Black Cyber Security Association

The Black Cyber Security Association (BCSA) is a welcoming and supportive non-profit entity devoted to fostering a sense of community and providing career guidance for underrepresented minorities in the cybersecurity field.

Our overarching goal is to motivate, involve, and bolster African Americans, aiding them in achieving their highest potential and ascending to leadership roles that beneficially influence their communities.

BCSA's Strategic Approach: Embracing TASKS

Our Key Initiatives Include:

For someone studying cybersecurity, it is crucial to have a well-rounded understanding of various areas within the field. Here are the top three areas of focus and what they cover:

Information Security Management:

This area covers the strategies and processes for protecting data assets. It involves setting up policies and procedures that ensure information confidentiality, integrity, and availability. It includes risk management, where potential security threats to the organization's information are identified assessed, and measures are put in place to mitigate them. This also encompasses regulatory compliance, ensuring the organization's security policies and measures comply with relevant laws and standards.

Network Security:

Network security protects the integrity and usability of network and data. It includes implementing hardware and software mechanisms to protect the network and infrastructure from unauthorized access, disruptions, or misuse. This involves firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), secure VPNs, and other defensive measures. Network security also covers the monitoring and preventing unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

Cyber Threat Analysis and Mitigation:

This focus area involves identifying, evaluating, and prioritizing potential threats to digital assets and developing strategies to defend against them. Threat analysis includes studying various cyber threats, such as malware, ransomware, phishing, and social engineering attacks. It also involves understanding the behavior of threat actors and the tactics, techniques, and procedures (TTPs) they use. Mitigation strategies are then developed to protect against these threats, including technical solutions and user training and awareness programs.

Each area is broad and encompasses various sub-disciplines, tools, and practices. A solid education in cybersecurity will touch on these areas, providing students with both the theoretical underpinnings and the practical skills necessary to protect modern information systems from increasingly sophisticated cyber threats.