The Debate That Changed Programming: A Living History

Georgia Tech’s College of Computing Presents:

The Debate that Changed Programming:  A Living History of Computing’s Famous Collaboration

Moderated by Harry R. Lewis of Harvard University

Thursday, June 17, 2021 | 7 – 8:30 PM ET | LIVE WEBCAST

A quarter century into the modern era of computing, two young assistant professors joined forces with the legendary Alan Perlis, one of the founding fathers of American computer science, and would publish a paper challenging the conventional wisdom that computer programming should be formal and mathematical. It was a shot across the bow to Edsgar Dijkstra, Tony Hoare and many others who sought the certainty of mathematical proofs of software correctness. The paper would become a lightning rod for a debate that would continue for the better part of four decades. It moved federal funding patterns and was the backdrop for dramatic showdowns between formalists and pragmatists.

Twenty years later, those same assistant professors ended up in the College of Computing at Georgia Tech to continue their lifelong collaboration. One of them, W. Storey Professor of Computing Richard “Dick” Lipton was the first Georgia Tech computer scientist elected to the National Academy of Engineering. The other was Richard “Rich” DeMillo, who left his position as Chief Technology Officer at Hewlett-Packard to become the John P. Imlay Jr. Dean of Computing.

Their seminal 1979 work, “Social Processes and Proofs of Theorems and Programs,” is now part of a new collection of 46 classic papers in computer science published as a book this year from the MIT Press. Ideas That Created the Future by Harvard Professor Harry Lewis spans the intellectual birth and growth of the field – from Leibnitz and Boole to Knuth and RSA – and covers the sweeping discoveries and advancements that have come to define computer science. As Lewis points out in his introductory essay, “The fact that some computer scientists still bristle when this paper is mentioned is testament to its dialectic force.”

The College of Computing at Georgia Tech invites you to take part in a historical conversation between Rich DeMillo and Dick Lipton, two pioneers in computer science who helped shape a field that has come to reshape how we live every day.

Join the virtual fireside chat, Thursday, June 17, 2021, at 7 PM ET, for this living history – as told by the men who lived it – and hear about the experiences and their roles in this turning point in computer science.


Image Credits: Kathy Pham; public domain

Harry R. Lewis is Gordon McKay Research Professor of Computer Science at Harvard University. Now retired but still teaching, he also served Harvard as Dean of Harvard College and as interim Dean of Harvard’s Engineering School. He is a member of Harvard’s Theory of Computation group, and of the board of directors of the Electronic Privacy Information Center (EPIC). Lewis is editor of the recently published book Ideas That Created the Future (MIT Press, 2020), which collects forty-six classic papers in computer science that map the evolution of the field, with a context-setting introduction to each.

Living History Speakers:

Richard DeMillo is the Charlotte B. and Roger C. Warren Chair of Computer Science and Professor of Management at Georgia Tech. He founded the Center for 21st Century Universities (C21U) and was named a Lumina Foundation Inaugural Fellow in recognition of his work in higher education and C21U. He previously served as Hewlett-Packards’s first Chief Technology Officer, directed the Computer and Computation Research Division of the National Science Foundation and was the John P. Imlay Dean of Computing. He is currently chair for the new School of Cybersecurity and Privacy at Georgia Tech. 

Richard Lipton, a long-time member of the National Academy of Engineering, has held tenured faculty appointments at Yale University, the University of California at Berkeley, and Princeton University before joining the faculty in the College of Computing at Georgia Tech. For his startlingly original work, often spanning distant parts of the field, he was awarded the 2014 Knuth Prize. He is also a member of AAAS and was a Guggenheim Fellow in 1981 and a fellow of the ACM in 1997. He has had 17 graduate students and 142 academic descendants.

Chair’s Message | Graduation Weekend

May 7, 2021

Dear Cybersecurity and Privacy community,

Spring semester is officially a wrap, and starting this morning, members of the Graduating Class of Spring 2021 will take part in commencement ceremonies. Congratulations to all the graduates who are being conferred degrees and a special job well done to the students in our cybersecurity graduate programs. To the graduates – you will break new ground in the field as you start or continue your careers. You’ve been prepared well and we wish you the best of luck. Please stay connected with the school and visit us when you’re back in the area.

You can meet some of our new alumni – including the Online Master of Science in Cybersecurity program’s first women graduates – in the school’s graduation coverage.

As we mark the end of SCP’s second semester and prepare for summer, we have much that we can be proud of. Building a new school has taken the village institute, and many of you answered the call.

Some recent activity of note with SCP people and programs:

  • The Georgia Cybersecurity and Privacy Roadmap Taskforce convened its second workshop, bringing together leaders from Georgia industries and government – including aerospace, agriculture, defense, and intelligence – to drill down on the requirements needed in the public and private cybersecurity sectors. The video is available here and one more workshop is being planned.
  • Spring brought a number of high-profile cyber-attacks and digital privacy issues that were reported in the media. School faculty continue to engage in the public discourse on these topics and you can see where in this interactive graph.
  • Yesterday I keynoted an event that drew national tech and business leaders to discuss “Global Trends in Digital Infrastructure.” John McIntyre from Georgia Tech’s Center for International Business Education and Research (CIBER) – no relation – invited me to set the stage for the discussion and share with the primarily non-cybersecurity audience what the cyber landscape looks like.

At the end of the keynote, I discussed the investment Georgia Tech has made in the new school and how we are in a good position to scale our programs to educate higher numbers of professionals and leaders needed in cybersecurity and digital privacy. You are making that investment possible. I’m looking forward to continuing our work this summer. Happy trails.


Richard  DeMillo 
Charlotte B. and Roger C. Warren Chair of Computing  
Chair, School of Cybersecurity and Privacy   Visit me at
Follow me on Twitter @rad_atl and @richde

Global Trends in Digital Infrastructure

May 6, 1-5 pm ET

The COVID-19 pandemic has forced businesses to transform how they operate, driving extraordinary demand for digital service providers and a need for increased connectivity. Organizations that require additional infrastructure have struggled with this rapid shift in demand.

This May 6, 2021 virtual event, hosted by GT CIBERUIBS, and Equinix, will take a deep dive look at Global Trends in Digital Infrastructure with help from Senior Executives and Experts. Five trends are impacting today’s digital transformation challenges increasing the need for interconnection.

  • Digital Business: Moving to fully digitized services is now more crucial than ever. As new demand for distributed digital engagement rises, businesses need to solve remote workforce, network efficiency, and workflow latency issues.
  • Urbanization: Businesses need wider distribution of services to enhance local interaction. As population centers grow, businesses will have greater demands for distributed compute, and will need to manage the complexities of localization.
  • Cybersecurity: Cyberthreats are accelerating. As the number of user devices and cloud resources increases, organizations must solve for distributed security risks.
  • Data Volumes & Compliance: Growth of localized data is outpacing the ability to manage it. Most of the world’s ever-increasing data volumes are not being leveraged for actionable insights.
  • Business Ecosystems: Connectivity to multiple ecosystems is key to growth and innovation. API-driven application exchange issues, real-time engagement, multiparty workflows and dynamic service chains require on-demand connectivity to a variety of ecosystems at the lowest latency.

SPEAKERS Confirmed and invited

  • Dr. Richard DeMillo, Chair, School of Cybersecurity and Privacy, Professor
    Charlotte B. and Roger C. Warren Chair of Computing, and Executive Director, Center for 21st Century Universities (C21U), Georgia Institute of Technology (GaTech)
  • Mr. Tanuj Raja, Global Head, Strategic Partnerships, Google Cloud
  • Mr. CB Velayuthan, Global Managing Director, Strategic Alliance, Equinix
  • Mr. Mark H Thomas, Managing Director and CIO, Evicore
  • Mr. Olli Junnila, CTO, Nokia
    Ms. Lakshmi Sharma, Director, Product Management, Networking,Google Cloud
  • Mr. Flavio Villanustre, VP, Technology & CISO, RELX Distinguished
    Technologist, LexisNexis Risk Solutions Group
  • Mr. Michael Montoya, Chief Information Security Officer, Equinix
  • Mr. Ravi Venkatesan, Chief Technology Officer, USA Technologies Inc.
  • Mr. Chad Shaffer, Digitalization, Business Development Executive, Siemens
  • Mr. Irfan Khan, CEO and President, CLOUDSUFI

Hosts and Moderators

  • Dr. John McIntyre, Professor of Management and International Affairs
    Executive Director, Georgia Tech Center for International Business Education & Research, Scheller College of Business, Ga Tech
  • Dr. Brian Canada, Chair, Department of Computer Science,
    Associate Professor of Computational Science University of South Carolina
    Beaufort (USCB)
  • Mr. Ani Agnihotri, Co-Founder and CEO, Marshall Automation America, Inc. Managing Partner, USIBRC & Chair, UIBS

Graduation Messages

#GT21 MS in Cybersecurity

10 years down the line I envision myself teaching Defense Against the Dark Arts at Hogwarts!

I hail from India and finished my Bachelor’s degree in Information and Communication Technology in 2017. I’m an avid reader, a history buff, and like cooking! My fascination with Cryptography started after reading Dan Brown’s Digital Fortress and I’ve relentlessly pursued advancements in computer security ever since. I worked for 2 years to get a taste of the tech industry and the need to cultivate a security mindset strengthened my resolve to pursue a Master’s degree. Getting into Georgia Tech was a dream come true and everything since then has been one adventurous ride! I owe everything to my parents for their unflinching support; this degree is as much theirs as it is mine.

Program Highlights: I remember being excited about the curriculum knowing it had courses from three different schools. Cybersecurity is not only about the technology, it is also about the people impacted by it. The classes I took from the Policy track really helped me understand why we do what we do. I also had the chance to work with Dr. Mustaque Ahamad. His guidance helped me develop a whole new perspective of looking at challenges. The courses, in general, were very well planned and I gained a lot of technical know-how especially from the Info Sec Lab. I’m glad I got such a holistic sense of security!

Parting Advice: It’s one of the best schools! Everyone here is going to be smart and it’s easy to get intimidated. Don’t let that deter you from reaching out for help. You can make a complete fool of yourself and it’ll be okay; you’re here to learn!

What’s Next: 10 years down the line I envision myself teaching Defense Against the Dark Arts at Hogwarts! For now, I’m thrilled to step out in the real world and apply my skills. My time at Georgia Tech has taught me that we will always have new things to learn! 

High Prospects

Maneel Manish Modi is Confident His New Cybersecurity Credentials Will Position Him Well in Industry

▲ Click image for Countdown to Commencement

Born and brought up in Mumbai, Maneel Manish Modi is on the verge of completing his journey at Georgia Tech and is soon to be the proud recipient of a Master’s degree in Cybersecurity. Describing himself as an avid sports enthusiast outside the classroom, he believes that having studied alongside those focusing on other specialty areas of cybersecurity and being exposed to a diverse mix of perspectives will serve him well as he prepares to take his first full-time job. 

Now 24, Maneel wanted to get school out of the way and resisted the temptation to go straight into the tech industry with his computer engineering bachelor’s credentials. He thinks he’s better prepared now to face a high-growth, fast-paced tech sector, especially that of information security, an area that he believes will challenge him for the foreseeable future.    

Maneel is undeniably energized as he heads out to start his career and leverage all that he has learned. He aims to absorb as much as he can by taking on varied projects and working toward the long-term growth that the field promises. With cybersecurity professionals constantly in demand across industries, Maneel’s prospects to do exactly that look very good indeed. – JP

Maneel Manish Modi


Program Highlights: The breadth of the program within the Information Security track was probably my favorite part of it. Taking a number of courses across the different subdomains of the vast sphere that is security ensured that we had a sufficient background in all of them while giving us the opportunity to pursue what we were really interested in going forward. 

Another great aspect was the option to take elective courses offered primarily to students pursuing the Policy or Cyber-Physical Systems tracks. I strongly believe that taking the courses covering cybersecurity policies and privacy regulations were key to coming out of Georgia Tech with a well-rounded knowledge of the domain.

Parting Advice: You’ll do just fine! Things can get intense (especially during the Information Security Laboratory course!) but my experience with professors and classmates has been extremely positive – everyone has been really helpful and understanding. I wasn’t sure coming right after my undergraduate degree was the right choice but looking back now, I have no regrets whatsoever. 

What’s Next: The last two years have been unforgettable, and I’d like to thank my family and friends for all their support and encouragement. I’m looking forward to getting out there and gaining some experience in the industry and see where that takes me. I’ve learnt a lot, both inside and outside the classroom, and hope to stay in touch with all the amazing people I’ve met on this journey. Until next time, Georgia Tech.

Stealth Mode

Career Computer Engineer Jada Brock Has a Whole New Respect for Digital Privacy and Cybersecurity

▲ Click image for Countdown to Commencement

Georgia Tech’s graduate course in Privacy, Technology, Policy and Law had an unintended consequence for Jada Brock – it scared her into going incognito on the web.

The same semester, she took the Security Operations and Incidents Response course – taught by former GT CISO Jimmy Lummis and where students learn about tools hackers use – and the two classes together put Jada on the path to minimizing her digital footprint. (She insists both were among her favorite courses).

Jada says that the conservative approach to her online presence is also part of her broader responsibility to the public. She works in a government agency that deals with critical infrastructure, and she understands the real-world consequences that cyber threats pose.

“Maybe when I retire, I’ll start putting more pictures online,” she jokes.

Jada has more than 20 years of public service and has constantly moved forward along with the IT field. Her new degree from the Online Master of Science in Cybersecurity degree program from Georgia Tech shows this continued commitment.

Cybersecurity seemed like a perfect fit for a career computing engineer who had already lived through Y2K and has an awareness of what is at stake in an increasingly networked world. She decided to get into cybersecurity after learning from a coworker about Georgia Tech’s online program.

Her newfound cyber skills prompted her to make a budget request at her agency for new backup servers. It worked.

“Nothing is better than backups,” she says, then laughs.

Jada is one of three women in the OMS Cyber program graduating in spring 2021. The three are the first women to graduate from the two-year-old program and, in doing so, are making Georgia Tech history. Jada is proud of this fact, but it’s not something you’ll see her sharing online anytime soon. We did that for her. – JP



Program Highlights: I felt the level of knowledge from each professor was honestly top-notch.  Every instructor is at the top of their field and this shows as you begin your coursework. Class offerings are balanced and relevant to what’s happening now in cybersecurity. I found working on projects and weekly assignments rewarding and the online platform made communication with fellow classmates and instructor’s no different than sitting in a classroom on campus.

Parting Advice: If you are considering this program at Georgia Tech, do not hesitate – enroll.  You will be amazed at the quality of the program and pace. Plus, you can never go wrong having the Georgia Institute of Technology on your résumé for your education. 

Women join this program and take the world by storm. Do not feel intimidated.  As one of the few females in this program, I never experienced discrimination and was always treated equally in the classroom by everyone. If you enroll, you will be glad that you took this step to educate yourself at this prestigious institution. 

What’s Next: I am a career government employee in the technology field. I plan on using my knowledge to protect my workplace and colleagues against cyber-related threats. Most likely I will begin studying for the Certified Information Systems Security Professional (CISSP) certification. The coursework for the OMS in Cybersecurity program at Georgia Tech has prepared me well for this certification and will exponentially enrich my contributions in the workplace.

Twice a Yellow Jacket

After 20 Years of Professional Experience, Paul Konikowski Finishes Round Two at Georgia Tech

▲ Click image for Countdown to Commencement

There’s a common refrain among students who make it through Georgia Tech’s classrooms and come out the other side with a degree: I Got Out. It’s a badge of honor and a shared bond among those who endure the institute’s rigorous academic demands. More than a few of those men and women choose to come back and further their education, knowing full well what awaits them. Paul Konikowski, Manager of AV Contracting at HB Communications, is one such alum. His BS in computer engineering will now share wall space with a master of science in cybersecurity, which Paul earned this spring. The master’s came 20 years after the baccalaureate.

Now 44, Paul has had the distinction of going through the Georgia Tech gauntlet both in-person and online. He is among the first graduates in the Online Master of Science in Cybersecurity, which turned two this year. Paul was part of the first 250 students who were accepted into the online master’s program. – JP

Paul Konikowski


Program highlights: What I really liked about this program was the mix of structure and flexibility. I am the type of person who works best when I have a deadline to meet. The weekly videos, reading assignments, projects, papers, quizzes and exams, all helped to keep me on track towards the degree. At the same time, the asynchronous, online format of the program allowed me to find my own time each week for doing the work, while juggling a full-time job and freelance audiovisual installation projects.

Parting advice: If you are interested in a master’s program or any other higher education, but you think you are “too old” to go back to school, I’m here to tell you, you aren’t too old. I was really worried I wouldn’t be able to comprehend the material but was pleasantly surprised how well my brain worked after so many years away from formal education. And I’m not the only one; a large percentage of my classmates were over 40, 50, or even 60 years old.  Trust me, you are NOT too old, you CAN do this, and your brain WILL work!

What’s next: I hope to leverage my experience in AV (audiovisual) and ICT (information and communications technology) and combine them with the skills and knowledge I gained in the cybersecurity master’s program. There is a growing need for security-minded individuals in the IoT industry, and I hope to be a thought-leader in the space, being the “bridge” between the technical folks and the non-technical people who are responsible for creating and enforcing the security policies within their organizations. In terms of learning, my next step is to research hardware vulnerabilities and tainted firmware attacks, maybe set up a test lab, and try to ethically hack some audiovisual devices. I really enjoy teaching others about cybersecurity, and writing articles for AV/IT/IoT industry magazines.

Road Warrior

Becky Borrebach Hits Her Stride in a Year of Big Personal Changes

▲ Click image for Countdown to Commencement

Becky Borrebach has the distinction of being one of the first three women to graduate from the Online Master of Science in Cybersecurity degree program at Georgia Tech. With her new degree and an upcoming new job (she’s headed to the Pentagon), Becky is enjoying the moment.

Previously stationed in Georgia, the U.S. Army captain remembers the first and only time she visited Tech’s campus. She and her husband Drew, a fellow Army officer, were stationed clear across the state from one another – Drew at Fort Benning in Columbus and Becky at Fort Gordon in Augusta – and had to make long weekend drives to see each other.

Becky jokes that the long Friday rush-hour road trips were like her own personal “Highway 20 Ride,” a somber country song by the Zac Brown Band. The couple eventually decided for a change of scenery and started weekend getaways to Atlanta every other weekend. They would meet in the middle – talking on the phone all the way – and then turn into tourists, visiting all the sites the city had to offer. After Becky got accepted to Georgia Tech, she added a new tourist destination to her list.

That solitary trip was during a summer, when campus is slow, and she got to loiter and hang out for a few hours. She bought everything she thought she’d need at the campus bookstore before heading out to her current duty station in Hawaii. The Georgia Tech ballcap she bought is now primarily sported by Drew, who often wears it to show off how proud he is of Becky.

On Becky’s bucket list is watching a football game at Bobby Dodd. With the Pentagon only a few hours away and her practiced road trip skills, we hope to see her soon. – JP

U.S. Army Capt. Becky Borrebach pictured with her husband and U.S. Army Capt. Drew Borrebach in Hawaii.


Program highlights: The highlight of the Georgia Tech OMS Cybersecurity program has been the ability to continue my full time job in the military while completing the program. The flexibility of the program has allowed me to travel overseas for work, attend a three-week training exercise in Louisiana with limited connectivity, and complete my coursework from the beautiful state of Hawaii, a six-hour time difference from Georgia Tech. In addition to this, the program is constantly evolving and adding new relevant curriculum. I feel that I have been able to stay on the cutting edge of the cybersecurity field with the courses offered. 

Parting Advice: Don’t be afraid to get outside of your comfort zone! The program offers multiple different tracks and each student is able to take electives outside of their selected track. I selected the Policy track and was hesitant to take the Data Analytics and Security class due to its very technical nature. I took a chance, enrolled myself in the course, and it ended up being one of my favorite courses in the program. Challenge yourself – you will not regret it!

What’s Next: Up next, I will be moving with my family to the National Capitol Region to work at the Pentagon on the U.S. Army’s new human resources system. I am excited to take what I have learned throughout my time at Georgia Tech and continue to apply it to my work!

Making Moves

Overseas Graduate Kristine Diomampo Never Dreamed of a Cybersecurity Career

▲ Click image for Countdown to Commencement

Kristine Diomampo is farther from Georgia Tech’s Atlanta campus than most of her fellow spring graduates. Her home and job in Hong Kong is more than 8,300 miles away and a 12-hour time difference. But the Philippines native didn’t let that become a barrier to her earning an online Master of Science degree in Cybersecurity (OMS Cyber).

Kristine’s grad school experience has been like a self-feeding loop – go online for class, learn through her projects and peers, integrate that new knowledge at work, then rinse and repeat. Adding to that virtuous cycle was a promotion at her job, where she is now an IT security auditor.

Originally armed with a bachelor’s in accountancy, Kristine’s first job out of college was at an assurance and tax services firm as an IT auditor – it was the only job opening the firm had available. Her subsequent IT and business background in banking and insurance led her to Hong Kong. Now, almost five years later, Kristine has her sights set on becoming a cybersecurity analyst or consultant and then maybe a move to cybersecurity management or architecture.

Her love of learning will continue (she lives and breathes IT when not traveling or writing) with a pile of books and certifications awaiting her after graduation as she continues studying cybersecurity.

Kristine has a claim on a new part of Georgia Tech history in earning her recent degree – she is one of the first three women to complete the OMS Cyber program. All three are spring 2021 graduates. Kristine can take pause to marvel at this accomplishment and look back to where it all started with the happy accident of an accountant getting into IT. – JP


Program highlights: I always thought I had very poor technical cybersecurity skills and I wasn’t confident in what I knew. I’ve never hacked nor coded anything; all I knew about security vulnerabilities were theoretical. But through the course, I was able to work on a variety of projects that allowed me to discover on my own how to crack passwords or how buffer overflows work. The sense of accomplishment in successfully completing projects encouraged me to continue with my courses and the program. I was also able to apply what I learned from the program to my job, further solidifying what I learned in class. The program gave me the structure I needed to expand my learning, and I can use that to boost any further independent learning that I wish to pursue.

Parting Advice: It can be easy to feel isolated and alone as you tackle your projects and assignments. Afterall, the program delivery is online and your classmates are scattered all over the world. This is where you take advantage of communication tools to build connections with other people in the program. Many late night study sessions were made more fun by talking with other people, and there were those that provided much needed guidance and encouraging words (even humor) when my projects wouldn’t work. Just because the program is online doesn’t mean that meaningful friendships can’t be made. So feel free to reach out to your classmates and even find a study buddy or two!

What’s Next: I actually got promoted at work because of the program! Because I was pursuing a masters in cybersecurity, I was given the opportunity to move from being a generalist IT auditor to being an IT security auditor and working on more technical assignments. This was even before I graduated! I plan to hone my cybersecurity technical skills even more (I already have a pile of security books to go through) and to pursue security certifications. I hope to someday move into information security operations in my organization and have hands-on experience on implementing controls in the workplace.

Georgia Tech Advances Statewide Efforts in Cybersecurity and Digital Privacy Through Education Strategy and Industry Workforce Development

Georgia is a leader in the cybersecurity field, home to flourishing industries in multiple regions and a headquarters for companies in priority sectors such as healthcare, fintech, agriculture, the U.S. Department of Defense, and others. 

Nationally recognized cybersecurity and privacy firms call metro Atlanta home, including OneTrust and Pindrop, both cofounded and led by Georgia Tech alumni. Each recently hit significant milestones – OneTrust, which is focused on privacy compliance, saw a jaw-dropping 48,000% three-year growth rate in 2020 and Pindrop celebrated 10 years this year with a major acquisition that enhanced it as a leader in voice security. Codoxo, using AI forensics to mitigate healthcare fraud and waste, has joined its elder brethren as an alumni-led startup on the Atlanta scene and was recognized by the Technology Association of Georgia as a top 10 innovative tech company in 2021.

Georgia Tech’s newest investment in the fields materialized in the form of the first academic school at the institute in a decade. The School of Cybersecurity and Privacy officially launched in September 2020.

“Georgia Tech has earned a reputation for cutting-edge interdisciplinary research in service to society. Georgia Tech’s new School of Cybersecurity and Privacy will focus on applied research collaborations as well as translational research with the fast-growing cybersecurity industry in Georgia, meeting a critical workforce need,” said Georgia Tech President Ángel Cabrera.

Georgia’s current cybersecurity workforce includes more than 32,000 professionals, but there are 17,000 jobs, or a full one-third, of the total available in the state that are unfilled, according to Cyberseek, a tool for job market analysis supported by the National Initiative for Cybersecurity Education (NICE).

The Georgia Cybersecurity and Privacy Roadmap Taskforce, a newly formed group of education experts and chaired by Georgia Tech’s Richard DeMillo, is working with industry and government officials to address this challenge. They are currently working to understand the needs of Georgia’s education system and provide a guide to fill the workforce gap by recommending a strategy for cyber education programs and training for students and working professionals.

Georgia Tech’s own OMS Cyber program has already provided a model that could potentially be a template for working professionals looking to switch careers to cybersecurity or digital privacy. More than 80% of the students enrolled, or about 800, are employed already.

“Georgia Tech’s approach to online education combines affordable, flexible access with modern pedagogy and world-class instruction,” said DeMillo, who also chairs the School of Cybersecurity and Privacy at Georgia Tech. “As we have learned from the thousands of students enrolled in our online degrees, this opens new doors to learners around the world, whether they are re-skilling mid-career or jump-starting new careers with one of the most respected graduate degrees in the world.”

To equip the workforce of the future in both cybersecurity and privacy, Georgia Tech is taking a holistic approach to teaching students about the technology, business, policy, and practice of these fields.

Technical skills in specialties such as cloud security, cryptography, cyber-physical systems, forensics, and malware are paired with learning about regulatory requirements, including those in public policy and law.

Students are able to choose from some of the most pressing applications of cybersecurity and privacy in society; election systems, social media, internet infrastructure and web security, cyber warfare, hardware security, network and communications system security, and machine-to-machine trust.

The state taskforce addressing workforce development in cybersecurity and digital privacy is holding a series of public workshops spring and summer 2021. To learn more visit

Media Contact: Joshua Preston, Research Communications Manager, College of Computing