|
Don't Miss the Community College Cyber Summit (3CS)
Get ready for loads of workshops and fun at the seventh annual Community College Cyber Summit (3CS) hosted at Sinclair Community College in Dayton, OH, May 23-25, 2022. This year’s event features Cybersecurity Skills Development Workshops, a multitude of presentations and panel discussions, a Career Exploration event and tours of Dayton.
|
|
Submissions Open for 2022 Innovations in Cybersecurity Education Program
We encourage you to submit to the 2022 Innovations in Cybersecurity Education program, open from Feb. 18 through April 18. Submissions in the following categories: Evidence-based Strategies, Instruction, Practice, and Program Development, helps accelerate their adoption throughout the academic community and allows you and your team to receive the proper recognition for your work.
For more on the Innovations program and how to submit yours, see HERE.
|
|
|
|
Calling all Cybersecurity Researchers!
Cybersecurity research has resulted in many opportunities to consider the impact of new cybersecurity technologies to the broader cybersecurity workforce, from testing to planning for technology transfer. Attend a Proposal Development Workshop for our upcoming Special Issue on Evidencing Competencies: Progress from Funded Research to learn how your research at any stage may impact the workforce.
Register for the Proposal Development Workshop HERE.
|
|
Challenges for Medical Cybersecurity: Understanding the Current Crisis, Emergent Technologies, and Developing Risk Management Strategies that Reward Getting it Right Webcast
There is abundant evidence that the cybersecurity situation for healthcare systems is deteriorating. Cycles of dynamic innovation by increasingly sophisticated bad actors appear all too often to be forcing security professionals to play catch-up. This webcast explored a series of core metrics that represent the very problematic status quo.
|
|
|
|
Wicked6 2022 Cyber Games
This virtual event takes place March 23-24 and includes the competition (Virtual Escape Rooms, Capture the Flag Challenges, Attack and Defend), speakers, networking opportunities via Discord, plus prizes & merch.
|
|
National Security Agency (NSA) Cybersecurity Technical Report: Network Infrastructure Security Guidance
This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.
View the full report HERE.
|
|
|
|
Request for Information | Evaluating and Improving NIST Cybersecurity Resources: The NIST Cybersecurity Framework and Cybersecurity Supply Chain Risk Management
NIST is seeking information to assist in evaluating and improving its cybersecurity resources - including the widely-used NIST Cybersecurity Framework (CSF) and a variety of existing and potential standards, guidelines, and other information. That includes guidance relating to improving cybersecurity in supply chains.
Visit the NIST website HERE to view the RFI and for details on how to submit your comments by April 25.
|
|
Bloom’s for Computing: Enhancing Bloom's Revised Taxonomy with Verbs for Computing Disciplines Project
This project, led by the Association for Computing Machinery (ACM) Committee for Computing Education in Community Colleges (CCECC), invites the community to review the recently released IronDog draft of Bloom's for Computing: Enhancing Bloom's Revised Taxonomy with Verbs for Computing Disciplines and to complete the associated survey. This report proposes 77 possible new verbs to be used with the six cognitive levels in Bloom's Revised Taxonomy for crafting competencies and learning outcomes for computing disciplines, including cybersecurity.
|
|
|
The project team is seeking feedback on which verbs you would and wouldn't use, to inform the final draft of this report. Review the IronDog draft HERE.
|
|
|
Interested in Helping to Improve Diversity in the Cybersecurity Workforce? Fill out the Below Survey and Enter to Win a $50 Gift Card.
The Diversity in Cybersecurity Project Team in the School of Computing and Information at the University of Pittsburgh: Ahmed Ibrahim, Chelsea Gunn, Leona Mitchell, Sherif Khattab is conducting a survey to learn about experiences and inhibitors to working in the field of cybersecurity. Your feedback will help the Pitt team understand the important variables affecting the participation of URGs in cybersecurity education and professional practice.
|
|
There is no direct compensation for taking the survey. However, participants will have a chance to win one of five $50 gift cards as a token of the research team's appreciation. Please take a few moments (10-15 minutes) to answer a set of multiple-choice questions using the link HERE.
|
|
Grant Development and Mentoring Program
The FORCCE-ATE Faculty Development and Mentoring-Coaching program is designed to educate participating community college teams about the National Science Foundation (NSF) Advanced Technological Education (ATE) program, to empower them to write competitive grant proposals, and to mentor/coach them through the otherwise daunting writing process. FORCCE-ATE includes many areas of cybersecurity and computing education, such as information technology, computer science, digital forensics, Cloud, IoT, data science, bioinformatics, AI/machine learning, and others.
|
|
|
FORCCE-ATE builds on a track record of success. The success rate of the June 2020 virtual Faculty Grant Development Workshop was 73%. Of the 11 community college teams that submitted proposals to the ATE program, eight received funding. The deadline for mentee colleges to apply is Apr. 1, 2022. Preference will given to teams that applied by Mar. 1, 2022 or until all available slots are filled.
The online application is available HERE.
|
|
March 17-19
April 19
May 23-25
June 6-8
July 25-28
|
|
Commercial entities or materials may be identified in this e-Newsletter and/or National CyberWatch Center social media sites. Such identification is not intended to imply recommendation or endorsement by the National CyberWatch Center.
|
|
|
|
|
|
|