{{gmap markers=small bred::39.08303478032568,-94.58299398422241 |align=center |zoom=12 |center=39.08898429025349,-94.59906832525328 |width=100% |height=450px |control=Large |type=Map}}
[/html] [html format="ckeditor" text_align="center" different_values="0"]Centers of Academic Excellence Community Meeting
Organized by: California State University San Bernardino
Cyber Security Center
Supported by NIST*
Please join us for this important meeting of the CAE Community. The meeting is open to ALL existing Centers of Academic Excellence in Cyber Defense and Cyber Operations as well as CAE 2Y and CAE-R Schools. This includes those schools that have applied for the CAE Designations or are in process of applying.
[/html] [spacer different_values="0" style_height="30px"] [/spacer] [tabs] [tab title="Dates" active="1" different_values="0"] [html format="ckeditor" different_values="0"]Thursday Nov 3, 2016 (Day after NICE Conference)
The Westin Kansas City Crown Center
The Westin Kansas City Crown Center
1 E Pershing Road
Kansas City , MO
Phone: 816-474-4400
Group Code: NICE
https://www.starwoodmeeting.com/events/start.action?id=1602163063&key=174B68E6
(Mention the NICE Conference and get the $112 block rate)
[/html] [/tab] [tab title="Travel Funds" active="0" different_values="0"] [html format="ckeditor" different_values="0"]
We invite you to apply for travel reimbursement, up to $1000, to attend the upcoming CAE Community Meeting. Approximately 150 travel awards for faculty from CAE-CD, CAE-CO, CAE-R, and CAE-2Y institutions in the United States will be competitively awarded through this imitative, limited to one attendee per institution. The travel funding will cover airfare and two nights lodging at the The Westin Kansas City Crown Center.
To apply for this travel funding, and to register for the meeting use the link above. You will be prompted for travel funds requests, if required. You will receive a confirmation of your travel funds authorization shortly after as well as instructions for claiming the reimbursement.
Registration and travel fund applications from all CAE institutions are encouraged. (NOTE: This travel funding is for the CAE Community Meeting only and not for the NICE Conference, although you are encouraged to attend both.)
[/html] [/tab] [tab title="Meeting Schedule" active="0" different_values="0"] [accordions different_values="0"] [col phone="12" tablet="12" desktop="12" wide="12" different_values="0"] [accordion title="7:15 AM Check-in" active="0" different_values="0"] [/accordion] [accordion title="8:00-8:25am Welcome, Logistics, and Roadmap Flag Ceremony" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
Tony Coulson (CSUSB)
Lynne Clark (NSA)
Rodney Peterson (NIST)
[/html] [/accordion] [accordion title="8:25-8:40am CAE Community- Evolution and Mission" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
Tony Coulson (CAE Community Lead)
[/html] [/accordion] [accordion title="8:40-10:00am NSA/DHS: State of CAEs" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
Lynne Clark (NSA)
Daniel Stein (DHS)
CAE Program Team
Corby Hovis (NSF)
[/html] [/accordion] [accordion title="10:35-10:50am Morning Break" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Sponsored by CyberWatch West
[/html] [/accordion] [accordion title="10:50-11:55am CAE FAST Pitch Sessions (10 Minutes Each)" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
10:50-10:58am
How do I get started in Cyber Security Competitions?
Dan Manson, Cal Poly Pomona
Cybersecurity competitions are the premier experiential learning experience today for middle school,high school and college students. Most faculty and students do not know how to get started incompetitions. This talk explains in a few minutes how to get started and what the benefits are.
10:59-11:06am
Students Engaging the Public: Service Learning
Shelly Heller, George Washington University
GW CyberCorps students, under the guidance of the PIs, contact local community groups such as neighborhoodassociations, condominium associations and senior citizen groups to arrange a hour-long presentation andquestion/answer period on topics of current events in the cyber-security realm. For these audiences the intentis to explain the event “beyond the headlines”, and offer generalized basic advice on how an individual couldprotect him or herself from many of the cyberattacks.
11:07-11:15am
Industrial Control Systems Security
Guillermo Francia, III, Jacksonville State University
This fast pitch talk will describe the Faculty Development Workshop On Industrial Control Systems Securitythat is afforded as a professional development opportunity to college instructors and is supported by a NSFCapacity Building grant.
11:16-11:24am
10 in 10: Why CAEs Should Consider Hosting WiCyS
Ambareen Siraj, Tennessee Tech
The Women in Cybersecurity (WiCyS) started in 2014 with support of a National Science Foundation grant(Award#1303441) and thereafter held annually. The NSF project is managed by Tennessee Tech CybersecurityEducation Research and Outreach Center and yearly sub-awarded to a CAE institution to serve as a local host tomaximize the conference exposure to many across the United States, and to bring new insights for conferenceorganization. This 10-minute presentation will highlight 10 reasons to become a local host for WiCyS.
11:25-11:33am
National Cybersecurity Center, Colorado Springs, CO
Martin Wood, National Cybersecurity Center
National Cybersecurity Center (NCC) is a 501(c)(3) Colorado-based national center developed througha private-public partnership (P3) in Colorado Springs, Colorado. NCC will collaborate with the private sector,work with the military and federal agencies, and support and educate the public sector to better protect cities,states and national assets. NCC will be both a response partner and thought leader in cybersecurity nationallyand workforce development will be critical in addressing our nation’s cybersecurity efforts.
11:34-11:42am
Fostering a Strong Cybersecurity Culture in High and Middle School Students and Teachers Through a Holistic and Multidisciplinary Approach
Waleed Farag, Indiana University of PA
This presentation intends to highlight an inherently multidisciplinary approach to foster interest in cybersecurityin middle and high school students and teachers. The Information Assurance (IA) program at our University,Indiana University of Pennsylvania (IUP), has been inherently a multidisciplinary one.
11:42-11:50am
Win-Win: Assisting Companies from South Florida Mitigate Cyber-Attacks as During A Graduate Information Security
Yair Levy, Nova Southeastern University
This presentation will outline a graduate information security project capstone course at NovaSoutheastern University – College of Engineering and Computing, where students are tasked toselect a local small or medium company and conduct a full cybersecurity risk management analysiswith proposal of a project to mitigate some of the cyber-threats observed by combining technicaland managerial/governance means.
[/html] [/accordion] [accordion title="12:00-1:00pm Working Lunch- CAE Website and Signups" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
Anastacia Webster
[/html] [/accordion] [accordion title="1:00-1:30pm" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
Aligning Skills-based Training and Performance Assessments within Academia to Create a More Capable Cybersecurity Workforce
Art Conklin
[/html] [/accordion] [accordion title="1:30-2:30pm Dismiss to Special Interest Group Sessions (4)" active="0" different_values="0"] [html format="ckeditor" different_values="0"] Undertaking the Under-Representation Problem in Cyber
Ambareen Siraj, Tennessee Tech
Location: Brookside
It is no secret that women and minorities are still very much under-represented in Cybersecurity. While there are various efforts underway to address this issue, a lot of work remains to be done to start the momentum shift. This open forum will provide a conversation platform to share strategies and experiences that have had a positive impact in this regard. Maybe we can all learn from each other about what works and individually take action to make a collective difference.
C5 Mentor Meeting
Corrine Sandee, Whatcom Community College
Location: Shawnee
Meeting for C5 mentors to discuss issues and integration with the NSA mentor program.
CRRC: Program Development
Casey O’Brein, National CyberWatch Center
Location: Mission
We would welcome feedback on what elements should be involved in the Program Development portion of the newly created/funded CRRC.
Central Eastern CRRC Meeting
Margaret Leary, National CyberWatch Center/NVCC
Location: Liberty
An informal meeting of NSA’s Central Eastern CCRC (Virginia, W. Virginia, Kentucky, Delaware, Maryland, and Tenn) institutions to discuss regional issues that the CCRC can help support. A survey for Professional Development training needs will be distributed.
[/html] [/accordion] [accordion title="2:30-2:45pm Afternoon Break" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Sponsored by CyberWatch West
[/html] [/accordion] [/col] [col phone="6" tablet="6" desktop="6" wide="6" different_values="0"] [accordion title="2:45-4:15pm Presentations" active="0" different_values="0"] [html format="ckeditor" different_values="0"]2:45-3:30pm
Capturing Students by Capturing Flags
Dale Rowe, Brigham Young University
Location: Mission
We have found Capture The Flag (CTF) challenges to be an excellent tool inprovoking cybersecurity interest in high-school students. We have developed arapid prototyping platform for hosting these CTF’s using LXD Linux Containerson Ubuntu 16.04 to support a variety of current and legacy CTF platforms. Theseallow a much faster rate of development, salability and re-use than is typicallypossible. At the conclusion of the presentation we will publicly release ourframework.
2:45-3:30pm
The National Academy of Public Administration- Recommendations for SFS Programs
James Frost, Idaho State University
Location: Shawnee
A paper (“Increasing the Effectiveness of the Federal Role in CybersecurityEducation.”) was published in October 2015. This paper from the NationalAcademy of Public Administration for the Center for Internet Security wasprompted by the network centric nature of our world and the severe shortage ofcybersecurity professionals to address cybersecurity needs. It acknowledged twoprograms that seek to address this shortage; the Centers of Academic Excellenceand the Scholarship for Service program.
2:45-3:30pm
Aligning Skills-based Training and Performance Assessments within Academia to Create a More Capable Cybersecurity Workforce
Montana Williams, Cyber World Institute
Location: Shawnee
Cybersecurity Education (NICE) and the NIST Cybersecurity Frameworks, academiaand training organizations must develop cybersecurity professionals with the skillsnecessary to perform their jobs. This can only be accomplished by augmentingexisting programs with skills-based training and performance assessments. Thispresentation will partnerships between academia, local industries, and trainersthat can be integrated in post-secondary continuingeducation and degreed programs that can develop and enhance the requisiteskills necessary to heighten cyber resiliency across the nation and even the world.
2:45-4:15pm
KU Refinement
Art Conklin, University of Houston
Location: Brookside
The knowledge units (KUs) are used to document the content elements in ouracademic programs. Academics were involved in the creation of the KUs and thisrefi nement workshop is an opportunity to provide improvements and clarifi cationsto the KUs. Have a KU that youthink needs change, clarifi cation, improvement? Have one you think is missing?Think there is one that doesn’t belong in the list? Bring all of your thoughts andprovide inputs to the next version of the KUs. This is your opportunity to helpimprove the KU’s.
2:45-3:10pm
Developing an Adaptive Multi-Factor Authentication System
Dipankar Dasgupta, University of Memphis
Location: Liberty
This research is focused on the design and implementation of an adaptive MFAsolution to regularly authenticate users through a subset of authentication factorsin a time-varying operating environment (working device, connecting mediaand surrounding conditions). The authentication modalities/factors are chosenadaptively at every triggering event by sensing the operating environment via anoptimal set of authentication factors to verify users against their claimed identities.The proposed A-MFA system has been implemented and thoroughly evaluatedwith different metrics to measure its performance and compare it with otherexisting single-factor, two-factor and multifactor-based authentication solutions.
3:15-3:35pm
Where’s the Sense of Urgency in the Information Security Academic Community?
Casey O’Brein, National CyberWatch Center
Location: Liberty
As the demand for qualifi ed information security professionals increases, so hascommercial organization’s concern for the perceived lack of qualifi ed studentscoming out of our programs. It’s hard to imagine academia being able to solelymeet the demand numbers, but what about the quality of the students coming outof our programs? If we are in fact, truly National Centers of Academic Excellencein Cyber Defense/Operations, where’s the sense of urgency to right the course?This discussion will focus on areas in which academia must evolve in order toshrink the growing gap between what industry says it needs from our studentsand what we are actually producing.
3:35-4:15pm
Cyber Security Risk Management Analyst
Charlene Watson, Florida A & M University
Location: Mission
In order to provide practice in the analysis and implementation steps of thenetwork security development process, a student must understand the logicaldesign of a network in order to deploy security countermeasures for IntrusionDetection. The purpose of this project is to help students understand how todesign a network with only basic information available, understand the physicaltopology design, the logical design which will be derived from this, and then thesteps necessary to secure the entire network.
3:40-4:05pm
Cyber Security “Edutainment” - Creating Partnerships toEducate Millennials & meet the CAE/NICE Criteria
Charlene Watson, Florida A &M University
Location: Liberty
In order to provide practice in the analysis and implementation steps of thenetwork security development process, a student must understand the logicaldesign of a network in order to deploy security countermeasures for IntrusionDetection. The purpose of this project is to help students understand how todesign a network with only basic information available, understand the physicaltopology design, the logical design which will be derived from this, and then thesteps necessary to secure the entire network.
[/html] [/accordion] [/col] [col phone="6" tablet="6" desktop="6" wide="6" different_values="0"] [accordion title="2:45-4:15pm Government Representative Appointments" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Location: Ballroom
DHS – Dan Stein (High School, Internships, Infrastructure)
NSA – Lynne Clark (NSA CAE CD Program Offi ce)
NSA – Heather Elkenberry (Cyber Ops)
NSF – Corby Hovis (Grants)
NIST – Rodney Peterson/ Bill Newhouse (NICE)
Location: Ballroom
[/html] [/accordion] [/col] [/accordions] [html format="ckeditor" different_values="0" style_margin_top="20px"]Download the CAE Meeting Agenda PDF
[/html] [/tab] [/tabs] [spacer different_values="0" style_height="30px"] [/spacer] [accordions different_values="0"] [accordion title="Registration" active="0" different_values="0"] [html format="ckeditor" different_values="0"]We will be gathering academia and government to discuss the future cyber security workforce as well as several unique working group opportunities.
The event is FREE, but registration is required in advance to gain access to the conference.
Registration closes October 14th.
Community Meeting Registration: https://goo.gl/forms/2XlCrPo6WE6lZoWD3
[/html] [/accordion] [accordion title="Presentation Submissions" active="0" different_values="0"] [html format="ckeditor" different_values="0"]Interested in Presenting at The CAE Community Meeting?
This year we are offering an opportunity for attendees to submit proposals for a FastPitch, Special Interest Group Discussion, or a Presentation. You can choose more than one. The committee will select based on available spots. Deadline is October 10th.
FASTPITCH:
The theme is "Innovation". Schools are given the opportunity to make a 10 minute or less presentation to the general audience on an innovative program, approach or other item. We will have a limited number of spots for FASTPITCH.
SPECIAL INTEREST GROUPS:
These are opportunities for participants to discuss items relevant to the interest group. The sessions will be about 1 hour in breakout rooms. Sample topics might be Women and Minorities in Cyber Security or Cyber Security Accreditations. The groups will provide documentation of the session.
PRESENTATIONS:
These breakout room forums are provided for attendees who wish to present something of interest to an audience. Presentations should be less than 30 minutes.
To submit a proposal for a session: https://goo.gl/forms/TCURgkVgYNgSbxQI3
[/html] [/accordion] [/accordions] [spacer different_values="0" style_height="30px"] [/spacer] [html format="ckeditor" different_values="0"]*This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.S. Department of Commerce, under Grant # 60NANB16D309
[/html]