- Dr. Loyce Pailen, CISSP
FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education
Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program - - PowerPoint PPT Presentation
Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education President Obama has identified President Obama has identified cybersecurity
FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education
President Obama President Obama has identified has identified cybersecurity cybersecurity as as
and national national security security cha chall lleng enges w es we face as a e face as a nation! nation!
Whitehouse.g Whitehouse.gov
Intr troducti tion to to Cybersecurity ty Cybersecurity Management and Governance Cybersecurity Risk Management and Compliance Cybersecurity Program Development Cybersecurity Capstone Simulation
Begin with the END: Competencies What students must know and be able to do Craft: Learning Demonstrations Career/Field relevant contexts in which students both learn and demonstrate their learning Construct: The Program A mapping: if the student has successfully completed all learning demonstrations, they have also mastered all program competencies and are ready to graduate The Curriculum De Development t Process: An En Enhanced learning Model (EL ELM)
Human Human Resource Resource Management t Health thcare Informati tion Tech Technolog
y Business and Management Public Safety Administration Cybersecurity Acquisition and Supply Chain Management Homeland Security Project Management
Highly-Aligned Programs for th the Federal Workforce
Traditi tional Approach Compete tency-Based Ap Approach roach Fixed Time Variable time Variable Learning Fixed Learning (mastery) Generalized Content Personalized Content Fixed Pace Variable Pace Varying student success More student success
Source: Brightspace by D2L: Learners Become Masters
“Competency-Based”
Stu tudent( t(s)
Non-tr traditi tional
ts Milita tary
tive duty ty
terans Pr Professio fessiona nals ls
ty
tion Technology
ted fields Career Career Changers Changers
Any field field
Organizati tion(s)
Milita tary
All services services Private te Industr try
Small busi usine nesse sses s
Medium bu busin ines esses es
Large bu e busin sinesses esses Government t
Local
tate te
Federal Non-profit t
tegories
} Know terms and technologies in order to assess cyber
management and policy needs.
and goals aligning with the organization’s operational and strategic plans.
} Ensure the existence and understanding of a cybersecurity
governance framework which includes the appropriate regulatory and compliance aspects.
} Address cyber attacks at the enterprise, national and
international levels to correctly describe and discuss the cybersecurity technologies and policies that can effectively counter cyber attacks.
} Minimize risks to an organization’s cyberspace and prevent
and/ or respond to a cybersecurity incident.
Subject t Matte tter Ex Experts ts
the field
Experience in industr try
Experience in government t
Experience in th the milita tary Industr try & Government t Models
ty Industr try Model - Do DoL
tional Initi tiati tive on Cyber Ed Educati tion - NIST
tional Initi tiati tive for Cybersecurity ty Careers & Stu tudies - DH DHS
DoD D 8570 - Do DoD D Advisory Board
Council
Academia and Certifications
} Commitment from the Institution
} Use of Technology
Student Progress Remediation Threshold assessment
} Shift for students
} Different way of teaching
} Resistance to change
Source: Brightspace by D2L: Learners Become Masters
} Creates context through scenarios and real world
applications – state-of-the-art tools
} Uses a multidisciplinary approach to provide both
breadth and depth
} Designed specifically to meet the needs of industry
& government
} Providing a state-of-the-art curriculum that is based on real
world scenarios & techniques, and hands-on tools, used in today’s organizations
} Preparing students with cybersecurity knowledge and skills
that are immediately applicable to the work environment
} Scholar-Practitioners working in the cyber field
Scientists, Cyber Analysts, etc. - real world perspectives
} Multidisciplinary Approach to learning and mastery –
Enhancing Learning Model
} Designated as a National Center of Academic Excellence in
Cybersecurity and Information Assurance by the National Security Agency & Department of Homeland Security p