NSA s Centers of Academic Excellence in Cyber Security

Size: px
Start display at page:

Download "NSA s Centers of Academic Excellence in Cyber Security"

Transcription

1 NSA s Centers of Academic Excellence in Cyber Security

2 Centers of Academic Excellence in Cybersecurity NSA/DHS CAEs in Cyber Defense (CD) NSA CAEs in Cyber Operations (CO) Lynne Clark, Chief, NSA/DHS CAEs in CD Program Office Heather Eikenberry, NSA CAEs in CO Program Manager

3 Centers of Academic Excellence (CAE) Purpose Meet National workforce needs Reduce vulnerability in our national information infrastructure Promote higher education and research in IA/CD Produce a growing number of professionals with cybersecurity expertise for the Nation Creating the workforce NSA and DoD need Deeply technical, interdisciplinary, BS/MS level Grow workforce pipeline for NSA and DoD Enhance the national security posture of our Nation CAE CO offers a 12 week summer internship

4 Creating Tomorrow s Workforce Began in 1999 with seven schools; as of 2016: CAE 2Y: 38 Designated CAE CDE: 144 Designated CAE R: 66 Designated Target: 10% Growth each year continuous CAE input on standards 209 Total All CAE CO also CAE CD Re designation every five years Increased info sharing between CAEs Began in 2012 with four schools designated As of 2016, 16 schools designated Target: 25 schools designated standards continually elevated

5 CAE-C Designated Institutions AK WA ME OR CA NV ID AZ UT MT WY CO NM ND SD NE KS OK MN WI IA IL MO AR MS NY MI PA OH IN WV VA KY NC TN SC AL GA VT NH MA RI CT NJ DE MD & DC TX LA HI FL NSA/DHS CAE CDs NSA/DHS CAE CDs & NSA CAE COs Six state currently have no designated CAEs PR

6 CAE-C Program Partnerships DoD NIST National Initiative for Cybersecurity Education NICE Interagency WG NICE WG Collegiate SWG Industry NSA NCS College of Cyber CAE-CO Program/ CAE-CO Summer Internship NSA NCS College of Cyber DHS National Cybersecurity Training & Education Program CAE-CD Program Academia CAE-C Institutions EOP / OMB Cybersecurity National Action Plan (CNAP) NSF CyberCorps : Scholarship for Service (SFS) Program NSA/NSF GenCyber Program

7 Emphasis on Workforce Burning Glass study on Cybersecurity Workforce 84% of job postings require at least a BA or BS Only 17% accept less than 2 years experience 10% require a security clearance Volume of listings increased 91% from 2010 to 2014 CAE-CD placing emphasis on educating students as preparation for careers Mapping to DHS/NICE Cybersecurity Workforce Framework

8 CAE-CD Program Expansion CAE-CD Schools High school outreach and pipeline development Peer Reviewers CAE Regional Resource Centers Faculty Development Program Development for new schools Mentoring and application assistance Outreach and pipeline Peer Reviewers New School program development Mentoring & application assistance Faculty Development

9 Examples CAE-CO Impact 300% enrollment increase Increased opportunities for NSF grants Stopped State Funding Cuts Influencing regional collegiate programs and outreach activities Increased contact from government and industry seeking partnerships Collegiate level Red Team vs. Blue Team exercises between CAE CO schools Administration support to increase faculty and programs for Cyber Operations curriculum Chosen by State government to consult on Cyber Security Councils

10 CAE-CO Summer Intern Program Unique 12 week Summer Program Hands on Education + Briefers + CAPSTONE Topics: Reverse Engineering & Vulnerability Discovery SCADA Cellular/Mobile Cyber Operations Virtualization and Security Fundamentals Digital Forensics Memory Analysis Exploitation Development Instructors are Academic Subject Matter Experts from U.S. Schools

11 UNCLASSIFIED CAE CO Summer Intern Program 2013: 8 Interns 2014: 13 Interns 2015 : 16 interns 2016 : 21 interns 100% of eligible Interns accept NSA Job Offers! 11

12 Tina Ladabouche GenCyber Program Manager

13 GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation Improve teaching methods for delivering cybersecurity content in K-12 curricula

14 GenCyber Program Summer Camp attendees K-12 students and teachers Duration: 1-2 weeks, residential/non-residential Computer background not required Provided at no cost to the participants

15 GenCyber Program Growth Camps Institutions States

16 2016 GenCyber Camps SC MI KS AL IL PR VA -NJ -DE MN TX AZ OH PA FL GA IA CA NY -MD -DC -MA -RI LA OK NM WA ID NV CO SD NE MO AR IN MS TN WV NC VT \ -NH -CT UT ME ME ND WY OR KY WI 120 Camps Students/ Teachers

17 Additional Information CAE in Cyber Operations Program Office CAE in Cyber Defense Program Office

Tina Ladabouche. GenCyber Program Manager

Tina Ladabouche. GenCyber Program Manager Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation

More information

Telecommunications and Internet Access By Schools & School Districts

Telecommunications and Internet Access By Schools & School Districts Universal Service Funding for Schools and Libraries FY2014 E-rate Funding Requests Telecommunications and Internet Access By Schools & School Districts Submitted to the Federal Communications Commission,

More information

Accommodating Broadband Infrastructure on Highway Rights-of-Way. Broadband Technology Opportunities Program (BTOP)

Accommodating Broadband Infrastructure on Highway Rights-of-Way. Broadband Technology Opportunities Program (BTOP) Accommodating Broadband Infrastructure on Highway Rights-of-Way Broadband Technology Opportunities Program (BTOP) Introduction Andy Spurgeon Director of Special Projects Denver, CO Key Responsibilities

More information

DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. [Docket No. FR-6090-N-01]

DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. [Docket No. FR-6090-N-01] Billing Code 4210-67 This document is scheduled to be published in the Federal Register on 04/05/2018 and available online at https://federalregister.gov/d/2018-06984, and on FDsys.gov DEPARTMENT OF HOUSING

More information

Department of Business and Information Technology College of Applied Science and Technology The University of Akron

Department of Business and Information Technology College of Applied Science and Technology The University of Akron Department of Business and Information Technology College of Applied Science and Technology The University of Akron 2017 Spring Graduation Exit Survey Q1 - How would you rate your OVERALL EXPERIENCE at

More information

IT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President

IT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President IT Modernization in State Government Drivers, Challenges and Successes Bo Reese State Chief Information Officer, Oklahoma NASCIO President Top 10: State CIO Priorities for 2018 1. Security 2. Cloud Services

More information

Panelists. Patrick Michael. Darryl M. Bloodworth. Michael J. Zylstra. James C. Green

Panelists. Patrick Michael. Darryl M. Bloodworth. Michael J. Zylstra. James C. Green Panelists Darryl M. Bloodworth Dean, Mead, Egerton, Bloodworth, Capouano & Bozarth Orlando, FL dbloodworth@deanmead James C. Green VP, General Counsel & Corporate Secretary MANITOU AMERICAS, INC. West

More information

Presented on July 24, 2018

Presented on July 24, 2018 Presented on July 24, 2018 Copyright 2018 NCCAOM. Any use of these materials, including reproduction, modification, distribution or republication without the prior written consent of NCCAOM is strictly

More information

State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency

State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency NCSL Communications, Financial Services and Interstate Commerce Committee December 10, 2010 Doug Robinson, Executive Director

More information

2018 NSP Student Leader Contact Form

2018 NSP Student Leader Contact Form 2018 NSP Student Leader Contact Form Welcome to the Office of New Student Programs! We are extremely excited to have you on our team. Please complete the below form to confirm your acceptance. Student

More information

MAKING MONEY FROM YOUR UN-USED CALLS. Connecting People Already on the Phone with Political Polls and Research Surveys. Scott Richards CEO

MAKING MONEY FROM YOUR UN-USED CALLS. Connecting People Already on the Phone with Political Polls and Research Surveys. Scott Richards CEO MAKING MONEY FROM YOUR UN-USED CALLS Connecting People Already on the Phone with Political Polls and Research Surveys Scott Richards CEO Call Routing 800 Numbers Call Tracking Challenge Phone Carriers

More information

Ocean Express Procedure: Quote and Bind Renewal Cargo

Ocean Express Procedure: Quote and Bind Renewal Cargo Ocean Express Procedure: Quote and Bind Renewal Cargo This guide provides steps on how to Quote and Bind your Renewal business using Ocean Express. Renewal Process Click the Ocean Express link within the

More information

Post Graduation Survey Results 2015 College of Engineering Information Networking Institute INFORMATION NETWORKING Master of Science

Post Graduation Survey Results 2015 College of Engineering Information Networking Institute INFORMATION NETWORKING Master of Science INFORMATION NETWORKING Amazon (4) Software Development Engineer (3) Seattle WA Software Development Engineer Sunnyvale CA Apple GPU Engineer Cupertino CA Bloomberg LP Software Engineer New York NY Clari

More information

Figure 1 Map of US Coast Guard Districts... 2 Figure 2 CGD Zip File Size... 3 Figure 3 NOAA Zip File Size By State...

Figure 1 Map of US Coast Guard Districts... 2 Figure 2 CGD Zip File Size... 3 Figure 3 NOAA Zip File Size By State... Table of Contents NOAA RNC Charts (By Coast Guard District, NOAA Regions & States) Overview... 1 NOAA RNC Chart File Locations... 2 NOAA RNC by Coast Guard Districts(CGD)... 2 NOAA RNC By States... 3 NOAA

More information

A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis

A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis Paper 2641-2015 A New Method of Using Polytomous Independent Variables with Many Levels for the Binary Outcome of Big Data Analysis ABSTRACT John Gao, ConstantContact; Jesse Harriott, ConstantContact;

More information

CostQuest Associates, Inc.

CostQuest Associates, Inc. Case Study U.S. 3G Mobile Wireless Broadband Competition Report Copyright 2016 All rights reserved. Case Study Title: U.S. 3G Mobile Wireless Broadband Competition Report Client: All Service Area: Economic

More information

The Lincoln National Life Insurance Company Universal Life Portfolio

The Lincoln National Life Insurance Company Universal Life Portfolio The Lincoln National Life Insurance Company Universal Life Portfolio State Availability as of 03/26/2012 PRODUCTS AL AK AZ AR CA CO CT DE DC FL GA GU HI ID IL IN IA KS KY LA ME MP MD MA MI MN MS MO MT

More information

Silicosis Prevalence Among Medicare Beneficiaries,

Silicosis Prevalence Among Medicare Beneficiaries, Silicosis Prevalence Among Medicare Beneficiaries, 1999 2014 Megan Casey, RN, BSN, MPH Nurse Epidemiologist Expanding Research Partnerships: State of the Science June 21, 2017 National Institute for Occupational

More information

Global Forum 2007 Venice

Global Forum 2007 Venice Global Forum 2007 Venice Broadband Infrastructure for Innovative Applications In Established & Emerging Markets November 5, 2007 Jacquelynn Ruff VP, International Public Policy Verizon Verizon Corporate

More information

Distracted Driving- A Review of Relevant Research and Latest Findings

Distracted Driving- A Review of Relevant Research and Latest Findings Distracted Driving- A Review of Relevant Research and Latest Findings National Conference of State Legislatures Louisville, KY July 27, 2010 Stephen Oesch The sad fact is that in the coming weeks in particular,

More information

Name: Business Name: Business Address: Street Address. Business Address: City ST Zip Code. Home Address: Street Address

Name: Business Name: Business Address: Street Address. Business Address: City ST Zip Code. Home Address: Street Address Application for Certified Installer Onsite Wastewater Treatment Systems (CIOWTS) Credentials Rev. 6/2012 Step 1. Name and Address of Applicant (Please print or type.) Name: Business Name:_ Business Address:

More information

B.2 Measures of Central Tendency and Dispersion

B.2 Measures of Central Tendency and Dispersion Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine

More information

Fall 2007, Final Exam, Data Structures and Algorithms

Fall 2007, Final Exam, Data Structures and Algorithms Fall 2007, Final Exam, Data Structures and Algorithms Name: Section: Email id: 12th December, 2007 This is an open book, one crib sheet (2 sides), closed notebook exam. Answer all twelve questions. Each

More information

2018 Supply Cheat Sheet MA/PDP/MAPD

2018 Supply Cheat Sheet MA/PDP/MAPD 2018 Supply Cheat Sheet MA/PDP/MAPD Please Note: All agents must be contracted, appointed and certified to order supplies and write business. AETNA/COVENTRY Website: www.aetnamedicare.com A. Click For

More information

2015 DISTRACTED DRIVING ENFORCEMENT APRIL 10-15, 2015

2015 DISTRACTED DRIVING ENFORCEMENT APRIL 10-15, 2015 2015 DISTRACTED DRIVING ENFORCEMENT APRIL 10-15, 2015 DISTRACTED DRIVING ENFORCEMENT CAMPAIGN COMMUNICATIONS DISTRACTED DRIVING ENFORCEMENT CAMPAIGN Campaign Information Enforcement Dates: April 10-15,

More information

Moonv6 Update NANOG 34

Moonv6 Update NANOG 34 Moonv6 Update Outline What is Moonv6? Previous Moonv6 testing April Application Demonstration Future Moonv6 Test Items 2 What is Moonv6? An international project led by the North American IPv6 Task Force

More information

Best Practices in Rapid Deployment of PI Infrastructure and Integration with OEM Supplied SCADA Systems

Best Practices in Rapid Deployment of PI Infrastructure and Integration with OEM Supplied SCADA Systems Best Practices in Rapid Deployment of PI Infrastructure and Integration with OEM Supplied SCADA Systems Kevin Schroeder & Mike Liska OVERVIEW Company Overview Data Background/History Challenges Solutions

More information

MERGING DATAFRAMES WITH PANDAS. Appending & concatenating Series

MERGING DATAFRAMES WITH PANDAS. Appending & concatenating Series MERGING DATAFRAMES WITH PANDAS Appending & concatenating Series append().append(): Series & DataFrame method Invocation: s1.append(s2) Stacks rows of s2 below s1 Method for Series & DataFrames concat()

More information

Team Members. When viewing this job aid electronically, click within the Contents to advance to desired page. Introduction... 2

Team Members. When viewing this job aid electronically, click within the Contents to advance to desired page. Introduction... 2 Introduction Team Members When viewing this job aid electronically, click within the Contents to advance to desired page. Contents Introduction... 2 About STARS -... 2 Technical Assistance... 2 STARS User

More information

CSE 781 Data Base Management Systems, Summer 09 ORACLE PROJECT

CSE 781 Data Base Management Systems, Summer 09 ORACLE PROJECT 1. Create a new tablespace named CSE781. [not mandatory] 2. Create a new user with your name. Assign DBA privilege to this user. [not mandatory] 3. SQL & PLSQL Star Courier Pvt. Ltd. a part of the evergreen

More information

State HIE Strategic and Operational Plan Emerging Models. February 16, 2011

State HIE Strategic and Operational Plan Emerging Models. February 16, 2011 State HIE Strategic and Operational Plan Emerging Models February 16, 2011 Goals and Objectives The State HIE emerging models can be useful in a wide variety of ways, both within the ONC state-level HIE

More information

A Capabilities Presentation

A Capabilities Presentation A Capabilities Presentation Full Systems Integrator, Value-Add-Reseller, Service Provider for the Federal, State and Local market. Founded in 2006 by former Military IT professionals with Telecommunications,

More information

Amy Schick NHTSA, Occupant Protection Division April 7, 2011

Amy Schick NHTSA, Occupant Protection Division April 7, 2011 Amy Schick NHTSA, Occupant Protection Division April 7, 2011 In 2009, nearly 5,550 people were killed and an additional 448,000 were injured in crashes involving distraction, accounting for 16% of fatal

More information

Charter EZPort User Guide

Charter EZPort User Guide Charter EZPort User Guide Version 2.4 September 14, 2017 Contents Document Information... 3 Version Notice and Change Log... 3 General... 6 Getting Started...7 System Requirements... 7 Initial Access Procedure...

More information

UTCS Scholarships for Service

UTCS Scholarships for Service Preparing for a Career in Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Fall, 2018 Slideset 1: 1 We Need Cyber Warriors: Recent News Items The Cybersecurity Talent

More information

AASHTO s National Transportation Product Evaluation Program

AASHTO s National Transportation Product Evaluation Program www.ntpep.org 8/20/2013 AASHTO s National Transportation Product Evaluation Program What is NTPEP? How to access data NTPEP generates-datamine Review of NTPEP Technical Committees for Traffic and Safety

More information

The Outlook for U.S. Manufacturing

The Outlook for U.S. Manufacturing The Outlook for U.S. Manufacturing Economic Forecasting Conference J. Mack Robinson College of Business Georgia State University Atlanta, GA November 15, 2006 William Strauss Senior Economist and Economic

More information

THE LINEAR PROBABILITY MODEL: USING LEAST SQUARES TO ESTIMATE A REGRESSION EQUATION WITH A DICHOTOMOUS DEPENDENT VARIABLE

THE LINEAR PROBABILITY MODEL: USING LEAST SQUARES TO ESTIMATE A REGRESSION EQUATION WITH A DICHOTOMOUS DEPENDENT VARIABLE PLS 802 Spring 2018 Professor Jacoby THE LINEAR PROBABILITY MODEL: USING LEAST SQUARES TO ESTIMATE A REGRESSION EQUATION WITH A DICHOTOMOUS DEPENDENT VARIABLE This handout shows the log of a Stata session

More information

Contact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center.

Contact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center. Contact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center. Welcome Mitch Roth Business to Business Compliance Protocols ATA General Counsel Partner Williams

More information

PulseNet Updates: Transitioning to WGS for Reference Testing and Surveillance

PulseNet Updates: Transitioning to WGS for Reference Testing and Surveillance National Center for Emerging and Zoonotic Infectious Diseases PulseNet Updates: Transitioning to WGS for Reference Testing and Surveillance Kelley Hise, MPH Enteric Diseases Laboratory Branch Division

More information

Prizm. manufactured by. White s Electronics, Inc Pleasant Valley Road Sweet Home, OR USA. Visit our site on the World Wide Web

Prizm. manufactured by. White s Electronics, Inc Pleasant Valley Road Sweet Home, OR USA. Visit our site on the World Wide Web Prizm II III IV * V Prizm manufactured by White s Electronics, Inc. 1011 Pleasant Valley Road Sweet Home, OR 97386 USA Visit our site on the World Wide Web www.whiteselectronics.com for the latest information

More information

Presentation Outline. Effective Survey Sampling of Rare Subgroups Probability-Based Sampling Using Split-Frames with Listed Households

Presentation Outline. Effective Survey Sampling of Rare Subgroups Probability-Based Sampling Using Split-Frames with Listed Households Effectve Survey Samplng of Rare Subgroups Probablty-Based Samplng Usng Splt-Frames wth Lsted Households Nature of the Problem Presentaton Outlne Samplng Alternatves Dsproportonal Stratfed Samplng Mansour

More information

Touch Input. CSE 510 Christian Holz Microsoft Research February 11, 2016

Touch Input. CSE 510 Christian Holz Microsoft Research   February 11, 2016 Touch Input CSE 510 Christian Holz Microsoft Research http://www.christianholz.net February 11, 2016 hall of fame/hall of shame? Nokia 5800, 2008 hall of fame/hall of shame? stylus we ve invented [Lightpen

More information

ACCESS PROCESS FOR CENTRAL OFFICE ACCESS

ACCESS PROCESS FOR CENTRAL OFFICE ACCESS ACCESS PROCESS FOR CENTRAL OFFICE ACCESS NOTE: Every person doing work of any nature in the central offices MUST have an access badge. Anyone who does not have a current access badge will be escorted from

More information

Sideseadmed (IRT0040) loeng 4/2012. Avo

Sideseadmed (IRT0040) loeng 4/2012. Avo Sideseadmed (IRT0040) loeng 4/2012 Avo avots@lr.ttu.ee 1 Internet Evolution BACKBONE ACCESS NETWORKS WIRELESS NETWORKS OSI mudeli arendus 3 Access technologies PAN / CAN: Bluedooth, Zigbee, IrDA ( WiFi

More information

National Continuity Programs

National Continuity Programs National Continuity Programs Eric B. Kretz, Deputy Director National Continuity of Operations Division May 1, 2008 1 National Continuity Programs Directorate Mission and Vision To serve the public by protecting

More information

DTFH61-13-C Addressing Challenges for Automation in Highway Construction

DTFH61-13-C Addressing Challenges for Automation in Highway Construction DTFH61-13-C-00026 Addressing Challenges for Automation in Highway Construction Learning Objectives Research Objectives Research Team Introduce Part I: Implementation Challenges and Success Stories Describe

More information

CIS 467/602-01: Data Visualization

CIS 467/602-01: Data Visualization CIS 467/602-01: Data Visualization Tables Dr. David Koop Assignment 2 http://www.cis.umassd.edu/ ~dkoop/cis467/assignment2.html Plagiarism on Assignment 1 Any questions? 2 Recap (Interaction) Important

More information

DSC 201: Data Analysis & Visualization

DSC 201: Data Analysis & Visualization DSC 201: Data Analysis & Visualization Visualization Design Dr. David Koop Definition Computer-based visualization systems provide visual representations of datasets designed to help people carry out tasks

More information

Expanding Transmission Capacity: Options and Implications. What role does renewable energy play in driving transmission expansion?

Expanding Transmission Capacity: Options and Implications. What role does renewable energy play in driving transmission expansion? Expanding Transmission Capacity: Options and Implications What role does renewable energy play in driving transmission expansion? Beth Soholt Director, Wind on the Wires bsoholt@windonthewires.org Office:

More information

Presentation to NANC. January 22, 2003

Presentation to NANC. January 22, 2003 Presentation to NANC January 22, 2003 Introduction Service Offering Numbering No Special Number Exhaust Issues Associated with VoIP Providers January 22, 2003 Who is Vonage? 2002 saw the introduction of

More information

2013 Certification Program Accomplishments

2013 Certification Program Accomplishments 2013 Certification Program Accomplishments Why are we techs? I'm saving the world, one kid at a time. ~Jessi B. Knowing that I may not have a cape but can indeed save lives. ~ Alissa C. I say to parents

More information

Steve Stark Sales Executive Newcastle

Steve Stark Sales Executive Newcastle Theresa Lee Thermal Product Manager - Toshiba October 17, 2013 Theresa.lee@tabs.toshiba.com Copyright 2013 Toshiba Corporation. Steve Stark Sales Executive Newcastle sstark@newcastlesys.com Christine Wheeler

More information

Panasonic Certification Training January 21-25, 2019

Panasonic Certification Training January 21-25, 2019 Panasonic Certification Training January 21-25, 2019 At Capitol s Corporate Campus in Eagan, MN Get all current Panasonic PBX Certifications in one week! Capitol Learning Institute is excited to provide

More information

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch

More information

Elevation Data Acquisition Update

Elevation Data Acquisition Update N G C E, F o r t W o r t h Elevation Data Acquisition Update November 27, 2017 Collin McCormick National Elevation Leader Data Acquisition Updates FY17/18 Contracts & Acquisitions Data Processing State

More information

CMPE 180A Data Structures and Algorithms in C++ Spring 2018

CMPE 180A Data Structures and Algorithms in C++ Spring 2018 San José State University Department of Computer Engineering CMPE 180A Data Structures and Algorithms in C++ Spring 2018 Instructor: Ron Mak Assignment 7 Assigned: Thursday, March 8 Due: Thursday, March

More information

Strengthening connections today, while building for tomorrow. Wireless broadband, small cells and 5G

Strengthening connections today, while building for tomorrow. Wireless broadband, small cells and 5G Strengthening connections today, while building for tomorrow. Wireless broadband, small cells and 5G Our Georgia communities are increasingly turning to wireless networks and mobile technology to operate

More information

Homework Assignment #5

Homework Assignment #5 Homework Assignment #5-5, Data Mining SOLUTIONS. (a) Create a plot showing the location of each state, with longitude on the horizontal axis, latitude on the vertical axis, and the states names or abbreviations

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

Jurisdictional Guidelines for Accepting a UCC Record Presented for Filing 2010 Amendments & the 2011 IACA Forms

Jurisdictional Guidelines for Accepting a UCC Record Presented for Filing 2010 Amendments & the 2011 IACA Forms Jurisdictional Guidelines for ing a UCC Record Presented for Filing 2010 Amendments & the 2011 IACA Forms The following assumptions apply: 1. The problem described is the only issue; all other information

More information

invites applications and nominations for Open-Rank, Tenure-Track/Tenured Cybersecurity Faculty Positions Pensacola, Florida

invites applications and nominations for Open-Rank, Tenure-Track/Tenured Cybersecurity Faculty Positions Pensacola, Florida invites applications and nominations for Open-Rank, Tenure-Track/Tenured Cybersecurity Faculty Positions Pensacola, Florida Cybersecurity Faculty Positions - uwf.edu/cybersecurity DHS Cybersecurity National

More information

OPERATOR CERTIFICATION

OPERATOR CERTIFICATION OPERATOR CERTIFICATION The Benefits of an Industry-Led Approach Graham Brent Chief Executive Officer National Commission for the Certification of Crane Operators (NCCCO) International Cranes and Transport

More information

Development and Maintenance of the Electronic Reference Library

Development and Maintenance of the Electronic Reference Library Development and Maintenance of the Electronic Reference Library Russell Walters and Charles Jahren Department of Civil, Construction and Environmental Engineering Iowa State University 456 Town Engineering

More information

FBI CJIS Division. Biometric Services. Next Generation Identification. William G. McKinsey Section Chief FBI/CJIS

FBI CJIS Division. Biometric Services. Next Generation Identification. William G. McKinsey Section Chief FBI/CJIS FBI CJIS Division Biometric Services Next Generation Identification William G. McKinsey Section Chief FBI/CJIS BIOMETRIC SERVICES SECTION MISSION: Provide Biometric Identification, Investigative, And Identity

More information

Geographic Accuracy of Cell Phone RDD Sample Selected by Area Code versus Wire Center

Geographic Accuracy of Cell Phone RDD Sample Selected by Area Code versus Wire Center Geographic Accuracy of Cell Phone RDD Sample Selected by versus Xian Tao 1, Benjamin Skalland 1, David Yankey 2, Jenny Jeyarajah 2, Phil Smith 2, Meena Khare 3 1 NORC at the University of Chicago 2 National

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14553, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Configuring Oracle GoldenGate OGG 11gR2 local integrated capture and using OGG for mapping and transformations

Configuring Oracle GoldenGate OGG 11gR2 local integrated capture and using OGG for mapping and transformations Configuring Oracle GoldenGate OGG 11gR2 local integrated capture and using OGG for mapping and transformations In the article you will have a look at an OGG configuration example for local integrated capture

More information

Developing Career-Relevant Academic Programs

Developing Career-Relevant Academic Programs 2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)

More information

What Did You Learn? Key Terms. Key Concepts. 68 Chapter P Prerequisites

What Did You Learn? Key Terms. Key Concepts. 68 Chapter P Prerequisites 7_0P0R.qp /7/06 9:9 AM Page 68 68 Chapter P Prerequisites What Did You Learn? Key Terms real numbers, p. rational and irrational numbers, p. absolute value, p. variables, p. 6 algebraic epressions, p.

More information

2013 Product Catalog. Quality, affordable tax preparation solutions for professionals Preparer s 1040 Bundle... $579

2013 Product Catalog. Quality, affordable tax preparation solutions for professionals Preparer s 1040 Bundle... $579 2013 Product Catalog Quality, affordable tax preparation solutions for professionals 2013 Preparer s 1040 Bundle... $579 Includes all of the following: Preparer s 1040 Edition Preparer s 1040 All-States

More information

On All Forms. Financing Statement (Form UCC1) Statutory, MARS or Other Regulatory Authority to Deviate

On All Forms. Financing Statement (Form UCC1) Statutory, MARS or Other Regulatory Authority to Deviate Field Action Article 9 Section Jurisdiction Deviations On All Forms Boxes A-C: Contact Information Statutory, MARS or Other Regulatory Authority to Deviate a. The filer fails to provide information in

More information

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: Challenges of Recruiting and Retaining a Cybersecurity Workforce 2pm, September 7, 2017 Prepared Statement for

More information

Azure App Service. Jorge D. Wong Technical Account Manager Microsoft Azure. Ingram Micro Inc.

Azure App Service. Jorge D. Wong Technical Account Manager Microsoft Azure. Ingram Micro Inc. Azure App Service Jorge D. Wong Technical Account Manager Microsoft Azure Ingram Micro Inc. Proprietary information of Ingram Micro Inc. Do not distribute or duplicate without Ingram Micro's express written

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

Medium voltage Marketing contacts

Medium voltage Marketing contacts ELEC TR I FI C ATI O N PRO D U C T S Medium voltage 2 E P M E D I U M V O LTA G E Don't look the other way. Make quality happen. 8 EP MEDIUM VOLTAGE OEM instrument transformers, sensors, indoor circuit

More information

Using a Probabilistic Model to Assist Merging of Large-scale Administrative Records

Using a Probabilistic Model to Assist Merging of Large-scale Administrative Records Using a Probabilistic Model to Assist Merging of Large-scale Administrative Records Ted Enamorado Benjamin Fifield Kosuke Imai Princeton Harvard Talk at the Tech Science Seminar IQSS, Harvard University

More information

Assistant Director Faculty Position Center for Cybersecurity Pensacola, Florida

Assistant Director Faculty Position Center for Cybersecurity Pensacola, Florida invites applications and nominations for Assistant Director Faculty Position Center for Cybersecurity Pensacola, Florida nationwide, UWF provides leadership to advance cybersecurity education and research

More information

Awards Made for Solicitation

Awards Made for Solicitation BJA FY 17 Body-Worn Camera Policy and Implementation : Implementation Or Expansion Of BWC s For Extra-Large Agencies Number of Awards: 7 Total Awarded: $4,241,634.00 Honolulu Police Body Worn Camera Pilot

More information

Selling Compellent Hardware: Controllers, Drives, Switches and HBAs Chad Thibodeau

Selling Compellent Hardware: Controllers, Drives, Switches and HBAs Chad Thibodeau Selling Compellent Hardware: Controllers, Drives, Switches and HBAs Chad Thibodeau Agenda Session Objectives Feature Overview Technology Overview Compellent Differentiators Competition Case Study Available

More information

EDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014

EDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014 ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 EDUCATION AND ENGAGEMENT NOVEMBER, 12, 2014 JANA SEBESTIK TCIPG EDUCATION ASSISTANT DIRECTOR FOR STEM CURRICULUM DESIGN, OFFICE FOR MATHEMATICS, SCIENCE, AND

More information

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in

More information

WINNING THE WAR FOR CYBER TALENT

WINNING THE WAR FOR CYBER TALENT WINNING THE WAR FOR CYBER TALENT National Initiative for Cyber Education (NICE) Conference Keynote NOVEMBER 2017 AGENDA CYBER TALENT SUPPLY VS. DEMAND MULTIDIMENSIONAL APPROACH TO ADDRESS THE SUPPLY /

More information

Pro look sports football guide

Pro look sports football guide Pro look sports 2007 football guide pro look sports The following pages contain only a small sampling of Pro Look s unlimited design choices. These depictions are in no way intended to portray every style

More information

Homeland Security 1 1

Homeland Security 1 1 1 Foster effective cybersecurity education and workforce by facilitating the availability of qualified It security professionals to support the Nation s cyber security needs Improve cyber security education/training

More information

CCHI Community of Certified Interpreters: An open conversation on training and education, job growth and career path

CCHI Community of Certified Interpreters: An open conversation on training and education, job growth and career path CCHI Community of Certified Interpreters: An open conversation on training and education, job growth and career path Natalya Mytareva, MA, CoreCHI CCHI Managing Director May 2, 2015 www.cchicertification.org

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Data Visualization (CIS/DSC 468)

Data Visualization (CIS/DSC 468) Data Visualization (CIS/DSC 468) Tabular Data Dr. David Koop Channel Considerations Discriminability Separability Visual Popout Weber's Law Luminance Perception 2 Separability Cannot treat all channels

More information

Today s Lecture. Factors & Sampling. Quick Review of Last Week s Computational Concepts. Numbers we Understand. 1. A little bit about Factors

Today s Lecture. Factors & Sampling. Quick Review of Last Week s Computational Concepts. Numbers we Understand. 1. A little bit about Factors Today s Lecture Factors & Sampling Jarrett Byrnes September 8, 2014 1. A little bit about Factors 2. Sampling 3. Describing your sample Quick Review of Last Week s Computational Concepts Numbers we Understand

More information

High School Course Guide Information Technology

High School Course Guide Information Technology 8D120 Business Computer Information Management I (R) 1 credit Gr: 9-12 8D125 Business Computer Information Management I (DC) ; Recommended Prerequisite: Touch Systems Data Entry Keyboarding Description:

More information

How to Make an Impressive Map of the United States with SAS/Graph for Beginners Sharon Avrunin-Becker, Westat, Rockville, MD

How to Make an Impressive Map of the United States with SAS/Graph for Beginners Sharon Avrunin-Becker, Westat, Rockville, MD Paper RIV-27 How to Make an Impressive Map of the United States with SAS/Graph for Beginners Sharon Avrunin-Becker, Westat, Rockville, MD ABSTRACT Have you ever been given a map downloaded from the internet

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

Multifactor Authentication in Higher Education Tuesday, December 6, p.m. ET

Multifactor Authentication in Higher Education Tuesday, December 6, p.m. ET IAM Online Multifactor Authentication in Higher Education Tuesday, December 6, 2011 3 p.m. ET Steven Burke, Federal Student Aid, US Dept. of Education Shilen Patel, Senior IT Analyst, Duke University Miguel

More information

STATE DATA BREACH NOTIFICATION LAWS OVERVIEW OF REQUIREMENTS FOR RESPONDING TO A DATA BREACH UPDATED JUNE 2017

STATE DATA BREACH NOTIFICATION LAWS OVERVIEW OF REQUIREMENTS FOR RESPONDING TO A DATA BREACH UPDATED JUNE 2017 1001 G Street, N.W. Suite 500 West Washington, D.C. 20001 tel. 202.434.4100 fax 202.434.4646 STATE DATA BREACH NOTIFICATION LAWS OVERVIEW OF REQUIREMENTS FOR RESPONDING TO A DATA BREACH UPDATED JUNE 2017

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

High School Course Guide Information Technology

High School Course Guide Information Technology 8D120 Business Computer Information Management I (R) 1 credit Gr: 9-12 ; Recommended Prerequisite: Touch Systems Data Entry Keyboarding Description: In Business Information Management I, students implement

More information

Breaking Out the Cybersecurity Workforce Framework

Breaking Out the Cybersecurity Workforce Framework Breaking Out the Cybersecurity Workforce Framework Ray Trygstad Industry Professor of Information Technology & Management; Associate Director, IIT Center for Cyber Security & Forensics Education The Framework:

More information

Valerie Robinson,

Valerie Robinson, National Association of Prosecutor Coordinators (NAPC) Centralized Prosecutor Case Management Systems: Responses to Inquiry from National SAVIN Training and Technical Assistance Project In September 2013,

More information

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University 1 Cyber crime is a growing problem Estimated over 500 million victims

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information