Welcome to Cybears.
We are a group of faculty who teach security law and policy and we’re working on a project to organize cybersecurity resources on the Berkeley campus for students and alumni who are interested in this fascinating field.
Our FAQ entries below are part of our first steps in our cybersecurity endeavor.
We’re delighted to announce our new textbook: Cybersecurity in Context introduces cybersecurity to undergraduate students and for self-study.
Cyber is a technical field. You can learn technical skills and have a rewarding career in cybersecurity.
Forthcoming (Wiley September 2024).
Cybersecurity @ Berkeley FAQ
-
What is cybersecurity?
Everyone now has a stake in the healthy functioning of communications and control networks, in the devices and services dependent on these networks, and by implication, in all the complicated infrastructure required to keep networks, devices, and services operating. There is no simple answer to the question of what cybersecurity is. This is because both…
-
So you’re interested in studying or pursuing a career in cybersecurity and privacy?
That’s great. Berkeley has fantastic resources for your intellectual journey and career. This FAQ offers three pieces of high-level advice, and links to many resources and ideas. First, keep in mind that “cybersecurity” is a relatively ill-defined and quickly changing field. This means that you’ll have to think creatively in order to best develop your…
-
I want to develop a few/improve my technical skills. What should I focus on?
Work in privacy and cybersecurity can result in many different responsibilities–from leadership to compliance, to a focus on particular hardware or software. One cannot predict these responsibilities and so we recommend that you focus on basic skills that have utility in almost any environment. It’s important to know that colleges and universities don’t typically teach…
-
What opportunities are there to learn about machine learning and cybersecurity?
Machine learning, sometimes called “AI,” is at the cutting edge of cybersecurity research. The fundamentals of machine learning are in statistics and knowledge of python is generally necessary to use machine learning. Thus, focus on Python and statistics first. There are exciting research opportunities on campus exploring machine learning from several lenses. One is in…
-
How should I make sense of all these security certifications?
Security and privacy certifications do have value, but one has to be smart about them. Certifications have two primary sources of value: first, they signal your interest and commitment to a field. That signal can move your resume into the right pile. Second, some certifications also signal expertise in specific skillsets, but these are variable…
-
What research and grant funding is available?
As a member of the Berkeley community, you can access ProQuest Pivot, which we have found to be the most comprehensive, one-stop-shop for finding funding. Closer to home, remember that the CLTC (Cal Cybersecurity Research Fellowship, Annual RFP), CTSP (CTSP Research Fellows) and UC Berkeley Big Ideas Contest are regular supporters of research here.
-
How can I become familiar with the academic literature in cybersecurity?
The academic literature in cybersecurity is vast because it can be found in so many disciplines, from law to computer science to international relations and economics. Here are some starting points: First, searching for “cybersecurity” might be too narrow. You may need to use terms such as “privacy.” For searching the legal field, the SSRN…
-
What about jobs?
Careers in cybersecurity run the gamut from highly technical to highly policy oriented. Careers include work from policy, compliance, risk, middle management, product management, developer ops, to the programming of software and hardware. Our efforts have focused on incubating students who live at the intersection of policy and technology: policy people who understand the development…
-
What scholarships are available?
There are many scholarships in the cybersecurity field. Here are some starting points: The Computing Research Association provides Scholarships for Women Studying Information Security (ISC)2 Women’s Scholarship (ISC)2 Undergraduate Scholarship (ISC)2 Graduate Scholarship ESET Women in Cyber Technology Scholarship Department of Defense SMART Scholarship-for-Service Program For I School students, the Curtis Smith Scholarship
-
What are the ethics of cybersecurity?
Santa Clara University’s Markkula Center for Applied Ethics has done excellent work in explaining ethical frameworks and applying those frameworks to cybersecurity. We suggest that you start with a grounding in ethics itself. The Markkula Center’s Framework for Ethical Decision Making explains what ethics is, what it is not, and provides several methods one could…
-
What campus groups are involved in cybersecurity?
Because security touches so many disciplines, you’ll find student and faculty groups in a range of departments active on cybersecurity. The best place to start is the Center for Long-Term Cybersecurity (CLTC). Established in 2015, CLTC is a research and collaboration hub in the School of Information. CLTC funds research, hosts speakers and conferences, and…
-
How can I read what CISOs are reading? (And what are CISOs?)
“CISO” stands for “Chief Information Security Officer,” the executive in charge of protecting an organization’s information assets: in other words, the head cybersecurity person. CISOs often are also responsible for customer privacy, compliance with data protection regulations, and other related issues. The position has grown and evolved rapidly in the last 15 years or so;…