SlideShare une entreprise Scribd logo
1  sur  14
2016 ROTARY INTERNATIONAL CONVENTION
The Cybersecurity Training Gap
May 31, 2016
3:30-5:00 pm
Moderator’s Opening Remarks
• With more than 209,000 unfilled cybersecurity jobs in the U.S.
and more than 1 million globally, this session will give a
general overview of the current challenges businesses face in
identifying a skilled talent pipeline. We will explore innovative
training models through workforce development programs
and colleges and universities, that are working to close the
skills gaps and prepare a trained workforce for businesses.
• General Intro of panelist and their background
• Genesis of this panel – Rotary should be reaching out in this
area – President of Rotary
Global Challenge
• Any given year, approximately 431 million adults globally fall victim to cybercrime, at
a price of $388 billion
• Cybersecurity involves protecting critical information by preventing, detecting, and
responding to attacks. Many of our lives depend on digital technology, which makes
cybersecurity one of our country’s most important national security priorities.
• Securing cyberspace means that we, as a country, must develop a technologically-
skilled workforce, a cyber-savvy public, and an effective pipeline of future
employees.
• For businesses, the skills gap is still the #1 challenge in filling open cybersecurity
jobs.
• While the government is taking steps to keep our cyber community safe, the
government alone cannot solve the problem. Cybersecurity is a shared
responsibility.
• Billions of dollars are being spent on new technologies to help secure the U.S.
cyberspace. It will take a national strategy, similar to the effort of upgrading science
and mathematics education in the 1950’s, to meet this challenge.
Discussion Overview
• All Hands on Deck Approach
– Effective Post-Secondary Training
• Colleges & Universities
• Professional Societies - IEEE
• Workforce Development
– Industry’s Innovative Approach to Cybersecurity
• International Challenges
• Rotary’s Connection
– Domestic & International
Effective Postsecondary Training – Colleges and
Universities
 Foundational:
 University curriculum recommendations by professional societies*
 Certification/accreditation:
 Government review of cybersecurity curricula with 'stamp of
approval’**, offering paths to gov't-funded students, making sure the
workforce that will join these future employers is properly
educated/trained
* ACM/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. ACM Press and IEEE
Computer Society Press
** NSA National Centers of Academic Excellence in Information Assurance (IA)/Cyber Defense (CD)
Effective Postsecondary Training – Colleges and
Universities
 Cybersecurity training opportunities
 Training institutes (e.g. SANS, SEI/CERT, BlackHat)
 offering quick on-ramps (short term)
 Existing initiatives by professional societies
 IEEE Cybersecurity Initiative, http://cybersecurity.ieee.org/
 Provide free cybersecurity education/training modules via
collaboration between gov't, academia, and industry (short to long
term)
 IEEE initiative has worldwide implications
 Standards body, multinational presence
Training Validation
 Importance of thorough review processes for cybersecurity
education/training programs to be “fresh”
 Dialogue with industry for integration into curricula (short term)
 Integration of cybersecurity trends into curricula (both short and long
term)
 Beyond undergraduate degrees, there are master's and certificate
programs in cybersecurity and digital forensics for existing workforce
training that require stamps of approval (~180 universities and colleges
are accredited NSA Centers of Excellence in Information Assurance
Education and Research)
Non-Traditional Pathways Through Industry-Based Credentialing
 About Per Scholas
 20 year old IT sector-based training model that’s driven by industry-based
employers; training those from underserved communities in six cities: Bronx NY
(headquarters); Columbus and Cincinnati, Ohio, the DC Metro Region (Silver
Spring, MD); Dallas, TX and Atlanta, GA
 Cost effective and creative program model: $7,500 per student; Urban
Development Training Centers – revenue sharing model with industry
 Disrupting the way businesses source talent through non-traditional talent
pipelines
 Impact
 Recognized by The White House as “rigorously studied and highly impactful”
in putting the long-term unemployed back to work
 Listed on S&I 100 as one of the highest-impact nonprofits in America
 Selected to be part of two randomized and controlled studies:
 Sectoral Employment Impact Study conducted by Public/Private
Ventures funded by the Charles Mott Foundation
 Work Advance Study conducted by MDRC
Non-Traditional Pathways Through Industry-Based Credentialing
 About Per Scholas
 Program Impact
 90% certification rate; 85% graduation rate; 80% placement rate –
placement within 4-months post graduation; 75% retention of
employment beyond one year
 Average salary at enrollment: $7k, post-graduation: $39k
 Boot-camp style, 10-week training, two industry-based credentials;
curriculum designed in partnership with employers; follow-students
for two years post-graduation
 Alumni skill building: advanced training and credentialing; 15% wage
gain after first year of employment; professional development and
public speaking opportunities
Non-Traditional Pathways Through Industry-Based Credentialing
 Industry Based Approach
 Working directly with public and private sector to validate industry-based skills
needed and to inform curricula
 Two examples: Symantec $375k investment in the DC Region training site offering
cyber training to transitioning vets and their spouses
 Barclays $850k investment to launch a new Per Scholas Brooklyn training site,
focusing on cyber training
 Established a Regional Cybersecurity Task Force with representation from:
public/private sector, workforce development, policy makers and higher education
 Focused on three specific goals:
 Defining and quantifying job skills, i.e. defining the specific skills and
experience that constitutes competency
 Defining career pathways, e.g. career progression
 Creating a replicable toolkit to address the cybersecurity skills and talent gap
in other regions
International Challenges
 Difficulty of outreach
 Some countries have access to the internet (e.g. via mobile), but
no formal cybersecurity infrastructure yet (problematic)
 Lack of resources
 Education, training personnel, cyberinfrastructure
 Mobile delivery may be best to reach remote/underdeveloped
areas
Rotary’s Connection
 There are several Rotary models that will be discussed and the possible
applicability to meet this requirement. –these will span scholarships to
both existing programs and Per Scholas type programs.
 Rotary has donated training infrastructure in third world countries
 Rotary can affect corporate partnerships and NGO partnerships
throughout the world.
Presenter’s Contact Information
Saint Corporation
Rich Carson, Chairman, carsonr@saintcorporation.com
www.saintcorporation.com
Per Scholas
Bridgette Gray, Executive Director, National Sites, bgray@perscholas.org
www.perscholas.org
City University of New York John Jay College of Criminal Justice (Dept of
Mathematics and Computer Science)
Dr. Sven Dietrich, Associate Professor, spock@ieee.org
www.jjcweb.jjay.cuny.edu/sdietrich
Rate this session! Your feedback is valuable so remember to
complete the brief session evaluation in the convention
mobile app. To download the app, search for “Rotary Events”
in your Apple or Android app store.
This presentation and others from throughout the convention
are available through the convention mobile app and on
SlideShare at www.SlideShare.net/Rotary_International.

Contenu connexe

Tendances

SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
IJNSA Journal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
Wail Hassan
 

Tendances (20)

A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
2018 sans security awareness report
2018 sans security awareness report2018 sans security awareness report
2018 sans security awareness report
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Forget cyber, it's all about AppSec
Forget cyber, it's all about AppSecForget cyber, it's all about AppSec
Forget cyber, it's all about AppSec
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 

Similaire à The Cyber Security Training Gap: Rotarian Reach

Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)
Rob Wilson
 
Go To Training High Impact Online Training
Go To Training High Impact Online TrainingGo To Training High Impact Online Training
Go To Training High Impact Online Training
Confidential
 
Best Practices in Online Academic Advising Delivery
Best Practices in Online Academic Advising DeliveryBest Practices in Online Academic Advising Delivery
Best Practices in Online Academic Advising Delivery
Laura Pasquini
 
Mit blockchain technologies_online_short_program_brochure
Mit blockchain technologies_online_short_program_brochureMit blockchain technologies_online_short_program_brochure
Mit blockchain technologies_online_short_program_brochure
darkmentor25
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities survey
Jisc
 

Similaire à The Cyber Security Training Gap: Rotarian Reach (20)

Steve warburton
Steve warburtonSteve warburton
Steve warburton
 
ISA backed technology skills platform
ISA backed technology skills platformISA backed technology skills platform
ISA backed technology skills platform
 
CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free World
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1
 
Cloud Campus
Cloud Campus Cloud Campus
Cloud Campus
 
Bright Spots: Project SECURE (Wake County)
Bright Spots: Project SECURE (Wake County)Bright Spots: Project SECURE (Wake County)
Bright Spots: Project SECURE (Wake County)
 
Framework of digital workforce platform
Framework of digital workforce platformFramework of digital workforce platform
Framework of digital workforce platform
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 
Blockchain for Education and Professional Development
Blockchain for Education and Professional DevelopmentBlockchain for Education and Professional Development
Blockchain for Education and Professional Development
 
Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)
 
Higher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud MigrationHigher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud Migration
 
Blockchain‑based approach to create a model of trust in open and ubiquitous h...
Blockchain‑based approach to create a model of trust in open and ubiquitous h...Blockchain‑based approach to create a model of trust in open and ubiquitous h...
Blockchain‑based approach to create a model of trust in open and ubiquitous h...
 
Leveling the Recognition of Learning
Leveling the Recognition of LearningLeveling the Recognition of Learning
Leveling the Recognition of Learning
 
Higher Education and the Future DevOps Workforce
Higher Education and the Future DevOps WorkforceHigher Education and the Future DevOps Workforce
Higher Education and the Future DevOps Workforce
 
Go To Training High Impact Online Training
Go To Training High Impact Online TrainingGo To Training High Impact Online Training
Go To Training High Impact Online Training
 
The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education The role of social technologies in marketing practice and in education
The role of social technologies in marketing practice and in education
 
Best Practices in Online Academic Advising Delivery
Best Practices in Online Academic Advising DeliveryBest Practices in Online Academic Advising Delivery
Best Practices in Online Academic Advising Delivery
 
Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...
 
Mit blockchain technologies_online_short_program_brochure
Mit blockchain technologies_online_short_program_brochureMit blockchain technologies_online_short_program_brochure
Mit blockchain technologies_online_short_program_brochure
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities survey
 

Plus de Rotary International

Plus de Rotary International (20)

THE_PROMOTER_-_DRR_TRAINING_PRECON_2022.pptx
THE_PROMOTER_-_DRR_TRAINING_PRECON_2022.pptxTHE_PROMOTER_-_DRR_TRAINING_PRECON_2022.pptx
THE_PROMOTER_-_DRR_TRAINING_PRECON_2022.pptx
 
RIC 22 MDIO Breakout.pptx
RIC 22 MDIO Breakout.pptxRIC 22 MDIO Breakout.pptx
RIC 22 MDIO Breakout.pptx
 
IC22 Winning Teams - Nicole Peña.pptx
IC22 Winning Teams - Nicole Peña.pptxIC22 Winning Teams - Nicole Peña.pptx
IC22 Winning Teams - Nicole Peña.pptx
 
DRR Training The Organizer.pptx
DRR Training The Organizer.pptxDRR Training The Organizer.pptx
DRR Training The Organizer.pptx
 
IC22 Rotaract - Keys to level up your influence_Casas&Guerra (2).pptx
IC22 Rotaract - Keys to level up your influence_Casas&Guerra (2).pptxIC22 Rotaract - Keys to level up your influence_Casas&Guerra (2).pptx
IC22 Rotaract - Keys to level up your influence_Casas&Guerra (2).pptx
 
Service Ambassadors Presentation.pptx
Service Ambassadors Presentation.pptxService Ambassadors Presentation.pptx
Service Ambassadors Presentation.pptx
 
DRR Training_The Trainer 2022.pptx
DRR Training_The Trainer 2022.pptxDRR Training_The Trainer 2022.pptx
DRR Training_The Trainer 2022.pptx
 
Burnout management.pptx
Burnout management.pptxBurnout management.pptx
Burnout management.pptx
 
Leadership Development Program Presentation.pptx
Leadership Development Program Presentation.pptxLeadership Development Program Presentation.pptx
Leadership Development Program Presentation.pptx
 
RI Convention 2022_Rotaract Pre Convention_2022.06.04 NewGen Peacebuilders.pptx
RI Convention 2022_Rotaract Pre Convention_2022.06.04 NewGen Peacebuilders.pptxRI Convention 2022_Rotaract Pre Convention_2022.06.04 NewGen Peacebuilders.pptx
RI Convention 2022_Rotaract Pre Convention_2022.06.04 NewGen Peacebuilders.pptx
 
IC22 Rotaract Intro to DRR Training.pptx
IC22 Rotaract Intro to DRR Training.pptxIC22 Rotaract Intro to DRR Training.pptx
IC22 Rotaract Intro to DRR Training.pptx
 
351 930-1020.pptx
351 930-1020.pptx351 930-1020.pptx
351 930-1020.pptx
 
IC22 Rotaract Precon_Making an Impact Through Rotary Grants.pptx
IC22 Rotaract Precon_Making an Impact Through Rotary Grants.pptxIC22 Rotaract Precon_Making an Impact Through Rotary Grants.pptx
IC22 Rotaract Precon_Making an Impact Through Rotary Grants.pptx
 
Lets Celebrate Inclusion.pptx
Lets Celebrate Inclusion.pptxLets Celebrate Inclusion.pptx
Lets Celebrate Inclusion.pptx
 
IC22 Rotaract Networking Impactful Service Project.pptx
IC22 Rotaract Networking  Impactful Service Project.pptxIC22 Rotaract Networking  Impactful Service Project.pptx
IC22 Rotaract Networking Impactful Service Project.pptx
 
Membership Engagement Presentation.pptx
Membership Engagement Presentation.pptxMembership Engagement Presentation.pptx
Membership Engagement Presentation.pptx
 
Lessons Learned.pptx
Lessons Learned.pptxLessons Learned.pptx
Lessons Learned.pptx
 
Nurturing Strategic Partnerships.pdf
Nurturing Strategic Partnerships.pdfNurturing Strategic Partnerships.pdf
Nurturing Strategic Partnerships.pdf
 
Panel Discussion environment_ (003).pptx
Panel Discussion environment_ (003).pptxPanel Discussion environment_ (003).pptx
Panel Discussion environment_ (003).pptx
 
General Session June 4.pptx
General Session June 4.pptxGeneral Session June 4.pptx
General Session June 4.pptx
 

Dernier

Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi EscortsRussian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
MadhuKothuru
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
ScottMeyers35
 

Dernier (20)

Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi EscortsRussian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
Russian Escorts in Abu Dhabi 0508644382 Abu Dhabi Escorts
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
 
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
Vivek @ Cheap Call Girls In Kamla Nagar | Book 8448380779 Extreme Call Girls ...
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 

The Cyber Security Training Gap: Rotarian Reach

  • 1. 2016 ROTARY INTERNATIONAL CONVENTION The Cybersecurity Training Gap May 31, 2016 3:30-5:00 pm
  • 2. Moderator’s Opening Remarks • With more than 209,000 unfilled cybersecurity jobs in the U.S. and more than 1 million globally, this session will give a general overview of the current challenges businesses face in identifying a skilled talent pipeline. We will explore innovative training models through workforce development programs and colleges and universities, that are working to close the skills gaps and prepare a trained workforce for businesses. • General Intro of panelist and their background • Genesis of this panel – Rotary should be reaching out in this area – President of Rotary
  • 3. Global Challenge • Any given year, approximately 431 million adults globally fall victim to cybercrime, at a price of $388 billion • Cybersecurity involves protecting critical information by preventing, detecting, and responding to attacks. Many of our lives depend on digital technology, which makes cybersecurity one of our country’s most important national security priorities. • Securing cyberspace means that we, as a country, must develop a technologically- skilled workforce, a cyber-savvy public, and an effective pipeline of future employees. • For businesses, the skills gap is still the #1 challenge in filling open cybersecurity jobs. • While the government is taking steps to keep our cyber community safe, the government alone cannot solve the problem. Cybersecurity is a shared responsibility. • Billions of dollars are being spent on new technologies to help secure the U.S. cyberspace. It will take a national strategy, similar to the effort of upgrading science and mathematics education in the 1950’s, to meet this challenge.
  • 4. Discussion Overview • All Hands on Deck Approach – Effective Post-Secondary Training • Colleges & Universities • Professional Societies - IEEE • Workforce Development – Industry’s Innovative Approach to Cybersecurity • International Challenges • Rotary’s Connection – Domestic & International
  • 5. Effective Postsecondary Training – Colleges and Universities  Foundational:  University curriculum recommendations by professional societies*  Certification/accreditation:  Government review of cybersecurity curricula with 'stamp of approval’**, offering paths to gov't-funded students, making sure the workforce that will join these future employers is properly educated/trained * ACM/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. ACM Press and IEEE Computer Society Press ** NSA National Centers of Academic Excellence in Information Assurance (IA)/Cyber Defense (CD)
  • 6. Effective Postsecondary Training – Colleges and Universities  Cybersecurity training opportunities  Training institutes (e.g. SANS, SEI/CERT, BlackHat)  offering quick on-ramps (short term)  Existing initiatives by professional societies  IEEE Cybersecurity Initiative, http://cybersecurity.ieee.org/  Provide free cybersecurity education/training modules via collaboration between gov't, academia, and industry (short to long term)  IEEE initiative has worldwide implications  Standards body, multinational presence
  • 7. Training Validation  Importance of thorough review processes for cybersecurity education/training programs to be “fresh”  Dialogue with industry for integration into curricula (short term)  Integration of cybersecurity trends into curricula (both short and long term)  Beyond undergraduate degrees, there are master's and certificate programs in cybersecurity and digital forensics for existing workforce training that require stamps of approval (~180 universities and colleges are accredited NSA Centers of Excellence in Information Assurance Education and Research)
  • 8. Non-Traditional Pathways Through Industry-Based Credentialing  About Per Scholas  20 year old IT sector-based training model that’s driven by industry-based employers; training those from underserved communities in six cities: Bronx NY (headquarters); Columbus and Cincinnati, Ohio, the DC Metro Region (Silver Spring, MD); Dallas, TX and Atlanta, GA  Cost effective and creative program model: $7,500 per student; Urban Development Training Centers – revenue sharing model with industry  Disrupting the way businesses source talent through non-traditional talent pipelines  Impact  Recognized by The White House as “rigorously studied and highly impactful” in putting the long-term unemployed back to work  Listed on S&I 100 as one of the highest-impact nonprofits in America  Selected to be part of two randomized and controlled studies:  Sectoral Employment Impact Study conducted by Public/Private Ventures funded by the Charles Mott Foundation  Work Advance Study conducted by MDRC
  • 9. Non-Traditional Pathways Through Industry-Based Credentialing  About Per Scholas  Program Impact  90% certification rate; 85% graduation rate; 80% placement rate – placement within 4-months post graduation; 75% retention of employment beyond one year  Average salary at enrollment: $7k, post-graduation: $39k  Boot-camp style, 10-week training, two industry-based credentials; curriculum designed in partnership with employers; follow-students for two years post-graduation  Alumni skill building: advanced training and credentialing; 15% wage gain after first year of employment; professional development and public speaking opportunities
  • 10. Non-Traditional Pathways Through Industry-Based Credentialing  Industry Based Approach  Working directly with public and private sector to validate industry-based skills needed and to inform curricula  Two examples: Symantec $375k investment in the DC Region training site offering cyber training to transitioning vets and their spouses  Barclays $850k investment to launch a new Per Scholas Brooklyn training site, focusing on cyber training  Established a Regional Cybersecurity Task Force with representation from: public/private sector, workforce development, policy makers and higher education  Focused on three specific goals:  Defining and quantifying job skills, i.e. defining the specific skills and experience that constitutes competency  Defining career pathways, e.g. career progression  Creating a replicable toolkit to address the cybersecurity skills and talent gap in other regions
  • 11. International Challenges  Difficulty of outreach  Some countries have access to the internet (e.g. via mobile), but no formal cybersecurity infrastructure yet (problematic)  Lack of resources  Education, training personnel, cyberinfrastructure  Mobile delivery may be best to reach remote/underdeveloped areas
  • 12. Rotary’s Connection  There are several Rotary models that will be discussed and the possible applicability to meet this requirement. –these will span scholarships to both existing programs and Per Scholas type programs.  Rotary has donated training infrastructure in third world countries  Rotary can affect corporate partnerships and NGO partnerships throughout the world.
  • 13. Presenter’s Contact Information Saint Corporation Rich Carson, Chairman, carsonr@saintcorporation.com www.saintcorporation.com Per Scholas Bridgette Gray, Executive Director, National Sites, bgray@perscholas.org www.perscholas.org City University of New York John Jay College of Criminal Justice (Dept of Mathematics and Computer Science) Dr. Sven Dietrich, Associate Professor, spock@ieee.org www.jjcweb.jjay.cuny.edu/sdietrich
  • 14. Rate this session! Your feedback is valuable so remember to complete the brief session evaluation in the convention mobile app. To download the app, search for “Rotary Events” in your Apple or Android app store. This presentation and others from throughout the convention are available through the convention mobile app and on SlideShare at www.SlideShare.net/Rotary_International.

Notes de l'éditeur

  1. ACM/IEEE 2013 report: http://www.acm.org/education/curricula-recommendations