An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Size: px
Start display at page:

Download "An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015"

Transcription

1 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015

2 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit focused on developing Programs and tools to identify, assess, train, and manage cybersecurity human capital. David joined SANS in Prior to SANS David served in senior management roles in medical research, financial services and Higher education. Arlin Halstead, Vice President of Human Resources at Solutionary, Inc. He joined Solutionary in 2009 with over 20 years experience in Human Resource Management and consulting. Prior to joining Solutionary he led HR organizations within the finance, insurance and retail industries and started an HR Consulting company focused on helping start-up companies develop HR programs and practices. John Nix, Director of Federal Business at the SANS Institute, the business unit focused on enabling our National Cybersecurity Workforce and Cyber Mission Force to excel at their cybersecurity missions through world-class assessment, training, certification and continuing education. John joined SANS in June Prior to SANS John held senior leadership roles with several major defense contractors following his 2002 retirement from US Army Special Operations Command. Donny Greene, Cybersecurity Analyst at RBR Technologies, Inc. Donny recently graduated from the SANS VetSuccess Academy, where he earned three GIAC certifications during an intensive four month training program as he transitioned out of military service. He served in the United States Air Force for 23+ years, earning the rank of Senior Master Sergeant. He has 20 years of diverse IT experience, with 11 different certifications and two degrees from the Community College of the Air Force.

3 Agenda Overview of the VetSuccess Immersion Academy & Pilot Veteran perspective Employer perspective Questions

4 Our Hypothesis Transitioning veterans with high technical aptitude are an untapped source of talent We can train, certify, and connect veterans with great jobs quickly & at no cost to the veterans 4

5 Value Proposition Benefits For Veterans Benefits For Employers 100% scholarship Hands-on learning & technical skill-building Expert faculty with teaching and workplace experience Access to employers committed to veterans Pre-screened, qualified candidates Trained and certified graduates Immediate, positive impact on cyber workforce needs Support America s veterans 5

6 How It Works TRAIN & CERTIFY Demonstrate aptitude and skills via SANS CyberTalent Assessment and interviews with SANS staff and academy sponsors. Off Ramps: Individuals who are not selected receive guidance re: other training available to prepare for cybersecurity careers. Develop practical, hands-on skills by completing SANS training courses and associated GIAC certifications. 2 course/2 certification or 3 course/3 certification Mentors & Online Labs Participants are connected to multiple employment opportunities. 2-4 Months 6

7 Connecting Graduates to Employers HOW WHO 2/year; 15 employers/event; hundreds of positions 5,000 job seeker database available to SANS clients SANS clients & database 120,000 subscribers, representing thousands of cybersecurity employers 7

8 Which veterans are best suited for careers in cybersecurity? Cybersecurity Jobs: Military Career Fields Other Success Indicators: Knowledge, Skills and Abilities Cyber Operations Network Operations Electromagnetic Spectrum Operations Electronic Warfare Computer Network Operations Network Warfare Signal Intelligence Computer Science/Related Fields Critical and Adaptive Thinking Problem Resolution Techniques Project Management Principles Detailed Knowledge of Computer Hardware, Software & Peripherals Working Knowledge of Mathematical and Statistical Principles Technical Report Writing InfoSec Crime Investigator/ Forensics Expert Penetration Tester Security Architect Computer Crime Investigator InfoSec Crime Prosecutor Forensic Analyst Malware Analyst Technical Director Network Security Engineer Incident responder Director of Security Security Analyst Operations Center Analyst Vulnerability Researcher Intrusion Analyst Security Auditor Security Software Developer 8

9 Admissions Requirements Students must be available to attend 1 st course on-site. Degrees/experience requirements: BA/BS and have 1-2 years of experience in IT, IS, or audit, or AAS and have at least 3 years of related work experience, or Those without a degree must have at least 3-5 years of related work experience. Achieve acceptable score on SANS aptitude and skills assessment. Participate in an admissions interview with SANS and employers. 9

10 Pilot Cohort: Student Background Service and Rank 8 Air Force, 1 Army 3 Staff Sergeant, 1 Master Sergeant, 5 Senior Master Sergeant Military Experience 4 25 years 17 years average in IT Security Clearance Secret, TS/SCI, TS/SCI with CI Polygraph Highest Degree 3 with a Master s 3 with a Bachelor s 3 with an Associates Demographics 100% Male 6 Caucasian / 3 African American 10

11 Results 35 applications; 9 enrolled Assessment performance: Overall: 50-90% Aptitude: 64-92% 7 enrolled in 3 course curriculum 2 enrolled in 2 course curriculum 100% Employment in Infosec STARTING SALARY $75-90K $90-120K $120K EMPLOYERS TRAIN & CERTIFY SEC401 Security Essentials & GSEC Certification: 9 of 9 passed on 1 st attempt SEC504 Hacker Techniques, Exploits & Incident Handling & GCIH Certification: 7 of 9 passed on 1 st attempt SEC503 Intrusion Detection In Depth & GCIA Certification: 6 of 7 passed on 1 st attempt US Army Cyber Protection Brigade 11

12 How it s Funded Open Academy Sponsored Academy 2 Course 2 Certification 3 Course 3 Certification Supported by multiple employers Supported by a single company Veteran s Fee Employer Fee 0 0 $15,000 $22,500 Employers gain priority access to by participating in admissions interviews, Academy career days, and through the SANS CyberTalent Connection Database and Virtual Career Fairs Sponsor company provides exclusive support and funding for all graduates in advance. Students agree to join sponsor company upon graduation 12

13 What We ve Learned Thus Far Transitioning veterans with high technical aptitude can be an excellent source of talent to address the skills gap in cybersecurity. We can identify, assess, train, certify, and connect veterans to great employment opportunities quickly. On-site training for the 1 st course creates community among the students. Curricula content, program duration, and support services must be adaptable to meet different needs of transitioning veterans. Program graduates are attractive candidates for technical positions. 13

14 2016 Expansion Plans Type Partners Location When Veterans Cohort # 2 Veterans Cohort # 3 Women s Cohorts # 1 & # 2 Veterans Cohort # 4 Veterans Cohort # 5 Veterans Cohort # 6 NA SANS event & virtual In Process Joint Base Lewis McChord Tacoma, WA In Process NCWIT East/West In Process NA SANS event & virtual Q1 16 Fort Gordon Augusta, GA Q1 16 Solutionary and Offutt AFB Omaha NE Q

15 Recruiting Cyber Security Talent To Meet Today s Demands Arlin Halstead, SPHR Vice President, Human Resources

16 Challenges Why is it so hard to find people? Demand for Cyber Talent is Outstripping Supply Growth is 3x faster than all other IT jobs 25% longer to fill open positions 69% increase in jobs requiring Cyber Security Experience

17 Challenges New Technology Fronts: Mobility to Cloud Motivated Threat Actors Increased Sophistication of Threats Exponential Increase in Number of Attacks Advanced Threats in the Cyber Security Landscape require an Advanced Skill Set to Compete Emerging Skill Set Education and Certification Training and Development Experience Motivations Immediate Impact

18 Cyber Talent Shortage What has to change? Get more qualified people into the field Accelerate Skilled Candidates into Workforce Attract High Potential Candidates Provide Training, Education and Certification

19 VetSuccess Attract High Potentials Well Trained Educated Experienced Engaged Skill Ready Immediate Impact

20 Successful Strategies SANS Partnership VetSuccess Program Immersion Academy Cyber Security Talent Fair Cyber Talent Database Education & Training Professional Certifications

21 SANS VetSuccess Story Ed Russell Graduate 1 st Cohort 25 years service in Air Force Communications Squadron 10 years Supervisor/Management Duties BA Computer and Information Science - University of Maryland Successfully passed three SANS courses in 4 months Hired as an Information Security Analyst - Accelerated OJT Promoted to Lead our Quality Assurance Team

22 Solutionary Future Involvement Sponsored Academy Partner with SANS and Regional Military Bases Attract Transitioning Military Veterans Combine SANS Training with On-the-job Training Place Graduates into Roles aligned to their Strengths Goal: Accelerate Qualified Candidates into Workforce Solution: SANS VetSuccess

23 SANS - VetSuccess Immersion Academy Bridge Gap in Cyber Talent Shortage Attract Skilled Labor Train and Certify Partner with ER s for Placement Accelerate Advance Skill Set into Workforce Provide Support and Value to our Military Veterans of the Armed Forces succeed in IT Security because of the sense of duty that comes with a Cyber Security Role Always on the lookout to defend against the attacks that are out there today. - Rob Kraus Director Solutionary SERT (Sergeant, United States Army)

24 David Brown 24

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

VetSuccess. Top employers providing America s veterans with careers in cybersecurity VetSuccess Top employers providing America s veterans with careers in cybersecurity According to the U.S. Department of Labor, about 1.5 million members of our armed services will leave the military over

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

How To Build A Cybersecurity Company

How To Build A Cybersecurity Company A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies

Job Market Intelligence: Cybersecurity Jobs, 2015. 2015 Burning Glass Technologies Job Market Intelligence: Cybersecurity Jobs, 2015 Introduction: Cybersecurity and the Job Market American employers have realized the vital importance of cybersecurity but that realization has created

More information

White Paper: Why We Need Veterans for Critical Infrastructure Security

White Paper: Why We Need Veterans for Critical Infrastructure Security White Paper: Why We Need Veterans for Critical Infrastructure Security Published By: SkillBridge, LLC November 8, 2013 Converging Factors There is a significant and growing challenge that currently faces

More information

GIAC Program Overview 2015 Q4 Version

GIAC Program Overview 2015 Q4 Version GIAC Program Overview 2015 Q4 Version Program Overview - GIAC Certification 2015 1 What is GIAC? GIAC is the Global Information Assurance Certification program GIAC assesses candidate knowledge in specific

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

Re-Imagining the Cyber Warrior of the Future

Re-Imagining the Cyber Warrior of the Future CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.

More information

Define & Assess Skills - Smart Grid Security Specialists

Define & Assess Skills - Smart Grid Security Specialists Define & Assess Skills - Smart Grid Security Specialists SANS 2011 North American SCADA & Process Control Summit Michael Assante President & CEO NBISE michae.assante@nbise.org 208-557-8026 Cyber Security:

More information

Symantec Cyber Security Services: A Recipe for Disaster

Symantec Cyber Security Services: A Recipe for Disaster When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training

More information

Cover/Signature Page Full Template

Cover/Signature Page Full Template Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &

More information

NICE 2015 Conference

NICE 2015 Conference NICE 2015 Conference Mission: Impossible? How to Advance the Skills of the Cyber Workforce When You ve Got Quality and Speed but Aren t Cheap November 4, 2015 Presenters: Allison Frankoski, Program Director

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

2014 CYBER INDUSTRY SURVEY

2014 CYBER INDUSTRY SURVEY Maryland s Cyber Industry Maryland s dynamic community of cybersecurity entrepreneurs, academia, federal agencies, investors, technologists and seasoned industry leaders makes it the nation s epicenter

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions General Questions What is the SANS Technology Institute? What degrees are offered by the SANS Technology Institute? What is the SANS Institute? Is the SANS Technology Institute

More information

BAY AREA COMMUNITY COLLEGE CONSORTIUM REQUEST FOR PROGRAM ENDORSEMENT - NEW CREDIT PROGRAM

BAY AREA COMMUNITY COLLEGE CONSORTIUM REQUEST FOR PROGRAM ENDORSEMENT - NEW CREDIT PROGRAM BAY AREA COMMUNITY COLLEGE CONSORTIUM REQUEST FOR PROGRAM ENDORSEMENT - NEW CREDIT PROGRAM Complete (maximum 3 pages) and Email this document to: baccc@cabrillo.edu CC: Rock Pfotenhauer, Chair, Bay Area

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Strategic Progress Update July 2014 March 2015

Strategic Progress Update July 2014 March 2015 Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

HR 2272 Conference Report STEM Education Provisions Summary

HR 2272 Conference Report STEM Education Provisions Summary HR 2272 Conference Report STEM Education Provisions Summary Title I Office of Science and Technology Policy (OSTP) Directs the President to convene a National Science and Technology Summit not more than

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

BHEF s National Higher Education and Workforce Initiative

BHEF s National Higher Education and Workforce Initiative BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services... Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

NARRATIVE. Career Opportunities Infrastructure Security Specialist, Infrastructure Security Analyst

NARRATIVE. Career Opportunities Infrastructure Security Specialist, Infrastructure Security Analyst Item 1. Program Goals and Objectives The Infrastructure Security Associate of Science Degree Program will allow students to design secure applications and services to protect critical assets, develop,

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Cyber Security Solutions Integrated. Proactive. Resilient.

Cyber Security Solutions Integrated. Proactive. Resilient. Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions

More information

UMUC FED Program. Online Open House July 22, 2015

UMUC FED Program. Online Open House July 22, 2015 UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or cls@umuc.edu www.umuc.edu/fedgov 2 UMUC

More information

GIAC Certification. Enterprise Solution

GIAC Certification. Enterprise Solution E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

State IT Workforce: Recruiting and Retaining Tech Talent NCSL Legislative Summit Minneapolis, MN August 19, 2014

State IT Workforce: Recruiting and Retaining Tech Talent NCSL Legislative Summit Minneapolis, MN August 19, 2014 State IT Workforce: Recruiting and Retaining Tech Talent NCSL Legislative Summit Minneapolis, MN August 19, 2014 Doug Robinson, Executive Director National Association of State Chief Information Officers

More information

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community. US Cyber Challenge To view the complete article, please go to http://csis.org/uscc Part of the: Technology and Public Policy Encouraging young people to develop the aptitude and skills to become the core

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN. Information Security & Assurance. Online

Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN. Information Security & Assurance. Online Log in to a Distinguished Tradition. Since 1819. MASTER OF SCIENCE IN Information Security & Assurance Online Program Overview Program Mission The Master of Science in Information Security & Assurance

More information

Staff Training Demands, Succession Planning and Certification

Staff Training Demands, Succession Planning and Certification Chapter 8 Staff Training Demands, Succession Planning and Certification In 2005, workers over 55 represented 16 percent of the workforce; by 2020, that will rise to almost 25 percent. Although these numbers

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

Building Tomorrow s Workforce Today

Building Tomorrow s Workforce Today Building Tomorrow s Workforce Today Center for Energy Workforce Development READ AND DELETE For best results with this template, use PowerPoint 2003 Page 1 Pacific Gas and Electric Company PG&E supports

More information

Careers in Cyber Operations. Defence Signals Directorate

Careers in Cyber Operations. Defence Signals Directorate Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

UTCS Scholarships for Service

UTCS Scholarships for Service Preparing for a Career in Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring, 2015 Slideset 1: 1 How Bad Is It? Cyberwarfare greater threat to US than terrorism,

More information

Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1

Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1 Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1 Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 2 of 5 Jason B. Lyons 13829 233 rd CT NE Woodinville WA, 98077 SUMMARY

More information

Cybersecurity Industry Brief

Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery

More information

Strategic Priorities Update Spring 2015

Strategic Priorities Update Spring 2015 Strategic Priorities Update Spring 2015 (Dr. Cook) Five Common Themes: Priority 1: Priority 2: Increase student success and equity. Prepare a world-class workforce and expand regional economic growth.

More information

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15) University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):

More information

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You. ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences

More information

Cyber Security. Vision. Mission

Cyber Security. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Network Management and Defense Telos offers a full range of managed services for:

Network Management and Defense Telos offers a full range of managed services for: Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015 Strategy and Resources to Strengthen IT Programs Academic Leadership Conference May 28, 2015 Session Key Objectives Presentation Agenda 1. Gain insight into the career opportunity for students: the current

More information

CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY

CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY CENTRAL INDIANA TECH WORKFORCE STUDY EXECUTIVE SUMMARY APRIL 2015 Hire Up, in partnership with TechPoint, reviewed real-time labor market data and completed surveys with 71 Central Indiana companies to

More information

It's a California success story.

It's a California success story. PROGRAM OVERVIEW EDGE is a great example of a successful public-private partnership, which has created a terrific roadmap helping to produce a qualified and skilled workforce for a very important emerging

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information