With the U.S. facing a shortage of roughly 314,000 cybersecurity professionals in the workforce, according to CSIS, there is an urgent need to build cybersecurity skills and fill the workforce pipeline with students who are prepared to pursue cybersecurity careers.
The aftermath of the SolarWinds breach has shown that there is a desperate need to expand K-12 cybersecurity education across the country.
Since its inception in 2007, over 21,500 teachers have enrolled in CYBER.ORG’s content platform and over 14,000 teachers have been trained to use CYBER.ORG content for cybersecurity education.
Kevin and the CYBER.ORG team are currently finalizing nationwide K-12 cybersecurity learning standards with the goal of having all 50 states adopt them. Expected in the fall, these standards will ensure that all students have equal access to standardized K-12 cybersecurity education.
https://www.businesswire.com/news/home/20200914005156/en/CYBER.ORG-Kicks-Off-National-K-12-Cybersecurity-Learning-Standards-Development Visit https://www.securityweekly.com/psw for all the latest episodes!
Why Now is the Time for K-12 Cybersecurity Education
Kevin Nolten – Director of Academic Outreach at CYBER.ORG
As the Director of Academic Outreach at CYBER.ORG, Kevin directs the organization’s?programmatic outreach efforts and partnerships with the goal of ensuring that every K-12 student in the U.S. has access to cybersecurity education. In his role, he helps advance CYBER.ORG’s K-12 cyber education program with age-appropriate content that aligns with state standards for education in 27 states and counting. The impact of that work is measured in thousands of teachers and students with more content, resources and training that will fuel the cyber workforce pipeline for the future.
Kevin received his Bachelor of Science in Business Management and Administration from LSU Shreveport. Kevin also received his MBA from LSU Shreveport.
Jeff Man – #HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon. Currently a Sr. InfoSec Consultant for Online Business Systems.
Larry Pesce – Principal Managing Consultant and Director of Research & Development at InGuardians
Larry’s core specialties include hardware and wireless hacking, architectural review, and traditional pentesting. He also regularly gives talks at DEF CON, ShmooCon, DerbyCon, and various BSides. Larry holds the GAWN, GCISP, GCIH, GCFA, and ITIL certifications, and has been a certified instructor with SANS for 5 years, where he trains the industry in advanced wireless and Industrial Control Systems (ICS) hacking. Larry’s independent research for the show has led to interviews with the New York Times with MythBusters’ Adam Savage, hacking internet-connected marital aids on stage at DEFCON, and having his RFID implant cloned on stage at Shmoocon. When not hard at work, Larry enjoys long walks on the beach weighed down by his ham radio, (DE KB1TNF), and thinking of ways to survive the impending zombie apocalypse.
Lee Neely – Senior Cyber Analyst at Lawrence Livermore National Laboratory
Lee Neely is a senior IT and security professional at Lawrence Livermore National Laboratory (LLNL) with over 25 years of experience. He has been involved in many aspects of IT from system integration and quality testing to system and security architecture since 1986. He has had extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. Lee has worked with securing information systems since he installed his first firewall in 1989.
Matt Alderman – Executive Director at CyberRisk Alliance
Strategic Advisor at Automox, security consultant, and wizard of entrepreneurship.
Tyler Robinson – Director of Offensive Security & Research at Trimarc and Founder & CEO of Dark Element at Trimarc Security
As the Managing Director of Offensive Security & Research at Trimarc, Tyler leads a team of high-performance security professionals within the offensive security field by simulating sophisticated adversaries and creating scalable offensive security platforms using the latest techniques as seen in the wild. With over 2 decades of experience, Tyler specializes in Red Teaming, APT threat modeling, blackbox network penetration testing, and Physical/Social-Engineering. Tyler has presented at multiple conferences including BSides, DefCon and Blackhat panels, SANS security events and to multiple branches of the military.
Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, join our Discord Server, and follow us on our newest live-streaming platform, Twitch!