Cybersecurity High School and Beyond
|
|
|
- Arthur McCoy
- 10 years ago
- Views:
Transcription
1 Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot
2 Topics Why a Career in Cybersecurity? The Cybersecurity Professional High School Cyber Activities College Cyber Activities Building Your Academic Foundation Career Opportunities Resources Summary 2
3 Why a Career in Cybersecurity? Lifestyle dependence Defense and Protection of Information Personal Private Industry Public Infrastructure National Security Critical fields for our Nation s: Continued security Economic prosperity Critical infrastructure protection Global competitiveness Current and future demand Thousands of jobs currently open across the government and private industry Continued need for bright minds and innovative solutions! 3
4 Evolving Education and Career Model Disciplines of Science, Technology, Engineering and Mathematics Variety of Academic Offerings Computer Science Electrical and Computer Engineering Information Technology Information Systems Information Assurance Information Security / Computer Security Software Engineering Certifications Enhance career opportunities CISSP, CEH, certain programming languages Careers Continue to Evolve Career Opportunities at All Levels of Education 4 Define Your Own Career in Cybersecurity!
5 The Cybersecurity Professional Technical Education foundation in STEM discipline Skills in analysis, synthesis, critical thinking, structured problem solving Technical creativity Behavioral Ability to consider various options in decision-making process Ability to effectively communicate orally and in writing Ability to think outside the box fresh approach Ability to work in teams small and large Determination and persistence Collaborative Personal Integrity Passion for what you do! Good lifestyle choices - security 5
6 High School Cyber Activities CyberPatriot Clubs and Camps Internships 6
7 CyberPatriot Overview CyberPatriot is the largest national high school cyber defense competition designed to excite, educate, and motivate the next generation of cyber defenders (and other STEM graduates) critical to our nation s future security Conceived and led by the Air Force Association; Northrop Grumman Foundation is Presenting Sponsor This year s competition had 1,566 teams from 50 states plus Guam, Puerto Rico, US schools in Europe and the Pacific Students learn teamwork, communications, collaboration, and cybersecurity Over 70 CyberPatriots were hired by Northrop Grumman as summer interns in 2011, 2012 and Northrop Grumman awarded over $158,000 in scholarships to be applied to college for top teams
8 Northrop Grumman s Participation Reaching out to schools to encourage registration Offering employee volunteers as mentors and technical advisors to teams Providing information to schools that wish to participate Promote careers in cybersecurity and build a pipeline of talent More information: 8
9 CyberPatriot VI Competition Timeline 2 International Exhibition Teams (If no Canadian teams qualify) Open Division (Any High School) Exhibition Round Apr Practice Round Oct Round 1 Nov 1-3 Round 2 Dec 6-8 Semi-Finals 36 Teams Jan Finalist Teams Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Recruiting/Registration April 1 September 30 On-Line Consolation Round Feb National Finals Competition March 26-29, 2014 Washington, DC Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Exhibition Round Apr All Service Division (JROTC/CAP/Sea Cadets) Practice Round Oct Round 1 Nov 1-3 Round 2 Dec Teams Jan Semi-Finals 14 Finalist Teams 2 x Army JROTC 2 x Navy JROTC 2 x Marine Corps JROTC 2 x Air Force JROTC 2 x Civil Air Patrol 2 x US Naval Sea Cadet Corps 2 x Wild Card 9 CP-VII Recruiting Pre-Registration Jan 1 Apr
10 Clubs and Camps Clubs Computer Club, various extra-curricular activities at school Clubs sponsored through community / school district programs; regional and state level organizations Camps National-level programs offering camps around the country US Cyber Challenge one-week summer camp CyberPatriot Summer Camps beginning 2014 Local / community summer camps sponsored by corporations, universities or the public school district On-Line camps with specific skill development offerings 10
11 High School Internships Many internships available across the U.S. Opportunities in Cyber Security Operations Center, developing cyber applications for various platforms, contributing to real-world cyber solutions Work side-by-side with cyber professionals for valuable experience Sign up for Cyber enewsletter to stay informed of cyber events and opportunities Requisitions may be found at: 11
12 College Cyber Activities Formal Education Informal and Hands-On Education Competitions Clubs and Camps Research 12
13 Building Your Academic Foundation Formal Education 13 National Centers of Academic Excellence Joint Program sponsored by National Security Agency (NSA) and the Department of Homeland Security (DHS) Objective: reduce vulnerability in our national information infrastructure by promoting higher education and research in IA and producing a growing number of professionals with IA expertise in various disciplines Certified programs at academic institutions in 43 states across the United States National Centers of Academic Excellence in IA Education (CAE/IAE): 127 IA Research (CAE/R): 57 IA 2-year Education (CAE/2Y): 32 More Information: NICCS: National Initiative for Cybersecurity Careers and Studies a national resource for cybersecurity awareness, education, careers, and training More Information: Emphasis on Academic Foundation Aligned with Future Careers
14 Building Your Academic Foundation Informal and Hands-On Education Competitions Clubs and Camps Research 14
15 Informal and Hands-On Education Competitions 15 Wide Variety of Cyber Competitions Individual: Typically involves reviewing materials and then taking a test to measure knowledge. Participants may be grouped by age, skill area, geographic area, etc. US Cyber Challenge, Cyber Aces Team: Prepare with written, hands-on materials and perhaps live instruction; may be integrated with academic curriculum; local competition typically virtual; regional and national competitions may be in-person. CyberPatriot, Collegiate Cyber Defense Competition (CCDC) Type: Some focus on defensive cyber activities identification and eradication of vulnerabilities; others include offensive activities penetrate and/or harm others computers/systems Capture the Flag: Attack / Defense or Jeopardy DEF CON National Initiatives for Cybersecurity Competitions The Cybersecurity Competition Federation (CCF) is a network of stakeholders which provides value for our collective endeavors while maintaining the autonomy of individual competitions. The National Cyber League (NCL) provides an ongoing virtual training ground for collegiate students to develop, practice, and validate their cybersecurity skills.
16 Informal and Hands-On Education Collegiate Cyber Defense Competition (CCDC) Conceived in 2004 by a group of educators, students, government and industry representatives Initial competition hosted by Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio in 2005; now in nine regions across United States Mission is to provide institutions with an information assurance or computer security curriculum a controlled, competitive environment to assess their student's depth of understanding and operational competency Northrop Grumman is a sponsor of the Mid-Atlantic Regional Competition and the National Competition Local and Regional Competitions culminate in National Competition for three days in San Antonio, Texas, in April each year More information: 16
17 Informal and Hands-On Education Competitions Intense competition; lots of preparation, practice and hard work are the recipe for a winning team! 2013 National Collegiate Cyber Defense Competition Champions: 1st Place: Rochester Institute of Technology 2nd Place: 3rd Place: Dakota State University Rose-Hulman Institute of Technology 2013 Regional Collegiate Cyber Defense Competition Champions: Pacific Rim: University of Washington Western: California State Polytechnic University, Pomona North Central: Dakota State University Southwest: Oklahoma State University At Large: University of Alaska Fairbanks Mid-West: Rose-Hulman Institute of Technology Northeast: Rochester Institute of Technology Mid-Atlantic: Millersville University Southeast: University of Central Florida Rocky Mountain: United States Air Force Academy 17
18 Informal and Hands-On Education Clubs and Camps Clubs National Cybersecurity Student Association Associations and Clubs at colleges and universities; oftentimes a student chapter affiliated with a professional association Camps National-level programs offering camps around the country US Cyber Challenge one-week summer camp Local / community summer camps sponsored by corporations, universities or the public school district On-Line camps with specific skill development offerings 18
19 Building Your Academic Foundation - Research Northrop Grumman Cyber Research Consortium (NGCRC) Concept Operate a research consortium for challenging cyber security problems Combine NGC with leading research university centers Scope includes joint NGC-university research (IRAD and CRAD) Objectives Develop leading edge technology concepts and discriminators Stimulate thought leadership, technology innovations, educational initiatives, communications Recruiting at top university cybersecurity programs NGCRC Operations Developing discriminating cybersecurity solutions through joint research with world class academic institutions that ensure the safety of our nation and brings business value to Northrop Grumman Establish complementary projects at NGC and universities Active collaboration Frequent personal and network communications Semi-annual NGCRC meetings Contract research proposals Research Areas 14 research areas defined Matched to NGC cyber strategy and NGCRC member strengths Continuing review of topics based on NGC operations 19
20 Career Opportunities Mentor Protégé Relationship Internships and Co-Op Opportunities while in college Career Center Club sponsors or parent organizations Professors and Academic Advisors Alumni Associations CyberCorps Scholarship For Service (SFS) Designed to increase and strengthen the cadre of federal information assurance professionals that protect the government's critical information infrastructure Available to full-time students at the undergraduate and graduate levels Funded through National Science Foundation grants 20
21 Career Opportunities (cont.) Cyber Professionals in Demand in All Business Sectors Internet-based Commerce Critical Infrastructure Transportation Energy U.S. Government Federal Agencies Defense / Intelligence Community State and Local Government Health Care Finance and Banking; Global Economy Position of Trust Some Business Sectors or Positions may require security clearance 21
22 Career Opportunities (cont.) Cyber Systems / Solutions Development Cyber Operations Cyber Systems Architect Cyber Systems Engineer Cyber Software Engineer Cyber Hardware Engineer Cyber Database Architect Cyber Information Assurance Analyst Cyber Forensic Specialist Cyber Intelligence Analyst Incident Analyst Responder Cyber Operator 22
23 Resources 23 Department of Homeland Security (DHS) National Initiative for Cybersecurity Education (NICE) DHS National Initiative for Cybersecurity Careers and Studies (NICCS) Collegiate Cyber Defense Competition National CyberWatch Center cyberwatchcenter.org CyberPatriot (The National Youth Cyber Education Program) (AFA CyberPatriot Program) (Northrop Grumman) Northrop Grumman Careers
24 Summary Science, Technology, Engineering and Mathematics are fun subjects that lead to exciting careers! Many opportunities exist to continue your education and challenge your skills in cybersecurity all leading to greater opportunity for employment in cyber-related professions We need a stronger workforce in the STEM subject areas to protect our nation s security and the lifestyle we enjoy become part of the solution! 24
25
Air Force Association s CyberPatriot The National High School Cyber Defense Competition
Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
Innovation, Partnership, Development
Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse
Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
CyberPatriot Program Update April 2015
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
2015 CyberPatriot Conference
Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Northrop Grumman. Foundation. Annual Report
2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
Exploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development Corby Hovis [email protected] Directorate for Education and Human Resources National Science Foundation
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Immigration Seminar: From F-1 To Green Card 绿 卡 快 车 校 园 行 2014
Immigration Seminar: From F-1 To Green Card 绿 卡 快 车 校 园 行 2014 KAMELI & ASSOCIATES, P.C. Established in 1996, the Law Offices of Kameli & Associates, P.C. is a full-service law firm with correspondent
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
RECRUIT SUTD STUDENTS
RECRUIT SUTD STUDENTS 2014 Recruitment Event Calendar WHY SUTD STUDENTS? SUTD, established in collaboration with MIT, has a mission to nurture technically-grounded leaders and innovators to serve societal
Atlanta Public Schools. Career Academy
Atlanta Public Schools Career Academy Career Academy Planning Model 2012-2013 Market Analysis & Strategic Planning Research Labor Trends (Oct Dec) 2014 Engagement & Fundraising Visit Existing Career Academies
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Areas URI Cyber Research Funding:
Areas URI Cyber Research Funding: Law enforcement tools and technologies including steganography detection, digital evidence search string support, cell phone security, cloud forensics Trust Sensor Interface
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Danielle Supkis Cheek, CPA, CFE, CVA
EDUCATION Danielle Supkis Cheek, CPA, CFE, CVA www.supkischeek.com [email protected] 701 N. Post Oak Rd. Suite 635 Houston, TX 77024 713-893-5625 University of Virginia, M.S. of Accountancy, Charlottesville,
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
Building a Successful Cyber-security Program
Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 [email protected]
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Discussion Outline. A. KPIs Defined. B. Why KPIs Matter. C. KPI Menu. D. Implementation. E. Example KPIs. F. Pitfalls
Discussion Outline A. KPIs Defined B. Why KPIs Matter C. KPI Menu D. Implementation E. Example KPIs F. Pitfalls 1 Key Performance Indicators (KPI s) Defined Periodic assessment of an organization, business
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
Certification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
The College of Southern Maryland. WOMEN & STEM programs Dr. Brad Gottfried, President
The College of Southern Maryland WOMEN & STEM programs Dr. Brad Gottfried, President Bernice Brezina, Professor, Business & Technology Shadei Jones, Pre-Engineering Coordinator THE CSM VISION Transforming
CPSC ITDS/RAM Pilot System: PGA Message Set
CPSC ITDS/RAM Pilot System: PGA Message Set Electronic Certificate Filing Test March 27, 2015 This presentation has not been reviewed or approved by the Commission and may not reflect its views CPSC Background
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches and Mentors Meetings August 18, 2014 - Meeting Timeline Highlights Coach and Mentor of the Year Rules
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
Partnerships to Expand Opportunities for Hispanic Student Success
Office of P-20 Initiatives The University of Texas at San Antonio Partnerships to Expand Opportunities for Hispanic Student Success Jeanette Morales, HACU Belinda Saldaña, UTSA Prepárate: Educating Latinos
P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014
2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description
P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013
2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description
Full Time MBA. Enjoy business your way
Full Time MBA Enjoy business your way Continuous Ascent Rankings Our continued ascent in the rankings demonstrates the effectiveness of our uniquely balanced and teamwork-centric methodology, which attracts
P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015
2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics
BDPA CORPORATE OPPORTUNITIES PORTFOLIO. www.bdpa.org
BDPA CORPORATE OPPORTUNITIES PORTFOLIO www.bdpa.org Updated December 2013 Page 2 To place order: email [email protected] or call (301) 584 3135 Table of Contents About BDPA 3 Portfolio Overview 4 Programs
Strategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
Information Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 [email protected] Carrie Pifer
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
CURRICULUM VITAE Russell Adams 956-882-7654 [email protected] Brownsville TX 78520. Current Position: Associate Professor of Marketing SCOB UTB-TSC
CURRICULUM VITAE Russell Adams 956-882-7654 [email protected] Brownsville TX 78520 Current Position: Associate Professor of Marketing SCOB UTB-TSC Ph.D. Business Administration EDUCATION University of Texas
Computer Security and Investigations
Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol
U.S. Forces in Iraq. JoAnne O Bryant and Michael Waterhouse Information Research Specialists Knowledge Services Group
Order Code RS22449 Updated April 7, 28 U.S. Forces in Iraq JoAnne O Bryant and Michael Waterhouse Information Research Specialists Knowledge Services Group Summary Varying media estimates of military forces
FY 2015 Schedule at a Glance
Coaching and Mentoring for Excellence Oct 21 23, 2014 $2,950 Residential Coaching and Mentoring for Excellence Apr 7 9, 2015 $2,400 Non-residential Coaching and Mentoring for Excellence May 27 29, 2015
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Advising Engineering
ADVISING ENGINEERING Getting students interested Guiding students to college It is important for teachers, advisors and school counselors to know how to get students interested in engineering and be able
Master of Geographic Information Systems University of Washington
March 2010 Master of Geographic Information Systems University of Washington Introduction The University of Washington (UW) seeks approval to establish a Master of Geographic Information Systems degree
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
