Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
Posted byPerformance Excellence
Jennifer Miller, Director of Performance Excellence and Cybersecurity Services
Technician Meeting – Cybersecurity Updates
December 7, 2018
On Thursday, December 6, 2018, James Costello and Jennifer Miller met to discuss the current events goingon in the Cybersecurity Team. James and Jennifer along with Eric Pina have spent the week debriefing fromthe NICE Cybersecurity conference and preparing for the Data Governance Committee Meeting to be held on Monday, December 10, 2018.
James Costello
Jennifer Miller
Eric Pina
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Keynote: Tales of a Teenage Security Supergirl
December 3, 2018
Kyla Guru, 16 year old from Illinos, realized many Cybersecurity issues are due to human error. She founded Bits N Bytes Cybersecurity Education. BitsNBytes is a non-profit dedicated to cybersecurity education. We are making waves – IBM CyberDay, NICE, NIST, iKeepSafe, Common Sense Media are all working together to make progress to equip communities with cyber education.As a junior in high school, she realized she had signed the Science Student Safety Contract for Science for 7 years. Whe felt that there should be a safety contract for cybersecurity information just like we have for science safety information. The education system has the power to emphasize this need. She realized that her peers didn’t have cybersecurity knowledge she did. She wanted to make an impact and created a 5 minute animated video for her elementary school. The students and teachers appreciated what she had created. She realized that this was a larger mission than one school and created bitsnbytesCybersecurity education. Currently over the last 24 months, they have• 26 partners• have written 40 articles• involved 15,722 students• and held 35+ workshopsKyla is encouraging Gen Z to work with educators, parents, government and thecommunity. Bitsnbytes is focused on encouraging students to create content for other students.
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Keynote: Tales of a Teenage Security Supergirl
December 3, 2018
Shifting the Focus – the mighty genzennials. Kyla took Maslow’s Hierarchy of Needs and focused on the second need for safety/security is a part of Cybersecurity. Gen-Z is looking for high impact, potential for growth. The big question moves from “What do you want to be when you grow up?” to “What kind of impact do you want to be making right now?” Kyla shared the research project – “Who is your man/woman of magnitude?” We need more mentors in Cybersecurity to be men and women of magnitude.
9 hours daily is spent on media80% of our waking day is screen timeTech is our new “lab” so we better be secure and safe
Gen Z - 82% include primary news sources – twitter, faceook, Instagram,Transform lessons into interaction – gamification
“The Bravery Deficit” how do we encourage girls to take risks?You can’t change what you can’t seeSolutions are possibleWe are only as strong as the weakest link.
Maslow’s Hierarchy of Needs
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Transforming the National Career Pathways Framework to Promote Cybersecurity
December 3, 2018
Four groups from across the country applied for a grant for examining pathways to Cybersecurity.Few states address the need for the Cybersecurity initiation• Impact statewide cybersecurity pathways of
study• Orientation to Cybersecurity Careers• Identify model programs and best practices• Faculty development workshopProject focus• CTE educators want to know how to teach Cybersecurity. This team looked at the training and certification
exams necessary. Comptia Fundamentals exam maps out what they are looking for from CTE educators. • Trying to bridge the computer science, networking, and cybersecurity courses and find ways for it to all work
together. Cyber Patriot Teams puts together an applied hands-on environment in all of the pathways. • Former CTE teacher, worked with 20 teachers from 7 school districts. Focused on middle school curriculum.
Online course to begin. • Who owns it? Different in each state, some universities, some community college, some at the state level.• How has it changed? Who is responsible to update? We must understand the problem before we can fix it. • Found that many times, CTE teachers were unable to fully explain the type of jobs now available for students
– they know in a broad sense, but not specifics.
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Using Pop Culture to Teach Cybersecurity to Generation Z
December 3, 2018
Who is Gen Z?• Post Millennials• Born mid 1990s through mid 2000s• 25% of US population
Challenges with Gen z• Difficulty in continuation of focus• Expect continuous, varied stimulus• Demand experiences curated from their physical
and virtual worlds.
Their approach• Familiarize students with cybersecurity concepts
in their comfort zone• Education material that provides opportunities
for interaction/engagement• Opportunity for immersive experience.
Their program includes, students, teachers, and school counselors. Program becomes very strong when the counselors are aware.
TNTECH NSA-NSF Fun Cyber Camps• Learning by Doing – all receive a Raspberry Pi • Learning by Engaging – Outdoor Game, Cyber
Defense, Cyber Puzzles• Learning by Thinking – Cyber Everywhere• Learning by Sharing – Presentations at the end
of camp• Learning by Collaborating
To use, contact [email protected] Brown and Ambareen SirajTennessee Tech University
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Where to Begin? Steps in Creating a Cyber Aware Classroom
December 3, 2018
Kacy Durkus is a freelance writer and former classroom teacher. Cybersecurity focuses on protecting computers, networks, and information from unauthorized access or attacks.
Advice from the expertsA cyber aware classroom needs a set of tenets which are a mix of tech and EQ, Steve Moore
We need to teach kids –The things we see online can often look perfect because the imperfect can be deleted, but the world isn’t perfect.
Privacy is often the payment we make for “free software”
Center for Cyber Safety and Education – some free resources
Elementary School Conversations• Why Your Privacy Matters• Safe Posting• Cyberbullying
97% of Cybersecurity incidents begin with human error
Secondary School Conversations• Effects of cyberbullying – real life
examples – stopbullying.gov• Find examples of discipline actions of people
losing their job due to social media postings• Get a little technical – learn how to delete and
unsubscribe from old applications• Discuss the difference between physical security
at home, cybersecurity and privacy (virtual vs physical)
• Learn how to install and use a password manager with online accounts.
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Analysis and Investigation Through Cyber-Based Scenarios – Chuck Gardner
December 3, 2018
Began to find grass roots efforts to build employees and provide a workforce for Cybersecurity. Works with the NICERC National Integrated Cyber Education Research CenterProfessional DevelopmentCurriculum DesignCollaboration in K-12 EducationTransforming EducationEmpowering EducatorsPreparing a Cyber-Ready Workforce
Working with 13,000 teachers across the country.
Humanities content – unplugged table top activity
Cyber Interstate – provides many onramps and offrampsK12 Solutions for Cyber Interstate Project based learning – STEM and STEAM
EDA Format - Explore Discover Apply
Future of Cybersecurity Workforce• DHS works to ensure a homeland that is safe,
secure, and resilient against hazards, including cyber threats.
• Tomorrow’s cybersecurity workforce is sitting in our classrooms today
• Encourage STE and introduce cybersecurity careers…
Introduction to NICERC content• Hands-on curriculum• Builds a strong cyber foundation• Introduces cyber by blending robotics,
programming, electricity, and elements of liberal arts.
They create courses that can be distributed freely to high school teachers to create better prepared Cybersecurity students.
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Cool (and Free!): Things NSA is doing for K-12 Cybersecurity Education
December 3, 2018
GenCyber• Help all students understand correct and safe online behavior• Increase interest in cybersecurity and diversity in cybersecurity
workforce of the Nation• Improve teaching methods for delivering cybersecurity content
in K-12 curricula• Offering Summer Camps for students and teachers. Camps
are all free.• 8 camps held in 2014 to 150 camps held in 2018
Scholarship opportunities and college pathways• National Centers of Academic Excellence• Cyber Operations• Cyber Defense• https://www.nsa.gov/resources/students-educators/• CyberCorps Scholarship for Service• https://www.sfs.opm.gov/
National Cybersecurity Curriculum• Workshops and Seminars• Cyber Cube
ModularLearning outcome (Bloom’s) basedEffective, Engaging, UsableExtensive review processK-12 Undergrad, Graduate levels
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Tools and Resources to Improve Cybersecurity Education
December 3, 2018
Encouraging cyber knowledge and interest early. Integrate real world cyber scenarios into K-12 science, math, and liberal arts
• 11 year long courses plus modular project-driven hours• 2,070 + content hours• 12,000+ teachers use the curricula impacting more than
1,500,000 students across the US.• Workshops for teachers• Cybersecurity Summer Camps• Download the free curricula nicerc.org• Project-based learning• Teacher and master notes• Student workbooks• Quizzes, worksheets, and projects
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Keynote: Data Security and Privacy in an Interconnected World
December 4, 2018
Rhonda Childress [email protected]. Childress currently holds 180 patents. IBM Fellow – Security, Master Inventor, Member Academy of TechnologyProblem Solver, Tinkerer, and STEAM Advocate1 of 8–12% females are in cybersecurityThe first IOT devices had many security flaws.
Alana, 8 year oldDesign Thinking – worked with Alana, 8 year old, to develop a device to help her know when her blood sugar is changing. Alana’s parents wanted a way to know the status of Alana’s blood sugar remotely. Threat model was reviewed –• What are we building?
• System to get information from an insulin pump• What can go wrong?
• Unauthorized person could get the information • Pump could be tricked to send the wrong amount of insulin
• What are we going to do about it?• Secure it• Encrypt it
• Did we do a good enough job? • Pump uses secret key• Protected with encryption• Risk versus reward
Remember. . . .These are our future dreamers and innovators
Now is the time to start to teach them “Thinking like the BAD ACTORS”
Security of IoT devices will be aboutRISK verses REWARD
The “Good Actors” have to be right all of the time – but the BAD ACTORS only have to be right once!
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Student Panel
December 4, 2018
Student panel –Caleb Scott, FloatMeKyla Guru, Bits N’Bytes Cybersecurity EducationLandon Valdez, Design and Technology AcademyFinn Burmeister-Morton, La Vernia High School
How can we encourage students in the Cybersecurity realm? • Diversify instruction• Manage the accessibility – make it manageable• Break down the barriers• Start early• Share information about conferences and competitions• Be a mentor to today’s students• Promote questioning
Posted byCybersecurity
Jennifer Miller, Director, Cybersecurity, Acquisitions, and Performance Excellence
Integrating Quality Cybersecurity Curriculum and Labs Mapped to the NICE Framework into Existing Academic Programs
December 4, 2018
NICERC has partnered with Palo Alto Networks to create multiple cybersecurity courses.
Trying to get students excited aba out Cybersecurity initiatives. They need fundamental networking first. They are using Moodle for their LMS.They are turn key solution.
Trying to get the technology in the hands of students. Hands on labs are included in the lessons. Don’t have to build anything on our network. It spins up a lab based cloud environment hosted by Palo AltoFocused on defense of critical infrastructure.
Cybersecurity Survival Guide aligns with the curriculum guides provide.
Include multiple pathways for students. Their output is a cyberliterate workforce.
All content is free from a federal grant from the Department of Homeland Security. NICERC brings everything to sustain the workshop. Workshops can be from 1 day to a week. Good idea is a 2 day workshop. In-person, online, synchronous, asynchronous, and self paced training is available.
Quality Cybersecurity
Curriculum
Posted byCybersecurity
NICE Information to Know
December 4, 2018
Posted byCybersecurity
NICE Information to Know
December 4, 2018
Posted byPerformance Excellence
Jennifer Miller, Director of Performance Excellence and Cybersecurity Services
Service Request Creation and Completion Comparison
December 7, 2018
Yearly Comparison
Year to Date –Created:46,618Closed: 45,852
98.4%
• Created• 17-18: 37,481• 18-19: 46,618 (24%)
• Closed• 17-18: 36,782• 18-19: 45,852 (25%)
• % Closed• 17-18: 98.1%• 18-19: 98.4%
Posted byPerformance Excellence
Jennifer Miller, Director of Performance Excellence and Cybersecurity Services
Excellence in Action
December 7, 2018
These team members earned an excellent rating on all surveys received this week. Each technician closed at least 3 service requests this week and earned an excellent rating on all returned surveys. These team members exemplify the Excellence we look forward to providing on all service requests. An asterisk represents an excellent repeat performance. Congratulations for a job well done!!!
Excellence is not a skill. It is an attitude.- Ralph Marston
Campus Technicians• Juan Cantu*• Gene Garrett• Jair Garza*• Holly Kosters• Leilani Natale• Kristofer Nguyen• Anthony Padilla*• Bob Rader*• Rock Valentine• Richard Zelenka*• Sandra Hoppe*• Nici Povinelli
Service Center Technicians• Tara Maxwell• Jose Mendez*• Ron Rogers• Jose Vargas*• Luis Velez
ISC Team Members• Amanda Medau• Luis Velez
Posted byPerformance Excellence
Jennifer Miller, Director of Performance Excellence and Cybersecurity Services
Performance Excellence Weekly Reflection
December 7, 2018
This week our Cybersecurity team attended and learned much at the National Institute for Cybersecurity Education (NICE) conference. It was also announced that Paula Ross would be our new CTO. Paula will continue the line of great leaders that have been selected for our department. With Paula at the helm, I know excellence will continue. I am incredibly thrilled and ready to support her leadership
- Jennifer Miller