Agenda


CAE Symposium Agenda

Pre-Registration

Wednesday, June 7, 2023

02:00  -  07:30 pm

02:00  -  07:30 pm
Early Registration
  • Designation Ceremony Check-In
Grand Foyer

04:00  -  05:00 pm

04:00  -  05:00 pm
Designation Ceremony
  • Keynote Speaker, Lynne Clark
  • CISA, Dr. Elizabeth Kolmstetter
  • Certificate Distribution
Grand Ballroom II & III

05:00  -  07:00 pm

05:00  -  07:00 pm
CAE-C Community Mixer
  • Pre-Registration Networking Reception, Icebreakers,
  • Meet & Greet new CAEs
Grand Foyer

Event Day 1

Thursday, June 8, 2023

07:00  -  07:50 am

07:00  -  07:50 am
Registration Opens
  • Breakfast on your own
Grand Foyer

08:00  -  08:15 am

08:00  -  08:15 am
Welcome & Logistics
Grand Ballroom II & III

08:15  -  09:45 am

08:15  -  09:45 am
PMO & Government Updates
Grand Ballroom II & III

10:00  -  10:40 am

10:00  -  10:40 am
NCAE-C National Centers Updates:
Grand Ballroom II & III

10:40  -  11:00 am

10:40  -  11:00 am
NICE Challenge Project
Grand Ballroom II & III

11:00  -  11:30 am

11:00  -  11:30 am
NCAE Competitions
Grand Ballroom II & III

11:30  -  12:00 pm

11:30  -  12:00 pm
Working Lunch
  • Served at your table
Grand Ballroom II & III

12:00  -  12:45 pm

12:00  -  12:45 pm
CAE-CD Presentations
  • Yair Levy & Anne Kohnke
  • Kelli Burgin & Anna Carlin
Grand Ballroom II & III

01:00  -  02:45 pm

01:00  -  02:45 pm
CAE-CD
  • Presentations
Grand Ballroom II & III
CAE-CD
  • Presentations
Grand Ballroom I

01:00  -  02:45 pm

01:00  -  02:45 pm
CAE-CD
  • Presentations
Fifth Avenue
CAE-CD
  • Presentations
Cascade I
CAE-CD
  • Presentations
Cascade II

01:00  -  02:45 pm

01:00  -  02:45 pm
CAE-CO Cyber Operations
  • Seth Hamman
Grand Crescent

03:00  -  04:30 pm

03:00  -  04:30 pm
CAE-CD
  • Presentations
Vashon
CAE-CD
  • Presentations
Grand Ballroom II & III
CAE-CD
  • Presentations
Grand Ballroom I

03:00  -  04:30 pm

03:00  -  04:30 pm
CAE-CD
  • Presentations
Fifth Avenue
CAE-CD
  • Presentations
Cascade I
CAE-CD
  • Presentations
Cascade II

03:00  -  04:00 pm

03:00  -  04:00 pm
CAE-CO Cyber Operations
  • Seth Hamman, Drew Hamilton
Grand Crescent

04:35  -  05:00 pm

04:35  -  05:00 pm
Closing Discussions
Grand Ballroom II & III

05:00  -  07:00 pm

05:00  -  07:00 pm
Sponsor Reception
  • Heavy Hors D’oeurves
Grand Foyer

05:30  -  06:30 pm

05:30  -  06:30 pm
Cyberbit
Fifth Avenue

Event Day 2

Friday, June 9, 2023

07:50  -  08:00 am

07:50  -  08:00 am
Wake up Call
Grand Ballroom II & III

08:00  -  08:30 am

08:00  -  08:30 am
Working Breakfast
  • Buffet Available Starting 7:30 am
Grand Ballroom II & III

08:30  -  08:40 am

08:30  -  08:40 am
CARD and CLARK
Grand Ballroom II & III

08:40  -  09:15 am

08:40  -  09:15 am
Keynote ONCD
Grand Ballroom II & III

09:15  -  10:00 am

09:15  -  10:00 am
CAE Community
  • Service Recognitions
Grand Ballroom II & III

10:15  -  10:55 am

10:15  -  10:55 am
CAE-R INSuRe Faculty Panel
Fifth Avenue

10:15  -  11:15 am

10:15  -  11:15 am
CAE-CD Presentations
  • Wei Li & Xiuwen Liu
  • Chutima Boonthum-Denecke & Idongesit Mkpong-Ruffin
  • Tobi West
Grand Ballroom II & III

11:00  -  11:45 am

11:00  -  11:45 am
CAE-R Cyber Research
  • PoC Meeting
Fifth Avenue

11:15  -  11:55 am

11:15  -  11:55 am
CAE-CD Panel Discussion
  • Kim Muschalek, John Sands
  • Stephen Miller, John Roberts
Grand Ballroom II & III

12:00  -  01:00 pm

12:00  -  01:00 pm
Dismissal / Closing Remarks
Grand Ballroom II & III

Presentation Schedule


CAE Symposium Presentation Schedule

CAE-CD Schedule

Grand Ballroom II & III - Open Meeting

12:00- 12:45 pm

12:00- 12:45 pm

CAE Community of Practice (CoP)-CD
  • Yair Levy, Nova Southeastern University
  • Anne Kohnke, University of Detroit Mercy

Yair Levy, Nova Southeastern University Dr. Yair Levy is a Professor of IS and Cybersecurity at the College of Computing and Engineering at Nova Southeastern University, the Director of the Center for Information Protection, Education, and Research (CIPhER). He chairs the Cybersecurity Curriculum Committee at the college overseeing the Cybersecurity MS and Ph.D. programs. He is the POC for NSU’s NCAE-C designation and serves as the national co-lead for the CAE Community of Practice in Cyber Defense (CoP-CD). He holds an Aerospace Engineering degree, an MBA and Ph.D. in IS from FIU. During the mid to late 1990s, he assisted NASA to develop e-learning platforms and manage Internet infrastructure. He conducts innovative research on the human-factor of cybersecurity. His research publications were cited over 5,600 times. He was trained in 2015 by the FBI Miami and serves as a member of the Board of Directors of the FBI's InfraGard South Florida Chapter and serves as Education Sector Chief. He consults local, state, and federal agencies on cybersecurity topics. He teaches courses on cybersecurity, risk management, and guides Ph.D. students.
Anne Kohnke, University of Detroit Mercy Dr. Anne Kohnke is an Associate Professor of Cybersecurity in the Department of Cybersecurity & IS, and the Director of the Center for Cyber, Security & Intelligence Studies at the University of Detroit Mercy. As the POC of the CAE-CD, Kohnke serves as the Co-Chair of the national CAE-CD Community of Practice and as a peer-reviewer and mentor to other CAE-CD schools. After a 25-year career in IT, Kohnke transitioned from a vice president of IT and CISO position into full-time academia. Prior to joining Detroit Mercy, Kohnke was a tenured Associate Professor at Lawrence Technological University, where she taught technical IT and cybersecurity courses. Her research is focused in cybersecurity, risk management, cybercrime and police reform. Kohnke was recently awarded a grant on policing reform projects with police jurisdictions in and around the Detroit area. She has co-authored six books and several journal articles in the cybersecurity and risk management discipline. Kohnke earned her Ph.D. from Benedictine University, and an MBA from Lawrence Technological University. She joined the University in 2019.

The CAE Community of Practice (CoP) for Cyber Defense (CD) (https://www.caecommunity.org/community-of-practice/cyber-defense) was established in 2020 with the mission: “To collaborate with both the CAE Community and the NCAE-C Program Management Office (PMO) to build a Cybersecurity Excellence Community of Practice in Cyber Defense (CoP-CD) in order to gather and share input from the broader community as well as to provide continuous program improvement". This session will discuss the progress and key achievements that the CoP-CD had during the past academic year, including several initiatives such as: the monthly "Getting to Know Your Fellow CAE-CDs" event, the monthly "Meet Your Cyber Competition" event, the annual "CAE-CD Community Outreach Competition", the "New CAE-CD Point of Contact (POC) Onboarding Process" workshop, the ongoing efforts by the "CAE-CD Industry Relations and Shared Resources" and the "NCAE-C Student Code of Ethics and Professional Conduct" initiatives, and the annual “CAE Community Symposium - CAE-CD Planning Committee” work.

25 min

NCAE-C Student Code of Ethics and Professional Conduct
  • Kelli Burgin, Montreat College
  • Anna Carlin, Fullerton College

Kelli Burgin, Montreat College Kelli Burgin has been teaching cybersecurity at Montreat College since January of 2016. Prior to joining Montreat, she was the IT coordinator at Audubon County Memorial Hospital in Audubon, Iowa filling the roles of HIPAA security officer, help desk manager, information security officer, project manager, meaningful use coordinator, and PACS administrator and trainer. Professor Burgin earned a B.A from the University of Northern Iowa and an M.S. in Computer Information Systems at Bellevue University. She holds CompTIA A+ and Network+ certification and (ISC)2’s Certified Information System Security Professional (CISSP).
Anna Carlin, Fullerton College Anna Carlin, CISA, is a CIS Department Coordinator and Instructor at Fullerton College. Ms. Carlin teaches Cyber Security, Network Security, and Ethical Hacking. Ms. Carlin is also the Executive Director of the Hornet Security Education Center to educate students and the surrounding community on safe computing practices. Anna has over 15 years of experience in IT audit, software development, and operations management. Anna serves on the ISC2 Los Angeles Advisory Board and previously on the Academic Relations Committee for ISACA Los Angeles for 10 years.

More than 60 percent of university students freely admit to cheating in some form, according to Dr. Donald McCabe of the International Center for Academic Integrity. The NCAE-C Student Code of Ethics and Professional Conduct sub-committee has drafted a Code of Ethics and Professional Conduct for faculty consideration. A Code of Ethics establishes core values, ethical principles and ethical standards that student professionals use to guide their academic and professional conduct. We will also suggest some guidance to faculty on how to implement it in their courses. We invite you to join us in a discussion on the draft and share your insights on effective strategies for addressing unethical behavior in a profession that holds a position of high trust within organizations, where they are expected to uphold the highest standards of integrity. Your perspectives and suggestions are invaluable in helping us develop a comprehensive approach to combating this issue.

20 min

CAE-CD Schedule

Grand Ballroom II & III - Thursday Block I

01:00- 02:00 pm
Session Chair: Diego Tibaquira

01:00- 02:00 pm

National Cybersecurity Curriculum Task Force
  • Cara Tang, Portland Community College

Cara Tang, Portland Community College Cara Tang is the faculty lead of the Cybersecurity program at Portland Community College in Portland, Oregon. She co-chairs the National Cybersecurity Curriculum Task Force with Sidd Kaza of Towson University. In addition to this project, Dr. Tang has been involved in a number of curricular efforts in the cybersecurity education community, including chairing the task force that developed Cyber2yr2020, ACM's curriculum guidelines for associate degree programs in Cybersecurity, and serving on ABET's CSAB/CAC criteria committee and leading the subcommittee concerned with computing, cybersecurity, and IT criteria for associate degree programs.

Funded by the NSA through the NCAE-C program, the mission of the National Cybersecurity Curriculum Task Force is to catalog and create high-quality and relevant curricula on emerging cybersecurity topics, mapping to curricular and workforce guidelines, and make them freely available. The mission is being accomplished with the following goals: (1) Conduct a comprehensive search of available curricula in cybersecurity repositories, directories, and among the community. (2) Perform gap analysis to identify high-need areas to create a cyber-ready workforce. (3) Develop high-impact, high-value curricula for the community. In its second year, this project has iterated through the three goals in one cycle already, and a second cycle is in progress. This lightning talk will share the results of the project so far, point the audience to where they can find vetted cybersecurity curriculum materials, and offer opportunities to contribute to the project.

10 min

Helping to Increase the Numbers of Underrepresented Minorities in Cybersecurity
  • Diego Tibaquira, Miami Dade College

Diego Tibaquira, Miami Dade College Diego Tibaquirá is a Professor of Computer Science with a Cybersecurity concentration. After serving in the Marines, he attended UNC Greensboro and North Carolina A&T University, where he received a bachelor’s and master’s in Computer Science, including a Graduate Certificate in Information Privacy and Security sponsored by the National Security Agency (NSA). He obtained his doctorate from NOVA University. Since 2017 he has been helping build the curriculum, develop new programs, provide professional development opportunities, secure grant funding, and help educate the next generation of Cybersecurity and Cloud Computing Workforce. He works with the Honors College, PTK, and Military/Veteran students as well.

Miami Dade College has made strides in increasing the number of underrepresented minorities in the field of cybersecurity. MDC provides stackable programs, certifications, professional development, and other initiatives to help students come to our programs, graduate, and get a career. 

10 min

Beyond GenCyber: Promoting Diversity and Inclusion in Cybersecurity with an Effective Outreach Program
  • Sandra Leiterman, University Arkansas at Little rock

Sandra Leiterman, University Arkansas at Little rock Sandra has over ten years of experience teaching in STEM Education. She has taught middle school math, science, and engineering courses as well as university-level pre-service education courses. She worked as a Math Specialist for the state of Arkansas, providing professional development in math teaching. She currently works as the managing director of the UA Little Rock Cyber Arena, coordinating K-12 and corporate education programs and outreach and recruitment for the Cyber Security degree program. Sandra has several passionate initiatives within STEM education, including mentoring Girls in STEM, robotics education, education technology integration, online/social media safety, and security. She has a BS in Middle School Math & Science Education, a graduate certificate in K-12 Gifted Education, and an MSE in Digital Teaching and Online Learning. She is working on her Ph.D. in Math education at the University of Wisconsin Milwaukee.

Community outreach is essential for building relationships between the community, potential students, and the college. Increasing visibility in the local area helps to attract more students, donors, and industry partnerships. A successful outreach program can help a college to connect with people from diverse backgrounds and promote a culture of inclusion. It can also help to create a more welcoming and supportive environment for all students and staff. A solid outreach program should provide education and training opportunities, foster mentorship and networking relationships, and raise awareness about the benefits of diversity in the industry. Cybersecurity Awareness Month, International Day of the Girl, and International Women's Day are great opportunities to host events to increase awareness and excitement for women in cybersecurity. This session will explore strategies and showcase successful events that provide opportunities and cybersecurity awareness for students in grades 6-12.

20 min

The Cybersecurity Workforce Challenge: Are Academically Qualified Faculty Members the Bottleneck?
  • Dr. Anne Kohnke, University of Detroit Mercy
  • Dr. Yair Levy, Nova Southeastern University

Dr. Anne Kohnke, University of Detroit Mercy Dr. Anne Kohnke is an Associate Professor of Cybersecurity in the Department of Cybersecurity & IS, and the Director of the Center for Cyber, Security & Intelligence Studies at the University of Detroit Mercy. As the POC of the CAE-CD, Kohnke serves as the Co-Chair of the national CAE-CD Community of Practice and as a peer-reviewer and mentor to other CAE-CD schools. After a 25-year career in IT, Kohnke transitioned from a vice president of IT and CISO position into full-time academia. Prior to joining Detroit Mercy, Kohnke was a tenured Associate Professor at Lawrence Technological University, where she taught technical IT and cybersecurity courses. Her research is focused in cybersecurity, risk management, cybercrime and police reform. Kohnke was recently awarded a grant on policing reform projects with police jurisdictions in and around the Detroit area. She has co-authored six books and several journal articles in the cybersecurity and risk management discipline. Kohnke earned her Ph.D. from Benedictine University, and an MBA from Lawrence Technological University. She joined the University in 2019.
Dr. Yair Levy, Nova Southeastern University Dr. Yair Levy is a Professor of IS and Cybersecurity at the College of Computing and Engineering at Nova Southeastern University, the Director of the Center for Information Protection, Education, and Research (CIPhER). He chairs the Cybersecurity Curriculum Committee at the college overseeing the Cybersecurity MS and Ph.D. programs. He is the POC for NSU’s NCAE-C designation and serves as the national co-lead for the CAE Community of Practice in Cyber Defense (CoP-CD). He holds an Aerospace Engineering degree, an MBA and Ph.D. in IS from FIU. During the mid to late 1990s, he assisted NASA to develop e-learning platforms and manage Internet infrastructure. He conducts innovative research on the human-factor of cybersecurity. His research publications were cited over 5,600 times. He was trained in 2015 by the FBI Miami and serves as a member of the Board of Directors of the FBI's InfraGard South Florida Chapter and serves as Education Sector Chief. He consults local, state, and federal agencies on cybersecurity topics. He teaches courses on cybersecurity, risk management, and guides Ph.D. students.

This mini workshop will start with a short presentation to provide latest statistics on the cybersecurity workforce challenge, followed by a discussion about the nationwide demand and open positions for academically qualified cybersecurity faculty, both full-time and adjunct. Then, an interactive workshop will be provided where the audience will collaboratively share their own stories regarding the recruitment of academically qualified faculty members at their institution. The information gathered in this workshop will aid us in collecting additional information, to be collected in an anonymous process, in order to provide initial empirical evidence to further understand if this is one of the critical factors causing the bottleneck affecting the national cybersecurity workforce challenge. During the mini workshop part of this session, participants will be asked to answer anonymously relevant questions in a gamified process. Final results will be presented at the end of the mini workshop with the participants.

20 min

02:00- 02:45 pm
Session Chair: Michael Tu

02:00- 02:45 pm

RING - Introduction of Cybersecurity Curriculum into High Schools in Hawaii
  • Debasis Bhattacharya, Univesity of Hawaii Maui College

Debasis Bhattacharya, Univesity of Hawaii Maui College Dr. Debasis Bhattacharya is currently an Associate Professor at the University of Hawai’i Maui College, and program coordinator for the Applied Business and Information Technology (ABIT) baccalaureate program. Dr. Bhattacharya has been working in the software and higher education industry for 35 years, having worked for large corporations such as Oracle and Microsoft for 15 years. A resident of Hawaii since 2002, he has been actively researching the information security needs of small businesses since 2008. As a former small business owner, he understands the needs and demands of information security, as well as keeping a small business up and running! Dr. Bhattacharya holds degrees from MIT, Columbia University, University of Phoenix, and NW California University School of Law. Research interests include computer science education, cybersecurity, cryptocurrencies, blockchains, and machine learning. Dr. Bhattacharya is a Senior Member of the IEEE and the ACM and a member of the Academy of Management (AoM).

RING (Regions Investing in the Next Generation) is a free online high school cybersecurity course that offers interesting and engaging content specifically for rural students, homeschool students, and students attending schools without an existing cybersecurity program. RING is structured for high school students, grades 9-12. The curriculum has been developed through the National Security Agency’s RING program grant to The University of Alabama in Huntsville (UAH). University of Hawaii Maui College is part of a coalition of colleges across the US, supported by funds from the NSA, to teach RING to high school teachers and students. The objective of this presentation is to: 1. Provide a Course Overview of RING 2. Outline the Key Concepts of RING 3. Demonstrate a Sample Lesson - Establishing Trust, Caesar Cipher and Steganography The audience will learn about the core modules in RING, how it applies to students who are new to cybersecurity, and how RING can be an inclusive and friendly space for newcomers to learn about cybersecurity. The presentation will provide live examples from the RING curriculum using the Canvas learning module system. The audience will also benefit from a pathway that extends the learning from RING to more advanced topics in networking and computer security. The presentation will provide a sample lesson plan for teachers, that has been created by high school teachers in Hawaii, to demonstrate how RING can be taught to high school students. 

20 min

Cybersecurity Leadership: Growing the Maconachy, Schou, Ragsdale (MSR) Model to Identify New Cyber Skills
  • Dr. Ervin Frenzel, Collin College

Dr. Ervin Frenzel, Collin College Dr. Ervin Frenzel is the Director of Cybersecurity at a College in North Texas; he has been in cybersecurity since 1989 and covered many of the recognized roles within the field. Starting out in 1989 in the US Army, he has served outside of academia in finance, educational, medical, and government entities. While serving as the Director of the North Texas College, he has achieved the NSA CAE-CD credential for the school, serves as an NSA CAE-CD peer mentor, reviewer, and reviewer committee chair. He was the EC Council academic Instructor of the year (2020) and is a contributing member of multiple international committees on Human/Technology Interaction. He has led multiple schools to recognition by EC Council, first as the Global Academic Newcomer of the year in 2020, and recently as the Global Academic Innovation School of the year (2023). He is a published author with research interests in socio-technical systems interactions and has taught at multiple schools across the Nation.

To aid organizations in finding relevant skills, organizations must first identify what skills they are really looking for. These needs must be conveyed in a format that job seekers can easily identify. A model exists to allow organizations to better identify what and why skills are needed from potential employees. Job seekers need to better categorize their skills based upon recognized components of cybersecurity not the general blanket term "cybersecurity". The Maconachy, Schou, and Ragsdale Information Assurance (IA) Model, though one of the oldest models, provides framework guidance for both job seekers and organizations. A modern breakout and explanation of the model allows both employer and job seeker to convey their skills and job requirements to facilitate filling of existing and future cybersecurity or component level security positions.

20 min

Grand Ballroom I - Thursday Block I

01:00- 02:00 pm
Session Chair: Faisal Kaleem

01:00- 02:00 pm

Escaping the Mundane: Gamifying Cyber Education with Escape Rooms
  • Jonathan Kamyck, Southern New Hampshire University

Jonathan Kamyck, Southern New Hampshire University Jonathan Kamyck is a Senior Associate Dean on Southern New Hampshire University's STEM Academic Team. He led the development of the University's first “One Competency, One Credit” undergraduate academic program in Cybersecurity. He is a two-time SNHU alum, earning a BS in Business Administration and MS in Organizational Leadership. He is also an (ISC)2 Certified Information Systems Security Professional (CISSP) and holds an MS in Information Assurance from Norwich University.

Audience engagement is a key challenge associated with Cybersecurity education. Gamification - where elements of competition, unpredictability, and active participation are leveraged to increase interest and motivate learner engagement - is a new frontier for academic research and investment. In this presentation, we demonstrate how a gamified “virtual escape room” challenge can be used to create an interesting, exciting, and memorable cybersecurity learning experience. 

20 min

Building a Winning Cyber Team: Cracking the NSA Codebreaker Challange
  • Carlos Sapijaszko, Strayer University
  • Darcel Ford, Strayer University

Carlos Sapijaszko, Strayer University Dr. Carlo Sapijaszko is an engineer and an educator. He currently holds a Senior Dean position at Strayer University managing Technology and Professional Studies programs. For over 25 years, Dr. Sapijaszko combined a blend of electrical and computer engineering and higher education skills to design innovative and pedagogically-rich academic programs.
Darcel Ford, Strayer University Dr. Darcel Ford is an investigative digital forensics tester. She teaches cybersecurity courses at Strayer University and leads students in National University Challenges and Capture the Flag events. In 2019, she received the Teacher Excellence Award; in 2022, she received the Student Centric Award. Darcel holds a Ph.D. in Information Systems Management, a Master’s in Cybersecurity, the C|EH, C|HFI, and Security+ certifications.

This presentation describes how the team of Strayer University student coders won 5th place out of over 400 participating schools in the 2022 NSA Codebreaker Challenge, a hyper-authentic learning experience in which teams from across the country compete to develop successful defenses to real-time cybersecurity threats. Lessons are drawn into how students from non-traditional and underserved communities can overcome key challenges to developing the coding, engineering, strategic planning, and problem-solving skillsets needed for today’s IT workplace. Topics of focus include Strayer’s practices for recruiting, coaching, and forging a strong esprit de corps for the codebreaker team, using real-world collaboration tools designed to build camaraderie and group ownership. Insights are also offered into how students mastered applying the advanced technical skills demanded by the high level of difficulty the Codebreaker Challenge entails, including complex techniques for reverse engineering, malicious code obfuscation, cryptography, and infrastructure penetration testing.

20 min

Mapping the Competitions Landscape for the CAE Community
  • Jake Mihevc, Mohawk Valley Community College

Jake Mihevc, Mohawk Valley Community College Jake serves as Dean of Science, Technology, Engineering and Math at Mohawk Valley Community College. He helped launch the college’s Cybersecurity AS program in 2014 and helped it achieve the CAE-CD designation in 2016. Jake serves as PI of the NCAE Cyber Games project and Co-PI of the Northeast Hub for the CAE program. Jake is a co-founder of the Central New York Hackathon, a regional cybersecurity competition that brings over 100 students from six cybersecurity programs together each semester to test their skills. He is an active member of the National Initiative for Cybersecurity Education Workgroup and has worked to refine and expand cybersecurity competitions nationwide.

This presentation will share the conceptual framework for a new resource under development for the CAE Community: a competitions roadmap. The goal for the roadmap is to move beyond a traditional list and visually render everything CAE faculty and students need to know about the competitions available to enable selection of the most appropriate competition for them. This presentation will share a prototype and solicit ideas and input for the first production release.

20 min

02:00- 02:45 pm
Session Chair: Kelli Burgin

02:00- 02:45 pm

Leveraging Professional Associations
  • Anna Carlin, Fullerton College

Anna Carlin, Fullerton College Anna Carlin, CISA, is a CIS Department Coordinator and Instructor at Fullerton College. Ms. Carlin teaches Cyber Security, Network Security, Ethical Hacking, and Introduction to Information Systems in the Business and CIS Division. Ms. Carlin is also the Executive Director of the Hornet Security Education Center to educate students and the surrounding community on safe computing practices. Anna has over 15 years of experience in IT audit, software development, and operations management. Anna serves on the Advisory Board for ISC2 Los Angeles and previously on the Academic Relations Committee for the Los Angeles Chapter of ISACA for 10 years.

Professional organizations are defined as a group that furthers a particular profession, those engaged in that profession, and the public interest. As part of furthering the profession, many professional associations have created programs to perform outreach to colleges and universities. Faculty and student clubs can benefit from connecting with their local chapters of the major professional associations, such as ISACA, ISSA, and ISC2. This presentation will share the benefits of professional associations, programs available to higher education, and how to connect your student clubs to the professional association.

10 min

Cybersecurity Pathways: Report on a Systems Based Approach Through Mentoring
  • Lonnie Decker, Davenport University

Lonnie Decker, Davenport University Dr. Lonnie Decker has been with Davenport University since 1989, and currently serves as the Department Chair for Networking and Cybersecurity. He received a Bachelor’s in Computer Science from Michigan Technological University in 1987, and a Master’s in Computer Science from Central Michigan University in 1996. In 2008 he completed a Ph.D. in Organization & Management, with a specialty in IT Management, from Capella University.

The need for cybersecurity workers is clear. With a documented current shortage of cybersecurity workers in the U.S. identified as over 300,000 openings, the need to attract, and retain more future cybersecurity workers could not be more clear. Many efforts have been created to address this need and have had clear positive results. These include the use of summer camps and competitions to increase interest in the field, reaching out to underrepresented populations to help fill the need, and providing scholarships and using shared curriculum to help students through their educational pathway. Davenport University, through the implementation of an NSF CyberCorps®: Scholarship for Service (SFS) grant, has implemented a systems based approach to identify and align these previous efforts that address the cybersecurity pathway. Through the development of a Community Based Life Cycle (CBLC) framework, this approach is centered around mentoring (using both professional mentoring and peer-mentoring) and the use of Cascade Advising, with the intention to both increase students in the cybersecurity pathway, but also to help retain students’ interest in cybersecurity. This presentation will report on our findings after four years of implementation.      

10 min

Impact of Generative Artificial Intelligence on Cybersecurity Education
  • Dulal Chandra Kar, Texas A&M University - Corpus Christy

Dulal Chandra Kar, Texas A&M University - Corpus Christy Dulal Chandra Kar has over 30 years of experience as an educator in computer science and electrical engineering, having taught at various institutions including Texas A&M University- Corpus Christi (TAMUCC), Virginia Tech, Mountain State University, North Dakota State University, and Bangladesh University of Engineering and Technology. He completed his BS degree in Electrical and Electronic Engineering from Bangladesh University of Engineering and Technology in 1982. In 1991, he achieved his MS in Electrical and Electronics Engineering, followed by his Ph.D. degree in Engineering with a specialization in Computer Engineering in 1994 from North Dakota State University. Currently, Dr. Kar holds a position of full professor in the Department of Computing Sciences at TAMUCC. He recently served as the Interim Chair of the Department of Computing Sciences at TAMUCC from August 2020 to August 2021. Dr. Kar has also directed several projects funded by the NSF, including NSF REU, NSF S-STEM, NSF CRI, and NSF MRI grants. His areas of research interests include information security, network security, unmanned aerial systems, and sensor networks.

The latest advancements in generative AI have created both beneficial and harmful opportunities. Novice attackers can now quickly develop multiple variations of malware to evade anti-malware detection tools and can even use advanced technology like ChatGPT to create harmful programs from scratch. Generative AI tools can easily produce human-like content, such as speech and text, to create phishing emails and social engineering attacks. This poses a significant challenge for existing phishing email detection systems, as generative AI can produce countless variations of phishing emails with almost no distinguishable features that are often used by detection engines. Furthermore, sophisticated social engineering attacks are now possible by mimicking the voice of a real human being to deceive people using AI models. This is particularly concerning for the creation of convincing deepfake videos, as well as the generation of fake news and social media posts. Accordingly, the cybersecurity community must adapt to the use of generative AI technology with great caution, using rigorous knowledge and countermeasures to prevent potential security breaches by adversaries. Generative AI has the potential to impact cybersecurity education in various ways, particularly in the creation of realistic training datasets for cybersecurity professionals that mimics real-world cyber threats, allowing cybersecurity professionals to practice identifying and responding to these threats in a secure and controlled environment. Furthermore, generative AI can be utilized to develop more engaging and interactive cybersecurity training materials such as virtual simulations and games to provide learners with an immersive and dynamic learning experience. Overall, generative AI has the potential to significantly enhance cybersecurity education by providing more realistic training datasets and more engaging learning experiences. The primary focus of this talk is on the impact of generative AI on cybersecu-
rity, as well as its influence on cybersecurity education.

10 min

Navigating Work Skill Readiness Using ChatGPT
  • Dr. Ram Dantu (On Behalf of Thomas McCullough), University of North Texas

Dr. Ram Dantu (On Behalf of Thomas McCullough), University of North Texas Dr. Ram Dantu has been the professor and director of the Center for Information and Cyber Security at UNT for the last 20 years and is recognized as a Center of Academic Excellence for Research and Cyber Defense by the National Security Agency. He has 15 years of industrial experience in the networking industry, where he worked as technical director for Cisco, Nortel, Alcatel, and Fujitsu, three startups, and was responsible for advanced technology products from concept to delivery. He has received several NSF/NSA awards in collaboration (lead-PI) with Columbia University, Purdue University, and MIT. He was selected for the first batch of the Innovation Corps of NSF in 2011. During 2010-2012, he was a visiting professor at MIT in the School of Engineering. In 2013, NSF TV invited him for a webcast on NG9-1-1 services. In addition to several hundred research papers, he has authored several standardizations of protocols such as MPLS, SS7 over IP, and SDN. He was the principal inventor of 24 patents, and many are used in the industry. Recently he won the best research paper of the decade (2010-2020) award from IEEE Transactions on Intelligent Transportation Systems.

Cybersecurity competency is essential for securing jobs in federal agencies and industries. To ensure students are prepared for the workforce, universities should emphasize work skill readiness. This research proposes using large language models (LLMs) like Chat-GPT to extract skills from course materials and job postings. The extracted skills can then be cross-referenced with grades received to select the perfect candidate for a given task. Compared to other LLMs, Chat-GPT meets several important requirements such as speed, low cost, frequent updates, and robust APIs. The algorithm for skill extraction has salient features like segmenting longer assignments into chunks, inputting relevant categories of skills to increase the quantity and relevance of extracted skills, managing verbosity, and instructing the LLM to expand or summarize the skills. The more times a document is segmented, the more skills will be listed in the final aggregate list. However, both assignments and job postings are susceptible to tunnel vision with excessive segmentation. Furthermore, supplying stop words to the LLM is possible and can prevent unnecessary NLP pipelines. The findings suggest that there is a valuable middle ground when it comes to segmentation, and if assignments and job postings are segmented by questions and job requirements, it may be possible to extract a high number of quality skills without becoming a victim of tunnel vision. With the release of GPT4 next month, it will be possible to extract skills from recorded lectures, graphs, figures, and audio recordings such as phone interviews with prospective candidates. Overall, the results are promising, with thousands of extracted skills across hundreds of assignments and job postings, averaging 21 extracted skills per job posting and 25 extracted skills per assignment. The method provides both flexibility and comprehensiveness. For instance, we can specify that we want soft skills as well as hard skills, and the LLM provides such a curated list. LLMs have the potential to transform traditional natural language pipelines, and we have an exciting opportunity to take advantage of this technology.

10 min

Fifth Avenue - Thursday Block I

01:00- 02:00 pm
Session Chair: Deanne Cranford-Wesley

01:00- 02:00 pm

Repair Broken Cybersecurity Hiring and Realistic Job Requirements and Expanded Candidate Resources
  • Sandra Blanke, University of Dallas

Sandra Blanke, University of Dallas Dr. Sandra Blanke joined the University of Dallas – Irving, Texas in 2005 and is an Associate Professor in Cyber Security Education. She serves as the Director for the Center of Cyber Security Education, Cyber Intelligence and is the Ellis Endowed Chair in Management Technology. Dr. Blanke is a Certified Information Systems Security Professional (CISSP) and maintains a Certification in Risk and Information Systems Control (CRISC). Dr. Blanke’s Ph.D. is in Computer and Information Sciences. Dr.Blanke is co-chair of the “Getting to Know Your Fellow CAE-CDs and a member of the Community of Practice Cyber Defense (CoP-CD) Steering Committee. Dr. Blanke’s research, teaching and consulting areas of expertise include cybersecurity, risk management, disaster recovery, emerging technologies and developing cybersecurity talent. She teaches graduate courses in cybersecurity and serves as chair for Ph.D. candidates within her research areas. Blanke is a former Verizon Executive with over 20 years in Enterprise Management and Technology.

According to Cyberseek.org, there are currently 700,000+ cybersecurity position vacancies in the US. AccessCyber reports reviewing 10,584 cybersecurity job postings and states “Cybersecurity Hiring is Broken” and employers seeking “unicorn” candidates is identified as one cause of the problem. In reviewing position vacancies, half of the vacancies are within the NICE Oversee and Govern (OS&G) category. OS&G requires cybersecurity knowledge and skills, as well as strong business acumen. Many of the OS&G positions including cyber policy and strategy, curriculum developer, program manager, and legal advisor are in Governance, Risk and Compliance (GRC) departments. GRC executives job requirements include cybersecurity foundations, critical thinking and problem solving, risk management, compliance and legal, communications, and a passion for continuous learning. Universities designated as NSA Centers of Academic Excellence in Cyber Defense (CAE-CD) can provide remedies for the broken cybersecurity hiring process. First, utilizing an advisory board in developing cybersecurity course programs and job descriptions followed by an alignment of job descriptions to job skills could reduce vacancies and positions filled by CAE-CD students or alumni. In an interview with the Wall Street Journal, Dr. Sandra Blanke from the University of Dallas noted position descriptions typically list more job skills than are actually needed. Managers know the candidate they hire will have only some of the skills requested. Employers could consider candidates with many of the job skills and the passion for continuous learning. Hiring managers and school career services should be encouraged to work together to write job descriptions for the required knowledge areas only, not looking for “unicorn” candidates. Universities can use student and alumni “spotlights” to show hiring managers their students’ qualifications and successes. Finally, the inexperienced cybersecurity candidate should apply for positions if they meet a number of the skills listed on the job description.

10 min

Business and Industry Leadership Team (BILT)
  • Gary Sparks, Metropolitan Community Colllege, Omaha

Gary Sparks, Metropolitan Community Colllege, Omaha Gary Sparks is the Program Director of the Metropolitan Community College Cybersecurity Center, a full-time instructor, and a retired Chief Master Sergeant (CMSgt) from the US Air Force and Air National Guard. He has 40-plus years of experience in security and computer technology operations and management. As the Chief of Security for an intelligence squadron, he managed all security programs and advised the commander on processes, policies, and procedures for physical, information, operations, transmission, technical, and communications security. He was a master instructor for the US Air Force. Gary holds two AS (Associate of Science) degrees from the Community College of the Air Force (CCAF) as an instructor of Military Science and Technology and Security and Law Enforcement Administration. He also holds a BS (Bachelor of Science) and MS (Master of Science) in Management of Information Systems (MIS) with a focus on INFOSEC (Information Security) from Bellevue University.

The landscape of cybersecurity is constantly changing. The Business and Industry Leadership Team (BILT) helps keep programs current on trends and helps schools keep programs current on what candidates will encounter in the field. This presentation highlights how Metropolitan Community College in Omaha uses the BILT.     

10 min

Five Steps to Building Corporate Relationships, Curriculum Collaboration and Customization
  • Morgan Zantua, City University of Seattle
  • Ahreum Ju, City University of Seattle

Morgan Zantua, City University of Seattle Morgan Zantua is the Director of City University of Seattle’s Center for Cybersecurity Innovation and Associate Professor at the School of Technology & Computing. She is a Whole Systems Designer with thirty years’ experience in workforce development. Morgan is PI on multiple grants to expand cybersecurity career pathways opportunities including a seven-state cybersecurity teacher development initiative, STARTALK - Korean, and development of a Cybersecurity Career Navigation Badge to support recruitment, retention, and transition in the reserve components.
Ahreum Ju, City University of Seattle Dr. Ahreum Ju is Director of Content, Assistant Professor at City University of Seattle’s School of Technology & Computing. She is the Associate Director of the Center for Cybersecurity Innovation and supports the NCAE, Cybersecurity Highschool Innovations, and the DoD Cybersecurity Career Navigation Badge. Ahreum is the Instructional Lead and SME on the NSA STARTALK-Korean grant.

Corporate Collaboration in Curriculum Design and Development. Background: The Cybersecurity Highschool Innovations collaboration with Blue Origin started with a tour for 40 high school teachers and academic faculty. This collaboration resulted in the development of an award-winning industry designed curriculum. In this 20-minute workshop, every participant completes a customized form to develop an outreach strategy with business(es) in their area to support employer outreach/workforce development activities. The interactive workshop, using the steps below, provides participants a workable plan to implement outreach or customize an existing industry developed curriculum, Phishing: Blue Origin in CLARK. This fast-paced workshop provides: Step 1: Develop a strategy to approach businesses. Step 2: Engage in education and business collaboration activities to enhance workforce development. Step 3: Access the Blue Origin “Phishing Curriculum” in CLARK, a 10-module curriculum which is the results of Step 1 and Step 2 activities associated with the NSA funded Cybersecurity Highschool Innovations (CHI) grant. Learn how one program customized this industry developed curriculum. Step 4: Create a timeline with actionable steps. Step 5: Send form to participant’s email with a reminder date to ensure items are executed on schedule. Workshop presenters recommend participants come to the workshop with names of two or three business contacts, a laptop, a Gmail account, and nimble fingers to access CLARK, and a collaborative mindset.

20 min

Establishing a Large-Scale, Dynamic Consortium in Support of Cybersecurity Education
  • Waleed Farag, Indiana University of Pennsylvania

Waleed Farag, Indiana University of Pennsylvania Dr. Farag is the Director of Indiana University of Pennsylvania’s (IUP) Institute for Cybersecurity and a professor of Computer Science. He oversees the IUP Cybersecurity program, which has been designated as a CAE-CD since the early 2000s. Dr. Farag is a member of the Sigma Xi, ACM, and IEEE Computer Society. His research interests include security of autonomous and IoT systems, AI and ML applications, cybersecurity education, e-learning, and multimedia applications. He has made several contributions in these areas and has published/presented over 70 articles in recognized national and international journals, conferences, and workshops. His work was recognized with the Best Paper Award at the ACM SIGITE 2012. Dr. Farag has outstanding records of securing funds to support his research and is currently the PI of several major federally funded grants. His work in these projects has led to the establishment of unique initiatives that have enhanced cybersecurity research and education across Pennsylvania and beyond. Furthermore, Dr. Farag has served on many technical program committees and as a reviewer for several international journals, conferences, and federal agencies.

This session will discuss a large-scale, multi-million-dollar project that is funded by the DoD-NDEP, one of only five national cooperative agreements funded in September 2022. This project focuses on the establishment of a vibrant, collaborative consortium of six community colleges (CCs), led by a four-year institution, all working together to enhance STEM education across Pennsylvania with special emphasis on cybersecurity. The main objectives of the consortium are: increase certificate completion rates, increase transfer rates to 4-year institutions, and increase student interest in employment in the DoD and DIB workforce. The major factor that contributes to our ability to successfully establish a truly collaborative consortium is the experience gained by the Lead Organization (LO) over many years working with various community colleges, technical institutes, and K-12 schools across PA to enhance cybersecurity education. The project started with the identification of specific challenges that participating CCs face, particularly those that obstruct their abilities to achieve the projects’ three main objectives. Identified challenges include effective marketing/recruitment, retention, cost of obtaining certifications, community awareness of existing opportunities and career paths, among others. To address these challenges, our group proposed a set of innovative initiatives and is currently implementing them. Some of the proposed initiatives are managed centrally at the LO to maximize efficiency, minimize needed resources, and promote collaboration, while others are being implemented locally at each of the participating CCs to address local challenges and target specific audiences at each institution. Examples of central services include soft-skill tutoring, assessment, and faculty professional development programs. Examples of local services include mentorship, certificate training, tutoring, K-12 outreach, summer activities, and course alignments to support seamless transition from 2YIs to 4YIs. The session will acquaint the audience with the project and share lessons learnt and will be delivered using multi-modal learning approaches to promote audience engagement.
 

20 min

02:00- 02:45 pm
Session Chair: Anne Kohnke

02:00- 02:45 pm

Teaching with Cybersecurity Playable Case Studies
  • Derek Hansen, Brigham Young University

Derek Hansen, Brigham Young University Derek L. Hansen is a Professor at Brigham Young University's (BYU's) Department of Electrical & Computer Engineering where he teaches Cybersecurity students. His research focuses on understanding and designing social technologies, tools, and games for the public good. He has received over $3 million in grants (as PI or co-PI) to help develop and evaluate novel technical interventions, games, and simulations with highly talented faculty, students, and professionals from a variety of disciplines. Dr. Hansen received his Ph.D. in 2007 from the University of Michigan's iSchool. He then worked at the University of Maryland's iSchool until 2011, when he joined BYU. He has published over 100 articles. He serves as the Point of Contact for BYU's Center of Academic Excellence in Cyber Defense.

Playable Case Studies (PCSs) are interactive simulations that allow students to play through an authentic case study (i.e., scenario) as a member of a professional team. They include (a) an immersive, simulated online environment, and (b) accompanying in-class activities and discussions facilitated by a teacher to provide educational scaffolding and metacognition. PCSs are designed to be authentic and feel real by incorporating the "This is Not a Game" (TINAG) ethos from Alternate Reality Games. This workshop will introduce two cybersecurity focused PCSs: 1) Cybermatics, where students join a fictional company (Cybermatics) to perform a penetration test of Riptech.xyz, helping identify vulnerabilities and uncover a hacker who has burrowed into their site, while complying with ethical practices, and 2) Bronze Falls, where students work in teams of four to protect the city (Bronze Falls) by performing a cybersecurity risk analysis, responding to a live cyberattack, and completing an after-action attribution report. We will also briefly mention the "Playable Case Study Authoring and Simulation Platform" that allows collaborators to create their own PCSs without any coding.  

20 min

Using Cyber Competitions to Bridge the Gap from Curriculum to Careers
  • Dr. Nelbert “Doc” St. Clair, College of Coastal Georgia

Dr. Nelbert “Doc” St. Clair, College of Coastal Georgia Dr. Nelbert "Doc" St. Clair is an Assistant Professor of Cyber Defense at the College of Coastal Georgia (CCGA) in Brunswick, GA, and the Director of the Coastal Cyber Center. In addition to earning all his civilian education, he served in the Army National Guard for 23 years (now retired). He holds more than 15 active cyber/IT certifications. A Cyber Defense program has been created at the college by Dr. St. Clair since the Fall of 2019. CCGA is ranked 21st in the National Cyber League power rankings.

The purpose of this session is to share best practices for educators to utilize cyber competitions with their students to build technical skills and demonstrate job-readiness to employers. While demand for cybersecurity talent is only increasing, students may still encounter difficulty in obtaining entry-level jobs. Many cybersecurity roles require multiple years of experience, which has led to employers being inundated with candidates for true entry-level jobs. This daunting challenge of evaluating candidates results in recruiters and hiring managers spending limited time considering each candidate, making it vital for students to provide evidence of their capabilities that are easily understood by talent acquisition teams. During this presentation, we will be discussing how the design of cyber competitions can be tailored to allow students to apply concepts they have gained from academic learning to real-world problems to reinforce their learning and demonstrate capabilities to employers. The impact of these experiences are captured in performance reports that are mapped to the NICE Framework and the NICE work roles to help students identify possible career paths and provide evidence of job-readiness to hiring managers. We will provide a demo of the cyber competition platform and will walk through the reporting that is provided to students and share examples of how students have been utilizing these reports to help them during the job application process. 

20 min

Cascade I - Thursday Block I

01:00- 02:00 pm
Session Chair: Anna Carlin

01:00- 02:00 pm

Cyberpreneurship: The Fusion of Cybersecurity and Entrepreneurship
  • Skip Berry, Riverside Community College

Skip Berry, Riverside Community College Skip Berry is an Associate Professor at Riverside City College. Professor Berry has been teaching cybersecurity courses since 2007 and holds CISSP, CEH, and CHFI certifications and has a B.S. in Information Systems and an M.S. in Information Security and Assurance with 25 years in the IT/Cybersecurity field. He is the program lead for the cybersecurity program, Director of the Cybersecurity Center, PI for multiple cybersecurity grants and lead faculty for the cybersecurity apprenticeship program. Professor Berry is an Ally for Women and disproportionately affected populations.

The NSF-ATE funded Cyberpreneurship project at Riverside City College is a cross-discipline effort to train cybersecurity entrepreneurs. The goal is to address the small to mid-sized businesses that make up over 40% of the breaches that occur but have no IT/Cybersecurity team or professional support. Students will gain knowledge, skills and abilities in cybersecurity and entrepreneurship. This will equip them to provide managed services, audits and other cyber/IT and automation services to those organizations. There is a lot of promotion and talk about the over 750,000 open jobs in the cybersecurity workforce. However, this does not account for the large number of small to mid-sized businesses that do not have anyone defending their systems that need to contract outside assistance to make them secure. 

10 min

Ready for Work: Incorporating Experiential Learning into Degree Pathways
  • Edward Vasko, CISSP, Boise State University

Edward Vasko, CISSP, Boise State University Edward Vasko, CISSP, is the Director of Boise State University’s Institute of Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 30-years of industry experience. Prior to joining Boise State University, Edward established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. Before establishing Avertium, he was the co-Founder and CEO of Terra Verde. Prior to being acquired by growth equity in 2018, Terra Verde was one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world. Edward’s other passion is tackling the challenge of enabling a “Ready to Work” cyber workforce. He has served on over 20 advisory boards providing expertise around cybersecurity industry needs, career pathways, and competency development. He has been appointed by multiple governors to lend his expertise to solving workforce challenges. He was the industry co-chair of the 2019 NICE Conference in Phoenix.

Surveys indicate a vast majority of employers require prior experience in their cybersecurity hiring efforts. This presents a majority of our current learner community with a quandary as they attempt to enter the workforce. Solid knowledge development (via degrees and certifications) is not enough. Simulation-based skill development (via ranges and CTF events) is not a replacement for the real-world experience needed by our employer partners. It is on the CAE community to lead the way in the creation of a "Ready for Work" workforce by making adjustments to how literal real-world experiential learning can be incorporated into our academic efforts. This talk will present multiple possibilities that have been incorporated into Boise State University’s Institute for Pervasive Cybersecurity for enabling competency development into our programs so that learners can show employers they are “Ready for Work.” We also hope, through this presentation, to begin further collaboration within the CAE community on expanding these efforts nationwide. 

20 min

A Platform for Aligning Classroom Assessments to Job Postings
  • Dr. Ram Dantu, The University of North Texas

Dr. Ram Dantu, The University of North Texas Dr. Ram Dantu has been the professor and director of the Center for Information and Cyber Security at UNT for the last 20 years and is recognized as a Center of Academic Excellence for Research and Cyber Defense by the National Security Agency. He has 15 years of industrial experience in the networking industry, where he worked as technical director for Cisco, Nortel, Alcatel, and Fujitsu, three startups, and was responsible for advanced technology products from concept to delivery. He has received several NSF/NSA awards in collaboration (lead-PI) with Columbia University, Purdue University, and MIT. He was selected for the first batch of the Innovation Corps of NSF in 2011. During 2010-2012, he was a visiting professor at MIT in the School of Engineering. In 2013 NSF TV invited him for a webcast on NG9-1-1 services. In addition to several hundred research papers, he has authored several standardizations of protocols such as MPLS, SS7 over IP, and SDN. He was the principal inventor of 24 patents, and many are used in the industry. Recently he won the best research paper of the decade (2010-2020) award from IEEE Transactions on Intelligent Transportation Systems.

The proposed tool will provide users with a platform to access a side-by-side comparison of classroom assessment and job posting requirements. Using techniques and methodologies from NLP, machine learning, data analysis, and data mining, the employed algorithm analyzes job postings and classroom assessments, extracts and classifies skill units within, then compares sets of skills from different input volumes. This effectively provides a predicted alignment between academic and career sources, both federal and industrial. The compilation of tool results indicates an overall accuracy score of 82%, and an alignment score of only 75.5% between the input assessments and overall job postings. These results describe that the 50 UNT assessments and 5,000 industry and federal job postings examined, demonstrate a compatibility (alignment) of 75.5%; and, that this measure was calculated using a tool operating at an 82% precision rate.

20 min

Building and Maintaining K-12 Pathways
  • Andrew Lutz, Johnson County Community College

Andrew Lutz, Johnson County Community College Andrew Lutz is the Chair of the Information Technology department and the Head of the Cyber Center at Johnson County Community College in Overland Park, Kansas. He has been working in the IT industry for over 14 years and has held various roles, including IT Director. He specializes in IT leadership, network and systems administration, security, and project management. His certifications include CCNA, Cisco Cyber Ops Associate, GCFE, GPEN, Security +, A+ and PMP. He is driven to help students achieve their goals. Outside of technology, he enjoys cooking, weight training, stock trading, and hiking.

This Lightning Talk will discuss how the Information Technology department at Johnson County Community College (JCCC) developed and maintains a K-12 pathway with a large local district, Blue Valley Schools. Now in its second year, the pathway provides students the opportunity to complete the JCCC Cybersecurity Certificate program tuition-free alongside their high school education. Successful students will receive both their diploma and the Cybersecurity Certificate upon graduation from high school. This session will discuss: • Building the pathway • Recruiting students into the program • Managing opportunities and challenges      

20 min

02:00- 02:45 pm
Session Chair: Michael Kelly

02:00- 02:45 pm

Integrating CMMC into University Cybersecurity Curriculum
  • Matt Paulson, Weber State University

Matt Paulson, Weber State University Dr. Matt Paulson is an Assistant Professor of Networking and Cybersecurity in the School of Computing at Weber State University. He is also the Director of the Weber State University Cybersecurity Initiative. He holds several security industry certifications, including CISSP, CISA, CISM, GCIH, and others. His research interests include security policies in higher education institutions.

The Cybersecurity Maturity Model Certification (CMMC) is becoming an integral part of the cybersecurity ecosystem, with its emphasis on supply chain security. Undergraduate students may benefit from being introduced to the CMMC model early in their cybersecurity training. This presentation will explore what CMMC is, the United States government foundation for this certification, and how best to present this to undergraduate students. The presentation will also explore what preparation an undergraduate student needs in cybersecurity to properly understand and implement the principles offered by CMMC. Presenting this information to graduate students may also prove beneficial; however, the emphasis and focus for this presentation will be undergraduate students.    

20 min

Investing in and Expanding Student Development Programs
  • Israel Emmanuel, Century College

Israel Emmanuel, Century College Innovative, highly dynamic information security professional with over 20 years of career success directing cross-functional teams of technical experts. Highly effective communicator with an extensive track record of building and maintaining key relationships with C-level executives, senior management, clients, technical teams, and other stakeholders. Results-oriented professional recognized for leadership and individual contributions on major initiatives and resolving mission-critical issues that ensure bottom-line success. With a broad knowledge of cyber threats detection and attack disruption, providing a powerful combination of analysis, implementation, and support. Experienced in system and network administration and engineering, project management, system and network security, incident analysis, and recovery. With in-depth knowledge of threats and exploitation techniques, providing unique insights into risk-based decisions. An Innovative team player with a passion for technology. Extremely agile and possess a positive attitude towards accomplishing business goals.

Cybersecurity student development programs are initiatives designed to help students in higher learning institutions develop the skills and competencies necessary to succeed academically, professionally, and personally. These programs aim to provide students with opportunities to engage in activities and experiences that foster growth and development inside and outside the classroom. The goal is to help students become well-rounded individuals with the knowledge and skills necessary to navigate the challenges of college and the world beyond. These programs typically involve various components, such as academic support, career development, leadership training, social engagement, and community service. The programs help students improve their study skills, time management, and academic performance. Career development programs assist students in identifying their interests, strengths, and career goals and provide guidance and resources to succeed in cybersecurity. Leadership training programs help students develop the skills and knowledge necessary to become influential leaders on campus and in the workforce. Social engagement programs allow students to connect with others and build relationships, while community service programs encourage students to give back to their communities. College student development programs have numerous benefits. Students who participate in these programs are more likely to graduate on time, find employment after graduation, and become active and engaged members of their communities. They are also more likely to have a positive college experience, with higher satisfaction, engagement, and retention levels. Finally, college student development programs are essential to career success, providing students with the knowledge, skills, and experiences necessary to succeed in college and beyond. Student development programs should be a priority for colleges and universities, with continued investment and expansion that ensures all students have access to these crucial resources. 

10 min

Secure Mission Control for Autonomous Underwater Swarms
  • Xiuwen Liu, Florida State University
  • Mike Burmester, Florida State University

Xiuwen Liu, Florida State University Xiuwen Liu is Professor and Chair of Computer Science at the Florida State University, Tallahassee, Florida, USA. His main research interests are machine learning, deep learning, program and malware analysis, and cybersecurity education. He received the Young Investigator Award from the International Neural Network Society in 2004. He develops optimization and modeling techniques for high dimensional data and focuses recently on understanding mechanisms in deep learning. In addition, he has developed and taught software reverse engineering and malware analysis, offensive computer security, and other courses for more than ten years. He co-chairs the CAE CoP Community Outreach Competition Committee.
Mike Burmester, Florida State University Professional Preparation BSc in Mathematics, University of Athens, Greece, 1962. Ph.D. in Mathematical Sciences (summa con laude), University of Rome, La Sapienza, Italy, 1966. Appointments Professor, Computer Science Department, Florida State University (since Jan 2001) Courtesy Professor, CIS Department, Florida A & M University (since May 2006) Visiting Scientist, Isaac Newton Institute, Cambridge University, Cambridge, UK (1996) Professor, Illinois State University (1974/75) Assistant Professor, Illinois State University, Chicago Circle (1967/68) Reader, Information Security Group, Royal Holloway, University of London (1967-2000) Professional Preparation BSc in Mathematics, University of Athens, Greece, 1962. Ph.D. in Mathematical Sciences (summa con laude), University of Rome, La Sapienza, Italy, 1966. Appointments Professor, Computer Science Department, Florida State University (since Jan 2001) Courtesy Professor, CIS Department, Florida A & M University (since May 2006) Visiting Scientist, Isaac Newton Institute, Cambridge University, Cambridge, UK (1996) Professor, Illinois State University (1974/75) Assistant Professor, Illinois State University, Chicago Circle (1967/68) Reader, Information Security Group, Royal Holloway, University of London (1967-2000) Products 1. Goble, W., Burmester, M., Bays, M., Chastain, M., 2020. Challenges of Securing and Defending Unmanned Aerial Vehicles. National Cyber Summit (119-138). 2. Burmester, M., Munilla, J. (2018). Comments on "Unreconciled Collisions Uncover Cloning Attacks on RFID Systems". IEEE Trans. Inf. Forensics Security, 13, 1-3. 3. Redwood, W. O., Reynolds, J., & Burmester, M. (2016). Integrating Simulated Physics and Device Virtualization in Control System Tethers. Critical Infrastructure Protection X (185-202). Springer. 4. Burmester, M., Munilla, J., Ortiz, A., & Caballero-Gil, P. (2017). An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels. Sensors (JRC-IF:2.67), 17(7), 1562. 5. Jenkins, J., & Burmester, M. (2015). Run-Time Integrity for Cyber-Physical Infrastructures. Critical Infrastructure Protection IX, 9th IFIP WG 11.10 (153-167).

THIS PROJECT ADDRESSES the problem of securing autonomous underwater vehicle (AUV) swarm missions. GOALS: G1. Establish secure and resilient underwater communications channels for AUV by using underwater mobile ad hoc networks (uMANET). G2. Determine what formations or behaviors the swarm should adopt for a given mission, and design communication protocols that effectively maintain the swarm in the desired formation. G3. Explore alternative methods by which a swarm can know its location with respect to a global grid (localization) and operate in an environment populated with fixed or moving obstacles. Different types of AUV missions are considered, including mine countermeasures (MCM), intelligence, surveillance and reconnaissance (ISR), and localization (independent or in collaboration with GPS surface vehicles). This work builds on the PI?s background in information security and ad hoc networks (e.g.,, A secure and efficient conference key distribution system, 1994; Securing multipath communication in MANET, 2004; On the security of route discovery in MANET, 2009; Strengthening privacy protection in VANET, 2008; Challenges of securing and defending unmanned aerial vehicles, 2020). CNSSP-28 is a policy document for Unmanned Autonomous Systems that operate in all physical environments and support diverse and complex missions. For our protocols, security is reduced to CNSSP-28 compliance. UNDERWATER SWARM ROBOTICS is a complex field that combines a number of research areas, such as underwater propulsion/sensors/localization/communication, swarm control (centralized/decentralized) and swarm intelligence (based on the collective behavior of self-organized systems), to solve mission planning optimization algorithms. Swarm algorithms are often based on the behavior of animals (e.g., Particle Swarm Optimization (PSO) can be visualized as the behavior of a flock of birds) and minimize the required communication between interacting parties to achieve a specific objective. Whether, or to what extent, any of these algorithms may apply to the needs of Navy missions involving AUV swarms has yet to be determined. What is certain is that new algorithms need to be devised for AUV motion control and decision-making. In particular, AUV should implement self-organizing controllers that adapt to the environment (e.g., by using Neural Networks for learning and Self Organizing Maps for control). This is particularly challenging because of the security/resiliency requirements of Navy missions.
 

10 min

Cascade II - Thursday Block I

01:00- 02:00 pm
Session Chair: Stan Mierzwa

01:00- 02:00 pm

Building the Cybersecurity Pipeline: K12 Cybersecurity Credit Transfer Agreement Development
  • Dr. Michael Tu Purdue University Northwest
  • Michael Sbalchiero Purdue University Northwest
  • Thomas (Tony) Brown, Forsyth Tech Community College

Dr. Michael Tu Purdue University Northwest Michael Tu, Ph.D. in Computer Science, Professor of Computer Information Technology and Director of Center for Cybersecurity at Purdue University Northwest. Dr. Tu is leading the NACE-C Cybersecurity Credit Transfer Agreement Task, as part of the effort from the CPNC-Careers Preparation National Center. His research has been supported by NSF and NSA and he has published 49 papers in peer reviewed journals and conference proceedings. Dr. Tu has 17 years of college teaching experience in cybersecurity, has received many professional trainings, and obtained numerous industry certifications in cybersecurity.
Michael Sbalchiero Purdue University Northwest Michael Sbalchiero holds bachelor’s degrees in both history and education, and a master’s degree in communication. He is a veteran of the United States Army and National Guard and has eight years of teaching experience in middle and high schools, as well as higher education. He currently serves as an academic engagement specialist for both the NCAE-C Cybersecurity Workforce Certification Training program and the NCAE-C Cybersecurity Credit Transfer Taskforce.
Thomas (Tony) Brown, Forsyth Tech Community College Thomas Brown, Department Chair of the Davis iTec Cyber Security Center at Forsyth Tech Community College, and PI for leading the ACE-C Cybersecurity Credit Transfer Agreement Task 2.8.2.

This session will highlight the NCAE-C Cybersecurity Credit Transfer Agreement (CTA) Task, funded as part of the NCAE-C Careers Preparation National Center, to address the challenges in meeting the future cybersecurity workforce development. An overarching goal is to establish a database of credit transfer agreements among NCAE-C designated CAE cybersecurity programs and K12 schools. To achieve this goal, the CTA taskforce will compile the set of the K12 cybersecurity credit transfer agreements between secondary education schools and the NCAE-C designated higher education institutions, and facilitate the development of the cybersecurity credit transfer agreements between NCAE-C designated higher education institutions and secondary education schools. The CTA taskforce, jointly led by Purdue University Northwest and Forsyth Tech Community College, and partnered with Dakota State University, has launched the CTA status data collection and CTA development promotion. The taskforce has investigated the challenges and opportunities of K12 cybersecurity credit transfer mechanisms, examined the advantages and limitations of various CTAs, developed approaches and mechanisms to collect CTA status data and promote CTA development. Experiences and lessons learned will be shared through CTA development cases at Purdue University Northwest and Dakota State University. A call for action will be promoted to the CAE community for CTA survey distribution and response, and CTA development.

20 min

Jumpstart Project at College for Southern Nevada
  • Margaret Taylor, College of Southern Nevada

Margaret Taylor, College of Southern Nevada Mrs. Taylor is a professor and former Chair of the Computing & Information Technology Department at the College of Southern Nevada (CSN) in Las Vegas. She was instrumental in earning the CAE-CD designation and implementing MOS Certification in the digital literacy program at CSN. She worked in the IT industry for more than 35 years and held various positions ranging from Programmer to Software Quality Assurance Manager. Of the many professional endeavors Mrs. Taylor is involved with, she is most passionate about improving the state of digital literacy, cybersecurity education in Nevada, and increasing college/high-school dual credit opportunities.

The Jumpstart Program brings together a large local employer and the College of Southern Nevada (CSN) to enhance employment opportunities for both CSN and local high school students. It also assists the employer to meet the hiring needs in hard-to-find technical areas. Students that are part of the program that finish the required six (6) courses are guaranteed a job interview with the employer. This type of program has been successful with one program/employer and is now being expanded to additional programs and employers. The presentation will include the development and implementation techniques used to implement and expand this successful program.

20 min

Best Practices in Cybersecurity Pathway Education: a 3-Year NSF-ATE Project
  • Behzad Izadi, Cypress College

Behzad Izadi, Cypress College I joined Cypress College as a computer networking professor in 2002. Since then, I have further established the Cisco Local Academy, offering a range of courses including a series of five courses to prepare students for the Cisco Certified Networking Associate (CCNA) and Cisco CyberOps Associate. In 2018, I assisted with our college’s successful CAE designation application and since then have served as the CAE Point of Contact (PoC) and the faculty responsible for our Cybersecurity Center. I have been involved in establishing the Cybersecurity and Cyber Defense certificate programs and the Cyber Defense AS degree in our CIS department. I am also the faculty mentor for our Cybersecurity training program preparing the middle school and high school students to participate in the national cybersecurity competition (CyberPatriot).

PACE (Pathway to Advancement in Cybersecurity Education) is a guided Cybersecurity pathway that introduces dual enrollment college courses as early as 9th grade with multiple educational and employment exit points. PACE was funded for the last three years by a grant from the NSF-ATE. In this presentation we will summarize PACE outcomes and identify best practices for establishing a strong pathway program.  

20 min

02:00- 02:45 pm
Session Chair: Jake Mihevc

02:00- 02:45 pm

Enhancing Advanced Cybersecurity Education through Inclusive, Engaging Pedagogy
  • Harini Ramaprasad, University of North Carolina at Charlotte

Harini Ramaprasad, University of North Carolina at Charlotte Dr. Harini Ramaprasad is a Teaching Professor in the Department of Computer Science at UNC Charlotte. Dr. Ramaprasad received her B.S. in Computer Science from Bangalore University and her M.S. and Ph.D. in Computer Science from North Carolina State University. Dr. Ramaprasad's research interests are in the areas of computer science education, real-time systems, computer architecture and cyber-physical systems, with her recent work focusing on improving student learning and engagement in advanced cybersecurity education.

In this talk, we will present an overview of three projects stemming from our NSF-funded effort on engaged pedagogy for advanced cybersecurity education (NSF-DGE #1947295), namely: (i) DISSAV: Dynamic Interactive Stack Smashing Attack Visualization, a program visualization tool for teaching stack smashing attacks. DISSAV is a web-based application built with ReactJS; DISSAV provides a simulated attack scenario that guides the user through a three-part stack smashing attack. Our tool allows the user to create a program, construct a payload for it, and execute the program to simulate an attack scenario. (ii) a suite of four guided-learning activities that help students with foundational concepts for learning stack smashing attacks and defenses, for e.g., command-line parameters in C, buffer overflows in C, process memory layout, stack canaries and address space layout randomization. The activities are written in the Process Oriented Guided Inquiry Learning (POGIL) style - students explore learning models that depict relevant information, then proceed to invent key concepts emerging from those models, and finally apply the concepts they invent to solve a given problem; and (iii) Criminal Investigations, a gamified, scalable web-based framework for teaching and assessing Internet-of-Things (IoT) security skills. Criminal Investigations is packaged as a series of stackable IoT security activities; the current version is a web application that uses React for the front-end development and Python for the back-end, and is deployed on a university server. Criminal Investigations promotes student engagement and learning by incorporating gamification concepts such as storytelling, experience points, just-in-time learning content delivery and checkpoints into activity design. All three projects have been deployed at undergraduate courses at UNC Charlotte, and we will briefly discuss our deployment and data analysis efforts.
 

20 min

ChatGPT and AI Tools Impact on Cybersecurity Education
  • Robert J. Loy, Grand Canyon University

Robert J. Loy, Grand Canyon University Rob Loy is an experienced technology leader passionate about driving innovation and delivering results. With over 20 years of experience in the technology industry, Rob has built a reputation as a strategic thinker and collaborative leader who will drive transformational change in complex and dynamic environments. Rob is also a thought leader in technology and education. He is currently the Executive Director of Advancement and Innovation at Grand Canyon University (GCU) in Phoenix, AZ. He represents GCU and various professional organizations as a speaker and advisor on digital transformation, project management, cybersecurity, and innovations in education. He is part of two GCU committees looking at innovation in education around AI and the Metaverse. Rob is in the final phase of his Ph.D. in Data Analytics with his dissertation on choice overload, beginning the study component with an expected completion in Dec 2023.

Artificial intelligence (AI) is rapidly changing the world, and education and cybersecurity are no exception. AI is used to develop new tools and techniques for securing networks, improving risk management, and addressing new threats, and it can be used to enhance classroom instruction and assessments. While AI can be intimidating, it has a valuable place where our students are headed when they transition to the workplace. This presentation will explore the impact of AI on education and begins with a question posed to two AI platforms, "is AI disrupting education?" Then, hear a summary of the findings of a study that examined student usage of AI tools such as ChatGPT and their ability to mimic student submissions. The attendees can also play along, guessing if the submission is AI or a student. The presenter will summarize the potential for AI integration into education and how cybersecurity instruction must incorporate AI tools and resources to prepare students for their careers better. Finally, the presenter will summarize strategies and ideas where educators must go by providing a mind-blowing suggestion that would make Darwin happy! The focus is on providing the students with a different and hopefully better educational experience.
 

20 min

CAE-CD Schedule

Vashon - Thursday Block II

03:00- 04:00 pm
Session Chair: Tobi West

03:00- 04:00 pm

ChatGPT - Using an AI-based Conversational Model in a Traditional Programming Course
  • Debasis Bhattacharya, University of Hawaii Maui College

Debasis Bhattacharya, University of Hawaii Maui College Dr. Debasis Bhattacharya is currently an Associate Professor at the University of Hawai’i Maui College, and program coordinator for the Applied Business and Information Technology (ABIT) baccalaureate program. Dr. Bhattacharya has been working in the software and higher education industry for 35 years, having worked for large corporations such as Oracle and Microsoft for 15 years. A resident of Hawaii since 2002, he has been actively researching the information security needs of small businesses since 2008. As a former small business owner, he understands the needs and demands of information security, as well as keeping a small business up and running! Dr. Bhattacharya holds degrees from MIT, Columbia University, University of Phoenix and NW California University School of Law. Re- search interests include computer science education, cybersecurity, cryptocurrencies, blockchains and machine learning. Dr. Bhattacharya is a Senior Member of the IEEE and the ACM and a member of the Academy of Management (AoM).

Traditional programming courses have relied on students learning coding syntax from examples and other textbook sources. As students learn to write code, they become proficient in the syntax, logic, debugging and documenting their code. ChatGPT is a revolutionary method that allows students to generate new code, fix bugs and errors and assist in the writing and learning of programming languages and computational concepts.  This session provides an outline of the application of ChatGPT is a server-side programming class at the University of Hawaii Maui College in the Spring semester of 2023. This session will cover the following topics 

  1. Overview of ChatGPT  
  2. Introduction to Conversational Model in a Programming Course
  3. Techniques to learn programming using ChatGPT  

The session will provide the participants with an overview of how ChatGPT can be used as an assistive tool in the 
classroom, with examples of how it has been used in a programming course to help students learn to code. The session will provide examples of how the risks of plagiarism and cheating can be minimized using ChatGPT. Finally, the session will provide the participant with code samples and examples about how this new tool can be included in their own classroom. While this session focuses on the application of ChatGPT on a programming course, the lessons from this session can be applied to other courses in various disciplines unrelated to programming or technology.

20 min

Call for Curriculum: National Cybersecurity Task Force
  • Cara Tang, Portland Community College

Cara Tang, Portland Community College Cara Tang is the faculty lead of the Cybersecurity program at Portland Community College in Portland, Oregon. She co-chairs the National Cybersecurity Curriculum Task Force with Sidd Kaza of Towson University. In addition to this project, Dr. Tang has been involved in a number of curricular efforts in the cybersecurity education community, including chairing the task force that developed Cyber2yr2020, ACM's curriculum guidelines for associate degree programs in Cybersecurity, and serving on ABET's CSAB/CAC criteria committee and leading the subcommittee concerned with computing, cybersecurity, and IT criteria for associate degree programs.

Call for proposals: Curriculum Development

Recon Survey Favorite Free Curriculum

Funded by the NSA through the NCAE-C program, the mission of the National Cybersecurity Curriculum Task Force is to catalog and create high-quality and relevant curricula on emerging cybersecurity topics, mapping to curricular and workforce guidelines, and make them freely available. The mission is being accomplished with the following goals: (1) Conduct a comprehensive search of available curricula in cybersecurity repositories, directories, and among the community. (2) Perform gap analysis to identify high-need areas to create a cyber-ready workforce. (3) Develop high-impact, high-value curricula for the community. Stop by this session to get more information on the project, and how you can help by filling out a survey or building curriculum in emerging areas. At this session you can complete a survey to share your favorite piece of free curriculum that you've developed. You can also discuss the call for proposals for funded curriculum development, or discuss your ideas for curriculum in emerging cybersecurity areas.     
 

20 min

Cyber Competitions: Launching a new CAE Faculty Colloboration: CAE-CD Community of Practice on Competitions
  • Jake Mihevc, Mohawk Valley Community College
  • Dan Manson, Cal Poly Pomona

Jake Mihevc, Mohawk Valley Community College Jake serves as Dean of Science, Technology, Engineering and Math at Mohawk Valley Community College. He helped launch the college’s Cybersecurity AS program in 2014 and helped it achieve the CAE-CD designation in 2016. Jake serves as PI of the NCAE Cyber Games project and Co-PI of the Northeast Hub for the CAE program. Jake is a co-founder of the Central New York Hackathon, a regional cybersecurity competition that brings over 100 students from six cybersecurity programs together each semester to test their skills. He is an active member of the National Initiative for Cybersecurity Education Workgroup and has worked to refine and expand cybersecurity competitions nationwide.
Dan Manson, Cal Poly Pomona Dr. Dan Manson is a Researcher for Norwich University. Dr. Manson led the effort for Cal Poly Pomona to be designated a CAE-CD in 2005, 2008, 2014 and 2021. From 2008 to 2017 Dr. Manson led the Western Regional Collegiate Cyber Defense Competition (WRCCDC). Dr. Manson is a co-founder of the National Cyber League and is Chairman of NCL, Inc. Dr. Manson has been Principal Investigator or co-Principal Investigator on seven National Science Foundation grants to support workforce, curriculum, and professional development in cyber security. Dr. Manson leads Competency development and documentation of competitions for the NSA CAE-C Program Office grant for the Careers Preparation National Center.

The popularity of the CAE-CD Community of Practice “Meet your Competitions” events has led to a new collaborative space for faculty to contribute to CAE efforts related to competitions. All faculty and POCs are welcome to join us as we explore the future of evidencing competencies within competitions, mapping linkages between competitions, helping faculty prepare students for competitions, competition badging and credentialing, building competitions experiences into courses and programs, and other topics of interest. The CAE-CD CoP Competitions Subgroup will meet regularly beginning this Fall, and this session will serve as an organizing and kick-off meeting for this new CAE collaborative space.
 

20 min

Grand Ballroom II & III - Thursday Block II

03:00- 04:00 pm
Session Chair: Gretchen Bliss

03:00- 04:00 pm

The Role of Cyber Defense Education: A Case Study of National Cyber League (NCL) Participation
  • Ping Wang, Robert Morris University

Ping Wang, Robert Morris University Dr. Ping Wang is University Professor of CIS and Cybersecurity at Robert Morris University (RMU). He is RMU’s CAE Program Coordinator and PoC and a Certified Information System Security Professional (CISSP). He has been teaching cybersecurity at undergraduate, master’s, and doctoral levels and published extensively on network security, IoT security, pentesting, human factors in security, and cybersecurity education and workforce development. He has served as Senior Developer and PI on DoD and NSF cybersecurity grant projects and has received many awards for excellence in research, innovation, teaching, and mentoring. He has been an active member of the National Initiative for Cybersecurity Education (NICE) Working Group/Coordinating Council since 2016 and Associate Editor of International Journal of Hyperconnectivity and the Internet of Things since 2017. Dr. Wang has also been serving as a reviewer and mentor for NCAE-CD designation and accreditation evaluator for both Middle States Commission on Higher Education and ABET Computing Accreditation Commission.

This research presentation explores the value of cybersecurity competitions in cyber defense education and its impact on the cybersecurity industry and workforce development. Competitions are considered active and challenge based learning that can be used as effective pedagogies to improve student interest, motivation, and problem solving in education. For cyber defense education quality assurance, student participation in cyber competitions is one of the criteria required for the National Centers of Academic Excellence in Cyber Defense designation by the National Security Agency. This presentation is based on the Challenge Based Learning (CBL) framework and explores the pedagogical benefits of cybersecurity competitions through the case study of the National Cyber League (NCL) competition. The case study focuses on mapping the features and knowledge and skill domains of the NCL competition to relevant NCAE-CD program criteria and knowledge units and presents sample data on students’ participation and performance from a NCAE-CD designated institution. This presentation also shares the results of quantitative data and qualitative observations as well as reflections on longitudinal student participation in the NCL competition and student performance in cyber defense educational programs.
 

20 min

Online Student Development in Cybersecurity using a Game Based Learning Pedagogy
  • Aleksei Wolff, Purdue University Global

Aleksei Wolff, Purdue University Global Aleksei Wolff is a Technical Curriculum Developer with Amazon Web Services and part-time Adjunct Faculty with Purdue University Global. Aleksei has over 20 years of IT experience with healthcare, government and public sector clients. He holds B.E. and M.S. degrees in Engineering and several professional and specialty AWS certifications.

As more and more information technology workloads move to the cloud, it is imperative that students entering the workforce have the skills needed to implement cybersecurity practices. The concepts of identity and access management, least privilege access, compliance enforcement, and incident response are theoretical concepts that may take years to put into practice once students reach the workforce. By adopting a game based learning pedagogy, higher education institutions can take the lead and provide an engaging mix of theoretical concepts with game based learning labs that will encourage students to continue to pursue their online degrees.
 

20 min

Advanced Persistent Threats as Case Studies for Cybersecurity Education
  • Li-Chiou Chen, Pace University
  • Joseph Acampora, Pace University

Li-Chiou Chen, Pace University Dr. Li-Chiou Chen is a professor and the Executive Director of Cybersecurity Programs at the Seidenberg School of Computer Science and Information Systems, Pace University. She holds a Ph.D. in Engineering and Public Policy from Carnegie Mellon University. Her research areas include security risk perception, cybersecurity data analytics, cybersecurity education, and network security. She has published papers in top academic journals, including Computer & Security, Decision Support Systems, and IEEE Transactions. Dr. Chen’s works have been supported by the National Science Foundation’s CyberCorps®: Scholarship for Service program as well as the CySP and GenCyber programs in the Department of Defense. These programs provide scholarships, build academic pathways, and establish research initiatives in attracting and preparing students to study in cybersecurity.
Joseph Acampora, Pace University Mr. Joseph Acampora is an assistant professor at Pace University's Seidenberg School for Computer Science and Information Systems. He holds an M.S. in Information Systems from Pace University and a B.S. in Computer Science from Fordham University. He has worked in public sector IT for more than 30 years, having key roles in the creation of system and network infrastructure and the design and implementation of core software systems. His experience with improving transaction efficiency led him to develop a patented method for metadata compaction, introduced as an extension to ensure delivery of network intrusion detection system messages. Prior to joining Pace University, Mr. Acampora was Manager of Information Systems for the City of Mount Vernon, NY, and has provided IT consulting services to small and medium-sized businesses. At Pace University he teaches cybersecurity courses, is responsible for the university's cybersecurity training range, and coaches their cybersecurity club's competition team.

Advanced Persistent Threat (APT) is a class of network attacks when attackers utilize malware or stealthy tools to hide their actions in a network and systems over a prolonged period so that they can eventually achieve strategic goals such as causing substantial damage to the victim organization by data exfiltration. Although APT has long been a research subject, it continues to be a serious threat for many organizations. For cybersecurity education, APT is a good example for students to relate to the risk of organizational networks, the vulnerabilities of the systems and the skills needed to analyze and secure the networks. Recent research and development in APT detection are good educational resources. MITRE has released the ATT&CK knowledge base of adversary tactics and techniques based on real-world observations. Lockheed Martin’s Cyber Kill Chain identifies what adversaries must complete to achieve their goals. Both are good reference models to understand the techniques being used and how APT progresses. However, few education materials have been developed to teach cybersecurity students in understanding such serious threats and how to best protect their network to reduce the risk. The goal of this presentation is to bridge the gap by exploring educational materials that are suitable for a college level cybersecurity course by integrating state-of-the-art research results as well as industry practice. During this presentation, we will first explain the nature of APT, their characteristics, a comparison between APT and traditional attacks, and the different stages of APT planning. We will then discuss the knowledge and skills needed to conduct analyses on both a system and a network and map these skills to topics in network security courses. In addition, we will identify educational platforms and resources for this topic. Finally, we will discuss how such a knowledge domain fits into a cybersecurity curriculum. 

20 min

04:00- 04:30 pm
Session Chair: Diego Tibaquira

04:00- 04:30 pm

Critical Infrastructure Protection & Incident Response Training
  • Thomas Gallagher, University of Montana
  • Gretchen Bliss, University of Colorado Springs

Thomas Gallagher, University of Montana Dr. Tom Gallagher serves as Associate Vice Provost for Two-year Education & Workforce Development at the University of Montana and Dean for Missoula College. Dr. Gallagher is a tenured professor and innovative higher education leader with expertise in workforce development and two-year education. He serves as the point of contact for the National Center of Academic Excellence in Cyber Defense at Missoula College and as a subject matter expert (SME) for cybersecurity education.
Gretchen Bliss, University of Colorado Springs Ms. Bliss is the Cybersecurity Program Director at UCCS. She and her team are working to expand cybersecurity across the 6 Colleges at UCCS. In addition to the long-standing cybersecurity programs at Engineering and Applied Science, the past year the School of Education, School of Public Affairs, College of Letters, Arts and Sciences and College of Business have all launched Cybersecurity programs, concentrations or certificates. Over the last year, she led the development and implementation of the UCCS POWER Cybersecurity Strategy, Partnership, Outreach, Workforce, Education and Research. This strategy has launched a focused effort across campus to lead in the cybersecurity ecosystem to create a network that produces qualified cybersecurity professionals to meet the growing need in industry. Previously, she worked at PPCC for 5 years as their Cybersecurity Director and led the college Cybersecurity efforts through increasing the PPCC profile and footprint in cybersecurity. Before PPCC, she worked for 25 years in the intelligence community, most recently as the NORAD Deputy Senior Analyst and Chief of Plans, supporting the government’s efforts in understanding the evolution of cyber since the early 1990s on cyber, information operations and warfare, and computer network defense/attack.

Incident response training is designed to test an organization's ability to respond to a cybersecurity attack. It involves developing a tabletop attack scenario and then running through the incident response plan to determine whether the plan is effective in detecting, containing, and remedying the attack. During the exercise, participants are required to make decisions and take actions as they would in a real cybersecurity attack. The exercise brings together various teams within the organization, including IT, security, legal, and public relations. The goal is to raise an organization’s cyber defense posture by identifying weaknesses or gaps in the incident response plan and to provide an opportunity for the organization to refine and improve its response capabilities. Critical infrastructure cybersecurity attacks have a greater potential to impact multiple organizations that would not typically engage in collaborative activities and incident response training requires participation from external partners such as law enforcement, regulators, and third-party vendors. Community outreach and leadership in education are key tenets of the National Centers of Academic Excellence in Cybersecurity (NCAE-C) mission. NCAE-C Colleges and Universities are uniquely positioned to serve in enhancing communication and collaboration by bringing together entities that would not normally engage with one another. In this presentation, NCAE-C institution representatives from the States of Montana and Colorado will discuss their experience in planning and hosting incident response training for critical infrastructure. We will examine the complexities of bringing together these disparate stakeholders. We will also present the benefits these events bring by enhancing the education of students and the research efforts of faculty.
 

20 min

Grand Ballroom I - Thursday Block II

03:00- 04:00 pm
Session Chair: Stephen Miller

03:00- 04:00 pm

Assessing Cyber Competencies with Capstone Projects
  • Chuck Bane, University of San Diego

Chuck Bane, University of San Diego Chuck Bane, Professor of Practice and Director of MS Cybersecurity Engineering program at University of San Diego’s (USD) Shiley-Marcos School of Engineering. He is a highly-motivated professional with over twenty years of teaching and curriculum development experience on both the graduate and undergraduate levels. He was the lead for USD’s application process for Department of Homeland Security (DHS) and the National Security Agency (NSA) Center of Academic Excellence, successfully resulting in the Center of Academic Excellence in Cybersecurity designation.

This presentation outlines how we use our Cyber Capstone Classes to access both the Program Learning Outcomes (PLO) and competencies of our graduating seniors. At USD, we found that local businesses were reluctant to allow students the opportunity to evaluate, and implement security on an operational system. We developed the USD Cyber Cloud (a private cloud using OpenStack) to have an isolated sandbox that can be quickly configured to give the student (Student Teams) a fully functional business network system. In this safe environment and in small teams (5 or less) they are immersed into a case study assuming the role of being a consultant, an analyst, and customer point of contact. The Teams perform all the required tasks to conduct a security engineering review of the client’s system, conduct Vulnerability Assessments, Penetration Testing, and based on findings, create and execute a hardening plan to make the system secure. The hardening plan is the “What”; execution of the hardening plan is the “How”. The development of an Information System Security Plan plus the other testing report builds a portfolio of achievements for the students.

10 min

CAE-CD Rapid Training Program
  • Dianne Burke, Missoula College University of Montana

Dianne Burke, Missoula College University of Montana Dianne Burke, M.S., M.Ed., is a cybersecurity faculty member at Missoula College University of Montana (UM) and serves as Director of CyberMontana. She has taught networking, security, data operations, and computer forensics courses in both the public and private sectors. She recently completed a career as a forensic analyst where she specialized in Electronically Stored Information (ESI) collection and analysis, assisting counsel in cases across the U.S. She holds a B.A. from Rice University, an M.S. from the University of Houston, an M.Ed. from UM, and is a doctoral student at UM.

Missoula College University of Montana has completed the inaugural year of a CAE-CD rapid training program. Our CAE-CD Program of Study (PoS) encompasses four classes covering networking, operating systems, basic cybersecurity, and ethics/legal issues in computer science. Recognizing the need for short term training programs (i.e., completed within six months), Missoula College has developed a 10-15 week course of study specifically designed for individuals to get a jump-start on transitioning to a career in cybersecurity. In addition to completing the CAE-CD PoS, students are prepared for the Network+ and Security+ Industry Recognized Credentials (IRCs). Two unique hallmarks of our program are 1) wrap-around student support services which include weekly meetings with rapid training coordinators and 2) integrated and supplemental materials aligned with the National Association of Colleges and Employers (NACE) Career Readiness competencies. Program participants are encouraged to work with Missoula College University of Montana career coaches to refine résumés and interviewing skills, and all of the NACE competencies are interwoven into PoS coursework. Students are further encouraged to participate in career fairs held each semester at Missoula College. Through partnerships with the Montana Department of Labor and Industry (MT DLI) and other entities, student tuition, fees, and books are often eligible for a full subsidy resulting in no cost to students.

20 min

Gaucho Security Operation Center = Internship
  • Martin Bencic, Glendale Community College

Martin Bencic, Glendale Community College I am celebrating my 22nd year as an educator. I started teaching Cisco Networking Technologies for Glendale Community College in 2001. During the same year I began teaching junior high technology at Heritage Elementary and loved every minute of it. I moved to Sunrise Mountain HS to teach Drafting and Design in 2006-2010. I moved to PUSD district office as the CTE Program Coordinator for a year. I returned to the classroom in 2011 as an Engineering Instructor until 2013 at Liberty HS. In 2014, I created a Cybersecurity Division of the MET Professional Academy. In 2016, I began my current position as Faculty/Occupational Program Director Linux and Cybersecurity program at Glendale Community College. I successfully obtained the designation of Center of Academic Excellence in Cyber Defense from the NSA and DHS for the college. Prior to becoming an educator, I worked for a large non-profit organization as the Director of Information Technology. I was responsible for all data and telecommunications for 17 offices across Arizona and New Mexico.

Our program has a constant struggle to get our students placed in meaningful internship opportunities. We have all heard the response all too often: Are they in their junior or senior year in college? We only offer internships to 4 year institutions. Then there is the management of paperwork and tracking of which student is at what location and how many hours are they logging there. We had enough and we are building our own paid internship opportunities for Tier 1 SOC Analysts. We are calling it the GSOC. Gaucho Security Operation Center. We are collaborating with Boise State University in the development and implementation phase of this project with a targeted soft launch in Spring 23.

20 min

Partnership with Vendors
  • Albert Tay, Brigham Young University

Albert Tay, Brigham Young University Albert Tay is an IT and cybersecurity faculty member at Brigham Young University. Dr. Tay received his interdisciplinary Ph.D. in Communication and Information Sciences at the University of Hawaii, Manoa. He leads the Cybersecurity Research Lab at BYU. Prior to joining BYU, Dr. Tay managed Utah’s Statewide Longitudinal Data Systems program and served as the project director for the IES FY 2015 SLDS grant. Dr. Tay has taught at various universities and managed IT departments and projects in various industries.

BYU has recently signed an MOU with a vendor. The vendor partners with institutions and offers to faculty, staff, and students of higher education institutions access to vital cybersecurity skills training and learning resources. It provides students with real-world experience in multiple fields of cyber security such as Cloud, Network, and endPoint. The program is free of charge as the vendor aims to provide vital cybersecurity skills and learning resources in order to close the field’s workforce gap. Secure Academy provides free content (course curriculum), software licenses, technical support, and deeply discounted certifications to their academic partners and their students     

10 min

04:00- 04:30 pm
Session Chair: Sandra Blanke

04:00- 04:30 pm

University of Memphis - Student Research Projects
  • Tony Pinson, University of Memphis

Tony Pinson, University of Memphis Tony Pinson is currently employed as the project coordinator for the University of Memphis Center for Information Assurance. He is a graduate of the University of Memphis with masters degrees in mechanical engineering, business administration, and information systems.

A brief outline of the student development research projects being conducted by University of Memphis students associated with CAE federally funded research grants.

10 min

Increase Enrollment by Raising Standards
  • Susan Frank, Suffolk County Community College

Susan Frank, Suffolk County Community College Dr. Susan Frank is an Associate Professor at Suffolk County Community College. She teaches Cybersecurity Fundamentals, Networking, Client Operating Systems Scripting, Routing, Switching, Enterprise Networking, Security and Automation, Cyber Operations, and Digital Forensics. She earned her Ph.D. degree in Computer Science from Stony Brook University. She earned five SANS GIAC certifications while working as a Computer Scientist for the FBI, and is a CISSP. Dr. Frank has presented at the NSF Cybersecurity Summit, Grace Hopper Celebration of Women in Computing, Computer Graphics International, SIGGRAPH/Eurographics Hardware Workshop, and CORS-TIMS-ORSA Joint National Meeting. She has written for Computer Graphics Forum, The Visual Computer, International Journal of Computer Graphics, CAD/Graphics, and the IEEE International Conference on Networks. Dr. Frank is a founding Director of the (ISC)² Long Island Chapter, a member of SCCC Empowering Women in Technology Committee, a co-advisor of Cybersecurity Club, a Senior member of the IEEE, a past Chair of the Long Island Section of the IEEE, an ACM Lifetime member and on the Program Committee for the CEWIT Conference at Stony Brook University.

Contrary to the intuition of some administrators and teachers, holding students to high standards improves retention. Establishing expectations early improves the classroom atmosphere because students are much more willing to help other students who put in a serious effort, and because instructor time is not wasted on students who don’t. Students graduating from a rigorous program are much more likely to have a true understanding of the material. This gives them confidence and leaves them prepared for competitions. They are more likely to get and succeed at cybersecurity jobs, giving the program a solid reputation. Students may have been taught that they can pass anything with no effort. Teachers must hold themselves to a high standard and be willing to help these students learn how to learn. Those who are willing to put in the work will succeed, while those who are not will leave sooner, rather than waste lab and teaching resources from one course to another. It may seem that lowering standards will build self-esteem, but the result is the opposite. If you don’t need to learn anything to pass, your education has no value. How important would you feel in that case? Holding students to high standards helps build comradery among students who have struggled together to understand complex topics and who have competed together in competitions. This improves retention and lifetime networks and job success. Recommendations and answers to specific questions on how to improve enrollment are provided. How can you create an atmosphere of trust and respect between students and faculty? How do you make the whole class feel like one team? How can you challenge your students with assessments to establish expectations early in the semester? How can you convince students that learning is a good idea? Your questions are welcome as well.
 

20 min

Fifth Avenue - Thursday Block II

03:00- 04:00 pm
Session Chair: Greg Laidlaw

03:00- 04:00 pm

InDeMASS: An AI-Enabled Knowledge Guided Framework for Realizing In-Depth Malware Analysis at Scale
  • Xiuwen Liu, Florida State University

Xiuwen Liu, Florida State University Xiuwen Liu is Professor and Chair of Computer Science at the Florida State University, Tallahassee, Florida, USA. His main research interests are machine learning, deep learning, program and malware analysis, and cybersecurity education. He received the Young Investigator Award from the International Neural Network Society in 2004. He develops optimization and modeling techniques for high dimensional data and focuses recently on understanding mechanisms in deep learning. In addition, he has developed and taught software reverse engineering and malware analysis, offensive computer security, and other courses for more than ten years. He co-chairs the CAE CoP Community Outreach Competition Committee.

Malicious programs are not new. Many approaches have been proposed from signature-based methods in most anti-virus products to machine learning approaches that try to classify samples based on extracted features. There are inherent challenges to carry out systematic in-depth malware analysis. Only recently have very large datasets become available. There are three families of techniques for malware analysis: static analysis, dynamic analysis, and symbolic execution. However, none of them are sufficient; static analysis potentially has good coverage but has limited precision and is difficult to scale. Dynamic analysis has perfect precision, and its coverage is practically limited especially when anti-analysis techniques are employed. Symbolic execution techniques have the advantages of both static and dynamic analysis techniques but do not scale. Clearly hybrid approaches of combining these techniques can overcome the limitations to some extent and they are not sufficient to perform in-depth malware analysis at scale. Machine learning techniques have been proposed to classify malware based on extracted features and their success on real malware samples is limited despite reported high accuracies. A shortcoming to all these methods is that the existing techniques do not utilize the knowledge from previous analyses. We adopt and are implementing the following framework: 1) Given a binary sample, we use counterfactual execution to execute all the branches. By using the call graph, we organize the system calls into overlapping short sequences hierarchically; 2) We use the knowledge base to check the family and other related samples in the base. Note that the sequences allow us to match functions without the need to check implementation details; 3) With the metadata from the knowledge base, we will perform family specific analyses. The advantage of the proposed approach is that it is scalable, achieves good coverage, and generalizes well to new malware samples. 
 

20 min

Evolving Undergraduate Cybersecurity Programs to Counter Evolving Cyber Threats: Integration of Malware Analysis
  • Matthew A. Chapman, University of Hawaii West Oahu

Matthew A. Chapman, University of Hawaii West Oahu Professor of Computer Science & Cybersecurity at the University of Hawaiʻi–West Oʻahu and an experienced computer scientist serving for over twenty-four years as an officer in the U.S. Army in a variety of positions both nationally and internationally; combat and operational deployments in Europe, the Middle East, and Asia. Key positions held include Chief of Cyberspace Operations for U.S. Pacific Command, Deputy Director of the Computer Science Program for the U.S. Military Academy at West Point (USMA), Chief of Computer Systems Engineering for the Joint Intelligence Center Pacific, and Stability Transition Team Leader in the Diyala Province of Iraq for the Department of State’s Provincial Reconstruction Team. Holds B.S., M.S., and Ph.D. degrees in computer science and is a graduate of the Army’s Command and General Staff College. A blessed and busy father of seven, happily married for over thirty years.

Due to the increasing threat to both government and industry information systems, it is necessary for cybersecurity programs to produce graduates that can react to the increasingly complex attempts by hostile actors to exploit computer networks. To respond to these growing threats, it is critical for graduates of cybersecurity undergraduate programs to have knowledge of the concepts, techniques, and tools to break down and analyze malicious software used by hostile actors, and understand evolving cyber-attack tactics, techniques, and procedures. Malware analysis is typically an advanced cybersecurity topic covered in cybersecurity graduate degree programs or specialized training; however, with the rapidly evolving threat, malware analysis must be incorporated into undergraduate cybersecurity degree programs in a significant level of detail. A curriculum is necessary that includes a survey of the socio-cultural aspects impacting the cyber threat landscape, fundamentals of traditional and cloud network architecture and services, and a detailed study into the fundamentals of both static and dynamic malware analysis.

20 min

Container-based Ethical Application Hacking Hands-on Labs
  • Phu Phung, University of Dayton

Phu Phung, University of Dayton Dr. Phu H. Phung is an Associate Professor and the Interim Chair of the Department of Computer Science at the University of Dayton. He is also the director of the Intelligent Systems Security Lab housed in the Department. Dr. Phung's research focuses on security solutions for intelligent web, mobile, Internet of Things, in-vehicle systems, and potentially malicious software. He has published his work in prestigious security journals and conferences. Dr. Phung is an associate editor for two journals and has been a reviewer for many top security journals and conferences and on the program committee for over 20 international conferences. Dr. Phung is also a senior member of IEEE and ACM and has been invited to speak at many reputable institutions, industry, and academic venues.

This mini-workshop aims to introduce a series of hands-on labs designed and packaged in software containers, allowing instructors to deploy them quickly on the cloud or cyber range environment without extensive configuration. The hacking labs exploit application vulnerabilities to launch common attacks such as data races, buffer overruns, code injection, and other web-based attacks. The primary goal of these hands-on hacking labs is to raise awareness about software vulnerabilities and their potential consequences among students who will be future software developers. By exposing them to these vulnerabilities, students will learn how to apply secure programming techniques during the development process to mitigate the risk of potential attacks. We will demonstrate in this talk how instructors can "load-n-play" one of the labs to Azure cloud service. We will also provide suggestions to faculty on adapting and implementing these labs in their security courses.  

20 min

Cascade I - Thursday Block II

03:00- 04:00 pm
Session Chair: Anne Kohnke

03:00- 04:00 pm

Evidencing Competencies through Cyber Competitions
  • Jake Mihevc, Mohawk Valley Community College
  • Dan Manson, Cal Poly Pomona

Jake Mihevc, Mohawk Valley Community College Jake serves as Dean of Science, Technology, Engineering and Math at Mohawk Valley Community College. He helped launch the college’s Cybersecurity AS program in 2014 and helped it achieve the CAE-CD designation in 2016. Jake serves as PI of the NCAE Cyber Games project and Co-PI of the Northeast Hub for the CAE program. Jake is a co-founder of the Central New York Hackathon, a regional cybersecurity competition that brings over 100 students from six cybersecurity programs together each semester to test their skills. He is an active member of the National Initiative for Cybersecurity Education Workgroup and has worked to refine and expand cybersecurity competitions nationwide.
Dan Manson, Cal Poly Pomona Dr. Dan Manson is a Researcher for Norwich University. Dr. Manson led the effort for Cal Poly Pomona to be designated a CAE-CD in 2005, 2008, 2014 and 2021. From 2008 to 2017 Dr. Manson led the Western Regional Collegiate Cyber Defense Competition (WRCCDC). Dr. Manson is a co-founder of the National Cyber League and is Chairman of NCL, Inc. Dr. Manson has been Principal Investigator or co-Principal Investigator on seven National Science Foundation grants to support workforce, curriculum, and professional development in cyber security. Dr. Manson leads Competency development and documentation of competitions for the NSA CAE-C Program Office grant for the Careers Preparation National Center.

This presentation will share some of the approaches currently underway to explore evidencing competencies through cyber competitions. The presenters will share preliminary findings from research underway on how students perceive competency development as well as a model for evidencing competency within competitions for consideration and discussion.
 

20 min

High-Skilled Aviation and Aerospace Cybersecurity Workforce Development
  • Radu Babiceanu, Embry-Riddle Aeronautical University - Daytona Beach Campus

Radu Babiceanu, Embry-Riddle Aeronautical University - Daytona Beach Campus Dr. Radu Babiceanu is the Interim Chair and a Professor of Systems Engineering with the Department of Electrical Engineering and Computer Science at Embry-Riddle Aeronautical University (ERAU) in Daytona Beach, Florida. Dr. Babiceanu received his Ph.D. degree in Industrial and Systems Engineering from Virginia Tech in 2005, and previously served on the faculty at the University of Arkansas at Little Rock. At ERAU, Dr. Babiceanu teaches systems engineering courses, such as System Architecture Design, System Quality Assurance, and System Safety and Certification. He also developed and delivered short training courses for industry in the area of aircraft system safety engineering and certification. His research interests are in the aviation/aerospace operational ecosystem, with an emphasis in cybersecurity and safety-critical systems assurance, formal modeling and verification, and AI/ML approaches to enhanced operations.

In recent years, aviation security was designated as a national strategy, which further emphasized the increasing interest and growth for aviation cybersecurity. The growing digitization and greater connectivity of aviation infrastructure increases the vulnerabilities and risks associated with the aviation industry. In response, educational institutions must diversify their instruction to train a more robust cybersecurity workforce for increased cybersecurity protection. As leader in aviation and aerospace education, Embry-Riddle Aeronautical University (ERAU) has undertaken fundamental efforts to address the need for a high-skilled cybersecurity workforce through its established aviation and aerospace research agenda and is actively building on its research expertise in the aviation and aerospace cybersecurity domain to meet current and future workforce needs. ERAU has extensive capabilities in all computation and communication services related to flight operations. Among them: airborne hardware and software, avionics equipment, and network and communication data links among aircraft, ground stations, radar systems, and satellite systems. ERAU faculty have made substantial contributions to the body of knowledge of aviation cybersecurity through direct work with aviation industry stakeholders, publications in prestigious venues, and presentations at expert forums. To this end, ERAU faculty are consistently updating their courses with their innovative work, thus closing the loop between research and education, and helping with the preparation of well-rounded and high-skilled graduates. All these capabilities and expertise place ERAU students in a unique position to contribute to the cybersecurity of engineered systems specific for the aviation and aerospace industry.

20 min

Cloud-based Intelligent Classification and Active Defense Approach for IoT Security
  • Prasad Calyam, University of Missouri-Columbia

Prasad Calyam, University of Missouri-Columbia Prasad Calyam is the Greg L. Gilliom Professor of Cybersecurity in the Department of Electrical Engineering and Computer Science at University of Missouri-Columbia, and Director of the Center for Cyber Education, Research and Infrastructure (Mizzou CERI). His research and development areas of interest include cloud computing, machine learning, artificial intelligence, cybersecurity, and advanced cyber infrastructure. He has published over 200 peer-reviewed papers in various conference and journal venues. As the Principal Investigator, he has successfully led teams of graduate, undergraduate, and postdoctoral fellows in federal, state, university and industry sponsored R&D projects totaling over $30 Million. His research sponsors include National Science Foundation (NSF), Department of Energy (DOE), National Security Agency (NSA), Department of State (DOS), Army Research Lab (ARL), VMware, Cisco, Raytheon-BBN, Dell, Verizon, IBM and others. His basic research and software on multi-domain network measurement and monitoring has been commercialized as ‘Narada Metrics’. He is a Senior Member of IEEE. He currently serves as an Associate Editor for IEEE Transactions on Network and Service Management.

Internet of Things (IoT) devices capture and process sensitive personally identifiable information such as camera feeds and health data from enterprises and households. These devices are becoming targets of prominent attacks such as Distributed- Denial-of-Service (DDoS) and Botnets, as well as sophisticated attacks (e.g., Zero Click) that are elusive by design. There is a need for cyber deception techniques that can automate attack impact mitigation at the scale that IoT networks demand. In this talk, we present a novel cloud-based active defense approach viz., “CICADA”, to detect and counter attacks that target vulnerable IoT networks. Specifically, we propose a multi- model detection engine featuring a pipeline of machine/deep learning classifiers to label inbound packet flows. In addition, we devised an edge-based defense engine that utilizes three simulated deception environments (Honeynet, Pseudocomb, and Honeyclone) with increasing pretense capabilities to deceive the attacker and lower the attack risk. Our deception environments are based on a CFO triad (cost, fidelity, observability) for designing system architectures to handle attacks with diverse detection characteristics. We evaluate the effectiveness of these architectures on an enterprise IoT network setting with a scale of thousands of devices. Our detection results show ≈73% accuracy for the low observability attack (Zero Click) corresponding to the BleedingTooth exploit that allows for unauthenticated remote attacks on vulnerable devices. Furthermore, we evaluate the different deception environments based on their risk mitigation potential and associated costs. Our simulation results show that the Honeyclone is able to reduce risk by ≈88% when compared to a network without any defenses. 

20 min

04:00- 04:30 pm
Session Chair: Michael Tu

04:00- 04:30 pm

Revolutionizing Education with ChatGPT and Generative AI
  • David Breeding, East Coast Polytechnic Institute, ECPI University

David Breeding, East Coast Polytechnic Institute, ECPI University David Breeding is the Associate Dean of Cyber and Network Security at ECPI University. He has extensive experience in large telecommunications companies and specializes in programming automation, labor relations, project management, team building, and process improvement. He has held various leadership roles in academic institutions and worked with notable companies such as Verizon, Time Warner Cable, and ACN Communications.

In the realm of education, a revolutionary tool called ChatGPT and Generative AI is changing the way students learn. ChatGPT and generative AI are not just theoretical concepts; they are already being used by students. ChatGPT, trained on vast amounts of data, generates human-like text and assists students in various ways. It helps them generate papers, provides prompt and accurate answers to their questions, and aids in research by finding relevant sources. Teachers play a crucial role in integrating ChatGPT effectively. They should expand requirements beyond its capabilities to foster deeper conceptual learning. By building upon ChatGPT's support, students can focus on understanding concepts rather than memorizing facts. This approach nurtures critical thinking, problem-solving, and the practical application of knowledge. Expanding requirements offers several benefits. Students engage in deeper learning, explore creative solutions, and collaborate with peers. They become active participants in their education, develop critical thinking skills, and apply knowledge to real-world scenarios. In conclusion, ChatGPT is already enhancing students' educational journeys. With effective teacher integration and expanded requirements, students can concentrate on understanding concepts, fostering creativity, collaboration, and critical thinking. This empowers them for future success in an ever-changing world.

10 min

Secure Flash - Lattice of Trust
  • Vijay Anand, University of Missouri, St. Louis

Vijay Anand, University of Missouri, St. Louis Vijay Anand is an Associate Professor in the Department of Information Systems and Technology at University of Missouri, St. Louis. His research interests include embedded and hardware security, blockchain, zero trust architectures, and adaptable trustworthy computing. Anand received his Ph.D. in computer engineering from the Illinois Institute of Technology. Anand is a member of ACM.

Secure boot is reliant on the Chain of Trust to guarantee the security of an individual device. Chain of trust refers to the transfer of trust such that the transfer of execution in a device from one component to another does not alter the quality of trust. The transfer of execution in a cyber-enabled structure is one of the most important decision points where the state of trust is altered. In this project, we identify the constructs of secure flash (programming of a device) to maintain trust within the secure boot for subsequent bootups. To enable such an architecture, we utilize the specialized hardware called Trusted Platform Module to guarantee the trustworthiness of critical security operations. In this project, we identify how different boot components are ranked and how transfer of trust occurs between them. The diagram below identifies the components of secure boot, secure flash, and different pathways to accomplish the trustworthiness of execution.

20 min

Cascade II - Thursday Block II

03:00- 04:00 pm
Session Chair: Jim Poarch

03:00- 04:00 pm

The NCAE Cyber Games Platform and You!
  • James Rice, Mohawk Valley Community College

James Rice, Mohawk Valley Community College James has been with MVCC, starting as an adjunct professor in 2011, and becoming full-time cybersecurity faculty at the beginning of 2017. While teaching as an adjunct for MVCC, James worked full-time as a cybersecurity analyst for Quanterion Solutions Inc., a cybersecurity and reliability engineering-focused Department of Defense contractor. During this time, he has focused on delivering dynamic learning content and environments via various forms of media, including scenarios and games for the DoD and various cyber competitions such as the NCAE National Competition.

This presentation will unveil the technologies and moving pieces that power the NCAE National Competition. The NCAE National Competition team has open sourced this custom platform and is willing to share all of the details, but the infrastructure spans a number of complex technologies and will be daunting even to a veteran systems administrator. The NCAE National Competition team will offer possible pathways to using our infrastructure at your institution outside of the competition season. The competition team anticipates that offering the community a chance to see the infrastructure in action for a custom deployment will allow interested institutions the opportunity to digest the complexity of the platform and incorporate these technologies incrementally to serve local educational efforts.
 

20 min

Student Perception of Cyber Resilience vs Prevention
  • Frank H. Katz, Georgia Southern University

Frank H. Katz, Georgia Southern University Frank H. Katz received his B.A. in Computer Science from the University of Florida in 1977 and his M.S. in Management from Georgia State University in 1987. He served for four years on active duty as a U.S. Army Engineer Officer, leaving service as a Captain. He has over 21 years industry experience in the IT field, including The Coca-Cola Company, Great Dane Trailers, Inc., and the Imperial Sugar Company. Consequently, he has brought real-world experience into his teaching. He has been an Assistant Professor of Information Technology at Armstrong State University, now Georgia Southern University, since 2002. While at Armstrong, he played a significant leadership role in creating its curriculum in Cybersecurity and obtaining its designation as an NSA CAE-CD in 2015. Upon the consolidation of Armstrong and Georgia Southern into one university by the Board of Regents in 2018, he ensured that the CAE-CD designation was transferred to Georgia Southern. He was appointed Director of Georgia Southern’s Center for Applied Cyber Education in 2019.

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment. This talk will describe and explain the concept of cyber resiliency. It will then evaluate the responses of the students and their sources to determine if they felt that emphasizing bringing systems back quickly over prevention is a cybersecurity practice that more organizations should consider, as well as give some recommendations about both cyber prevention and cyber resiliency methods.  

10 min

Making Cybersecurity Work Roles More Attractive with Music: Aligning Music to Cyber
  • Stan Mierzwa, Kean University

Stan Mierzwa, Kean University Stanley J. Mierzwa, M.Sc., CISSP, CCSK, ITIL, CCSA Head of Center for Cybersecurity & Lecturer Kean University Stan is widely recognized as a leader in digital health technology and Cybersecurity, particularly innovations that are both relevant and usable in low-resource settings. He has implemented systems on the ground in Africa, Asia-Pacific, Europe, and Latin America. Stan lectures in undergraduate cybersecurity courses, including Cyber Policy, Digital Crime and Terrorism, and Firewalls & Secure CPU and is the Point-of-Contact for the Kean University National Security Agency (NSA) Center of Academic Excellence in Cyber Defense (CAE-CD). Previously, Stan worked at the State of New York Metropolitan Transportation Authority (MTA) Police as the Lead Application Security.

Inspired by a Cloud Security Alliance write-up by the presenter, this session will bring about a fun and interactive Lightning Talk on the topic of introducing music that aligns with the varied work roles and tasks in cybersecurity activities. This Lightning Talk will utilize and play some minor snippets of music (as loud as possible) that correspond to the National Initiative for Cybersecurity Education (NICE) Workforce Framework. The session will be helpful in possibly inspiring participants to consider ways to better and further relate to those students who may be “on the fence” in considering the cybersecurity workforce. Music has the potential to inspire and generate energy that may not have been present previously. As we continue to work towards the challenge of recruiting and educating the next generation of cybersecurity professionals, perhaps it is time to think differently, and use such resources as music! Content for this presentation will be pulled from the article below, authored by the proposed speaker.
 

10 min

Public Infrastructure Security Cyber Education Systems (PISCES)
  • Erik Fretheim, Western Washington University

Erik Fretheim, Western Washington University Dr. Erik Fretheim is the director of Cybersecurity Programs at Western Washington University. He has previously served in professor positions at City University of Seattle and the United States Military Academy. He retired from the Army after 33 years of active and reserve status, and has held CIO, CTO, and other senior leadership positions in a variety of companies including i5Digital, Grange Insurance Group, MCI, and Siemens. Dr. Fretheim is a Senior Member of IEEE.

The Public Infrastructure Security Cyber Education System (PISCES) is a platform which brings together industry, government, and education to deliver a job ready workforce, engage students with real-world experiences, and provide services to small local government entities which they would not otherwise be able to afford. PISCES places collectors on small governmental networks to collect netflow data. The data is stored on an ELK stack, and is monitored by students who perform anomaly analysis and threat hunting on the real data. Issues discovered are reviewed and reported. PISCES, which currently operates in four states, is working with CISA and PNNL to expand into other states and increase its presence. PISCES makes curriculum available to schools participating in the project, and in addition to the basic cybersecurity analyst course has developed a follow-on Security Operations Center (SOC) course.
 

20 min

04:00- 04:30 pm
Session Chair: Jake Mihevc

04:00- 04:30 pm

Creating Cybersecurity Discussions: The Good, the Bad, and the Engaging!
  • Catherine Seaver, Excelsior University

Catherine Seaver, Excelsior University Catherine Seaver is the Department Chair of Information Technology and Cybersecurity at Excelsior University. Catherine has spent twenty years in higher education as an administrator and faculty member. Before moving to higher education, she worked in several industries in capacities including application development, database design and analysis, network management, and project management. Her experience in education began as a Microsoft Certified Trainer, a Certified Novell Instructor, and a CompTIA Certified Technical Trainer. Catherine has a BS in Applied Science: Manufacturing Engineering Technology, MS in Computer Information Systems, MS in Educational Technology, and Ph.D. in Leadership with a Specialization in Education. Her passion is anything to do with technology and she is a dedicated lifelong learner.

Engaging discussions between students in asynchronous online courses are an important part of learning yet many find it difficult to develop creative and effective discussion prompts in cybersecurity and other technical courses. Often these discussion prompts end up looking like short answer questions with each student posting very similar responses. It is hard to generate a meaningful conversation from this type of prompt and students often get stuck trying to think of something relevant to say. It doesn’t have to be this way! There are ways to not only engage students in stimulating and interesting conversations related to cybersecurity concepts but to also use these discussions to develop critical thinking skills, build awareness of how diversity, equity and inclusion are impacted by the topic at hand, learn from relevant current events and encourage creative thinking. It is equally important to provide guidance for when students are replying to each other’s posts. We want their discussions to build on what has been said and continue to be productive and informative throughout the thread. This presentation will review best practices for designing asynchronous discussions by sharing examples of good, bad and engaging discussion prompts in cybersecurity courses. Participants will take away ideas for creating asynchronous discussions that will appeal to students in cybersecurity courses and generate lively conversations.

10 min

Alumni Relations and Involvement
  • Israel Emmanuel, Century College

Israel Emmanuel, Century College Innovative, highly dynamic information security professional with over 20 years of career success directing cross-functional teams of technical experts. Highly effective communicator with an extensive track record of building and maintaining key relationships with C-level executives, senior management, clients, technical teams, and other stakeholders. Results-oriented professional recognized for leadership and individual contributions on major initiatives and resolving mission-critical issues that ensure bottom-line success. With a broad knowledge of cyber threats detection and attack disruption, providing a powerful combination of analysis, implementation, and support. Experienced in system and network administration and engineering, project management, system and network security, incident analysis, and recovery. With in-depth knowledge of threats and exploitation techniques, providing unique insights into risk-based decisions. An Innovative team player with a passion for technology. Extremely agile and possess a positive attitude towards accomplishing business goals.

Maintaining an engaged alumni community can be a challenging task. Many colleges and universities struggle to maintain relationships with alumni because they fail to foster a strong bond with the students before graduation. When students graduate, the student-institution relationship should not end; instead, it should continue progressing as needs and expectations change. Institutions should establish a robust student-institution relationship that grows throughout the student lifecycle and continues beyond graduation. A cordial relationship between alumni and institutions should begin well before graduation. To develop this bond, institutions should have early recruitment frameworks that enhance cohesive and engaging experiences for students and nurture them until after students transition into alumni. Building meaningful relationships with alumni is essential for the strategic advancement of higher education programs. Keeping in touch with alumni helps an institution build a global professional network. While institutions can partner with alumni to meet financial goals for campus developments, current students at institutions can benefit from the mentorship opportunities that engaged alumni bring. Graduates are influential campus ambassadors for their institution's brand. They are the backbone of a college or university. Whether alumni are seasoned professionals or new graduates, institution-alumni networking is essential to career development. As institutions explore new digital solutions to support students better, leaders can use the latest technology to build engaging experiences and maintain a relationship that transcends graduation. With smart technology, institutions can create engaging experiences that bring the campus to alumni by sharing personalized updates on campus events and developments.

20 min

CAE-CD Schedule

Grand Ballroom II & III - Friday Block I

10:15- 11:15 am

10:15- 11:15 am

CAE-CD Community Outreach Competition: Two Years Experience
  • Wei Li, Nova Southeastern University
  • Xiuwen Liu, Florida State University

Wei Li, Nova Southeastern University Dr. Wei Li is a professor in the College of Computing and Engineering at Nova Southeastern University, Florida. His research interests include attack modeling and simulation, intrusion detection, firewall management, role-based access control, and the application of AI techniques to various security problems. He has published over two dozen papers in refereed journals and conferences. He is a senior member of IEEE and a member of ACM.
Xiuwen Liu, Florida State University Xiuwen Liu is Professor and Chair of Computer Science at the Florida State University, Tallahassee, Florida, USA. His main research interests are machine learning, deep learning, program and malware analysis, and cybersecurity education. He received the Young Investigator Award from the International Neural Network Society in 2004. He develops optimization and modeling techniques for high dimensional data and focuses recently on understanding mechanisms in deep learning. In addition, he has developed and taught software reverse engineering and malware analysis, offensive computer security, and other courses for more than ten years. He co-chairs the CAE CoP Community Outreach Competition Committee.

The CAE-CD Regional Outreach Competition Committee was established by the CAE- Community of Practice (CoP) – Cyber Defense (CD): 1) to encourage and promote cybersecurity awareness and online safety practices by taking advantage of the cybersecurity outreach CAEs do throughout the year; 2) to maximize the impacts of the CAEs on the community; and 3) to strengthen the collaborative relationships between CAE Regional Hubs and their member institutions. The initiative was originally motivated by the October cybersecurity awareness month and was extended to cover the efforts of the entire calendar for each cycle. The Committee has established a set of criteria and rules. Impact measures include number of groups and organizations that are being impacted, total number of attendees, durations and frequencies of the events, and effectiveness of outreach materials. Diversity measures include  the inclusion of minority and underrepresented groups and the spectrum of age groups in the cybersecurity profession. Effort measures include evidence of CAEs who promote and engage in outreach events and the total number of outreach events provided by the CAEs. The Competition started in 2021 with the first cycle results presented in the 2022 CAE Symposium and the second cycle presented this year.
 

20 min

A Collaborative Case Study: Increasing Undergraduate Research in Cybersecurity at HBCUs
  • Chutima Boonthum-Denecke, Hampton University
  • Idongesit Mkpong-Ruffin, Florida A&M University

Chutima Boonthum-Denecke, Hampton University Dr. Chutima Boonthum-Denecke is an Endowed Professor in the Department of Computer Science, School of Science, at Hampton University. She also serves as a Director of the Information Assurance and Cyber Security Center (IAC@HU) and oversees the CyberCorps®: Scholarship for Service (SFS) program at Hampton University. Her research interests include artificial intelligence (natural language processing, computational linguistics), intelligence tutoring systems, information retrieval/extraction, cognitive robotics, and integrating AI in cybersecurity fields, including adversarial attacks and video/image authentication. She is a Co-Lead of the AI-CyS Research Partnership Project.
Idongesit Mkpong-Ruffin, Florida A&M University Dr. Idongesit Mkpong-Ruffin is an associate professor in the Computer and Information Science department at Florida A&M University (FAMU) and the director of FAMU’s Center for Cybersecurity. She is the coordinator of the Bachelor of Cybersecurity degree program at FAMU. Her research areas of interest are in the following areas – video/image authentication, adversarial attacks, software security, quantitative risk assessment, natural language processing (NLP) and computer science education. She is a co-lead of the AI-CyS Research Partnership project.

The HBCU Artificial Intelligence and Cybersecurity (AI-CyS) Research Partnership consists of the following universities: Hampton, Florida A&M, Winston Salem State, University of District of Columbia, Mississippi Valley State, Norfolk State, and Howard universities working together to increase each of our individual institute’s research capacity and enhance our research collaboration. This Collaborative Research Project leverages the collaboration between HBCUs and national research laboratories (Lawrence Livermore and Brookhaven) to increase research capacity from corresponding Minority Serving Institutions by “capitalizing on the synergies from current HBCU collaborations” to investigate the use of Artificial Intelligence, specifically Machine Learning, to address cybersecurity challenges. Collaborations with national research laboratories support professional development through knowledge acquisition for enhancing the research capacity of the HBCU faculty. The project’s activities include (A) increasing institutional research capacity at HBCUs in AI and cybersecurity and fostering the collaboration among HBCU faculty as well as with the national research laboratory; (B) increasing the number of students, especially undergraduate students from underrepresented groups in conducting research; and (C) providing students with mentoring from their own HBCU, partnered HBCU, and mentors from the national research laboratory. We are engaging in the following research projects: (1) Reinforcement Learning Autonomous Cyber Security Agents, (2) Exploration of Ways to Disambiguate Traceroute Data for Improved Understanding of Computer Networks, (3) the Universal Adversarial Patch Attack, and (4) (Surveillance) Videos Authenticate in Near Real-time. With the low engagement of researchers from under-represented groups, this project aims to use this partnership of universities that predominantly serve African Americans, not only to increase research in AI and cybersecurity, but also to attract other computing students, and even other STEM disciplines. It is expected that each HBCU will be able to build on its initial research and obtain additional research funding support to continue and add-on to its research capacity.
 

20 min

Cybersecurity Employment Outcomes of Two-Year College Alumni
  • Tobi West, Coastline College

Tobi West, Coastline College Professor Tobi West is a tenured full-time faculty member of Cybersecurity and Computer Information Systems. She is the director of Coastline’s National Center of Academic Excellence in Cyber Defense education and serves on multiple national committees supporting K-12 cybersecurity curriculum development. Ms. West is also a Ph.D. student at Dakota State University, studying in the Cyber Defense program. Ms. West is the Principal Investigator for Cyber Up! Digital Forensics and Incident Response, a National Science Foundation project. In addition to teaching and developing education pathways, she enjoys organizing outreach events such as CyberTech Girls and GenCyber camps to raise awareness about cybersecurity career pathways. Her passion is encouraging and empowering students to find their academic pathways and achieve their career goals.

The cybersecurity workforce suffers from an ongoing talent shortage and there is a lack of information correlating cybersecurity education programs to alumni employment outcomes. This exploratory, cross-sectional study will evaluate the post-graduation employment outcomes of alumni that attended two-year colleges designated by the National Security Agency as Centers of Academic Excellence in Cyber Defense. Stakeholders of this project are identified as faculty, employers, students, government agencies, the National Security Agency, and organizations that rely on cybersecurity talent to keep their systems secure from cyberattacks. This study will use the mixed methods approach to compare alumni employment outcomes to their cybersecurity Programs of Study using the work roles of the NICE Framework. Initially, a call for participation will be sent to the Points of Contact at two-year colleges designated as Centers of Academic Excellence in Cyber Defense. The first phase of the study will include a request for Points of Contact to provide academic program information via online survey and to contact cybersecurity program alumni with a link to an online survey about employment outcomes. The second phase of the study will include two rounds. In round one, an online survey will be sent to collect alumni employment data about work experience, degree name and year of graduation, industry-recognized certification achieved, and any additional higher education achievements since graduation from the two-year college. In round two, alumni that did not respond in round one will be contacted for a structured interview to complete the online survey. The resulting knowledge can be used to better understand the employment outcomes of two-year college alumni from CAE-CD cybersecurity programs.
 

20 min

11:15- 12:00 pm

11:15- 12:00 pm

CTE CyberNet: Strengthening the Nation’s Cyber Workforce
  • Kim Muschalek, San Antonio College
  • Dr. Stephen Mller, Eastern New Mexico University - Ruidoso
  • Dr. John Sands, Moraine Valley Community College
  • John Roberts, Luminary Labs

Kim Muschalek, San Antonio College Kim Muschalek has over 26 years of higher education experience in computer applications management and computer science. Kim has experience teaching client operating systems (Windows and Linux), TCP/IP, network design and architecture, and hardware configuration and software integration. In 1995, Kim joined the faculty at San Antonio College. She has mentored the San Antonio College/ Information Technology and Security Academy (ITSA) CyberPatriot Team for 10 years and taught cybersecurity concepts and team strategies aimed at solving real-world cybersecurity issues. Kim is the Director of the San Antonio College Cyber Innovation and Education Center. She is currently the PI for the National Cybersecurity Workforce Development Program subaward from Dakota State University and the PI for CyberSkills2Work, the National Cybersecurity Workforce Development Program subaward from The University of West Florida. Most recently Kim has been an advisor on the Career Kickstart IT Networking/Cybersecurity Advisory Board for the College Board and the Director of the CTE CyberNet program in San Antonio, Texas.
Dr. Stephen Mller, Eastern New Mexico University - Ruidoso Dr. Miller is a tenured professor of Information Systems and director of the Cyber Security Center of Excellence at Eastern New Mexico University – Ruidoso CAE-CD and co-PI of the National Cybersecurity Training and Education Center. He is a retired executive from ExxonMobil Global Information Systems. A highlight of his career as member of the NASA Mission Control on the APOLLO Missions. He serves on many grants, committees, boards, and projects like National Cybersecurity Training and Education Center (NCyTE) Co-PI where he developed industry academic relationships and projects, and CAE Peer Review National Center (CNC). ENMU-Ruidoso Lead for the New Mexico CTE CyberNet Academy.
Dr. John Sands, Moraine Valley Community College Dr. John Sands is an educator and researcher in the field of cybersecurity education. He has over 35 years of experience as a classroom professor, publisher, and senior researcher in technical education. He earned his Ph.D. from Colorado State University and currently serves as the department chair of the Computer Integrated Technologies programs at Moraine Valley Community College. Dr. Sands has made significant contributions to the field as a Principal Investigator (PI), Co-PI, and project evaluator for various National Science Foundation (NSF) Advanced Technology Education centers and projects. He played a significant role in establishing the Center for Systems Security and Information Assurance (CSSIA), recognized as one of the country's leading comprehensive Centers for Advanced Technology Education. In addition to his academic achievements, John holds several industry certifications, including CISSP, CCIA, A+, Network+, and Security+. He is also an accomplished author, having written textbooks, white papers, web-based course materials, and lab manuals.
John Roberts, Luminary Labs Jon Roberts is a Senior Director at Luminary Labs, a strategy and innovation consultancy based in New York. He leads the company’s science and infrastructure focus areas, guiding public, private, and nonprofit clients to connect dots and advance American competitiveness, equity, and prosperity. In addition to overseeing the U.S. Department of Education’s CTE CyberNet initiative since its inception in 2019, he has designed and led groundbreaking, human-centered innovation and ecosystem-building programs alongside the U.S. Department of Health and Human Services, National Institutes of Health, Department of Defense, and NASA. Before joining Luminary Labs, Jon spent over a decade as a digital, enterprise, and marketing strategy advisor to senior executives in the agriculture, industrial, financial services, and health sectors. He holds an A.B. in Government from Harvard University. Moderator Jonathan M. Roberts Senior Director, Luminary Labs www.luminary-labs.com jon@luminary-labs.com

Career and Technical Education (CTE) CyberNet seeks to increase the number of CTE teachers who can effectively prepare students for cybersecurity education and careers. CTE CyberNet is driven by a local academy approach to help teachers deliver more rigorous CTE cybersecurity programs of study aligned to industry standards and industry-valued certifications. The academies give educators strategies and tools to impart the knowledge, skills, and abilities outlined in the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. CTE CyberNet academies are designed to also align with the knowledge units of National Centers of Academic Excellence in Cybersecurity (NCAEs). CTE CyberNet was developed as a blueprint that could be adapted to the unique needs of local education ecosystems.
 

45 min

CAE-R Schedule

Fifth Avenue - Friday Block I

10:15- 10:55 am

10:15- 10:55 am

INSuRE Faculty Panel
  • Sanjay Goel, SUNY Albany
  • Brian Ricks, UT Dallas
  • Bill Hayes, University of Arizona
  • Tony Coulson, CSUSB

Sanjay Goel, SUNY Albany
Brian Ricks, UT Dallas
Bill Hayes, University of Arizona
Tony Coulson, CSUSB

11:00- 11:45 am

11:00- 11:45 am

Sponsored by: