top of page

 

3CS Proposals and Program

PROPOSALS

Proposals

2022 Community College Cyber Summit​

May 23 - 25, 2022 in Dayton, OH.

​

Call for Proposal Closed

 

​

TRACKS (you may select more than one):

Track 1: Evidence-Based
 

How can or does cybersecurity instruction or practice impact individual competence development or organizational effectiveness? In other words, what is the efficacy (the ability to produce a desired or intended result) of a proposed tactic, technique, protocol, or procedure? How can we be sure our teaching or the cybersecurity practices included in a curriculum actually work? Sessions in this track can focus on efficacy and assessment of exercises and labs, an entire course, or an entire curriculum, or it can introduce new methods for valid assessments of learning or impact.

Track 2: Instruction
 

How do you teach cybersecurity principles, safe practices, and hands-on skills? What’s new and different? Share with your colleagues the ideas, strategies, and techniques needed to teach new subjects, introduce cybersecurity into their curriculum, or enhance their existing courses. Sample subjects: secure coding, incident response, risk assessment, HIPPA, FERPA, and cybersecurity practices in finance, energy, utilities, medical records, and law enforcement.

Track 3: Practice
 

How do you incorporate new devices, threats, strategies, technologies into your community college curriculum? Examples: mobile forensics, cybersecurity of drones, Internet of Things, intrusion detection systems, and SCADA systems.

Track 4: Program Development
 

How do you prepare your community college to qualify for CAE2Y status? What are employers looking for, and how can community colleges transform their offerings to respond to those evolving needs? Share with your colleagues the unique features of your college’s cybersecurity education program. Topics might include workforce development, middle-skills occupations, extra-curricular programs, summer camps, articulation agreements, new certificate/degree offerings, and cloud-based lab solutions

Track 5: Student
 

Topics of interest to students attending 3CS. Examples include student competitions, student associations, developing cyber competition teams, summer camps, outreach to high schools, further education programs, industry certifications, career paths, resume preparation, interviewing skills, and getting students involved in cybersecurity. Students are encouraged to submit proposals to share their knowledge!

TYPES OF BREAKOUT SESSIONS

​

Cybersecurity Skills Development Workshops (CSDWs): 

These all-day (7-hour) workshops will be offered on Day 1 of the Summit. CSDWs focus on the cybersecurity components of emerging or rapidly changing technologies, such as drones, autonomous vehicles, or crime scene investigation. The objective is to train experienced cybersecurity faculty in the application of a new technology (Note: The Lead Presenter of each CSDW will receive complimentary registration for 3CS.)

​

Cybersecurity Hackathons: 

Each half-day Hackathon session will be offered in one quadrant of the gym on the morning of Day 2 of the Summit and will be repeated that afternoon. We anticipate 4 Hackathons. Hackathons are designed for general audiences. (Note: The Lead Presenter of each Hackathon will receive complimentary registration for 3CS.)

​

Other breakouts: 

3-Hour Hands-on Labs (all 3-hour labs will be scheduled on Day 2); 2-hour and 1-hour labs (on Days 2 and 3); and 1-hour demos, panel presentations, and papers (on Days 2 and 3). We anticipate a mix of sessions for general audiences, for newbies, for students, and for experienced cybersecurity faculty. The most important ingredient in each session is the take-away for participants -- that is, what will participants take from your session that can be applied to their own classrooms or programs?

INTENDED AUDIENCE

​

Will your session appeal mostly to people new to the cybersecurity field, journeyman professionals, advanced practitioners, or a general audience?

SUMMIT THEME

​

The theme of this year's Summit is "Applying the NICE Framework to Emerging Cyber Technologies". Accordingly, you will be asked to identify the Specialty Area and associated Work Roles within the NIST/NICE Cybersecurity Workforce Framework to which your proposed session relates. The table below summarizes the NICE Framework; please identify the appropriate Specialty Area ID. (If you need a refresher on the NICE Framework, follow this link to the NICE Cybersecurity Workforce Framework Resource Center.) 

Table1.PNG
Table2.PNG
Proposal Submissions are Closed

3CS is the cybersecurity education community's conference.

 

​

SUMMIT AT A GLANCE
BREAKOUT
bottom of page