• Home
  • Mid-Atlantic Cybersecurity Capabilities and Careers Symposia (3CS) Call for Proposals (CFP)

Mid-Atlantic Cybersecurity Capabilities and Careers Symposia (3CS) Call for Proposals (CFP)

  • 27 Jan 2023
  • 12:00 PM
  • 15 Mar 2023
  • 11:59 PM
  • Prince George's Community College Center for Performing Arts 301 Largo Rd., Largo, MD 20774

Registration


Registration is closed


The National CyberWatch Center is seeking proposals for the March 31-April 2, 2023 Mid-Atlantic Cybersecurity Capabilities and Careers Symposia.

Dialogues (Focus Groups): A Dialogue is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. The goal of a Dialogue is to discover common themes and ideas for a future systematic study that will provide evidence related to the opinions expressed by a contributor to the Dialogue. These proposals should discuss specific challenges and persistent problems related to cybersecurity education and issues of raising the capability maturity in the cybersecurity workforce. The proposal for a Dialogue session must include a list of questions the moderator will pose to the attendees.

Evidence-Based Practices: Refers to methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. The goal is to improve outcomes by using interventions that have been proven to be effective through rigorous research and avoid those that evidence suggests are ineffective, rather than relying on intuition or tradition. Example proposals could include:

  • How the project/program impacts individual competence development or organizational effectiveness.
  • Evidence that teaching or the cybersecurity practices included in a curriculum actually work.
The Evidence-Based Practice Session proposal should list which of the following types of evidence will be presented:
  • Theory or Essay: Make claims and supporting statements without conducting a study
  • Expert opinion or (selective) qualitative literature review: A narrative listing/evaluation of information (opinion or publication) backing a claim.
  • Case study or uncontrolled observation: A narrative description of evidence to back a claim from a detailed study in one setting.
  • Case comparison or meta-synthesis (systematic review): A narrative synthesis of evidence from multiple settings that backs a claim.
  • Retrospective (cross-sectional) cohort study: One-time measure of others’ opinions using a survey or other observation to obtain correlations.
  • Prospective (longitudinal) cohort study: Repeated measure of others’ opinions using a survey or other observation to obtain correlations.
  • Quasi- or non-randomized experiment: Selectively sampled measure of predictive relationships in a natural setting using statistical controls to obtain direct and indirect effects from a model comparison.
  • Randomized controlled experimental study: Randomly sampled measure of predictive relationships in a controlled experimental setting to obtain difference scores.
  • Meta-analysis: A quantitative synthesis of evidence to produce corrected correlations (p) of predicted relationships.
  • Demonstrations: Technical demonstrations are events or activities where a product, technology, technique, or system is demonstrated to the Symposia attendees. These demonstrations are usually used to showcase the capabilities and features of the technology or technique, and to provide a hands-on experience for the audience.

Demonstrations: Technical demonstrations are events or activities where a product, technology, technique, or system is demonstrated to the Symposia attendees. These demonstrations are usually used to showcase the capabilities and features of the technology or technique, and to provide a hands-on experience for the audience.

Have questions? Contact us at info@nationalcyberwatch.org.

(c)  National CyberWatch Center
Powered by Wild Apricot Membership Software