Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.

Size: px
Start display at page:

Download "Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community."

Transcription

1 US Cyber Challenge To view the complete article, please go to Part of the: Technology and Public Policy Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community. The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cyber security practitioners, researchers, and warriors. Some will become the top guns in cyber security. The program will nurture and develop their skills, give them access to advanced education and exercises, and where appropriate, enable them to be recognized by colleges and employers where their skills can be of the greatest value to the nation. Select the Competition That Interests You CyberPatriot Defense Competition An Air Force Association national high school cyber defense competition DC3 Digital Forensics Challenge

2 A Department of Defense Cyber Crime Center competition focusing on cyber investigation and forensics Netwars Capture-the-Flag Competition A SANS Institute challenge testing mastery of vulnerabilities Cyberspace Policy Review Document from the White House ).pdf Frequently Asked Questions 1. Why is this competition important to the nation? The US Cyber Challenge is a national talent search and skills development program. Its purpose is to identify 10,000 young Americans with the interests and technical computer skills to fill the ranks of cyber security practitioners, researchers, and warriors. In particular, the search is looking for the people who can become the top guns in cyber security. The identification process relies on national competitions Ð with many winners. They include CyberPatriot high school competition conducted by the Air Force Association, the DC3 Digital Forensics Challenge conducted by the US Department of Defense Cyber Crime Center, and the NetWars vulnerability identification competition conducted by the SANS Institute.

3 2. What if I don't live in the United States? If you live outside the US, you may still enter two of the competitions. However, you will not be invited to participate in the post-competition skills development programs. Several European nations are establishing parallel competitions. 3. Where do I learn about the competitions and sign up? CyberPatriot DC3 Digital Forensics Challenge SANS Network Attack Competition 4. When do the competitions start? They have already begun. For registration information, visit their web sites. 5. Which of the three competitions should I enter? Download this USCC competition table for more information. 6. Is this an individual or team competition? All three competitions allow teams to compete. Two competitions (Digital Forensics Challenge and NetWars) may also be entered by individuals. 7. If a team, may I form my own team? And do I need a mentor? You may form your own team. CyberPatriot requires mentors. The other two competitions do not. CyberPatriot teams must be supported by the AFJROTC or CAP unit associated with their high school, and each team is required to have a team advisor designated by their unit. 8. May I enter more than one? Yes.

4 9. Will the competition/ test be given in our area/region? These competitions were selected for the US Cyber Challenge because they are online and allow people to participate from any part of the nation. CyberPatriot finals are held in Florida. Eight teams are flown to Florida in February, all expenses paid, to compete in the finals. 10. Is there an entrance fee? No entrance fees are required at this time to participate in any of the competitions. 11. What are the benefits I can expect if I do well? Promising candidates will be recognized and their local papers will be told of their success. In addition, they will be invited to attend regional "cyber camps" to be held at local colleges, where they will develop their skills more fully and participate in additional competitions. (The cyber camps are expected to begin in 2010 and may not be available in all parts of the country.) Candidates who rise to the top in these regional programs will be invited to participate in live national challenges like those coordinated by the University of Texas at San Antonio and NYU Polytechnic. Greatly promising candidates from these programs will have a real leg up in competitions for scholarships to study advanced cyber security programs at professional development programs like those run by the SANS Institute or at colleges and graduate programs at participating schools. Finally, the best of the candidates will be introduced to key federal agencies and corporations where the most advanced cyber security work is being done. Although no promises of employment can be made, these organizations are facing extreme shortages of security experts with extraordinary, hands-on technical skills, and these organizations are assisting in the design and operation of the US Cyber Challenge because they look forward to finding additional candidates for their most challenging assignments. 12. How can I promote this competition?

5 You can download a printable PDF poster for the US Cyber Challenge here. Please send your additional questions about the cyber challenge and/or any of the three competitions to

US Cyber Challenge: Finding the people who canwin in cyberspace? Alan Paller Director of Research, SANS Institute apaller@sans.org

US Cyber Challenge: Finding the people who canwin in cyberspace? Alan Paller Director of Research, SANS Institute apaller@sans.org U Cyber Challenge: Finding the people who canwin in cyberspace? Alan Paller Director of Research, AN Institute apaller@sans.org Gen. Alexander speaking at CI in June, 2010 One of our greatest challenges

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Center for Infrastructure Assurance and Security

Center for Infrastructure Assurance and Security Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training

More information

Securing Networks, Securing Futures

Securing Networks, Securing Futures CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition

Air Force Association s CyberPatriot The National High School Cyber Defense Competition Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education

More information

Innovation, Partnership, Development

Innovation, Partnership, Development Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

VetSuccess. Top employers providing America s veterans with careers in cybersecurity VetSuccess Top employers providing America s veterans with careers in cybersecurity According to the U.S. Department of Labor, about 1.5 million members of our armed services will leave the military over

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014 Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber

More information

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Re-Imagining the Cyber Warrior of the Future

Re-Imagining the Cyber Warrior of the Future CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

The Collegiate Cybersecurity Championship Cup. Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013

The Collegiate Cybersecurity Championship Cup. Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013 The Collegiate Cybersecurity Championship Cup Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013 Why Conduct Cyber Security Competitions? Raise the level of

More information

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Year: 2013 Final Copy of Case Study Status: Laureate Organization Name: Cyber Defence Challenge Organization

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA

More information

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK Talented People to Secure Our Future Judy Baker, Director Cyber Security Challenge UK A story Starts in the US, Comes to the UK Outcome: more and better cyber security talent in US and UK businesses The

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN. Information Security & Assurance. Online

Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN. Information Security & Assurance. Online Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN Information Security & Assurance Online Program Overview Program Mission The Master of Science in Information Security & Assurance

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about

More information

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Contestant Requirements:

Contestant Requirements: 2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program

Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program July 14-18, 2014 Computer Science Department Texas Tech University Welcome To Texas Tech University

More information

DIGITAL FORENSICS CONSORTIUM

DIGITAL FORENSICS CONSORTIUM DIGITAL FORENSICS CONSORTIUM CYBERHUNTING COMPETITIONS Focusing on the Critical Skills and Innovative Approach to Effectively Characterize the Digital Environment Nevin Taylor DFC President/CEO The President

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

Northrop Grumman. Foundation. Annual Report

Northrop Grumman. Foundation. Annual Report 2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.

More information

Ccybersecurity Education

Ccybersecurity Education Ccybersecurity Education The Obstacle and Challenges Panel Discussion Summer Workshop on Cyber Security Education for Community College Faculty in West Texas Texas Tech University August 13, 2013 COMPUTER

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

Background (2011-2013)

Background (2011-2013) 2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches and Mentors Meetings August 18, 2014 - Meeting Timeline Highlights Coach and Mentor of the Year Rules

More information

2006-1998: COMPUTER SECURITY SUMMER CAMP FOR HIGH SCHOOL STUDENTS

2006-1998: COMPUTER SECURITY SUMMER CAMP FOR HIGH SCHOOL STUDENTS 2006-1998: COMPUTER SECURITY SUMMER CAMP FOR HIGH SCHOOL STUDENTS Douglas Jacobson, Iowa State University Dr. Doug Jacobson Associate Professor Department of Electrical and Computer Engineering Iowa State

More information

Housekeeping. Twitter: #ACMWebinarSec

Housekeeping. Twitter: #ACMWebinarSec Housekeeping Twitter: #ACMWebinarSec Welcome to today s ACM Webinar. The presentation starts at the top of the hour. If you are experiencing any problems/issues, refresh your console by pressing the F5

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

CAE2Y Program Established First 6 CAE2Y Colleges. Mentors Program Established Additional 7 Colleges

CAE2Y Program Established First 6 CAE2Y Colleges. Mentors Program Established Additional 7 Colleges 2010 2011 2012 2013 CAE2Y Program Established First 6 CAE2Y Colleges Mentors Program Established Additional 7 Colleges Network Strengthens, Newsletter Additional 12 Colleges Changes in the process Additional

More information

Master of Cyber Security

Master of Cyber Security Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

NYU Reynolds / D-Prize Social Venture Competition. Spring 2015. First Round Application Packet

NYU Reynolds / D-Prize Social Venture Competition. Spring 2015. First Round Application Packet NYU Reynolds / D-Prize Social Venture Competition Spring 2015 First Round Application Packet This is the first round application packet for the Spring 2015 NYU Reynolds / D-Prize Social Venture Competition.

More information

Addendum 2014-2015 Graduate Catalog DOCTOR OF PHILOSOPHY (PH.D.) IN SPORT MANAGEMENT

Addendum 2014-2015 Graduate Catalog DOCTOR OF PHILOSOPHY (PH.D.) IN SPORT MANAGEMENT Addendum 2014-2015 Graduate Catalog DOCTOR OF PHILOSOPHY (PH.D.) IN SPORT MANAGEMENT NOTE: All applicants to the inaugural class of August 2015 must meet the program requirements listed in the Addendum

More information

Huntsville Community. SAIC s K-12 STEM Involvement

Huntsville Community. SAIC s K-12 STEM Involvement Testimony of Mr. Andrew J. Partynski, Congressional Field Hearing on STEM Education in Action Committee of Science Space & Technology Subcommittee on Research & Science Education April 30, 2012 Good morning

More information

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012 Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership kabarton@ollusa.edu Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern

More information

Microsoft DreamSpark (MSDN) User Guide

Microsoft DreamSpark (MSDN) User Guide AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM Microsoft DreamSpark (MSDN) User Guide www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Building the Next Generation of Cyber Defenders

Building the Next Generation of Cyber Defenders Building the Next Generation of Cyber Defenders Tapping into the League of Wounded Warriors to help Protect and Defend the Nation s Information Systems Sam Maroon Jim Wiggins Speaker Introduction Mr. Sam

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions General Questions What is the SANS Technology Institute? What degrees are offered by the SANS Technology Institute? What is the SANS Institute? Is the SANS Technology Institute

More information

Manned Information Security

Manned Information Security Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

DoD Cyber Crime Center DC3. AFCEA Luncheon

DoD Cyber Crime Center DC3. AFCEA Luncheon DoD Cyber Crime Center DC3 AFCEA Luncheon Jim Christy, Special Agent (Ret), HQE Director, Futures Exploration 15 November 2012 Definition What is the Definition of Cyber? Slide 1 Slide 2 Cyber Cyber is

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

Financial Planning Challenge 2012

Financial Planning Challenge 2012 Financial Planning Challenge 2012 Presented by: Ameriprise Financial, Founding Corporate Partner, Certified Financial Board of Standards, Inc. and Financial Planning Association OVERVIEW The Financial

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

National Cybersecurity Awareness Campaign

National Cybersecurity Awareness Campaign National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing

More information

Preparing Millennials to Lead in Cyberspace

Preparing Millennials to Lead in Cyberspace Preparing Millennials to Lead in Cyberspace A Raytheon-commissioned study of attitudes, behaviors and career aspirations among young American adults online Overview Today s Highly Connected and networked

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

2015 Councils & Committees

2015 Councils & Committees 2015 Councils & Committees Business Success Advocacy Community Advancement WorkforceMilitary Development Find your passion. Propel business success. Joining a committee is an excellent way to contribute

More information

2016 BOMA SAN DIEGO MEMBERSHIP SCHOLARSHIP APPLICATION

2016 BOMA SAN DIEGO MEMBERSHIP SCHOLARSHIP APPLICATION PURPOSE 2016 BOMA SAN DIEGO MEMBERSHIP SCHOLARSHIP APPLICATION To encourage potential Principal Members whose companies do not pay for their BOMA memberships to become active members of BOMA. ELIGIBILITY

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

Define & Assess Skills - Smart Grid Security Specialists

Define & Assess Skills - Smart Grid Security Specialists Define & Assess Skills - Smart Grid Security Specialists SANS 2011 North American SCADA & Process Control Summit Michael Assante President & CEO NBISE michae.assante@nbise.org 208-557-8026 Cyber Security:

More information

KEEP MOVING FORWARD NATIONAL UNIVERSITY ASSOCIATE S, BACHELOR S, & MASTER S DEGREES CERTIFICATES CREDENTIALS 800.NAT.UNIV GETINFO.NU.

KEEP MOVING FORWARD NATIONAL UNIVERSITY ASSOCIATE S, BACHELOR S, & MASTER S DEGREES CERTIFICATES CREDENTIALS 800.NAT.UNIV GETINFO.NU. NATIONAL UNIVERSITY KEEP MOVING FORWARD ASSOCIATE S, BACHELOR S, & MASTER S DEGREES CERTIFICATES CREDENTIALS TM THE UNIVERSITY OF VALUES 800.NAT.UNIV GETINFO.NU.EDU/TRANSFER YOUR #1 CHOICE National University

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

2015 CyberPatriot Conference

2015 CyberPatriot Conference Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry OPENING REMARKS BY DR YAACOB IBRAHIM, MINISTER FOR COMMUNICATIONS AND INFORMATION AND MINISTER IN CHARGE OF CYBER SECURITY AT THE OPENING CEREMONY OF TEMASEK POLYTECHNIC S IT SECURITY AND FORENSICS HUB,

More information

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif Cloud Resilient Architecture (CRA) -Design and Analysis Glynis Dsouza Hamid Alipour Salim Hariri Youssif-Al-Nashif NSF Center for Autonomic Computing University of Arizona Mohamed Eltoweissy Pacific National

More information

Exploring a National Cyber Security Exercise for Community Colleges

Exploring a National Cyber Security Exercise for Community Colleges Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

2 0 0 7 Sponsorship Packet On behalf of The Center for Infrastructure Assurance and Security (CIAS) I would like to invite you to participate through sponsorship at our second National Collegiate Cyber

More information

Becoming a Cyber Professional: A Discussion with Recent Graduates

Becoming a Cyber Professional: A Discussion with Recent Graduates Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

National Rankings AND RECOGNITION. Bloomberg Businessweek. Princeton Review. Hispanic Business. Since 2007 inaugural rankings.

National Rankings AND RECOGNITION. Bloomberg Businessweek. Princeton Review. Hispanic Business. Since 2007 inaugural rankings. MASTER S PROGRAMS National Rankings AND RECOGNITION g Top 100 for Part-time MBA Program Bloomberg Businessweek Since 2007 inaugural rankings g Top 10 MBA Program for Minorities Princeton Review Since 2006

More information

Rules/Restrictions for Scholarship Applications:

Rules/Restrictions for Scholarship Applications: Alamo Area Paralegal Association, Inc. is accepting scholarship applications from May 1 thru June 2, 2015. Up to three educational grants may be awarded at the June 2015 AAPA CLE luncheon; one in each

More information

International master s scholarship program of Université Paris-Saclay Academic year 2016-2017

International master s scholarship program of Université Paris-Saclay Academic year 2016-2017 International master s scholarship program of Université Paris-Saclay Academic year 2016-2017 The selection process Application for the scholarship program I received an admission letter to the master

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

Protection of Essential Infrastructure and Services

Protection of Essential Infrastructure and Services Protection of Essential Infrastructure and Services NOR AZUWA MUHAMAD PAHRI CONSULTANT, MIMOS CONSULTING GROUP, MIMOS BERHAD azuwa@mimos.my Table of Content Introduction Reality of Cyber Attack Cyber Issues

More information

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap FOR IMMEDIATE RELEASE National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap Closing the Cyber Talent Gap and Educating the Workforce of the Future

More information

CyberPatriot Program Update April 2015

CyberPatriot Program Update April 2015 AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information