The Magazine
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology

A Day in the Life of a Cybersecurity Professional
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
December 15, 2023 · min read

What does an average day look like for somebody working in cybersecurity?

That isn’t an easy question to answer when you consider the vastness of the field. Somebody who works in cybersecurity needs to stay constantly abreast of industry changes – especially new attacks cooked up by cybercriminals – and help their employers create and tweak their security plans.

However, thanks to Tom Vazdar, who has developed the Open Institute of Technology’s (OPIT’s) Master’s Degree in Enterprise Cybersecurity, we can provide some insight into what your average day may look like.

Who Is Tom Vazdar?

Serving as the Program Chair of OPIT’s upcoming Master’s Degree in Cybersecurity, Tom brings a vast amount of practical experience to the table. His work has spanned the globe. Tom has been employed as the Chief Security Officer for a major Croatian bank, in addition to serving as the Chief Information Officer for a company in the United States’ manufacturing sector.

His practical experience spans other industries – including technology and finance – and he’s currently completing a doctorate while running his own practice. Tom’s specialty is the behavioral aspect of cybersecurity. His deep understanding of the “culture” that surrounds the field has been shaped by his work on development strategies, policies, and frameworks for his past employers.

The Importance of Trends

The first thing Tom highlights is that a cybersecurity professional has to follow the trends in the industry. As he points out: “We are living in an era where digital transformation is accelerating, and with it, the complexity and frequency of cyber threats are also increasing.” To demonstrate this, he points to an ISACA report published in 2023 showing that cyber attacks have increased 48% in 2023 compared to 2022. More worryingly, 62% of the organizations that experience these attacks underreport them – an indication that many simply don’t have the talent to truly understand the threat they face.

As a cybersecurity professional, your role is to provide the expertise such companies are sorely lacking.

Thankfully, many business leaders understand that they need this expertise. Tom points out that 59% of leaders say they’re understaffed in the cyber department, leading to a rising demand for people with the following technical skills:

  • Identity and access management
  • Data protection
  • Cloud computing
  • DevSecOps (development, security, and operations)

Furthermore, Tom says that artificial intelligence (AI) is completely transforming the cybersecurity industry. While AI is often beneficial to professionals in the field – it can enhance threat detection and response – it is also a danger. Malicious entities can use AI to conduct a new wave of attacks, such as data poisoning, for which you need to be prepared as a cybersecurity professional.

Tom’s discussion of these emerging trends highlights one of the most critical aspects of a day in the life of a cybersecurity professional – learning is key. There is no such thing as static knowledge because the industry (and the attacks your company may face) constantly evolve.

An Average Day Broken Down

Now that you understand how important staying on top of the ever-changing trends in cybersecurity is for those in the field, it’s possible to break things down a little further. On an average day, you may find yourself working on any, some, or even all of the following tasks.

Developing and Maintaining a Cybersecurity Strategy

Given that such a large number of business leaders are understaffed and have minimal access to appropriate talent, you’ll often be tasked with creating and maintaining a company’s cybersecurity strategy.

This strategy is not as simple as creating a collection of actions to take in the event of an attack.

Tom emphasizes not only the importance of proactivity, but also of integrating a cybersecurity strategy into the wider business strategy. “It becomes part of the mission and vision,” he says. “After all, there are two things that are important to companies – their data and customer trust. If you lose customer trust, you lose your business. If you lose your data, you lose your business.”

As a technically adept professional, you’ll be tasked with building a strategy that grows ever more complex as the threats the company faces become more advanced. New technologies – such as AI and machine learning – will be used against you, with your main task being to ensure the strategy you create can fend off such technologically-empowered attacks.

The Simpler Day-to-Day

Now, let’s move away from the complexities of developing an overarching plan and go into more detail about daily responsibilities. A cybersecurity professional is usually tasked with dealing with the day-to-day maintenance of systems.

It’s all about control.

Tom says that much of the role involves proactively identifying new protective measures. For instance, software patching is key – outdated software has vulnerabilities that a hacker can exploit. You’ll need to stay up to date on the development of patches for the software your company uses and, crucially, implement those patches as soon as they’re available.

Creating regular backups is also part of this day-to-day work. It’s an area that many businesses neglect – perhaps assuming that nothing bad can happen to them – but a backup will be a lifesaver if a hacker compromises your company’s main data stores.

Tending to Your Ecosystem

It’s not simply your own institution that you must maintain as a cybersecurity professional – everyone who interacts with that institution must also be managed. Vendors, external software developers, and any other part of your supply chain need to be as risk-aware as your business. As Tom puts it: “If they don’t care about vulnerabilities in their system, and they work for you as a company, then you’ll have an issue because their risk suddenly becomes your risk.”

As such, managing the cyber security aspect of your company’s relationships with its partners is a vital part of your duties. You may engage in planning with those partners, helping them improve their practices, or cooperate with them to create strategies encompassing your entire supply chain.

Continued Education

Tom goes on to highlight just how important continued education is to the success of a cybersecurity professional. “It’s always interesting. And if you’re really passionate about it, cybersecurity becomes your lifestyle,” he says. “You want to see what’s new. What are the new attack methods, what are your competitors doing, and what is new on the market.”

He points to a simple example – phishing emails.

These emails – which were traditionally laden with spelling errors that made them easier to spot – are becoming increasingly hard to detect thanks to the use of AI. They’re written better. Failure to understand and adapt to that fact could make it harder to educate yourself and the people in your company.

Your average day may also involve educating your colleagues about upcoming threats and new attack methods they need to understand. The phishing example Tom shares applies here. Any email that looks somewhat legitimate is a threat, so continued education of your colleagues is essential to stop that threat from having its intended effect.

An Example of a Typical Project

Given how vast the cybersecurity field is, the range of projects you may work on will vary enormously. However, Tom provides an example of when he worked in the banking industry and saw the rise of the Zeus Botnet.

In this case, his responsibilities were twofold.

First – finding a way to defend against botnet attacks. That involved researching the malware to figure out how it spread, allowing him to put protective measures in place to prevent that spread. The second task involved creating educational programs, both for employees and his bank’s clients, to make them aware of the Zeus Botnet.

Here, we see the education part of the cybersecurity professional’s “average day” coming into play, complementing the more technical aspects of dealing with malware. We even see supply chain risk coming into play – each client is part of the bank’s supply chain, meaning they need to understand how to defend themselves just as much as the bank does.

The Qualifications Needed to Work in Cybersecurity

With a multitude of cybersecurity qualifications available – many covering specific niches – it’s tough to find the appropriate one to make you attractive to an employer. That’s where Tom’s work with OPIT comes in. The master’s degree that he’s developing not only focuses on the technical skills a professional needs but places those skills in a business context.

The upcoming course will offer electives in subjects such as AI, cloud security, and IoT security, granting students flexibility to pursue a specialization within their degree. The overall program is also closely aligned to industry certifications – such as those offered by CISSP – to ensure graduates are as industry-ready as they are academically qualified.

The intention, Tom says, is to fill the skills gap that 3 million businesses say they have in cybersecurity. The program provides the right blend of knowledge between technical and managerial skills, in addition to allowing students to pursue subjects of particular interest to them.

Ultimately, it doesn’t teach absolutely everything that you could learn about the industry. No course can. But it does equip you with key foundational knowledge aligned with industry certifications that make you more employable. That, combined with your continued education and completion of relevant certifications once you’re employed, means you have an enormous opportunity to build a successful cybersecurity career with OPIT.

So, the qualifications needed for the industry start with a relevant degree. They then blossom out. Professionals focus on courses that meet the specific requirements of their roles so that they learn the cybersecurity techniques that are most effective for their needs.

 

Read the article
Changing the Curve: Women in Computing
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
December 13, 2023 · min read

Did you know that the world’s first computer programmer was a woman? That’s right, Ada Lovelace, an English mathematician and writer, is widely considered the first person to recognize the potential of a computer. She realized it could go beyond mere calculations and handle symbols and logical operations (besides numbers).

Yet, many scholars still argue that Lovelace’s contributions to the field have been vastly overstated, going as far as denying them altogether. Unfortunately, it all boils down to a belief that a woman “didn’t do, and shouldn’t do, and couldn’t do” such a thing.

Perhaps similar beliefs are the reason why women continue to be underrepresented in the field of computing today. Since Lovelace, many female tech visionaries have made significant and varied contributions to this field. And yet, the gap persists.

Is this how it will always be? Or can something be done to pave the way for a more inclusive future in computing? That’s what this article will explore.

The History of Women in Computing and Computer Science

Ada Lovelace’s work in the mid-19th century laid the foundation for modern computing, earning her the flattering title of “World’s First Computer Programmer.” But she wasn’t the only woman to make monumental contributions to computer science.

To understand the ever-growing push for equality in computing, you must first take a journey throughout history, highlighting some of these women’s most notable (and often overlooked) contributions in this field.

1952: Grace Hopper

Grace Hopper, a U.S. Navy admiral and computer scientist, invented the first computer compiler, translating English instructions into the target computer’s language. Code optimization, formula translation, and subroutines are just some computing developments inspired by Hopper’s groundbreaking work.

That’s why it shouldn’t be surprising that the world’s largest gathering of women technologists is named in her honor – the Grace Hopper Celebration.

1962: Katherine Johnson

Katherine Johnson, one of the women immortalized in the 2016 book and film “Hidden Figures,” was the one to run equations needed for John Glenn’s historic orbital flight in 1962. She would go on to work on other groundbreaking NASA missions, including the Apollo program.

1970s: Adele Goldberg

Though Adele Goldberg has made many contributions to computing, she’s best known for developing the Smalltalk programming language, which was crucial in shaping modern graphical user interfaces.

1985: Radia Perlman

The fact that Radia Perlman is often referred to as the “Mother of the Internet” probably tells you all you need to know about her importance in computing history. Perlman is renowned for inventing the Spanning Tree Protocol, a technology that greatly enhanced the reliability and efficiency of network communication.

1997: Anita Borg

In 1997, a U.S. computer scientist, Anita Borg, founded the Institute for Women in Technology. This institute had (and continues to have) two simple goals – to increase the representation of women in technical fields and enable them to create more technology.

2018: Joy Buolamwini

Joy Buolamwini, currently one of the most influential women in computer science, is primarily known for her groundbreaking graduate thesis uncovering significant racial and gender bias in AI services. She also founded the Algorithmic Justice League, a non-profit organization focusing on making tech more equitable and accountable.

The Present State of Women in Computing and Computer Science

There have undoubtedly been strides in increasing women’s representation in computing and computer sciences. Though it’s challenging to determine what came first, one of the most significant moves in this regard was giving credit where credit’s due.

For instance, the “ENIAC Six,” the six women tasked with programming the ENIAC (Electronic Numerical Integrator and Computer), weren’t initially recognized for their historic contributions. It took decades for this recognition to come, but this doesn’t make it any less monumental.

But even with these recognitions, initiatives, awareness campaigns, and annual events, the gender gap in computing persists. This gap can be seen by examining the number of women in three crucial computing and computer science stages – education, workforce, and leadership.

Today, there’s no shortage of degree programs in computer science, both traditional and online. But one look at the data about the students attending these programs, and you’ll understand the issue. Though more women hold tertiary degrees in the EU, they’re notably absent in computer science-related fields.

The situation in the computing workforce is no better. Currently, women occupy only 22% of all tech roles across European companies, and to make matters worse, this figure is on a downward trajectory.

Just when you think it can’t get any more dismal, take a look at the highest levels of professional leadership in computing and technology. One look at the C-suite (senior executives) stats reveals abysmal figures. For instance, only 9% of the U.K. C-suite leaders are women.

The Reasons Behind the Current State of Women in Computing

By now, you probably agree that something needs to change to address the gender disparity in computing. And it needs to change drastically. But to propose effective solutions, you must first examine the root of the problem.

Though it’s challenging to pinpoint a single explanation for the underrepresentation of women in computing, let’s break down factors that might’ve contributed to the current situation.

The Lack of Women Peers and Mentors

Paradoxically, women might be less willing to enter the computing field due to the lack of visible representation and mentorship. Essentially, this creates a never-ending cycle of underrepresentation, thus only deepening the gender gap.

Societal Stereotypes and Biases

Deep-rooted stereotypes about gender roles can, unfortunately, dissuade women from pursuing computer science. The same goes for stereotyping what average computer scientists look like and how they act (the “nerd” stereotype often reinforced by media).

Fortunately, initiatives promoting diversity and inclusion in computer science are breaking down these stereotypes gradually yet efficiently. The more women join this field, the more preconceived (and misguided) notions are shattered, demonstrating that excellence in computing knows no gender.

Hostile or Unwelcoming Work Environments

It’s well-documented that highly collaborative fields were less welcoming to gender minorities throughout history, and computer science was no different. Though the situation is much better today, some women might still fear working within a predominantly male team due to these lingering concerns from the past.

Educational Disparities

Numerous studies have shown that precollege girls are less likely to be exposed to various aspects of computing, from learning about hardware and software to dissecting a computer. So, it’s no wonder they might be less inclined to pursue a career in computing after lacking exposure to its foundational aspects.

A Worse Work-Life Balance

Many big tech companies are notorious for long working hours. The same goes for computer science as a field. The result? Some women might perceive this field as too demanding and impossible to reconcile with raising a family, leading them not to consider it.

How to Change the Curve

Though the past might’ve seemed bleak for women in computing, the present (and future) hold promise for positive change. Of course, no fundamental changes can happen without collective commitment and decisive action. So, what can be done to change the curve once and for all and promote greater gender diversity in computing?

Striving to Remove the Barriers

So, you believe women should experience all the opportunities that come with a career in computing. But this can only be done by actively addressing and eliminating the barriers impeding their progress in the field.

This means launching campaigns to dismantle the deep-rooted stereotypes, introducing policies to create supportive working (and learning) environments, and regularly recognizing and celebrating women’s achievements in computing.

Making the Field Exciting for Women

Educational institutions and companies also must pull their weight in making the computing field more appealing to women despite the existing challenges. This might involve hands-on and collaborative learning, showcasing diverse role models in the field (e.g., at the annual Grace Hopper Celebration of Women in Computing), and establishing mentorship programs.

Relying on Mutual Support

As long as women have a strong enough support system, they can conquer anything, including the often daunting field of computer science. Here are some organizations that can provide just that: (See if you can spot some familiar individuals in their names!)

Other than that, women now have access to a whole host of resources and opportunities they can use to advance their knowledge and excel in the field. These include the following:

  • Coding bootcamps
  • Career fairs for women in tech
  • STEM scholarships

Gaining Access to Education

Allowing equal access to education to women might be the most crucial element in changing the curve. After all, proper education serves as a direct gateway to opportunities and empowerment in computer science (and beyond).

With the popularization of online studying, many of the obstacles (both actual and perceived) that traditionally hindered women’s involvement in computing have disappeared. Now, women can learn about (and engage in) computer science from the comfort of their own homes, going at their own pace.

That’s precisely a part of the reason Alona, a Latvian student at the Open Institute of Technology, chose to pursue online education in computer science. Even with two children and a job (and a Bachelor’s degree in linguistics), she can find time to study and potentially earn her degree in as little as two years. Talk about an outstanding work-life balance!

When pursuing a degree in computer science at the OPIT, there are no hostilities, inadequacies, or barriers, only boundless opportunities.

Read the article
Five Reasons to Study Online at OPIT
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
November 29, 2023 · min read

Far from being a temporary educational measure that came into its own during the pandemic, online education is providing students from all over the world with new ways to learn. That’s proven by statistics from Oxford Learning College, which point out that over 100 million students are now enrolled in some form of online course.

The demand for these types of courses clearly exists.

In fact, the same organization indicates that educational facilities that introduce online learning see a 42% increase in income – on average – suggesting that the demand is there.

Enter the Open Institute of Technology (OPIT).

Delivering three online courses – a Bachelor’s degree in computer science and two Master’s degrees – with more to come, OPIT is positioning itself as a leader in the online education space. But why is that? After all, many institutions are making the jump to e-learning, so what separates OPIT from the pack?

Here, you’ll discover the answers as you delve into the five reasons why you should trust OPIT for your online education.

Reason 1 – A Practical Approach

OPIT focuses on computer science education – a field in which theory often dominates the educational landscape. The organization’s Rector, Professor Francesco Profumo, makes this clear in a press release from June 2023. He points to a misalignment between what educators are teaching computer science students and what the labor market actually needs from those students as a key problem.

“The starting point is the awareness of the misalignment,” he says when talking about how OPIT structures its online courses. “That so-called mismatch is generated by too much theory and too little practical approach.” In other words, students in many classes spend far too much time learning the “hows” and “whys” behind computerized systems without actually getting their hands dirty with real work that gives them practical experience in using those systems.

OPIT takes a different approach.

It has developed a didactic approach that focuses far more on the practical element than other courses. That approach is delivered through a combination of classroom sessions – such as live lessons and masterclasses – and practical work offered through quizzes and exercises that mimic real-world situations.

An OPIT student doesn’t simply learn how computers work. They put their skills into practice through direct programming and application, equipping them with skills that are extremely attractive to major employers in the tech field and beyond.

Reason 2 – Flexibility Combined With Support

Flexibility in how you study is one of the main benefits of any online course.

You control when you learn and how you do it, creating an environment that’s beneficial to your education rather than being forced into a classroom setting with which you may not feel comfortable. This is hardly new ground. Any online educational platform can claim that it offers “flexibility” simply because it provides courses via the web.

Where OPIT differs is that it combines that flexibility with unparalleled support bolstered by the experiences of teachers employed from all over the world. The founder and director of OPIT, Riccardo Ocleppo, sheds more light on this difference in approach when he says, “We believe that education, even if it takes place physically at a distance, must guarantee closeness on all other aspects.” That closeness starts with the support offered to students throughout their entire study period.

Tutors are accessible to students at all times. Plus, every participant benefits from weekly professor interactions, ensuring they aren’t left feeling stuck on an educational “island” and have to rely solely on themselves for their education. OPIT further counters the potential isolation that comes with online learning with a Student Support team to guide students through any difficulties they may have with their courses.

In this focus on support, OPIT showcases one of its main differences from other online platforms.

You don’t simply receive course material before being told to “get on with it.” You have the flexibility to learn at your own pace while also having a support structure that serves as a foundation for that learning.




Reason 3 – OPIT Can Adapt to Change Quickly

The field of computer science is constantly evolving.

In the 2020s alone, we’ve seen the rise of generative AI – spurred on by the explosive success of services like ChatGPT – and how those new technologies have changed the way that people use computers.

Riccardo Ocleppo has seen the impact that these constant evolutions have had on students. Before founding OPIT, he was an entrepreneur who received first-hand experience of the fact that many traditional educational institutions struggle to adapt to change.

“Traditional educational institutions are very slow to adapt to this wave of new technologies and trends within the educational sector,” he says. He points to computer science as a particular issue, highlighting the example of a board in Italy of which he is a member. That board – packed with some of the country’s most prestigious tech universities – spent three years eventually deciding to add just two modules on new and emerging technologies to their study programs.

That left Ocleppo feeling frustrated.

When he founded OPIT, he did so intending to make it an adaptable institution in which courses were informed by what the industry needs. Every member of its faculty is not only a superb teacher but also somebody with experience working in industry. Speaking of industry, OPIT collaborates with major companies in the tech field to ensure its courses deliver the skills that those organizations expect from new candidates.

This confronts frustration on both sides. For companies, an OPIT graduate is one for which they don’t need to bridge a “skill gap” between what they’ve learned and what the company needs. For you, as a student, it means that you’re developing skills that make you a more desirable prospect once you have your degree.

Reason 4 – OPIT Delivers Tier One Education

Despite their popularity, online courses can still carry a stigma of not being “legitimate” in the face of more traditional degrees. Ocleppo is acutely aware of this fact, which is why he’s quick to point out that OPIT always aims to deliver a Tier One education in the computer science field.

“That means putting together the best professors who create superb learning material, all brought together with a teaching methodology that leverages the advancements made in online teaching,” he says.

OPIT’s degrees are all accredited by the European Union to support this approach, ensuring they carry as much weight as any other European degree. It’s accredited by both the European Qualification Framework (EQF) and the Malta Qualification Framework (MQF), with all of its courses having full legal value throughout Europe.

It’s also here where we see OPIT’s approach to practicality come into play via its course structuring.

Take its Bachelor’s degree in computer science as an example.

Yes, that course starts with a focus on theoretical and foundational knowledge. Building a computer and understanding how the device processes instructions is vital information from a programming perspective. But once those foundations are in place, OPIT delivers on its promises of covering the most current topics in the field.

Machine learning, cloud computing, data science, artificial intelligence, and cybersecurity – all valuable to employers – are taught at the undergraduate level. Students benefit from a broader approach to computer science than most institutions are capable of, rather than bogging them down in theory that serves little practical purpose.

Reason 5 – The Learning Experience

Let’s wrap up by honing in on what it’s actually like for students to learn with OPIT.

After all, as Ocleppo points out, one of the main challenges with online education is that students rarely have defined checkpoints to follow. They can start feeling lost in the process, confronted with a metaphorical ocean of information they need to learn, all in service of one big exam at the end.

Alternatively, some students may feel the temptation to not work through the materials thoroughly, focusing instead on passing a final exam. The result is that those students may pass, but they do so without a full grasp of what they’ve learned – a nightmare for employers who already have skill gaps to handle.

OPIT confronts both challenges by focusing on a continuous learning methodology. Assessments – primarily practical – take place throughout the course, serving as much-needed checkpoints for evaluating progress. When combined with the previously mentioned support that OPIT offers, this approach has led to courses that are created from scratch in service of the student’s actual needs.

Choose OPIT for Your Computer Science Education

At OPIT, the focus lies as much on helping students to achieve their dream careers as it does on teaching them. All courses are built collaboratively. With a dedicated faculty combined with major industry players, such as Google and Microsoft, it delivers materials that bridge the skill gap seen in the computer science field today.

There’s also more to come.

Beyond the three degrees OPIT offers, the institution plans to add more. Game development, data science, and cloud computing, to name a few, will receive dedicated degrees in the coming months, accentuating OPIT’s dedication to adapting to the continuous evolution of the computer science industry. Discover OPIT today – your journey into computing starts with the best online education institution available.




								
Read the article