Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program - - PowerPoint PPT Presentation

dr loyce pailen cissp
SMART_READER_LITE
LIVE PREVIEW

Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program - - PowerPoint PPT Presentation

Dr. Loyce Pailen, CISSP FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education President Obama has identified President Obama has identified cybersecurity


slide-1
SLIDE 1
  • Dr. Loyce Pailen, CISSP

FISSEA Conference March 15, 2015 Program Focus: New techniques for developing and conducting effective, meaningful training and education

slide-2
SLIDE 2

President Obama President Obama has identified has identified cybersecurity cybersecurity as as

  • ne of the most serious economic
  • ne of the most serious economic and

and national national security security cha chall lleng enges w es we face as a e face as a nation! nation!

Whitehouse.g Whitehouse.gov

  • v
slide-3
SLIDE 3

Cybersecurity Management and Policy Program

Intr troducti tion to to Cybersecurity ty Cybersecurity Management and Governance Cybersecurity Risk Management and Compliance Cybersecurity Program Development Cybersecurity Capstone Simulation

slide-4
SLIDE 4

Begin with the END: Competencies What students must know and be able to do Craft: Learning Demonstrations Career/Field relevant contexts in which students both learn and demonstrate their learning Construct: The Program A mapping: if the student has successfully completed all learning demonstrations, they have also mastered all program competencies and are ready to graduate The Curriculum De Development t Process: An En Enhanced learning Model (EL ELM)

slide-5
SLIDE 5

Human Human Resource Resource Management t Health thcare Informati tion Tech Technolog

  • logy

y Business and Management Public Safety Administration Cybersecurity Acquisition and Supply Chain Management Homeland Security Project Management

Highly-Aligned Programs for th the Federal Workforce

slide-6
SLIDE 6

Traditi tional Approach Compete tency-Based Ap Approach roach Fixed Time Variable time Variable Learning Fixed Learning (mastery) Generalized Content Personalized Content Fixed Pace Variable Pace Varying student success More student success

Source: Brightspace by D2L: Learners Become Masters

“Competency-Based”

Mastery of Skills versus Time in Class

slide-7
SLIDE 7

Stu tudent( t(s)

Non-tr traditi tional

  • Working adults

ts Milita tary

  • Acti

tive duty ty

  • Vete

terans Pr Professio fessiona nals ls

  • Cybersecurity

ty

  • Informati

tion Technology

  • Relate

ted fields Career Career Changers Changers

  • Any

Any field field

Organizati tion(s)

Milita tary

  • All

All services services Private te Industr try

  • Sma

Small busi usine nesse sses s

  • Mediu

Medium bu busin ines esses es

  • Larg

Large bu e busin sinesses esses Government t

  • Local

Local

  • Sta

tate te

  • Federal

Federal Non-profit t

  • All cate

tegories

slide-8
SLIDE 8

} Know terms and technologies in order to assess cyber

management and policy needs.

  • } Design cybersecurity strategies that outline the vision, mission

and goals aligning with the organization’s operational and strategic plans.

} Ensure the existence and understanding of a cybersecurity

governance framework which includes the appropriate regulatory and compliance aspects.

} Address cyber attacks at the enterprise, national and

international levels to correctly describe and discuss the cybersecurity technologies and policies that can effectively counter cyber attacks.

} Minimize risks to an organization’s cyberspace and prevent

and/ or respond to a cybersecurity incident.

slide-9
SLIDE 9

Subject t Matte tter Ex Experts ts

  • Working in th

the field

  • Ex

Experience in industr try

  • Ex

Experience in government t

  • Ex

Experience in th the milita tary Industr try & Government t Models

  • Cybersecurity

ty Industr try Model - Do DoL

  • Nati

tional Initi tiati tive on Cyber Ed Educati tion - NIST

  • Nati

tional Initi tiati tive for Cybersecurity ty Careers & Stu tudies - DH DHS

  • Do

DoD D 8570 - Do DoD D Advisory Board

  • Cybersecurity Advisory Board
  • Cyber Curriculum Advisory

Council

  • Validators
  • Focus Groups

Academia and Certifications

  • University Sources
  • Program Chairs
  • Collegiate Professors
  • Adjunct Professors
  • Vice Deans
  • CISSP
  • CISM
slide-10
SLIDE 10

} Commitment from the Institution

  • Substantial Investment
  • Change in Philosophy
  • Different Business Model

} Use of Technology

  • Online environment and delivery
  • Scaling Tools
  • Analytics

– Student Progress – Remediation – Threshold assessment

slide-11
SLIDE 11

} Shift for students

  • Independence
  • Research
  • Self-pacing

} Different way of teaching

  • Coaching and Mentoring
  • Subject-Matter Expert
  • Assessor
  • Persistence

} Resistance to change

  • Less traditional path to a college degree

Challenges, cont’d.

slide-12
SLIDE 12

“Students are more marketable as mastered competencies are highly relevant to employers, and directly transferable to the workplace.”

Source: Brightspace by D2L: Learners Become Masters

slide-13
SLIDE 13

Is this the right direction for academia to take?

slide-14
SLIDE 14

} Creates context through scenarios and real world

applications – state-of-the-art tools

  • Enable students to attain mastery
  • Translate skills from classroom to work place
  • Competitors: No emphasis on tools of the trade

} Uses a multidisciplinary approach to provide both

breadth and depth

  • Incorporates critical infrastructures and industry-specific focus
  • Competitors: depth or breadth
  • Competitors: management only

} Designed specifically to meet the needs of industry

& government

  • Continuous evolution
  • Competitors: litany of courses from other programs
slide-15
SLIDE 15

} Providing a state-of-the-art curriculum that is based on real

world scenarios & techniques, and hands-on tools, used in today’s organizations

} Preparing students with cybersecurity knowledge and skills

that are immediately applicable to the work environment

} Scholar-Practitioners working in the cyber field

  • CIOs, CISOs, CTOs, Executives, Managers, Engineers, Computer

Scientists, Cyber Analysts, etc. - real world perspectives

} Multidisciplinary Approach to learning and mastery –

Enhancing Learning Model

} Designated as a National Center of Academic Excellence in

Cybersecurity and Information Assurance by the National Security Agency & Department of Homeland Security p