<node id="680083">
  <nid>680083</nid>
  <type>event</type>
  <uid>
    <user id="36009"><![CDATA[36009]]></user>
  </uid>
  <created>1738277142</created>
  <changed>1738277316</changed>
  <title><![CDATA[Certifying Cybersecurity Experts]]></title>
  <body><![CDATA[<h2><strong>Abstract</strong></h2><p>How do we know that the workers who secure digital infrastructures are competent and trustworthy? A vast industry has emerged to certify workers, but unlike medicine or law, cybersecurity has no authoritative certifying organization.&nbsp;This talk traces the origins of the cybersecurity professional certification industry to the “new economy” and problems of trust created by the associated rise of globally distributed digital infrastructures and workers in the 1980s and 1990s. Entrepreneurs and cybersecurity workers found lucrative opportunities in the professional certification industry, particularly after the terrorist attacks of September 11, 2001, increased demand for cybersecurity workers.&nbsp;Prominent cybersecurity workers were both powerful and precarious in the certification industry: powerful because their knowledge and reputation were highly valued for giving certifications credibility, precarious because companies often put profits ahead of workers and the larger project of cybersecurity. Governments funded and shaped the development of cybersecurity training regimens and created demand for certification. But they did not authorize any particular organization to certify workers or training programs. Instead, they helped to create a competitive marketplace for certifying experts, along with its affordances and dysfunctions.</p><h2><strong>About the Speaker</strong></h2><p>Rebecca Slayton is an associate professor in the Department of Peace and Conflict Studies and the Judith Reppy Institute for Peace and Conflict Studies at Cornell University. Her research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project,&nbsp;<em>Shadowing Cybersecurity</em>, examines how authoritative and credible cybersecurity expertise has been historically institutionalized.</p><p>Co-sponsored by Metro Atlanta Science Studies Seminar.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Professor Rebecca Slayton explores the history of the cybersecurity professional certification industry, from the rise of globally distributed infrastructures in the 1980s to the unregulated competitive marketplace of today.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Professor Rebecca Slayton explores the history of the cybersecurity professional certification industry, from the rise of globally distributed infrastructures in the 1980s to the unregulated competitive marketplace of today.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2025-04-24T16:00:00-04:00]]></value>
      <value2><![CDATA[2025-04-24T17:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Postdoc]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Helen Anne Curry<br><a href="mailto:hacurry@gatech.edu">hacurry@gatech.edu</a>&nbsp;</p>]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Price Gilbert Memorial Library, Scholars Event Theater (Room 1280)]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1281</item>
          <item>1288</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
          <item><![CDATA[School of History and Sociology]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
