John Knight – Information Security Ivy Tech Community College Northeast Fort Wayne Indiana.

Slides:



Advertisements
Similar presentations
Demonstrating the Legal Sustainability of Effective STEM Diversity Programs Wanda E. Ward Ph.D., Discussant Sr. Advisor to the Director Office of the Director.
Advertisements

The Readiness Centers Initiative Early Education and Care Board Meeting Tuesday, May 11, 2010.
National Academy of Engineering of the National Academies 1 Phase II: Educating the 2020 Engineer Phase II: Adapting Engineering Education to the New Century...
Presented by the US Department of Education. More information at
What Did We Learn About Our Future? Getting Ready for Strategic Planning Spring 2012.
Improving Educational Outcomes Jackie Dowd Special Assistant to the Governor for Career Innovation Indiana Association of Public School Superintendents.
Georgia’s Alliance of Education Agency Heads Strengthening Georgia’s Education System Through Statewide Collaboration
SOUTH CAROLINA Broadband Study Committee December 12, 2007 EDUCATION AND ECONOMIC DEVELOPMENT ACT OF 2005.
Framing Our Conversation
NTUST National Taiwan University of Science and Technology 2009 School of Management.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
Funding Opportunities NSF Division of Undergraduate Education North Dakota State University June 6, 2005.
The Directorate for Education and Human Resources (EHR) Diana L. Burley, Ph.D. Program Director Division of Undergraduate Education National Science Foundation.
External Reports Overview Presentation for the ENG Advisory Committee By Michael Reischman Deputy Assistant Director for Engineering.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
Overview CSE 465 Information Assurance
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
Council on Undergraduate Research. “Learning Through Research”
1 Sustaining Technical Programs The NSF’s Advanced Technological Education Program and American Competitiveness Mike Lesiecki, MATEC A Member of the Academic.
College and Career Transitions Initiative CCC System Office Career Pathways Report.
Performance Institute - July 20, 2001 Dagne Fulcher, IT Workforce Improvement U.S. Department of the Treasury Recruiting & Retaining Top IT Talent for.
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
Corrinne Sande Whatcom Community College Bellingham, WA.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
PJC Adult High-UWF PDS An Alternative – Professional Development School that depends on community involvement.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
Partnerships and Broadening Participation Dr. Nathaniel G. Pitts Director, Office of Integrative Activities May 18, 2004 Center.
Board of Trustees Orientation September 23, 2014 Dr. George Railey Vice Chancellor of Educational Services and Institutional Effectiveness 1.
Wayne Patterson Director of the Cybersecurity Research Center November 28, 2011 Howard University Cybersecurity Research Center.
Detroit Regional Manufacturing Skills Alliance. History In late 2006 the Detroit Regional Chamber was selected as the convener for the advance manufacturing.
Advanced Technological Education (ATE) The ATE program promotes improvement in the education of science and engineering technicians at the undergraduate.
National Science Foundation 1 Evaluating the EHR Portfolio Judith A. Ramaley Assistant Director Education and Human Resources.
Career and Technical Education Update CTE Fall Workshop October 2, 2012 Sharon W. Wendt CTE Team Director, DPI.
Thoughts on the National Research and Development Center for Cyber Defense Ferenc FRIEDLER University of Pannonia Veszprém, Hungary 3rd Information Security.
1 Investing in America’s Future The National Science Foundation Strategic Plan for FY Advisory Committee for Cyberinfrastructure 10/31/06 Craig.
Neuroscience Program Michigan State University Joe Lonstein Yanny Lau.
NSF IGERT proposals Yang Zhao Department of Electrical and Computer Engineering Wayne State University.
  “The Common Core State Standards are an example of states recognizing a problem, then working together, sharing what works and what doesn’t.” - Former.
The Common Core State Standards. Why Do We Need the Common Core Standards?
Educating the Next Generation Energy Workforce Idaho Rural Partnership Board of Directors Meeting July, 14, 2010 Melinda Hamilton Director,
Committee Meeting, June 9, 2008 Strategic Institutional Research Plan.
CACE Standing Curriculum Meeting CACE Standing Curriculum Meeting.
Center for Cybersecurity Research and Education (CCRE)
New Perspectives on Engineering Education and the Job Market: Challenges, Opportunities Dr. Samir AL-Baiyat Dean, College of Engineering Sciences, King.
Why does my Elementary Student Need to Know about Maryland's New CyberSecurity CTE Track? Friday 11: :30 Davina Pruitt Mentle, Ph.D. Educational.
Social Work Education Development in Vietnam: A case of SWEEP Program Alice Hines, MSW, Ph.D. Edward Cohen, MSW, Ph.D. Hoa T. Nguyen, MSW, Ph.D. Candidate.
CyberPatriot Workshop New Coach Training. Intros - name, school, job title + why interested in CP. Also, any other contests? CyberPatriot Overview - who,
1 HIGHER EDUCATION PROGRAMS AT NASA K. E. BLANDING, PH.D. Acting Director, Higher Education Division NASA Office of Education.
Do You Want to be Nominated to Win $10,000 ? Amy Burks Debbie Madjlesi MSTA Fall 2014.
Past, Present, & Key to our Future. * In 1995 a survey was conducted across DE and it was found that the predominant form of Science Education was textbook.
PERKINS IV AND THE WORKFORCE INNOVATION AND OPPORTUNITY ACT (WIOA): INTERSECTIONS AND OPPORTUNITIES.
1 25 STRONG WORKFORCE RECOMMENDATIONS IMPLEMENTATION OVERVIEW #strongworkforce DoingWhatMATTERS.cccco.edu.
Strength through Industry & Technology National Defense Industrial Association “The Premier Defense Association!” The Voice of the Industrial Base.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
CAA Review Joint CAA Review Steering Committee Charge Reason for Review Focus Revision of Policy Goals Strategies Milestones.
 The NEFEC STEM Initiative Nancy Thompson Supervisor of Curriculum and Instruction.
STEM & CTE UPDATE Mark LewisLaura Roach Patrick Crane STEM/CTE Policy Director CTE Director, Dept. of Education Director, CCWD Chief Education Office.
UTPA 2012: A STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS-PAN AMERICAN Approved by President Cárdenas November 21, 2005 Goals reordered January 31, 2006.
Perkins End of Year Evaluation Southwestern Community College May 18, 2016.
Presented by Sri Sridharan, Managing Director & Chief Operating Officer.
Teaching Network Security - Lessons Learned Homeland Defense and Security Education Summit February 27 &28, 2007 Margaret Leary Associate Professor Northern.
1 Commonwealth of Massachusetts STEM Advisory Council Moving the STEM Agenda Forward CONFIDENTIAL DRAFT FOR POLICY DEVELOPMENT PURPOSES ONLY STEM Advisory.
Commonwealth of Massachusetts STEM Advisory Council
Making A Plan Setting A Goal
CSE Strategic Planning Background
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Council on Undergraduate Research
National Quantum Initiative
Cybersecurity Workforce Development for the Nation
Presentation transcript:

John Knight – Information Security Ivy Tech Community College Northeast Fort Wayne Indiana

 WHY ARE WE HERE?  In part…

1. S O B N G H 2. L D T W I N 3. E S Y R T C 4. E Y R K V L

 C Y B E R S E C U R I T Y

 NIST – NICE Initiative  Culture Shift  MATH = | Internet = ~12  Need for 60,000 trained Cyber Warriors

 Our nation is at risk. The cybersecurity vulnerabilities in our government and critical infrastructure are a risk to national security, public safety, and economic prosperity  Draft_NICE-Strategic-Plan_Aug2011.pdf Draft_NICE-Strategic-Plan_Aug2011.pdf

 Now is the time to begin a coordinated national initiative focused on cybersecurity awareness, education, training, and professional development.  Draft_NICE-Strategic-Plan_Aug2011.pdf Draft_NICE-Strategic-Plan_Aug2011.pdf

 The United States must encourage cybersecurity competence across the nation and build an agile, highly skilled workforce capable of responding to a dynamic and rapidly developing array of threats.  Draft_NICE-Strategic-Plan_Aug2011.pdf Draft_NICE-Strategic-Plan_Aug2011.pdf

 Please use the clicker to answer

1. K-12 Teacher 2. K-12 Administration 3. 2yr Faculty 4. 2yr Administration 5. 4yr Faculty 6. 4yr Administration 7. Government sector 8. Private sector 9. Business sector

1. DOS - CPM 2. Windows 3x 3. AS Windows 9x 5. NT Windows XP 7. Windows Vista 8. Linux

 Your position/responsibilities  Your interest  Your curriculum  Your policy  Your program  Your budget  Your experience

 A core discipline in U.S. school mathematics since late 1700’s ◦ Ben Franklin: arithmetic, geometry, astronomy, classics, accounts, gardening, good breeding ◦ Mathematics “to enhance mental discipline” ◦ Committee of Ten (1893): justification “ for mental discipline, life, and college entrance” ◦ (Kliebard & Franklin, 2003) ◦ Slide adopted from NIST conference September 21, 2011

 ~1900: Grew out of psychology, first mathematics education research dissertations at Teachers College, Columbia University  1967: national conference on needed research in mathematics education (University of Georgia) ◦ Patrick Suppes: suggests serious work on building theories of mathematics learning ◦ Tom Romburg and M. Vere DeVault: research needed on mathematics curriculum ◦ Bob Davis: grades 1-9 curriculum on discovery approach  1970 : Journal for Research in Mathematics Education  Slide adopted from NIST conference September 21, 2011

 73 Ph.D programs in mathematics education across the US* ◦ 18 in Departments of mathematics ◦ 50 in Schools and Colleges of Education ◦ 5 Cross-listed ◦ * ◦ Slide adopted from NIST conference September 21, 2011

 Late 1990s – present: “Math Wars”  2008: National Mathematics Advisory Panel (National Mathematics Advisory Board Final Report: Foundations for Success) 2009: Common Core State Standards in Mathematics (state-led effort coordinated by the national Governors Association Center for Best Practices and the Council of Chief State School Officers Slide adopted from NIST conference September 21, 2011

 ASSUMPTION: The computing, computer science and cybersecurity community is committed to seeing serious attention to their field in the K-12 curriculum – NICE  Assumption: The same will apply at the 2-yr community college level?

The Internet was born in 1990! Just over 21 years ago

 #1 threat to the US is cyber attacks  President Obama  Defense of the US begins at home on your computer –  Who is using your home computer?

 Chinese hackers: No site is safe - CNN - Featured Articles from CNN Updated September. 24, 2011 Chinese hackers: No site is safe - CNN - Featured Articles from CNN  They operate from a bare apartment on a Chinese island. They are intelligent 20-somethings who seem harmless. But they are hard-core hackers who claim to have... chines... chines...  Chinese hackers - Squidoo : Welcome to Squidoo Chinese hackers - Squidoo : Welcome to Squidoo  The Dark Visitor(click here) reveals the history, ideology, organization, exploits, and political motivations of the Chinese hacker network.  Hacking for Fun and Profit in China’s Underworld Hacking for Fun and Profit in China’s Underworld  The austere bedroom of a Chinese hacker. Legions of hackers are pilfering information from individuals, corporations and government.

 Who is going to be trained?  Who is going to train them?  Who is going to train the trainers?  Who is going to pay for the training?  Who is going to replace the retiring set?

 “implementation of the initiative will be very much a collaborative effort between federal, state and local government, industry, academia, non-government organizations and the general public.” NIST-NICE

 1. Raise awareness among the American public about the risks of online activities.  2. Broaden the pool of skilled workers capable of supporting a cyber-secure nation.  3. Develop and maintain an unrivaled, globally competitive cybersecurity workforce.

 38 Advanced Technology Education (ATE) Centers  Examples: ◦ CISSA – Palos Hills, IL ◦ CyberWatch – Largo, MD ◦ CSEC – Tulsa/Stillwater, OK ◦

 K-12  2Yr/4yr  Workforce  Business sector  Government sector  Department of Defense

 CyberPatriot is the premiere national high school cyber defense competition created to inspire high school students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our nation’s future.

 designed to give hands on exposure to the foundations of cyber security.  CyberPatriot is not a hacking competition.  CyberPatiot's goal is to excite students about Science, Technology, Engineering, and Mathematics (STEM) education 

 A CyberPatriot team consists of five students and up to five alternates. Each team must have a coach, normally a teacher or JROTC/CAP Leader.  The coach does not have to have any technical expertise, and generally serves as an administrator for the team.  Competitors must be at least 13 years old and enrolled in grades  Teams will have mentors (technical advisors) to help students prepare for the competition.

 an Advanced Technological Education (ATE) Center  Headquartered at Prince George’s Community College  Funded by a grant from the National Science Foundation (NSF). “Creating the Next Genereation of Cybersecurity Professionals” 

 mission is to increase the quantity and quality of the information assurance (that is, cybersecurity) workforce.  The CyberWatch goals are focused on information assurance (IA) education at all levels, from elementary through graduate school, but especially the community college level

 The CyberWatch goals include curriculum development, faculty professional development, student development, career pathways, and public awareness

 The National Center of Academic Excellence for Information Assurance 2 Year Education (CAE2Y), is a means of providing recognition to institutions that serve as a model for two- year schools by providing innovative, comprehensive, and multidisciplinary education and training in the IA field.

 While the CAE designation, which is a joint program of the National Security Agency (NSA) and the Department of Homeland Security (DHS), has been available to four- year schools for the past 13 years

 the community colleges and their IA programs became eligible for this designation for the first time in  CyberWatch and its lead institution, Prince George’s Community College, worked closely with the three federal agencies, NSA, DHS, and the NSF to make the CAE2Y a reality

 While the Committee on National Security Systems (CNSS) 4011 National Training Standard for Information Systems Security (INFOSEC) professionals provides a degree of standardization in technical courses, it does not provide a holistic review of the program, faculty capacity, institutional support, and other related aspects.

 Standardization of Curricula – CAE2Y represents a standard of IA curriculum accepted in the academic and professional communities.  Articulation - CAE2Y communicates to four- year institutions the quality and nature of a community college’s IA curriculum, thus facilitating articulation agreements.  Student Recruitment – CAE2Y is an attractant for students in the external and internal community.

 Student Job Placement – CAE2Y designation increases the opportunities for program graduates to find jobs. Industry understands better the skills students graduating from a CAE2Y program posses.  Industry Recognition and Support – CAE2Y provides industry recognition for the purposes of securing training contracts and industry support for grant applications.  Community Recognition – CAE2Y is a recognition respected and appreciated by the local and political community.

 The gap between 2-year Community College and major 4 year universities  Need for a Bachelors in “Technology”  i.e. Indiana does not have a pathway to its major universities that will incorporate the technology classwork from the community college level.

 1. Have a robust IA program  2. Complete the prerequisites – complete the mapping process by 31 August of the year submitting for CAE2Y and acquire TWO CNSS certifications  3. Address all criteria and complete the CAE2Y application on time (~January 15th)  4. Submit the CAE2Y application

 An institution applying for the CAE2Y designation must have an approved IA program, qualified faculty, and institutional support. Prior to submitting an application for the CAE2Y designation, IA courseware must be certified under the IA Courseware Evaluation Program enuID= l  Certification of TWO CNSS training standards are required: CNSS 4011 and one other.

 National Training Standard for Information Systems Security (INFOSEC) Professionals  National Training Standard for Senior Systems Managers (SSM)  National Information Assurance Training Standard for System Administrators (SA)  National Training Standard for Information Systems Security Officers (ISSO)  National Training Standard for Systems Certifiers  4016 – National Training Standard for Risk Analysts 

 The Center for Systems Security and Information Assurance (CSSIA) originated in 2003  It is a Regional Advanced Technological Education (ATE) Center for Cyber Security and Information Assurance.  CCDC  Training programs for Faculty – outstanding!

 Training!

 National Science Foundation has several other supported projects nationally. To see all NSF opportunities go to and check it out.  See:

 Cybersecurity is a National Defense concern  YOU need to understand its importance and use your position to see that cybersecurity finds its way into each and every curriculum  Cybersecurity at all levels of education: K-12, Community Colleges, and 4yrs institutions.  CCDC – CyberWatch and CSSIA brings a hands-on, real approach to education.  We can meet the Cyber Warrior needs with a change in current Culture.

 Must train faculity  Find funding (NSF, ATEs, grants)  Find the will to get this done  MATH took over a century Cybersecurity can’t wait