Posted on 19 Jul 2016 7:14 PM
Event Date: Thursday, November 3, 2016 - 10:30am

{{gmap markers=small bred::39.08303478032568,-94.58299398422241 |align=center |zoom=12 |center=39.08898429025349,-94.59906832525328 |width=100% |height=450px |control=Large |type=Map}}

Centers of Academic Excellence Community Meeting
Organized by:  California State University San Bernardino
Cyber Security Center
Supported by NIST*

[spacer different_values="0" style_height="30px"] [/spacer]

Please join us for this important meeting of the CAE Community.  The meeting is open to ALL existing Centers of Academic Excellence in Cyber Defense and Cyber Operations as well as CAE 2Y and CAE-R Schools. This includes those schools that have applied for the CAE Designations or are in process of applying.

[spacer different_values="0" style_height="30px"] [/spacer] [tabs] [tab title="Dates" active="1" different_values="0"]

Thursday Nov 3, 2016 (Day after NICE Conference)
The Westin Kansas City Crown Center

[/tab] [tab title="Accommodations" active="0" different_values="0"]

The Westin Kansas City Crown Center
1 E Pershing Road
Kansas City , MO
Phone: 816-474-4400

Group Code: NICE

(Mention the NICE Conference and get the $112 block rate)


[/tab] [tab title="Travel Funds" active="0" different_values="0"]

We invite you to apply for travel reimbursement, up to $1000, to attend the upcoming CAE Community Meeting.  Approximately 150 travel awards for faculty from CAE-CD,  CAE-CO, CAE-R, and CAE-2Y institutions in the United States will be competitively awarded through this imitative, limited to one attendee per institution.  The travel funding will cover airfare and two nights lodging at the  The Westin Kansas City Crown Center.

To apply for this travel funding, and to register for the meeting use the link above. You will be prompted for travel funds requests, if required. You will receive a confirmation of your travel funds authorization shortly after as well as instructions for claiming the reimbursement.

Registration and travel fund applications from all CAE institutions are encouraged.  (NOTE:  This travel funding is for the CAE Community Meeting only and not for the NICE Conference, although you are encouraged to attend both.)

[/tab] [tab title="Meeting Schedule" active="0" different_values="0"] [accordions different_values="0"]
[accordion title="7:15 AM Check-in" active="0" different_values="0"] [/accordion] [accordion title="8:00-8:25am Welcome, Logistics, and Roadmap Flag Ceremony" active="0" different_values="0"]

Location: Ballroom

Tony Coulson (CSUSB)

Lynne Clark (NSA)

Rodney Peterson (NIST)

[/accordion] [accordion title="8:25-8:40am CAE Community- Evolution and Mission" active="0" different_values="0"]

Location: Ballroom

Tony Coulson (CAE Community Lead)

[/accordion] [accordion title="8:40-10:00am NSA/DHS: State of CAEs" active="0" different_values="0"]

Location: Ballroom

Lynne Clark (NSA)

Daniel Stein (DHS)

CAE Program Team

Corby Hovis (NSF)

[/accordion] [accordion title="10:35-10:50am Morning Break" active="0" different_values="0"]

Sponsored by CyberWatch West

[/accordion] [accordion title="10:50-11:55am CAE FAST Pitch Sessions (10 Minutes Each)" active="0" different_values="0"]

Location: Ballroom

How do I get started in Cyber Security Competitions?

Dan Manson, Cal Poly Pomona

Cybersecurity competitions are the premier experiential learning experience today for middle school,high school and college students. Most faculty and students do not know how to get started incompetitions. This talk explains in a few minutes how to get started and what the benefits are.

Students Engaging the Public: Service Learning

Shelly Heller, George Washington University

GW CyberCorps students, under the guidance of the PIs, contact local community groups such as neighborhoodassociations, condominium associations and senior citizen groups to arrange a hour-long presentation andquestion/answer period on topics of current events in the cyber-security realm. For these audiences the intentis to explain the event “beyond the headlines”, and offer generalized basic advice on how an individual couldprotect him or herself from many of the cyberattacks.

Industrial Control Systems Security

Guillermo Francia, III, Jacksonville State University

This fast pitch talk will describe the Faculty Development Workshop On Industrial Control Systems Securitythat is afforded as a professional development opportunity to college instructors and is supported by a NSFCapacity Building grant.

10 in 10: Why CAEs Should Consider Hosting WiCyS

Ambareen Siraj, Tennessee Tech

The Women in Cybersecurity (WiCyS) started in 2014 with support of a National Science Foundation grant(Award#1303441) and thereafter held annually. The NSF project is managed by Tennessee Tech CybersecurityEducation Research and Outreach Center and yearly sub-awarded to a CAE institution to serve as a local host tomaximize the conference exposure to many across the United States, and to bring new insights for conferenceorganization. This 10-minute presentation will highlight 10 reasons to become a local host for WiCyS.

National Cybersecurity Center, Colorado Springs, CO

Martin Wood, National Cybersecurity Center

National Cybersecurity Center (NCC) is a 501(c)(3) Colorado-based national center developed througha private-public partnership (P3) in Colorado Springs, Colorado. NCC will collaborate with the private sector,work with the military and federal agencies, and support and educate the public sector to better protect cities,states and national assets. NCC will be both a response partner and thought leader in cybersecurity nationallyand workforce development will be critical in addressing our nation’s cybersecurity efforts.

Fostering a Strong Cybersecurity Culture in High and Middle School Students and Teachers Through a Holistic and Multidisciplinary Approach

Waleed Farag, Indiana University of PA

This presentation intends to highlight an inherently multidisciplinary approach to foster interest in cybersecurityin middle and high school students and teachers. The Information Assurance (IA) program at our University,Indiana University of Pennsylvania (IUP), has been inherently a multidisciplinary one.

Win-Win: Assisting Companies from South Florida Mitigate Cyber-Attacks as During A Graduate Information Security

Yair Levy, Nova Southeastern University

This presentation will outline a graduate information security project capstone course at NovaSoutheastern University – College of Engineering and Computing, where students are tasked toselect a local small or medium company and conduct a full cybersecurity risk management analysiswith proposal of a project to mitigate some of the cyber-threats observed by combining technicaland managerial/governance means.

[/accordion] [accordion title="12:00-1:00pm Working Lunch- CAE Website and Signups" active="0" different_values="0"]

Location: Ballroom

Anastacia Webster

[/accordion] [accordion title="1:00-1:30pm" active="0" different_values="0"]

Location: Ballroom

Aligning Skills-based Training and Performance Assessments within Academia to Create a More Capable Cybersecurity Workforce

Art Conklin

[/accordion] [accordion title="1:30-2:30pm Dismiss to Special Interest Group Sessions (4)" active="0" different_values="0"]

Undertaking the Under-Representation Problem in Cyber
Ambareen Siraj, Tennessee Tech
Location: Brookside

It is no secret that women and minorities are still very much under-represented in Cybersecurity. While there are various efforts underway to address this issue, a lot of work remains to be done to start the momentum shift. This open forum will provide a conversation platform to share strategies and experiences that have had a positive impact in this regard. Maybe we can all learn from each other about what works and individually take action to make a collective difference.

C5 Mentor Meeting
Corrine Sandee, Whatcom Community College
Location: Shawnee

Meeting for C5 mentors to discuss issues and integration with the NSA mentor program.

CRRC: Program Development
Casey O’Brein, National CyberWatch Center
Location: Mission

We would welcome feedback on what elements should be involved in the Program Development portion of the newly created/funded CRRC.

Central Eastern CRRC Meeting
Margaret Leary, National CyberWatch Center/NVCC
Location: Liberty

An informal meeting of NSA’s Central Eastern CCRC (Virginia, W. Virginia, Kentucky, Delaware, Maryland, and Tenn) institutions to discuss regional issues that the CCRC can help support. A survey for Professional Development training needs will be distributed.

[/accordion] [accordion title="2:30-2:45pm Afternoon Break" active="0" different_values="0"]

Sponsored by CyberWatch West

[accordion title="2:45-4:15pm Presentations" active="0" different_values="0"]

Capturing Students by Capturing Flags
Dale Rowe, Brigham Young University

Location: Mission

We have found Capture The Flag (CTF) challenges to be an excellent tool inprovoking cybersecurity interest in high-school students. We have developed arapid prototyping platform for hosting these CTF’s using LXD Linux Containerson Ubuntu 16.04 to support a variety of current and legacy CTF platforms. Theseallow a much faster rate of development, salability and re-use than is typicallypossible. At the conclusion of the presentation we will publicly release ourframework.

The National Academy of Public Administration- Recommendations for SFS Programs
James Frost, Idaho State University

Location: Shawnee

A paper (“Increasing the Effectiveness of the Federal Role in CybersecurityEducation.”) was published in October 2015. This paper from the NationalAcademy of Public Administration for the Center for Internet Security wasprompted by the network centric nature of our world and the severe shortage ofcybersecurity professionals to address cybersecurity needs. It acknowledged twoprograms that seek to address this shortage; the Centers of Academic Excellenceand the Scholarship for Service program.

Aligning Skills-based Training and Performance Assessments within Academia to Create a More Capable Cybersecurity Workforce
Montana Williams, Cyber World Institute

Location: Shawnee

Cybersecurity Education (NICE) and the NIST Cybersecurity Frameworks, academiaand training organizations must develop cybersecurity professionals with the skillsnecessary to perform their jobs. This can only be accomplished by augmentingexisting programs with skills-based training and performance assessments. Thispresentation will partnerships between academia, local industries, and trainersthat can be integrated in post-secondary continuingeducation and degreed programs that can develop and enhance the requisiteskills necessary to heighten cyber resiliency across the nation and even the world.

KU Refinement
Art Conklin, University of Houston

Location: Brookside

The knowledge units (KUs) are used to document the content elements in ouracademic programs. Academics were involved in the creation of the KUs and thisrefi nement workshop is an opportunity to provide improvements and clarifi cationsto the KUs. Have a KU that youthink needs change, clarifi cation, improvement? Have one you think is missing?Think there is one that doesn’t belong in the list? Bring all of your thoughts andprovide inputs to the next version of the KUs. This is your opportunity to helpimprove the KU’s.

Developing an Adaptive Multi-Factor Authentication System
Dipankar Dasgupta, University of Memphis

Location: Liberty

This research is focused on the design and implementation of an adaptive MFAsolution to regularly authenticate users through a subset of authentication factorsin a time-varying operating environment (working device, connecting mediaand surrounding conditions). The authentication modalities/factors are chosenadaptively at every triggering event by sensing the operating environment via anoptimal set of authentication factors to verify users against their claimed identities.The proposed A-MFA system has been implemented and thoroughly evaluatedwith different metrics to measure its performance and compare it with otherexisting single-factor, two-factor and multifactor-based authentication solutions.

Where’s the Sense of Urgency in the Information Security Academic Community?
Casey O’Brein, National CyberWatch Center

Location: Liberty

As the demand for qualifi ed information security professionals increases, so hascommercial organization’s concern for the perceived lack of qualifi ed studentscoming out of our programs. It’s hard to imagine academia being able to solelymeet the demand numbers, but what about the quality of the students coming outof our programs? If we are in fact, truly National Centers of Academic Excellencein Cyber Defense/Operations, where’s the sense of urgency to right the course?This discussion will focus on areas in which academia must evolve in order toshrink the growing gap between what industry says it needs from our studentsand what we are actually producing.

Cyber Security Risk Management Analyst
Charlene Watson, Florida A & M University

Location: Mission

In order to provide practice in the analysis and implementation steps of thenetwork security development process, a student must understand the logicaldesign of a network in order to deploy security countermeasures for IntrusionDetection. The purpose of this project is to help students understand how todesign a network with only basic information available, understand the physicaltopology design, the logical design which will be derived from this, and then thesteps necessary to secure the entire network.

Cyber Security “Edutainment” - Creating Partnerships toEducate Millennials & meet the CAE/NICE Criteria
Charlene Watson, Florida A &M University

Location: Liberty

In order to provide practice in the analysis and implementation steps of thenetwork security development process, a student must understand the logicaldesign of a network in order to deploy security countermeasures for IntrusionDetection. The purpose of this project is to help students understand how todesign a network with only basic information available, understand the physicaltopology design, the logical design which will be derived from this, and then thesteps necessary to secure the entire network.

[accordion title="2:45-4:15pm Government Representative Appointments" active="0" different_values="0"]

Location: Ballroom

DHS – Dan Stein (High School, Internships, Infrastructure)
NSA – Lynne Clark (NSA CAE CD Program Offi ce)
NSA – Heather Elkenberry (Cyber Ops)
NSF – Corby Hovis (Grants)
NIST – Rodney Peterson/ Bill Newhouse (NICE)

[accordion title="4:15-5:00pm Interactive Plenary & SIG’s Work/ Open Mic/ Farewell" active="0" different_values="0"]

Location: Ballroom

[/accordions] [/tab] [/tabs] [spacer different_values="0" style_height="30px"] [/spacer] [accordions different_values="0"] [accordion title="Registration" active="0" different_values="0"]

We will be gathering academia and government to discuss the future cyber security workforce as well as several unique working group opportunities.

The event is FREE, but registration is required in advance to gain access to the conference.

Registration closes October 14th.

Community Meeting Registration:

[/accordion] [accordion title="Presentation Submissions" active="0" different_values="0"]

Interested in Presenting at The CAE Community Meeting?

This year we are offering an opportunity for attendees to submit proposals for a FastPitch, Special Interest Group Discussion, or a Presentation. You can choose more than one. The committee will select based on available spots. Deadline is October 10th.


The theme is "Innovation". Schools are given the opportunity to make a 10 minute or less presentation to the general audience on an innovative program, approach or other item. We will have a limited number of spots for FASTPITCH.


These are opportunities for participants to discuss items relevant to the interest group. The sessions will be about 1 hour in breakout rooms. Sample topics might be Women and Minorities in Cyber Security or Cyber Security Accreditations. The groups will provide documentation of the session.


These breakout room forums are provided for attendees who wish to present something of interest to an audience. Presentations should be less than 30 minutes.

To submit a proposal for a session:

[/accordion] [/accordions] [spacer different_values="0" style_height="30px"] [/spacer]

*This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.S. Department of Commerce, under Grant # 60NANB16D309