Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.



Similar documents
US Cyber Challenge: Finding the people who canwin in cyberspace? Alan Paller Director of Research, SANS Institute

Cybersecurity High School and Beyond

The fast track to top skills and top jobs in cyber. Guaranteed.

Center for Infrastructure Assurance and Security

Securing Networks, Securing Futures

Air Force Association s CyberPatriot The National High School Cyber Defense Competition

The fast track to top skills and top jobs in cyber. Guaranteed.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

Innovation, Partnership, Development

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

Hosted by Lunarline: School of Cyber Security

Fast Facts About The Cyber Security Job Market

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

SMALL BUSINESS PRESENTATION

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Re-Imagining the Cyber Warrior of the Future

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

The Collegiate Cybersecurity Championship Cup. Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

Information Security Engineering

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

The Computerworld Honors Program

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

How To Become A Cybersecurity Consultant

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

SMALL BUSINESS PRESENTATION

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

Log in to a Distinguished Tradition. Since MASTER OF SCIENCE IN. Information Security & Assurance. Online

CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE

Cyber Learning Solutions

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

OVERVIEW DEGREES & CERTIFICATES

Contestant Requirements:

Course Descriptions November 2014

DIGITAL FORENSICS CONSORTIUM

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

Northrop Grumman. Foundation. Annual Report

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Ccybersecurity Education

: COMPUTER SECURITY SUMMER CAMP FOR HIGH SCHOOL STUDENTS

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014

Background ( )

Housekeeping. Twitter: #ACMWebinarSec

Cyber Security Strategy of Georgia

USF Graduate Catalog SECTION 23.

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Increase insight. Reduce risk. Feel confident.

(BDT) BDT/POL/CYB/Circular

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

How To Get A Ph.D. In Sport Management At Trotson University

Master of Cyber Security

Huntsville Community. SAIC s K-12 STEM Involvement

NYU Reynolds / D-Prize Social Venture Competition. Spring First Round Application Packet

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Microsoft DreamSpark (MSDN) User Guide

Building the Next Generation of Cyber Defenders

Frequently Asked Questions

Financial Planning Challenge 2012

CyberSkills Management Support Initiative

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Manned Information Security

DoD Cyber Crime Center DC3. AFCEA Luncheon

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

Lessons from Defending Cyberspace

Preparing Millennials to Lead in Cyberspace

National Cybersecurity Awareness Campaign

I n t r o d u c t i o n

2015 Councils & Committees

KEEP MOVING FORWARD NATIONAL UNIVERSITY ASSOCIATE S, BACHELOR S, & MASTER S DEGREES CERTIFICATES CREDENTIALS 800.NAT.UNIV GETINFO.NU.

Define & Assess Skills - Smart Grid Security Specialists

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

S. ll IN THE SENATE OF THE UNITED STATES

2015 CyberPatriot Conference

Information Assurance Curricula and Certifications

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

2016 BOMA SAN DIEGO MEMBERSHIP SCHOLARSHIP APPLICATION

Exploring a National Cyber Security Exercise for Community Colleges

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif


Report on CAP Cybersecurity November 5, 2015

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Becoming a Cyber Professional: A Discussion with Recent Graduates

National Rankings AND RECOGNITION. Bloomberg Businessweek. Princeton Review. Hispanic Business. Since 2007 inaugural rankings.

Rules/Restrictions for Scholarship Applications:

CyberPatriot Program Update April 2015

Cybersecurity on a Global Scale

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

International master s scholarship program of Université Paris-Saclay Academic year

Protection of Essential Infrastructure and Services

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

Undergraduate and Post-baccalaureate Program Initial Application Process Procedure:

800.NAT.UNIV getinfo.nu.edu/transfer

Transcription:

US Cyber Challenge To view the complete article, please go to http://csis.org/uscc Part of the: Technology and Public Policy Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community. The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cyber security practitioners, researchers, and warriors. Some will become the top guns in cyber security. The program will nurture and develop their skills, give them access to advanced education and exercises, and where appropriate, enable them to be recognized by colleges and employers where their skills can be of the greatest value to the nation. Select the Competition That Interests You CyberPatriot Defense Competition An Air Force Association national high school cyber defense competition DC3 Digital Forensics Challenge

A Department of Defense Cyber Crime Center competition focusing on cyber investigation and forensics Netwars Capture-the-Flag Competition A SANS Institute challenge testing mastery of vulnerabilities Cyberspace Policy Review Document from the White House http://www.whitehouse.gov/files/documents/cyber/the%20united%20states%20cyber%20challenge%201.1%20(updated% 205-8-09).pdf Frequently Asked Questions 1. Why is this competition important to the nation? The US Cyber Challenge is a national talent search and skills development program. Its purpose is to identify 10,000 young Americans with the interests and technical computer skills to fill the ranks of cyber security practitioners, researchers, and warriors. In particular, the search is looking for the people who can become the top guns in cyber security. The identification process relies on national competitions Ð with many winners. They include CyberPatriot high school competition conducted by the Air Force Association, the DC3 Digital Forensics Challenge conducted by the US Department of Defense Cyber Crime Center, and the NetWars vulnerability identification competition conducted by the SANS Institute.

2. What if I don't live in the United States? If you live outside the US, you may still enter two of the competitions. However, you will not be invited to participate in the post-competition skills development programs. Several European nations are establishing parallel competitions. 3. Where do I learn about the competitions and sign up? CyberPatriot DC3 Digital Forensics Challenge SANS Network Attack Competition 4. When do the competitions start? They have already begun. For registration information, visit their web sites. 5. Which of the three competitions should I enter? Download this USCC competition table for more information. 6. Is this an individual or team competition? All three competitions allow teams to compete. Two competitions (Digital Forensics Challenge and NetWars) may also be entered by individuals. 7. If a team, may I form my own team? And do I need a mentor? You may form your own team. CyberPatriot requires mentors. The other two competitions do not. CyberPatriot teams must be supported by the AFJROTC or CAP unit associated with their high school, and each team is required to have a team advisor designated by their unit. 8. May I enter more than one? Yes.

9. Will the competition/ test be given in our area/region? These competitions were selected for the US Cyber Challenge because they are online and allow people to participate from any part of the nation. CyberPatriot finals are held in Florida. Eight teams are flown to Florida in February, all expenses paid, to compete in the finals. 10. Is there an entrance fee? No entrance fees are required at this time to participate in any of the competitions. 11. What are the benefits I can expect if I do well? Promising candidates will be recognized and their local papers will be told of their success. In addition, they will be invited to attend regional "cyber camps" to be held at local colleges, where they will develop their skills more fully and participate in additional competitions. (The cyber camps are expected to begin in 2010 and may not be available in all parts of the country.) Candidates who rise to the top in these regional programs will be invited to participate in live national challenges like those coordinated by the University of Texas at San Antonio and NYU Polytechnic. Greatly promising candidates from these programs will have a real leg up in competitions for scholarships to study advanced cyber security programs at professional development programs like those run by the SANS Institute or at colleges and graduate programs at participating schools. Finally, the best of the candidates will be introduced to key federal agencies and corporations where the most advanced cyber security work is being done. Although no promises of employment can be made, these organizations are facing extreme shortages of security experts with extraordinary, hands-on technical skills, and these organizations are assisting in the design and operation of the US Cyber Challenge because they look forward to finding additional candidates for their most challenging assignments. 12. How can I promote this competition?

You can download a printable PDF poster for the US Cyber Challenge here. Please send your additional questions about the cyber challenge and/or any of the three competitions to uscc@sans.org.