Sponsors

 

No albums to show

 

Follow Us

Upcoming events

Menu
Log in

nATIONAL cYBERSECURITY sTUDENT aSSOCIATION

EVENT CALENDAR

Upcoming events

    • October 01, 2022
    • 12:00 PM
    • September 30, 2025
    • 11:59 PM
    • Online
    Registration is closed

    National CyberWatch Center's

    Call for Cybersecurity Skills Development Workshop Proposals

    About

    Designed to develop capabilities that are essential to the effective performance of cybersecurity job roles, as well as helping to grow faculty and program capacity at 2/4-year schools. Proposals accepted on a rolling basis are evaluated in the order received.


    Compensation

    • Grant-supported advance stipend for workshop development
             - $2,500 per workshop upon acceptance of course learning materials
    • Facilitator pay for Workshop delivery  
             - $3,000 to 8,000 per full-day based on percentage of capacity sold
    • Royalties of Workshop content subscriptions after the first year
             - 10% of subscription fees for workshop content license renewals

      Differentiator

      Traditional workshops focus on exposure to new techniques, tools, and instructional materials (i.e., train-the-trainer) by conveying information about a topic. While valuable information is provided, workshop attendees don't usually have sufficient time to develop a deep understanding and to practice application of new knowledge necessary to develop skills. Assessments are often omitted or are limited to a summative test without a detailed review of errors or omissions. Workshop attendee are on their own to address any failed understanding or misapplications after the workshop ends. Consequently, traditional workshop attendees frequently fail to retain knowledge of workshop concepts and techniques or are unable to transfer the new learning to workplace/academic scenarios.

      By contrast, the Cybersecurity Skills Development Workshops (CSDWs) are designed to develop mastery in skillfully applying techniques, tactics, tools, protocols, or procedures through competency-based instructional designs. These workshops focus on developing deep understanding through continual, formative assessment of knowledge development designed to identify and eradicate misunderstanding and misconception. Furthermore, CSDW participants practice applying the newly-gained knowledge under varying conditions or scenarios to facilitate transfer to the workplace/academic setting. Finally, CSDW attendees receive a year's subscription to a self-paced instructional system to continue their development after the workshop ends. Consequently, CSDWs assist in raising the capability maturity and readiness of students, faculty, practitioners, or policymakers to adopt and adapt the latest effective practices for performing cybersecurity functions and roles.

      CSDWs apply advances in:

      • Formative assessments, which are designed to detail the areas of strengths and weaknesses of the learner, as continually applied, and guide the next learning path
      • Adaptive learning systems, to ensure the achievement of mastery in understanding, applying, and adapting cybersecurity practices
      • Micro-credentialing, to recognize the level of capability maturity exhibited by the workshop participant as Proficient, Competent, or a Master of the new capability

      Workshop Formats
      Ranging from half-, one-, or two-day workshops focused on a single capability, to multi-week virtual offerings.

      CSDW Facilitator Deliverables:

      • Concept Matrix (glossary)
      • Open-sourced or developed instructional materials
      • Open-sourced or developed hands-on exercises (e.g., procedures to be executed)
      • Scenario-based exercises (e.g., the way in which you administer a system depends on the operating system)

      Proposed Workshop Domains

      Like a textbook, a traditional workshop is divided into some number of topics/domains, with domains addressing several defined concepts. In contrast, a CSDW is organized by the responsibilities to be competently performed in the workplace, which is decomposed into the tasks to be executed and the concepts and techniques required to skillfully perform a task.


      Proposals for Workshop domains might include, but are not limited to the following:

      • Analyze network traffic
      • Limit information system access to authorized users and processes
      • Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems
      • Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems
      • Update malicious code protection mechanisms when new releases are available

      Example CSDW

      Hands-On Cryptography


      • July 29, 2024
      • July 28, 2025
      Register


      • January 01, 2025
      • 12:00 PM
      • December 31, 2025
      • 11:59 PM
      • Various locations
      Register


      Call For Proposals

      2025 Proposal Submissions accepted until 11:59 pm on September 30, 2025

      Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. The Cybersecurity Skills Journal (CSJ) publishes Special Issues with Articles, Notes and Dialogues that impact cybersecurity practice, improve learning, and advance the state of the cybersecurity workforce’s capability maturity. 

      3CS SESSION ORGANIZERS:

      Proposers of sessions for 3CS or manuscripts for CSJ are encouraged to submit a brief abstract of their session idea. Student proposals are warmly welcomed!

      The lead author of an accepted session proposal who has not previously presented their proposal is eligible for stipends to participate in a 3CS event. If you elect to attend in person and attend sessions throughout the event (including yours), you are eligible to receive a participation stipend of $200 and a travel stipend of up to $3,000 based on the distance from your home to the workshop venue. Stipend funding is limited. In addition to meeting the eligibility requirements, stipend availability is determined by the date of proposal acceptance and availability of funding from 3CS sponsors.

      Submit your session idea as soon as possible to ensure funds are available to support your attendance. When you register, you will be asked to select a date to attend a Proposal Development Workshop. During this workshop and the following panel review and mentoring program, you will receive guidance and assistance in developing your proposal for the conference to meet the requirements for leading your session at an upcoming 3CS event. If your session proposal is accepted to conduct a session at two regional 3CS events, you will be automatically eligible to conduct the session at the National 3CS.

      MANUSCRIPT AUTHORS

      Please view our current open Calls for Proposals for more information on individual Special Issue topics and timelines. Submissions may address any aspect of research into cybersecurity but must align with the Journal’s mission: emphasis should be placed on enhancing the capabilities of the cybersecurity practitioner, educator, or researcher, not on technology.

      Cybersecurity Skills Journal authors benefit from exceptional support, including but not limited to constructive advice received from 10-person peer review and mentoring panels. We encourage authors to submit rough ideas initially that may be iteratively developed into an appropriate manuscript format.

      OBSERVERS WELCOME: Want to learn how to develop a successful conference or publication proposal? Please select the "Observer" registration type to indicate that you wish to observe the workshop process to get a better idea of what is required to submit a successful proposal.



      • January 08, 2025
      • September 01, 2027
      Register

      The purpose of this form is to provide a student chapter semester update for the National Cybersecurity Student Association. If you have any questions, contact Gus Hinojosa Jr. at ghinojosa@nationalcyberwatch.org.  

      • January 28, 2025
      • September 30, 2025
      • Zoom
      Register


      Thank you for your interest in the Cyber Ready Professionals Skills to Succeed Program. To register, click the "Register Button" on the bottom left. During registration, you will be asked to select the session date you wish to attend. WHEN SELECTING A SESSION TIME, ENSURE THAT THE SESSION WILL OCCUR AT LEAST 48 HOURS AFTER YOU REGISTER YOUR SELECTION.

      If you are unable to attend the session at the time you select, you may submit another registration to select a future session to attend.

      If you have not submitted an application for the program, please register HERE

      After you have registered, you will be sent an email with the webcast details. If you have questions, contact Dr. David Tobey at dtobey@nationalcyberwatch.org. 

      • February 01, 2025
      • 9:00 AM
      • September 30, 2025
      • 5:00 PM
      Register

      Get a Personal Coach
      Get the Professional Skills you Need to Succeed
      Get Scholarships for Certificate Program and Exam Fees.
      Get the Experience you need to become a Certified Professional
      Get Clients to start your Certified Cybersecurity Preparer (CCP) Practice

      The National CyberWatch Center, Accenture, ISACA, and Microsoft have partnered to bring you the Cyber Ready Professionals Program. Apply here and schedule your information session to learn about the program benefits, and the progressive training and coaching process to jumpstart your cybersecurity career.

      To attend a Cyber Ready Professionals information session, click HERE

      YOU MUST REGISTER WITH A *.EDU EMAIL ADDRESS TO BE ELIGIBLE.


      Sign up for FREE NCSA Participant membership HERE


      • February 21, 2025
      • 12:00 PM
      • August 01, 2025
      • 11:59 PM
      • Online
      Register

      Call for Participants

      Competency-Based Mastery Learning (CBML)

      Instructional Design Workshop Series

      REGISTER NOW FOR THE 2025 COHORT

      About

      Participants will learn how to apply advances in educational neuroscience and learning science to create personalized instruction systems that evidence shows are the key to raising student readiness to learn new concepts and procedures, become certified, or engage in work-based learning programs (e.g., internships, apprenticeships, or entry-level jobs).


      Compensation

      • Stipends are available with education institution approval

        What makes these workshops different from others

        Traditional workshops focus on exposure to new techniques, tools, and instructional materials (i.e., train-the-trainer) by conveying information about a topic. While valuable information is provided, workshop attendees don't usually have sufficient time to develop a deep understanding and to practice application of new knowledge necessary to develop skills. Assessments are often omitted or are limited to a summative test without a detailed review of errors or omissions. Workshop attendee are on their own to address any failed understanding or misapplications after the workshop ends. Consequently, traditional workshop attendees frequently fail to retain knowledge of workshop concepts and techniques or are unable to transfer the new learning to workplace/academic scenarios.

        By contrast, the CBML Skills Development Workshops (CSDWs) are designed to develop mastery in skillfully applying techniques, tactics, tools, protocols, or procedures  through competency-based instructional designs. These workshops focus on developing deep understanding through continual, formative assessment of knowledge development designed to identify and eradicate misunderstanding and misconception. Furthermore, CSDW participants practice applying the newly-gained knowledge under varying conditions or scenarios to facilitate transfer to the workplace/academic setting. 

        CSDWs apply advances in:

        • Formative assessments, which are designed to detail the areas of strengths and weaknesses of the learner, as continually applied, and guide the next learning path
        • Adaptive learning systems, to ensure the achievement of mastery in understanding, applying, and adapting CBML instructional design practices
        • Micro-credentialing, to recognize the level of capability maturity exhibited by the workshop participant as Proficient, Competent, or a Master of each new capability

        CSDW Deliverables:

        • Concept Matrix (glossary)
        • Open-sourced or developed instructional materials
        • Open-sourced or developed hands-on exercises (e.g., procedures to be executed)
        • Scenario-based exercises 

        Transform your classroom or virtual course with the high-impact practice of personalized, adaptive instruction

        Click the "Register" button to the left or the link above to be added to the list of interested participants.

        • March 01, 2025
        • 9:00 AM
        • June 30, 2025
        • 11:59 PM
        • Eastern Time


        Peer Reviewer Workshop

        Held Bi-Weekly (select your preferred dates)

        REGISTER TO ATTEND A PEER REVIEWER WORKSHOP 

        As a peer reviewer, you will be contributing to generating the future workforce of the nation's cybersecurity capabilities to improve the readiness of cyber professionals to meet the growing and diversifying threats. Accordingly, those who conduct at least two reviews become CyberWatch G-Force Fellows who are eligible to receive travel stipends to attend all 3CS conferences leading up to and including the National 3CS in May 2025. 

        Reviews for CyberWatch are not a single, one-time review of an author’s submission provided by a small group of critical reviewers. Instead, CyberWatch Review Panels include up to 10 peer reviewers, representing different stakeholder communities and areas of expertise, that evaluate a proposal with the objective of improving it to meet the requirements for leading a 3CS session or publishing a CSJ article. Thus, panel members provide collegial and constructive feedback as the author(s) iteratively develops a structured abstract and then the completed session proposal or draft manuscript.  

        This one-hour workshop will help prospective peer reviewers understand our mission and the details of the iterative peer review process before making a commitment to become CyberWatch Peer Reviewer. 

        If you are interested in learning more or becoming a peer reviewer, please sign up for a Peer Reviewer Workshop using the Register button to the left or clicking below.

        Please note that you must register by June 30th to become a reviewer for the 2024-25 academic year. You will receive an email listing the date and time that you requested. A reminder email with the calendar invite will be sent at the beginning of the week in which your selected workshop will be conducted.

        REGISTER TO ATTEND A PEER REVIEWER WORKSHOP

        • March 18, 2025
        • July 31, 2025
        • Zoom
        Register

        Thank you for registering interest in the Cyber Ready Professionals Skills to Succeed Program.  An important step in your development of career readiness is to create a short "elevator pitch" that describes your capabilities and value to a prospective employer.  

        What is an elevator pitch?

        According to Princeton University,  "An elevator pitch is a brief way of introducing yourself, getting across a key point or two, and making a connection with someone. It's called an elevator pitch because it takes roughly the amount of time you'd spend riding an elevator with someone."

        The elevator pitch should include who are you, how you have developed, or are developing, distinctive expertise, why you believe you are distinctive (studies, experience, or accomplishments that achieved key results), where was the distinctive expertise demonstrated, who (e.g. type of company, culture, project role) you have as a goal to work with or on, and a Call to Action – what next step is sought as an outcome of the pitch?

        The structure of an elevator pitch

        "Hi, my name is [Your Name], and I help organizations with [types of problems or challenges you have the expertise to solve] with [X years] of experience in [Industry/Field]. My specialties include [mention a key achievement, skill, or experience that sets you apart]. Recently, I [share a recent success or project that highlights your value]. I'm passionate about [industry-related passion or goal]."

        Example elevator pitch for a software developer

        "Hi, my name is Alex, and I develop software that enables companies to implement electronic commerce platforms with 5 years of experience in full-stack development. I’ve successfully led projects that improved platform performance by 30%, and I specialize in building scalable web applications using React and Node.js. I’m passionate about creating seamless user experiences and am excited about the opportunity to contribute to [type of organization]’s mission of maintaining market leadership through innovative tech solutions."

        Your pitch cannot exceed three minutes in length. The coach(es) in the virtual room may ask you a question or two. The total interview length will be 5 to 7 minutes. 

        Registration for a Coaching Session

        Register Here to select an available time to meet with a professional coach to receive feedback on your Talent Fair Capability Pitch. Coaching sessions will be available before and after each Cybersecurity Capabilities and Careers Summit (3CS) Talent Fair.  Upcoming 3CS Talent Fairs will be held at the following locations. Stipends are available to support your attendance and travel (see below for more details). Click a link below to learn more about the event and register to attend.

        After registration, you will receive a confirmation email with the times available for the coaching sessions. Time slots are limited and reservations are on a first-come-first-served basis.

        To be eligible, you must register using a .edu email issued by the institution in which you are enrolled. 

        Stipends and Free Conference Registration Available!

        Travel stipends are available to those who register for the conference. You may also be eligible for an access code providing free conference registration if you completed the following steps of the Cyber Ready Professional Program.

        1. Submit the application and attend a program information session
        2. Upload a current resume
        3. Submitted the Time Management assessment

        If you are not eligible for a free conference registration, you may receive a deep discount on the registration fee by becoming a one-year Premium Membership in the National Cybersecurity Student Association. Access the NCSA Membership Page and scroll to the bottom to select "Individual-Student Association Premium Member - 1 yr. - $19.99 (USD)." If you have any questions about membership, please contact ghinojosa@nationalcyberwatch.org.




        • September 30, 2025
        • 11:59 PM
        • Zoom Online Conference
        Register


        Register for a
        Proposal Development Workshop

        Held Bi-Weekly (select your preferred dates)

        2025 Proposal Submissions accepted until 11:59 pm on September 30, 2025

        Please click the REGISTER button on the bottom left of this screen

        Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. For more information about proposal requirements and submit a session or manuscript idea, please access the 2025 Call for Proposals: Cybersecurity Capabilities and Careers Summit (3CS). Submit your session idea as soon as possible to ensure funds are available to support your attendance. Please view our current open Cybersecurity Skills Journal Calls for Proposals for more information on individual Special Issue topics and timelines.

        Proposers of sessions for 3CS or manuscripts for CSJ only need to submit a topic title and a brief description of their idea to get started. Student proposals are warmly welcomed!

        WORKSHOP MENTORS:

        All workshop mentors are recognized as a Fellow of the Cyber Ready G-Force -- the generating force raising cybersecurity capabilities and career readiness. Please register here if you are willing to volunteer as a mentor to proposers of session and manuscript proposals.

        OBSERVERS WELCOME: Want to learn how to develop a successful conference, grant, or publication proposal? Please select the "Observer" registration type to indicate that you wish to observe the workshop process to get a better idea of what is required to submit a proposal for a 3CS session or a CSJ manuscript.


        WORKSHOP AGENDA

        1. Introductions and Workshop Program Review

        2. Breakouts by symposium based on the proposal type. Depending on the number of proposals submitted to the workshop, the breakouts may be held simultaneously or in a sequence. Breakouts are led by a 3CS program chair or CSJ section editor with assigned mentors. Each proposal discussion is planned for 10 to 20 minutes to allow ample time for presentation of the session idea and discussion on how to develop the proposal to meet 3CS or CSJ requirements.

        Guided development of a session proposal pitch.

        Dialogue sessions:  A dialogue session is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. Dialogue proposals should specify a problem limiting the development of cybersecurity capability maturity that is not well understood or addressed. The proposal should also include 3-5 thought-provoking, open-ended questions that will gather insights and experiences from session attendees about the factors that are the likely and substantive causes of this problem as well as potential inverventions that can impact the influence of causal factors to bring about a desired change in the problem. The goal of a Dialogue is to discover common themes and ideas for a future systematic study. 

        Evidence-Based Practice Sessions: Methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. Proposals should specify how the method or intervention has impacted individual competence development or organizational effectiveness, preferably referencing the population studied and the correlation or effect size of the intervention factors on the level or degree of a desirable outcome or outcomes. Methods or interventions can be protocols or procedures for professional practice or curriculum or instructional designs for use by educators or trainers. 

        Demonstrations: Technical demonstrations that showcase the capabilities and features of the technology or technique for raising cybersecurity capability maturity, preferably including a hands-on experience for the audience. Breakouts based on the proposed session type

        Prospective authors of CSJ articles are asked to review the CSJ Overview Presentation before attending the Proposal Development Workshop. This presentation will help you to understand the Journal's mission, types of manuscripts, initial submission requirements, and timeline.


        QUESTIONS: Email us at info@nationalcyberwatch.org

      Past events

      May 12, 2025 CyberWatch Open Office Hour - 5/12
      May 09, 2025 2025 Southeast Cybersecurity Capabilities and Careers Summit
      May 09, 2025 2025 3CS Session: AI in the Classroom
      May 09, 2025 2025 3CS Session: Rewiring Cybersecurity Education
      May 09, 2025 2025 3CS Session: Open-Source SOC System Showcase
      May 09, 2025 2025 3CS Session: CTRL + ALT + INTERN
      May 09, 2025 2025 3CS Becoming Career Ready for the Cyber Workforce
      May 09, 2025 2025 3CS Teaching Electromagnetic Communication Principles through Hands-On Simple Circuits
      May 09, 2025 2025 3CS Session: Cyber Smarts
      May 09, 2025 2025 3CS Session: Securing the Coop
      May 09, 2025 2025 3CS Developing a Model for Cyber Clinic Accreditation
      May 09, 2025 2025 3CS Session: Dual Enrollment
      May 09, 2025 2025 3CS Session: The Human Factor
      May 08, 2025 2025 3CS Cyber Arcade - Cyber Ready Certifiable Game
      May 08, 2025 2025 3CS Welcome and Keynote Addresses
      April 26, 2025 Becoming Building a Shield
      April 26, 2025 Will AI Take Over?
      April 26, 2025 AI-Driven Threats and Defenses
      April 26, 2025 Future of Cybersecurity
      April 25, 2025 2025 Northeast Cybersecurity Capabilities and Careers Summit
      March 22, 2025 2025 MA3CS The Human Firewall
      March 22, 2025 2025 MA3CS Developing Competency in Threat Modeling
      March 22, 2025 2025 MA3CS Future-Proof Your Career: Top Cybersecurity Roles & Skills in Demand
      March 22, 2025 2025 MA3CS Enhancing SOC Analyst Efficacy with AI-Driven IoCs and Cyber Threat Intelligence
      March 22, 2025 2025 MA3CS LaTeX Essentials
      March 22, 2025 2025 MA3CS An Open Dialogue on AI and Consumer-Based IoT
      March 22, 2025 2025 MA3CS Red and Blue team strategies
      March 22, 2025 2025 MA3CS Aligning courses with the FedRAMP auditor certification
      March 22, 2025 2025 MA3CS Bridging the Gap
      March 22, 2025 2025 MA3CS Gamified Learning for Cybersecurity
      March 22, 2025 2025 MA3CS Consortium of Cyber Clinics and Competency-Based Education Meetup
      March 22, 2025 2025 MA3CS NCAE Hubs Meetup
      March 22, 2025 2025 MA3CS NCSA Chapters MeetUp
      March 22, 2025 2025 MA3CS The Psychology of Cybersecurity
      March 22, 2025 2025 MA3CS State of Cybersecurity Today
      March 22, 2025 2025 MA3CS 2CDC
      March 21, 2025 2025 MA3CS MACCDC
      March 21, 2025 2025 Mid-Atlantic Cybersecurity Capabilities and Careers Summit
      February 28, 2025 INTEREST: Virtual Proposal Development Workshops
      February 25, 2025 2025 MACCDC Volunteer Registration
      January 28, 2025 Cyber Ready Professionals Program Information Session: 02/12/2025
      January 15, 2025 2025 MACCDC Team Registration

      This material is based on work supported by the National Science Foundation (NSF) under Grant Number DUE-1204533DUE-1601150, and DUE-2054753Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of NSF.

      © 2025 National CyberWatch Center PRIVACY POLICY / TERMS OF USE



      Powered by Wild Apricot Membership Software