Loading…
1st Annual Virginia Cybersecurity Education Conference has ended
Welcome! The Virginia Cyber Range is hosting the 1st Annual Virginia Cybersecurity Education Conference at James Madison University in Harrisonburg, VA on August 14-15, 2018. This conference is open to all Virginia high school, college, and university faculty, administrators, and partners. Stay up to date on the conference:  Sign up for our newsletter!

>>> CTF Challenge 2018 <<<

Attendees and Sponsors: Registration is CLOSED. NOTE: Regrets...We are at MAX CAPACITY; NO on-site registrations will be accepted. 
Registration fees (includes CEU certificate, lunch (Day 1), and breakfast & lunch (Day 2)):
     - VA Educator/State/Federal Government Employee: $50
     - Student: $25
     - Industry/Others: $150
     - Sponsors: Three levels available during registration; see below under Sponsorship Opportunities to review.

Conference Objectives
At the end of the conference, attendees will:
  • Understand the challenges facing educators (K12 through university level) in cybersecurity education
  • Learn innovative and effective ways to teach cybersecurity to students using hands-on learning
  • Learn about various state and national cybersecurity educational resources available to educators
  • Understand the history and services provided by the Virginia Cyber Range
  • Understand the hiring needs and skills required to prepare students to successfully enter the cybersecurity workforce
  • Discover ways to get underrepresented student populations excited about and involved in cybersecurity
  • Examine the dangers associated with social media and technology use and how to effectively teach students to safely operate in cyber

Earning Continuing Education Units (CEU)
All attendees are eligible to earn CEUs for attending the conference, but they must sign in each day at the designated CEU table located near registration.

Sponsorship Opportunities: There are many exciting opportunities for your company or organization to be involved with this conference. There are three sponsor packages (Dean’s List and Honor Roll no longer available. Logos received after 7/24 will not be included in printed materials.) from which to choose. Go to our registration site, create an account and sign in to become a sponsor >> here.

There are four tracks for this year’s conference:
  • Cyber Educational Resources
  • Cyber for K12
  • Cyber Workforce
  • Hot Topics
Check out the Schedule tab below for an initial draft of the conference structure.

Questions? Please send an email to conference@virginiacyberrange.org.
Hot Topics [clear filter]
Wednesday, August 15
 

8:30am EDT

Diversity in Cybersecurity: How Educators Can Change the Future Face of Security
During the next five years, cyber crime will become the greatest threat to every person, place and thing in the world. Gartner predicts that by 2021, we will have suffered the first human death as a result of a cybersecurity breach. Currently, the cybersecurity unemployment rate has dropped to zero percent and the number of unfilled cybersecurity jobs is predicted to reach 3.5 million by 2021. With all of this opportunity, there is still a significant shortage of women and minorities in the industry; however, educators have an opportunity to change the face of cybersecurity. This session will talk about real-world challenges faced as well as opportunities and strategies that can engage and educate diverse student populations for careers in cybersecurity.

Speakers
avatar for Karen Cole

Karen Cole

Co-Founder and Chief Executive Officer, Assura, Inc.
Although Karen grew up on a farm in Virginia, her family nicknamed her, “the black thumb of death” when it comes to plant life. So obviously that lead to a career in IT, not horticulture. She was a cybersecurity practitioner long before it was cool. Many call her a unicorn because... Read More →



Wednesday August 15, 2018 8:30am - 9:15am EDT
ISAT 243

9:30am EDT

Big Data Analytics is the new Tsunami wave that will sweep security threats right off their game!
Big Data Analytics technology is the rad new kid on the block and everyone wants a piece of the action!  But, how can this be applied to the organization’s security posture? Organizations have historically been the driving factor for many cutting security technologies using manual configurations, repetitive procedures, security information and event management, automation and orchestration, pushing the limits of existing security capabilities.  Organizations are familiar with how to harness the power of many of the security technologies, yet struggle to keep pace with the bad guys. We need a firm understanding of what options are available to leverage Big Data Analytics for security.  Once understood, we'll need to answer questions such as "What is the role of Big Data Analytics in security?" and "How can Big Data Analytics help organizations be in the ‘command and control’ seat for their own security journey?" We will explore these topics and questions as we focus on the building blocks that can realize an improved security that organization can achieve through Big Data Analytics.

Speakers
avatar for Marouane Balmakhtar

Marouane Balmakhtar

Professor, Northern Virginia Community College
Dr. Marouane (Mar1) Balmakhtar has been working in the Cybersecurity/Telco industry for over 13 years and in higher education for five years. He has been working in various roles related to higher education, Cybersecurity, technology development, product support and operations, engineering... Read More →



Wednesday August 15, 2018 9:30am - 10:15am EDT
ISAT 243

10:30am EDT

Cloud 101: AWS Overview for Education
Starting your cloud journey? Join us to answer your most  basic questions including what is the cloud, what services does AWS offer, and how does the cloud help in education? You’ll learn how AWS helps across education - from improving access and teaching cloud in the classroom, to speeding research and making IT operations more efficient. You’ll learn key use cases in education institutions across the globe, and how you can get started.

Speakers
avatar for Michael Kuentz

Michael Kuentz

Solutions Architect, Amazon Web Services
Mike Kuentz is a Senior Solutions Architect with Amazon Web Services who works with education and health care institutions across the US. Mike completed his MBA from Carnegie Mellon’s Tepper School of Business, and his undergraduate work was in Computer Engineering at the University... Read More →



Wednesday August 15, 2018 10:30am - 11:15am EDT
ISAT 243

2:15pm EDT

Comparing Cyber Careers in the Public and Private Sectors
For young cyber professionals, the challenges and rewards of serving in the public sector can vary greatly from those in the private sector.  Understanding those differences, and preparing to meet a future employer's expectations, are essential to a successful cyber career.  Leo Taddeo, Chief Information Security Officer for Cyxtera Technologies and former Special Agent in Charge of the FBI's Cyber and Special Operations Division in New York, explains how teachers and mentors can help cyber students match their skills and career expectations to opportunities in public agencies and private enterprises.

Speakers
avatar for Leo Taddeo

Leo Taddeo

Chief Information Security Officer, Cyxtera Technologies, Inc
Leo Taddeo is responsible for oversight of Cyxtera's global security operations, investigations and intelligence programs, crisis management, and business continuity processes.  He provides deep domain insight into the techniques, tactics and procedures used by cybercriminals, to... Read More →



Wednesday August 15, 2018 2:15pm - 3:00pm EDT
ISAT 136

3:15pm EDT

Gamification, AI and the Cyber Workforce Gap
The cyber workforce (WF) shortage demands creative ways to attract, accelerate and maintain cyber skills development. And recent studies* make a strong argument for how gamification, applying rules, engaging teams, and scoring have become a staple for effective methods of educating, training and assessing our current and coming cyber WF...

In this interactive conversation on cyber ranges, gamified training, hands-on learning, and knowledge retention, we look forward to discussing current and future case studies along two main threads:
  1. It starts with awareness. How do you make awareness training compelling and provide better, more measurable results? Some of it comes down to an approach to learning, education and training (big fans of gamification here!). 
  2. We cannot solve this problem alone. As compute power becomes more accessible and affordable, and successful cyber breaches become more profitable, we won’t win this fight alone. The use of AI/ML has been introduced to the cyber-scene, and has incredible potential to both augment and automate the work and training/ education of cyber professionals.

* A MacAfee, April 2018 report titled, “Winning the Game,” surveyed almost 1000 cybersecurity managers/ professionals along with 500 employees, focusing on current threats, challenges, and investments needed. The survey found 40% of organizations already hold some kind of gamification exercise at least once per year. 77% of senior managers said their organization’s cybersecurity would be much safer if they implemented more gamification.

Speakers
avatar for Keenan Skelly

Keenan Skelly

VP, Global Partnerships, Circadence Corporation
Ms. Skelly has 20 years’ experience in providing security and management solutions across a wide array of platforms to include personnel, physical, and cybersecurity. Ms. Skelly served in the US Army as an EOD technician and went on to work for the Department of Homeland Security... Read More →
avatar for Bradley Wolfenden

Bradley Wolfenden

Director of Cyber Academic Partnerships, Circadence Corporation
Brad Wolfenden is the Director of Cyber Academic Partnerships for Circadence Corporation- a technology leader in cybersecurity education, training and assessment. Based out of Boulder, CO, Brad has built a successful portfolio of academic partners by leveraging Circadence's highly... Read More →



Wednesday August 15, 2018 3:15pm - 4:00pm EDT
ISAT 243
 
Filter sessions
Apply filters to sessions.