Sponsors

Follow Us

Upcoming events

Menu
Log in

Upcoming events

    • August 06, 2018
    • December 31, 2030
    Register


    Cybersecurity Skills Journal: Practice and Research: Fall 2018 Special Issue: 3CS Anniversary Special Issue – Five Years of Raising the Capability Maturity Bar

    The launch of the first issue, Cybersecurity Skills Journal: Practice and Research -  3CS Anniversary Special Issue - Five Years of Raising the Capability Maturity Bar - coincides with the 5th Annual Community College Cyber Summit (3CS). Besides some path-breaking articles from our Innovations in Cybersecurity Education award-winners, most of the special issue is dedicated to listings of the capability-enhancing presentations that have occurred over the past five years at the 3CS.

    Table of Contents

    EXECUTIVE LETTER 

    RESEARCH PERSPECTIVES

    Raising the BAR of Cybersecurity Capability Maturity

    PRACTICE PERSPECTIVES

    Meeting Industry Needs for Secure Software Development 

    Have My Smart Lightbulbs Been Weaponized?

    THEORETICAL PERSPECTIVES 

    Competency is Not a Three Letter Word 

    3CS FIFTH ANNIVERSARY RESOURCE GUIDE Pathway Section: Fundamentals 

    Pathway Section: Specialty Areas

    RESOURCE GUIDE PRESENTER INDEX

    Click "Register" to request a free copy of the 3CS Anniversary Special Issue. Upon completion of the registration form a download link will be sent to your registered email address.


    • November 20, 2020
    • December 31, 2030
    Register



    The Cybersecurity Skills Journal: Practice and Research - NICE Framework Special Issue: Investigating Framework Adoption, Adaptation, or Extension - examines the usefulness, benefits, and challenges associated with the adoption, adaptation, or extension of the NICE Framework in cybersecurity practice, to improve learning, and advance the state of cybersecurity capability maturity.

    Table of Contents

    EXECUTIVE LETTER 

    PRACTICE PERSPECTIVES

    The CYBER security - Competency Health and Maturity Progression

    RESEARCH PERSPECTIVES

    Exploring Non-Technical Knowledge, Skills, and Abilities (KSA)

    Exploring Cognitive Processes to Develop Cybersecurity Defender Proficiency

    TEACHING PERSPECTIVES 

    Wireless Security: Examining the next NICE Framework Iteration 

    RESEARCH NOTE

    Cybersecurity Intelligence: A Novel Information Security Threat Mitigation

    TEACHING NOTE

    Does Cybersecurity Education Focus on the Right Things?

    Click "Register" to request a free copy of the NICE Special Issue. Upon completion of the registration form a download link will be sent to your registered email address.


    • April 22, 2021
    • September 16, 2033
    • Online
    Register



    This NSF-funded research project explored the viability of cybersecurity apprenticeships for federal agency pipeline support. During the 18-month effort – which ended in December 2020 – a Working Group of 15 federal, academic, and practitioner experts developed a strong dialog and presence in the apprenticeship space. Aided by close ties to the National Initiative for Cybersecurity Education (NICE) Working Group on Apprenticeships, the project developed a deeper understanding of the strengths and weaknesses of the apprenticeship model, and identified key ways to improve the adoption of apprenticeships.

    Primary Audience: Federal Cybersecurity human resources and hiring managers.

    Table of Contents

    1. Introduction to Apprenticeships
    2. What Do Current Apprenticeships Look Like?
    3. Current Apprenticeship Footprint
    4. Possible Barriers to Federal Adoption
    5. Available High-Level Models
    6. Engaging the Hiring Manager
    7. Aligning Academic and OJT Requirements
    8. The Value Proposition
    9. Seeding the Way: Pilot Proposals to Agencies
    10. Recommendations to NSF
    11. National CyberWatch Center Working Group Membership
    12. References
    • August 20, 2021
    • January 14, 2034
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    About the 2017 Innovations in Cybersecurity Education Publication

    The deadline for application submissions was March 15, 2017. Shortly after, a panel of cybersecurity educators and National CyberWatch partners reviewed these submissions, 44 in total (far exceeding previous year's submission totals), and selected 5 for recognition. This reference document was created listing all nominations and the 5 winners.



    • September 30, 2021
    • 9:00 AM
    • September 30, 2030
    • 11:59 PM
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    About the 2021 Innovations in Cybersecurity Education Publication

    With the forced transition to online learning across the education spectrum as a result of the COVID-19 pandemic, we decided to focus on the following theme for this year’s program:


    How can we best contribute to the needs and transformations that might occur for remote/online instruction in the post-COVID-19 world?


    Given the narrow focus of this year’s theme, we are treating this year’s publication as a Special Issue, which combines the top two submissions (as ranked by a panel of judges) with the results of our National Cybersecurity Student Association COVID-19 Perceptions Survey. This year was like no other; so is this year’s Innovations program.

    • September 28, 2022
    • 9:00 AM
    • September 28, 2032
    • 11:59 PM
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    One of the major strengths of the National CyberWatch Center is its ability to aggregate and disseminate the capacity and creative experimentation found within our academic and workforce communities.


    The 2022 Innovations in Cybersecurity Education program (now in its 6th year), was built on the premise that our members are some of the best cybersecurity educational innovators, and that through our Center, they can share their innovations, accelerate their adoption, and receive proper recognition for their work. This publication is an example of this capacity and creativity in action.

    All National CyberWatch Center members received the online nomination form via various e-Blasts, the monthly e-Newsletter (NCC Communicator), social media campaigns, and dissemination/outreach via various partners. The deadline for submissions was May 10, 2022. Shortly after, a panel of cybersecurity educators and past Innovations winners reviewed the submissions and selected those for recognition in this publication.

    • January 01, 2023
    • September 01, 2026
    • online
    • 99985
    Register

    Download the National Cybersecurity Student Association Chapter Recruitment Sign-up Form

    • May 23, 2023
    • January 21, 2027
    • online
    • 99968
    Register
    Download the National Cybersecurity Student Association Memberships & Chapters Information
    • May 24, 2023
    • May 25, 2033
    • Online
    Register


    Cybersecurity Skills Journal: Practice & Research

    Diversifying the Cybersecurity Workforce Special Issue

    This special issue, published in April 2023, includes a collection of dialogues, which capture a discussion among stakeholders about dilemmas or previously insurmountable challenges related to diversifying the cybersecurity workforce, cybersecurity skill assessment, development, recruitment, or evaluation.

    CSJ Dialogues may be edited recordings of a focus group session, interviews with subject matter experts, or conversations between practitioners, scholars, or educators exploring the goals, success factors (objectives), and effective practices for successful mitigation or resolution of problems or taking full advantage of opportunities facing the cybersecurity community.

    Click the "Register" button (upper-left) to receive the link to download this  publication.

    • May 31, 2023
    • May 31, 2033
    • Online
    Register



    2022 National CyberWatch Center's Annual Report

    This report highlights the tremendous impact that the CyberWatch Center has on increasing the readiness of workers, students, instructors, and researchers to meet the ever-growing threat to our nation’s security and prosperity. The CyberWatch Center’s many accomplishments would not be possible without the tremendous support and leadership provided by Dr. Corby Hovis, the ATE program director at the National Science Foundation, Dr. Falecia D. Williams, the president of Prince George’s Community College, our world-class program management team, and the hundreds of volunteers and dozens of alliance partners who guide and contribute their time, talent, and financial support of our programs.

    • September 14, 2023
    • 12:00 PM
    • September 15, 2033
    • Online
    Register


    State of and Trends in Cybersecurity Capability Maturity
    Call for Working Papers

    These preliminary research papers explore various aspects of the state of and trends in cybersecurity capability; that is, the level of progressive improvement to perform, or the readiness to perform, critical activities or functions.

    Want to disseminate progress made in grant-funded work, presentations of research findings at conferences, or other systematic investigations? If so, consider publishing working papers of your own.

    Click the Register button in the middle-left of this window to get started.

    • June 28, 2024
    • February 27, 2026
    • online
    • 99951
    Register
    Download the National Cybersecurity Student Association Membership Programs Flyer
    • July 12, 2024
    • September 11, 2031
    • Online
    Register

    Beginning in Fall 2024, National CyberWatch Center is launching a Premium Membership for faculty with institutional chapters. Premium members receive 50% off coupons for program fees and are eligible to receive travel stipends to CyberWatch events. Please complete the inquiry form to indicate your interest in applying for premium individual or chapter membership.

    One of our membership coordinators will be in touch soon!

    National CyberWatch Center
    Chapter Development Team
    chapters@nationalcyberwatch.org

    • September 18, 2024
    • July 07, 2026
    Register

    Share Your Academic Work & Research Through Our Network

    Are you a student or faculty member who would like FREE marketing and branding? Look no further! Share you academic work with us through our rapidly growing worldwide audience. We can promote it via emails, our website, and/or social media platforms.! Make a name for yourself and stand out from the crowd today! If you have any further questions, please email info@cyberstudents.org.
    • September 18, 2024
    • September 30, 2026
    • Online
    Register

    Sign-up for Student Chapter Activities

    Do you have a National Cybersecurity Student Association Chapter? Are you interested in participating in a 1-hr activity for your chapter? If so, please fill out the application and someone will get back to you. The activities are listed in the application. Note: These activities are only available for Unites States chapters only at this time. 

    National Cybersecurity Student Association
    info@cyberstudents.org 

    • September 18, 2024
    • May 20, 2026
    • online
    • 99982
    Register
    Download the 2CDC Flyer
    • January 08, 2025
    • September 01, 2027
    Register

    The purpose of this form is to provide a student chapter semester update for the National Cybersecurity Student Association. If you have any questions, contact Gus Hinojosa Jr. at ghinojosa@nationalcyberwatch.org.  

    • January 14, 2025
    • September 01, 2027
    • Online
    Register

    The National Cybersecurity Student Association is inviting presentation proposals for their monthly webcast series. Whether you are a student, faculty member, or professional, we encourage you to submit a proposal related to career development or cybersecurity topics. If you have any questions, please reach out to us at info@cyberstudents.org.

    • Up to a 1-hr presentation. 
    • Must submit your presentation proposal to be approved. 
    • Presentation must be cybersecurity or career building related. 
    • January 28, 2025
    • September 30, 2026
    • Zoom
    Register


    Thank you for your interest in the Cyber Ready Professionals Skills to Succeed Program. To register, click the "Register Button" on the bottom left. During registration, you will be asked to select the session date you wish to attend. WHEN SELECTING A SESSION TIME, ENSURE THAT THE SESSION WILL OCCUR AT LEAST 48 HOURS AFTER YOU REGISTER YOUR SELECTION.

    If you are unable to attend the session at the time you select, you may submit another registration to select a future session to attend. Participants who register and attend late, will not be allowed to enter the session. 

    If you have not submitted an application for the program, please register HERE

    After you have registered, you will be sent an email with the webcast details. If you have questions, contact Dr. David Tobey at dtobey@nationalcyberwatch.org. 

    • February 01, 2025
    • 9:00 AM
    • June 30, 2026
    • 5:00 PM
    Register

    Get a Personal Coach
    Get the Professional Skills you Need to Succeed
    Get Scholarships for Certificate Program and Exam Fees.
    Get the Experience you need to become a Certified Professional
    Get Clients to start your Certified Cybersecurity Preparer (CCP) Practice

    The National CyberWatch Center, Accenture, ISACA, and Microsoft have partnered to bring you the Cyber Ready Professionals Program. Apply here and schedule your information session to learn about the program benefits, and the progressive training and coaching process to jumpstart your cybersecurity career.

    To attend a Cyber Ready Professionals information session, click HERE

    YOU MUST REGISTER WITH A *.EDU EMAIL ADDRESS TO BE ELIGIBLE.


    Sign up for FREE NCSA Participant membership HERE


    • June 24, 2025
    • 12:00 PM
    • December 31, 2026
    • 11:59 PM
    • Various locations
    Register


    Call For Session Ideas

    Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. Proposers of sessions for 3CS are encouraged to submit a brief statement describing their session idea. Student proposals are warmly welcomed!

    When you register, you will be asked to select a date to attend a Proposal Development Workshop. During this workshop and the following panel review and mentoring program, you will receive guidance and assistance in developing your proposal for the conference to meet the requirements for leading your session at an upcoming 3CS event. 

    There are three types of 3CS Sessions. When registering your idea, please indicate which type of session you have in mind, though the session type may change when you meet with your proposal development mentoring team.

    • Dialogue sessions:  A dialogue session is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. Dialogue proposals should specify a problem limiting the development of cybersecurity capability maturity that is not well understood or addressed. The proposal should also include 3-5 thought-provoking, open-ended questions that will gather insights and experiences from session attendees about the factors that are the likely and substantive causes of this problem as well as potential interventions that can impact the influence of causal factors to bring about a desired change in the problem. The goal of a Dialogue is to discover common themes and ideas for a future systematic study. 
    • Evidence-Based Practice Sessions: Methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. Proposals should specify how the method or intervention has impacted individual competence development or organizational effectiveness, preferably referencing the population studied and the correlation or effect size of the intervention factors on the level or degree of a desirable outcome or outcomes. Methods or interventions can be protocols or procedures for professional practice or curriculum or instructional designs for use by educators or trainers. 
    • Demonstrations: Technical demonstrations that showcase the capabilities and features of the technology or technique for raising cybersecurity capability maturity, preferably including a hands-on experience for the audience. Breakouts based on the proposed session type

    REGISTER NOW to submit your session idea!


    • August 01, 2025
    • 9:00 AM
    • July 20, 2026
    • 11:59 PM
    • Eastern Time
    Register


    Cyber Ready Mentor Workshop

    Held Weekly (select your preferred dates)

    REGISTER TO ATTEND A PEER MENTOR WORKSHOP 

    As a Cyber Ready Mentor, you will be contributing to generating the future workforce of the nation's cybersecurity capabilities to improve the readiness of cyber professionals to meet the growing and diversifying threats. Accordingly, those who conduct at least two reviews become CyberWatch G-Force Fellows who are eligible to receive travel stipends to attend all 3CS conferences leading up to and including the National 3CS.

    Mentors for CyberWatch work collaboratively panels assigned to a conference session or manuscript proposal. The panel includes up to 10 mentors, representing different stakeholder communities and areas of expertise, that evaluate a proposal with the objective of improving it to meet the requirements for leading a 3CS session or publishing a CSJ article. Thus, panel members provide collegial and constructive feedback as the author(s) iteratively develops a structured abstract and then the completed session proposal or draft manuscript.  

    This one-hour workshop will help prospective mentors understand our mission and the details of the iterative mentoring process before making a commitment to become CyberWatch G-Force Fellow. 

    If you are interested in learning more or becoming a mentor, please sign up for a Cyber Ready Mentor Workshop using the Register button to the left or clicking below.

    You will receive an email listing the date and time that you requested. A reminder email with the calendar invite will be sent at the beginning of the week in which your selected workshop will be conducted.

    REGISTER TO ATTEND A CYBER READY MENTOR WORKSHOP
    • October 17, 2025
    • May 15, 2026
    • Online
    Register


    IT Audit fundamentals scholarship program

    Register here to indicate your interest in applying for the IT Audit Fundamentals Scholarship Program, valued at $4,415, supported by the Microsoft Cybersecurity Scholarship Program.

    If accepted into this program, you will receive access to a step-by-step process to prepare for your personal career development plan.  The IT Audit Fundamentals process begins when you apply for the Cyber Ready Professionals program and includes the following benefits that will accrue as you complete the steps. NOTE: Scholarship funds that you receive must be deposited with the Cyber Ready Professional Program before you can complete steps 4 through 10. 

    1. Personalized assessments of your readiness to learn and become certified
    2. Access to GitHub events and Student Developer Pack
    3. Development of the essential professional skills to become employable
    4. Ten sessions with Certified Career Advisors and Coaches 
    5. Cyber Ready Mentors to guide showcasing your talent at the virtual Cybersecurity Capabilities and Careers Conference
    6. ISACA IT Audit Fundamentals Study Guide (eBook)
    7. One-year LinkedIn Premium subscription
    8. One-year Student ISACA Chapter Membership
    9. ISACA IT Audit Fundaments Exam Voucher
    10. Access to and the advising to obtain other scholarship programs 
    Take your next step in the scholarship program to receive free access to a world-renowned professional skill development platform ? Click here to apply

    Need more info first? Click here to attend an online information session.


    FAQ's

    Scholarships awards have now closed, but
    we will resume awards in early January of 2026.
    You can still submit an application to get ahead of the pack.  

    WHY APPLY FOR THE MICROSOFT CYBERSECURITY SCHOLARSHIP?


    Scholarship eligibility is determined by evidence of enrollment in an academic degree or certificate program that meets grantor requirements. Regardless of scholarship eligibility, you will receive support to preparing your personal career development plan.  Once you are enrolled in the Cyber Ready Professional Program, a Career Success Advisor will assist you in determining your eligibility for this and other Cyber Ready Professional Scholarship Programs.

    Brought to you by



    Last Mile Education Fund | Empower Future Innovators - Act Now



    • January 01, 2026
    • December 29, 2026
    • Eastern Time
    Register

    CyberWatch Cyber Ready Professionals Call for Mentors!

    Cyber Ready Mentors provide guidance to developing professionals in one or more phases of the Cyber Ready Professionals program. You can choose to become a reviewer in the coaching phase, a mentor in the credentialing phase, and/or a preceptor in the clinical phase.

    The Cybersecurity Skills Journal (CSJ) and the associated Cybersecurity Capabilities and Careers Symposia (3CS) are seeking members of the broader cybersecurity stakeholder community--including graduate students, educators, researchers, tech innovators, and practitioners from government and industry--to join our growing community of mentors for proposers of conference sessions and journal manuscripts. Cyber Ready Mentors are essential to publishing research that integrates and expands the methods, processes, and evidence of effective practices for skillful performance of cybersecurity job functions and roles. 

    For the 2025-26 academic year, after completing at least three reviews, Mentors are eligible to apply for a travel stipend up to $650 to attend regional 3CS events and up to $2,100 to attend the National 3CS based on distance from the workshop venue. All mentors who complete at least two reviews are recognized as a Fellow of the Cyber Ready G-Force -- the generating force raising cybersecurity capabilities and career readiness. Cyber Ready G-Force Fellows are eligible for free registration to the 3CS events for which they reviewed submissions.

    The CSJ Overview Briefing describes the types of manuscripts published in the Cybersecurity Skills Journal and our iterative manuscript development process. The 3CS Overview is especially valuable for students, faculty, or professionals who do have substantial experience presenting at conferences or publishing articles.  

    We periodically conduct a one-hour workshop to help prospective mentors understand our mission and the details of the iterative review and mentoring process before making a commitment to become a mentor. If you are interested in learning more or becoming a mentor, please click the Register button. Your confirmation email will provide a link to a page where you can select the date to attend a Mentor Workshop.

    • January 13, 2026
    • January 07, 2030
    • Online
    Register

    Cybersecurity Skills Journal (CSJ):
    Developing Dialogues for the NICE Special Issue

    CSJ and the NICE Framework Special Issue Series

    Studies that examine the usefulness, benefits, and challenges associated with the adoption, adaptation, or extension of the NICE Framework to improve learning and advance the state of cybersecurity capability maturity:

    • Call for Proposals – Special Issue: NICE Framework, vol. 2
    • Special Issue: NICE Framework, vol. 1 published in 2020
    • Digital release of NICE Special Issue vol. 2 planned for September 2023

    Publisher: National CyberWatch Center
    Date Published: June 6, 2023
    Classification: Analyze, Investigate, Operate and Maintain, Oversight and Development, Protect and Defend, Securely Provision
    Education Level: Higher Education, Informal Education, Vocational/Professional Development Education
    Type: Cybersecurity Skills Journal
    Language: English


    If you have questions or comments on this resource, Contact Us with your feedback. 



    • February 04, 2026
    • January 29, 2030
    • Online
    Register
    Mapping of the National CyberWatch Center’s Curriculum to National Workforce Competency Requirements


    If you have questions or comments on this resource, Contact Us with your feedback. 



    • February 04, 2026
    • January 29, 2030
    • Online
    Register

    Raising the BAR of Cybersecurity Capability Maturity: Five Years of Competency-based Instructional Design at the Community College Cyber Summit


    If you have questions or comments on this resource, Contact Us with your feedback. 



    • February 04, 2026
    • January 29, 2030
    • Online
    Register

    Cybersecurity Foundations Series: A Formative Competency- and Performance-Based Curriculum Program for Cybersecurity Education


    If you have questions or comments on this resource, Contact Us with your feedback. 



    • February 10, 2026
    • February 01, 2027
    • Online
    Register


    3CSv Conference Series
    Session Interest Form

    The 3CS Virtual (3CSv) Conference Series Session Interest Form is designed to gather participant input on the conference sessions that you are most interested in attending. Your responses will help us tailor session scheduling, allocate appropriate space and resources, and ensure the program reflects the needs and priorities of our attendees. Please review the session options carefully and indicate the topics that best align with your interests and goals. Your feedback is an essential part of creating a valuable and engaging conference experience.

    Workshop Dates: 1:00pm- 6:00pm Eastern Time

    • February 20, 2026
    • April 17, 2026
    • June 19, 2026
    • August 21, 2026

    Register for the 3CS Virtual (3CSv) Conference Series

    Register Here


         Conference Series Sessions     

    Why Cybersecurity Talent Struggles to Land Entry-Level Roles?

    This session explores the real-world barriers that prevent qualified entry-level cybersecurity professionals from being hired — despite certifications, degrees, or hands-on lab experience.

    Post-Quantum Crypto-Agility: A strategic roadmap to secure your business today

    This session introduces a practical solution: the Crypto-Agility Maturity Model. This model provides a structured, phased roadmap for organizations to transition from vulnerable cryptographic systems to quantum-safe alternatives

    CMMC: Where To Begin?

    A clear, easy-to-understand approach to support comprehension and application for small businesses in the Defense Industrial Base.

    An Open Dialogue on AI and Consumer-Based IoT

    Facilitation of an open discussion/dialogue on AI (AGI/ANI/ASI) and it's potential impact, positively &/or negatively, upon consumer-based IoT systems and devices.

    Prompted to Attack: Inside the Hacker’s AI Playbook

    Explore how attackers use generative AI, we use for defense, for phishing, prompt injection, and more. Step into the adversary’s mindset to expose risks and strengthen defenses through this dialogue session.

    Building Experience Through Scenario Based Hands On Cyber Security

    Shift from slides/lectures/publisher point-click to scenario based open learning through applied tools and techniques

    LaTeX Essentials: Enhance Your Writing and Publishing Skills

    LaTeX Essentials is a workshop designed to introduce participants to the essential skills needed for creating professional academic documents using LaTeX. In this hands-on session, attendees will learn how to set up basic LaTeX doc.

    Open-Source SOC System Showcase

    Demonstrate the capabilities of open-source SOC tools using a virtual environment. Content will include Wazuh SIEM, TheHive Case Management & Incident Response, and VirusTotal.

    Using Cyber Competitions to Bridge the Gap from Curriculum to Careers

    Share best practices for educators to utilize cyber competitions with their students to build technical skills and demonstrate job-readiness to employers.



    • February 20, 2026
    • 1:00 PM - 6:00 PM
    • Google Meet Online Conference
    • 88
    Register


    REGISTER NOW
    for our 2026 Virtual 3CS Series!

    First event coming up soon!

    Each 3CSv workshop is an engaging dialogue among the session attendees on topics that are new or controversial--providing a more interactive, virtual forum - different from most virtual conferences where presenters simply talk at the participants.

    Act Fast! Get all 4 events for HALF PRICE!
    Plus, MASSIVE discounts for Premium Members!
    Not a Premium Member? Consider joining today by clicking here.


    Four Workshop Dates in the Series

    (1:00pm- 6:00pm Eastern Time)

    February 20, 2026 
    April 17, 2026
    June 19, 2026
    August 21, 2026


    Sessions during the Feb 20th Workshop

    Great discussions for both students and professionals!

    Why Cybersecurity Talent Struggles to Land Entry-Level Roles
    Asseta Sanfo

    This session explores the real-world barriers that prevent qualified entry-level cybersecurity professionals from being hired — despite certifications, degrees, or hands-on lab experience. 

    Post-Quantum Cryptography and the HNDL Threat: Are We Ready?
    Victoire Adovoekpe
    With the HNDL threat, hackers are stealing encrypted data today so they can open it later with powerful quantum computers. Even though these machines can break our current security in hours, almost no data is protected by new quantum-safe locks yet. This presentation helps leaders understand why they must update their security now to keep sensitive secrets safe for years to come.

    Game On: Engaging technical students, faculty and staff in designing Esports co-curriculars for Elementary and Middle School Ecosystems
    Terrance Campbell
    Participants will design a cybersecurity-themed science eSports competition for grades 3–8, aligned with ISACA’s IT Audit Fundamentals. Selected teams may expand ideas into state events and future 3CS workshops.

    Questions arising from teacher/researcher agency and the effect on educational delivery of a work-ready workforce
    Ervin Frenzel
    Participants will discuss the questions that a coming up from teacher and research agencies and what affects the educational delivery of a work-ready workforce.


    3CSv Workshop Series Session Interest Form

    The 3CSv interest form is designed to gather participant input on the conference sessions that you are most interested in attending. Your responses will help us tailor session scheduling, allocate appropriate space and resources, and ensure the program reflects the needs and priorities of our attendees.

    Interest Form


    Workshop Format:

    Facilitated Online Focus Group
    Focus group sessions examine issues involving multiple stakeholder groups who are debating the goals, success factors (objectives), and effective practices for successful mitigation or resolution of challenges, opportunities, or dilemmas facing the cybersecurity community.



    The session will be recorded. An edited transcript may be prepared for publication in a Special Issue of the Cybersecurity Skills Journal. Session participants may elect to have their comments excluded from the transcript during registration.

    • May 31, 2033
    • Online
    Register




    National CyberWatch Center’s Cybersecurity Curriculum Guide: A Complete Solution for Higher Education Institutions v3

    This guide, now in its third iteration, provides a complete curriculum solution for higher education institutions looking to create new cybersecurity programs and courses, and/or update existing ones.

    The Guide is the culmination of input from the National CyberWatch Curriculum Standards Panels, industry partners, labor market demand research, and over 20 years of content development experience.

    In addition to complete degrees and certificate templates, the technical courses have been mapped to effective instructional design practices, cyber range labs, the National Security Agency/Dept. of Homeland Security National Centers of Academic Excellence in Cybersecurity (NCAE-C) Knowledge Units (KUs), the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800-181), and industry competency and capability maturity models.

    DOWNLOAD your copy today !!

    • May 31, 2033
    • Online
    Register


    Working Paper: Mitigating Machine Learning Risks within a Vulnerable SIEM to Prevent Biased SOC Decisions

    In this working paper, authors Landmesser and Vommi explore weaknesses in machine learning systems used by a SIEM that present a technical issue, which can also negatively influence decisions made by SOC personnel. Incorrect ML classifications from APT attacks result in incorrect security decisions based on SIEM output, causing an even more damaging impact on required incident response.

    • May 31, 2033
    • Online
    Register



    Working Paper: The Two-Sigma Solution: Why competency-based mastery learning is more effective in readying students to succeed in college and a career

    In the 21st century, good teachers are being asked to use the supercharged version of a curriculum-driven instructional model that treats [students] as if they were learning on an assembly line. Covering way too much content at an unreasonable rate, with rigid pacing guides that make it impossible to find time to shape instruction to meet the individual needs of students, the system is breaking down. In spite of teaching to the test, our children are not doing better on international comparisons or compared to previous decades.
    -- Bob Sornson (Over-tested and under-prepared, 2015)

    This guide explains why competency-based mastery learning (CBML) is more aligned with student and employer needs. We review how the four main CBML features noted above are disrupting institutions, deepening understanding, and accelerating the development of expertise.

    • May 31, 2033
    • Online
    Register



    Competence-Based Mastery Learning (CBML): A brief guide to what’s different about it and the effects on students and faculty

    Competency-Based Mastery Learning (CBML) is an evidence-based instructional design method that combines two techniques developed from research conducted by Benjamin Bloom. His research sought to overturn fundamental assumptions of the modern education system which originated in the early 20th century1. The Outcome-Based Education (OBE) model sought to select those worthy of advancement and career employment by conferring a learning outcome—a degree or certificate. OBE replaced an apprenticeship system of education that was not scalable. OBE was designed to make education available to the masses while ensuring efficient utilization of educational institution resources. Bloom believed that this instructional model was failing to meet the needs of most students and employers. The goal of education should not simply be graduation, but instead the development of proficient understanding as a foundation for developing competent performance in career-related learning objectives.

    • May 31, 2033
    • Online
    Register



    Hire Harford First: Designing and evaluating the effectiveness of adapting courses in an Information Assurance and Cybersecurity degree program to a Competency-Based Mastery Learning curriculum

    This Advanced Technological Education (ATE) project, entitled Hire Harford First, sought to “develop curriculum and educational materials that are based on ATE-funded CyberWatch Center's practices, and to disseminate curricula, course materials, and best practices to the ATE and broader educational community, including insights whether competency-based learning produces graduates who are better capable of making immediate positive contributions upon entering the workplace.” HHF was a three-year study in the design, development, and implementation of innovative curriculum designed to foster Competency-Based Mastery Learning (CBML). The results showed “the strong potential to…produce more graduates, since it will reduce attrition, encourage persistence, and attract more participants based on its reputation of success.” When fully-implemented, CBML instructional design and associated instructional methods that “flip the classroom” whereby faculty become success coaches rather than instructors for students produced proficiency improvement, on average, of 1.94 sigma. Additionally, this research revealed important constraints to fully achieving the benefits of CBML instructional designs. 



© 2025 Cyber Ready Professional Consortium  PRIVACY POLICY / TERMS OF USE

Powered by Wild Apricot Membership Software