Exploring a National Cyber Security Exercise for Community Colleges
|
|
|
- Amos Sherman
- 10 years ago
- Views:
Transcription
1 Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland
2 :: CyberWatch :: Current Cyber Exercise Landscape :: CCDC :: Mid-Atlantic CCDC :: Cyber Skills Exercise Two-Year (CSX2Y) :: Pilot :: Next Steps :: Q&A
3 :: What is CyberWatch NSF/ATE-funded Regional Center: CW I: over $3 million for 4 years CW II (continuation grant): over $2 million for 3 years Includes two- and four-year schools, private businesses, and government organizations
4 :: What is CyberWatch (con t) Mission: improve the quantity and quality of the Information Assurance workforce - nationally
5 :: What is CyberWatch (con t) Curriculum and faculty development K-12 initiatives Dissemination and outreach Internships, scholarships, career placements
6 :: What is CyberWatch (con t) Articulation models Virtual Labs Job fairs Student competitions
7 :: Current Cyber Exercise Landscape World Skills Cisco: NetRiders Tiger Net Challenge Iowa State University Cyber Defense Competition
8 :: Current Cyber Exercise Landscape (con t) US Cyber Challenge (USCC): US Cyber Patriot DC3 Digital Forensics Challenge SANS NetWars
9 :: Current Cyber Exercise Landscape (con t) Cyber Defense Exercise (CDX): Military academies
10 :: Current CE Landscape (con t) Various CTFs: USCC UCSB Int l DefCon Collegiate Cyber Defense Competition (CCDC)
11 :: CCDC 6th year Hub and spoke model: 9 regions (hoping to expand to 10) Defense-only Scoring: services, SLAs, Red Team, injects National CCDC: UTSA
12 :: Mid-Atlantic CCDC 6th year Qualifying/regional model Virtual & face-to-face competitions Complex infrastructure (e.g., VoIP/GSM integration, SCADA-lite, IPv6)
13 :: Mid-Atlantic CCDC (con t) Public/private partnership: CCBC and isight Partners formerly White Wolf Security Law enforcement component
14 :: Mid-Atlantic CCDC (con t) Human element: CEO/City Manager Insider threat/se
15 :: Mid-Atlantic CCDC (con t) Corporate sponsorship: Boeing CSC Northrop Grumman SAIC Solera Networks Tenable Network Security
16 :: Cyber Skills Exercise Two-Year (CSX2Y) Ultimate goals: Get students psyched about IA Create a pool of talent to meet national demand Provide an educational experience first; gaming exercise second
17 :: CSX2Y (con t) Ultimate goals (con t): Provide a way for schools to assess the effectiveness of their curricula Create a spectator-friendly sport (e.g., ESPN, Cyber Security League)
18
19 :: CSX2Y (con t) Rules: Eligibility requirements that favor CC students Rotating Rules committee Division model
20 :: CSX2Y (con t) Scoring: Service availability Flags captured SLAs Red Team Scenarios 3 Vs: visual, visual, visual
21 :: CSX2Y (con t) Competition Models: Virtual Face-to-face Blended virtual/f2f CTF
22 :: CSX2Y (con t) Competition Models (con t): Defense-only Offense Blended defense/offense Quiz Bowl
23 :: CSX2Y (con t) Competition Models (con t): Incident response Engineering and implementation
24 :: CSX2Y (con t) Preparation: Prep guide Cyber Security Clubs Part of curriculum Pickup-games (virtual) Weekly exercises mapped to skills (virtual)
25 :: CSX2Y (con t) Sustainability: Entrance fees Grants (NSF supplemental grant) Corporate sponsorship Product placement
26 :: CSX2Y (con t) Sustainability (con t): Advertisements Scholarships Ties into Marketing spoke
27 :: CSX2Y (con t) Marketing: National Cyber Security Student Association (in the works) Conferences Student Clubs at CCs Word-of-mouth NSF/ATE centers
28 :: CSX2Y (con t) Marketing (con t): Sponsors Press Releases Social networking Micro-site
29 :: CSX2Y (con t) Recruiting: Corporations Government Academia
30 :: CSX2Y (con t) Curriculum: Provides a way to measure the effectiveness of curriculum New module development Ties into Evaluation spoke
31 :: CSX2Y (con t) Products & Services: Products: Vendors beta-testing their solutions Vendors products integrated into competition (e.g., Solera, Tenable, Core) Ties into Curriculum, Evaluation, Marketing, Sustainability spokes
32 :: CSX2Y (con t) Products & Services (con t): Services: Lab environment setup Curriculum development Faculty development Ties into Marketing, Sustainability spokes
33 :: CSX2Y (con t) Research: Use infrastructure as data collection engine Distribute data to academia/gov t for free Distribute data to commercial organizations for fee (e.g., JHU APL)
34 :: CSX2Y (con t) Research (con t): Ties into Marketing, Product, Sustainability spokes
35 :: CSX2Y (con t) Evaluation: Scenario development tied to external standards (e.g., industry best practices, ISC 2 CBK, CNSS 40xx) Effectiveness: Curriculum Competitions Skills
36 :: Pilot 09/18/10: Center for Systems Security and Information Assurance (CSSIA) Cal Poly Pomona CyberWatch Center Virtual
37 :: Pilot (con t) Competition model TBD (most likely CTFbased with Red Team) Stress-test virtual infrastructure Write-up/disseminate lessons learned
38 :: Next Steps Recruit CCs Develop Cyber Security League (CSL) Create a competition schedule Create desired skills matrix Create scenarios based on skills matrix
39 :: Next Steps (con t) Incorporate Quiz Bowl, engineering, and implementation aspects Combine virtual competitions w/face-toface-based exercises: Helps reduce structural and resourcerelated costs as well as entry costs
40 :: Next Steps (con t) Explore 24-hour competitions Explore offensive component: Develop student Red Teams Encourage law enforcement participation (e.g., Secret Service) Continue to work on the spectator aspects
41 :: Next Steps (con t) Formalize sponsorship structure Continue to capture lessons learned Present findings at various conferences
42 :: Q&A :: :: The CyberWatch Center is funded by the:
2015 Webinar Series: NCL for the Classroom
2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development Corby Hovis [email protected] Directorate for Education and Human Resources National Science Foundation
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course Art Conklin Center for Infrastructure Assurance and Security The University of Texas at
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum. 2014 3CS Palos Hills, IL
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum 2014 3CS Palos Hills, IL Discussion What is the NCL? Partnerships Features Enrichment & Assessment Preparation for Certifications
Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
NSF S-STEM Grant #0728539. PI: Dr Robert R Klepper Professor of Chemistry Iowa Lakes Community College Estherville, IA 51334 rrklepper@iowalakes.
Infinity Scholars NSF S-STEM Grant #0728539 PI: Dr Robert R Klepper Professor of Chemistry Iowa Lakes Community College Estherville, IA 51334 [email protected] Program description: This comprehensive
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Innovation, Partnership, Development
Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College [email protected]
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cybersecurity Education Doesn t Always Take Place in the Classroom
Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014
REVISING AND RECRUITING: REACHING OUT TO THE EARLY EDUCATION WORKFORCE. Anne McLaughlin Danielle Holland Community College of Baltimore County
REVISING AND RECRUITING: REACHING OUT TO THE EARLY EDUCATION WORKFORCE Anne McLaughlin Danielle Holland Community College of Baltimore County Our Goals Offer the best program possible for current and future
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
The Collegiate Cybersecurity Championship Cup. Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013
The Collegiate Cybersecurity Championship Cup Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013 Why Conduct Cyber Security Competitions? Raise the level of
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
CALIFORNIA PARTNERSHIP ACADEMY. Career Pathway Academy. Information Technology Academy Irvington High School Fremont, CA
CALIFORNIA PARTNERSHIP ACADEMY Career Pathway Academy Information Technology Academy Irvington High School Fremont, CA Presenter: Mr. Hector Albizo [email protected] Website: Irvington.org/halbizo
Information Assurance Program at West Point
Information Assurance Program at West Point [email protected] John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security
Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Thomas R. Imboden [email protected] Nancy L. Martin [email protected] Belle S. Woodward [email protected]
SANS CyberTalent VetSuccess Immersion Academy. VetSuccess
SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Dr. James R. Lumpkin, Dean
EXECUTIVE SUMMARY College of Business Louisiana Tech University Dr. James R. Lumpkin, Dean EXECUTIVE SUMMARY Overview Louisiana Tech University The Industrial Institute and College of Louisiana was founded
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
Cover/Signature Page Full Template
Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &
Security Education for the new Generation
Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 AM @ WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol
ACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian
C.A.R.E. Program College Access and Readiness for Everyone
C.A.R.E. Program College Access and Readiness for Everyone Creating Pathways for all D.C. Students Overview of C.A.R.E. Dual Enrollment Student Success Experience Recruitment through Enrollment Review
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Additional Educational Opportunities
Additional Educational Opportunities WSU Nursing @ WWCC 509.524.5152 - Walla Walla WSU offers Bachelors and Masters Degrees in Nursing on-site at WWCC. The program courses are in various modalities including
How To Get To College
Guidelines for High School Students How To Get To College A Guide to Preparing for the California State University Sponsored by: The California State University and the Boeing Company What Classes Should
A Model for Integrating Data Science with the Liberal Arts: Responding to Workforce Demands
A Model for Integrating Data Science with the Liberal Arts: Responding to Workforce Demands Brian Fitzgerald, CEO January 6, 2016 2015 BHEF About the Business Higher Education Forum The Business Higher
Cybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
ARTICULATION AGREEMENT. Community College of Baltimore County Associate of Applied Science Degree Internet and MultiMedia Technology, SDE
ARTICULATION AGREEMENT Community College of Baltimore County Associate of Applied Science Degree Internet and MultiMedia Technology, SDE Bachelor of Technical or Professional Studies Simulation and Digital
S 2 ERC @ Virginia Tech Program Overview
S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc
Lakeland Community College Campus Completion Plan
Lakeland Community College Campus Plan Narrative Overview Lakeland Community College opened its doors in 1967 as the first college in Ohio established by a vote of local citizens committed to providing
School & Program Guide. A Family Centered Public Cyber Charter School
School & Program Guide A Family Centered Public Cyber Charter School 1 ccaeducate.me CCA: A Family Service Organization With An Expertise In Education Each and every child can learn, and Commonwealth Charter
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
ADVANCED STEM EDUCATION. In Baltimore City Public Schools
ADVANCED STEM EDUCATION In Baltimore City Public Schools INTRODUCTION Dear Parents and Students, We are pleased to tell you about an extraordinary academic opportunity available to Baltimore City students
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
Eastern Wyoming College
Eastern Wyoming College Instructional Program Review 2011-2012 Program: Criminal Justice Associate of Arts Associate of Applied Science Certificate--Corrections Prepared by: Larry Curtis, Instructor &
4. College of Business
The University of Texas at San Antonio 1 4. College of Business Mission Statement The College of Business is dedicated to creating and sharing knowledge that enhances the translation of theory to practice.
Strategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
Implementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
