2023 National Cybersecurity Education Colloquium
Attachments
Photos
Agenda
Moraine 1&2 Monday, September 18th, 2023 |
|
07:00 - 08:00 am |
07:00
-
08:00 am
Registration and Breakfast
Moraine 1&2
|
08:00 - 08:30 am |
08:00
-
08:30 am
Moraine 1&2
Lynne Clark will open the meeting with an overview of initiatives, and information on opportunities at NCEC. |
08:30 - 09:30 am |
08:30
-
09:30 am
|
09:30 - 10:00 am |
09:30
-
10:00 am
Moraine 1&2
Integrated Faculty Workshop on Artificial Intelligence for Cybersecurity: The primary objective of this project is to develop curriculum materials (lecture notes and hands-on lab exercises) to teach secondary and post-secondary faculty artificial intelligence, machine learning and large-scale data analytics to tackle cybersecurity problems. The project team held the first three day workshop in August 2023. We will present the lessons learnt from the first workshop and the roadmap ahead for the team. |
10:00 - 10:15 am |
10:00
-
10:15 am
BreakMoraine 1&2
|
10:15 - 11:15 am |
10:15
-
11:15 am
Funded by the National Centers of Academic Excellence in Cybersecurity (located within the National Security Agency), and in partnership with the existing National Cybersecurity Teaching Academy (NCTA) coalition led by Dark Enterprises, UA Little Rock, DePaul University, and University of Louisville, this project builds the fourth site to train high school teachers and grant graduate-level certificates to them for teaching cybersecurity. CHI is a seven state collaboration, Colorado, Idaho, Oregon, Montana, North Dakota, South Dakota, and Washington, to increase and support the number of cybersecurity high school teachers. CHI cybersecurity courses leverage existing resources (CLARK, RING, TeachCyber.org). Instruction is delivered online synchronously, asynchronously, and in-person with labs, and on-going mentoring. CHI training integrates cybersecurity career assessment and exploration and National Cyber League into their classroom and school culture. CHI strives to develop relationships between teachers and cybersecurity professionals to clarify and "make real" employer workplace expectations. The CHI connection with Will Longman, CISO of Blue Origin resulted in development of a 10 module Phishing Curriculum now available in CLARK. |
11:15 - 12:00 pm |
11:15
-
12:00 pm
Moraine 1&2
Cybersecurity requires concerted efforts to engage students of all ages and finding innovative ways to inspire the cybersecurity workforce of the future. From summer camps and escape rooms to on-line learning environments and hands-on activities, these can all be re-purposed and tailored to meet the needs of specific audiences and learning objectives, from middle-school thru post-secondary education, by leveraging current curriculum and content. This session is designed to showcase capabilities, build collaborations and accelerate education by extending existing investments and resources, creating best practices and developing a collective designed to strengthen our cybersecurity talent pipeline. |
12:00 - 01:00 pm |
12:00
-
01:00 pm
LunchMoraine 1&2
|
01:00 - 02:00 pm |
01:00
-
02:00 pm
This session will include an overview of the NCAE-C Careers Preparation National Center (CPNC) tasks and initiatives. The CPNC goal is to integrate NCAE-C efforts in the development of graduating and completing students with the knowledge, skills, and competencies required for government and industry employment based on requirements identified by participating employers. The CPNC partners collaborate with the CAE-C Community to develop competency statements for faculty and students, provide resources for student professional development, and compile employer entry-level workforce requirements. The CPNC is developing a reference database to guide academic programs and match NCAE-C designated institution programs to cybersecurity career opportunities in government and industry. During this session, you will hear updates from and can ask questions to each of the CPNC grant task partners, who include Norwich University, California State University-San Bernardino, University of North Texas, SecurEd (affiliated with Towson University), Stevens Institute, Montreat College, Norwich University Applied Research Institutes, Purdue University-Northwest, and Forsyth Technical Community College. |
02:00 - 02:30 pm |
02:00
-
02:30 pm
This presentation will introduce the NCAE-C program’s efforts in the area of cybersecurity competitions. The CAE Community recognizes the significant role competitions can play in student, program, and workforce development. The NCAE-C competition strategy includes initiatives designed to expand and visualize pathways into and through the existing competition landscape, track student engagement with existing competitions, and capture and recognize the student competencies developed within competitions. |
02:30 - 03:00 pm |
02:30
-
03:00 pm
Integrating research and education in today’s degree programs in Cybersecurity is a must in order to ensure that the students acquire the skills necessary to properly deal with the everchanging threat and attack landscape. Graduates must be able to handle situations and problems that have not been encountered before and are not yet treated in textbooks or the literature at large. The Information Security Research and Education (INSuRE) program is designed to address this critical element to prepare the future workforce in Cybersecurity. The INSuRE+E track provides students at the BS and MS degree levels at CAE institutions with the opportunity to learn about research methods by working with problem mentors from government agencies and laboratories on real-world problems. The recently introduced INSuRE+C track aims to facilitate research collaborations between research-active faculty (and their graduate/doctoral students) from CAE-R institutions and researchers at government agencies and laboratories. In this talk, we will present the program details of the two. |
03:00 - 03:15 pm |
03:00
-
03:15 pm
BreakMoraine 1&2
|
03:15 - 04:00 pm |
03:15
-
04:00 pm
|
04:00 - 05:00 pm |
04:00
-
05:00 pm
Networking and ExhibitsMoraine 1&2
|
Moraine 3 Monday, September 18th, 2023 |
|
08:00 - 05:00 pm |
08:00
-
05:00 pm
ExhibitorsMoraine 3
|
M201 Monday, September 18th, 2023 |
|
08:00 - 05:00 pm |
08:00
-
05:00 pm
The Hack the Building 2.0 Hospital Edition Conference & Cyber Exercise occurs Sept 18 – 22 at MISI’s DreamPort facility in Columbia, MD. The Cyber Exercise features a competition with the top performing NCAE-C academic teams, from the preliminary competition held in April, competing against professional teams across military, government and industry. Teams will participate, either offensively or defensively, to work through scenarios focusing on a wide range of information technology (IT), industrial control systems (ICS), internet of things (IoT) and operational technology (OT) assets. The HTB 2.0 Conference focuses on bringing together subject matter experts across government, industry and academia to facilitate innovation and knowledge sharing around building automation systems, industrial control systems and healthcare cyber. A series of keynotes, technical presentations, and hands on training will be available to all attendees in addition to networking opportunities and social hours in the exhibit hall! HTB 2.0 Hospital Edition focuses on empowering the current and future cyber warfighter to defend our nation’s most critical infrastructure sectors! |
Moraine 1&2 Tuesday, September 19th, 2023 |
|
07:00 - 08:00 am |
07:00
-
08:00 am
Registration and Breakfast
Moraine 1&2
|
08:00 - 08:45 am |
08:00
-
08:45 am
|
08:45 - 09:15 am |
08:45
-
09:15 am
Update from the NCAE-C PMO on opportunities for grants and the associated business rules. |
09:15 - 10:00 am |
09:15
-
10:00 am
|
10:00 - 10:15 am |
10:00
-
10:15 am
BreakMoraine 1&2
|
10:15 - 10:45 am |
10:15
-
10:45 am
NCAE-C and the National Cyber Workforce Education StrategyMoraine 1&2
|
10:45 - 11:30 am |
10:45
-
11:30 am
Moraine 1&2
This session will address the NCAE-C strategy for growth of the program, and an overview of the new re-designation requirements being implemented to encompass the work of the Evidencing Competency Working Group. |
11:30 - 11:45 am |
11:30
-
11:45 am
|
11:45 - 12:45 pm |
11:45
-
12:45 pm
Recognizing 33 schools that have completed their re-designation or have a first-time designation in the program. |
12:15 - 01:00 pm |
12:15
-
01:00 pm
Lunch
Moraine 1&2
|
01:00 - 01:30 pm |
01:00
-
01:30 pm
Networking and ExhibitsMoraine 1&2
|
01:30 - 01:45 pm |
01:30
-
01:45 pm
Break
Moraine 1&2 | Moraine 3
|
01:45 - 03:15 pm |
01:45
-
03:15 pm
|
03:15 - 03:30 pm |
03:15
-
03:30 pm
Break
Moraine 1&2 | Moraine 3
|
03:30 - 05:00 pm |
03:30
-
05:00 pm
Education Pathways National Centers WorkshopMoraine 1&2
|
Moraine 3 Tuesday, September 19th, 2023 |
|
01:30 - 01:45 pm |
01:30
-
01:45 pm
Break
Moraine 1&2 | Moraine 3
|
01:45 - 03:15 pm |
01:45
-
03:15 pm
Education Pathways National Centers WorkshopMoraine 3
|
03:15 - 03:30 pm |
03:15
-
03:30 pm
Break
Moraine 1&2 | Moraine 3
|
03:30 - 05:00 pm |
03:30
-
05:00 pm
|
M201 Tuesday, September 19th, 2023 |
|
08:00 - 05:00 pm |
08:00
-
05:00 pm
The Hack the Building 2.0 Hospital Edition Conference & Cyber Exercise occurs Sept 18 – 22 at MISI’s DreamPort facility in Columbia, MD. The Cyber Exercise features a competition with the top performing NCAE-C academic teams, from the preliminary competition held in April, competing against professional teams across military, government and industry. Teams will participate, either offensively or defensively, to work through scenarios focusing on a wide range of information technology (IT), industrial control systems (ICS), internet of things (IoT) and operational technology (OT) assets. The HTB 2.0 Conference focuses on bringing together subject matter experts across government, industry and academia to facilitate innovation and knowledge sharing around building automation systems, industrial control systems and healthcare cyber. A series of keynotes, technical presentations, and hands on training will be available to all attendees in addition to networking opportunities and social hours in the exhibit hall! HTB 2.0 Hospital Edition focuses on empowering the current and future cyber warfighter to defend our nation’s most critical infrastructure sectors! |
Moraine 1 Wednesday, September 20th, 2023 |
|
07:00 - 08:00 am |
07:00
-
08:00 am
Registration and Breakfast
Moraine 1
|
08:00 - 08:30 am |
08:00
-
08:30 am
Welcome to Moraine Valley Community College
Moraine 1 | Moraine 2&3
|
08:30 - 09:15 am |
08:30
-
09:15 am
|
09:15 - 10:00 am |
09:15
-
10:00 am
Cyber Imperatives in DoD
Moraine 1 | Moraine 2&3
|
10:00 - 10:15 am |
10:00
-
10:15 am
Break
Moraine 1 | Moraine 2&3
|
10:15 - 11:15 am |
10:15
-
11:15 am
Updates from National Science Foundation on Cybersecurity Education & Workforce Development InitiativesMoraine 1
|
11:15 - 12:00 pm |
11:15
-
12:00 pm
Moraine 1
The demand for cybersecurity talent continues to grow – as does the number of people employed in cybersecurity roles in organizations. However, the overall demand for STEM-related talent is creating a national crisis as cybersecurity competes with needs for other critical and emerging technologies as well as national priorities to reinvigorate the semiconductor industry. This dynamic is also occurring in the context of low unemployment, decreases in birth rates, rising costs for higher education, and growing expectations for Good Jobs. This session will describe federal government policies and investments to address long-term needs for a skilled and diverse workforce across all technology disciplines and workforces. |
12:00 - 12:45 pm |
12:00
-
12:45 pm
Lunch
Moraine 1 | Moraine 2&3
|
12:45 - 01:15 pm |
12:45
-
01:15 pm
Exhibits Break in Ballroom 3
Moraine 1 | Moraine 2&3
|
01:15 - 02:00 pm |
01:15
-
02:00 pm
Forget the next technology innovation designed to solve cyber vulnerabilities and reduce risk, at least don’t make it the first consideration for investments. Most believe that cybersecurity’s major problem is technical. However, human error is most often the cause of issues occurring in cyber systems. This means people are the biggest cybersecurity vulnerability. Provide proper education and training, and that should solve the problem, right? Interestingly enough, each organization approaches how they identify and address their cyber workforce development and education requirements differently. Why is this? The reason is complex, however, one key factor is related to research that shows organizations do not fully understand what people holding cyber-related positions actually do each day to keep operations up and running. If organizations do not know what their own cyber employees are doing for them, how do they hire the right replacements with the necessary education or skillsets? How do they create an education and training roadmap for each job role that is designed to achieve each employee’s optimum “cyber-maturity”. Properly educated cyber employees improve a business’s competitive edge, decrease cyber risk, and create the desired cyber-culture in any organization that improves its effectiveness. The presentation will address these issues and highlight ways to determine any organization’s foundational cyber workforce development and educational requirements that allows for the creation of a cyber-maturity education plan. |
02:00 - 02:45 pm |
02:00
-
02:45 pm
There are more than 3,000 electric generation, transmission, and/or distribution utilities, 2,800 independent power producers, 9 power agencies owned by the Federal Government, and 200 Electric Power Marketers that own and operate the electric grid. In addition to these entities, the operation of the grid is dependent on an ecosystem of public and private partners, including the independent system operator or regional transmission organizations (ISOs and RTOs), regulatory agencies, vendors and equipment manufacturers, and an increasing number of organizations deploying renewable energy technologies. All of these organizations face cybersecurity challenges and severe shortages in a cybersecurity workforce that understands the unique issues associated with industrial control systems. This session will explore methods to accelerate experiential training opportunities to address the workforce gap facing industrial controls system owners and operators in the grid and other critical infrastructures. |
02:45 - 03:30 pm |
02:45
-
03:30 pm
Cyber-Informed Engineering (CIE) is an engineering approach that integrates cybersecurity considerations into the conception, design, build, and operation of any physical system that has digital connectivity, sensors, monitoring, or control. Rather than add cybersecurity controls after the design is complete, CIE offers the opportunity to use engineering to eliminate or mitigate avenues for cyber-attack—starting from the earliest stage of design and continuing throughout the system’s lifecycle. CIE aims to shift the way the nation’s engineers, ICS technicians, manufacturers, and operators approach security in energy systems design. This approach offers new opportunities to “engineer out” cyber risk—that is, to use early design decisions and engineering controls to reduce, mitigate, and even eliminate the consequences of a cyber-attack. The Department of Energy National Strategy for Cyber-Informed Engineering (https://www.energy.gov/sites/default/files/2022-06/FINAL%20DOE%20National%20CIE%20Strategy%20-%20June%202022_0.pdf) directs the program to partner with academia to “embed CIE principles into appropriate courses and degree programs at the undergraduate and graduate levels” and to “build CIE into formal education and certification for the next generation of energy systems engineers.” This talk will introduce Cyber-Informed Engineering, discuss current accomplishments and future goals for educational integration. |
03:30 - 03:45 pm |
03:30
-
03:45 pm
Break
Moraine 1 | Moraine 2&3
|
03:45 - 04:30 pm |
03:45
-
04:30 pm
Moraine 1
Healthcare systems are digitally transforming themselves at rapid rates. During the pandemic, telemedicine dramatically increased along with other digital drivers. Financial data/transactions, Patient records, confidentiality and compliance are all driving healthcare to transform their cybersecurity controls and practices. The Pathways Coalition comprised of 11 universities (and growing) created a Cybersecurity Workforce Certificate that includes 23 modules plus a capstone finale. There are three levels in the certificate: Explorer, Practitioner and Professional. Module topics range from DB Management, Data Mining, Artificial Intelligence, Blockchain, IoT, Post Quantum Cryptography. The entire program is modular and may be taken as just one or two levels or all three levels. (ie..Explorer/Practitioner). The exercises/homework for each module is related to healthcare and were developed in cooperation with working in the field industry subject matter experts. Additionally, each level includes technology vendor badges/certificates, such as Microsoft Azure or IBM AI. |
04:30 - 05:30 pm |
04:30
-
05:30 pm
What's Happening in the CAE-CD Community of PracticeMoraine 1
|
Moraine 2&3 Wednesday, September 20th, 2023 |
|
08:00 - 08:30 am |
08:00
-
08:30 am
Welcome to Moraine Valley Community College
Moraine 1 | Moraine 2&3
|
08:30 - 09:15 am |
08:30
-
09:15 am
|
09:15 - 10:00 am |
09:15
-
10:00 am
Cyber Imperatives in DoD
Moraine 1 | Moraine 2&3
|
10:00 - 10:15 am |
10:00
-
10:15 am
Break
Moraine 1 | Moraine 2&3
|
10:15 - 11:15 am |
10:15
-
11:15 am
There is a nation-wide shortage of skilled cyberspace and spectrum operations graduates to address priority national security and defense-specific challenges. The goal of the Virtual Institutes for Cyber and Electromagnetic-spectrum Research and Employ (VICEROY) program is to develop foundational expertise in critical cyber and spectrum operational skills for future military and civilian leaders of the Armed Forces and the Department of Defense, including such leaders of the reserve components. VICEROY augments traditional college curricula with hands-on, research-based, operationally- focused experiential learning opportunities that are uniquely tailored to match DoD’s cyber and electromagnetic spectrum workforce demands. It emphasizes the critical importance of strategic foreign languages, data science, and mathematical foundations of cryptography. It contains an elite eight-week experiential internship (MAVEN) that teaches DoD leadership and culture, research priorities and skills, communications, and culminates in a high-stakes, mission-focused capstone. Finally, the program breaks down student logistical barriers and ensures travel, housing, pay, and quality of life to promote student satisfaction and success. |
11:15 - 12:00 pm |
11:15
-
12:00 pm
|
12:00 - 12:45 pm |
12:00
-
12:45 pm
Lunch
Moraine 1 | Moraine 2&3
|
12:45 - 01:15 pm |
12:45
-
01:15 pm
Exhibits Break in Ballroom 3
Moraine 1 | Moraine 2&3
|
01:15 - 02:00 pm |
01:15
-
02:00 pm
Moraine 2&3
California State University San Bernardino (CSUSB)’s Cybersecurity Center has expanded its cyber program’s outreach and economic community development strategy with the Inland Empire Cybersecurity Initiative (IECI), forming a unique academic partnership with workforce organizations, local employers, K-12, and community colleges to establish a regional pipeline that identifies and mentors cybersecurity talent from middle school to university-level apprenticeships and career-starting employment in Southern California. Sponsored by the NSA CAE Program (grant #H98230-21-1-0174), state government and regional workforce development boards, CSUSB has added to its cybersecurity student opportunities the option of apprenticeship, providing students the ability to work meaningful jobs in their field while earning their degree, as IECI simultaneously develops the expertise necessary to respond effectively to the industry needs in the community. The IECI coalition partnership includes academic institutions and employer-student connection organizations as Tomorrow’s Talent, San Bernardino County Superintendent of Schools (SBCSS) ‘The Alliance’, Local Apprenticeship Uniting a Network of College & High Schools (LAUNCH), and community colleges Moreno Valley College (MVC), Riverside City College (RCC) and San Bernardino Valley College (SBVC). IECI builds on the nationally recognized cybersecurity program at CSUSB and cybersecurity education in the local community to support the apprenticeship pipeline through the phases of exploration, pre-apprenticeship, apprenticeship, and employment with competitions, NICE Framework-based mobile games, GenCyber camps, micro-internships, and career, curricular, and experiential training toward providing businesses with qualified, CAE-trained, world-class talented employees who have the cybersecurity competencies that companies desire. |
02:00 - 02:45 pm |
02:00
-
02:45 pm
The Role of Humans and AI in the Judicial SystemMoraine 2&3
|
02:45 - 03:30 pm |
02:45
-
03:30 pm
North Carolina Innovation in Cyber Education
Moraine 2&3
The Carolina Cyber Network (CCN) is a comprehensive cybersecurity workforce development ecosystem that includes 18 colleges and universities across the State of North Carolina. The mission of CCN is to strengthen NC’s cybersecurity capabilities through a coordinated, work-ready talent development system connecting employers with needed talent and to harden the digital assets of the State of NC. The CCN was funded by the State of North Carolina and has quickly risen to be a national demonstration project that has assisted the White House’s Office of the National Cyber Director (ONCD) in the formulation of the recently released National Cybersecurity Workforce Development plan. CCN has succeeded in creating a holistic talent pipeline where normally competitive institutions are working together to address the cyber workforce shortage in NC. CCN has developed a true public-private partnership where industry, academia, and government are working together to solve the cyber workforce needs of the State and create a replicable, exportable model for other states. In a few short years, CCN has increased cyber program enrollment across its network by 60%, increased the number of cyber graduates by 197%, increased the number of CAE designated schools from 2 to 9 with another 9 on the pathway to designation, updated the curricula across 62% of the network, and provided millions in sub-grants of the State money received to member institutions to build out the capacity in their cyber programs. |
03:30 - 03:45 pm |
03:30
-
03:45 pm
Break
Moraine 1 | Moraine 2&3
|
03:45 - 04:30 pm |
03:45
-
04:30 pm
Department of Defense University Cyber ConsortiumMoraine 2&3
|
M201 Wednesday, September 20th, 2023 |
|
08:00 - 05:30 pm |
08:00
-
05:30 pm
The Hack the Building 2.0 Hospital Edition Conference & Cyber Exercise occurs Sept 18 – 22 at MISI’s DreamPort facility in Columbia, MD. The Cyber Exercise features a competition with the top performing NCAE-C academic teams, from the preliminary competition held in April, competing against professional teams across military, government and industry. Teams will participate, either offensively or defensively, to work through scenarios focusing on a wide range of information technology (IT), industrial control systems (ICS), internet of things (IoT) and operational technology (OT) assets. The HTB 2.0 Conference focuses on bringing together subject matter experts across government, industry and academia to facilitate innovation and knowledge sharing around building automation systems, industrial control systems and healthcare cyber. A series of keynotes, technical presentations, and hands on training will be available to all attendees in addition to networking opportunities and social hours in the exhibit hall! HTB 2.0 Hospital Edition focuses on empowering the current and future cyber warfighter to defend our nation’s most critical infrastructure sectors! |
M202 Wednesday, September 20th, 2023 |
|
12:45 - 01:15 pm |
12:45
-
01:15 pm
Lynne Clark will answer questions on the new re-designation requirements |
01:15 - 02:00 pm |
01:15
-
02:00 pm
|
02:00 - 02:45 pm |
02:00
-
02:45 pm
VICEROY P3I Q&AM202
|
03:45 - 05:30 pm |
03:45
-
05:30 pm
CISA is driving the Secure by Design (SbD) Initiative which aims to shift the cybersecurity burden away from customers and towards technology manufacturers. This shift is central to our mission to serve as the nation’s leader for cyber defense and infrastructure resilience in collaboration with our partners. The SbD Team is hosting a series of cross-industry summits aimed at enhancing communication and collaboration among government, industry, and within industry. This workshop marks the initial step in our engagement and partnership with academia, signifying the start of a broader conversation and collaboration. Objectives:
|
M203 Wednesday, September 20th, 2023 |
|
10:00 - 12:00 pm |
10:00
-
12:00 pm
Come by and experience the NICE Challenge Project’s live, hands-on cyber work role challenges! Whether you’ve never tried the NICE Challenges before or have been using them for years, come experience our latest and greatest cyber workforce experiences. We have cyber challenges for educators and their students, ranging from small business systems administration to cyber incident response in ICS/OT. Try these free-to-use challenges today and integrate them into your program tomorrow. At select times, Dr. Vincent Nestler, the NICE Challenge Project’s PI, will also be available to demo some experimental AI-based experiences. |
01:15 - 03:30 pm |
01:15
-
03:30 pm
Come by and experience the NICE Challenge Project’s live, hands-on cyber work role challenges! Whether you’ve never tried the NICE Challenges before or have been using them for years, come experience our latest and greatest cyber workforce experiences. We have cyber challenges for educators and their students, ranging from small business systems administration to cyber incident response in ICS/OT. Try these free-to-use challenges today and integrate them into your program tomorrow. At select times, Dr. Vincent Nestler, the NICE Challenge Project’s PI, will also be available to demo some experimental AI-based experiences. |
M204 Wednesday, September 20th, 2023 |
|
10:15 - 12:00 pm |
10:15
-
12:00 pm
This hands-on learning lab will introduce attendees to open-sourced software that enables gamified cybersecurity competitions and training. Following this introduction, attendees will be given the opportunity to play freely available Capture the Flag (CTF) challenges from the President’s Cup Cybersecurity Competition. The President’s Cup is an annual CTF competition hosted by the Cybersecurity and Infrastructure Security Agency (CISA) in partnership with Carnegie Mellon University’s Software Engineering Institute (SEI). Mandated by Executive Order 13870, the President’s Cup seeks to identify and reward the best cybersecurity professionals and teams across the US government and military services. To do this, CISA and CMU have utilized gamified scenarios and created immersive video games to maximize interest and participation in the competition. Now these innovations are available to the cybersecurity community at large. Presenters will use the first 15-minutes to present and demonstrate these concepts/technologies and how anyone can use the open-sourced software for their own education and training uses. Then attendees will use their laptops and web browsers to access a cloud-based instantiation of the challenges for the remainder of the session. Conference Wi-Fi and power outlets are all that’s required for this highly innovative learning lab. |
01:15 - 02:45 pm |
01:15
-
02:45 pm
This hands-on learning lab will introduce attendees to open-sourced software that enables gamified cybersecurity competitions and training. Following this introduction, attendees will be given the opportunity to play freely available Capture the Flag (CTF) challenges from the President’s Cup Cybersecurity Competition. The President’s Cup is an annual CTF competition hosted by the Cybersecurity and Infrastructure Security Agency (CISA) in partnership with Carnegie Mellon University’s Software Engineering Institute (SEI). Mandated by Executive Order 13870, the President’s Cup seeks to identify and reward the best cybersecurity professionals and teams across the US government and military services. To do this, CISA and CMU have utilized gamified scenarios and created immersive video games to maximize interest and participation in the competition. Now these innovations are available to the cybersecurity community at large. Presenters will use the first 15-minutes to present and demonstrate these concepts/technologies and how anyone can use the open-sourced software for their own education and training uses. Then attendees will use their laptops and web browsers to access a cloud-based instantiation of the challenges for the remainder of the session. Conference Wi-Fi and power outlets are all that’s required for this highly innovative learning lab. |
03:45 - 05:30 pm |
03:45
-
05:30 pm
CISA is driving the Secure by Design (SbD) Initiative which aims to shift the cybersecurity burden away from customers and towards technology manufacturers. This shift is central to our mission to serve as the nation’s leader for cyber defense and infrastructure resilience in collaboration with our partners. The SbD Team is hosting a series of cross-industry summits aimed at enhancing communication and collaboration among government, industry, and within industry. This workshop marks the initial step in our engagement and partnership with academia, signifying the start of a broader conversation and collaboration. Objectives:
|
M210 Wednesday, September 20th, 2023 |
|
10:15 - 12:00 pm |
10:15
-
12:00 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
12:45 - 02:15 pm |
12:45
-
02:15 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
02:15 - 03:45 pm |
02:15
-
03:45 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
03:45 - 05:30 pm |
03:45
-
05:30 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
Moraine 1 Thursday, September 21st, 2023 |
|
01:00 - 02:00 pm |
01:00
-
02:00 pm
Ethics and Professionalism in the Cybersecurity Workforce: Professionalism consists of many sought after traits in the workforce. While cybersecurity is a highly technical field, it exists to serve and protect people. Without a professional behind the keyboard, technology means little. It is the intent of that professional operator that makes cyber a force for good or bad. Cybersecurity programs should provide a higher focus on the ethics and character of the individual, as well as the professional behavior and soft skills needed for a lasting and meaningful career in cybersecurity. Montreat College has developed a book on cybersecurity ethics, companion curriculum, and professionalism curriculum for a pilot course. In this presentation, we will look at a sample case study from the book manuscript, “Code of Honor: Embracing Ethical Integrity in Cybersecurity” and discuss ethical decisions regarding a very real data breach scenario. Cyber Leader Development Program- Sharon Hamilton To enhance the Nation’s cyber talent and better prepare graduates for the Department of Defense and Federal cyber work force, the six Senior Military Colleges (SMCs) employ the Cyber Leader Development Program (CLDP). The CLDP provides students with experiential opportunities and experiences to build competencies (technical, personal, and professional) to prepare for DoD cyber work roles. Norwich University leads this SMC Cyber Consortium. In this session, we will discuss the components of CLDP and how each student can develop technical, personal, and professional competencies to better prepare for “Day 1” in the cyber work force. |
Menker Thursday, September 21st, 2023 |
|
07:00 - 08:00 am |
07:00
-
08:00 am
Registration and Breakfast
Menker
|
08:00 - 08:30 am |
08:00
-
08:30 am
|
08:30 - 09:15 am |
08:30
-
09:15 am
Federal Research PanelMenker
|
09:15 - 10:00 am |
09:15
-
10:00 am
|
10:00 - 10:15 am |
10:00
-
10:15 am
BreakMenker
|
10:15 - 11:00 am |
10:15
-
11:00 am
After 20 years of annual reports, countless hours spent on redesignation applications, navigating new and changing programs… not to mention many times we’ve forgotten to click save in the new designation tool… Has it all been worth it? We’ll talk about the transformative changes seen at Dakota State University, which at one time was considered for conversion to a low security prison, and discuss the returns we’ve seen from our time in the NCAE program. |
11:00 - 11:45 am |
11:00
-
11:45 am
Explore Cybersecurity Careers with CISA’s new Micro-Challenges. This presentation will introduce attendees to the new Micro-Challenges that appear on the Cybersecurity and Infrastructure Security Agency’s (CISA) National Initiative for Cybersecurity Careers and Studies (NICCS™) website. These challenges enable the public to discover cybersecurity careers by exploring the knowledge, skills, and tasks performed in the top cybersecurity workforce roles. Following the presentation, presenters will walk attendees through one of the micro-challenges. |
11:45 - 01:00 pm |
11:45
-
01:00 pm
Lunch
Menker | M201
|
01:00 - 02:00 pm |
01:00
-
02:00 pm
This project addresses cybersecurity technical vulnerabilities and workforce shortcomings in the power grid of the Pacific Northwest. It assesses vulnerabilities from a bottom-up approach, local to the primary power source, across five states by analyzing existing federal and local data on local and regional public utilities, energy companies, tabletop exercises, and technology roadmap exercises. It will provide regional and state-level recommendations for investment in infrastructure and cybersecurity, workforce training, and policy implementations to ensure long-term sustainable industry-government cooperation between government industries with university assistance. |
02:00 - 02:45 pm |
02:00
-
02:45 pm
Cybersecurity requires concerted efforts to engage students of all ages and finding innovative ways to inspire the cybersecurity workforce of the future. From summer camps and escape rooms to on-line learning environments and hands-on activities, these can all be re-purposed and tailored to meet the needs of specific audiences and learning objectives, from middle-school thru post-secondary education, by leveraging current curriculum and content. This session is designed to showcase capabilities, build collaborations and accelerate education by extending existing investments and resources, creating best practices and developing a collective designed to strengthen our cybersecurity talent pipeline. |
02:45 - 03:00 pm |
02:45
-
03:00 pm
BreakMenker
|
03:00 - 03:15 pm |
03:00
-
03:15 pm
Competition Award Stream
Menker
|
03:15 - 04:30 pm |
03:15
-
04:30 pm
CAE-R CoP MeetingMenker
|
04:30 - 06:00 pm |
04:30
-
06:00 pm
Networking Reception
Menker
|
Folgelson Thursday, September 21st, 2023 |
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
The "Train the Trainer" workshop is an immersive and comprehensive course that focuses on the CAE Community’s methodology for integrating competency-based experiences into students' academic journeys. This integration is crucial to better equip students for the dynamic demands of the cybersecurity workforce. At the conclusion of the workshop, participants will possess the necessary knowledge to assist CAE schools in both selecting and developing these competency experiences. During the workshop, participants will delve into the CAE's definition of "Competency" and explore the 5 Essential Elements of competency-based experiences. A specific competency experience will be analyzed for reflective and evaluative purposes. Following this, participants will be guided on how to craft competency statements utilizing the 5 Essential Elements. Furthermore, attendees will discuss anticipated challenges of introducing competency experiences across diverse institutions. They will also brainstorm potential solutions and strategies. This workshop emphasizes interactivity, necessitating active participation and engagement from start to finish. Upon completion, attendees will join the esteemed group of CAE trainers. They will also be presented with opportunities to collaborate with schools and to attend advanced training sessions in the future. |
01:00 - 04:30 pm |
01:00
-
04:30 pm
The "Train the Trainer" workshop is an immersive and comprehensive course that focuses on the CAE Community’s methodology for integrating competency-based experiences into students' academic journeys. This integration is crucial to better equip students for the dynamic demands of the cybersecurity workforce. At the conclusion of the workshop, participants will possess the necessary knowledge to assist CAE schools in both selecting and developing these competency experiences. During the workshop, participants will delve into the CAE's definition of "Competency" and explore the 5 Essential Elements of competency-based experiences. A specific competency experience will be analyzed for reflective and evaluative purposes. Following this, participants will be guided on how to craft competency statements utilizing the 5 Essential Elements. Furthermore, attendees will discuss anticipated challenges of introducing competency experiences across diverse institutions. They will also brainstorm potential solutions and strategies. This workshop emphasizes interactivity, necessitating active participation and engagement from start to finish. Upon completion, attendees will join the esteemed group of CAE trainers. They will also be presented with opportunities to collaborate with schools and to attend advanced training sessions in the future. |
M201 Thursday, September 21st, 2023 |
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
The Hack the Building 2.0 Hospital Edition Conference & Cyber Exercise occurs Sept 18 – 22 at MISI’s DreamPort facility in Columbia, MD. The Cyber Exercise features a competition with the top performing NCAE-C academic teams, from the preliminary competition held in April, competing against professional teams across military, government and industry. Teams will participate, either offensively or defensively, to work through scenarios focusing on a wide range of information technology (IT), industrial control systems (ICS), internet of things (IoT) and operational technology (OT) assets. The HTB 2.0 Conference focuses on bringing together subject matter experts across government, industry and academia to facilitate innovation and knowledge sharing around building automation systems, industrial control systems and healthcare cyber. A series of keynotes, technical presentations, and hands on training will be available to all attendees in addition to networking opportunities and social hours in the exhibit hall! HTB 2.0 Hospital Edition focuses on empowering the current and future cyber warfighter to defend our nation’s most critical infrastructure sectors! |
11:45 - 01:00 pm |
11:45
-
01:00 pm
Lunch
Menker | M201
|
01:00 - 03:00 pm |
01:00
-
03:00 pm
Academia and private industry need to break the ‘chicken and the egg’ scenario with respect to changing the demand for secure/robust coding in the marketplace. Academia knows how to teach secure/robust coding, but employers (private industry) are not currently demanding it as part of their hiring requirements. How do we get out of this scenario? We have no metrics to validate how well undergraduate computer scientists --- trained in secure coding/development and skills --- will make an impact with reducing overall software vulnerabilities and thus reduce the influx in malware. How do we obtain these metrics and show a strong, competitive position in the marketplace, providing cost savings to companies’ CFOs and CEOs? |
M202 Thursday, September 21st, 2023 |
|
08:00 - 10:00 am |
08:00
-
10:00 am
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
|
01:00 - 03:00 pm |
01:00
-
03:00 pm
|
03:15 - 04:30 pm |
03:15
-
04:30 pm
Career Prep WorkshopM202
|
M203 Thursday, September 21st, 2023 |
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
Come by and experience the NICE Challenge Project’s live, hands-on cyber work role challenges! Whether you’ve never tried the NICE Challenges before or have been using them for years, come experience our latest and greatest cyber workforce experiences. We have cyber challenges for educators and their students, ranging from small business systems administration to cyber incident response in ICS/OT. Try these free-to-use challenges today and integrate them into your program tomorrow. At select times, Dr. Vincent Nestler, the NICE Challenge Project’s PI, will also be available to demo some experimental AI-based experiences. |
01:00 - 03:00 pm |
01:00
-
03:00 pm
Come by and experience the NICE Challenge Project’s live, hands-on cyber work role challenges! Whether you’ve never tried the NICE Challenges before or have been using them for years, come experience our latest and greatest cyber workforce experiences. We have cyber challenges for educators and their students, ranging from small business systems administration to cyber incident response in ICS/OT. Try these free-to-use challenges today and integrate them into your program tomorrow. At select times, Dr. Vincent Nestler, the NICE Challenge Project’s PI, will also be available to demo some experimental AI-based experiences. |
03:15 - 04:30 pm |
03:15
-
04:30 pm
Come by and experience the NICE Challenge Project’s live, hands-on cyber work role challenges! Whether you’ve never tried the NICE Challenges before or have been using them for years, come experience our latest and greatest cyber workforce experiences. We have cyber challenges for educators and their students, ranging from small business systems administration to cyber incident response in ICS/OT. Try these free-to-use challenges today and integrate them into your program tomorrow. At select times, Dr. Vincent Nestler, the NICE Challenge Project’s PI, will also be available to demo some experimental AI-based experiences. |
M204 Thursday, September 21st, 2023 |
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
Newly trained cybersecurity students are not able to fill the workforce gap for cybersecurity roles that have extremely limited room for error or require many hours of practical experience in the field. For example, industrial control systems (ICS)/operational technology (OT) cybersecurity, threat hunting, network security architects, and many other positions require a high level of experience in addition to knowledge. What role can academic institutions play to develop a workforce with the right balance of knowledge and skills? |
02:00 - 03:00 pm |
02:00
-
03:00 pm
This hands-on learning lab will introduce attendees to open-sourced software that enables gamified cybersecurity competitions and training. Following this introduction, attendees will be given the opportunity to play freely available Capture the Flag (CTF) challenges from the President’s Cup Cybersecurity Competition. The President’s Cup is an annual CTF competition hosted by the Cybersecurity and Infrastructure Security Agency (CISA) in partnership with Carnegie Mellon University’s Software Engineering Institute (SEI). Mandated by Executive Order 13870, the President’s Cup seeks to identify and reward the best cybersecurity professionals and teams across the US government and military services. To do this, CISA and CMU have utilized gamified scenarios and created immersive video games to maximize interest and participation in the competition. Now these innovations are available to the cybersecurity community at large. Presenters will use the first 15-minutes to present and demonstrate these concepts/technologies and how anyone can use the open-sourced software for their own education and training uses. Then attendees will use their laptops and web browsers to access a cloud-based instantiation of the challenges for the remainder of the session. Conference Wi-Fi and power outlets are all that’s required for this highly innovative learning lab. |
03:15 - 04:30 pm |
03:15
-
04:30 pm
This hands-on learning lab will introduce attendees to open-sourced software that enables gamified cybersecurity competitions and training. Following this introduction, attendees will be given the opportunity to play freely available Capture the Flag (CTF) challenges from the President’s Cup Cybersecurity Competition. The President’s Cup is an annual CTF competition hosted by the Cybersecurity and Infrastructure Security Agency (CISA) in partnership with Carnegie Mellon University’s Software Engineering Institute (SEI). Mandated by Executive Order 13870, the President’s Cup seeks to identify and reward the best cybersecurity professionals and teams across the US government and military services. To do this, CISA and CMU have utilized gamified scenarios and created immersive video games to maximize interest and participation in the competition. Now these innovations are available to the cybersecurity community at large. Presenters will use the first 15-minutes to present and demonstrate these concepts/technologies and how anyone can use the open-sourced software for their own education and training uses. Then attendees will use their laptops and web browsers to access a cloud-based instantiation of the challenges for the remainder of the session. Conference Wi-Fi and power outlets are all that’s required for this highly innovative learning lab. |
M210 Thursday, September 21st, 2023 |
|
10:15 - 12:15 pm |
10:15
-
12:15 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
01:00 - 03:00 pm |
01:00
-
03:00 pm
The space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control system. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew. CISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out? |
Moraine 1&2 Friday, September 22nd, 2023 |
|
07:00 - 08:00 am |
07:00
-
08:00 am
Registration and Breakfast
Moraine 1&2
|
08:00 - 08:10 am |
08:00
-
08:10 am
|
08:10 - 08:30 am |
08:10
-
08:30 am
Role of CAE-R and The Importance of Research for the Agency and CountryMoraine 1&2
|
08:30 - 08:45 am |
08:30
-
08:45 am
Introduction of Program Committee Co-ChairsMoraine 1&2
|
08:45 - 09:45 am |
08:45
-
09:45 am
Security Expert and the Advice FiascoMoraine 1&2
|
09:45 - 10:30 am |
09:45
-
10:30 am
|
10:45 - 11:30 am |
10:45
-
11:30 am
Research Discussions: PhD Student Panel 1Moraine 1&2
|
11:30 - 11:55 am |
11:30
-
11:55 am
INSuRE+C Research Talk 1
Moraine 1&2
|
11:55 - 12:20 pm |
11:55
-
12:20 pm
INSuRE+C Research Talk 2
Moraine 1&2
|
12:20 - 01:45 pm |
12:20
-
01:45 pm
Lunch
Moraine 1&2
|
01:45 - 02:30 pm |
01:45
-
02:30 pm
Research Discussions: PhD Student PanelMoraine 1&2
|
02:30 - 02:55 pm |
02:30
-
02:55 pm
INSuRE+C Research Talk 3
Moraine 1&2
|
02:55 - 03:20 pm |
02:55
-
03:20 pm
INSuRE+C Research Talk 4
Moraine 1&2
|
03:20 - 03:30 pm |
03:20
-
03:30 pm
|
03:30 - 03:45 pm |
03:30
-
03:45 pm
BreakMoraine 1&2
|
03:45 - 04:15 pm |
03:45
-
04:15 pm
CAE-R Discussion and ReflectionMoraine 1&2
|
M201 Friday, September 22nd, 2023 |
|
08:00 - 03:20 pm |
08:00
-
03:20 pm
The "Train the Trainer" workshop is an immersive and comprehensive course that focuses on the CAE Community’s methodology for integrating competency-based experiences into students' academic journeys. This integration is crucial to better equip students for the dynamic demands of the cybersecurity workforce. At the conclusion of the workshop, participants will possess the necessary knowledge to assist CAE schools in both selecting and developing these competency experiences. During the workshop, participants will delve into the CAE's definition of "Competency" and explore the 5 Essential Elements of competency-based experiences. A specific competency experience will be analyzed for reflective and evaluative purposes. Following this, participants will be guided on how to craft competency statements utilizing the 5 Essential Elements. Furthermore, attendees will discuss anticipated challenges of introducing competency experiences across diverse institutions. They will also brainstorm potential solutions and strategies. This workshop emphasizes interactivity, necessitating active participation and engagement from start to finish. Upon completion, attendees will join the esteemed group of CAE trainers. They will also be presented with opportunities to collaborate with schools and to attend advanced training sessions in the future. |
M202 Friday, September 22nd, 2023 |
|
08:45 - 12:20 pm |
08:45
-
12:20 pm
The new re-designation requirements are based on a four-year process building from designation and culminating in re-designation. This workshop will be an opportunity for schools that were designated in 2021 and 2022 who will re-designate in 2026 and 2027, and will have less than five years to complete the process. Discussion will center on expectations and accommodations to account for the shorter preparation period. |
M204 Friday, September 22nd, 2023 |
|
08:45 - 12:20 pm |
08:45
-
12:20 pm
The new re-designation requirements are based on a four-year process building from designation and culminating in re-designation. This workshop will be an opportunity for schools that were designated in 2021 and 2022 who will re-designate in 2026 and 2027, and will have less than five years to complete the process. Discussion will center on expectations and accommodations to account for the shorter preparation period. |