{"id":438,"date":"2025-04-30T15:34:00","date_gmt":"2025-04-30T19:34:00","guid":{"rendered":"https:\/\/sites.udmercy.edu\/cyberclub\/?p=438"},"modified":"2026-03-26T17:30:39","modified_gmt":"2026-03-26T21:30:39","slug":"your-cybersecurity-career-starts-at-university-of-detroit-mercy-hear-from-udm-students-and-dr-gregory-laidlaw","status":"publish","type":"post","link":"https:\/\/sites.udmercy.edu\/cyberclub\/2025\/04\/30\/your-cybersecurity-career-starts-at-university-of-detroit-mercy-hear-from-udm-students-and-dr-gregory-laidlaw\/","title":{"rendered":"Your Cybersecurity Career Starts at University of Detroit Mercy: Hear From UDM Students and Dr. Greg Laidlaw"},"content":{"rendered":"\n<p>In the digital landscape of today, organizations are in desperate need of skilled professionals with both the technical skills and managerial expertise to secure critical assets from ever-changing cyber threats. <\/p>\n\n\n\n<p>Hear from <em>UDM Lab Technician<\/em> &amp; <em>UDM Cyber Club Technician<\/em> <strong>Harrison Haviland-Longo<\/strong>, <em>UDM Cyber Club Vice President<\/em> <strong>Hannah Burdinie<\/strong>, and<strong> Dr. Greg Laidlaw<\/strong> (<em>DMIT, CISSP, C|EH<\/em>) in our new program overview video below to get an inside look at how UDM&#8217;s Cybersecurity programs operate!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Earn a Cybersecurity &amp; Information Systems degree at University of Detroit Mercy\" width=\"1249\" height=\"703\" src=\"https:\/\/www.youtube.com\/embed\/qjZP2dpYfdg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In the digital landscape of today, organizations are in desperate need of skilled professionals with both the technical skills and managerial expertise to secure critical &hellip;<\/p>\n","protected":false},"author":699,"featured_media":483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0},"categories":[9],"tags":[],"jetpack_featured_media_url":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/2025\/04\/detroitmercy_sunrise_v7.jpg","_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/438"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/users\/699"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":2,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/438\/revisions"}],"predecessor-version":[{"id":568,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/438\/revisions\/568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media\/483"}],"wp:attachment":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media?parent=438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/categories?post=438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/tags?post=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}