Cool Careers in Cybersecurity for Girls Workshop



Similar documents
Cybersecurity Education Doesn t Always Take Place in the Classroom

Welcome to this ACT webinar

Summary Report from the Girls Workshop Cool Careers for Girls in Cybersecurity October 4 th, University of Maryland, College Park, MD

Girls Make Apps Workshop FAQ

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Securing Networks, Securing Futures

Advanced Cybersecurity Experience for Students (ACES) Program

Information Systems Technology & Cybersecurity Programs

National C3 Baseline Study: State of Cyberethics, Safety and Security Awareness in US Schools

Cybersecurity Real World Connections Summer Boot Camp at NJIT

Digital Forensics Lab Training - Cell Phone/PDA Sample sessions

Outline Of Classroom Management Plan (Management plan is designed for an elementary school placement. Refer to classroom map when needed.

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

15 Bad Things Identity Thieves Can Do With Your Identity

Page 1. Session Overview: Cryptography

Counselor Lesson Plan

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Welcome to Utah Career Days!

Oklahoma College App Week. Introduction

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

WOMEN'S SOCIETY OF CYBERJUTSU SPONSORSHIP OVERVIEW Women s Society of Cyberjutsu

KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS

Penn State Smeal MBA Program Career Fair Success Strategies

Choose Your Event Geography Awareness Week 2010 Event Ideas

BE SAFE ONLINE: Lesson Plan

Cybersecurity Protecting Yourself, Your Business, Your Clients

CSI NIGHT. 1. Set a date: Give yourself at least four months of planning/preparation time.

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009

The Top Ten of Information Security - For 2015

Learn to Play Science and Technology With This New Program

PROGRAM GUIDE Developed through the BB&T Center for Ethical Business Leadership

Information Security. CS526 Topic 1

The College of Southern Maryland. WOMEN & STEM programs Dr. Brad Gottfried, President

ACTIVITIES. SECTION 3 Company Tours

We suggest starting your planning with the following initial thoughts. Make sure you clearly outline the following foundations:

What legal aspects are needed to address specific ICT related issues?

explore/ discuss/ HNC/ HND/ choose/ learn/ experience/ apply now/ degrees/

DHS. CMSI Webinar Series

The CSI Forensic Science Program

Charleston Southern University. CSU Camp. June 16 th 20 st, 2014 Participant Application

Summary Report from the. Girls Workshop. Cool Careers for Girls in Cybersecurity. April 21 st, University of Maryland, College Park, MD

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness

WCA WEBINAR SERIES: The Case for Cyber Security Training

Name of presentation Company name

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

William Herrera, M.Ed.

Identity Theft Still a Major Problem

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach


Information Security Awareness Training and Phishing

faculty of engineering, computing and mathematics Girls in Engineering (GiE)

Iowa Thespian Festival

Cool Careers in Cybersecurity for Girls Workshop C34G

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved

White Collar Criminal Defense, Internal Investigations & Corporate Compliance

Northrop Grumman. Foundation. Annual Report

NC State Engineering Career Fair FAQ s for Companies. How do I register for the Engineering Career Fair?

Georgia Tech College of Management

STATEMENT OF BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

(Pilot Version) CC Hiring Managers Onboarding Toolkit

NYC CERT POST GRADUATION BOOKLET. A step by step guide for team development following the 10-week NYC OEM CERT Basic Training

Learning English with CBC Radio Living in Alberta. Identity Theft

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

1 Billion Individual records that were hacked in

VIRGINIA TECH IEEE CORPORATE SPONSORSHIP PACKAGE

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

CYBERSECURITY: Is Your Business Ready?

RECONNECT Workshop Mathematical and Computational Tools of Cybersecurity

Standard 9: The student will identify and explain consumer fraud and identity theft.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

What is Management Responsible For?

Falmouth Institute On-Site Training Process and Procedures

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

Cybersecurity High School and Beyond

About Our 2015 WTA Cyber Security Speakers and Sessions

DUKE UNIVERSITY Nonprofit Management Intensive Track Program, ID: May 5-8 & May 19-22, 2014 Charlotte NC / Gardner-Webb University

Cyber Security 2012 Carnegie Mellon University

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

TMCEC CYBER SECURITY TRAINING

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

Maryland K-12 Cybersecurity Education Summit Overview

EVENT PLANNING CHECKLIST

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Protecting Privacy & Security in the Health Care Setting

How-To Guide: Cyber Security. Content Provided by

Sponsored by National Science Foundation

Foundations of Computer Security

Welcome to total peace of mind.

CYBERSECURITY AWARENESS TRAINING

Enterprise Network Security Classes

ROLES TO ASSIGN. 1. Judge. 2. Courtroom Deputy. 3. Prosecutor 1 opening statement. 4. Prosecutor 2 direct of Dana Capro

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Transcription:

Cool Careers in Cybersecurity for Girls Workshop May 29, 2014 10 a.m. to 1:30 p.m. Careers Program Building at Hagerstown Community College - Hagerstown, MD

Educational Technology Policy, Research and Outreach, the K12 lead of the National CyberWatch Center, is excited to partner with Hagerstown Community College and Maryland Department of Business and Economic Development to offer an outstanding opportunity to explore the field of cybersecurity. The Cool Careers in Cyber Security for Girls Workshop would not be possible without women professionals volunteering their time. We would like to thank the women from the following organizations who volunteered their time to help middle school girls understand how their innate gifts and interests can help them have a successful career in any STEM field. DISA (Defense Information Systems Agency) General Dynamics (GDIT) George Washington University Hagerstown Community College Montgomery College National Security Agency (NSA) Northrop Grumman Corporation Norwich University University of Maryland University College (UMUC) Thank you once again for your time and commitment to this event. 2 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

Speaker Guide Educational Technology Policy, Research and Outreach, the K12 lead of the National CyberWatch Center, in partnership with Hagerstown Community College and Maryland Department of Business and Economic Development, thanks you for volunteering to present at the Western Maryland Cool Careers in Cybersecurity for Girls Workshop. We could not do this without your willingness to share your experiences with our middle school girls. This speaker guide will help you prepare for the day and assist you in answering student questions. It contains: Scenario Agenda Annotated Agenda with additional ideas on ways you can help the event go smoothly Activities and clues (in case you are curious about the crime) Questions students have asked Women STEM Professionals about Cyber Security in the past Directions and parking information 3 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

Scenario Middle school girls become Cyber Super-Investigators (CSI) for a day to solve a cybercrime. During this interactive crime solving event, girls learn from women in diverse companies and agencies about what it takes to navigate the professional pipeline in the vast fields of Cybersecurity and Information Assurance, as well as other science, technology, engineering, and mathematics (STEM) fields. The middle school girls complete hands-on activities with guidance from cybersecurity and STEM professionals in order to gather clues to help solve the crime. This year s cybercrime scenario focuses on industrial espionage. The FBI estimates that every year billions of U.S. dollars are lost to foreign and domestic competitors who deliberately target economic intelligence in flourishing U.S. industries and technologies. In the case of our scenario, the Cool Careers Cyber Crime: Perfection Hair Styler Vs Flirty Hair Tools, Steve Davey pled guilty to federal charges that he stole and disclosed trade secrets concerning a new hair straightener and styling tool developed by Perfection Hair Styler. Davis was employed by Left Industries, a subcontractor of Perfection Hair Styler that had been hired to assist in the development of the new hair styling system. Related Content Davey had made disclosures of technical drawings to new hair straighter and styler tool overseas competitors Flirty Hair Tools, Inc., HAI Elite! and ION, LLC. The disclosures were passed along electronically, sometimes as files hidden within pictures. Davey was arrested and indicted on counts of wire fraud and theft of trade secrets. Davey was sentenced to two years and three months in federal prison. The all girls middle school Cyber Super-Investigators (CSI) has been hired to investigate in greater detail how the trade secrets were stolen and make recommendations to Perfection Hair Styler to ensure this does not happen again. The girls will collect and explore a variety of digital and physical evidence to learn more about stolen trade secret instance. Clues provided by the lead investigators, the cyber professionals speaking at the Cool Careers in Cybersecurity for Girls Workshop, will help the middle school girls solve the crime! 4 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

9:30 am Arrival Meet the Cyber Career Speakers 10:00-10:15 am Welcome and Introductions Dr. Davina Pruitt-Mentle Theresa Shank Anthony Hanners 10:15-10:25 am Setting the stage for scenario and activities/video 10:25-10:45 am Activity 1/ Rotation 1 10:50-11:10 am Activity 2/ Rotation 2 11:15-11:35 am Activity 3/ Rotation 3 11:40 am - Noon Activity 4/ Rotation 4 Noon - 12:20 pm Organize at Lunch Tables 12:20-12:50 pm Activity 5 Lunch Keynote Speaker/Panel 12:50-1:15 pm Activity 6 Solve the Cyber Crime, Thank You s and Evaluations 5 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

If you should find a lost student this will help you direct her. All events take place here Restrooms are located here 6 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

Arrival 9:30 a.m. 10:00-10:15 a.m. 10:15-10:25 a.m. Meet CyberCareer Speakers Welcome and Introductions Setting the stage for scenario and activities/video Agenda with Notes Buses are scheduled to arrive between 9:30 and 9:45 a.m. It would be great if speakers could make themselves available to talk to students who arrive before 9:45. Quotes about why our speakers say their careers are cool will be shown throughout the room. Speakers can walk around the room or stay close to their assigned table. We will encourage students to take advantage of this time to introduce themselves to the speakers and ask a few questions. We will have coffee and refreshments for presenters in the AM The restrooms are indicated in the above map. Speakers can help usher students toward the appropriate tables. Students must be in their seats by 9:55 so that we can begin on time. Students are asked to stay at their assigned tables and rotate as a group as detailed in the schedule. Students will be welcomed and the organizations which have supported us with speakers will be introduced. Welcome and Introductions: Dr. Davina Pruitt-Mentle, ETPRO/National CyberWatch Center K-12 Division Theresa Shank, Dean, Continuing Education and Community Services Anthony Hanners, Cybersecurity Recruiter, Hagerstown Community College Logistics will be covered about how the day will proceed. An introductory video will be shown to set the stage for the cybercrime students will be asked to solve. 7 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

10:25-10:45. 10:50-11:10 11:15-11:35 11:40 12:00 12:00-12:20 12:20-12:50 12:50-1:15 Activity 1 Activity 2 Activity 3 Activity 4 Organize at Lunch Tables Activity 5 Activity 6 Students will be pre-assigned starting tables and will rotate as a group as detailed in the schedule. We have allowed 5 minutes between rotations; however, you are welcome to begin as soon as all ladies are seated and ready to begin. During the Activity 4 please thank students for being so polite and cooperative up to this point and remind them that there is still more to come. Groups will stay at the Activity 4 table for the luncheon speaker and lunch. Teachers and volunteers will be bringing the box lunches to the tables. Along with parents, chaperones and teachers we ask speakers to remind students to unwrap their lunches as soon as possible so that noise is limited during the keynote speakers presentation. The lunchtime speaker is going to begin promptly at 12:20 so the students need to be in their seats, quiet and ready to pay attention. Setting the expectation after this last session will help us stay on schedule. No one will be allowed to enter or leave the room during the keynote speaker session. Dr. Davina Pruitt-Mentle: Introduction Lunch Keynote Speaker/Panel Dr. Davina Pruitt-Mentle, Closure Solve the Cyber Crime, Thank You s and Evaluations 1:15 Depart Load Buses 8 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

This table lists the Table each presenter is assigned and the groups that each will interact with for each rotation. Table 1 2 3 4 5 6 7 8 Presenter, Organization, Topic, Activity Carrie, General Dynamics Crypto, Breaking message Steg, which picture has the file Katya, Norwich University Dig For, Find the USB drives Katharine, DISA Stephen, Hagerstown CC Physical Security, Lock Picking Jeanann, Montgomery College CompSc 1, Find the missing part Comp Sc 2, Makey Makey Emma, UMUC CompSc 1, Find the missing part Comp Sc 2, Makey Makey Renee, NGC Crypto, Breaking message Steg, which picture has the file Silvia, Montgomery College Dig For, Find the USB drives Julie, GWU Physical Security, Lock Picking START & Rotation 1 Rotation 2 Rotation 3 Rotation4 Springfield 1 Springfield 4 Springfield 3 Springfield 2 Springfield 2 Springfield 1 Springfield 4 Springfield 3 Springfield 3 Springfield 2 Springfield 1 Springfield 4 Springfield 4 Springfield 3 Springfield 2 Springfield 1 Springfield 5 Northern 3 Northern 2 Northern 1 Northern 1 Springfield 5 Northern 3 Northern 2 Northern 2 Northern 1 Springfield 5 Northern 3 Northern 3 Northern 2 Northern 1 Springfield 5 9 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

This table lists the starting position and rotations for each of the schools WHO Abbreviation/Group # Number of students/chaperones Springfield 1 Springfield 1 9 students/ 1 chap Springfield 2 Springfield 1 9 students Springfield 3 Springfield 1 9 students/ 1 chap Springfield 4 Springfield 1 9 students Springfield 5 Springfield 1 9 students Northern 1 Northern 1 8 students/ 1 chap Northern 2 Northern 2 9 students Northern 3 Northern 3 8 students/ 1 chap START & Activity 1 Activity 2 Activity3 Activity 4 & Stay for lunch TABLE TABLE TABLE TABLE 1 2 3 4 2 3 4 1 3 4 1 2 4 1 2 3 5 6 7 8 6 7 8 5 7 8 5 6 8 5 6 7 SCHOOL District School Teacher Chaperones Springfield Middle Washington Jennifer Joyce Liz Rohrer Northern Middle Washington Shelly Telemeco Heather Williams 10 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e

Physical Security Activities and Clues: Just in case you are curious about possible clues to the crime Topic Clue Activity Physical security is important! Copies of the trade secrets are kept under lock and key. But how safe is the lock? What recommendations does the team have for physical security access? Lock Picking Cryptography Steganography Digital Forensics 1 Computer Science 1 Computer Science 2 The trade secrets were embedded within digital photos, but which ones and using what settings? An encrypted message was used to send instructions. Can you break the code? What recommendations does the team have for more secure codes? Several pictures are presented. Which picture contains the stolen trade secret files? How can you tell? Could you have detected the hidden message without the cryptographic instructions? How could you protect against this type of threat? What are potential ways for thieves to steal or copy important information? Today many companies do not allow electronic or storage devices to be taken into work. Several organizations/companies actually inspect coats, bags, and briefcases to make sure the policy is followed. Hidden USB drives can be planted in women s jewelry bag and/or brief cases. Can you find all the hidden storage devices? What recommendations would you suggest to protect against the threat of removable media such as thumb drives? Evidence was found on the thief s work computers. However, they have been disassembled. Further investigation reveals parts are missing. What parts were missing? A key part of being a cyber investigator is not only seeing what is there, but also noticing what is missing. Evidence was found on the thief s home computer. However, the keyboard is missing. Is there another way to use the computer without a keyboard? Frequency Chart and Cipher Which picture has the files? Find the USB drives Find the missing parts Makey Makey

Questions Students have asked about CyberSecurity and Women STEM Professionals in the past Students have asked these questions in the past. You may want to think about how you would answer these questions if asked. Cybersecurity careers How is cybersecurity used in today s jobs? How does cybersecurity affect other jobs? What types of jobs are cybersecurity jobs? What are the job responsibilities in each of the cybersecurity fields? How many hours a day do cybersecurity employees work? How much do cybersecurity workers get paid? What kind of people do cybersecurity professionals work with? What courses should I take if I am interested in this field? Connection of cybersecurity to other careers What other areas help support cybersecurity? Who needs cybersecurity? How does cybersecurity protect us? How will knowing about cybersecurity help me with my career? How can I become more familiar with how computers work? Hackers How do you become a hacker? What do you need to know? What do Hackers know? And what do they do? What do they want from me? Security of personal data and computers How are we protected on the internet? How do you keep information safe on the internet? How do the various computer programs work to protect my information? How do I protect my computer and information? How safe is my computer now? How do I get rid of viruses? Women STEM Professionals What do you wear to work? Do you have a family? Is it hard to work and have a family What benefits does your company offer? Do you travel? What hours do you work? How many women do you work with?

Directions The Career Programs Building (CPB) at Hagerstown Community College http://www.hagerstowncc.edu/about-hcc/our-locations/hcc-main-campus/map 11400 Robinwood Drive, Hagerstwon, Maryland 21742-6514 Career Programs Building The newly renovated Career Programs Building was dedicated in 2009. It is now home to The Merle S. Elliott Continuing Education and Conference Center, with five conference rooms and an expanded Valley Eatery, a tiered lecture hall that seats 66 students, science labs, a comfortable atrium, an outdoor fountain, and outdoor seating area at the Valley Eatery. It is also home to state-of-the-art facilities for nursing, radiography and other health sciences programs, as well as the industrial technology program and HCC s Reprographic Services, IT department, and campus mail room. The event will be take place in rooms 210-212-214 (will be opened up to make one large room). Speakers are asked to park in Parking lot F and then enter building, come up stairs to second floor. Please place the parking permit in dashboard of your vehicle. 13 C o o l C a r e e r i n C y b e r s e c u r i t y f o r G i r l s W e s t e r n M D S p e a k e r G u i d e