TriV and Cybersecurity: The Future Is More Than Hacking

The Importance of Cybersecurity and How TriV is Contributing


By Justin Chormicle

Hacking, viruses, IT security breaches, and an endless amount of other vulnerabilities all comprise the long list of threats that continuously pose major issues for corporations, organizations, and even individual internet and mobile users. As the vast amount of technology continues to grow and the advent of new digital applications and programs cultivate at an increasing rate, so do the number of potential cybersecurity threats.

What is Cybersecurity?

Cybersecurity is the process of detecting and preventing unauthorized use of computers or servers. It focuses on safeguarding networks, programs, and data from intruders with malicious intents and bad motives. Cybersecurity consists of physical actions, like controlling access to hardware, and also includes the promotion of best practices, like training employees to be aware of phishing and spoofing.

From government agencies and national militaries to financial institutions and hospitals, it is essential that all types of organizations secure all of the confidential information that they collect, process, and store. Major security breaches are not uncommon and have occurred among various corporations within recent years. Target experienced one of the most expensive cyber attacks when hackers stole the personal information of 110 million consumers, costing the company over $148 million. Another example, Home Depot, also became a victim of a cyber threat that resulted in the loss of 60 million credit card numbers.

What does the future look like?

With the ever-increasing volume and growing complexity of cyber attacks, advancements in cybersecurity will be required to protect sensitive information from hackers. Security breaches have become increasingly sophisticated and the ability to prevent an attack is a skill that is and will continue to be greatly rewarded.

By 2019, it is estimated that there will be a global shortage of over 1.5 million cybersecurity professionals. The demand for these types of professionals is extremely high and is only expected to grow. Beyond coding and programming, roles in legislation, policy and decision making, and emergency response are all necessary. Some of the many important jobs crucial for combating cyber threats include Security Analyst and Security Engineer, and go all the way up to Chief Information Security Officer (CISO).

How is TriV promoting cybersecurity?

TriV recognizes the importance and need for cybersecurity and encourages youth members to learn more about it.  With the help of the Air Force Association’s Cyber Education Initiative, TriV has expanded the ability to learn about cybersecurity to members of all ages. During the last session at Veeva, many presentations at the end of the night were centered around password protection, email security, and virus prevention, and were presented by some of TriV’s younger members.


Connor talks about how to create a secure password

Audrey and Kevin, two of TriV’s most passionate cybersecurity coders, are thrilled by all the possibilities of cybersecurity and even see themselves working in the cybersecurity field in the future. Audrey has begun participating in cybersecurity events outside of the Dojo and recently ranked among the platinum-tier league of the Air Force Association’s CyberPatriot Program. Audrey is happy that government organizations are featuring kids in cybersecurity and encouraging them in their future success. From her experience in the program, she learned how to harden Linux and Windows systems, among many other things, and discovered how many flaws and potential risks actually exist in operating systems and other applications.

Audrey and Kevin also encourage others to try cybersecurity. Audrey assumed cybersecurity was very dry before trying it out but now realizes that there are various elements that make it fun. She also says offering it to kids as entertainment or in the form of a game makes it even more enjoyable.

Be sure to stop by the cybersecurity table during TriV’s next session to learn more!


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s