The Walden Information Assurance Center is a central hub for research, news, and education on information security. You will be able to access the latest information surrounding the field of information assurance—the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data.

Sign Up for a Free Information Packet
  • Education
  • Faculty
  • Events
  • News
  • Publications
  • Government Resources

Explore our variety of bachelor’s and master’s programs that have courses and specializations or concentrations focused on information security:

Information Assurance/Information Systems Security

BS in Computer Information Systems
BS in Information Technology
MS in Information Technology

Homeland Security

BS in Criminal Justice 
MS in Criminal Justice 
MS in Criminal Justice Leadership and Executive Management 
Master of Public Administration (MPA) 
Master of Public Policy (MPP) 
MS in Emergency Management

Currently Offered Master’s Level Courses

 

National CyberWatch CenterWalden University is a member of the National CyberWatch Center, the Information Assurance/Information Security Advanced Technology Education Center of the National Science Foundation. The Center is committed to leading collaborative efforts to advance cybersecurity education and strengthen the national cybersecurity workforce.

NSA NCEA Center of ExcellenceWalden has been designated by the National Security Agency and the Department of Homeland Security as a National Center of Academic Excellence in Cyber Defense Education through the year 2019. As such, graduates are eligible to apply for scholarships and grants that may fund their entire tuition.

Meet our faculty of information technology professionals who bring their specialized knowledge and real-world experience into the classroom:

School of Information Systems and Technology Faculty 

2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security 2016)

Description: The International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

Date: June 13 – 14, 2016

Location: London, United Kingdom

2016 IEEE Conference on Communications and Network Security (CNS)

Description: IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.

Date: October 17 – 19, 2016

Location: Philadelphia, PA

2016 IEEE Symposium on Visualization for Cyber Security (VizSec)

Description: VizSec brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics.

Date: October 24, 2016

Location: Baltimore, MD

ACM CCS 2016

Description: The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions.

Date: October 24 – 28, 2016

Location: Vienna, Austria

Discover how information assurance is making the news.

Paranoia is a good thing
(student login required)

Author: Ted Needleman

Publisher: Accounting Today

Achieving Vital Security With Cloud Services
(student login required)

Author: Steven Bjarnason

Publisher: Pipeline & Gas Journal

Why Effective Computer Security Means Covering All Your Bases
(student login required)

Author: David Needle

Publisher: eWeek

Protected Web Components: Hiding Sensitive Information in the Shadows
(student login required)

Authors: Philippe, De Ryck; Nick, Nikiforakis; Lieven, Desmet; Frank Piessens; Wouter, Joosen

Publisher: IT Professional

Walden Recognized as a National Security Agency National Center of Academic Excellence in Information Assurance/Cyber Defense

Dr. Karlyn Barilovits, second from left, receiving the NSA CAE/IA/CD award for Walden University.

Learn more

Walden University attended the 2016 National Cyber Summit

Amy Pavlo (on left) and Dr. Karlyn Barilovits (on right)

Learn More

Learn more about information assurance:

Walden Publications

Association for Computing Machinery (ACM) (student login required)
Information Security Tech. Report (student login required)

Journals

Journal of Information Assurance, Security, and Protection (JIASP) 
IAnewsletter 
Journal of Information Assurance & Cybersecurity (JIACS) (student login required)

Books

Walden University’s Student Dissertations in Information Assurance (student login required)

Articles

Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks (student login required)
By: Calvo, I.; Etxeberria-Agiriano, I.; Iñigo, M. A.; González-Nalda, P. International Journal of Online Engineering. 2016, Vol. 12 Issue 1, p9-16. 8p. DOI: 10.3991/ijoe.v12i1.4888.

Authenticity, Integrity and Secure Communication in Cyber-Physical Systems. (student login required)
By: VEGH, Laura; MICLEA, Liviu. Journal of Computer Science & Control Systems. May2015, Vol. 8 Issue 1, p33-38. 6p. 1 Color Photograph, 1 Black and White Photograph, 1 Diagram.

User preference of cyber security awareness delivery methods. (student login required)
By: Abawajy, Jemal. Behaviour & Information Technology. Mar2014, Vol. 33 Issue 3, p236-247. 12p. DOI: 10.1080/0144929X.2012.708787.

The DarkWeb: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards. (student login required)
By: Epiphaniou, Gregory; French, Tim; Maple, Carsten. Journal of Computing & Information Technology. 2014 Special Issue, p21-30. 10p. DOI: 10.2498/cit.1002282.

Website

www.govinfosecurity.com
www.acm.org

See how the federal government addresses information security:

National Security Agency Central Security Service 
U.S. Department of Homeland Security