness of their expertise and thought leadership, but often grapple with how to do so. Thought leadership goes beyond mere expertise; it is a process that entails building authentic, collaborative relationships within one’s industry, identifying patterns, recognizing emerging trends, and cultivating a code of values and integrity that […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Many professionals understand the significance of building awareness of their expertise and thought leadership, but often grapple with how to do so. Thought leadership goes beyond mere expertise; it is a process that entails building authentic, collaborative relationships within one’s industry, identifying patterns, recognizing emerging trends, and cultivating a code of values and integrity that guide one’s conduct in their field.
An example of an industry where thought leadership is especially critical these days is health care, where organizations and leaders are facing unprecedented shifts due to the COVID-19 pandemic. According to Gallup’s annual Health and Healthcare survey, only 48 percent of Americans now rate U.S. health care as “good” or “excellent.”
While there are many factors influencing this perception, including costs and political partisanship, health-care leaders must have strong communications with their employees, patients, and communities to navigate the post-pandemic era and the ongoing transformation of health care. One highly effective means of achieving this is through elevating their thought leadership through op-eds.
The Relevance of Op-Eds in Times of Transformation
Op-eds are written viewpoints that allow professionals to demonstrate their thought leadership and drive change during these transformative times. By crafting compelling arguments supported by data and personal experiences, op-eds can empathize with and educate patients, open doors to new opportunities, shape health-care policies, and contribute to the broader conversation about the future of health care.
As VICE News Editor Chloe Angyal once wrote about the power of op-eds, “It matters who writes op-eds. It matters which ideas make it to the op-ed pages. Because a lot of them don’t stay there. Op-eds become books. … Op-eds become job offers. Op-eds become consulting gigs. Op-eds become speaking opportunities. Op-eds become funding offers. Op-eds become meetings with senators. Op-eds become policy. … It matters who writes op-eds, because it matters who gets to do all the things [that] can come after.”
Choosing Topics Wisely
The key to a powerful op-ed lies in the passion behind it. Start by identifying topics that resonate deeply with you and issues that you wish people understood better. Health-care leaders likely already stay informed about current events and health-care developments. That finger on the pulse of health care is an asset for placing op-eds because news outlets often seek timely responses to significant industry news stories. If you possess relevant expertise or share experiences related to topics in the news, these connections can serve as a launching point for your op-ed.
Do remember that it’s important to engage with your communications department, public-relations agency, or consultants in the op-ed writing process. They can help you refine your ideas and guide you through drafting and pitching your op-ed effectively.
Crafting a Compelling Op-Ed
A well-structured op-ed effectively conveys its message and resonates with the audience. Aim for an article length of 800-1,200 words, keeping your argument concise and clear. Use plain language to ensure accessibility for a wide readership. Here is a suggested structure for your op-ed.
Lede: This is your opening paragraph that should grab readers’ attention. You can start by recounting a current event or study, or sharing an anecdote that illustrates the issue you are addressing.
Thesis: State your central argument forcefully and concisely. This should be the core message you want readers to take away from your op-ed.
Supporting Evidence: Health-care leaders often talk about the importance of being data-driven. The same holds true in op-eds. Present data, expert quotes, scholarly references, or personal stories that back up your health-care thesis. The combination of human stories and data will make your op-ed compelling and relatable.
Application and Reflection: Use the evidence you presented to reinforce your thesis and explain its significance to the readers. Show them why they should care about the issue and its implications.
Conclusion: Circle back to the theme or story mentioned in the lead and restate your thesis to leave a lasting impression on the reader.
Pitching and Publishing
To get your op-ed published, you need to identify publications that are interested in the topic you’ve covered. Make sure to check each publication’s website for op-ed criteria, including word count/length and potential exclusivity requirements.
There are two ways to approach publications with your op-ed:
1. Pitch: Send a concise email to the editor outlining your article’s idea, why readers will care, your qualifications to write on the subject, and a short bio. Make sure your subject line clearly indicates that it’s a timely pitch if relevant. Many editors will only accept pitches from authors with whom they’ve worked before.
2. Submit on Spec: This is the more typical path if you haven’t written for a publication previously. To submit on spec, you must write the entire op-ed first and then submit it with a short pitch.
Be patient if you don’t hear back immediately. Follow up after a reasonable period, often one to two weeks for a piece that isn’t time-sensitive, or one day for a piece that is.
If your op-ed gets rejected, don’t take it personally. Accept feedback graciously. If the editor invites you to submit again, wait at least a month and try again.
Publication Day and Beyond
If your op-ed gets accepted, congratulations. Op-eds are a versatile form of content that can be repurposed across different platforms. Maximize your article’s reach by reusing it on your company’s social-media accounts and your own, in-organization newsletters, the company’s website, and any other owned media assets. Engage with readers who comment on your op-ed, especially those who have genuine questions about the issue, but avoid engaging in heated debates.
Finally, be proud of yourself for advancing the ideas about which you are passionate, especially during this time of transformation.
Virgie Townsend, JD, is director of public relations at Strategic Communications, which says it provides trusted counsel for public relations, including media strategy, media outreach, monitoring, and analysis.
Utica University invests in growing cybersecurity program
UTICA, N.Y. — Utica University is taking its cyber-education program to the next level with a new cyber range it will build in Bull Hall. The range will open up new education and training methods and opportunities for the university beyond the programs and products it uses now to train the next-generation cyber workforce, says
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
UTICA, N.Y. — Utica University is taking its cyber-education program to the next level with a new cyber range it will build in Bull Hall.
The range will open up new education and training methods and opportunities for the university beyond the programs and products it uses now to train the next-generation cyber workforce, says Andrew Carr, director of graduate cybersecurity programs.
“We can have a ransomware incident,” he says. The range will give students a “pull back the curtain” view on a cybersecurity incident. “The limits are endless.”
The 1,300-square-foot range will include 20 mobile computing stations, allowing professors to plan both individual and team activities.
“Right now, we have a lot of hands on,” Leslie Corbo, director of undergraduate cybersecurity programs at Utica University, says. The range will be different, she notes, because it will allow students to see — and participate — in the entirety of a cyber incident from planning to clean up. Students will also have opportunities to play different roles, from the “bad actors” who do the hacking to the good guys who fight them off.
“They’re going to be able to see everything,” she says, and that will help students determine what areas of cybersecurity they want to focus on professionally.
The range helps professors align with the cyber curriculum the university revamped in January 2022 to provide a more well-rounded education on both sides of the cyber equation, she adds.
“Cybersecurity moves so quickly,” Corbo says. “We start to fall behind if we don’t have something like this.”
Such ranges are usually found at “elite” schools, Carr notes. “It’s really for those trying to push the boundaries.”
The range isn’t just a benefit to Utica University students, he adds. It’s also a boon to the area’s industry professionals and businesses.
“People are getting excited we are bringing something like this in,” he says.
Opportunities for those professionals to both learn and share their experience with students will be plentiful, Carr says. That networking can also help students land internships or even employment upon graduation.
Both Carr and Corbo are working on curriculum with the expectation the range will be complete and active for the fall 2024 semester.
Utica University received a $150,000 grant from the George I. Alden Trust for the range and is actively fundraising for the project. Construction is expected to begin when funds raised reach $300,000.
The range will also include auditorium-style seating for up to 16 people and a video wall that allows distance-learning students to participate.
Utica University has just over 500 students in its cybersecurity program, and that number is growing, Corbo says. “I believe this range will make it even more of a big thing,” she says.
The university offers graduate and undergraduate cybersecurity degrees with three specializations — cyber operations, digital forensics and incident response, and cybercrime and fraud investigation.
VICEROY program seeks to meet U.S. DoD cyber-workforce demands
“Through the latest round of the VICEROY Program, we are advancing the mission of preparing a highly skilled cybersecurity workforce for the Department of Defense. These virtual institutes, in collaboration with esteemed academic partners, augment traditional curricula, providing hands-on, experiential learning, and internships tailored to meet the demands of the Armed Services, DoD, and Defense
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
“Through the latest round of the VICEROY Program, we are advancing the mission of preparing a highly skilled cybersecurity workforce for the Department of Defense. These virtual institutes, in collaboration with esteemed academic partners, augment traditional curricula, providing hands-on, experiential learning, and internships tailored to meet the demands of the Armed Services, DoD, and Defense Industrial Base,” Heather Hage, president and CEO of Griffiss Institute, said in a release. “By doubling the size of the program, we are enhancing the pipeline of cyber and spectrum students from secondary schools to colleges, cultivating early interest in tackling challenging DoD and National Security problems. VICEROY serves as a catalyst, empowering future leaders to confidently address the evolving challenges of the cybersecurity industry.”
Chester Maciag, director for cyber science and technology and academic outreach with the Office of the Undersecretary of Defense for Research and Engineering, added, “The DoD seeks to modernize and accelerate capabilities to meet the challenges of tomorrow’s global-security environment. VICEROY is developing mission-focused cyber and spectrum operations skills within our future workforce critical to achieving this goal.”
VIEWPOINT: Cybersecure Your IoT
Internet of Things (IoT) technologies employ embedded devices to sense, and sometimes control, the physical world around us. They offer several benefits that range from general awareness to improved operational efficiency, or just plain convenience. IoT solutions have supported all of this nation’s critical-infrastructure sectors, from commercial facilities and transportation to food and agriculture, while
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Internet of Things (IoT) technologies employ embedded devices to sense, and sometimes control, the physical world around us. They offer several benefits that range from general awareness to improved operational efficiency, or just plain convenience. IoT solutions have supported all of this nation’s critical-infrastructure sectors, from commercial facilities and transportation to food and agriculture, while also proliferating markets for household appliances, climate-control systems, and beyond.
As estimates for world-wide IoT adoption approach nearly 43 billion IoT devices in 2023, it is widely acknowledged that this technology has created an immense (and growing) threat landscape for cybersecurity attacks. Accordingly, IoT security has increasingly become a national priority, dating back to Executive Order (EO) 14028 (2021), “Improving the Nation’s Cybersecurity,” which tasked the National Institute of Standards and Technology (NIST) to initiate programs addressing the cybersecurity capabilities of consumer IoT devices.
The broadened attack surface, which results from the widespread deployment of disparate devices, as well as their respective firmware, operating systems, and wireless-communication protocols, increases the security risk based on the complexity of the connectivity models and the often ad-hoc implementation of these solutions. The ramifications of an exploited IoT device, connection, or cloud service present a significant risk to businesses and consumers alike, with the potential to result in far-reaching intrusions that can laterally impact business systems, sensitive customer data, and/or any number of enterprise infrastructure. Recent high-profile attacks have shown that this not only can happen, but that when it does, recovery costs can run millions of dollars, not to mention the inevitable impact on their brand’s reputation.
While the complexity of the IoT arena can seem daunting, there are a handful of simple strategic protections that can be levied at different levels of the architectural model. The following practices are strongly encouraged within an organization to protect critical information-system assets.
• Device: Prior to acquiring and deploying an edge device, research the different manufacturers and the products they offer. The manufacturer’s country of origin and provided support should be considered, in addition to device-specific factors such as the operating system, any onboard software, the use of encryption, etc. When setting up the device, ensure that it has the latest firmware update, and determine the method by which the device can be updated in the future (e.g., wirelessly, serial, etc.).
• Connection: There are several wired and wireless-communication technologies that can connect devices to cloud-service providers and user applications. The requirements of each use case should typically dictate which is best suited to the planned implementation. While security tips would ideally be tailored to the selected means of communication, general suggestions involve changing default settings (e.g., access point name, password), employing the strongest encryption methods, and disabling any unused features, ports, etc.
• Application: Multifactor authentication (MFA) is a buzzword in the cybersecurity realm for a reason — it is one of the most-effective deterrents because it relies on two or more methods of verification to log into an account. These authenticators fall into the following categories: something you know (e.g., passwords), something you have (e.g., smart cards, authenticator app, or password token), and something you are, (e.g., a thumbprint or facial recognition). Ensuring devices and logins have MFA enabled is one of your best protections for user sign-ins.
• Zero-trust security model: A more-complete approach involves the implementation of a zero-trust security model, which replaces legacy-network, perimeter-security strategies by validating each access request while employing strong authentication and least privilege. The zero-trust model treats every request as if it was coming from a vulnerable open network, which means maximized scrutiny and security are required for each request. This model also enables real-time identification of vulnerabilities to proactively stop cybersecurity attacks before they start.
The implementation of these basic security practices can serve as an effective first step toward securing one’s IoT solutions, whether they include home devices or more significant industrial equipment. Per EO 14028, NIST has more recently released a collection of guidance for both consumers’ and the federal government’s adoption of IoT technologies which provides a more complete set of security safeguards and related considerations. Readers interested in learning more are encouraged to consult the publications provided by NIST’s Computer Security Resource Center (CSRC).
John Reade is IT systems lead at Quanterion Solutions Inc., a Utica–based provider of cutting-edge analytical services, products, and training across a range of disciplines including cybersecurity; managed-cloud services; reliability, maintainability, and quality; information-systems management; software development; information and knowledge management; and more. Email IoT@Quanterion.com with any questions or to learn more about securing your IoT devices, cloud, or connectivity.
TechMD hires vCIO for Syracuse office
SYRACUSE, N.Y. — TechMD, a technology management and cybersecurity company headquartered in Endicott, recently announced it has added David Kerrigan as vCIO. Kerrigan has more than 30 years of experience in the managed-IT field and has helped many small- to mid-size companies build and maintain their technology systems. As a vCIO at TechMD, he will
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — TechMD, a technology management and cybersecurity company headquartered in Endicott, recently announced it has added David Kerrigan as vCIO.
Kerrigan has more than 30 years of experience in the managed-IT field and has helped many small- to mid-size companies build and maintain their technology systems.
As a vCIO at TechMD, he will be working from the company’s Syracuse office and servicing clients in that region. His main responsibilities will include managing customer relationships to ensure that clients get the most from their partnership with TechMD.
“I’m most excited about where TechMD is right now as a business. It’s poised in that moment between being a small business and being a mid-sized business. It’s exciting to be part of determining what that mid-sized business is going to look like,” Kerrigan said in a statement.
Kerrigan received a bachelor’s degree in mechanical engineering from Lafayette College.
“We are thrilled to have David on our team helping our clients navigate the intricacies of technology, he has vast knowledge and experience in guiding organizations on their technology journey” Brian Hanify, chief revenue officer at TechMD, said.
TechMD has more than 275 employees nationwide and a cybersecurity sister-company, called 1nteger Security.
Clarkson professors awarded $400,000 NSF cyber grant
POTSDAM — The National Science Foundation (NSF) has awarded a nearly $400,000 grant to four professors at Clarkson University to incorporate cybersecurity into their computing classes. The funding will help them “create and integrate” identity and access management (IAM)-themed, project-based learning (PBL) curriculum into existing computer-science and software engineering-related curricula, the university said in its
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
POTSDAM — The National Science Foundation (NSF) has awarded a nearly $400,000 grant to four professors at Clarkson University to incorporate cybersecurity into their computing classes.
The funding will help them “create and integrate” identity and access management (IAM)-themed, project-based learning (PBL) curriculum into existing computer-science and software engineering-related curricula, the university said in its Sept. 14 announcement.
This project is under the direction of Daqing Hou, professor of electrical and computer engineering and director of software engineering; Jeanna Matthews, professor of computer science; Jan DeWaters, associate professor in the Institute for STEM Education; and Faraz Hussain, assistant professor of electrical and computer engineering.
The Clarkson team will collaborate with researchers from the University of Texas at San Antonio, the school noted.
Project-based learning (PBL) and other active learning practices have been shown to increase student motivation and engagement, raise examination performance, and reduce failure rates, according to Clarkson.
Students will work on “authentic, real-world” problems similar to what they will encounter on the job, the university said. This approach will broadly expand cybersecurity education to all computing-related students, not only those enrolled in dedicated cybersecurity programs.
The project also seeks to broaden participation in computing disciplines. Ultimately, it will improve student-learning outcomes, including personal competencies, mastery of cybersecurity content, and higher-order thinking skills, Clarkson contends.
The project will design and develop a set of ready-to-use IAM-themed software course projects, along with supporting course modules and active learning activities, which will enable course instructors to assign and support take-home PBL projects.
At least 10 faculty members from multiple institutions will use the developed course materials in their classrooms, impacting more than 1,000 students, Clarkson said.
A pilot study will assess the promise of the developed projects in improving student-learning outcomes.
Clarkson said it will disseminate the overall framework and materials developed through websites, publications in conference proceedings and journals, and workshops.
New York names new chief information officer
ALBANY, N.Y. — New York State has a new chief information officer (CIO) and director of the New York State Office of Information Technology Services. Dru Rai will lead the state’s ongoing digital transformation and will work with state agencies to create more seamless digital interactions with state government, the office of Gov. Kathy Hochul
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ALBANY, N.Y. — New York State has a new chief information officer (CIO) and director of the New York State Office of Information Technology Services.
Dru Rai will lead the state’s ongoing digital transformation and will work with state agencies to create more seamless digital interactions with state government, the office of Gov. Kathy Hochul said.
He succeeds Angelo (Tony) Riddick, who retired earlier this year.
The agency is charged by law with protecting the state’s systems from cyber intrusion and attack and is part of the team that operates the Joint Security Operations Center (JSOC) in Brooklyn, which has fostered a unique “whole of state” approach to cybersecurity, Hochul’s office said.
“Under Dru Rai’s direction, we will continue to innovate and grow to meet both the challenges and opportunities of this new digital age. Since the pandemic, our state has moved swiftly to develop new applications, new processes and a new way of thinking that seeks to meet New Yorkers where they are and where they will be. It is exciting to welcome someone of Dru’s caliber to this important role,” Hochul said in the Sept. 27 announcement.
Rai most recently served as chief digital and information officer of Quaker Houghton Company, which is headquartered in suburban Philadelphia, Pennsylvania.
He previously served as global CIO for the Ball Corporation, DuPont Coatings, and GE Advanced Material (a division of GE) and began his career at Ernst & Young.
A graduate of GB Pant University in India and the University of Connecticut, Rai also led and volunteered as the CIO for Goodwill Industries International and the American Cancer Society, helping each organization set their digital strategies and make technology-operational improvements.
“Under Governor Hochul’s leadership, I look forward to building a great team that will work cohesively to achieve the best possible digital solutions for all of our stakeholders,” Rai said. “We will lean on the expertise of ITS to bring about a digital transformation that will improve the user experience and strengthen the trust between New Yorkers and their government. And we will promote collaboration across state agencies to ensure alignment with the state’s strategic IT objectives, common technology solutions that work not just for some but for all, and a commitment to listening to our partners during every step of the journey from idea to delivery.”
As part of the overall transition at ITS, the state’s IT service provider, Jennifer Lorenz, will assume the executive deputy CIO role and work alongside Rai to provide the “strategic IT vision.” Lorenz served as acting CIO for the last six months while an extensive, nationwide search was conducted for the agency’s top role.
ITS is directly involved in a number of important state initiatives. They include the effort to digitize services; further enhance the state’s cyber posture; improve the overall customer experience; create a “One ID” system for residents to access services across all state agencies; build out statewide data and privacy programs; and fortify the IT workforce following the COVID-19 pandemic, Hochul’s office said.
PAR Government awarded almost $15 million Air Force contract modification
ROME, N.Y. — PAR Government Systems Corp. recently won a nearly $14.9 million modification to a previously awarded U.S. Air Force contract for directional airborne networks for contested environments software. The cost-plus-fixed-fee completion contract modification brings the total cumulative face value of the contract to nearly $24.8 million, according to a Sept. 13 contract announcement
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ROME, N.Y. — PAR Government Systems Corp. recently won a nearly $14.9 million modification to a previously awarded U.S. Air Force contract for directional airborne networks for contested environments software.
The cost-plus-fixed-fee completion contract modification brings the total cumulative face value of the contract to nearly $24.8 million, according to a Sept. 13 contract announcement from the U.S. Department of Defense.
Work will be performed in Rome and is expected to be completed by Sept. 13, 2025.
Fiscal 2023 research, development, test, and evaluation funds of $699,000 are being obligated at the time of award. The Air Force Research Laboratory in Rome is the contracting activity.
SEC proposes new cybersecurity reporting rules for public cos.
One of the main changes is a new proposed reporting requirement for cybersecurity incidents at publicly traded companies, says Christoper Salone, a consulting manager at FoxPointe Solutions at The Bonadio Group, which is based in Rochester and has offices across Upstate, including Syracuse. “They want it to be disclosed within four business days from when
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
One of the main changes is a new proposed reporting requirement for cybersecurity incidents at publicly traded companies, says Christoper Salone, a consulting manager at FoxPointe Solutions at The Bonadio Group, which is based in Rochester and has offices across Upstate, including Syracuse.
“They want it to be disclosed within four business days from when an organization determines an incident to be material,” Salone says. A material incident is one determined to potentially impact a company’s finances, operations, or relationships with customers.
While some businesses have expressed frustration with the four-day window, the time frame aligns with existing rules in New York, such as one for financial institutions requiring them to report incidents to the state within four days.
“Four days is quick to determine the full nature of an incident and disclose it, but that four-day clock doesn’t start ticking until an organization determines an incident is material,” he adds.
The second major proposed change is requiring companies to outline, at a high level, their cybersecurity program, Salone says.
That includes addressing how the company addresses threats, how it assesses risk, and how it stays up to date on all of it, he says.
The goal of the proposed changes is to make cybersecurity information available and readable to investors.
While the new rules are not final, Salone says he has no reason to expect they won’t be finalized. Typically, rules are effective 90 days after they have been released to the public register. He anticipates these rules will go into effect in mid-December unless the SEC opts to change elements after reviewing public comment.
Companies should start preparing now to make sure they will be ready to comply with the new reporting rules. “I think the best thing an organization can do is have a written and documented incident-response plan,” Salone says.
Leaders should also clearly define what a material incident is for the company and provide examples in that plan, he adds. Businesses should also outline roles and responsibilities during a cyber incident. Ideally, these plans include the company’s IT, compliance, risk, and auditing departments along with any other entities that may have a hand in cyber response or reporting. This can include outside vendors or a company’s cyber insurance provider.
“Make sure you test those plans on an annual basis,” Salone says. He also suggests including an appendix with disclosure templates ready to go. All of that helps ensure a company is ready and able to report if it is required to do so.
The proposed rules also call for companies to outline management’s role in implementing cybersecurity policies and procedures; disclose the board of directors’ cybersecurity expertise and its oversight of cybersecurity risk; and provide updates about previously reported material cybersecurity incidents.
The changes update guidance issued in 2011 and previously updated in 2018.
SUNY Poly professor’s research focuses on improving security
MARCY, N.Y. — A SUNY Polytechnic Institute professor is leading a research project to boost cybersecurity after being awarded the largest single-investigator contract award in SUNY Poly’s Marcy campus history. Hisham A. Kholidy, an associate professor and chair of the Network and Computer Security (Cybersecurity) Department, was awarded a nearly $1.1 million contract from the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
MARCY, N.Y. — A SUNY Polytechnic Institute professor is leading a research project to boost cybersecurity after being awarded the largest single-investigator contract award in SUNY Poly’s Marcy campus history.
Hisham A. Kholidy, an associate professor and chair of the Network and Computer Security (Cybersecurity) Department, was awarded a nearly $1.1 million contract from the Air Force Research Laboratory (AFRL). The three-year project seeks to help address the need for an advanced security system that can identify, assess, and protect against attacks across the 5G open architecture in a timely and accurate way without human intervention.
“This project, led by Dr. Kholidy, is a strong example of how SUNY Poly’s growing reputation as New York state’s premier public polytechnic is backed by our wide-ranging academic and research pursuits, including as a leader in cybersecurity research and applications nationwide,” SUNY Poly Officer-in-Charge Andrew Russell contended in an Aug. 7 news release.
With 5G expected to play an important role in global economic growth and technological development, the Department of Defense (DoD) has identified 5G security as a critical area, Kholidy notes. The proposed research investigates ways to protect 5G open networks, meet resilience requirements, and minimize damage from attacks.
“The DoD has a vital interest in advancing 5G-to-NextG wireless technologies and concept demonstrations,” AFRL Senior Scientist Andrew Karam said. “These efforts represent our continuing investments via public- and private-sector collaboration on research and development for critical 5G technology enablers necessary to realize high performance, security, and resilient network operations for the warfighter.”
The project will support a post-doctoral student and two research assistants assisted by Kholidy. The project will also educate and involve students with interdisciplinary skills, including underrepresented minority students through integrating projects covering information science, communication, cybersecurity, and autonomic computing, as well as developing a new cybersecurity course and a simulated 5G security testbed network.
Key contributions of this project include: improving the current 5G security testbed that was developed in collaboration with AFRL engineers to support the 5G open architecture network. This network is to become the first-of-its-kind “open 5G-federated testbed” supporting 5G multi-vendor and commercial service providers. This will help them develop innovative cybersecurity solutions and datasets with respect to this emerging global architecture, SUNY Poly said. Such solutions and datasets will open the door for researchers to improve this new architecture. The project will also develop an intelligent vulnerability assessment approach to assess the security level of the new architecture. In addition, it will seek to develop a smart-network slice provisioning framework to help orchestrate and manage 5G slices among multi-vendor and commercial-service providers. The 5G network slices are defined as network configuration that allows multiple networks to be created on top of a common 5G physical infrastructure.
SUNY Poly students are already actively involved in AFRL activities established by Kholidy. Through this project, he will have the option of dedicating lecture time on the testbeds by logging in remotely and showing practical scenarios to his students, per the release. This project will allow him to take these activities to the next level by developing interdisciplinary projects, in which graduate and undergraduate students will be paired together, the university said. Graduate students would be able to assist undergraduates in obtaining a realistic understanding of graduate education and research methodologies.
Outreach activities targeting local schools that offer cybersecurity programs are also part of the project’s plans, as is expanding existing SUNY Poly outreach programs to enhance cybersecurity awareness among high-school students in Oneida County, the release stated.
Along with degrees in technology including cybersecurity, SUNY Poly also offers undergraduate and graduate degrees in professional studies including business and communication, and arts and sciences such as mathematics, game design, and humanities.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.