Formation | 1946 |
---|---|
Type | 501(c)(6) |
53-0180161 [1] | |
Legal status | nonprofit membership association |
Purpose | To provide a forum for the ethical exchange of information and increase of knowledge through the exploration of issues relevant to its members in information technology, communications, and electronics for the defense, homeland security, and intelligence communities. [2] |
Headquarters | Fairfax, Virginia, U.S. |
Tamara Greenspan [3] | |
Lt. Gen. Susan Lawrence, USA (Ret.) [3] | |
Subsidiaries | AFCEA Educational Foundation (501(c)(3)), [2] |
Revenue (2018) | $17,563,322 [2] |
Expenses (2018) | $17,471,228 [2] |
Employees (2017) | 60 [2] |
Volunteers (2017) | 1,800 [2] |
Website | www |
Formerly called | Army Signal Association, Armed Forces Communications Association, Armed Forces Communications and Electronics Association |
AFCEA International (formerly called Armed Forces Communications & Electronics Association International), established in 1946, [4] is a nonprofit membership association serving the military, government, industry, and academia as a forum for advancing professional knowledge and relationships in the fields of communications, information technology, intelligence and global security. AFCEA provides a forum for military, government, academic and industry communities with altogether more than 30,000 members. AFCEA supports local chapters, sponsors events, publishes a magazine, promotes STEM education and provides member benefits. [5]
Following the American Civil War, the United States Veterans Signal Association [6] was formed from the original Signal Corps established under Maj. Albert J. Myer of the U.S. Army.
This organization was active for many years, ultimately being augmented by veterans from the Spanish–American War and World War I. The American Signal Corps Association, another World War I group, merged with the U.S. Veterans Signal Association in 1918 and was active until 1944 (World War II).
In May 1946, Maj. Gen. Harry C. Ingles, Brig. Gen. David Sarnoff, [7] and a number of industry leaders joined to found the Army Signal Association, absorbing the remaining chapters of its predecessors.
In 1947, the name was changed to the Armed Forces Communications Association, and in 1954 the name evolved as the Armed Forces Communications and Electronics Association. In 1979, the Armed Forces Communications and Electronics Association became international with the establishment of chapters in Europe, Asia and Canada. On October 1, 2018, the organization's name was shortened to AFCEA International.
SIGNAL, not to be confused with the German Signal magazine, [8] is a monthly international news magazine targeting government, military and industry professionals active in the information technology and intelligence fields. The magazine was started in 1946. [9] Among the topics covered in the magazine are command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR); information security; cybersecurity; research and development; artificial intelligence, machine learning, big data, cloud technologies, electronics; and homeland security.
A monthly online newsletter, SIGNAL Connections, [10] is emailed mid-month to members. AFCEA's online directories include the corporate member directory, [11] which provides access to detailed information about the companies that support AFCEA. In addition, information in this directory also is available according to corporate focus categories in the Cybersecurity, Intelligence, Health IT, Education and Homeland Security directories. Organizations provide the information in these online publications, including contacts, business focus, products/services, and/or clients.
AFCEA is involved in additional communications technologies, including webinars, podcasts, blogs, and RSS Feeds. AFCEA has a presence in social media platforms. [12]
The association, in partnership with the AFCEA Educational Foundation, chapters and members, presents $2 million annually in scholarships, grants and awards in six categories: college students with science, technology, engineering and mathematics (STEM) majors; current and future teachers of STEM subjects in U.S. middle and high schools; underserved/minority college students studying STEM fields; students in fields related to security such as intelligence, cyber and homeland security; ROTC cadets/midshipmen and military personnel; and students attending the five service academies and other military educational institutions. [13]
AFCEA's Professional Development provides a wide range of programs of continuing education, leadership development and technical training courses. Courses are available for presentation on-site at organizations' facilities. [14] In addition, some sessions at AFCEA conferences and chapter events qualify as continuing education to maintain cybersecurity certifications. [15]
The association also has partnerships with several higher education institutions that offer members discounts on tuition both in the classroom and online. [16]
Through leadership development, education, events, and networking, the association helps women advance in their careers. [17]
The Emerging Professionals in Intelligence Community (EPIC) Committee enables young professionals to learn about the various aspects in this specialty field. [18]
Through the Small Business Committee and several focused events, the association provides strategies and programs about business processes, upcoming contracts and marketing. [19]
AFCEA has more than 130 chapters and sub-chapters around the world to provide professional education and networking opportunities. Most hold monthly meetings to exchange ideas about communications, intelligence, cybersecurity and information systems technologies. Nearly one-half of AFCEA's chapters conduct symposia and seminars in addition to other chapter activities. Individual chapters provide college scholarships, fund classroom equipment and mentor students in science fairs and technology clubs. [20]
AFCEA conferences offer problem-solving opportunities to C4ISR, intelligence, cybersecurity, homeland security and information technology professionals through exhibits, technical panels and speakers. [21] Events include:
Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.
SEMI is an industry association comprising companies involved in the electronics design and manufacturing supply chain. They provide equipment, materials and services for the manufacture of semiconductors, photovoltaic panels, LED and flat panel displays, micro-electromechanical systems (MEMS), printed and flexible electronics, and related micro and nano-technologies.
ISACA is an international professional association focused on IT governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only. ISACA currently offers 8 certification programs, as well as other micro-certificates.
Raytheon Intelligence, Information, and Services is a business unit of Raytheon Company headquartered in Dulles, Virginia. IIS specializes in intelligence, surveillance, and reconnaissance, advanced cybersecurity services; weather and environmental services, and information-based services for homeland security. The company also provides training, logistics, engineering, product support, and operational support services and solutions for mission support, homeland security, space, civil aviation, counter-proliferation, and counter-terrorism markets.
The International Association of Privacy Professionals (IAPP) is a nonprofit, non-advocacy membership association founded in 2000. It provides a forum for privacy professionals to share best practices, track trends, advance privacy management issues, standardize the designations for privacy professionals, and to provide education and guidance on career opportunities in the field of information privacy. The IAPP offers a full suite of educational and professional development services, including privacy training, certification programs, publications and annual conferences. It is headquartered in Portsmouth, New Hampshire.
Master of Professional Studies (MPS) is a type of master's degree concentrated in an applied field of study. MPS degrees are often interdisciplinary. While Master of Arts and Master of Science degree programs tend to focus on theory and research, Master of Professional Studies degrees tend to emphasize practical skills designed for current and aspiring professionals, including post-bachelor and post-graduate students, and often require some amount of fieldwork or internship to complement classroom learning.
The Australian Computer Society (ACS) is an association for information and communications technology professionals with 40,000+ members Australia-wide. According to its Constitution, its objectives are "to advance professional excellence in information technology" and "to promote the development of Australian information and communications technology resources".
Dr. Dale W. Meyerrose, Major General (Retired) was the first President-appointed, Senate-confirmed Associate Director of National Intelligence/Intelligence Community Chief Information Officer (CIO) and Information Sharing Executive for the Director of National Intelligence (DNI).
The College of Information Sciences and Technology, also known as the College of IST at Pennsylvania State University was established in 1999. Headquartered at the University Park campus in University Park, Pennsylvania, the college's programs are offered at 21 Penn State campus locations. Dr. Andrea Tapia currently serves as the college's interim dean.
The Intelligence and National Security Alliance (INSA) is a non-profit, nonpartisan 501(c)(6) professional organization based in Arlington, Virginia for the public and private sector members of the United States Intelligence Community.
ManTech International Corporation is an American defense contracting firm based in Herndon, Virginia. It was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is a portmanteau formed through the combination of "management" and "technology."
The National Cybersecurity Center (NCC) was founded in early 2016 as a 501(c)(3) nonprofit organization in Colorado Springs, Colorado. It started from a vision of Governor John Hickenlooper, in coordination with several people from the University of Colorado Colorado Springs (UCCS) and the community. The NCC serves both public and private organizations and individuals through training, education, and research.
Cryptol is a domain-specific programming language for cryptography developed by the Portland, Oregon based software development firm, Galois, Inc. It is free and open-source software released under a BSD 3-clause software license.
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include:
Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware. SIEM systems are central to the operation of security operations centers (SOCs), where they are employed to detect, investigate, and respond to security incidents. SIEM technology collects and aggregates data from various systems, allowing organizations to meet compliance requirements while safeguarding against threats.
The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), also known as the New Jersey Office of Homeland Security and Preparedness' (NJOHSP) Division of Cybersecurity, is the first American state-level information sharing and analysis organization in the United States that exchanges cyber threat intelligence and conducts incident response for governments, businesses, and citizens in New Jersey. Located at NJ’s Regional Operations and Intelligence Center (ROIC), and acting in a cyber fusion center capacity the NJCCIC is composed of staff from NJOHSP, the NJ Office of Information Technology, and the NJ State Police. The NJCCIC's nomenclature is derived from its federal counterpart, the National Cybersecurity and Communications Integration Center, which encompasses the U.S. Department of Homeland Security's Computer Emergency Readiness Team (US-CERT).
The Center for Internet Security (CIS) is a US 501(c)(3) nonprofit organization, formed in October 2000. Its mission statement professes that the function of CIS is to " help people, businesses, and governments protect themselves against pervasive cyber threats."
Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.