NCyTE Center
Home MenuCybersecurity Career Awareness and Exploration: A Toolkit and Framework for Introducing Students to Cybersecurity Career Opportunities
November 15, 2024
Recording | Powerpoint
This session will help career counselors, academic advisors, and educators confidently guide students into cybersecurity careers, career pathways and programs of study by introducing and equipping attendees with a robust Cybersecurity Career Awareness Toolkit that includes a guidebook for counselors, workbook for students, and interactive activities that emphasize the interdisciplinary and diverse nature of cybersecurity careers, highlighting both technical and non-technical roles.
Presenters
Dr. John Sands
sands@morainevalley.edu
Department chair and professor of information technology at Moraine Valley Community College.
Dr. John Sands serves as the Principal Investigator/Executive Director of the Center for Systems Security and Information Assurance (CSSIA), an NSF/ATE National Support Center. John holds a Ph.D. from Colorado State University.
Dr. Kristine Christensen
Christensen@morainevalley.edu
Program Director, National Community College Fellowship Program at NCyTE and Professor, Computer Information Systems / Director, Faculty Development at Moraine Valley Community College
Dr. Kristine Christensen is a Computer Information Systems professor at Moraine Valley Community College, with a 20-year tenure in teaching and curriculum development for web development, programming, and engineering technology. She's also the Director of Faculty Development, focusing on professional development programs for faculty and staff. Kristine holds several advanced degrees, including a Ph.D., and is currently furthering her education by earning another master’s degree in cybersecurity.
Teach Cyber Today!
October 18, 2024
9 am PST |Virtual
Join us to explore the array of cybersecurity curricula available free at the CLARK Center!
CLARK offers access to over 1,700 high-quality, impactful cybersecurity curriculum modules, created by leading researchers and rigorously peer-reviewed by instructional designers and subject matter experts.
Whether you're looking to introduce new cybersecurity courses or enhance your existing curriculum, CLARK provides ready-to-use, customizable content, including videos, labs, and slides, all available under a Creative Commons 4.0 license.
In today’s session, our presenters will guide you through a tour of the platform, showcasing popular materials and demonstrating how easy it is to download and integrate free cybersecurity modules into your classroom.
Don't miss this opportunity to upgrade your cybersecurity curriculum!
Presenters
Dr. Sidd Kaza
Co-Executive Director and Co-Founder
sidd.kaza@secured.team
Dr. Sidd Kaza is the Associate Provost for Research at Towson University. He is passionate about cybersecurity education, learning sciences, data mining, and application development. He was one of the primary authors of the ACM/IEEE Cybersecurity Curriculum Guidelines (CSEC 2017). Dr. Kaza received his Ph.D. degree in Management Information Systems from the University of Arizona.
Paige Flores
Director of Technical Operations
paige.zaleppa@secured.team
Paige has led the development of the CLARK project since late 2019 and has been an adjunct faculty member at Towson University since 2021. She is currently knee-deep in a Ph.D. in Information Technology at Towson where she is researching the intersection of Artificial Intelligence and Cybersecurity Education. She is passionate about connecting educators and students with resources that can be utilized to create the next generation of cyber heroes.
Leah Carter
Project Manager
ltaylo17@students.towson.edu
Leah is currently pursuing her Master’s Degree at Towson University. As our Project Manager, she is involved in the design, development, implementation, and maintenance of software applications, overseeing the planning of developers, editors, and marketing personnel, and interacting with clients. Her goal is to continue the growth of CLARK by increasing both publishers and users, and to help grow and develop our current and future team at SecurEd.
References
User Privacy
September 20, 2024
9 am PST | Virtual
Recording | PowerPoint Slides
This session explores the scope of privacy in various contexts and examines how different privacy laws are structured and distinguish themselves from one another. Attendees will learn about data anonymization, de-identification, and the role of quasi-identifiers. Towards the end, we will spend a few minutes discussing a real-life case study.
Yogesh Ailawadi
Yogesh has 20+ years of industry experience in cyber-physical security and privacy. My experience spans various sectors, including airports, power utilities, financial institutions, and healthcare, addressing their security and privacy needs. I hold three patents and currently serve as the Senior Vice President of Products & Innovation at AlertEnterprise Inc. I possess a Master's degree in Computer Science and hold a professional certification in privacy from Harvard Business School.
Cyber Security Evaluation Tool (CSET®)
Friday, August 16, 2024
9 am PST
Recording | PowerPoint
Learn how to deploy the Cyber Security Evaluation Tool (CSET).
The Cyber Security Evaluation Tool (CSET) is a stand-alone desktop application that guides asset owners and operators through a systematic process of evaluating Operational Technology and Information Technology. The tool was developed by CISA (Cybersecurity & Infrastructure Security Agency) and is available to download for free on its website.
Stephen Miller will provide an overview and demonstration of how to deploy CSET at this month's NCyTE meeting. He used the tool in his classes and demonstrated its application in numerous workshops. You don't want to miss this meeting!
CSET Advantages:
- A framework for analyzing cybersecurity vulnerabilities associated with an organization’s overall industrial control system (ICS) and information technology (IT) architecture.
- A consistent and technically sound methodology to identify, analyze, and communicate to security professionals the various vulnerabilities and consequences that may be exploited by cyber means.
- The means for the user to document a process for identifying cybersecurity vulnerabilities.
- Suggested methods to evaluate options for improvement based on existing Standards and recommended practices.
Teachers, faculty, instructors, employers, and curriculum developers are encouraged to attend.
Learn more at https://www.cisa.gov/resources-tools/services/cyber-security-evaluation-tool-cset.
Presenter: Stephen Miller
Professor Emeritus
Leadership Consultant, National Cybersecurity Training & Education Center
Build a Cybersecurity Clinic: Enhance Community Cybersecurity and Train Cyber Leaders
July 19, 2024
9 am PST |Virtual
Students offer pro bono cybersecurity services in exchange for real-world experience!
At the University of Texas-Austin, the Strauss Center for International Security and Law offers free student-led cybersecurity services to resource-challenged community organizations, small businesses, and public sector agencies. What a great community service! Hook'em horns!!!
Join us at the NCyTE monthly membership meeting for an engaging presentation and discussion with Francesca (Chessie) Lockhart and Kareem Chavez. Membership not required.
At the University of Texas-Austin, the Strauss Center for International Security and Law offers free student-led cybersecurity services to resource-challenged community organizations, small businesses, and public sector agencies. What a great community service! Hook'em horns!!!Join us at the NCyTE monthly membership meeting for an engaging presentation and discussion with Francesca (Chessie) Lockhart and Kareem Chavez. Membership not required.
Francesca (Chessie) Lockhart
Cybersecurity Clinic Program Lead at the Strauss Center for International Security and Law
Before joining the Strauss Center, she managed the Homeland Security Unit at the Texas Department of Public Safety’s Intelligence and Counterterrorism Division, overseeing several strategic intelligence analysis programs covering counterterrorism, counterintelligence, cybersecurity, and critical infrastructure protection for the State of Texas. Previous roles at the Department of Public Safety include supervising intelligence support for region-specific criminal investigations and serving as lead analyst on the counterintelligence program. She is a UT Austin graduate (hook ‘em!).
Bias Busters: Promoting Diversity in Cyber & Technology
June 28
Recording
How do we break down barriers and foster a more inclusive, diverse, and equitable environment?
Experts and thought leaders from the US and UK address the critical issue of bias found in cybersecurity and technology fields. Participants will explore practical strategies, share success stories, and discuss actionable steps to create a bias-free industry.
Steph Aldridge, Panelist
Director NeuroCyber, UK
I have been interested in the topic of neurodiversity since listening to Steve Silberman on a podcast and reading his book Neuro Tribes during my time at Cyber Security Challenge UK as their DE&I lead. I have been instrumental in building and coordinating some UK first’s including leading the delivery of the Extended Project Qualification in Cyber Security qualification, currently sitting with the Chartered Institute of Information Security, and delivering an industry wide collaborative event, Neurodiversity: Autism into Cyber, an initiative that galvanized the cyber industry leading to the formation of NeuroCyber, of which I am Director. I received a formal diagnosis of ADHD in December 2022.
I seek out those connections with inclusive grass root networks, amplifying the people behind them and the work they do, to build the understanding we already have: that those with the skill set or aptitude, if included and supported into cyber roles, will create better working environments for their colleagues, add innovation to their department and products, and create wealth for the companies they work for. This isn't rocket science or new theory.
Do one thing today. Ask yourself what does diversity mean to me? I think it's talking to someone who doesn't look, sound, or feel like you.
Jennifer Cox, Panelist
Director for Ireland at Women in Cybersecurity (WiCyS) UK & Eire
Jennifer is a seasoned leader with over 19 years in tech and cybersecurity, embodies excellence and innovation. As a Security Engineering Manager at Tenable and Director for Ireland at WiCyS UK & Ireland Affiliate, Jennifer's impact reverberates globally. Recognized as PCR's Top 25 Women in Tech and a Stevie award recipient, her expertise is unmatched. Jennifer's dedication to diversity, including roles as an Ambassador for Wentor's International Mentoring Program, reflects her commitment to nurturing future cybersecurity leaders. With a passion for shaping a secure digital future, Jennifer Cox stands as a beacon of cybersecurity leadership, driving change and empowerment across industries.
Amy Maxwell-Hysell, Panelist
Senior Manager, Cybersecurity Center at California State University, San Bernardino, US
Amy is a senior manager for the Centers of Academic Excellence in Cybersecurity Community national center, playing a pivotal role in coordinating with the National Security Agency National Centers of Academic Excellence in Cybersecurity (N-CAE) program, government partners and over 450 colleges and universities across the United States. Housed within the Center for Cyber and AI at California State University, San Bernardino (CSUSB), Amy has successfully contributed to securing over $30 million in funding, running national programs including the National Cybersecurity Virtual Career Fair (a program with the NCyTE Center), CAE Symposium, and Communities of Practice in cyber research, operations, and defense. Amy has been pivotal in the creation of the CAE Community portal (caecommunity.org) for critical cyber education resources as well as coordination with other national centers. Ms. Maxwell-Hysell also has over ten years of experience coordinating camps and programs for youth ages 5-12, and more recently collaborating to continue the GenCyber effort at CSUSB, coordinating with community leaders in government and industry to bring cybersecurity education to local middle and high school students.
Susi Barraza, Panelist
Program Manager and DEI Community of Interest at NIST, US
Susana Barraza is the NICE Program Manager at NIST. She serves as NICE Staff Liaison for the NICE Diversity and Inclusion Community of Interest. She previously served as the Student Personnel Assistant for the HSI STEM Equity and Success Initiative (SESI) Project at Sacramento City College. She has also participated in a Political Management Seminar at The George Washington University as a component of a fellowship with the Congressional Hispanic Leadership Institute in Washington, DC. Additionally, Susana served as an intern for Ford Motor Company, the House of Representatives and for the California State Assembly.
Susana received earned an Associates of Science in Business Administration and an Associates of Arts in Interdisciplinary Studies- Social and Behavioral Sciences. Then transferred to California State University, Sacramento (CSUS) where she received bachelor’s in Economics with a minor in Business Administration. She is a 2020 Pathway Fellow Recipient with the College of Education at CSUS; a program (1 out of 6 nationwide) that prepares highly qualified diverse participants for doctorates and careers in rigorous educational research.
Stephen Miller, Moderator
Tenured Professor and Director Cybersecurity Center of Excellence Eastern New Mexico University
Integrating Zero-Trust Principles into IIoT Architectures for Enhanced Security
May 24, 2024 | Recording
While zero-trust architectures have been employed for networks and data centers for years, our research focuses on integrating zero-trust principles into Industrial Internet of Things (IIOT) architectures.
Zero-trust architectures can be integrated into IIoT architectures to enhance system security using resilience and security metrics that enable full-scale system validation and evidence-based security assurances.
This research facilitates the modeling of smart building systems through lightweight devices and the creation of graph representations of industrial processes based on multi-disciplinary schemas. These processes have been analyzed using zero-trust architecture principles through the development of many new tools centered around codified attack surfaces and describing the system with quality data.
Finally, this research focuses on traceable data and graph-based data analysis strategies, thereby creating a flexible data analytics toolkit for IIoT systems including AI/ML models.
Presenter:
Dr. Shaya P. Wolf
Idaho National Laboratory
Doubleheader: RAMPS NOFO & NICE Framework Revision
April 19, 2024
9 am PDT | Virtual
RAMPS Slides | NICE Framework Slides | Recording
RAMPS Info & Resources
NICE at the National Institute of Standards and Technology (NIST) has announced a new Notice of Funding Opportunity (NOFO) to support Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS) cybersecurity education and workforce development.
The funding expands the existing RAMPS program and anticipates awarding an additional fifteen awards of up to $200,000 through cooperative agreements.
Join us to learn more about RAMPS and how to apply for one of the regional grants.
04.08.24 RAMPS Webinar Recording
View Grant Opportunity at GRANTS.GOV
CyberSeek Job Market Heat Map
NICE Framework Revision & Resources
The new version of the NICE Framework has been released! Updated work roles & categories, one new work role, eleven new competencies, and over 2,000 updated task, knowledge, and skill statements are just the beginning.
Learn how to get started, where to find support, and how you can participate in the NICE Framework community.
NICE Framework Resource Center
Workforce Framework for Cybersecurity (NICE Framework) NIST Special Publication 800-181 Revision 1
NICE Framework Summary of Changes
Presenters
Danielle R. Santos
Manager of Communications and Operations and Lead for International Engagement (NICE/NIST)
Danielle Santos is the Manager of Communications and Operations and Lead for International Engagement for NICE at the National Institute of Standards and Technology (NIST). In this role, Danielle engages with global stakeholders who are interested in advancing cybersecurity education and workforce development. NIST | NICE Bio
Karen Wetzel
Lead, NICE Framework (NICE/NIST)
Karen Wetzel joined the NICE in October 2020 to lead efforts around the development, improvement, and application of the NICE Workforce Framework for Cybersecurity (NICE Framework) in support of an integrated ecosystem of cybersecurity education, training, and workforce development. Karen specializes in community engagement and collaborating with stakeholders and subject matter experts to identify, communicate, and develop guidance, tools, and resources and to address emerging trends and opportunities. Prior to joining NICE, Karen held positions as Director of the Community Groups and Working Groups programs at EDUCAUSE and as Standards Program Manager for the National Information Standards Organization (NISO). NIST | NICE Bio
Michael Prebil
Cybersecurity Workforce Analyst (NICE/NIST)
Michael Prebil is a Cybersecurity Workforce Analyst for NICE at NIST, supporting the development, improvement, and implementation of the NICE Workforce Framework for Cybersecurity (NICE Framework). NICE | NIST Bio
Stephen Miller
NCyTE Co-Principal Investigator
Eastern New Mexico University - Ruidoso Branch Community College
Stephen Miller | LinkedIn
AI's Impact on Cybersecurity Instruction & Work Roles
March 15, 2024
9 am PDT | Virtual
How is AI being leveraged to fortify cyber defenses, shape policies, and train the next-gen workforce?
The integration of AI into cybersecurity brings both opportunities and challenges for cybersecurity instruction and work roles. It requires professionals to adapt to new technologies, develop new skills, and stay vigilant in addressing emerging threats and ethical considerations.
Dr. Costis Toregas (Moderator)
Director
Cyber Security and Privacy Research Institute
The George Washington University
Costis Toregas | LinkedIn
toregas1@gwu.edu
Dr. Eman El-Sheikh
Center for Cybersecurity
University of West Florida
Eman El-Sheikh | LinkedIn
eelsheikh@uwf.edu
Dr. Eman El-Sheikh is Associate Vice President and Professor at the University of West Florida Center for Cybersecurity. Eman has extensive expertise and 30 years of experience in AI, Machine Learning, and Cybersecurity education, research, and workforce development. She won over $26 Million in competitive grants and contracts, several awards related to cybersecurity education and diversity, and was recognized among the 2020 Women Leaders in Cybersecurity by Security Magazine. Dr. El-Sheikh leads several national initiatives, including the National Cybersecurity Workforce Development Program, CyberSkills2Work, and received numerous grants to enhance cybersecurity education, workforce development and capacity building. She launched the Cybersecurity for All® Program to enhance competencies and hands-on skills for evolving cybersecurity work roles. The program was recognized among the 2020 Innovations in Cybersecurity Education. Dr. El-Sheikh teaches and conducts research related to the development and evaluation of Artificial Intelligence and Machine Learning for cybersecurity. She has published several books, including Computer and Network Security Essentials by Springer Publishing, over 90 peer-reviewed articles and given over 150 keynote and invited talks and presentations. Eman founded the Florida Women in Cybersecurity Affiliate and serves on its Board. She holds an M.S. and Ph.D. in Computer Science from Michigan State University.
Michael Prebil
Cybersecurity Workforce Analyst (NICE/NIST)
Mike Prebil | LinkedIn
Michael Prebil is a Cybersecurity Workforce Analyst for NICE at NIST, supporting the development, improvement, and implementation of the NICE Workforce Framework for Cybersecurity (NICE Framework).
Previously, he was a senior policy analyst at New America’s Center on Education & Labor, where he focused on issues related to apprenticeship, community colleges, and job quality. In that role, Michael studied credentialing and work-based learning programs and policies, and provided technical assistance for states and cities implementing career pathways across a variety of fields, including cybersecurity and IT. Michael received his undergraduate degree in history from McGill University, and a graduate certificate from the Johns Hopkins University School of Advanced International Studies. He has also studied mathematics and computer science at the Community College of Baltimore County, and continues to pursue further education in data science and cybersecurity.
Dr. Vincent Nestler
Associate Professor
Senior Personnel, NCyTE Center
vnestler@csusb.edu
Stephen Miller
NCyTE Co-Principal Investigator
Eastern New Mexico University - Ruidoso Branch Community College
Stephen Miller | LinkedIn
House Committee Hearing: Toward an AI-Ready Workforce Dr. Costis Toregas, Witness
NICE Framework Component Updates to the : https://www.nist.gov/news-events/news/2024/03/unveiling-nice-framework-components-v100-explore-latest-updates-today
NICE Framework Users Group: https://www.nist.gov/itl/applied-cybersecurity/nice/community/community-coordinating-council/nice-framework-users
NIST Trustworthy and Responsible AI Resource Center: https://airc.nist.gov/home
The Government Is Using AI to Better Serve the Public: https://ai.gov/ai-use-cases/
Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence: https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/
DoD Cyber Workforce Framework: https://public.cyber.mil/wf-element-sub/ai-data/
Top Generative AI Tools: https://www.eweek.com/artificial-intelligence/generative-ai-apps-tools/
National Cybersecurity Workforce Development Program, CyberSkills2Work: https://cyberskills2work.org/
Sunshine Cyber Conference: https://cyberflorida.org/sunshine/ (Dr. Eman El-Sheikh's panel on AI and Cybersecurity is on March 26, 10 am ET)
CLARK Curricular Repository: https://clark.center/
UWF Center for Cybersecurity: https://uwf.edu/cybersecurity
AI Trainer Toolkit
Harnessing the power of AI to build tomorrow’s cybersecurity workforce!
February 16, 2024 Virtual | 9 am PST
AI Trainer Toolkit | PowerPoint Slides | Recording
At this month's membership meeting, Courtney Dodge and Mary Downes discuss how Microsoft is harnessing AI to build tomorrow's workforce! Microsoft has developed a robust program to upskill the workforce including a trainer toolkit, learning modules, a blog, and resources for educators.
At the meeting, Courtney and Mary will give us a glimpse into Microsoft's current efforts to leverage AI, including a review of the AI Trainer Toolkit.
Courtney Hodge (She/Her)
As a program manager for inclusive learning at Microsoft, I leverage my instructional design skills and my passion for technology to create and deliver engaging and accessible learning experiences for educators and students. I have been working in this role for over three years, and I am constantly learning new ways to incorporate Microsoft 365, computer programming, and generative AI into my projects and programs.
Mary Downes (She/Her)
My professional mission revolves around democratizing education and breaking down barriers for learners. Currently, I collaborate with international teams to develop and manage digital skilling content and support programs for organizations worldwide. Drawing from my fourteen years of experience in the field of education, I find immense satisfaction in crafting inclusive learning experiences that transcend boundaries, ensuring accessibility and skilling for all.
Virtual Cybersecurity Career Challenge
January 19, 2024
Offer your students a real-world experience working in cybersecurity!
NCyTE is offering a ten-week Virtual Cybersecurity Career Challenge for college students. Over the ten-week course, students will work in teams of three to configure, operate, protect, and defend a network of machines. Students who complete the program earn a certificate and, more importantly, have tangible experience they can add to their resume.
Faculty from community colleges and universities are encouraged to attend this month's member meeting to learn how the challenge can increase a student's employability and satisfy an internship or other program requirements.
Vincent Nestler is the lead instructor and will cover the biggest challenges of the challenge and how students have overcome them. Also covered is the application process with time for Q & A.
Learning objectives
- Students will work in teams of three to successfully complete the following:
- Develop a project plan for an Information System that supports a fictitious business.
- Utilize project management tools for communication and project implementation.
- Operate a network of nine devices within the technical requirements specified.
- Defend their network against a penetration test.
- Analyze the network for any evidence of attacks or compromise resulting from penetration testing.
- Present their approach to operating the network and findings from the penetration test.
Student requirements
- Must have completed an introduction to networking class
- Must have completed a cybersecurity class
- Attend an information session:
- February12 or 13
- Complete Commitment Agreement by February 23
College credit - Students who are interested in earning internship or co-operative education credits by completing the CCC need to inquire with their institution. The CCC does not offer college credit. The CCC instructor, however, holds a similar role as an employer would in an internship. Students need to contact their program advisor at their institution to find out if the CCC will qualify and the process for earning credits.
SOC-in-a-Box
November 17, 2023
Recording | Presentation
How does a new Security Operations Center monitor and manage an organization's threat posture?
At this month's meeting our presenters covered SOC-in-the-Box concepts, operations, tech stacks, and financials.
SOC-in-a-Box solutions are designed to simplify the establishment of a SOC by providing a pre-configured set of hardware, software, and tools necessary for monitoring and analyzing an organization's security. These solutions often include security information and event management (SIEM) systems, threat intelligence feeds, log analysis tools, and more.
Instructors, students, curriculum developers, and IT security representatives should attend.
Meeting Info: When you register for the meeting, an automated response with a link to the meeting will be sent to your email. Check your junk mail if you don't receive an email within a few minutes of registering for the event.
Soc-in-a-Box Strategic Partnership Agreement
Soc-in-a-Box Mutual Non-Disclosure Agreement
Presenters
John Kunelius
Vice President/Chief Operating Officer
Norwich University Applied Research Institutes (NUARI)
jkuneliu@norwich.edu
John serves Norwich University Applied Research Institutes (NUARI), a non-profit research organization affiliated with the oldest Senior Military College in the US, Norwich University. John works remotely for NUARI and currently resides in South Central Minnesota.
John is the current NUARI Chief Operating Officer. During his time at NUARI he has been instrumental in onboarding large contracts, creating a sustainable organizational model, and NUARI’s overall growth, as well as assisting in the development of the NUARI strategic plan and task implementation. His areas of expertise are operations, finance, and staff development.
Caleb Paquette
Senior System Security Administrator
Norwich University Applied Research Institutes (NUARI)
cpaquet1@norwich.edu
Caleb Paquette is a seasoned expert in the field of cybersecurity and the Senior System Security Administrator at Norwich University Applied Research Institutes (NUARI). Caleb holds a Bachelor of Science in Information Technology from Vermont Technical College, where he graduated Magna Cum Laude.
With a strong educational background and a passion for information security, Caleb has made significant contributions to the field. He's known for his expertise in building Security Operations Centers (SOCs) and has been instrumental in establishing and implementing SOCs at various organizations throughout the United States.
Caleb's journey with NUARI began as an intern in 2019, and he quickly proved his worth, earning a full-time position in 2020. His dedication and innovative approach to security have helped NUARI thrive in the ever-evolving landscape of cybersecurity.
"NUARI provides cyber exercises, secure network monitoring, custom consulting, research, and education on critical national security issues." Visit their website at https://nuari.org/.
NCAE-C Student Code of Ethics and Professional Conduct Toolkit
October 20, 2023 | 9 - 10 am PST | Virtual Meeting
How do we instill the highest standards of integrity, honesty, trustworthiness, and professionalism in our cybersecurity students?The need for ethical cybersecurity professionals is great in our field. While there are several ethical codes of conduct and practices available, their applicability can vary depending on the industry or job role a student may enter.
The aim of the Student Code of Ethics and Professional Conduct and Toolkit is to make approachable, teachable, and applicable ethical standards in one’s professional life regardless of industry or institution.
We encourage educators, industry leaders, and students to attend.
Presenters: Kelli Burgin & Thomas Hill
Kelli Burgin, Assistant Professor of Cybersecurity, began teaching in the Cybersecurity program at Montreat College in January 2016. Prior to coming to Montreat, she was the IT coordinator at Audubon County Memorial Hospital in Audubon, Iowa, where she practiced Cybersecurity in the context of HIPAA compliance.
Thomas Hill, Assistant Professor of Cybersecurity at Montreat College, is an Alum of Montreat who worked as an adjunct for several years while completing his Master's Degree in Cybersecurity. He has also worked for a local government agency as an IT Security Analyst.
Additional Resources:
Montreat College Cybersecurity Oath
Clark Center Free Curriculum
Facilitator: Stephen D. Miller
Stephen serves as a Co-Principal Investigator for NCyTE and is the Department Chair of the Information Technology and Cyber Security Center of Excellence for Eastern New Mexico University (ENMU)-Ruidoso, where he is responsible for campus Information Technology (IT), IT personnel, Information Systems Curriculum, and teaching.
Accelerating Industrial Cybersecurity Workforce Development
September 15, 2023
Recording | Presentation
The INL (Idaho National Lab) is defending the critical infrastructure sectors. Watch the video to learn how you can join their efforts and use their services.
At this month's NCyTE meeting, Eleanor Taylor from the INL Cybercore Integration Center took us inside the world-class 80,000-square-foot research facility. With partnerships across critical infrastructure sectors, academia, and seasoned threat analysts, the INL has "developed comprehensive solutions to protect vital control systems from cyberthreats."
Eleanor's presentation provides a great insight to the INL, their initiatives, and how you can become more involved with their efforts.
Presenter:
Eleanor Taylor | Cybercore Program Manager
University & Workforce Development
Idaho National Laboratory | National Security
Eleanor.Taylor@inl.gov
Links:
Accelerating Cyber Workforce Development https://inl.gov/national-security-training/
Cyber Informed Engineering (CIE) Implementation Guide https://www.osti.gov/biblio/1995796
Critical Infrastructure Protection https://inl.gov/critical-infrastructure-protection/
ICS Community of Practice https://inl.gov/icscop/
Cyber Informed Engineering Working Groups www.inl.gov/cie/
Cyber Security Evaluation Tool (CSET®)
Friday, August 18, 2023
9 am PST
Learn how to deploy the Cyber Security Evaluation Tool (CSET®).
The Cyber Security Evaluation Tool (CSET®) is a stand-alone desktop application that guides asset owners and operators through a systematic process of evaluating Operational Technology and Information Technology. The Cyber Security Evaluation Tool (CSET®) provides the following:
- A framework for analyzing cybersecurity vulnerabilities associated with an organization’s overall industrial control system (ICS) and information technology (IT) architecture.
- A consistent and technically sound methodology to identify, analyze, and communicate to security professionals the various vulnerabilities and consequences that may be exploited by cyber means.
- The means for the user to document a process for identifying cybersecurity vulnerabilities.
- Suggested methods to evaluate options for improvement based on existing Standards and recommended practices.
Teachers, faculty, instructors, employers, and curriculum developers are encouraged to attend.
Presenter:
Stephen Miller, NCyTE Co-Principal Investigator, Eastern New Mexico University - Ruidoso Branch Community College
Clark Center Cybersecurity Curriculum Resources
July 21, 2023
9am PST
Looking for free cybersecurity curriculum to upgrade your course?
Join us to learn about the free cybersecurity curriculum available on CLARK. There are over 1,170 learning objects on the platform. The presenters will be giving a tour and demo of the platform.
CLARK is a platform for BUILDING and sharing free cybersecurity curriculum. CLARK hosts the largest compilation of high-value, high-impact CYBERSECURITY curriculum created by top researchers, peer-reviewed by instructional designers and subject matter experts. Instructors looking to teach new cybersecurity COURSES or expand and improve their own instruction can find ready-to-use modular content, including videos, labs, and slides that can be modified under the Creative Commons license.
Who should attend:
Faculty, teachers, instructors, and curriculum planners.
Presenters:
Sid Kaza skaza@towson.edu
Sidd Kaza is the Associate Provost for Research at Towson University. His interests lie in cybersecurity, data mining, and application development. He is a principal investigator on several cybersecurity projects, including the University's Cyber4All. He was on the ACM/IEEE/AIS/IFIP Joint Global Task Force on Cybersecurity Education that produced the first four-year cybersecurity curricular guidelines. Kaza is Co-Executive Director and Co-Founder of SecurEd, a not-for-profit startup organization focused on helping academic institutions build a cyber-ready workforce. One of SecurEd’s premier products is CLARK, which provides free cybersecurity curricula and resources across K-12.
Blair Taylor btaylor@towson.edu
Blair Taylor is the Director of the Center for Interdisciplinary and Innovation Cybersecurity (Cyber4All) at Towson University. She is a national expert in cybersecurity education and worked with NSA’s College of Cyber as a Subject Matter Expert on long-term strategies to increase the pipeline of qualified students and build the nation’s cyber workforce. Her projects include Security Injections @ Towson, which provides security modules for integrating security across the curriculum and is a national model for teaching secure coding to introductory programming students; CLARK, a library of over 1000 free cybersecurity curriculum resources, and SPLASH, which offers Secure Programming Logic for college credit to high school girls.
Paige Zaleppa paige.zaleppa@secured.team
Paige Zaleppa is the Director of Operations at SecurEd Inc. where she coordinates the software development and content curation processes for two cybersecurity education products. She has worked in cybersecurity education for 4 years as a software developer and product manager. Zaleppa is passionate about cyber education and is an adjunct professor at Towson University. She received her Bachelor’s in Information Systems and Master’s in Computer Science from Towson University.
Ready to Upgrade Your Classroom Lesson Plans?
MAX Power Collection
June 16, 2023
PowerPoint Slides | Meeting Recording
High school and college instructors, mark your calendars for the June NCyTE member meeting. In this one-hour virtual presentation, Chris Simpson will provide valuable insights into the Max Power collection - a free resource available at Clark Center that can prepare your students for cyber competitions. The Max Power micromodules are a collection of learning objects that guide students through the Blue Team Labs platform.
Looking for cybersecurity curricula? Clark Center has over 1,100 learning objects available for free. Discover the MAX Power collection and bring your questions to the presentation - Clark Center is an excellent resource for finding and sharing cybersecurity-related content.
Presenter: Christopher Simpson, csimpson@nu.edu
Chris is the Director of the National University Center for Cybersecurity and is the Co-Academic Program Director for the Master of Science in Cybersecurity program at the National University. He has developed innovative curricula and labs in ethical hacking, pentesting, and incident response.
Chris retired from the U.S. Navy in October 2009 after 27 years of service. He has extensive experience as an Information Assurance Manager, including a tour as the Information Assurance Manager (IAM) for the Commander, Combined Forces Command Afghanistan.
Mr. Simpson holds a Bachelor of Sciences degree in Computer and Information Science (CIS) from the University of Maryland and a Master of Science degree in Information Security and Assurance from George Mason University. His certifications include Computer and Information Systems Security Professional (CISSP), GIAC Penetration Tester (GPEN), GIAC Python Coder (GPYC), GIAC Certified Detection Analyst (GCDA), Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK), Navy Master Training Specialist and the KM Institute Certified Knowledge Manager.
Cybersecurity Apprenticeships
May 19, 2023 | 9:00 am PST | Virtual
Department of Labor Slide Deck | Recording
Apprenticeships prepare students for employment by offering real-world work experience with classroom instruction. They can be a great way for higher education institutions and employers to build a workforce pipeline. Implementation, however, can be challenging and there are many models across the nation.
At this meeting, NCyTE has invited representatives from the Department of Labor, Colleges, and Industry to share their experiences and offer recommendations for improving or starting an apprenticeship program.
Faculty, administrators, and employers are encouraged to attend.
Panelists:
Tobi West | Professor | Technology Department Chair at Coastline Community College
Coastline College Cybersecurity Center | twest20@coastline.edu
In addition to teaching and developing education pathways, she enjoys organizing outreach events such as CyberTech Girls and GenCyber camps to raise awareness about cybersecurity career pathways. Her passion is encouraging and empowering students to find their academic pathways and achieve their career goals. Ms. West is also a Ph.D. student at Dakota State University, studying in the Cyber Defense program.
Richard Braden | Managing Director of Technology Apprenticeships, Strategic Workforce Development CompTIA, Inc.
As the Managing Director of CompTIA Apprenticeship for Tech, Richard Braden enables people to improve their lives through employment in the IT industry. Braden has a passion for developing workforce partnerships and employment opportunities in IT on behalf of underserved communities. Braden joined CompTIA in March 2021. Prior to joining CompTIA, Braden was an executive leader for several leading companies within the software industrials, medical device, legal publishing, and pharmaceutical industries. Most recently, he was the global leader of training and education sales at Honeywell Building Technologies.
Rich is an Adjunct Faculty at the University of MN College of Education and volunteers his time as a job transition instructor for Grace Church in Eden Prairie, MN.
Braden earned his BS and M. Ed. degrees from the University of Minnesota and an MBA from Northern Illinois University. He is a trained Lean Sigma Expert from Honeywell. Braden and his wife Sharon have three adult children and reside in St. Paul, MN.
Kimberly Hauge | Business Liaison | US Department of Labor | Office of Apprenticeship
Kimberly Hauge is a business liaison for the U.S. Department of Labor Office of Apprenticeship. The Office of Apprenticeship promotes and oversees quality, accessible apprenticeship opportunities for workers seeking higher-skilled, higher-paying jobs and engages employers seeking to build a qualified, diverse, and inclusive workforce. In her current role, Kimberly also serves as a liaison for cybersecurity, IT and public service Registered Apprenticeship, and coordinates National Apprenticeship Week and other branding and awareness initiatives. Prior to her federal career, Kimberly was a senior policy analyst within the National Governors Association’s Center for Best Practices Economic Opportunity team.
Abigail Allen | Apprenticeship & Training Program Specialist | US Department of Labor | Office of Apprenticeship
Abigail Allen is an Apprenticeship and Training Program Specialist with the US Department of Labor Office of Apprenticeship in Region 6, based in San Diego California. She serves as a National Industry Liaison for Agriculture, Telecommunications, and IT/Cybersecurity and the DEIA representative for her region. She is also the main point of contact for apprenticeship in the Pacific Territories and her portfolio includes registered apprenticeship programs in a variety of industries located from Micronesia to Washington DC.
Panel Moderator:
Dr. Costis Toregas | Director | Cyber Security and Privacy Research Institute | The George Washington University
Dr. Costis Toregas is a consultant to the National Cybersecurity Training and Education Center where he is responsible for East Coast representation to academia, industry and government, and international program expansion. He is the Director of the Cyber Security and Privacy Research Institute at The George Washington University, where he manages and conducts education, research and service projects in cybersecurity and privacy. His current research interests include cybersecurity risk assessment and organizational strategies, the role of insurance in cyber risk management, the use of block chain in Disaster Risk Reduction, apprenticeships and exploring a fuller utilization of Community Colleges in cybersecurity work force strategies. He is a Director for the National Cyber League and Women in Cyber Security.
Autonomous & Semi-Autonomous Systems
April 21, 2023 | 9:00 am PST | Virtual
Recording | PowerPoint
The National Center of Autonomous Technologies (NCAT) will deliver a primer on autonomous systems, in multiple domains such as air, land and sea, and the critical role cybersecurity plays in their operations. With the speed of adoption of these systems, they are becoming ubiquitous in everyday life, for many of us. As we adopt more of this technology for uses such as package delivery, search and rescue, inspection and Advanced Air Mobility, safekeeping of the command-and-control links and the outputs produced becomes more and more of a priority.
Presenter Zack Nicklin | Zackary.nicklin@northlandcollege.edu
Unmanned Aerial Systems Program Manager, Northland Aerospace
Co-Principal Investigator, National Center for Autonomous Technologies (NCAT)
Northland Community and Technical College
Zackary Nicklin joined the US Army in 2003. He began his career as an Intelligence and Electronic Warfare Maintainer/Integrator and moved into the UAS space in 2005. His career has involved fielding and maintaining state-of-the-art intelligence collection and dissemination systems, both airborne and ground-based.
Zackary is currently the primary UAS instructor across Northland Community and Technical College’s UAS programs. He also serves as Co-Principal Investigator and Director of UAS for the National Center for Autonomous Technologies. He holds numerous industry-recognized certifications along with three Associate degrees, a Bachelor’s in Applied Engineering and a Master’s in Unmanned Systems. Zack co-wrote the FAA ASSURE A.5 UAS Maintenance, Modification, Repair, Inspection, Training, and Certification Considerations recommendations, contributes to ASTM standards regarding UAS maintenance and UAS technician qualifications and acts as a Drone Pro for the FAA Safety Team.
Cybersecurity Education Across Disciplines
Virtual | March 17, 2023 | 9am PST
PowerPoint | Send me CyAD Conference Info | Recording
How is cybersecurity impacting your discipline? What cybersecurity topics do you need to integrate into your curriculum? What do students need to know about cybersecurity in your discipline?
Attend this meeting to learn more about NCyTE's effort to expand cybersecurity education across disciplines, how you can contribute, and upcoming workshop opportunities.
An overview of the NCyTE CyAD (Cybersecurity Across Disciplines) Conference being held this summer will be covered. Current topics at the conference include:
- cybersecurity fundamentals
- critical aspects of cybersecurity in manufacturing/automation
- critical infrastructure
- business
- healthcare
- automotive operations
Who should attend? Faculty who are teaching cybersecurity and those who want to incorporate cybersecurity concepts and practices into their program discipline.
Presenter Corrinne Sande is the Executive Director/PI of the National CAE Candidates Center funded by the National Security Agency, and Executive Director/PI of the National Cybersecurity Training & Education Center (NCyTE), a National Science Foundation–funded Advanced Technological Education (ATE) regional center that works to grow and strengthen the nation’s cybersecurity workforce.
Satellites, Positioning, Data Acquisition, GNSS vs GPS, and Potential Security Vulnerabilities
February 17, 2023
9:00 am PST
Virtual
Data pathways will be explored concerning geospatial technologies and the requirements between open-source data, information security, and geospatial ethics.
As technologies are developed for autonomous transportation, it is critically important that the positional location data is kept secure. Typically through the use of the Global Navigation Satellite System (GNSS), often referred to as Global Position System (GPS), as well as ground-based transponders.
Positional awareness through the use of location data, as well as open-source services such as Open Street Map (OSM) will be discussed.
Anyone interested in positional data security and learning how information is collected and displayed.
Presenter: Vincent DiNoto Jr.
Director of the National Geospatial Technology Center of Excellence (GeoTech Center)Co-PI of the National Center of Autonomous Technology
Professor of Physics, Astronomy, and Geospatial Technology
Dean of College and Systemic Technology
Degrees from Indiana State University in Terre Haute, IN, Physics.
Virtual Cybersecurity Career Challenge
January 20, 2023
9 am PST
Offer your students a real-world experience working in cybersecurity!
NCyTE is holding a ten-week Virtual Cybersecurity Career Challenge (CCC) for college students. Students will work in teams to configure, operate, protect, and defend a network of machines.
Faculty from community colleges and universities are encouraged to attend this month's member meeting to learn about the CCC. Vincent Nestler led last year's CCC and will do so again this spring. He will cover what students will accomplish in the workshop, share student success stories from last spring, and provide updates on what students can expect in the upcoming CCC.
Cyber Career Challenge Student Schedule
- April 10 - Workshop begins: Introduction to program work roles
- April 17 - Introduction to the network requirements and team selection
- April 24 - Network admin basics, Kanban, Gantt charts, Visio diagrams
- May 1 to June 5 - Teams work independently and receive guidance on network management and pentest prep
- June 12 - Pentest
- June 15 - Team presentations
- September 15 (Optional) Virtual Career Fair
Learning objectives
- Students will work in teams of three to successfully complete the following:
- Develop a project plan for an Information System that supports a fictitious business.
- Utilize project management tools for communication and project implementation.
- Operate a network of nine devices within the technical requirements specified.
- Defend their network against a penetration test.
- Analyze the network for any evidence of attacks or compromise resulting from penetration testing.
- Present their approach to operating the network and findings from the penetration test.
Student requirements
- Must have completed an introduction to networking class
- Must have completed a cybersecurity class
- Attend an information session:
- February 21st, 22nd, or 23rd
- Complete Commitment Agreement by March 2nd
College credit - Students who are interested in earning internship or co-operative education credits by completing the CCC need to inquire with their institution. The CCC does not offer college credit. The CCC instructor, however, holds a similar role as an employer would in an internship. Students need to contact their program advisor at their institution to find out if the CCC will qualify and the process for earning credits.
Presenter:
Vincent Nestler
Associate Professor
Senior Personnel, NCyTE Center
Meeting Recording on NCyTE Center YouTube Channel.
Centers of Excellence (CAE) Overview
Higher education institutions seeking to earn the Centers of Academic Excellence designation would be interested in watching the recording and downloading the materials from this meeting. You will learn about the requirements, timeline and common pitfalls. You will gain a better understanding for taking your next steps toward earning the CAE at your institution.
Since 1999, the Centers of Academic Excellence (CAE) in Cybersecurity program has benefited thousands of students, faculty, employers and higher education institutions across the United States. Speakers from NCyTE and the CAE Candidates National Center (CCNC) covered the CAE program's evolution, impact, quality of standards, program types, and some of the opportunities presented to colleges and universities with the CAE designation.
Speakers:
Corrinne Sande, NCyTE Principal Investigator and Director
Stephen Troupe, CAE Candidates National Center (CCNC) Associate Director
November Membership Meeting Recording
Cybersecurity Infrastructure Security Agency (CISA) & skillsgapp
CISA Speaker: Anastacia "Staci" Webster from the Office of the Chief Learning Officer will discuss CISA’s efforts to protect the federal ".gov" domain of civilian government networks and collaborate with the private sector - the ".com" domain - to increase the security of critical networks, and the CISA Community College hiring initiative - Student & Recent Graduate Programs.
Ms. Webster joined the Cybersecurity and Infrastructure Security Agency (CISA) in July of 2020 and currently serves as the Academic Programs Lead for the Academic Partnerships and Outreach (APO) sub-division within the Office of the Chief Learning Officer (OCLO) within CISA. She oversees the CyberCorps®: Scholarship for Service (SFS) and National Centers of Academic Excellence in Cybersecurity (NCAE-C) programs.
22.10.21_CISA slides
skillsgapp speakers: Co-Founders Tina Zwolinski and Cynthia Jenkins will share “Cyber Watchdog” - a geo-location-based mobile game deployed in San Bernardino County, CA. The game is designed to provide middle and high school-aged youth+ - specifically in under-resourced communities - awareness of and proficiencies in careers related to Cybersecurity/IT, and the regionally-specific pathways.
Players can “try on” different cyber careers in non-threatening environments and see themselves in the jobs as the avatar selection supports DEI. And the real game changer, schools or industry can recruit players for programs and jobs.
22.10.21_skillsgapp slides
American Indian Science & Engineering Society (AISES)
Stacy Thacker, Engagement Officer with AISES, shared the history of AISES and the services and initiatives it offers to students, industry and educators— including diversity promotion, job fairs, and the 2022 AISES National Conference on October 6-8, 2022, in Palm Springs, CA.
Who should attend: Everyone will find something of value in this presentation. AISES has seven regions that span Canada and the US and programs for PK-12, college/university, and professionals.
22.09.23 AISES Presentation Slides
MEMBERSHIP » Membership Information