Sponsors

Follow Us

Upcoming events

Menu
Log in


Upcoming events

    • August 06, 2018
    • December 31, 2030
    Register


    Cybersecurity Skills Journal: Practice and Research: Fall 2018 Special Issue: 3CS Anniversary Special Issue – Five Years of Raising the Capability Maturity Bar

    The launch of the first issue, Cybersecurity Skills Journal: Practice and Research -  3CS Anniversary Special Issue - Five Years of Raising the Capability Maturity Bar - coincides with the 5th Annual Community College Cyber Summit (3CS). Besides some path-breaking articles from our Innovations in Cybersecurity Education award-winners, most of the special issue is dedicated to listings of the capability-enhancing presentations that have occurred over the past five years at the 3CS.

    Table of Contents

    EXECUTIVE LETTER 

    RESEARCH PERSPECTIVES

    Raising the BAR of Cybersecurity Capability Maturity

    PRACTICE PERSPECTIVES

    Meeting Industry Needs for Secure Software Development 

    Have My Smart Lightbulbs Been Weaponized?

    THEORETICAL PERSPECTIVES 

    Competency is Not a Three Letter Word 

    3CS FIFTH ANNIVERSARY RESOURCE GUIDE Pathway Section: Fundamentals 

    Pathway Section: Specialty Areas

    RESOURCE GUIDE PRESENTER INDEX

    Click "Register" to request a free copy of the 3CS Anniversary Special Issue. Upon completion of the registration form a download link will be sent to your registered email address.


    • November 20, 2020
    • December 31, 2030
    Register



    The Cybersecurity Skills Journal: Practice and Research - NICE Framework Special Issue: Investigating Framework Adoption, Adaptation, or Extension - examines the usefulness, benefits, and challenges associated with the adoption, adaptation, or extension of the NICE Framework in cybersecurity practice, to improve learning, and advance the state of cybersecurity capability maturity.

    Table of Contents

    EXECUTIVE LETTER 

    PRACTICE PERSPECTIVES

    The CYBER security - Competency Health and Maturity Progression

    RESEARCH PERSPECTIVES

    Exploring Non-Technical Knowledge, Skills, and Abilities (KSA)

    Exploring Cognitive Processes to Develop Cybersecurity Defender Proficiency

    TEACHING PERSPECTIVES 

    Wireless Security: Examining the next NICE Framework Iteration 

    RESEARCH NOTE

    Cybersecurity Intelligence: A Novel Information Security Threat Mitigation

    TEACHING NOTE

    Does Cybersecurity Education Focus on the Right Things?

    Click "Register" to request a free copy of the NICE Special Issue. Upon completion of the registration form a download link will be sent to your registered email address.


    • April 22, 2021
    • September 16, 2033
    • Online
    Register



    This NSF-funded research project explored the viability of cybersecurity apprenticeships for federal agency pipeline support. During the 18-month effort – which ended in December 2020 – a Working Group of 15 federal, academic, and practitioner experts developed a strong dialog and presence in the apprenticeship space. Aided by close ties to the National Initiative for Cybersecurity Education (NICE) Working Group on Apprenticeships, the project developed a deeper understanding of the strengths and weaknesses of the apprenticeship model, and identified key ways to improve the adoption of apprenticeships.

    Primary Audience: Federal Cybersecurity human resources and hiring managers.

    Table of Contents

    1. Introduction to Apprenticeships
    2. What Do Current Apprenticeships Look Like?
    3. Current Apprenticeship Footprint
    4. Possible Barriers to Federal Adoption
    5. Available High-Level Models
    6. Engaging the Hiring Manager
    7. Aligning Academic and OJT Requirements
    8. The Value Proposition
    9. Seeding the Way: Pilot Proposals to Agencies
    10. Recommendations to NSF
    11. National CyberWatch Center Working Group Membership
    12. References
    • August 20, 2021
    • January 14, 2034
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    About the 2017 Innovations in Cybersecurity Education Publication

    The deadline for application submissions was March 15, 2017. Shortly after, a panel of cybersecurity educators and National CyberWatch partners reviewed these submissions, 44 in total (far exceeding previous year's submission totals), and selected 5 for recognition. This reference document was created listing all nominations and the 5 winners.



    • September 30, 2021
    • 9:00 AM
    • September 30, 2030
    • 11:59 PM
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    About the 2021 Innovations in Cybersecurity Education Publication

    With the forced transition to online learning across the education spectrum as a result of the COVID-19 pandemic, we decided to focus on the following theme for this year’s program:


    How can we best contribute to the needs and transformations that might occur for remote/online instruction in the post-COVID-19 world?


    Given the narrow focus of this year’s theme, we are treating this year’s publication as a Special Issue, which combines the top two submissions (as ranked by a panel of judges) with the results of our National Cybersecurity Student Association COVID-19 Perceptions Survey. This year was like no other; so is this year’s Innovations program.

    • September 28, 2022
    • 9:00 AM
    • September 28, 2032
    • 11:59 PM
    • Online
    Register



    The National CyberWatch Innovations in Cybersecurity Education program was launched in the winter of 2016, as part of National CyberWatch’s Awards & Recognition program.

    One of the major strengths of the National CyberWatch Center is its ability to aggregate and disseminate the capacity and creative experimentation found within our academic and workforce communities.


    The 2022 Innovations in Cybersecurity Education program (now in its 6th year), was built on the premise that our members are some of the best cybersecurity educational innovators, and that through our Center, they can share their innovations, accelerate their adoption, and receive proper recognition for their work. This publication is an example of this capacity and creativity in action.

    All National CyberWatch Center members received the online nomination form via various e-Blasts, the monthly e-Newsletter (NCC Communicator), social media campaigns, and dissemination/outreach via various partners. The deadline for submissions was May 10, 2022. Shortly after, a panel of cybersecurity educators and past Innovations winners reviewed the submissions and selected those for recognition in this publication.

    • January 01, 2023
    • September 01, 2026
    • online
    • 99986
    Register

    Download the National Cybersecurity Student Association Chapter Recruitment Sign-up Form

    • January 01, 2023
    • December 31, 2025
    Register

    Student Chapter invoicing for the National Cybersecurity Student Association. If you have any questions, contact us. 

    You can use your credit card or mail a check to; 

    National CyberWatch Center
    Prince George Community College Foundation
    Center for Advanced Technology (CAT), Room 129C
    301 LARGO ROAD
    LARGO, MD 20774


    Gus Hinojosa Jr. 
    Director, National Cybersecurity Student Association
    ghinojosa@nationalcyberwatch.org

    • May 23, 2023
    • January 21, 2027
    • online
    • 99970
    Register
    Download the National Cybersecurity Student Association Memberships & Chapters Information
    • May 24, 2023
    • May 25, 2033
    • Online
    Register


    Cybersecurity Skills Journal: Practice & Research

    Diversifying the Cybersecurity Workforce Special Issue

    This special issue, published in April 2023, includes a collection of dialogues, which capture a discussion among stakeholders about dilemmas or previously insurmountable challenges related to diversifying the cybersecurity workforce, cybersecurity skill assessment, development, recruitment, or evaluation.

    CSJ Dialogues may be edited recordings of a focus group session, interviews with subject matter experts, or conversations between practitioners, scholars, or educators exploring the goals, success factors (objectives), and effective practices for successful mitigation or resolution of problems or taking full advantage of opportunities facing the cybersecurity community.

    Click the "Register" button (upper-left) to receive the link to download this  publication.

    • May 31, 2023
    • May 31, 2033
    • Online
    Register



    2022 National CyberWatch Center's Annual Report

    This report highlights the tremendous impact that the CyberWatch Center has on increasing the readiness of workers, students, instructors, and researchers to meet the ever-growing threat to our nation’s security and prosperity. The CyberWatch Center’s many accomplishments would not be possible without the tremendous support and leadership provided by Dr. Corby Hovis, the ATE program director at the National Science Foundation, Dr. Falecia D. Williams, the president of Prince George’s Community College, our world-class program management team, and the hundreds of volunteers and dozens of alliance partners who guide and contribute their time, talent, and financial support of our programs.

    • September 14, 2023
    • 12:00 PM
    • September 15, 2033
    • Online
    Register


    State of and Trends in Cybersecurity Capability Maturity
    Call for Working Papers

    These preliminary research papers explore various aspects of the state of and trends in cybersecurity capability; that is, the level of progressive improvement to perform, or the readiness to perform, critical activities or functions.

    Want to disseminate progress made in grant-funded work, presentations of research findings at conferences, or other systematic investigations? If so, consider publishing working papers of your own.

    Click the Register button in the middle-left of this window to get started.

    • December 30, 2023
    • January 24, 2026
    • online
    • 99998
    Register


    • January 01, 2024
    • December 29, 2025
    • Eastern Time
    Register

    CyberWatch Cyber Ready Professionals Call for Mentors!

    Cyber Ready Mentors provide guidance to developing professionals in one or more phases of the Cyber Ready Professionals program. You can choose to become a reviewer in the coaching phase, a mentor in the credentialing phase, and/or a preceptor in the clinical phase.

    The Cybersecurity Skills Journal (CSJ) and the associated Cybersecurity Capabilities and Careers Symposia (3CS) are seeking members of the broader cybersecurity stakeholder community--including graduate students, educators, researchers, tech innovators, and practitioners from government and industry--to join our growing community of mentors for proposers of conference sessions and journal manuscripts. Cyber Ready Mentors are essential to publishing research that integrates and expands the methods, processes, and evidence of effective practices for skillful performance of cybersecurity job functions and roles. 

    For the 2025-26 academic year, after completing at least three reviews, Mentors are eligible to apply for a travel stipend up to $650 to attend regional 3CS events and up to $2,100 to attend the National 3CS based on distance from the workshop venue. All mentors who complete at least two reviews are recognized as a Fellow of the Cyber Ready G-Force -- the generating force raising cybersecurity capabilities and career readiness. Cyber Ready G-Force Fellows are eligible for free registration to the 3CS events for which they reviewed submissions.

    The CSJ Overview Briefing describes the types of manuscripts published in the Cybersecurity Skills Journal and our iterative manuscript development process. The 3CS Overview is especially valuable for students, faculty, or professionals who do have substantial experience presenting at conferences or publishing articles.  

    We periodically conduct a one-hour workshop to help prospective mentors understand our mission and the details of the iterative review and mentoring process before making a commitment to become a mentor. If you are interested in learning more or becoming a mentor, please click the Register button. Your confirmation email will provide a link to a page where you can select the date to attend a Mentor Workshop.

    • March 30, 2024
    • December 31, 2025
    • Online
    Register

    CYBER ARCADE INTEREST

    Student and chapter members. Do you like puzzles and games? Fill out this form to get notified when we host our Cyber Arcade games. If you have a student chapter, we can host a few games for your chapter members and/or go head to head with other student chapters. For more information, contact us at info@cyberstudents.org 

    • June 04, 2024
    • February 03, 2026
    • online
    • 99998
    Register
    Download the National Cybersecurity Student Association PGCC student flyer with student membership promo code. 
    • June 25, 2024
    • December 31, 2025
    Register

     Raise the BAR Mastery Badge Program: A Formative Credentialing of Cybersecurity Capability Maturity

    The BAR acronym stands for Behaviorally Anchored Rating. Much evidence shows that when BAR scales, based on the tasks that must be performed to excel in a career position, are used to evaluate capability maturity, the results are less biased and more accurate predictors of future job performance. The previous Raise the BAR assessments have been used by companies, such as IBM, to identify the most qualified candidates for open positions. This year’s program will also include the Core Concept Readiness Inventories which assess your stock of knowledge in four fundamental domains of information security:

    1) C-I-A Triad

    2) Controls, Threats & Attacks

    3) Cryptography

    4) Security Testing, Engineering, and Operations

    The Information Security Fundamentals Readiness Assessment will provide a proficiency profile and opportunity to earn badges in recognition for demonstration of conceptual understanding of the prerequisite knowledge for a career in information security and readiness to fully benefit from an information security fundamentals course. The Information Security Fundamentals Readiness Assessment is therefore ideal for a student who is in the beginning or middle of their educational program but can be of value to any student who wishes to demonstrate to prospective employers that they possess the knowledge required to apply information security concepts in information technology and networking job roles that are the feeders into cybersecurity specialist jobs. The complete Information Security Readiness Assessment takes about 30 minutes to complete.

    The Core Concept Readiness Inventories will provide a proficiency profile and opportunity to earn badges in recognition for demonstration of conceptual understanding of the core concepts of information security within the four domains listed above. These assessments are most appropriate for students who have completed a course in information security fundamentals. These concepts must be mastered to meet the requirements for jobs in Systems Engineering or an entry-level cybersecurity job as a Cybersecurity Technician or Specialist. Each of the four Core Concept Readiness Assessments will require about 15-30 minutes to fully complete.

    Question(s): Email us at info@nationalcyberwatch.org

    • June 28, 2024
    • February 27, 2026
    • online
    • 99951
    Register
    Download the National Cybersecurity Student Association Membership Programs Flyer
    • July 12, 2024
    • September 11, 2031
    • Online
    Register

    Beginning in Fall 2024, National CyberWatch Center is launching a Premium Membership for faculty with institutional chapters. Premium members receive 50% off coupons for program fees and are eligible to receive travel stipends to CyberWatch events. Please complete the inquiry form to indicate your interest in applying for premium individual or chapter membership.

    One of our membership coordinators will be in touch soon!

    National CyberWatch Center
    Chapter Development Team
    chapters@nationalcyberwatch.org

    • September 18, 2024
    • July 07, 2026
    Register

    Share Your Academic Work & Research Through Our Network

    Are you a student or faculty member who would like FREE marketing and branding? Look no further! Share you academic work with us through our rapidly growing worldwide audience. We can promote it via emails, our website, and/or social media platforms.! Make a name for yourself and stand out from the crowd today! If you have any further questions, please email info@cyberstudents.org.
    • September 18, 2024
    • September 30, 2026
    • Online
    Register

    Sign-up for Student Chapter Activities

    Do you have a National Cybersecurity Student Association Chapter? Are you interested in participating in a 1-hr activity for your chapter? If so, please fill out the application and someone will get back to you. The activities are listed in the application. Note: These activities are only available for Unites States chapters only at this time. 

    National Cybersecurity Student Association
    info@cyberstudents.org 

    • September 18, 2024
    • May 20, 2026
    • online
    • 99984
    Register
    Download the 2CDC Flyer
    • November 01, 2024
    • December 31, 2025
    Register

    Student Chapter invoicing for the National Cybersecurity Student Association. If you have any questions, contact us. 

    You can use your credit card or mail a check to; 

    National CyberWatch Center
    Prince George Community College Foundation
    Center for Advanced Technology (CAT), Room 129C
    301 LARGO ROAD
    LARGO, MD 20774


    Gus Hinojosa Jr. 
    Director, National Cybersecurity Student Association
    ghinojosa@nationalcyberwatch.org

    • January 01, 2025
    • 12:00 PM
    • December 31, 2025
    • 11:59 PM
    • Various locations
    Register


    Call For Proposals

    2025 Proposal Submissions accepted until 11:59 pm on September 30, 2025

    Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. The Cybersecurity Skills Journal (CSJ) publishes Special Issues with Articles, Notes and Dialogues that impact cybersecurity practice, improve learning, and advance the state of the cybersecurity workforce’s capability maturity. 

    3CS SESSION ORGANIZERS:

    Proposers of sessions for 3CS or manuscripts for CSJ are encouraged to submit a brief abstract of their session idea. Student proposals are warmly welcomed!

    The lead author of an accepted session proposal who has not previously presented their proposal is eligible for stipends to participate in a 3CS event. If you elect to attend in person and attend sessions throughout the event (including yours), you are eligible to receive a participation stipend of $200 and a travel stipend of up to $3,000 based on the distance from your home to the workshop venue. Stipend funding is limited. In addition to meeting the eligibility requirements, stipend availability is determined by the date of proposal acceptance and availability of funding from 3CS sponsors.

    Submit your session idea as soon as possible to ensure funds are available to support your attendance. When you register, you will be asked to select a date to attend a Proposal Development Workshop. During this workshop and the following panel review and mentoring program, you will receive guidance and assistance in developing your proposal for the conference to meet the requirements for leading your session at an upcoming 3CS event. If your session proposal is accepted to conduct a session at two regional 3CS events, you will be automatically eligible to conduct the session at the National 3CS.

    MANUSCRIPT AUTHORS

    Please view our current open Calls for Proposals for more information on individual Special Issue topics and timelines. Submissions may address any aspect of research into cybersecurity but must align with the Journal’s mission: emphasis should be placed on enhancing the capabilities of the cybersecurity practitioner, educator, or researcher, not on technology.

    Cybersecurity Skills Journal authors benefit from exceptional support, including but not limited to constructive advice received from 10-person peer review and mentoring panels. We encourage authors to submit rough ideas initially that may be iteratively developed into an appropriate manuscript format.

    OBSERVERS WELCOME: Want to learn how to develop a successful conference or publication proposal? Please select the "Observer" registration type to indicate that you wish to observe the workshop process to get a better idea of what is required to submit a successful proposal.



    • January 08, 2025
    • September 01, 2027
    Register

    The purpose of this form is to provide a student chapter semester update for the National Cybersecurity Student Association. If you have any questions, contact Gus Hinojosa Jr. at ghinojosa@nationalcyberwatch.org.  

    • January 14, 2025
    • September 01, 2027
    • Online
    Register

    The National Cybersecurity Student Association is inviting presentation proposals for their monthly webcast series. Whether you are a student, faculty member, or professional, we encourage you to submit a proposal related to career development or cybersecurity topics. If you have any questions, please reach out to us at info@cyberstudents.org.

    • Up to a 1-hr presentation. 
    • Must submit your presentation proposal to be approved. 
    • Presentation must be cybersecurity or career building related. 
    • January 24, 2025
    • December 31, 2025
    Register

    Student Chapter invoicing for the National Cybersecurity Student Association. If you have any questions, contact us. 

    You can use your credit card or mail a check to; 

    National CyberWatch Center
    Prince George Community College Foundation
    Center for Advanced Technology (CAT), Room 129C
    301 LARGO ROAD
    LARGO, MD 20774


    Gus Hinojosa Jr. 
    Director, National Cybersecurity Student Association
    ghinojosa@nationalcyberwatch.org

    • January 28, 2025
    • September 30, 2026
    • Zoom
    Register


    Thank you for your interest in the Cyber Ready Professionals Skills to Succeed Program. To register, click the "Register Button" on the bottom left. During registration, you will be asked to select the session date you wish to attend. WHEN SELECTING A SESSION TIME, ENSURE THAT THE SESSION WILL OCCUR AT LEAST 48 HOURS AFTER YOU REGISTER YOUR SELECTION.

    If you are unable to attend the session at the time you select, you may submit another registration to select a future session to attend.

    If you have not submitted an application for the program, please register HERE

    After you have registered, you will be sent an email with the webcast details. If you have questions, contact Dr. David Tobey at dtobey@nationalcyberwatch.org. 

    • February 01, 2025
    • 9:00 AM
    • June 30, 2026
    • 5:00 PM
    Register

    Get a Personal Coach
    Get the Professional Skills you Need to Succeed
    Get Scholarships for Certificate Program and Exam Fees.
    Get the Experience you need to become a Certified Professional
    Get Clients to start your Certified Cybersecurity Preparer (CCP) Practice

    The National CyberWatch Center, Accenture, ISACA, and Microsoft have partnered to bring you the Cyber Ready Professionals Program. Apply here and schedule your information session to learn about the program benefits, and the progressive training and coaching process to jumpstart your cybersecurity career.

    To attend a Cyber Ready Professionals information session, click HERE

    YOU MUST REGISTER WITH A *.EDU EMAIL ADDRESS TO BE ELIGIBLE.


    Sign up for FREE NCSA Participant membership HERE


    • March 06, 2025
    • December 31, 2025
    • Online
    Register

    This survey is part of Women in Cloud’s effort to develop a comprehensive research report and personalized assessment to uncover wellness challenges, identify healthcare gaps, and advocate for better education and resources. The insights gathered will help shape real solutions that support long-term well-being and economic security.

    The survey is open to all genders and age groups, and anyone who has experienced stress, burnout, brain fog, sleep issues, or other wellness challenges is encouraged to participate. You we be emailed a link to the survey once you register your interest here.




    Millions of people struggle with cognitive decline, stress overload, hormonal imbalances, and executive dysfunction—yet these challenges often go unrecognized and untreated. Whether it’s brain fog, decision fatigue, chronic stress, mood fluctuations, sleep disturbances, or energy crashes, these issues impact productivity, relationships, and overall quality of life.

    However, current data reveals critical gaps in healthcare and wellness support:

    • Over 60% of individuals experience challenges with cognition, mood, and stress management—but most don’t receive proper guidance.
    • Only 25% of those seeking medical care for hormonal or stress-related issues receive targeted treatment due to limited provider preparedness and healthcare gaps.
    • Less than 7% of primary care providers feel trained to address hormonal and cognitive health concerns, leaving millions underserved.
    • Declining use of proactive wellness strategies and therapies is leading to an increase in long-term chronic conditions and reduced workforce productivity.

    Why Your Participation Matters

    Your responses will help Women in Cloud develop a comprehensive research report and personalized assessment to:

    ✅ Uncover key wellness challenges across different demographics and identify patterns that impact executive function, cognitive health, and overall well-being.

    ✅ Identify critical healthcare gaps and missing resources, ensuring that individuals have access to the tools and support they need.

    ✅ Advocate for better education and awareness, equipping individuals, employers, and healthcare providers with science-backed solutions.

    ✅ Amplify personal stories and lived experiences, fostering a collective movement toward health, resilience, and empowerment.

    ✅ Contribute to making our ecosystem healthier and more economically secure, with research-backed wellness strategies that boost workforce performance and long-term economic stability.

    Who Should Take This Assessment?

    This survey is open to all genders and age groups—whether you are a professional, entrepreneur, student, caregiver, or retiree. If you’ve ever experienced:

    • Chronic stress, burnout, or mental fatigue
    • Brain fog, difficulty focusing, or memory challenges
    • Hormonal fluctuations, energy crashes, or sleep disturbances
    • Unexplained mood swings, anxiety, or emotional imbalances

    Then this assessment is for you.

    Be Part of the Solution

    Your insights will drive real change, enabling Women in Cloud and our partners to bridge healthcare gaps, develop personalized assessment, advocate for better policies, and connect people with experts and resources that support long-term well-being.

    Take the survey today and help shape a future where health, productivity, and well-being are prioritized for all.

    • June 24, 2025
    • 12:00 PM
    • June 23, 2026
    • 11:59 PM
    • Various locations
    Register


    Call For Session Ideas

    2025 Session Ideas accepted until 11:59 pm on August 10, 2025

    Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. Proposers of sessions for 3CS are encouraged to submit a brief statement describing their session idea. Student proposals are warmly welcomed!

    The lead author of an accepted session proposal is eligible for stipends to participate in a 3CS event. If you elect to attend in person and evaluate sessions throughout the event, you are eligible to receive a travel stipend of up to $3,000 based on the distance from your home to the workshop venue. 

    Stipend funding is limited, and the amounts are determined by the federal per diem rates for travel to the city on the dates of the event. In addition to meeting the eligibility requirements, stipend availability is determined by the date of proposal acceptance and availability of funding from 3CS sponsors.

    Submit your session idea as soon as possible to ensure funds are available to support your attendance. When you register, you will be asked to select a date to attend a Proposal Development Workshop. During this workshop and the following panel review and mentoring program, you will receive guidance and assistance in developing your proposal for the conference to meet the requirements for leading your session at an upcoming 3CS event. 

    There are three types of 3CS Sessions. When registering your idea, please indicate which type of session you have in mind, though the session type may change when you meet with your proposal development mentoring team.

    • Dialogue sessions:  A dialogue session is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. Dialogue proposals should specify a problem limiting the development of cybersecurity capability maturity that is not well understood or addressed. The proposal should also include 3-5 thought-provoking, open-ended questions that will gather insights and experiences from session attendees about the factors that are the likely and substantive causes of this problem as well as potential interventions that can impact the influence of causal factors to bring about a desired change in the problem. The goal of a Dialogue is to discover common themes and ideas for a future systematic study. 
    • Evidence-Based Practice Sessions: Methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. Proposals should specify how the method or intervention has impacted individual competence development or organizational effectiveness, preferably referencing the population studied and the correlation or effect size of the intervention factors on the level or degree of a desirable outcome or outcomes. Methods or interventions can be protocols or procedures for professional practice or curriculum or instructional designs for use by educators or trainers. 
    • Demonstrations: Technical demonstrations that showcase the capabilities and features of the technology or technique for raising cybersecurity capability maturity, preferably including a hands-on experience for the audience. Breakouts based on the proposed session type

    REGISTER NOW to submit your session idea!


    • August 01, 2025
    • 9:00 AM
    • July 20, 2026
    • 11:59 PM
    • Eastern Time
    Register


    Cyber Ready Mentor Workshop

    Held Weekly (select your preferred dates)

    REGISTER TO ATTEND A PEER MENTOR WORKSHOP 

    As a Cyber Ready Mentor, you will be contributing to generating the future workforce of the nation's cybersecurity capabilities to improve the readiness of cyber professionals to meet the growing and diversifying threats. Accordingly, those who conduct at least two reviews become CyberWatch G-Force Fellows who are eligible to receive travel stipends to attend all 3CS conferences leading up to and including the National 3CS.

    Mentors for CyberWatch work collaboratively panels assigned to a conference session or manuscript proposal. The panel includes up to 10 mentors, representing different stakeholder communities and areas of expertise, that evaluate a proposal with the objective of improving it to meet the requirements for leading a 3CS session or publishing a CSJ article. Thus, panel members provide collegial and constructive feedback as the author(s) iteratively develops a structured abstract and then the completed session proposal or draft manuscript.  

    This one-hour workshop will help prospective mentors understand our mission and the details of the iterative mentoring process before making a commitment to become CyberWatch G-Force Fellow. 

    If you are interested in learning more or becoming a mentor, please sign up for a Cyber Ready Mentor Workshop using the Register button to the left or clicking below.

    You will receive an email listing the date and time that you requested. A reminder email with the calendar invite will be sent at the beginning of the week in which your selected workshop will be conducted.

    REGISTER TO ATTEND A CYBER READY MENTOR WORKSHOP
    • October 17, 2025
    • December 26, 2025
    • Online
    Register

    IT Audit fundamentals scholarship program

    Register here to indicate your interest in applying for the ISACA IT Audit Fundamentals Scholarship Program, valued at $4,415, supported by the Microsoft Cybersecurity Scholarship Program.

    If accepted into this program, you will receive:

    • Step-by-step assignments to preparing your personal career development plan
    • Personalized assessments of your readiness to learn and become certified
    • 10 sessions with Certified Career Advisors and Coaches
    • Development of the essential professional skills to become employable
    • ISACA IT Audit Fundamentals Study Guide (eBook)
    • ISACA IT Audit Fundaments Exam Voucher (free exam)
    • A team of Cyber Ready Mentors to guide showcasing your talent at the virtual Cybersecurity Capabilities and Careers Conference
    • Access to and the advising to obtain other scholarship programs 
    • 1-year LinkedIn Premium subscription
    • 1-year Student ISACA Chapter Membership
    • Access to GitHub events and Student Developer Pack
    Haven't joined Cyber Ready Professionals yet? Click here to apply

    Need more info first? Click here to attend an online information session.

    WHY APPLY FOR AN ISACA IT AUDIT FUNDAMENTALS SCHOLARSHIP?


    Scholarship eligibility is determined by evidence of enrollment in an academic degree or certificate program that meets grantor requirements. Regardless of scholarship eligibility, you will receive support to preparing your personal career development plan.  Once you are enrolled in the Cyber Ready Professional Program, a Career Success Advisor will assist you in determining your eligibility for this and other Cyber Ready Professional Scholarship Programs.

    Brought to you by



    Last Mile Education Fund | Empower Future Innovators - Act Now



    • December 30, 2025
    • 11:59 PM
    • Zoom Online Conference
    Register


    Register for a
    Proposal Development Workshop

    Held Bi-Weekly (select your preferred dates)

    2025 Proposal Submissions accepted until 11:59 pm on December 30, 2025

    Please click the REGISTER button on the bottom left of this screen

    Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. For more information about proposal requirements and submit a session or manuscript idea, please access the 2025 Call for Proposals: Cybersecurity Capabilities and Careers Summit (3CS). Submit your session idea as soon as possible to ensure funds are available to support your attendance. Please view our current open Cybersecurity Skills Journal Calls for Proposals for more information on individual Special Issue topics and timelines.

    Proposers of sessions for 3CS or manuscripts for CSJ only need to submit a topic title and a brief description of their idea to get started. Student proposals are warmly welcomed!

    WORKSHOP AGENDA

    1. Introductions and Workshop Program Review

    2. Breakouts by symposium based on the proposal type. Depending on the number of proposals submitted to the workshop, the breakouts may be held simultaneously or in a sequence. Breakouts are led by a 3CS program chair or CSJ section editor with assigned mentors. Each proposal discussion is planned for 10 to 20 minutes to allow ample time for presentation of the session idea and discussion on how to develop the proposal to meet 3CS or CSJ requirements.

    Guided development of a session proposal pitch.

    Dialogue sessions:  A dialogue session is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. Dialogue proposals should specify a problem limiting the development of cybersecurity capability maturity that is not well understood or addressed. The proposal should also include 3-5 thought-provoking, open-ended questions that will gather insights and experiences from session attendees about the factors that are the likely and substantive causes of this problem as well as potential inverventions that can impact the influence of causal factors to bring about a desired change in the problem. The goal of a Dialogue is to discover common themes and ideas for a future systematic study. 

    Evidence-Based Practice Sessions: Methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. Proposals should specify how the method or intervention has impacted individual competence development or organizational effectiveness, preferably referencing the population studied and the correlation or effect size of the intervention factors on the level or degree of a desirable outcome or outcomes. Methods or interventions can be protocols or procedures for professional practice or curriculum or instructional designs for use by educators or trainers. 

    Demonstrations: Technical demonstrations that showcase the capabilities and features of the technology or technique for raising cybersecurity capability maturity, preferably including a hands-on experience for the audience. Breakouts based on the proposed session type

    Prospective authors of CSJ articles are asked to review the CSJ Overview Presentation before attending the Proposal Development Workshop. This presentation will help you to understand the Journal's mission, types of manuscripts, initial submission requirements, and timeline.

    WORKSHOP MENTORS:

    All workshop mentors are recognized as a Fellow of the Cyber Ready G-Force -- the generating force raising cybersecurity capabilities and career readiness. Please register here if you are willing to volunteer as a mentor to proposers of session and manuscript proposals.

    OBSERVERS WELCOME: Want to learn how to develop a successful conference, grant, or publication proposal? Please select the "Observer" registration type to indicate that you wish to observe the workshop process to get a better idea of what is required to submit a proposal for a 3CS session or a CSJ manuscript.


    QUESTIONS: Email us at info@nationalcyberwatch.org

    • May 31, 2033
    • Online
    Register




    National CyberWatch Center’s Cybersecurity Curriculum Guide: A Complete Solution for Higher Education Institutions v3

    This guide, now in its third iteration, provides a complete curriculum solution for higher education institutions looking to create new cybersecurity programs and courses, and/or update existing ones.

    The Guide is the culmination of input from the National CyberWatch Curriculum Standards Panels, industry partners, labor market demand research, and over 20 years of content development experience.

    In addition to complete degrees and certificate templates, the technical courses have been mapped to effective instructional design practices, cyber range labs, the National Security Agency/Dept. of Homeland Security National Centers of Academic Excellence in Cybersecurity (NCAE-C) Knowledge Units (KUs), the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NIST Special Publication 800-181), and industry competency and capability maturity models.

    DOWNLOAD your copy today !!

    • May 31, 2033
    • Online
    Register


    Working Paper: Mitigating Machine Learning Risks within a Vulnerable SIEM to Prevent Biased SOC Decisions

    In this working paper, authors Landmesser and Vommi explore weaknesses in machine learning systems used by a SIEM that present a technical issue, which can also negatively influence decisions made by SOC personnel. Incorrect ML classifications from APT attacks result in incorrect security decisions based on SIEM output, causing an even more damaging impact on required incident response.

    • May 31, 2033
    • Online
    Register



    Working Paper: The Two-Sigma Solution: Why competency-based mastery learning is more effective in readying students to succeed in college and a career

    In the 21st century, good teachers are being asked to use the supercharged version of a curriculum-driven instructional model that treats [students] as if they were learning on an assembly line. Covering way too much content at an unreasonable rate, with rigid pacing guides that make it impossible to find time to shape instruction to meet the individual needs of students, the system is breaking down. In spite of teaching to the test, our children are not doing better on international comparisons or compared to previous decades.
    -- Bob Sornson (Over-tested and under-prepared, 2015)

    This guide explains why competency-based mastery learning (CBML) is more aligned with student and employer needs. We review how the four main CBML features noted above are disrupting institutions, deepening understanding, and accelerating the development of expertise.

    • May 31, 2033
    • Online
    Register



    Competence-Based Mastery Learning (CBML): A brief guide to what’s different about it and the effects on students and faculty

    Competency-Based Mastery Learning (CBML) is an evidence-based instructional design method that combines two techniques developed from research conducted by Benjamin Bloom. His research sought to overturn fundamental assumptions of the modern education system which originated in the early 20th century1. The Outcome-Based Education (OBE) model sought to select those worthy of advancement and career employment by conferring a learning outcome—a degree or certificate. OBE replaced an apprenticeship system of education that was not scalable. OBE was designed to make education available to the masses while ensuring efficient utilization of educational institution resources. Bloom believed that this instructional model was failing to meet the needs of most students and employers. The goal of education should not simply be graduation, but instead the development of proficient understanding as a foundation for developing competent performance in career-related learning objectives.

    • May 31, 2033
    • Online
    Register



    Hire Harford First: Designing and evaluating the effectiveness of adapting courses in an Information Assurance and Cybersecurity degree program to a Competency-Based Mastery Learning curriculum

    This Advanced Technological Education (ATE) project, entitled Hire Harford First, sought to “develop curriculum and educational materials that are based on ATE-funded CyberWatch Center's practices, and to disseminate curricula, course materials, and best practices to the ATE and broader educational community, including insights whether competency-based learning produces graduates who are better capable of making immediate positive contributions upon entering the workplace.” HHF was a three-year study in the design, development, and implementation of innovative curriculum designed to foster Competency-Based Mastery Learning (CBML). The results showed “the strong potential to…produce more graduates, since it will reduce attrition, encourage persistence, and attract more participants based on its reputation of success.” When fully-implemented, CBML instructional design and associated instructional methods that “flip the classroom” whereby faculty become success coaches rather than instructors for students produced proficiency improvement, on average, of 1.94 sigma. Additionally, this research revealed important constraints to fully achieving the benefits of CBML instructional designs. 



© 2025 Cyber Ready Professional Consortium  PRIVACY POLICY / TERMS OF USE

Powered by Wild Apricot Membership Software