dr loyce pailen cissp
play

Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program - PowerPoint PPT Presentation

Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education President Obama has identified President Obama has identified cybersecurity


  1. Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education

  2. President Obama has identified President Obama has identified cybersecurity cybersecurity as as one of the most serious economic and one of the most serious economic and national national security cha security chall lleng enges w es we face as a e face as a nation! nation! Whitehouse.gov Whitehouse.g ov

  3. Cybersecurity Management and Policy Program Intr troducti tion to to Cybersecurity ty Cybersecurity Management and Governance Cybersecurity Risk Management and Compliance Cybersecurity Program Development Cybersecurity Capstone Simulation

  4. The Curriculum De Development t Process: An En Enhanced learning Model (EL ELM) Begin with the Craft: Learning Construct: The END: Demonstrations Program Competencies What students Career/Field A mapping: if the must know and be relevant contexts student has able to do in which students successfully both learn and completed all demonstrate learning their learning demonstrations, they have also mastered all program competencies and are ready to graduate

  5. Highly-Aligned Programs for th the Federal Workforce Human Resource Human Resource Health thcare Informati tion Management t Tech Technolog ology y Business and Public Safety Cybersecurity Management Administration Acquisition and Homeland Project Supply Chain Security Management Management

  6. “Competency-Based” Mastery of Skills versus Time in Class Traditi tional Approach Compete tency-Based Ap Approach roach Fixed Time Variable time Variable Learning Fixed Learning (mastery) Generalized Content Personalized Content Fixed Pace Variable Pace Varying student success More student success Source: Brightspace by D2L: Learners Become Masters

  7. Stu tudent( t(s) Organizati tion(s) Non-tr traditi tional Milita tary • Working adults ts • All All services services Milita tary Private te Industr try • Acti tive duty ty • Sma Small busi usine nesse sses s • Vete terans • Mediu Medium bu busin ines esses es • Larg Large bu e busin sinesses esses Professio Pr fessiona nals ls • Cybersecurity ty Government t • Informati tion Technology • Local Local • Relate ted fields • Sta tate te • Federal Federal Career Changers Career Changers • Any Any field field Non-profit t • All cate tegories

  8. } Know terms and technologies in order to assess cyber management and policy needs. ◦ } Design cybersecurity strategies that outline the vision, mission and goals aligning with the organization’s operational and strategic plans. } Ensure the existence and understanding of a cybersecurity governance framework which includes the appropriate regulatory and compliance aspects. } Address cyber attacks at the enterprise, national and international levels to correctly describe and discuss the cybersecurity technologies and policies that can effectively counter cyber attacks. } Minimize risks to an organization’s cyberspace and prevent and/ or respond to a cybersecurity incident.

  9. Subject t Matte tter Ex Experts ts Industr try & Government t Models • Working in th the field • Cybersecurity ty Industr try Model - • Ex Experience in industr try Do DoL • Ex Experience in government t • Nati tional Initi tiati tive on Cyber • Ex Experience in th the milita tary Ed Educati tion - NIST • Nati tional Initi tiati tive for Cybersecurity ty Careers & Stu tudies - DHS DH • Do DoD D 8570 - Do DoD D Advisory Board Academia and Certifications • Cybersecurity Advisory Board • University Sources • Cyber Curriculum Advisory Program Chairs • Collegiate Professors • Council Adjunct Professors • • Validators Vice Deans • • Focus Groups • CISSP • CISM

  10. } Commitment from the Institution ◦ Substantial Investment ◦ Change in Philosophy ◦ Different Business Model } Use of Technology ◦ Online environment and delivery ◦ Scaling Tools ◦ Analytics – Student Progress – Remediation – Threshold assessment

  11. Challenges, cont’d. } Shift for students ◦ Independence ◦ Research ◦ Self-pacing } Different way of teaching ◦ Coaching and Mentoring ◦ Subject-Matter Expert ◦ Assessor ◦ Persistence } Resistance to change ◦ Less traditional path to a college degree

  12. “Students are more marketable as mastered competencies are highly relevant to employers, and directly transferable to the workplace.” Source: Brightspace by D2L: Learners Become Masters

  13. Is this the right direction for academia to take?

  14. } Creates context through scenarios and real world applications – state-of-the-art tools ◦ Enable students to attain mastery ◦ Translate skills from classroom to work place ◦ Competitors: No emphasis on tools of the trade } Uses a multidisciplinary approach to provide both breadth and depth ◦ Incorporates critical infrastructures and industry-specific focus ◦ Competitors: depth or breadth ◦ Competitors: management only } Designed specifically to meet the needs of industry & government ◦ Continuous evolution ◦ Competitors: litany of courses from other programs

  15. } Providing a state-of-the-art curriculum that is based on real world scenarios & techniques, and hands-on tools, used in today’s organizations } Preparing students with cybersecurity knowledge and skills that are immediately applicable to the work environment } Scholar-Practitioners working in the cyber field ◦ CIOs, CISOs, CTOs, Executives, Managers, Engineers, Computer Scientists, Cyber Analysts, etc. - real world perspectives } Multidisciplinary Approach to learning and mastery – Enhancing Learning Model } Designated as a National Center of Academic Excellence in Cybersecurity and Information Assurance by the National Security Agency & Department of Homeland Security p

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend