• Image-4
  • PROPOSAL SUBMISSION DEADLINE: JUNE 15, 2021 

    Should you have any questions concerning this form or the 3CS Proposal and Acceptance process, please contact Chris Rondeau, Chair of the 2021 3CS Program Committee: crondeau@bpcc.edu, or (318)-678-6317. 

  • 3CS Proposal Form

  • INTRODUCTION

    3CS is soliciting proposals for breakout sessions at the 2021 Community College Cyber Summit at Sinclair Community College, Dayton, Ohio, November 5-7, 2021. 

    THEME

    The theme of this year's Summit is "Applying the NICE Framework to Emerging Cyber Technologies". Accordingly, you will be asked to identify the Specialty Area and associated Work Roles within the NIST/NICE Cybersecurity Workforce Framework to which your proposed session relates.  

     

  • SECTION 1. PROPOSAL IDENTIFICATION 

    This section identifies the Lead Presenter, assigns the Proposal Identifier, and indicates whether this is an original submission or a replacement.

    If the Lead Presenter is unknown at this time, provide this information for the Originator of the proposal instead, and so indicate.

    Please Note: After a proposal is accepted by the 3CS Program Committee, the Lead Presenter must register for 3CS, pay the registration fee (other than the Lead Presenter for a CSDW or Hackathon), and submit a brief bio, snapshot, and technical details concerning the session. After completion of these items, the session will be added to the program.

    * Denotes a required field.

  •  

    SECTION 2. ADDITIONAL LEAD PRESENTER INFORMATION 

    Leave Section 2 blank if the Lead Presenter is unknown at this time.

  •  -
  • SECTION 3. SESSION DETAILS. (Note: Do not include any URLs. Proposals containing URLs will be rejected.)

    First, select the most appropriate TRACK(s) for your session (you may select more than one):

    Track 1: Evidence-Based

    How can or does cybersecurity instruction or practice impact individual competence development or organizational effectiveness? In other words, what is the efficacy (the ability to produce a desired or intended result) of a proposed tactic, technique, protocol, or procedure? How can we be sure our teaching or the cybersecurity practices included in a curriculum actually work? Sessions in this track can focus on efficacy and assessment of exercises and labs, an entire course, or an entire curriculum, or it can introduce new methods for valid assessments of learning or impact.

    Track 2: Instruction

    How do you teach cybersecurity principles, safe practices, and hands-on skills? What’s new and different? Share with your colleagues the ideas, strategies, and techniques needed to teach new subjects, introduce cybersecurity into their curriculum, or enhance their existing courses. Sample subjects: secure coding, incident response, risk assessment, HIPPA, FERPA, and cybersecurity practices in finance, energy, utilities, medical records, and law enforcement.

    Track 3: Practice

    How do you incorporate new devices, threats, strategies, technologies into your community college curriculum? Examples: mobile forensics, cybersecurity of drones, Internet of Things, intrusion detection systems, and SCADA systems.

    Track 4: Program Development

    How do you prepare your community college to qualify for CAE2Y status? What are employers looking for, and how can community colleges transform their offerings to respond to those evolving needs? Share with your colleagues the unique features of your college’s cybersecurity education program. Topics might include workforce development, middle-skills occupations, extra-curricular programs, summer camps, articulation agreements, new certificate/degree offerings, and cloud-based lab solutions.

    Track 5: Student

    Topics of interest to students attending 3CS. Examples include student competitions, student associations, developing cyber competition teams, summer camps, outreach to high schools, further education programs, industry certifications, career paths, resume preparation, interviewing skills, and getting students involved in cybersecurity. Students are encouraged to submit proposals to share their knowledge!

  • Second, select the Session Type.

    TYPES OF BREAKOUT SESSIONS

    [FULL - NO FURTHER CSDW PROPPSALS WILL BE CONSIDERED FOR THE  2021 3CS.]  Cybersecurity Skills Development Workshops (CSDWs): These all-day (7-hour) workshops will be offered on Day 1 of the Summit. CSDWs focus on the cybersecurity components of emerging or rapidly changing technologies, such as drones, autonomous vehicles, or crime scene investigation. The objective is to train experienced cybersecurity faculty in the application of a new technology. We anticipate 6 to 8 CSDWs.  (Note: The Lead Presenter of each CSDW will receive complimentary registration for 3CS.)

    Cybersecurity Hackathons: Each half-day Hackathon session will be offered in one quadrant of the gym on the morning of Day 2 of the Summit and will be repeated that afternoon. We anticipate 4 Hackathons. Hackathons are designed for general audiences. (Note: The Lead Presenter of each Hackathon will receive complimentary registration for 3CS.)

    Other breakouts: 3-Hour Hands-on Labs (all 3-hour labs will be scheduled on Day 2); 2-hour and 1-hour labs (on Days 2 and 3); and 1-hour demos, panel presentations, focus groups, and papers (on Days 2 and 3). We anticipate a mix of sessions for general audiences, for newbies, and for experienced cybersecurity faculty. The most important ingredient in each session is the take-away for participants -- that is, what will participants take from your session that can be applied to their own classrooms or programs? 

  • NIST/NICE Cybersecurity Workforce Framework 

    The theme of this year's Summit is "Applying the NICE Framework to Emerging Cyber Technologies". The table below summarizes the NICE Framework; please identify the appropriate Specialty Area ID. (If you need a refresher on the NICE Framework, follow this link.) 

  • Image-78
  • 0/100
  • 0/1000
  • Section 4. Additional Presenters. (Note: All presenters must register for 3CS and pay the registration fee.) In the table below, please provide the requested information for each additional presenter. (If an additional presenter is not known at the time of this submission, enter "TBD" as the first name.)

  •  
  • Should be Empty: