Now in its 18th year, Cybersecurity Awareness Month—previously known as National Cybersecurity Awareness Month—continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online. Each year, in conjunction with CISA and the National Cyber Security Alliance (NCSA), UMGC and the Center for Security Studies, continue to support this effort by providing informative and engaging speakers and panelists to allow you to "Do Your Part. #BeCyberSmart." We are proud to be champions in support of this essential online safety, awareness, and education initiative. This is a collaborative effort between government and industry, reaching from the White House to the individual to raise awareness about the importance of cybersecurity, seeking to ensure that everyone has the resources they need to be safer and more secure online. Over these past 18 years, our lives have moved more and more into the virtual realm, and as we prepare for the upcoming holidays, October is the ideal time for people to learn about their cyber presence and the role cybersecurity plays in keeping them, their friends and family, and our nation safe and secure.
The UMGC Cybersecurity Awareness Month Schedule is noted below with links for registration for the virtual Zoom sessions.
The overarching theme is "Do Your Part. #BeCyberSmart." This evergreen theme encourages individuals and organizations to own their role in protecting their part of cyberspace, stressing personal accountability and the importance of taking proactive steps to enhance cybersecurity.
In 2021, the focus is on the following areas:
Week of October 4 (Week 1): Be Cyber Smart.
Week of October 11 (Week 2): Fight the Phish!
Week of October 18 (Week 3): Explore. Experience. Share. – Cybersecurity Career Awareness Week
Week of October 25 (Week 4): Cybersecurity First
Calendar of Events
|Date and Time||Title||Description|
Wednesday, October 6
Be Cyber Smart: Cybersecurity for Artificial Intelligence
When discussing artificial intelligence in the context of threats and vulnerabilities, we often think of leveraging artificial intelligence to automate categorization of data or reducing the burden of decision making. Artificial intelligence enables us to do more, with less effort, faster. Yet, seldom do we consider cybersecurity for artificial intelligence. That is, how do we use the principles of cybersecurity to render any artificial intelligence safe and trustworthy. In this presentation, I will outline those principles and map out a framework for how we might use them for simple artificial intelligence agents the world has now as well as for the artificial general intelligence (sentient machines) we may have in the future.
About the Speakers
Dr. Helen G. Barker serves as Chair of the Department of Cybersecurity. Before joining UMGC in 2020, Dr. Barker spent 18 years with Capitol Technology University. Prior to her roles in education, Dr. Barker worked for 15 years in the private sector as a management analyst and resource training specialist in the distribution industry in the Washington, DC area and spent five years as a researcher with Virginia Polytechnic Institute and State University (Virginia Tech) working in the fields of child welfare and economic development analysis.
Dr. Barker received a D.M. in organization leadership, M.S.B.A., a M.S. Information & Telecommunication Systems Management, and has performed doctoral work in public policy and administration. Research interests include bibliometrics, gender discrimination in cyber education, and multi-discipline approaches to cybersecurity.
Dr. Jason M. Pittman is a collegiate faculty member at University of Maryland Global Campus where he serves in the School of Cybersecurity and Technology. He recently served as an associate professor at High Point University in the computer science department. Previously, he was at California State Polytechnic University (Pomona) and Capitol Tech. University. Pittman holds a Bachelor of Arts in English Literature with a secondary in Biology from Malone College. He received his Master of Science in network security and Doctor of Science in information assurance from Capitol College.
His areas of expertise are cybersecurity and artificial intelligence. His research interests include secure cloud architectures, artificial immune systems for cyber network defense, and information privacy. He brings with him ten years of experience at other academic institutions as well as more than 15 years of industry experience. The majority of these years have been spent at tech focused startups, most notably as Vice President of Security Research and Development at Silent Circle. He is an active scholar with over a hundred books, essays, journal articles, invited lectures, and conference presentations, collectively in his portfolio.
Wednesday, October 13
Women in cybersecurity - Pacific Northwest National Laboratory
In observance of National Cyber Security Awareness Month, the University of Maryland Global Campus is hosting a panel event on women in cybersecurity. Learn from professionals about what it's like to work in the cybersecurity field and how to get involved.
About the Speakers
Dr. Ebonése Olfus is a technologist who helps government and non-government entities maximize their tactical and strategic priorities while balancing both existing and emergent cybersecurity needs. She is a former adjunct professor at University of Maryland Global Campus. Dr. Olfus has over two decades of experience in system engineering, system security engineering, cyber technology development, cyber program management, and strategic planning in both the government and commercial markets. She is currently Vice President of Cyberspace and Engineering for Envistacom, LLC which supports a variety of programs within the Department of Defense. Dr. Olfus currently holds the following cybersecurity vendor neutral certifications:
Dr. Jess Smith is a Senior Cyber Security Research Scientist with Pacific Northwest National Laboratory (PNNL), a US Department of Energy National Laboratory. Dr. Smith has a decade of experience working for both the government and industry. At PNNL, Dr. Smith's research includes control system and supply chain risk management, with ventures into hardware security and data analysis. She has led research projects exploring state machine reverse engineering and defining resiliency in cyber systems. She is currently leading PNNL's supply chain integrity investigation team which supports multiple government agencies.
Prior to PNNL, Dr. Smith has worked in industry at Schweitzer Engineering Laboratories, Inc., MITRE Corp., and as an intern at NASA. Her work included designing secure control system devices, educating control system designers and operators on system security, and exploring new threat vectors. She has also worked on embedding encryption into CPUs and malware analysis through reverse engineering. After completing both a MS and BS in Computer Engineering at the University of Idaho, Dr. Smith earned her PhD in Computer Science from Washington State University while working full-time. Her dissertation explored methods for ensuring supply chain integrity. She has her CISSP and CSSLP certifications and is a member of IEEE and ACM.
Penny McKenzie is a cybersecurity engineer for Pacific Northwest National Laboratory focusing on security of the Internet of Things. She designed and stood up the first PNNL Internet of Things Common Operating Environment (IoTCOE). PNNL IoTCOE capability has a mission to provide customized cybersecurity solutions to the entire Internet of Things (IoT)/ Industrial Internet of Things (IIoT) deployment and management lifecycle. IoTCOE is exploring solutions that support chemical, physical, and cybersecurity cutting-edge challenges using visual analytics, artificial intelligence and machine learning algorithms.
McKenzie has expertise in network monitoring and intrusion detection of ICS, forensics analysis, policy and regulation determination for incident response for ICS, incident handling procedures, convergence of cyber and physical security, and IoT cybersecurity with an emphasis in intrusion detection and secure coding practices. McKenzie's work supports the IAEA, the US Department of Energy Building Technology Office, the Department of Homeland Security, the Federal Bureau of Investigation, and the Department of Defense.
Theora Rice is a Cyber Security Researcher in the National Security Directorate at Pacific Northwest National Laboratory (PNNL). She earned a B.S. and M.S. in computer science from the University of Idaho, where she focused on industrial control system and critical infrastructure security in her graduate studies. Throughout her career at the laboratory, Rice has worked with multiple academic, industry, and government agencies to further expand her knowledge and contribute to the advancement of the critical infrastructure security field. Her current research includes building and maintaining cyber-physical testbeds for ICS security research, energy delivery system forensics, and developing scientific methodology for cyber security experimentation. Rice is currently one of the main system administrators for the powerNET testbed.
Liz Faultersack is a project manager in the cybersecurity group at Pacific Northwest National Laboratory. She has over 20 years of experience in cybersecurity and is the project manager for the Cooperative Protection Program (CPP), a cyber situational awareness program for the Department of Energy. Prior to PNNL, Faultersack worked with the Idaho National Laboratory where she implemented and maintained their intrusion detection systems. Faultersack earned a B.S. in computer science from Washington State University.
Courtney Lancaster, a digital forensics subject matter expert, serves as a cyber security instructor and government contractor, developing and delivering a variety of cyber courses. She has worked for the Defense Computer Forensics Laboratory as an imaging specialist with a focus in mobile forensics and investigation for five years and has trained global clients with respect to vehicle investigations and forensics. Lancaster is a DoD Certified Digital Forensic Examiner and has been certified in a Court of Law as an expert witness. Lancaster has trained various Law Enforcement and commercial teams worldwide on the research and development of vehicle forensics, Mobile device investigations, and Computer investigations.
Lancaster worked as a cryptologic technician in the U.S. Navy and has worked in the Information Assurance Directorate at the National Security Agency (NSA) conducting Certification and Accreditation evaluations, COMSEC Monitoring, Master Scheduling, and Strategic Planning. She is also an advocate for youth and women in the field and has been recognized in her field with a number of awards and accolades throughout her career.
Wednesday, October 20
Cybersecurity Career Paths and the Recommended Training You Need
Finding the right career path in the cybersecurity industry isn't always easy. While some know they want to go into the field straight out of college, many work in other industries before exploring a career in the industry. Before you jump headfirst into this specialized field, you should know what a typical cybersecurity career path entails. This webinar will discuss four popular security careers and the recommended training needed in order to be successful.
About the Speakers
Dr. Loyce Best Pailen has more than 35 years of experience in information technology, computer science, cybersecurity, software development, project management, telecommunications, risk management, and network and systems security and administration. She is the senior director for the Center for Security Studies at the University of Maryland Global Campus (UMGC), overseeing its DHS/CAE activities and as a PI for several grants.
In the K-20 education arena, she has experience in teaching, curriculum development, instructional design, cyber lab development, and as a subject matter expert. She has led and sponsored multi-million-dollar information technology projects during her career at UMGC, The Washington Post Company (Graham Holdings) and the Defense Cyber Investigations Training Academy (DCITA). Dr. Pailen is the Education Chair and member of the Executive Board of the ISC2-NCR Chapter, Technical Working Group member of FISSEA at NIST, Member of the NICE K-12 Working Group, CCEI collaborator, past president of MAHE, and a member of the Maryland State Department of Education K-12 Computer Science Standards Design Team. She is a member of the Phi Kappa Phi Honor Society Chapter at UMGC and author of a series of children's books that discuss cybersecurity, use of emerging technology, and safety in the digital environment.
Tricia Umeh is a Project Management and Security Consulting professional knowledgeable in the development and implementation of security programs that leverage enterprise-wide resources, facilitate information security governance, advise senior leadership on security direction and resource investments, and design appropriate policies to manage information security risk. She has worked with numerous federal clients throughout all stages of the security authorization process, applying the NIST methodology including investigation, analysis, and documentation as a Federal Information Security Management Act (FISMA) compliance consultant.
Umeh's experience in conducting federal system assessments and authorizations has provided her with extensive knowledge of all stages of the security authorization process and of security documentation including System Security Authorization Agreement (SSAA), Concept of Operations, Security Waivers, Plan of Action and Milestones (POA&M), Information System Contingency Plans (ISCP), and System Security Plans (SSP).
Wednesday, October 27
Fight the Phish!
Bad actors are continuing to develop more sophisticated social engineering tactics to include the most common attack pattern, Phishing. Phishing attacks will continue to escalate even as applications and data migrate to more secure cloud environments. It is critical importance that end users learn how to identify phishing schemes and respond appropriately when they are being targeted. In this webinar we will discuss various phishing tactics, response mechanisms and learn about evolving solutions to mitigate phishing attacks.
About the Speakers
Chinitra Graham has served as Vice President of Information Security at the University of Maryland Global Campus (UMGC) since October 2020. She provides strategic direction over the information security enterprise and is responsible for security governance, compliance, and risk management.
Graham has more than 20 years of experience in IT and information security in higher education, federal government, and commercial industry. She has served in leadership roles at Laureate Education, where she led the global IT compliance and governance function. Graham also oversaw the global IT audit function at Discovery Communications. She has held senior leadership positions at Deloitte and Touche LLP, and provided clients with broad expertise and innovative solutions to protect and defend their organizations.
Raj Singh, as a risk professional with 15 years of experience, Singh has focused his career on compliance, assurance, and security working across multiple industries including accounting, finance, and government. While he began his career in IT operations, he has spent the last eight years specializing in critical areas directly impacting higher education, including protecting student data, developing a privacy program, and implementing a security governance program. Raj currently serves as Manager for IT Risk and Compliance team at AccelerEd. He earned a B.S. in Information Systems from University of Maryland Baltimore County, and an MBA from the Robert H. Smith School of Business at the University of Maryland.
Todd Pearce is the manager of IT Security Operations for UMGC. He has over 25 years of experience in the Information Technology industry ranging from programmer and network administrator to risk and compliance manager. Pearce now works with a focus on cybersecurity through his experience and skillset. Pearce earned a bachelor's degree in social psychology from University of Maryland College Park and has since earned an undergraduate and master's degree from University of Maryland Global Campus in computer and information sciences and technology management.
Cybersecurity Awareness Month highlights the importance of empowering citizens, businesses, government, and schools to improve their cybersecurity preparedness. This month reminds us that being more secure online is a shared responsibility, and creating a safer cyber environment requires engagement from the entire American community.
Join UMGC leaders and special cybersecurity industry guests for exciting and engaging webinars and fun activities that include essential topics related to cybersecurity awareness. Whether you are a student, parent, teacher, professor, graduates, or teleworker, we have a webinar that will provide you with the tools you need to do your part and #BeCyberSmart in today's world.
Note: Please note that each of the cybersecurity awareness month webinars will be closed captioned.
Additional accommodations can be requested on the event registration form. If you require a special accommodation to fully participate in this event, e-mail Accessibility Services or call 240-684-2287. Please allow a minimum of 72 hours prior to the event to arrange the accommodation.