Cool Careers in Cybersecurity for Girls Workshop C34G
|
|
|
- Mavis Woods
- 10 years ago
- Views:
Transcription
1 Cool Careers in Cybersecurity for Girls Workshop C34G November 12, a.m. to 1:00 p.m. Riggs Alumni Center at the University of Maryland - College Park, MD
2 experience and a love of teaching to her classroom and students. When not working, Rose volunteers with dog rescues organizations and enjoys spending time with her family. Vonda Williams has 25 years of professional experience in acquisition & procurement, simulation & modeling, design, integration of software applications, systems analysis, operations research analysis, test & evaluation of systems, alternative of analysis(aoa), Change Management & Configuration Management (CM) across the Software Development Lifecycle (SDLC) for the Enterprise in support of the Cross Domain Solutions Program Management Office and Independent Verification & Validation (IV&V) of several complicated software systems including Y2K system assessment and certification. She has over 10 years in Information Assurance supporting system security certification & accreditation, vulnerability assessment & Risk analysis, intrusion detection implementation, mission assurance to include continuity of operations planning (COOP) & Disaster Recovery (DR) planning, Integration of Enterprise Architecture including cross-domain solutions, and development of ISSM/ISSO training materials. 1 18
3 has published numerous articles in research and education journals including the ACM Journal of Education Resources and the ACM Inroads. In 2005, she received the IUP School of Graduate Studies and Research Sponsored Programs Award for Outstanding Achievement in Curriculum and Instruction for the Cybersecurity and Information Assurance Curriculum Projects. Rose Shumba has presented at numerous regional, national, and international conferences including the prestigious ACM Special Interest Group in Computer Science Education. She received her MSc in Computer Science and PhD in Computer Science from the University of Manchester (UK), and University of Birmingham (UK) respectively. Anh (Ann) Tran has over 20 years of engineering and management experience. She has successfully managed complex, technology-based, mission critical programs, which were both geographically disbursed and schedule driven. She has extensive experience working with the FAA, civil agencies as well as international customers and their stakeholders to ensure program success. As the Senior Manager of the Engineering & Technology - Mission Systems Air Traffic Management Solutions for Lockheed Martin Information Systems and Global Solutions, she manages a team of over 1200 engineers and support personnel. In this role, Anh is responsible for the performance and expansion of a variety of programs domestically as well as internationally. In addition, she leads the engineering team, as well as subcontract program management and procurement, configuration management, site activation, Infrastructure Lab Engineering and facilities. Anh began her career in 1989 as a computer programmer at Lockheed Martin (former IBM Federal Systems) in Gaithersburg, Md. There, Anh was part of the team developing the TCP/IP protocol suite for various IBM products. This is the underlining infrastructure we use today in delivering and transferring files from one location to another. In 1991, Anh joined the Air Traffic Management Solutions team in Rockville, Md. She worked in a variety of engineering roles with increasingly higher levels of responsibilities. Anh has her Bachelors of Science in Computer Science with a minor in Mathematics from the University of Maryland, College Park. Rose Volynskiy has 30+ years of extensive teaching experience in a community college-level setting, web development and programming experience. She has taught various on-line, hybrid and face-to-face computer courses and has been involved in full cycle of website and software development beginning with requirement analysis through designing, programming, testing and deployment. She previously worked as a web developer and a computer programmer for companies both in the United States and around the world. She brings vast 17 WORKSHOP POLICIES EVENT INFORMATION Please wear your name badges at all times. As a courtesy to speakers and other attendees, we ask that you turn off or set your cell phones and pagers to vibrate mode during all sessions. BATHROOM BREAKS As a courtesy to speakers and other attendees, we ask that the bathroom breaks be done during the transition time between rotations. Girls must be escorted to and from the bathroom facilities. Please note: as a courtesy to our keynote speakers, we ask that no one leave during the keynote presentation. EVENT EVALUATIONS Towards the end of the event, you will be asked to complete an evaluation form (overall event and presentation sessions). Please complete the evaluation as your input helps us be aware of your needs and develop next year s event. INTERESTED IN SIMILAR EVENTS OR ACTIVITIES? Visit edtechpolicy.org/cyberk12/ 2
4 WELCOME The National CyberWatch Center K-12 Division, led by Educational Technology Policy, Research and Outreach is excited to partner with the Maryland Cybersecurity Center and the Center for Women in Computing to offer another outstanding Cool Careers in Cyber Security for Girls Workshop at the University of Maryland, College Park Campus. C34G educates, inspires, and provides girls with the information, skills and resources necessary to navigate the professional pipeline in the vast field of cybersecurity. The C34G vision is put into action through programs and a focus on cyber stewardship, activities to make a safer and more secure society, by delivering high-quality, innovative activities that inspire girls to pursue careers in cybersecurity. The event would not be possible without women professionals volunteering their time. Please take the time to thank the women from the following organizations who volunteered their time to share with you today. Boeing Howard Community College Lockheed Martin National Security Agency (NSA) Northrop Grumman Schnell-Tech Solutions Tenable University of Maryland, College Park University of Maryland University College U.S. Department of Agriculture U.S. Department of Education 3 proven results. She currently serves as both the Information System Security Program Manager (ISSPM) and the Agency s Chief Information Security Officer (CISO) within the Washington metropolitan area. She is responsible for the design and implementation of comprehensive security systems, policies and procedures which protect Agency IT resources. Gail Schnell is the President & CEO of Schnell-Tech Solutions LLC. After returning from her US Army deployment for Operation Enduring Freedom in Afghanistan, she has been working hard to turn her dream of owning a company into reality. She sees this company as another way to help others - by offering solutions, going green, supporting veterans, and giving back to the community. Alice Shaffer began her career at the National Security Agency as a member of the High School Work Study program. She has worked in various offices such as Corporate Travel, Corporate Communications, and International Relations. For the past 12 years, Ms Shaffer has served as the Department of Defense (DoD) Information Assurance Scholarship Program (IASP) - Program Director, which is part of the National Information Assurance Education and Training Program at NSA. The DoD IASP is designed to assist in recruiting and retaining highly qualified Cybersecurity, Information Assurance (IA) and Information Technology (IT) personnel the DoD needs to manage, operate and secure our information infrastructure. Through her work with the DoD IASP, Ms. Shaffer has helped to increase the pipeline of cyber security/ia trained professionals entering and remaining in DoD s workforce. She also serves as a member of the National Science Foundation s Federal Cyber Scholarship for Service (SFS) Interagency Coordination Committee (ICC), whose vision is similar to that of the DoD IASP. Recently Ms. Shaffer has taken on the role of National Center of Academic Excellence K-12 and STEM Education Coordinator, working closely with designated CAEs to encourage STEM education outreach, with special emphasis on women and minorities in cybersecurity education/careers. In addition, Ms. Shaffer is also certified as Federal Grants Manager. Rose Shumba is a Program Director and Professor for the Cybersecurity program, Graduate School at UMUC. Before joining UMUC, she was a Professor of Computer Science and Director of the Indiana University of Pennsylvania (IUP) NSA Institute of Information Assurance Education. Rose Shumba s primary research areas include information assurance education, digital forensics, secure software development, cloud computing, human computer interaction and security, and gender and computer science/information assurance. Rose Shumba 16
5 Pam Mitchell has over thirty years of experience as an entrepreneur, software engineer, certified network engineer, certified computer technician, technical educator and website designer. As an entrepreneur, Pamela brings state of the art computer technology and support to small businesses, non-profits, and consumers. She keeps her customers informed of cyber-attacks and helps them implement budget appropriate system protections. As a software engineer, Pamela has designed, developed, tested, implemented and supported 100+ of computer information systems for the government and private sectors, presenting new software ideas to top government officials and directors of Fortune 500 Companies. In addition to her business activities, Pamela has volunteered over 30,000 hours of her time to nonprofit organizations and job skills programs, helping individuals to improve their information technology and computer skills. Lisa McKelvie is a Sr. Information Assurance Officer with DISA. Kathy Moon is a chief architect for Northrop Grumman's Enterprise Shared Services organization, leading development of its long range strategic planning. She also supervises the information technology (IT) product standards process and has facilitated IT organization and business partner cross-functional governance teams to prioritize IT investments to drive business. Moon is actively involved in her community, serving as the area governor of Toastmasters International, Los Angeles district, working with club officers and district leaders to develop communication skills for members. She also tutors elementary through college level students in math and received recognition as a Women of Color magazine Technology All Star in Kelly O Brien is a Sr. Program Manager Lockheed Martin. Moira Purham is a Senior QA Analyst at Tenable. She has been working in the Information Technology field for over 20 years, in assorted positions, primarily Help Desk, and QA. Prior to Tenable she was a linguist in the United States Air Force. Ebony Pierce has worked with Lockheed Martin for over 5 years in various roles including Software Developer and Security Analyst. Angela Pompey is a Chief Information Security Officer for USDA/ERS. She graduated from the University of Maryland University College with a Bachelor of Science in Criminal Justice. She has 24+ years of Federal service serving as a Team Lead and advisor on extensive IT managerial projects and studies with 15 SCENARIO: Middle school girls become Cyber Super-Investigators (CSI) for a day to solve a cyber-crime. During this interactive crime solving event, girls learn from women in diverse companies and agencies about what it takes to navigate the professional pipeline in the vast fields of Cybersecurity and Information Assurance, as well as other science, technology, engineering, and mathematics (STEM) fields. The middle school girls complete hands-on activities with guidance from cybersecurity and STEM professionals in order to gather clues to help solve the crime. This year s cybercrime scenario focuses on vulnerabilities in networked medical equipment. On an episode of the Showtime series Homeland, Vice President Walden s pacemaker was hacked becoming the weapon for his assassination. In a 60 Minutes interview with former Vice President Dick Cheney, he confirmed that the possibility of his pacemaker being hacked had been discussed and the device s wireless access had been disabled to prevent such an attack on his life. Although it may sound like science fiction several studies have proven that flaws in cyber security of medical devices could be exploited to induce death. Computer scientist Kevin Fu has demonstrated in a research lab that he could hack into a combination heart defibrillator and pacemaker to induce potentially fatal electric jolts. Researchers at computer security firm McAfee share they have found a way to hack into an insulin pump to make it release multiple days worth of insulin. Security analysts Terry McCorkle and Billy Rios discovered a simple password vulnerability affecting over 300 devices including ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment. Devices could be exploited to change critical settings or modify the device. In the case of our scenario, the 2014 Cool Careers Cyber Crime: Networked Medical Equipment Vulnerabilities, the all girls middle school Cyber Super- Investigators (CSI) have been hired to examine in greater detail how medical devices could be breached and make recommendations to the U.S. Food and Drug Administration. The girls will collect and explore a variety of digital and physical evidence to learn more about medical device vulnerabilities. Clues provided by the lead investigators, the cyber professionals speaking at the Cool Careers in Cybersecurity for Girls Workshop, will help the middle school girls in their investigation! 4
6 9:30 am Arrival Meet the Cyber Career Speakers Harriette Julian is a Business Process Analyst at Northrop Grumman Corporation 10:00-10:05 am Welcome and Introductions Dr. Davina Pruitt-Mentle Dr. Michel Cukier 10:05-10:20 am Setting the stage for scenario and activities/video 10:20-10:40 am Activity 1/ Rotation 1 10:43-11:03 am Activity 2/ Rotation 2 11:05-11:25 am Activity 3/ Rotation 3 11:27 11:50 am Activity 4/ Rotation 4 11:50 12:15 pm Organize at Lunch Tables 12:15 12:35 pm Activity 5 Lunch Keynote Speaker: Panel Session 12:35-1:00 pm Activity 6 Discussion of the CyberCrime, Thank You s and Evaluations Kristen Lantz is a Program Manager and Engineering Leader at Lockheed Martin in Hanover, MD. She began her professional career as a Software Engineer after receiving her degree in Mathematics from the University of Colorado in Boulder. Kristen worked on several programs developing software to support customer requirements. While working, she completed her Master s Degree in Information and Telecommunication Systems at the Johns Hopkins University. She expanded her technical roles to include Database and System Engineering. Kristen held multiple technical leadership roles as well as Engineering support positions and then moved into Program Management. Her career has given her the opportunity to travel around the world and to experience various cultures while doing business in other countries. Kristen is married and has 4 very active children. She loves to play softball, work in her garden and keep up with her kids. Pamela Lougee is the Information Assurance Analysis Skill Community Director with the National Security Agency s Associate Directorate for Education and Training, College of Cyber. The College of Cyber provides a broad array of cyberrelated training and education activities in the fields of computer network operations, information assurance, information operations, operations security, security engineering, computer science, and systems engineering. She also serves as Chair to NSA s Women Employee Resource Group. Ms. Lougee joined the National Security Agency in June, 1987, and has a held a variety of leadership, personnel development, and technical support positions within the Information Assurance Directorate s Operations and Trusted Solutions Engineering Groups. Ms. Lougee graduated from the University of Maryland University College with a Bachelor of Arts degree in Communications Studies, and she is a graduate of NSA s Mid-level Leadership Development Program. Ms. Lougee resides in Hampstead, Maryland, with her husband, Tony. She has three children and two step-children. She is an active soccer mom and also enjoys singing, Orioles baseball, and Broadway musicals. 5 14
7 Vermont, and worked in residential life and judicial programs settings before moving into the IT realm. Map Cyndi Gula is Vice President of Operations at Tenable Network Security. At Tenable, Mrs. Gula is responsible for Human Resources, and Product Licensing operations. Her teams lead recruiting, retention, benefits programs and facilities management globally. Cyndi oversees Tenable's product licensing operations team that currently processes licensing and renewals for over 15,000 commercial, government and international customers annually. She was the founder and President of Network Security Wizards, an advanced network intrusion detection technology company that was acquired by Enterasys Networks in She has a BS in Glass Engineering Science from Alfred University and began her career in Quality Assurance and Process Engineering positions at Carr Lowrey Glass Company in Baltimore, and Syracuse China in Syracuse, NY. All events take place here Stacey Hertz serves as a Software Engineering Manager for Lockheed Martin Corporation. She holds a BS Engineering Science from Loyola College and a MS Electrical Engineering from Johns Hopkins Univ. She started employment with the predecessor company Ford Aerospace designing hardware, and did integration and testing of large communication systems. When Ford was bought by Loral Aerospace, she took a C programming language course and started programming communication equipment with C and assembly language. She had her first child and started working part-time which allowed her to balanced work and home very well. When Loral was bought by Lockheed Martin she continued with software development positions and became a manager in addition to performing software development on the program. She now has two children; both of which are now in high school and she will be starting full-time next week. Katie Hirsch is a Software Engineer at Tenable Network Security whose career has focused primarily on user interface development. Prior to her work on Security Center for Tenable, she worked for 8 year in the video games industry where her shipped title included Command and Conquer 3: Kane's Wrath, Civilization V, X-Com Enemy Unknown and FEAR3. She has a B.S. in Computer Science and a B.A. in Visual Arts from UMBC. Laura Hobbs is the Customer Care Manager for Tenable Network Security. She has previously worked as Technical Support and EDI Implementation Specialist. She has been involved with Shmoocon and the local tech/hacker community for the last 9 years. 13 Restrooms are located here 6
8 WHO Rotations for each of the schools START & Activity 1 Activity 2 Activity3 Activity 4 & Stay for lunch TABLE TABLE TABLE TABLE Clarksville Clarksville Clarksville Clarksville Clarksville St Louis St Louis St Louis St Louis St Louis 5 & Indiv A Gaithersburg Gaithersburg Gaithersburg Gaithersburg Gaithersburg Lake Elkhorn Lake Elkhorn Lake Elkhorn Lake Elkhorn Lake Elkhorn Karen Edwards Karen Edwards is a Senior Testing Manager and Acting Requirements Manager at the Department of Education, Federal Student Aid. She received her Bachelor of Science degree in business administration from Washington Adventist University in Takoma Park, MD and started her career in Information Technology soon after. Karen s career has worked as a software developer, software tester and manager of software developers, software testers and business analysts. She is a Certified Software Test Manager and a Certified Scrum Master. Karen lives in Maryland. Dr. Emma Garrison serves as an Associate Adjunct Professor at the Graduate School of Management and Technology at the University of Maryland University College. Prior to UMUC she served as the Assistant Administrator for Information Technology (IT) and Chief Information Officer (CIO) for the Transportation Security Administration (TSA) under the Department of Homeland Security (DHS). She provided all aspects of IT services for over 60,000 employees at 450 federalized airports and 23 international locations. Before that she served 25 years with the National Security Agency (NSA), starting as an Electronic Engineer and holding leadership positions in Technology and Systems, Signals Intelligence, Information Assurance, and Research & Development. She served as the Deputy Counterterrorism for SIGINT Development Services and as a Senior Operations Officer operating on behalf of and with the authority of the Director of NSA in the command and control of time-sensitive signals intelligence and information assurance missions. She holds a Bachelor of Science in Electrical Engineering from the University of Memphis, a Master of Science in Telecommunications Management and a Doctorate in Management with a focus on technology and information systems; both from the University of Maryland University College. Amy Ginther is the Coordinator of Project NEThics at the University of Maryland, a group charged with promoting the responsible use of information technology and investigating incidents of computing resources misuse. Recent areas of focus have included co-managing the university's music subscription service project, presenting on IT security/identity theft, policy process planning and consultation, and managing the day-to-day demands of policy enforcement. Amy earned a master's degree in Higher Education and Student Affairs at the University of 7 12
9 Lolita (Lolli) Buran is the GSM-O Task Order 11 Network Assurance Program Manager. In this role she leads a global team of cyber intelligence analysts working in partnership with the government to transform the 24x7 network defense mission for DISA and its customers. Prior to this role she has held leadership positions in program management and engineering. Lolli holds a bachelor s degree in Management and Information Systems from Hood College and a Master s Certificate in Applied Project Management from Villanova University. She is a graduate of the Lockheed Martin executive and program development program and has achieved certifications in Certified Information Systems Security Professional (CISSP ), Project Management Professional (PMP) and ITIL Foundation. Elise Campbell majored in Mechanical Engineering at Virginia Tech and obtained her masters in Systems Engineering at Johns Hopkins University. She is currently a construction project manager for the Department of Defense. Alice Chang is a senior research engineer at Tenable Network Security, on a team responsible for detecting server and software vulnerabilities via network traffic. After obtaining her degree in computer science from UC Santa Barbara, she moved to the east coast to work at Symantec's Security Operations Center as an analyst, and then to McAfee's Network Threat Response team for a research and engineering role that focused on malware analysis and detection. Despite grown up believing that writing novels was in her future, she has since been pleasantly surprised to find herself living in one, and is firmly convinced that the storyline could use more female protagonists. She has a B.S. in Computer science at the University of California at Santa Barbara. Colleen Calimer entered the Department of Defense at the age of 17, right out of high school and was employed as an Analytic Aide, which was below that of a secretary. She held numerous jobs which garnered her experience in a number of career fields. Ms. Calimer was able to get into an Analyst Internship and eventually became a Senior Intelligence Analyst. Ms. Calimer took lots of classes and professional development courses and when she retired from the Department of Defense she was hired to perform Systems Engineering duties with The Boeing Company. Ms. Calimer advocates that Systems Engineering is a discipline with which anyone can aspire. It requires the ability to understand processes, systems and technology. Additionally Systems Engineering is a team endeavor which uses the gifts of all involved in order to be successful. 11 WHO START & Activity 1 8 Activity 2 Activity3 Activity 4 & Stay for lunch TABLE TABLE TABLE TABLE Hyattsville Hyattsville Hyattsville Hyattsville Hyattsville Harpers Choice Harpers Choice Harpers Choice Harpers Choice Harpers Choice Thomas Pullen Thomas Pullen Thomas Pullen Thomas Pullen Thomas Pullen Bullis Student reporters 37
10 Speaker Biographical Sketches Dr. Dawn M. Beyer, (Ph.D., PMP, CISSP, CSSLP, CISM) is a Lockheed Martin (LM) Fellow. She has over 24 years of experience in information security; security engineering; security risk assessments and management; threat and vulnerability assessment; developing security policies and processes; and performing certification and accreditation on classified and unclassified systems.dawn provides security engineering and cyber security support to captures/proposals, development, and operations and maintenance efforts. She provides direction and consultation on technical planning, requirements definitions, systems architecture and design, systems development and integration, verification and validation, cost and risk, supportability and effectiveness analysis, and system deployment. She also provides guidance, direction, leadership, training, and mentoring to Intelligence Analysts and LM Engineers. Dawn is a retired Intelligence Officer from the U.S. Air Force with 24 years of service and has performed additional responsibilities in the following roles: Information Systems Security Officer/Manager, Computer Systems Security Officer, Communications Security Manager, Computer Security Manager, Operations Security Manager, Emissions Security Manager, and Information Security Manager. Dawn earned her Bachelor of Science degree in Information Systems, her Master of Science degree in Information Systems, and her Ph.D. in Information Systems. She developed the LM Secure Engineering Assurance ModelSM. Dawn maintains the following certifications: PMP, CISSP, CSSLP, and CISM. Jacquelyn Blanchard is a Full Spectrum Cyber Security Leader with 12 years of IT experience including 4 years of SAP application security and 4 years of audit. Jacquelyn has been employed with Lockheed Martin for 12 years and has held a number of positions, each with increasing levels of responsibility. Currently, Jacquelyn is a Cyber Intelligence Analyst Staff on the DC3 program. Jacquelyn earned her B.S. in Business Administration with emphasis in Computer Science from Sullivan University in 2001 and her M.A. in Business and Organizational Security Management from Webster University in She holds certifications in GIAC Penetration Testing (GPEN), GIAC Certified Forensic Examiner (GCFE), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Lean Six Sigma (LM21) Green Belt and Information Technology Infrastructure Library (ITIL) V1 foundation. She holds memberships in the Information System Security Association (ISSA) and Information Systems Audit and Controls Association (ISACA). 9 Dr. Laurel Boraz grew up in Charlottesville, VA. She attended Smith College where she majored in mathematics. She continued her studies in mathematics at McMaster University in Hamilton, Ontario earning her M.Sc. in 2005 and her Ph.D. in She spent three years teaching undergraduate mathematics at Smith College and Hobart and William Smith Colleges before starting her current career as an Applied Research Mathematician for the National Security Agency. Caryn Boyd works as an Information Technology Specialist for the United States Department of Education. Valerie Boykin works as an Information Technology Specialist in Federal Student Aid for United States Department of Education. She holds a B.S in Mathematics and Computer Science and a Masters in Computer Science. Gail Briemann is the Curriculum Manager for Computer Science and Naval Postgraduate School classes offered by the National Security Agency s Associate Directorate for Education and Training, College of Cyber. The College of Cyber provides a broad array of cyber-related training and education activities in the fields of computer network operations, information assurance, information operations, operations security, security engineering, computer science, and systems engineering. Ms. Briemann joined the National Security Agency in September, 1988 as a High School Work Study. Ms. Briemann graduated from the University of Maryland Baltimore County with a Bachelor of Science degree in Information Systems Management. Throughout her career, she has held a variety of administrative and technical positions within the Information Assurance Directorate. Ms. Briemann resides in Pasadena, Maryland and has one daughter. She enjoys photography, cooking and crafts. Dr. Monica Brodzikis a Mathematician at the National Security Agency Bernadette Bucher is a Systems Integration/Test Engineer at Lockheed Martin. 10
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
Cool Careers in Cybersecurity for Girls Workshop
Cool Careers in Cybersecurity for Girls Workshop May 29, 2014 10 a.m. to 1:30 p.m. Careers Program Building at Hagerstown Community College - Hagerstown, MD Educational Technology Policy, Research and
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security
Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Northrop Grumman. Foundation. Annual Report
2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach
Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye
Lockheed Martin Mission Systems & Training(MST)
Lockheed Martin Mission Systems & Training(MST) 9500 Godwin Drive Manassas, VA 20110 Tashika Hussey Net-Centric Integration & Demonstration NCID Demonstration Portfolio Deputy Topics of Discussion Lockheed
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
6,114FALL 2014. Corky Hornet UNIVERSITY PROFILE UNDERGRADUATE CLASS SIZE DEGREE PROGRAMS STUDENT TO PROFESSOR RATIO INTERNATIONAL STUDENTS MASCOT
SCHOOL OF BUSINESS DEAN SEARCH 2015 UNIVERSITY PROFILE FOUNDED IN 1863 ENROLLMENT 6,114FALL 2014 UNDERGRADUATE GRADUATE UNDERGRADUATE CLASS SIZE 20 average DEGREE PROGRAMS 185 Includes bachelor s and master
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected]
556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected] PROFESSIONAL EXPERIENCE 2001 - Present Member, Board of Directors, National Veterans Business
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Strategy and Management Services (SAMS), Inc.
Strategy and Management Services (SAMS), Inc. Exceeding Expectations with People Who Make a Difference! Strategy and Management Services (SAMS), Inc. 8117 Lake Park Dr. Alexandria, VA 22309 1 703-969-7949
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
New-Age Master s Programme
New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation
BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Illinois Affiliate Award Celebration Saturday, February 26, 2011 DePaul University Chicago Loop Campus
Illinois Affiliate Award Celebration Saturday, February 26, 2011 DePaul University Chicago Loop Campus Event Agenda Welcome: Eileen Sweeney, Senior Director of Foundation & Community Relations Motorola
Master of Public Administration. A Fast Track to Attaining a Prestigious US MPA Qualification
Master of Public Administration A Fast Track to Attaining a Prestigious US MPA Qualification 1 About UMT The University of Management and Technology (UMT), chartered by the State Council of Higher Education
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
Brickner, Kelly & Associates
Brickner, Kelly & Associates Our Customer is our most treasured asset... Our partners are our most valued allies Supporting the Intelligence Community and Department of Defense Missions Integrating Team,
How To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
IT and Cybersecurity. Workforce Development with CompTIA Certification
IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership [email protected] Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
Founding Director, Lowell Institute School Associate Dean, Undergraduate Education, College of Professional Studies Boston, MA
Founding Director, Lowell Institute School Associate Dean, Undergraduate Education, College of Professional Studies Boston, MA Executive Summary The College of Professional Studies at Northeastern University
Work Toward Your Bachelor s Degree
By completing a series of Walden s Professional Development courses, you can earn credits toward a number of bachelor s programs at Walden University. To receive credit, you will need to complete all of
Douglas M. DePeppe Cyberlaw Attorney
Douglas M. DePeppe Cyberlaw Attorney [email protected] Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Jane A. LeClair, Ed.D. 1031 Chapelhill Drive Victor, NY 14564 [email protected] 315-440-2827
Jane A. LeClair, Ed.D. 1031 Chapelhill Drive Victor, NY 14564 [email protected] 315-440-2827 OBJECTIVE - To provide dedicated leadership to the educational community. EDUCATION SUMMARY Syracuse University,
know school PubliC affairs
know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to
the school of PUBLIC POLICY
the school of PUBLIC POLICY at THE SCHOOL OF PUBLIC POLICY AT UMBC The University of Maryland, Baltimore County (UMBC) has been in the vanguard of public policy education and research since establishing
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
13 th Annual General Meeting
13 th Annual General Meeting Meet the Candidates You can hear from the candidates in the 2016 Board of Director Election by attending the Meet the Candidates webinar on Tuesday, May 3, 2016 from 3:00 pm
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Information Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 [email protected] Carrie Pifer
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015. 2015 Women s Society of Cyberjutsu
WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW 2015 ABOUT WOMEN S SOCIETY OF CYBERJUTSU Women s Society of Cyberjutsu (WSC), is a 501(c)3 organization serving hundreds of women across the globe by
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian
1. Could you describe your department in terms of the undergraduate and graduate programs offered?
1. Could you describe your department in terms of the undergraduate and graduate programs offered? The Information Systems and Business Analytics Department offers degree programs at the undergraduate
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Associate Dean, Graduate Academic & Faculty Affairs College of Professional Studies Boston, MA
Associate Dean, Graduate Academic & Faculty Affairs College of Professional Studies Boston, MA Executive Summary The College of Professional Studies at Northeastern University seeks a seasoned and innovative
Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado
Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:[email protected] Current Position: Instructor University of Colorado Colorado
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
Information Technology Solutions at Work
Information Technology Solutions at Work Company Overview Established in 2000, E Quality Corporation is a privately held company headquartered in Dallas, Texas with regional offices in Springfield, Virginia.
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
State of Florida Department of Management Services
September 3, 2015 State of Florida Attn: Joel Atkinson Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 350 Seventh Avenue 10th Floor New York, New
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Science and Math Teacher Initiative
Science and Math Teacher Initiative (CalTeach) Program Highlights Report OVERVIEW The University of California Science and Math Teacher Initiative known as CalTeach is making a strong contribution to the
Air Force Association s CyberPatriot The National High School Cyber Defense Competition
Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public
SSDI Webinar Series Webinar 3 School-Police Partnerships January 14, 2015 PRESENTER BIOS
SSDI Webinar Series Webinar 3 School-Police Partnerships January 14, 2015 PRESENTER BIOS Cynthia Pappas Cynthia is a Senior Policy Advisor at the U.S. Department of Justice Office of Juvenile Justice and
Master of Science Higher Administration Faculty
Master of Science Higher Administration Faculty Becki Elkins Becki Elkins is Registrar and Director of Institutional Research & Assessment at Cornell College in Mount Vernon, Iowa. She holds a doctorate
Oil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
