Loading…

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, August 13
 

7:00am EDT

Registration & Breakfast
Tuesday August 13, 2019 7:00am - 8:00am EDT
Dewberry Hall

8:00am EDT

Welcome Address and Conference Kickoff
Welcome! Dr. David Raymond, the Virginia Cyber Range's Director, will introduce Dr. S. David Wu, GMU's Provost and Executive Vice President, who will welcome all attendees to the campus of George Mason University. Dr. Raymond will provide an overview of the conference and let attendees know what to expect in the next 2 days.

Speakers
avatar for David Raymond

David Raymond

Director, Virginia Cyber Range, Virginia Tech
Dr. David Raymond serves as Director of the Virginia Cyber Range and Deputy Director of Virginia Tech’s IT Security Office and Lab. He also teaches courses on networking and cybersecurity in the Virginia Tech Masters of Information Technology program and serves as faculty advisor... Read More →
avatar for S. David Wu

S. David Wu

Provost and Executive Vice President, George Mason University
S. David Wu is Provost and Executive Vice President of George Mason University, the largest public research university in Virginia and a Carnegie research-one (R1) institution. Since his appointment in 2014, Provost Wu has created an academic vision for Access to Excellence – building... Read More →
avatar for Kenneth Ball

Kenneth Ball

Volgenau School Dean, George Mason University
Kenneth Ball was appointed Dean of the Volgenau School of Engineering in August 2012. He previously served as the L.S. Randolph Professor and Head of the Department of Mechanical Engineering at Virginia Tech from 2004-12, overseeing rapid growth in the department with research expenditures... Read More →


Tuesday August 13, 2019 8:00am - 8:30am EDT
Dewberry Hall

8:30am EDT

Building an exploitable WiFi environment for your classroom
With the widespread of WiFi nowadays, it is important to show students how WiFi exploitation happens in practice. The theory behind exploiting WEP and WPA2 has been available for a number of years. However, it has not been easy to offer students the opportunity to apply these theories in a real environment. In this workshop, you will learn about WiFi access points which can be configured for exploitation. We will discuss scenarios where WEP access points have connected clients and no connected clients as well as WPA2. You will learn how Raspberry Pis can be used to act as the necessary clients for those access points. In addition, you will have access to the Raspberry Pi scripts and all access point configuration directions.

Speakers
avatar for Ahmed Ibrahim

Ahmed Ibrahim

University of Virginia
Ahmed Ibrahim is an Assistant Professor in the Department of Computer Science at the University of Virginia. He holds a PhD from the University of Kentucky and two M.Sc. Degrees. Ahmed also has a Certificate in College Teaching and Learning and is actively participating in teaching... Read More →


Tuesday August 13, 2019 8:30am - 11:20am EDT
Room C

8:30am EDT

Hands on Penetration Testing Workshop with Kali Linux, Metasploit and Windows
As with most things in the Security realm, before you can defend against attacks, you need to understand how the attackers work before you can defend and mitigate against them.

This invaluable hands on (BYO Laptop) workshop will showcase some new Cyber Range college/intermediate level penetration testing labs that the Cyber Range is in the process of publishing for instructor general availability. Come experience some of this powerful hands on content as you use your Range Kali attack VM and vulnerable target Windows VM to grok how these attacks actually function. After learning how to utilize these tools to pentest our own systems, we find ourselves in a better place to discuss the measures one would need to take to prevent or mitigate against such attacks and in the process, increase our own network security profile

Workshop Labs and Handouts Include:
- Lab 1 - Launching & Defending Against a Windows DoS Attack
- Lab 2 - Password Credential Keylogging
- Lab 3 - Trojan Malware - popping a reverse shell on a target


Speakers
avatar for Thomas 'Tweeks' Weeks

Thomas 'Tweeks' Weeks

Consulting Cloud Engineer, VA Cyber Range
Tweeks (or Thomas Weeks) is the Director of Future Technology at Virginia Tech, Division of IT, and also sits as a Consulting Engineer at the Virginia Cyber Range where he creates cloud VM images for the Range, writes/edits Range labs, and works with Range authors to get their lab... Read More →


Tuesday August 13, 2019 8:30am - 11:20am EDT
Dewberry Hall

8:30am EDT

Scanning for Vulns and Throwing Sploits -- Without Leaving Your Desktop
Understanding the difference between vulnerabilities and exploits is an important part of a cybersecurity student’s education. One of the best ways to gain this understanding is by actually exploiting vulnerabilities on target systems. In this workshop, attendees will learn how to use freely available security tools to teach basic exploitation concepts. The workshop will begin with a discussion of VirtualBox with an emphasis on those configurations necessary for safely launching exploits in a virtual environment. After a review of VirtualBox, attendees will explore Metasploitable, an intentionally vulnerable operating system designed for testing security tools and demonstrating common vulnerabilities. After Metasploitable, workshop users will review Kali Linux and its embedded vulnerability and exploitations tools, including nmap, but especially Metasploit, the leading software platform for developing, testing, and executing exploits. The workshop will close by teaching attendees how to launch exploits against target Windows and Linux Metasploitable systems.

After the workshop, electronic copies of all the presentation and lab materials will be provided to attendees so that they can be used in their own courses.

Speakers
avatar for Marija Banovic

Marija Banovic

Student, The George Washington University
Marija Banovic was born and raised in the Balkan region. After completing high school she moved to the United States to pursue a better future. She graduated from Montgomery College with an AAS in Cybersecurity and, upon graduation, received the Montgomery College Award for Excellence... Read More →
avatar for David Vargas

David Vargas

Lecturer, The George Washington University
David Vargas is President of VATG, Inc. and adjunct professor of cybersecurity at The George Washington University. He has worked extensively in cybersecurity in both the public and private sectors and often shares his expertise at security conferences and professional meetings nationwide... Read More →


Tuesday August 13, 2019 8:30am - 11:20am EDT
Bistro

10:15am EDT

Morning Break
Tuesday August 13, 2019 10:15am - 10:30am EDT
Johnson Center

11:30am EDT

Day 1 Keynote Address
Speakers
avatar for Alan Paller

Alan Paller

Founder & Director of Research, SANS Institute
Alan Paller founded SANS, a professional cybersecurity training school that trains more than 41,000 cybersecurity technologists each year. He is also president of SANS Technology Institute, the nation's first regionally accredited specialized cybersecurity college and graduate sc... Read More →


Tuesday August 13, 2019 11:30am - 12:00pm EDT
Dewberry Hall

12:00pm EDT

Lunch
Tuesday August 13, 2019 12:00pm - 12:50pm EDT
Dewberry Hall

1:00pm EDT

Dare to OpenSSL?
Incorporating security mechanisms at the foundation of contemporary software systems has become mandatory for many applications. Universities must empower graduating software engineers with the necessary system / network security education and programming skills that various software developing houses expect. In this presentation, I discuss the design and implementation of a set of pedagogical programming projects that supplement an undergraduate semester-long introductory course on information security, which I helped design at my institution. These projects introduce the students to the use of security software libraries in order to implement a diverse array of security mechanisms such as encryption, key exchange, and message authentication / integrity checking. These projects gradually increase in complexity as the semester progresses, and provide an opportunity for follow-up capstone projects suitable for honor classes and/or independent studies.

The projects have the following learning objectives:

i.apply symmetric-key cryptography to protect the confidentiality of arbitrary data,

ii.use public-key cryptography for the exchange of session keys,

iii.validate the integrity of messages and authenticate their senders,

iv.launch a simple attack to exploit a vulnerable protocol, and

v.master the use of big integer arithmetic to implement various cryptographic protocols.

Speakers
avatar for Mohamed Aboutabl

Mohamed Aboutabl

Associate Professor, James Madison University
Mohamed received his B.Sc. (1987) and M.Sc. (1992) in Computer Engineering and Automatic Control from Alexandria University, Egypt. He received a second M.Sc. (1995) and PhD. (1999) in Computer Science from University of Maryland at College Park, USA. He worked with Honeywell's Electronics... Read More →


Tuesday August 13, 2019 1:00pm - 1:50pm EDT
Room C

1:00pm EDT

Can AP CS Principles students learn modern Cryptography? Yes!
The C5 Colleges Applied Cryptography module was implemented into AP Computer Science Principles classes from around the nation this spring, and Mark's students had the opportunity to be part of this study. In this presentation, Mark will describe the highlights and challenges of teaching 16-year-olds a variety of rigorous crypto topics such as symmetric/asymmetric cryptography, hash functions, and digital certificates. Teachers will leave this session with multiple lessons to teach applied cryptography and other cybersecurity topics.

Speakers
avatar for Mark Emry

Mark Emry

Teacher, McNeil High School
Mark has 27 years of teaching experience, ranging from MS Language Arts and HS Computer Science in Sioux Falls, SD, to his new gig at McNeil High School in Round Rock, TX. Among the courses Mark has taught are: Exploring Computer Science, Cybersecurity, AP Computer Science A, AP Computer... Read More →


Tuesday August 13, 2019 1:00pm - 1:50pm EDT
Room E

1:00pm EDT

Preach Before You Teach - How to have an Impactful Kick-off to Your Cybersecurity Classes in 2019
The objective of my presentation is to explain, to teachers, how they can have an impactful kick-off to their Introduction to Cybersecurity classes in 2019 from the very first day!

This impactful kick-off is accomplished by convincing the students that cybersecurity is a topic very relevant and important to them especially as high school teenagers.

The focal point of this PowerPoint based presentation is my presenting of uniquely, organized information -- in a lesson plan format - that will enable teachers to lead their students to the desired conclusion of this introductory lesson: Yes! Cybersecurity is important and relevant to me and I need to implement their best practices.!

Basically, the teacher is going to show them- the students, upfront, that have an invested need to learn about cybersecurity. Then, you are going to teach them the vulnerabilities of using their resources and the best cybersecurity practices to implement.


Speakers
avatar for Kenneth Johnson

Kenneth Johnson

Teacher, Loudoun County Public Schools
Education:B.S. in Business, La Salle UniversityM. ED. in Technology in Education, George Mason UniversityExperience:Member of collaborative groups involved in writing the syllabus for the Virginia "Introduction to Cybersecurity" and the "Advanced Cybersecurity in Marketing" coursesPrior... Read More →


Tuesday August 13, 2019 1:00pm - 1:50pm EDT
Room A

1:00pm EDT

Get a job - what do graduates need to know and do to get hired?
Educating and graduating students that meet the needs of employers is hard. In the cybersecurity field, this challenge is compounded by the emerging and dynamic nature of the field, different needs in different industry segments, and the breadth and depth of skills relevant to cybersecurity. This panel brings together practicing cybersecurity experts from industry and government to discuss specific knowledge and skills they are looking for in graduates today, and how they see these needs changing over time. How important are hard skills like programming and penetration testing? How do CTFs translate to job skills? Do students need hardware and operating systems courses? If so, why? What soft skills are most important? What's missing and how might students and educators fill these gaps in the short and long term? Curriculum designers, faculty, and students will benefit from hearing the needs, opinions, and forecasts of this diverse panel.

Speakers
avatar for Jim Jones

Jim Jones

Associate Professor, George Mason University
Jim Jones is an Associate Professor of Digital Forensics and Cyber Analysis, Department of Electrical and Computer Engineering, at George Mason University. Jim earned his B.S. degree from Georgia Tech (Industrial and Systems Engineering, 1989), M.S. degree from Clemson University... Read More →
WT

William Tippie

Senior Consultant, Incident Response, Mandiant
Started in 2013 with Mandiant as an intern in Software Engineering; moved to Incident Response in 20152014 Graduate of GMU, BS in Computer Science. Prior to that, BS in Nutrition, Foods, and Exercise from Virginia Tech, 2009.
avatar for Christian Adounvo

Christian Adounvo

Information Security Lead - Red Team, Symantec
Christian Adounvo leads Symantec’s Offensive Security Red Team. In this capacity, he develops and oversees engagements to strengthen Symantec’s security posture by emulating real-world adversary tactics. Prior to joining Symantec, he’s worked on Red Teams at Capital One and... Read More →
avatar for Andrew Valliere

Andrew Valliere

Security Researcher, Digital Operatives


Tuesday August 13, 2019 1:00pm - 1:50pm EDT
Cinema

2:00pm EDT

Afternoon Break
Tuesday August 13, 2019 2:00pm - 2:20pm EDT
Johnson Center

2:30pm EDT

A Beginners Guide to Kali and its tools
As a K12 educator in cybersecurity, I am experienced with how difficult it is to get started in teaching the topic. Years of tinkering, testing, and research has given me the ability to explain what works and what the industry uses. The purpose of being an educator is to prepare students for a career. This workshop is a primer on the Kali OS and its tools. I see this as a necessity in the cybersecurity field, as this is the OS that most security teams will use. Time permitting this workshop will cover the basics of Linux commands, Wget, TheHarvester, Social engineering toolkit (SET), Ncat, Nmap, Metasploit, and Wireshark. The workshop will place you in the shoes of a hacker creating a fast credential harvesting website, creating a IRC chat room, and exploiting vulnerabilities in Metasploitable 3. The workshop will require Virginia Cyber Range access to complete the hands-on labs. Educators will be provided with a PowerPoint, resource list, video tutorial, and the project files VIA download. It requires no prior knowledge, but some understanding of network protocols will be beneficial.

Speakers
avatar for Eric Kiser

Eric Kiser

Technology Teacher, Nelson County High School
I am a high school computer technology teacher and have been for 7 years.  I have been educating students in Cybersecurity for five years. I am writing a course for the VACR Called, Advanced Ethical Hacking: Authorized to do Unauthorized Things. I have a long history with computers... Read More →


Tuesday August 13, 2019 2:30pm - 4:20pm EDT
Room C

2:30pm EDT

Hands-on Hacking: CTF Workshop
If done well, a capture-the-flag (CTF) competition is an educational experience disguised as a competition. It’s hard not to get excited after teaching yourself a new skill, finding a flag, then being rewarded with CTF points. Bring your laptop! In this workshop, we will introduce different types of CTF competitions and describe how we have used them with students and IT professionals to drive interest and enhance learning in cybersecurity topics. You will also learn how to approach different types of CTF challenges and the tools you can use to solve them. You might even get some hints related to the conference CTF!

Speakers
avatar for David Raymond

David Raymond

Director, Virginia Cyber Range, Virginia Tech
Dr. David Raymond serves as Director of the Virginia Cyber Range and Deputy Director of Virginia Tech’s IT Security Office and Lab. He also teaches courses on networking and cybersecurity in the Virginia Tech Masters of Information Technology program and serves as faculty advisor... Read More →


Tuesday August 13, 2019 2:30pm - 4:20pm EDT
Dewberry Hall

2:30pm EDT

NICERC's Cybersecurity Fundamentals (lab content for the high school classroom)
Explore a deep-dive tour of NICERC's Cybersecurity Fundamentals course. See how traditional classroom instruction blends with hands-on activities to get students interested in and talking about careers and degrees in cybersecurity. Developed in partnership with Grambling State University (LA) and making use of the Virginia Cyber Range, Cybersecurity Fundamentals takes students on a journey that investigates Ethical Hacking, Penetration Testing, Social Engineering, and Vulnerability Assessment.
As a result of this session, you will learn how to use the cyber range and will learn cybersecurity concepts that should be taught in a cybersecurity class. Participants will discuss what the expectations are for students looking to pursue cybersecurity in college and you will learn how to register for FREE access to ALL of NICERC's content including more than 15 titles for use in your classroom, school, or district.

Participants should bring a laptop or mobile device capable of running an internet browser and connecting to the Virginia Cyber Range. Additionally, participants should register for access to all of NICERC's content at https://nicerc.org/curricula/curriculaaccess/

The presentation from this session is available here: https://docs.google.com/presentation/d/1aqX880Nv3eJbWDXchYfERxfDY8KBaFPaaMy_x734fA4/edit#slide=id.p6

Speakers
avatar for Chuck Gardner

Chuck Gardner

Director of Curriculum, Cyber Innovation Center
As the Director of Curriculum for NICERC, Chuck oversees the development and distribution of STEM, cyber, and computer science content as part of a grant through the Department of Homeland Security's Cyber Education Training and Assistance Program (CETAP). NICERC's team of subject... Read More →


Tuesday August 13, 2019 2:30pm - 4:20pm EDT
Bistro

4:30pm EDT

 
Wednesday, August 14
 

7:00am EDT

Breakfast and Late Registration
Wednesday August 14, 2019 7:00am - 8:00am EDT
Dewberry Hall

8:00am EDT

Announcements and Day 2 Keynote Address
Speakers
avatar for Anne Holton

Anne Holton

President, George Mason University
Anne Holton will serve as interim President of George Mason University beginning August 1, 2019. Holton is a visiting professor at the Schar School of Policy and Government and at the College of Education and Human Development, and a visiting Fellow at the Center for Education Policy... Read More →
avatar for Karen Jackson

Karen Jackson

Executive Director, New College Institute
Former senior government executive with distinguished career leading programs and teams in autonomous systems, cyber security, smart community development, telecommunications, and IT.


Wednesday August 14, 2019 8:00am - 8:45am EDT
Dewberry Hall

9:00am EDT

Tux required. Teaching Linux in the Virginia Cyber Range
Learning Linux shouldn't have to include many hours of learning how to troubleshoot virtualization technologies.  At Virginia Western Community College, we lean on the Virginia Cyber Range to provide day one access to a functional Linux environment.  The time we used to spend troubleshooting and supporting every student's independent installation environment is now spent broadening the subject matter we cover in class, including additional security related assignments.   This session will discuss the material covered, lessons learned about teaching Linux in the Range, and solicit ideas for what else we should be thinking about and covering in future classes.

Speakers
avatar for B Bagby

B Bagby

Asst. Professor of Information Technology, Virginia Western Community College
B Bagby is a recovering IT manager.  After nearly fifteen years of supporting faculty, B moved to Assistant Professor of Information Technology at Virginia Western Community College, where he focuses primarily on programming and security.  B has a BS in Business Administration... Read More →


Wednesday August 14, 2019 9:00am - 9:50am EDT
Room C

9:00am EDT

The K-12 Cyber Wave: A Curriculum Framework for High School Students
Educators in the US are just now seeing the beginning of the K-12 Cyber Education wave, and Virginia is leading the way forward. This presentation describes a curriculum framework for a high school Introductory to Cybersecurity course designed to meet dual credit for colleges and universities. The framework for this rigorous course describes what is to be taught, and these Big Ideas, Essential Questions & Enduring Understandings are just the start. Attendees will receive a copy of the framework.

Speakers
avatar for Mark Emry

Mark Emry

Teacher, McNeil High School
Mark has 27 years of teaching experience, ranging from MS Language Arts and HS Computer Science in Sioux Falls, SD, to his new gig at McNeil High School in Round Rock, TX. Among the courses Mark has taught are: Exploring Computer Science, Cybersecurity, AP Computer Science A, AP Computer... Read More →


Wednesday August 14, 2019 9:00am - 9:50am EDT
Room E

9:00am EDT

Engaging Students with Capture-the-Flag Activities in Class
CTF (Capture the Flag) is a gamified hands-on cybersecurity activity tracing its roots to the 1996 edition of the largest cybersecurity conference in the USA (DEFCON). We propose a 45-minute presentation to explain how we were able to successfully use CTFs during class time in an introductory course for computer science majors .  We have incorporated Jeopardy-style CTFs and lessons from the Virginia Cyber Range materials to engage students in learning basic cybersecurity concepts in the context of an introductory Problem Solving course. The presentation will cover how we applied different strategies to engage students with CTF activities. For example, we divided students into small groups and encouraged them to collaborate on CTF challenges that required them to solve puzzles by applying the knowledge acquired in the classroom. Specifically, in one of the CTFs the students applied their cryptography skills to decode hidden messages and acquire the flag. We will also discuss the results of our experience and key takeaways applicable to a wide range of teaching institution types. For instance, we observed that students reacted positively to the CTF challenges and some liked them to the point were they solved them just for fun. Finally, we will conclude the presentation by covering the key opportunities and challenges that would be relevant to those that are interested in adopting CTFs into their teaching practice.


Speakers
avatar for Andrey Esakia

Andrey Esakia

Collegiate Assistant Professor, Virginia Tech
Education: Virginia Tech, Computer Science, PhD, 2018Appointments: Virginia Tech Collegiate Assistant Professor, 2018 - presentResearch interests: Computer Science Education, Mobile computingComputer Science Education Publications:Esakia, A., Niu, S., & McCrickard, D. S. (2015, February... Read More →
avatar for Margaret Ellis

Margaret Ellis

Assistant Professor of Practice, Virginia Tech
Margaret Ellis, M.S. is an Assistant Professor of the Practice of Computer Science in the College of Engineering at Virginia Tech. Margaret Ellis has a broad range of teaching and professional computing experience. She develops and implements curricula for key courses such as problem... Read More →


Wednesday August 14, 2019 9:00am - 9:50am EDT
Room A

9:00am EDT

Cybersecurity Workforce Training: The Next Frontier
If a company has employees, it has the potential for loss of data. Protecting data is an enterprise-wide issue and it starts with proper workforce training and putting cyber strategies in place that are both defensive and long-range offensive. Panelists will discuss the key elements of a workforce tool kit including legal issues that need to be incorporated into proper workforce training models.

Attendees will leave this session with the basis of job-related skills in the cybersecurity and data privacy industry, including:
  1.  Understanding of cybersecurity as an enterprise-wide issue, not just an IT issue - employees and vendors serve as two of the easiest access points for hackers; and
  2.  Ability to assess initial vulnerabilities and how to best train employees on both technical and legal issues.



Speakers
avatar for Kameron Melton

Kameron Melton

Associate, Woods Rogers PLC
avatar for Robert Natt

Robert Natt

Partner/Bus Develop Dir, IMPACT Lab, Radford University


Wednesday August 14, 2019 9:00am - 9:50am EDT
Cinema

9:50am EDT

Morning Break
Wednesday August 14, 2019 9:50am - 10:10am EDT
Johnson Center

10:15am EDT

Cyber Range Demo
Virginia Cyber Range support will be available to guide you with course set up and get you ready to teach cybersecurity to your students!

Speakers
avatar for Lee Doughty

Lee Doughty

Senior Cloud Systems Engineer, Virginia Cyber Range
Lee is one of the many jack-of-all-trades at the Virginia Cyber Range; he is primarily responsible for ensuring the exercise area remains up-and-running! He enjoys working with the “whole picture” of IT: from operating systems, to infrastructure, to applications, and code. Lee... Read More →
avatar for Anupama Josyula

Anupama Josyula

Front-End Web Developer, Virginia Cyber Range
I am a Front-end Web developer at the Virginia Cyber Range. My interest is in the domain of Information Technology (IT). I help with the UI and the backend APIs of the Range's exercise portal. I received my Masters in IT from Carnegie Mellon University before joining the Range.
avatar for Gregory Niebanck

Gregory Niebanck

Full Stack Developer, Virginia Cyber Range
Greg is a language-agnostic, full-stack developer with degrees from Virginia Tech and Oregon State. He combines his strengths in relationship building and strategic thinking to create robust software while cultivating team-oriented office culture.
avatar for Julez Slomin

Julez Slomin

Junior SysOps Engineer, Virginia Cyber Range
A ball of energy and oddity, Julez brings her diverse background to the Range as a member of the Ops team. You can catch her hooping or doing partner acrobatics when she's not behind the screen.


Wednesday August 14, 2019 10:15am - 11:05am EDT
Bistro

10:15am EDT

Gamification and Andragogy - A Match Made for Cyber Education
In this talk I discuss the series of trials and tribulations faced when developing a programming competition aimed at energizing a large (approximately 700 individuals) existing employee population within our organization and trying to stoke their excitement about learning how to script and program.

To fully realize this potential within our organization, we used a combination of gamification techniques while remaining cognizant of andragogy or the adult learning model and a unique scoring architecture to engage a broad range of skillsets. In recognizing that a majority of our members are adult learners, we can focus our efforts on engaging adult learners who may exhibit several different combinations of the eight characteristics of adult learners.

Finally, our architecture brings something new to the programming competition arena: we essentially conduct remote code execution with the user submitted code. To do this, we use a combination of front end and back end systems that make use of Dockers to isolate the code. This architecture allows us to develop practical programming problems focused on cyber defense. For instance, we can give the competitor a list of indicators and have them write a script to check the machine for compromise. In addition to this we also provide a wide range of problems aimed at teaching a reinforcing basic scripting/programming concepts to ensure a broad range of appeal across our organization.

Speakers
avatar for Joshua Rykowski

Joshua Rykowski

Cyberspace Operations Officer, United States Army Cyber Protection Brigade
osh Rykowski currently serves as a Cyberspace operations officer for the US Army where he has lead a Cyber Protection Team and worked to develop specialized training for those same teams. On his convoluted path to cybersecurity he obtained a Bachelors of Science in Electrical Engineering... Read More →


Wednesday August 14, 2019 10:15am - 11:05am EDT
Room C

10:15am EDT

NICERC's Introduction to Cyber Engineering (for the high school classroom)
Come see how cybersecurity concepts can be incorporated into a STEM or cyber engineering classroom! NICERC's Cyber Literacy course introduces students to our definition of cyber, including all manner of electronic devices that interact with networks, from robots and laptops, to cell phones and IoT. Additionally, the course helps students understand how we all interact with those devices, and by extension, the computers and humans those devices eventually connect to. The course discusses the ethical implications posed by the use of and eventual ubiquity of those devices as we expect more and more capability from the networks and devices we connect with.

As a result of this session, you will understand the basic concepts being taught in the course and how the humanities and liberal arts concepts relate to the labs being performed in the classroom. Even if teachers do not use or teach the robotics content in the classroom, Cyber Literacy has content that can be incorporated into just about any classroom. Additionally, participants will learn how to register for FREE access to ALL of NICERC's content including more than 15 titles for use in your classroom, school, or district.

Speakers
avatar for Chuck Gardner

Chuck Gardner

Director of Curriculum, Cyber Innovation Center
As the Director of Curriculum for NICERC, Chuck oversees the development and distribution of STEM, cyber, and computer science content as part of a grant through the Department of Homeland Security's Cyber Education Training and Assistance Program (CETAP). NICERC's team of subject... Read More →


Wednesday August 14, 2019 10:15am - 11:05am EDT
Room E

10:15am EDT

Hack the Classroom with CTFs: Hands-on, Gamified Cybersecurity Education
It's no secret there's a cybersecurity workforce shortage right now. According to Cybersecurity Ventures, there will be over 3.5 million job openings in the market by 2021. Moreover, it is a struggle to keep curriculum and classes up-to-date with such a fast-growing and evolving industry. As a result, we need to continue to find new ways to take difficult cybersecurity topics and make them more accessible to students as well as train them in the hacker mindset.

In this talk, Jake will explore how Cyber Capture the Flag (CTF) competitions can function as a key part of cybersecurity education and examine what makes a successful learning-based CTF. Using MetaCTF as a case study, we'll walk through how four Virginia students went from competing in CTFs to creating their own cybersecurity training company. Finally, we will end with some concrete ways to improve security education in the classroom to better train our future workforce.

Speakers
avatar for Jake Smith

Jake Smith

Co-Founder, MetaCTF
Jake Smith is currently a rising fourth-year at UVA studying Computer Science and Cybersecurity as well as the Co-Founder of MetaCTF which makes cybersecurity more accessible for students and professionals through hands-on trainings and competitions. As a high school student, he discovered... Read More →


Wednesday August 14, 2019 10:15am - 11:05am EDT
Room A

10:15am EDT

So You Want To Work In Cybersecurity? Let's Get Started!
Attendees will learn some tips and tricks on how to prepare to enter the cybersecurity workforce.  You will learn about one of the local non-profit meetups in the Northern VA area - the Northern Virginia (NOVA) chapter of (ISC)2 - that provides both networking sessions with recruiters, CISOs and hiring managers in the audience plus hands-on workshops to help our members sharpen their cybersecurity skills.  (ISC)2 is the global non-profit certification body that administers exams and training for cybersecurity certifications such as the CISSP.  Your speaker Dan Waddell is the President of the NOVA (ISC)2 chapter and also Senior Vice President at Zeneth Technology Partners.  In his role, he builds cybersecurity teams for federal and commercial clients across VA, DC and MD.  He will also give advice on how to build your resume and prepare for interviews for cybersecurity positions.  

Speakers
avatar for Dan Waddell

Dan Waddell

SVP, Zeneth
I have over 25 years of experience in information technology and cybersecurity, with over 20 of those years in management.  Today, as an experienced director having built several successful cybersecurity business units by winning and managing multi-million dollar budgets and contracts... Read More →


Wednesday August 14, 2019 10:15am - 11:05am EDT
Room F

11:15am EDT

How to Start a Security Club and Win NCCDC in 3 months - UVA's Story
Winning the National Collegiate Cyber Defense Competition is not an easy task; it requires a strong and dedicated team. What does this mean and how can a group of students get there? How do you keep students engaged and motivated to continue learning?

We will walk through some of the things that worked and did not work for the Computer and Network Security club at UVA, discuss how strong teamwork, active industry connections, hands-on practices, and student-driven initiatives helped to shape a strong cybersecurity team that was ready for such challenge, and end with some practical ideas that other student groups can implement back home.

Speakers
avatar for Roman Bohuk

Roman Bohuk

Co-founder/Student, MetaCTF
Roman Bohuk has just finished his second year as a CS student and a Rodman Scholar at the University of Virginia. He is a co-founder of MetaCTF, a cybersecurity education and training company that has been running competitions for universities, companies, and security conferences... Read More →


Wednesday August 14, 2019 11:15am - 12:05pm EDT
Room C

11:15am EDT

Stimulating a National Cybersecurity Education Dialog
This presentation summarizes and updates progress from the Cyber Center for Education and Innovation, Home of the National Cryptologic Museum.  Their unique national value proposition brings together cybersecurity education and invites collaboration. Their mission is to broaden cyber threat awareness, understanding of cybersecurity best practices and educational outreach, and to enhance operational cybersecurity workforce development in support of our nation's critical infrastructure sectors. CCEI is creating a cybersecurity center of gravity integrating industry, government and academic stakeholder resources; and advancing cybersecurity education. Planned educational outreach programs will leverage and share the unsurpassed resources, curriculum and know-how of the NSA in an unclassified, publicly-accessible setting addressing both the K-12 and 13-20 age cohorts.  Their cornerstones are the Digital Curriculum Library of assured quality cybersecurity curriculum and sharing experiences through virtual technologies.  This talk will also explore the need for "virtual playgrounds" affording K-12 and beyond the opportunity to explore, experiment and hone their cybersecurity skills without the fear or harm of the live INTERNet.  Many Cyber Ranges are popping up that may be useful in investigating this key educational need.

Speakers
avatar for Mark Loepker

Mark Loepker

Senior Advisor and Education Lead, Cyber Center for Education and Innovation
Mark S. Loepker is a master practitioner in Information Assurance and International Partnerships with over 39 years of government experience.  He excels at orchestrating dissimilar groups aimed at fostering consensus to solve the toughest cybersecurity challenges.  He held many... Read More →
LV

Luis Valdes

Assistant Director of Technology and Cybersecurity, University of South Florida


Wednesday August 14, 2019 11:15am - 12:05pm EDT
Room E

11:15am EDT

Cybersecurity Curricular Guidance for Associate Degree Programs & Other Efforts
The  Association of Computing Machinery (ACM0 Committee for Computing Education in Community Colleges (CCECC) as formed a task force to create a cybersecurity curriculum guide for associate programs, based on CSEC2017 the first four-year Cybersecurity curricular guide. The first draft, StrawDog was released at the SIGCSE and public commenting occurred till April. The task force released the second draft, IronDog, for review and public commenting at the 3CS conference in July and presented the guide internationally at ITiCSE in July. This proposed presentation will

· review the current work toward associate cybersecurity curricular guidance to be known as CSEC2Y,

· review some of the Cybersecurity initiatives happening with ABET accreditation within computing programs (CSAB) for cybersecurity.

· offer resources for infusing Cybersecurity in IT, Computer Science, and Engineering programs

Speakers
avatar for Henry Coffman

Henry Coffman

Professor in Information Technology, Lord Fairfax Community College
Professor of Information Technology for 14 years and Program Manager for CAE2Y Cybersecurity Academic curriculum at LFCC. Henry also has 8 years experience at Interpol and 16 years experience with the U.S. Bureau of Naval Personnel Technology Service Organizations. Henry was also... Read More →
avatar for Melissa Stange

Melissa Stange

Professor of Computer Science, Lord Fairfax Community College
Dr. Melissa Stange is an active member of the Association for Computer Machinery (ACM), Computer Science Teachers Association (CSTA), Women in Technology, National Cybersecurity Student Association, Society for Human Resource Management (SHRM), International Dyslexia Association... Read More →


Wednesday August 14, 2019 11:15am - 12:05pm EDT
Room A

11:15am EDT

Innovative Cyber Career Pathways: Internships and Apprenticeships
The most recent workforce study from ISC2 estimates 2.9 million cyber jobs are currently unfilled. It's a large number and it continues to grow. However, these 2.9 million jobs are widely varied - from operations to forensics to architectures to secure code development. They require different skills, talents and capabilities. Likewise, the means by which we address these jobs is widely varied by training, certifications, formal academic programs, technical degrees and non-technical areas of study among others. As we continue to struggle to meet industry's workforce needs, we must become even more innovative in our approaches to prepare students to fill those jobs. Areas getting increased attention include internships and apprenticeships. This panel will offer some perspective on the foundational preparation methods available to students today, why variety and diversity are important, and provide insight into efforts underway to close the workforce gap using internships and apprenticeships.  How do these frameworks address the varied employment needs of industry? How do these frameworks help increase diversity in our future workforce? How do we prepare students with the right qualifications and skills to meet unknown future industry needs? Join this panel to hear how Northrop Grumman collaborates with programs in Virginia and around the U.S. to add value to Virginia's cyber education and workforce ecosystem.

Speakers
avatar for Diane Miller

Diane Miller

Corporate Director, Northrop Grumman
Diane Miller is Corporate Director of Northrop Grumman Global Cyber Education and Workforce Initiatives, leading global efforts in cyber education, outreach, thought leadership and partnerships critical to preparing and creating a diverse global cyber workforce.  Ms. Miller is active... Read More →
avatar for Martha Laughman

Martha Laughman

Workforce Channel Development & Veterans Programs, University of Maryland Baltimore County
Martha specializes in creating pathways to cybersecurity, and holds a Master’s Degree in Industrial Organizational Psychology.  Martha has worked for the Army TAPS program, the US Chamber of Commerce, has served on the Board of Directors for ISSA Colorado Springs, volunteered as... Read More →
avatar for Trung Ngo

Trung Ngo

Apprenticeship Manager, Northern Virginia Community College
 Trung Ngo currently serves as Apprenticeships Manager at Northern Virginia Community College. In this role, she is responsible for leading all college initiatives for apprenticeships, serving as the primary engagement manager with companies involved in apprenticeship programs and... Read More →
avatar for Dawn Noga

Dawn Noga

Organizational Development Representative, Northrop Grumman Corporation
Dawn Noga is an Organizational Development Representative at Northrop Grumman Corporation.  In her current role Dawn works in partnership with company leaders and state, federal, and educational partners to establish cyber apprenticeship programs at Northrop Grumman.  Prior to joining... Read More →


Wednesday August 14, 2019 11:15am - 12:05pm EDT
Cinema

12:05pm EDT

Lunch
Wednesday August 14, 2019 12:05pm - 1:00pm EDT
Dewberry Hall

1:00pm EDT

Designing CTF Using the Cyberrange to Provide Contestants Individual Environments
This presentation will provide attendees, who have access to the cyberrange, with the tools and knowledge to develop hands on token style, capture the flag (CTF) activities.  Specifically, utilizing the cyberrange registration link as part of the CTF (either directly, or requiring a challenge to uncover), contestants can have access to environments customized for the competition.  This presentation will go over setting up the CTF infrastructure (possibly requiring external hosting - the demo will use managed ctfD setup), configuring the cyberrange environments, and deploying/monitoring as part of the competition.

Speakers
avatar for chris kreider

chris kreider

Instructor, Christopher Newport University
I am full time faculty at Christopher Newport University in the PCSE department. I primarily teach class in information systems, and information security. My research areas primarily include social engineering and password security.


Wednesday August 14, 2019 1:00pm - 1:50pm EDT
Room C

1:00pm EDT

Tips for educating students to live and build a safer and more secure Internet of Things Experience
The Internet of Things (IoT) is here, and growing, quickly. We all use IoT devices, including connected phones and devices in school and at home, connected healthcare devices, even connected vehicles.  But is it safe? What do we need to do to protect the students, citizens, devices and systems in the world of IoT? This panel, representing industry, government, research and academia, will discuss how ready we are to deliver Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the Internet of Things and how you can educate your students about living in and building a safer and more secure world leveraging the Internet of Things.

Practical security tips for students and educators will be presented as well as educational tips on TIPPSS for IoT. The discussion will touch upon leveraging existing initial curriculum from the National Cybersecurity Alliance's "Stop Think Connect" program as well as other efforts to allow students to explore private sector technology arenas. The panelists will share information about their book from 17 women authors around the planet entitled Women Securing the Future with TIPPSS for IoT.

Speakers
avatar for Karen Herrington

Karen Herrington

Director, IT Analytics & Visualization, Virginia Tech
Karen Herrington serves as the Director of IT Analytics and Visualization at Virginia Tech. She is an Information Technology professional with over 30 years of experience including identity management, Internet of Things, multifactor authentication, data management and analytics... Read More →
avatar for Edna Conway

Edna Conway

Chief Security Officer, Global Value Chain, Cisco
Edna Conway serves as Cisco’s Chief Security Officer for its Global Value Chain. In this capacity, she develops and oversees the deployment of Cisco’s strategy to assess, monitor, and continuously improve the security and resiliency of its global value chain. Cisco's Value Chain... Read More →
avatar for Florence Hudson

Florence Hudson

Special Advisor, NSF Cybersecurity Center of Excellence at Indiana University
Florence is Founder & CEO of FDHint, LLC, consulting in advanced technology strategy and Diversity and Inclusion with industry, higher ed and government. She is Special Advisor for TrustedCI, the NSF Cybersecurity Center of Excellence at Indiana University, as well as Special Advisor... Read More →


Wednesday August 14, 2019 1:00pm - 1:50pm EDT
Cinema

1:00pm EDT

How to Help Your Students Get Hired: Applying Coursework to Workforce
You've taught your students the skills they need to work in the CyberSecurity field, but what about preparing them for the interview and hiring process? Check out this session led by Peter Mancuso, Technical Recruiter, for the latest hiring trends and other tips and tricks from an insider. In today's day and age, interviewing is not just about what's on your resume, but how you market your skillset and how well you present yourself. 
Peter works closely with hiring managers on a daily basis from enterprise businesses, healthcare entities, federal agencies, and state and local education IT departments. Peter will discuss the differences in industries and their hiring requirements and go into detail on what hiring managers really look for. He will also touch on certifications to pursue in 2019, managing your online presence, and positions that are up and coming or currently in high demand.

Speakers
avatar for Peter Mancuso

Peter Mancuso

Technical Recruiter, ABS Technology
Peter is a Technical Recruiter in our Staffing and Recruiting Department at ABS Technology. He holds a Communications Degree from Longwood University and also has a background in sales. Peter made the move from sales to recruiting because he loves having the opportunity to help others... Read More →


Wednesday August 14, 2019 1:00pm - 1:50pm EDT
Room E

1:00pm EDT

IMPACT: Online, Self-Paced Cybersecurity Workforce Development
The Vinod Chachra IMPACT Lab at Radford University (www.radford.edu/impact) is delivering online, self-paced, competency-based education (CBE) in cybersecurity throughout the Commonwealth of Virginia. The Cybersecurity Certificate program enables working adults to learn online, at their own pace, to master critical cybersecurity workplace competencies that map to industry standards. In this presentation, we will discuss research-based practices from cognitive science, analytics, simulation-based learning and gamification, which are incorporated into the training to ensure it is challenging, highly effective and engaging. We will also discuss challenges, which include keeping students progressing in a self-paced environment and providing hands-on experiences in hard to teach areas such as penetration testing. In this presentation, participants will also learn how the IMPACT team uses a modular and iterative development process to continuously improve the engagement and efficacy of the training with a focus on micro-credentials and learning science alignment.

Speakers
avatar for Robert Natt

Robert Natt

Partner/Bus Develop Dir, IMPACT Lab, Radford University
avatar for Prem Uppuluri

Prem Uppuluri

Professor in Computer Science and Program Director, Cybersecurity @ Radford University, Radford University
Dr. Uppuluri is a Professor in Computer Science and Program Director, Cybersecurity @ Radford University. His research and teaching interests in cybersecurity. He has served as a PI/Co-PI on 7 grants supported by the National Security Agency for developing cybersecurity curriculum... Read More →


Wednesday August 14, 2019 1:00pm - 1:50pm EDT
Room F

2:00pm EDT

Afternoon Break
Wednesday August 14, 2019 2:00pm - 2:20pm EDT
Johnson Center

2:20pm EDT

Dark Web, Dark Arts? Lessons learned from Dark Web Analytics instruction
Comprehensive cybersecurity education requires an understanding of all threats from all areas of the Internet, including Dark Web. To date, only two Virginia universities teach a structured, formal class on the Dark Web, primarily due to concerns of network and student safety, as well as misconceptions about the nature of the space.

This presentation provides an overview of two different teaching approaches to the Dark Web, detailing the project-based learning techniques used as instructional content in each, as well as the main lessons learned. Both classes covered the basics of the Dark Web and what secondary literature has revealed about the content. For the project-based segments of the course, each course employed a different approach. One approach, conduct in the course at James Madison University, utilized organized search and analysis methods employing the Tor Browser. This provided students with a guided ethnographic-style tour of Dark Web content, which emphasized the development of student familiarity with the Tor browser and .onion addresses. The second course, hosted at Virginia Tech, employed commercial analytics software, providing students with a less proximate but more broad-based understanding of available Dark Web content. Both courses emphasized the use of real Dark Web data to analyze cybersecurity threats, broadly defined. 

Speakers
avatar for Eric Jardine

Eric Jardine

Assistant Professor, Virginia Tech
Eric Jardine is an assistant professor of political science at Virginia Tech and a fellow at the Centre for International Governance Innovation (CIGI). His research focuses on the uses and abuses of the Dark Web, the measurement of trends in cybersecurity and problems of risk in information... Read More →
avatar for Kathleen Moore

Kathleen Moore

Assistant Professor, Intelligence Analysis, James Madison University
Dr. Kathleen Moore is a former national security professional with a doctorate in Informations Sciences and Technology from the Pennsylvania State University. Her research areas include cyber intelligence, social media analytics, information warfare, and the social environment of... Read More →


Wednesday August 14, 2019 2:20pm - 3:10pm EDT
Cinema

2:20pm EDT

Cybersecurity Fundamentals - Pacing guide review and an Amazing Lesson for your students!
Are you looking for some usable teaching lessons for Cybersecurity Fundamentals?  If so, this class is for you!  We will go over the pacing guide that we used this past school year and will give you some lessons that are mapped to specific compentencies.  We will also talk about how we used the Virginia Cyber Range and the lessons learned.  This will be a fun, interactive session that you don't want to miss.  Join us!

Speakers
avatar for Jennifer Cramer

Jennifer Cramer

Teacher, Riverside High School
Jennifer Cramer worked in IT domestically and internationally for seventeen years and then switched careers to teaching for VA Loudoun County Public Schools.  She has taught various business and information technology classes for the past eight years and is a former Adjunct Professor... Read More →
avatar for Kristi Rice

Kristi Rice

CTE Instructor, Spotsylvania County Public Schools
I teach Cybersecurity at Spotsylvania High School for Spotsylvania County Public Schools


Wednesday August 14, 2019 2:20pm - 3:10pm EDT
Room A

2:20pm EDT

National Cybersecurity Career Awareness Week Activities
The National Cybersecurity Career Awareness Week (NCCAW) focuses local, regional, and national interest to inspire, educate, and engage citizens to pursue careers in cybersecurity. National Cybersecurity Career Awareness Week takes place during November’s National Career Development Month. Learn about activities you can do to help inspire and promote awareness & exploration of cybersecurity careers.

Speakers
avatar for Davina Pruitt-Mentle

Davina Pruitt-Mentle

Lead for Academic Engagement, NICE @ NIST
Dr. Davina Pruitt-Mentle serves as Lead for Academic Engagement of the National Initiative for Cybersecurity Education (NICE) at the National Institute of Standards and Technology (NIST). Prior to joining NICE, she was a senior researcher and policy analyst for Educational Technology... Read More →


Wednesday August 14, 2019 2:20pm - 3:10pm EDT
Room C

2:20pm EDT

Virginia Public Schools--Ahead of the Cybersecurity Education Curve
This workshop will give up to the minute information on the courses that have been developed and implemented through every Career Cluster for Virginia's public schools and identify currently available credentials that are aligned to the Cybersecurity courses.in which high school students are enrolled.  The Virginia Department of Education has developed a Cybersecurity pathway brochure that shows the course descriptions and sequences suggested for each of the Career Clusters to share as a part of this workshop.    The newly revised Work-Based Learning Guide for Virginia will be discussed as those opportunities relate to Cybersecurity instruction and opportunities.

Speakers
avatar for Judith Sams

Judith Sams

Specialist, Business and Information Technology, Virginia Department of Education
Judith Sams is the Business and Information Technology Program Specialist at the Virginia Department of Education, following a 31-year career as a secondary Business and Information Technology teacher in classrooms in Fairfax County, Buckingham County, and Fuqua School. She is currently... Read More →


Wednesday August 14, 2019 2:20pm - 3:10pm EDT
Room F

3:20pm EDT

Cyber Range Demo
Virginia Cyber Range support will be available to guide you with course set up and get you ready to teach cybersecurity to your students!

Speakers
avatar for Lee Doughty

Lee Doughty

Senior Cloud Systems Engineer, Virginia Cyber Range
Lee is one of the many jack-of-all-trades at the Virginia Cyber Range; he is primarily responsible for ensuring the exercise area remains up-and-running! He enjoys working with the “whole picture” of IT: from operating systems, to infrastructure, to applications, and code. Lee... Read More →
avatar for Anupama Josyula

Anupama Josyula

Front-End Web Developer, Virginia Cyber Range
I am a Front-end Web developer at the Virginia Cyber Range. My interest is in the domain of Information Technology (IT). I help with the UI and the backend APIs of the Range's exercise portal. I received my Masters in IT from Carnegie Mellon University before joining the Range.
avatar for Gregory Niebanck

Gregory Niebanck

Full Stack Developer, Virginia Cyber Range
Greg is a language-agnostic, full-stack developer with degrees from Virginia Tech and Oregon State. He combines his strengths in relationship building and strategic thinking to create robust software while cultivating team-oriented office culture.
avatar for Julez Slomin

Julez Slomin

Junior SysOps Engineer, Virginia Cyber Range
A ball of energy and oddity, Julez brings her diverse background to the Range as a member of the Ops team. You can catch her hooping or doing partner acrobatics when she's not behind the screen.


Wednesday August 14, 2019 3:20pm - 4:10pm EDT
Bistro

3:20pm EDT

CyberPatriot - A Youth Cyber Education Program Virginians Should Get Excited About!
The most recent workforce study from ISC2 shows the skilled cyber workforce employee gap continues to widen in both skilled labor and diversity. Young students show more interest in using technology than seeking careers to innovate and protect technology. Attracting talent early is vital to increasing cyber workforce diversity. The CyberPatriot National Youth Cyber Education Program offers engaging age-appropriate awareness, education and competition for youth K-12. In particular, the national cyber defense competition for middle and high school aged students is highly successful on multiple levels with closing the skilled cyber workforce gap. 1. Students learn hands-on technical and professional skills in a fun environment working in a team with likeminded students. 2. Coaches are provided materials for success and need not have technical expertise to lead a CyberPatriot team. 3. CyberPatriot has demonstrated to be an effective mechanism to encourage collaboration between Industry and academic institutions, as well as cyber community professionals, who come together to help teams succeed. 4. CyberPatriot competitors develop knowledge and skills that help them stay safe in the digital world and are valued by employers. Join this session to get ideas of how CyberPatriot can benefit you, your students and your community and how we can continue to innovatively grow the youth cyber education footprint across the Commonwealth.

Speakers
avatar for Diane Miller

Diane Miller

Corporate Director, Northrop Grumman
Diane Miller is Corporate Director of Northrop Grumman Global Cyber Education and Workforce Initiatives, leading global efforts in cyber education, outreach, thought leadership and partnerships critical to preparing and creating a diverse global cyber workforce.  Ms. Miller is active... Read More →


Wednesday August 14, 2019 3:20pm - 4:10pm EDT
Room E

3:20pm EDT

Who's Down With IoT? Yeah, You Know Me!
This is an introductory, high school level Cybersecurity presentation on IoT. This module focuses on exploration and discovery as well as research. Music is used to connect with the audience and provides an engaging experience transitioning into the lesson activity, focusing on the chorus line or a music parody using cyber terminology. Participants will walk away with lesson plans and resources.

Speakers
avatar for Natalie Walden

Natalie Walden

Cybersecurity Teacher, Potomac Senior High School
I am a graduate of Old Dominion University with a degree in Business Administration. My secondary education credentials  are from the University of Virginia School of Continuing Professional Studies in Business and Information Technology. I've been teaching for 22 years and this... Read More →


Wednesday August 14, 2019 3:20pm - 4:10pm EDT
Room A

3:20pm EDT

Teaching the Unteachable: Developing the keys to a successful Cybersecurity career in students
The so-called "Cybersecurity Skills Gap" is in the news and drives many online debates about the gap and how it should be addressed.  What if the gap was not purely technical skills or facts to be taught?  What if our future cybersecurity professionals were being blocked by artificial barriers?  What are the untaught qualities, abilities, and skills present in successful "hackers" which should be included in any cybersecurity curriculum?  In this presentation learn how to incorporate techniques to encourage the highly desired qualities of Curiosity, Confidence, Creativity, Tenacity, and Empathy in all potential cybersecurity students.

Speakers
avatar for Chris Hillman

Chris Hillman

President, CHIP Solutions
Chris is a lifelong learner who has a passion for passing along knowledge.  He is a digital forensics software developer, reverse engineer, penetration tester, and incident responder.  He is passionate about teaching people to do things they consider impossible.  Chris has trained... Read More →


Wednesday August 14, 2019 3:20pm - 4:10pm EDT
Room F

4:15pm EDT

Closing Remarks and CTF Winners Announced
Speakers
avatar for David Raymond

David Raymond

Director, Virginia Cyber Range, Virginia Tech
Dr. David Raymond serves as Director of the Virginia Cyber Range and Deputy Director of Virginia Tech’s IT Security Office and Lab. He also teaches courses on networking and cybersecurity in the Virginia Tech Masters of Information Technology program and serves as faculty advisor... Read More →


Wednesday August 14, 2019 4:15pm - 4:30pm EDT
Dewberry Hall