Cool Careers in Cybersecurity for Girls Workshop
|
|
|
- Godfrey Wright
- 9 years ago
- Views:
Transcription
1 Cool Careers in Cybersecurity for Girls Workshop May 29, a.m. to 1:30 p.m. Careers Program Building at Hagerstown Community College - Hagerstown, MD
2 Educational Technology Policy, Research and Outreach, the K12 lead of the National CyberWatch Center, is excited to partner with Hagerstown Community College and Maryland Department of Business and Economic Development to offer an outstanding opportunity to explore the field of cybersecurity. The Cool Careers in Cyber Security for Girls Workshop would not be possible without women professionals volunteering their time. We would like to thank the women from the following organizations who volunteered their time to help middle school girls understand how their innate gifts and interests can help them have a successful career in any STEM field. DISA (Defense Information Systems Agency) General Dynamics (GDIT) George Washington University Hagerstown Community College Montgomery College National Security Agency (NSA) Northrop Grumman Corporation Norwich University University of Maryland University College (UMUC) Thank you once again for your time and commitment to this event. 2 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
3 Speaker Guide Educational Technology Policy, Research and Outreach, the K12 lead of the National CyberWatch Center, in partnership with Hagerstown Community College and Maryland Department of Business and Economic Development, thanks you for volunteering to present at the Western Maryland Cool Careers in Cybersecurity for Girls Workshop. We could not do this without your willingness to share your experiences with our middle school girls. This speaker guide will help you prepare for the day and assist you in answering student questions. It contains: Scenario Agenda Annotated Agenda with additional ideas on ways you can help the event go smoothly Activities and clues (in case you are curious about the crime) Questions students have asked Women STEM Professionals about Cyber Security in the past Directions and parking information 3 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
4 Scenario Middle school girls become Cyber Super-Investigators (CSI) for a day to solve a cybercrime. During this interactive crime solving event, girls learn from women in diverse companies and agencies about what it takes to navigate the professional pipeline in the vast fields of Cybersecurity and Information Assurance, as well as other science, technology, engineering, and mathematics (STEM) fields. The middle school girls complete hands-on activities with guidance from cybersecurity and STEM professionals in order to gather clues to help solve the crime. This year s cybercrime scenario focuses on industrial espionage. The FBI estimates that every year billions of U.S. dollars are lost to foreign and domestic competitors who deliberately target economic intelligence in flourishing U.S. industries and technologies. In the case of our scenario, the Cool Careers Cyber Crime: Perfection Hair Styler Vs Flirty Hair Tools, Steve Davey pled guilty to federal charges that he stole and disclosed trade secrets concerning a new hair straightener and styling tool developed by Perfection Hair Styler. Davis was employed by Left Industries, a subcontractor of Perfection Hair Styler that had been hired to assist in the development of the new hair styling system. Related Content Davey had made disclosures of technical drawings to new hair straighter and styler tool overseas competitors Flirty Hair Tools, Inc., HAI Elite! and ION, LLC. The disclosures were passed along electronically, sometimes as files hidden within pictures. Davey was arrested and indicted on counts of wire fraud and theft of trade secrets. Davey was sentenced to two years and three months in federal prison. The all girls middle school Cyber Super-Investigators (CSI) has been hired to investigate in greater detail how the trade secrets were stolen and make recommendations to Perfection Hair Styler to ensure this does not happen again. The girls will collect and explore a variety of digital and physical evidence to learn more about stolen trade secret instance. Clues provided by the lead investigators, the cyber professionals speaking at the Cool Careers in Cybersecurity for Girls Workshop, will help the middle school girls solve the crime! 4 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
5 9:30 am Arrival Meet the Cyber Career Speakers 10:00-10:15 am Welcome and Introductions Dr. Davina Pruitt-Mentle Theresa Shank Anthony Hanners 10:15-10:25 am Setting the stage for scenario and activities/video 10:25-10:45 am Activity 1/ Rotation 1 10:50-11:10 am Activity 2/ Rotation 2 11:15-11:35 am Activity 3/ Rotation 3 11:40 am - Noon Activity 4/ Rotation 4 Noon - 12:20 pm Organize at Lunch Tables 12:20-12:50 pm Activity 5 Lunch Keynote Speaker/Panel 12:50-1:15 pm Activity 6 Solve the Cyber Crime, Thank You s and Evaluations 5 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
6 If you should find a lost student this will help you direct her. All events take place here Restrooms are located here 6 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
7 Arrival 9:30 a.m. 10:00-10:15 a.m. 10:15-10:25 a.m. Meet CyberCareer Speakers Welcome and Introductions Setting the stage for scenario and activities/video Agenda with Notes Buses are scheduled to arrive between 9:30 and 9:45 a.m. It would be great if speakers could make themselves available to talk to students who arrive before 9:45. Quotes about why our speakers say their careers are cool will be shown throughout the room. Speakers can walk around the room or stay close to their assigned table. We will encourage students to take advantage of this time to introduce themselves to the speakers and ask a few questions. We will have coffee and refreshments for presenters in the AM The restrooms are indicated in the above map. Speakers can help usher students toward the appropriate tables. Students must be in their seats by 9:55 so that we can begin on time. Students are asked to stay at their assigned tables and rotate as a group as detailed in the schedule. Students will be welcomed and the organizations which have supported us with speakers will be introduced. Welcome and Introductions: Dr. Davina Pruitt-Mentle, ETPRO/National CyberWatch Center K-12 Division Theresa Shank, Dean, Continuing Education and Community Services Anthony Hanners, Cybersecurity Recruiter, Hagerstown Community College Logistics will be covered about how the day will proceed. An introductory video will be shown to set the stage for the cybercrime students will be asked to solve. 7 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
8 10:25-10:45. 10:50-11:10 11:15-11:35 11:40 12:00 12:00-12:20 12:20-12:50 12:50-1:15 Activity 1 Activity 2 Activity 3 Activity 4 Organize at Lunch Tables Activity 5 Activity 6 Students will be pre-assigned starting tables and will rotate as a group as detailed in the schedule. We have allowed 5 minutes between rotations; however, you are welcome to begin as soon as all ladies are seated and ready to begin. During the Activity 4 please thank students for being so polite and cooperative up to this point and remind them that there is still more to come. Groups will stay at the Activity 4 table for the luncheon speaker and lunch. Teachers and volunteers will be bringing the box lunches to the tables. Along with parents, chaperones and teachers we ask speakers to remind students to unwrap their lunches as soon as possible so that noise is limited during the keynote speakers presentation. The lunchtime speaker is going to begin promptly at 12:20 so the students need to be in their seats, quiet and ready to pay attention. Setting the expectation after this last session will help us stay on schedule. No one will be allowed to enter or leave the room during the keynote speaker session. Dr. Davina Pruitt-Mentle: Introduction Lunch Keynote Speaker/Panel Dr. Davina Pruitt-Mentle, Closure Solve the Cyber Crime, Thank You s and Evaluations 1:15 Depart Load Buses 8 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
9 This table lists the Table each presenter is assigned and the groups that each will interact with for each rotation. Table Presenter, Organization, Topic, Activity Carrie, General Dynamics Crypto, Breaking message Steg, which picture has the file Katya, Norwich University Dig For, Find the USB drives Katharine, DISA Stephen, Hagerstown CC Physical Security, Lock Picking Jeanann, Montgomery College CompSc 1, Find the missing part Comp Sc 2, Makey Makey Emma, UMUC CompSc 1, Find the missing part Comp Sc 2, Makey Makey Renee, NGC Crypto, Breaking message Steg, which picture has the file Silvia, Montgomery College Dig For, Find the USB drives Julie, GWU Physical Security, Lock Picking START & Rotation 1 Rotation 2 Rotation 3 Rotation4 Springfield 1 Springfield 4 Springfield 3 Springfield 2 Springfield 2 Springfield 1 Springfield 4 Springfield 3 Springfield 3 Springfield 2 Springfield 1 Springfield 4 Springfield 4 Springfield 3 Springfield 2 Springfield 1 Springfield 5 Northern 3 Northern 2 Northern 1 Northern 1 Springfield 5 Northern 3 Northern 2 Northern 2 Northern 1 Springfield 5 Northern 3 Northern 3 Northern 2 Northern 1 Springfield 5 9 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
10 This table lists the starting position and rotations for each of the schools WHO Abbreviation/Group # Number of students/chaperones Springfield 1 Springfield 1 9 students/ 1 chap Springfield 2 Springfield 1 9 students Springfield 3 Springfield 1 9 students/ 1 chap Springfield 4 Springfield 1 9 students Springfield 5 Springfield 1 9 students Northern 1 Northern 1 8 students/ 1 chap Northern 2 Northern 2 9 students Northern 3 Northern 3 8 students/ 1 chap START & Activity 1 Activity 2 Activity3 Activity 4 & Stay for lunch TABLE TABLE TABLE TABLE SCHOOL District School Teacher Chaperones Springfield Middle Washington Jennifer Joyce Liz Rohrer Northern Middle Washington Shelly Telemeco Heather Williams 10 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
11 Physical Security Activities and Clues: Just in case you are curious about possible clues to the crime Topic Clue Activity Physical security is important! Copies of the trade secrets are kept under lock and key. But how safe is the lock? What recommendations does the team have for physical security access? Lock Picking Cryptography Steganography Digital Forensics 1 Computer Science 1 Computer Science 2 The trade secrets were embedded within digital photos, but which ones and using what settings? An encrypted message was used to send instructions. Can you break the code? What recommendations does the team have for more secure codes? Several pictures are presented. Which picture contains the stolen trade secret files? How can you tell? Could you have detected the hidden message without the cryptographic instructions? How could you protect against this type of threat? What are potential ways for thieves to steal or copy important information? Today many companies do not allow electronic or storage devices to be taken into work. Several organizations/companies actually inspect coats, bags, and briefcases to make sure the policy is followed. Hidden USB drives can be planted in women s jewelry bag and/or brief cases. Can you find all the hidden storage devices? What recommendations would you suggest to protect against the threat of removable media such as thumb drives? Evidence was found on the thief s work computers. However, they have been disassembled. Further investigation reveals parts are missing. What parts were missing? A key part of being a cyber investigator is not only seeing what is there, but also noticing what is missing. Evidence was found on the thief s home computer. However, the keyboard is missing. Is there another way to use the computer without a keyboard? Frequency Chart and Cipher Which picture has the files? Find the USB drives Find the missing parts Makey Makey
12 Questions Students have asked about CyberSecurity and Women STEM Professionals in the past Students have asked these questions in the past. You may want to think about how you would answer these questions if asked. Cybersecurity careers How is cybersecurity used in today s jobs? How does cybersecurity affect other jobs? What types of jobs are cybersecurity jobs? What are the job responsibilities in each of the cybersecurity fields? How many hours a day do cybersecurity employees work? How much do cybersecurity workers get paid? What kind of people do cybersecurity professionals work with? What courses should I take if I am interested in this field? Connection of cybersecurity to other careers What other areas help support cybersecurity? Who needs cybersecurity? How does cybersecurity protect us? How will knowing about cybersecurity help me with my career? How can I become more familiar with how computers work? Hackers How do you become a hacker? What do you need to know? What do Hackers know? And what do they do? What do they want from me? Security of personal data and computers How are we protected on the internet? How do you keep information safe on the internet? How do the various computer programs work to protect my information? How do I protect my computer and information? How safe is my computer now? How do I get rid of viruses? Women STEM Professionals What do you wear to work? Do you have a family? Is it hard to work and have a family What benefits does your company offer? Do you travel? What hours do you work? How many women do you work with?
13 Directions The Career Programs Building (CPB) at Hagerstown Community College Robinwood Drive, Hagerstwon, Maryland Career Programs Building The newly renovated Career Programs Building was dedicated in It is now home to The Merle S. Elliott Continuing Education and Conference Center, with five conference rooms and an expanded Valley Eatery, a tiered lecture hall that seats 66 students, science labs, a comfortable atrium, an outdoor fountain, and outdoor seating area at the Valley Eatery. It is also home to state-of-the-art facilities for nursing, radiography and other health sciences programs, as well as the industrial technology program and HCC s Reprographic Services, IT department, and campus mail room. The event will be take place in rooms (will be opened up to make one large room). Speakers are asked to park in Parking lot F and then enter building, come up stairs to second floor. Please place the parking permit in dashboard of your vehicle. 13 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e
Cybersecurity Education Doesn t Always Take Place in the Classroom
Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014
Girls Make Apps Workshop FAQ
Girls Make Apps Workshop FAQ The Technovation Girls Make Apps Workshop is a coding party where students, mentors and teachers come together to learn App Inventor 2 the programming language they will use
Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy
Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
Advanced Cybersecurity Experience for Students (ACES) Program
Advanced Cybersecurity Experience for Students (ACES) Program Michel Cukier Director, ACES Associate Director for Education, MC2 Michael Hicks Director, MC2 ACES in (Almost) One Sentence ACES is an intensive
Information Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 [email protected] Carrie Pifer
National C3 Baseline Study: State of Cyberethics, Safety and Security Awareness in US Schools
National C3 Baseline Study: State of Cyberethics, Safety and Security Awareness in US Schools Funded by the National Cyber Security Alliance Contact: Davina Pruitt-Mentle, PhD Educational Technology Policy,
Cybersecurity Real World Connections Summer Boot Camp at NJIT
Cybersecurity Real World Connections Summer Boot Camp at NJIT Connecting Learning to Life Summer 2016 The Program In Summer 2016, NJIT s Computer Science department/ RWC Program will offer its first Cybersecurity
Outline Of Classroom Management Plan (Management plan is designed for an elementary school placement. Refer to classroom map when needed.
Outline Of Classroom Management Plan (Management plan is designed for an elementary school placement. Refer to classroom map when needed.) I. Room Preparation A. Bulletin Boards and Walls There will be
FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
15 Bad Things Identity Thieves Can Do With Your Identity
This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,
Page 1. Session Overview: Cryptography
Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging
Counselor Lesson Plan
counselors for computing Counselor Lesson Plan Introduce Students to Computer Science in an Engaging Way Objective The intention of this lesson is to introduce students to computer science in such a way
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Welcome to Utah Career Days!
Welcome to Utah Career Days! Pg 2. Utah Career Days Event Overview Provides an event overview and general expectations for schools, teachers and students. All school supervisors/teachers should review
Oklahoma College App Week. Introduction
Oklahoma College App Week Introduction For many students, particularly those who do not have an immediate family member who attended college, applying to college can be overwhelming. Having someone to
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015. 2015 Women s Society of Cyberjutsu
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015 ABOUT WOMEN S SOCIETY OF CYBERJUTSU Women s Society of Cyberjutsu (WSC), is a 501(c)3 organization serving hundreds of women across the globe by
KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS
KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS We love technology, and want to teach others. With the help of developers, designers and professional educators, we ve created content that not only showcases
Penn State Smeal MBA Program Career Fair Success Strategies
Career Fair Success Strategies Presented by Mike Brown Director, MBA Career Services .not just a place to collect logo pens and post-it notes! Career Fair Benefits Multiple employers; one location Acquire
Choose Your Event Geography Awareness Week 2010 Event Ideas
Choose Your Event Geography Awareness Week 2010 Event Ideas Geography Awareness Week is November 14 20, 2010 Celebrate freshwater by choosing an activity from the list below or make up your own! Whether
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
CSI NIGHT. 1. Set a date: Give yourself at least four months of planning/preparation time.
CSI NIGHT Background: Statistics show that parental involvement in education decreases as children age. One way that we work to bring parents back into the classroom with their child is through our annual
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009
1 of 8 In the United States, the FBI ranks cyber crime and identity theft as the third highest threat, just after terrorism and espionage. In October 2009, the FBI indicted the largest number of defendants
The College of Southern Maryland. WOMEN & STEM programs Dr. Brad Gottfried, President
The College of Southern Maryland WOMEN & STEM programs Dr. Brad Gottfried, President Bernice Brezina, Professor, Business & Technology Shadei Jones, Pre-Engineering Coordinator THE CSM VISION Transforming
ACTIVITIES. SECTION 3 Company Tours
ACTIVITIES 29 SECTION 3 Company Tours Beyond occasionally visiting parents at work, many students have very little idea about the day-to-day rhythms and requirements of the workplace. Providing opportunities
We suggest starting your planning with the following initial thoughts. Make sure you clearly outline the following foundations:
HOW TO RUN A NATIONAL SKILLS WEEK EVENT In order to run a successful event it is essential that you carefully plan and prepare it. This guide will give you some advice on elements to consider when planning
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
explore/ discuss/ HNC/ HND/ choose/ learn/ experience/ apply now/ degrees/
explore/ discuss/ HNC/ HND/ experience/ choose/ learn/ succeed/ apply now/ higher education/ degrees/ Study Higher Education on your doorstep at a fraction of the cost of going to university with one of
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
The CSI Forensic Science Program
The CSI Forensic Science Program at Michigan State University A week-long day camp or residential program for students with a strong interest in forensic science. Level I: June 15 20 for students currently
IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
WCA WEBINAR SERIES: The Case for Cyber Security Training
WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference
Name of presentation Company name
Name of presentation Company name Thank you for your consideration CyberSecurity Awareness Month Cybercrime and Copyright Infringement Amber Chris Burgess Marcus Rogers Amber Purdue student sued by RIAA
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
William Herrera, M.Ed.
Click to edit Master text styles William Herrera, M.Ed. Dean s Office Henry Samueli School of Engineering & Applied Science William Herrera, Director of Engineering Science Corps Outreach Programs UCLA
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach
Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye
Girls Technology Day Who, What, Where, How and Why Career Clusters for Female Under-representation 470104 Computer Installation and Repair Female 127 14 11.02% 110201 Computer Programming, General Female
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
faculty of engineering, computing and mathematics Girls in Engineering (GiE)
faculty of engineering, computing and mathematics Girls in Engineering (GiE) 2014 Annual Update Executive summary Objective The Girls in Engineering Program (GiE) is a joint initiative between The University
Iowa Thespian Festival
Iowa Thespian Festival 2015 Junior Thespian Experience Day Saturday, November 14 University of Northern Iowa Cedar Falls Presented by the Iowa Chapter of the EDUCATIONAL THEATRE ASSOCIATION Junior Thespian
Cool Careers in Cybersecurity for Girls Workshop C34G
Cool Careers in Cybersecurity for Girls Workshop C34G November 12, 2014 10 a.m. to 1:00 p.m. Riggs Alumni Center at the University of Maryland - College Park, MD experience and a love of teaching to her
White Collar Criminal Defense, Internal Investigations & Corporate Compliance
Butzel Long :: Practice :: Practice Teams :: White Collar Criminal Defense, Internal Investigations & Corporate Compliance Team Contacts David F. DuMouchel Related Lawyers George B. Donnini Damien DuMouchel
Northrop Grumman. Foundation. Annual Report
2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.
Georgia Tech College of Management
Best Practices in Developing an Effective Marketing Strategy Building Brand Loyalty Identifying and Segmenting Your Target Audience Georgia Tech College of Management Marketing Strategies: Building Brands
Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
(Pilot Version) THRIVE @ CC Hiring Managers Onboarding Toolkit
(Pilot Version) THRIVE @ CC Hiring Managers Onboarding Toolkit Contents Description of Onboarding What is Onboarding? Benefits of Effective Onboarding CC s Onboarding Program Overview Thrive at CC Purpose/Goal
NYC CERT POST GRADUATION BOOKLET. A step by step guide for team development following the 10-week NYC OEM CERT Basic Training
NYC CERT POST GRADUATION BOOKLET A step by step guide for team development following the 10-week NYC OEM CERT Basic Training 1. Goals and Objectives for New Teams 2. First Meeting 3. Second Meeting 4.
Learning English with CBC Radio Living in Alberta. Identity Theft
Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences
VIRGINIA TECH IEEE CORPORATE SPONSORSHIP PACKAGE 2014-2015
VIRGINIA TECH IEEE CORPORATE SPONSORSHIP PACKAGE 2014-2015 Letter of Introduction Dear Prospective Corporate Partner, Hello from the Institute of Electrical and Electronics Engineers (IEEE) Virginia Tech
Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats
Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats Cybersecurity Policy for Small Firms Why is malware now a
RECONNECT Workshop 2016. Mathematical and Computational Tools of Cybersecurity
RECONNECT Workshop 2016 Mathematical and Computational Tools of Cybersecurity Schedule Sunday; 12 JUN 16 1800 Welcome Huddle at the Hotel Thayer (give participants maps, review entry procedures and parking,
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Cyber Security 2012 Carnegie Mellon University
Cyber Security SPIN Overview Introduction The Importance of Software and Cyber Security Cyber Security Lifecycle and Process Summary 2 Software is Everywhere 3 Software is Becoming More Personal 4 We are
EVENT PLANNING CHECKLIST
EVENT PLANNING CHECKLIST The following checklist is based on a six- week timeframe. Take more time for planning if you have it, or condense the timeline if you have less than six weeks. Just be sure to
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Foundations of Computer Security
Foundations of Computer Security Lecture 1: Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 1: 1 Course Topics Topics we will cover include: What is computer security?
CYBERSECURITY AWARENESS TRAINING
CYBERSECURITY AWARENESS TRAINING WEDNESDAY, 18TH, 19TH AND 21ST MARCH 2015 This program is developed through a collaboration of cyber specialist, defence leader (US government) and Bucks New University
ROLES TO ASSIGN. 1. Judge. 2. Courtroom Deputy. 3. Prosecutor 1 opening statement. 4. Prosecutor 2 direct of Dana Capro
ROLES TO ASSIGN 1. Judge 2. Courtroom Deputy 3. Prosecutor 1 opening statement 4. Prosecutor 2 direct of Dana Capro 5. Prosecutor 3 direct of Jamie Medina 6. Prosecutor 4 cross of Pat Morton 7. Prosecutor
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman
