With increased use of technology in all aspects of our
lives, the need to protect our computers, networks, and
data increases as well. In the United States alone, there
are 400,000 unfilled jobs in the field of cyber-security.
You’ll learn what training programs exist and how
major corporations are committing to cyber-security
education. We’ll discuss how Rotarians can work to
connect underserved communities with training and job
opportunities both locally and internationally.
2. Moderator’s Opening Remarks
• With more than 209,000 unfilled cybersecurity jobs in the U.S.
and more than 1 million globally, this session will give a
general overview of the current challenges businesses face in
identifying a skilled talent pipeline. We will explore innovative
training models through workforce development programs
and colleges and universities, that are working to close the
skills gaps and prepare a trained workforce for businesses.
• General Intro of panelist and their background
• Genesis of this panel – Rotary should be reaching out in this
area – President of Rotary
3. Global Challenge
• Any given year, approximately 431 million adults globally fall victim to cybercrime, at
a price of $388 billion
• Cybersecurity involves protecting critical information by preventing, detecting, and
responding to attacks. Many of our lives depend on digital technology, which makes
cybersecurity one of our country’s most important national security priorities.
• Securing cyberspace means that we, as a country, must develop a technologically-
skilled workforce, a cyber-savvy public, and an effective pipeline of future
employees.
• For businesses, the skills gap is still the #1 challenge in filling open cybersecurity
jobs.
• While the government is taking steps to keep our cyber community safe, the
government alone cannot solve the problem. Cybersecurity is a shared
responsibility.
• Billions of dollars are being spent on new technologies to help secure the U.S.
cyberspace. It will take a national strategy, similar to the effort of upgrading science
and mathematics education in the 1950’s, to meet this challenge.
4. Discussion Overview
• All Hands on Deck Approach
– Effective Post-Secondary Training
• Colleges & Universities
• Professional Societies - IEEE
• Workforce Development
– Industry’s Innovative Approach to Cybersecurity
• International Challenges
• Rotary’s Connection
– Domestic & International
5. Effective Postsecondary Training – Colleges and
Universities
Foundational:
University curriculum recommendations by professional societies*
Certification/accreditation:
Government review of cybersecurity curricula with 'stamp of
approval’**, offering paths to gov't-funded students, making sure the
workforce that will join these future employers is properly
educated/trained
* ACM/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. ACM Press and IEEE
Computer Society Press
** NSA National Centers of Academic Excellence in Information Assurance (IA)/Cyber Defense (CD)
6. Effective Postsecondary Training – Colleges and
Universities
Cybersecurity training opportunities
Training institutes (e.g. SANS, SEI/CERT, BlackHat)
offering quick on-ramps (short term)
Existing initiatives by professional societies
IEEE Cybersecurity Initiative, http://cybersecurity.ieee.org/
Provide free cybersecurity education/training modules via
collaboration between gov't, academia, and industry (short to long
term)
IEEE initiative has worldwide implications
Standards body, multinational presence
7. Training Validation
Importance of thorough review processes for cybersecurity
education/training programs to be “fresh”
Dialogue with industry for integration into curricula (short term)
Integration of cybersecurity trends into curricula (both short and long
term)
Beyond undergraduate degrees, there are master's and certificate
programs in cybersecurity and digital forensics for existing workforce
training that require stamps of approval (~180 universities and colleges
are accredited NSA Centers of Excellence in Information Assurance
Education and Research)
8. Non-Traditional Pathways Through Industry-Based Credentialing
About Per Scholas
20 year old IT sector-based training model that’s driven by industry-based
employers; training those from underserved communities in six cities: Bronx NY
(headquarters); Columbus and Cincinnati, Ohio, the DC Metro Region (Silver
Spring, MD); Dallas, TX and Atlanta, GA
Cost effective and creative program model: $7,500 per student; Urban
Development Training Centers – revenue sharing model with industry
Disrupting the way businesses source talent through non-traditional talent
pipelines
Impact
Recognized by The White House as “rigorously studied and highly impactful”
in putting the long-term unemployed back to work
Listed on S&I 100 as one of the highest-impact nonprofits in America
Selected to be part of two randomized and controlled studies:
Sectoral Employment Impact Study conducted by Public/Private
Ventures funded by the Charles Mott Foundation
Work Advance Study conducted by MDRC
9. Non-Traditional Pathways Through Industry-Based Credentialing
About Per Scholas
Program Impact
90% certification rate; 85% graduation rate; 80% placement rate –
placement within 4-months post graduation; 75% retention of
employment beyond one year
Average salary at enrollment: $7k, post-graduation: $39k
Boot-camp style, 10-week training, two industry-based credentials;
curriculum designed in partnership with employers; follow-students
for two years post-graduation
Alumni skill building: advanced training and credentialing; 15% wage
gain after first year of employment; professional development and
public speaking opportunities
10. Non-Traditional Pathways Through Industry-Based Credentialing
Industry Based Approach
Working directly with public and private sector to validate industry-based skills
needed and to inform curricula
Two examples: Symantec $375k investment in the DC Region training site offering
cyber training to transitioning vets and their spouses
Barclays $850k investment to launch a new Per Scholas Brooklyn training site,
focusing on cyber training
Established a Regional Cybersecurity Task Force with representation from:
public/private sector, workforce development, policy makers and higher education
Focused on three specific goals:
Defining and quantifying job skills, i.e. defining the specific skills and
experience that constitutes competency
Defining career pathways, e.g. career progression
Creating a replicable toolkit to address the cybersecurity skills and talent gap
in other regions
11. International Challenges
Difficulty of outreach
Some countries have access to the internet (e.g. via mobile), but
no formal cybersecurity infrastructure yet (problematic)
Lack of resources
Education, training personnel, cyberinfrastructure
Mobile delivery may be best to reach remote/underdeveloped
areas
12. Rotary’s Connection
There are several Rotary models that will be discussed and the possible
applicability to meet this requirement. –these will span scholarships to
both existing programs and Per Scholas type programs.
Rotary has donated training infrastructure in third world countries
Rotary can affect corporate partnerships and NGO partnerships
throughout the world.
13. Presenter’s Contact Information
Saint Corporation
Rich Carson, Chairman, carsonr@saintcorporation.com
www.saintcorporation.com
Per Scholas
Bridgette Gray, Executive Director, National Sites, bgray@perscholas.org
www.perscholas.org
City University of New York John Jay College of Criminal Justice (Dept of
Mathematics and Computer Science)
Dr. Sven Dietrich, Associate Professor, spock@ieee.org
www.jjcweb.jjay.cuny.edu/sdietrich
14. Rate this session! Your feedback is valuable so remember to
complete the brief session evaluation in the convention
mobile app. To download the app, search for “Rotary Events”
in your Apple or Android app store.
This presentation and others from throughout the convention
are available through the convention mobile app and on
SlideShare at www.SlideShare.net/Rotary_International.