When

3rd & 4th December, 2018 07:00 am - 06:00 pm

Website: NICE K12 Cybersecurity Education Conference

Where

Grand Hyatt
600 E. Market Street
San Antonio, Texas, USA, 78205
See map

Subscribe & Share

December 3, 2018, 4:40 pm

Poster Sessions

 Attend

Poster Sessions:

Presenter: Diane Cornwell
Talk Title: Earning College Credit with Free Online Cybersecurity Courses
Description: The TEEX and National Response and Recovery Center offers 10 online cybersecurity courses that are eligible for college credit. These courses are offered at no cost to the student through funding from DHS/FEMA. The audience will be introduced to the 10 online cybersecurity courses TEEX offers at no cost. Courses can be used to supplement existing curriculum or could be used as the basis for lessons. Through these courses, students will be exposed to various topics in cybersecurity including digital forensics, cyber ethics, secure software, information security basics, secure networking, and cyber incident analysis and response. Upon completion of all 10 courses, students are eligible to earn 6 college credits through the American Council on Education. The audience will learn more about each course and how they can be used in schools to increase cybersecurity and help students earn college credit.

Presenter: Michael Dunn
Talk Title: Proposed Cybersecurity Merit Badge for the Boy Scouts of America
Description: This poster describes recent efforts to a proposed new Cybersecurity merit badge to the Boy Scouts of America (BSA), including draft requirements and current status. A background on the merit badge program is presented, including research supporting the idea that badges can be an effective method at engaging young people in experiential learning. A set of draft recommended requirements is presented. The authors have drafted a proposal for consideration by the BSA, and this poster reports the status of that proposal and the authors’ efforts at engaging the BSA. Come and provide feedback on the proposal.

Presenters: Bill Newhouse & Clarence Williams
Talk Title: The NICE Cybersecurity Workforce Framework
Description: The NICE Cybersecurity Workforce Framework (NICE Framework) improves communication about how to identify, recruit, develop, and retain cybersecurity talent. It is a resource from which organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of workforce development, planning, training, and education. Come learn how this applies to the K-12 setting.

Presenter: Jim Smith
Talk Title: Reverse Engineering Cybersecurity Professionals in K12
Description: This session will walk attendees through the use of backward mapping techniques to “reverse engineer” how we develop future cybersecurity professionals during extended learning time. This interactive session will have attendees reverse engineer the career development process. A pseudo job description is provided, and the group will walk through the process of creating a talent supply chain customized to their organization's unique needs. Participants leave with an increased understanding of a community stakeholder model, talent supply chains, and reverse engineering cybersecurity careers in a K12 setting.

Presenter: Fran Bromley-Norwood
Talk Title: Cybersecurity Now...for our Future
Description: The state of Nevada has recognized the extreme need for skilled cybsercurity specialists and is trying to help decrease those numbers by educating high school students in that area. The Nevada Department of Education approved the Cybersecurity Career and Technical Education Program of Study to begin during the 2018-2019 school year. The content, student expectations, and certifications obtained during this four-year program of study will be addressed.

Presenter: Adam Cavazos
Talk Title: CyberTexas Foundation: An Approach in Cybersecurity Education
Description: CyberTexas presents ideas, methods and their portal, corresponding to the CyberPatriot program. Leaders and educators will begin understanding components to starting a K-12 cybersecurity program. This poster session will share ideas and knowledge of the various methods of education in cybersecurity principles including a clear understanding of next steps to grow their programs. Further, participants will be provided with the rationale to connect to and grow the cybersecurity proficiencies in K-12 through participation with CyberTexas Foundation and or similar organizations with a community of educators and students.

Presenter: JoJo DeFelippis
Talk Title: Experiencing Cyber: An Exploratory Study on the Outcomes of Cybersecurity Training
Description: It is difficult to train, recruit, and sustain a workforce of cyber professionals. It is necessary to identify methods to overcome organizational cybersecurity training shortfalls when also faced with threats to information systems and attrition rates. Effective cybersecurity training is dependent on a framework, curriculum, and a dynamic simulation platform that accommodates the student, the mission, the threat environment, and the information system. There is no readily available framework for experiential cyber training curricula to govern the new generation of cyber professionals as they prepare to protect critical infrastructure and tackle the safeguarding emerging technologies. This exploratory study will assess the objectives, syllabi, strategies, and learning outcomes of a traditional cybersecurity program and a program that has already started deploying experiential learning strategies. Preparing the new generation of cyber professionals by identifying and leveraging curricula development strategies that incorporate experiential learning techniques could allow students and leaders to see the immediate value and application of content to current and future cyber operational needs.

Presenter: Sascha Kettler, Germany
Talk Title: The Twelve Pitfalls of Cloud Use
Description: IT teams must be able to assess the dangers of cloud use. This session will share the risks and offer proposals for practical solutions. It appeals to IT security managers to develop vigilance against insider threats and parasitic attacks and to fulfill their duty of care. The IT security controller provides specific recommendations to minimize the risk of misuse and externally forced data loss.

Hall: Texas Ballroom Corridor Track: Drop In Session Type: Poster Session

Speakers:


Attendees: