1 / 19

Broadening Participation in Cyber Security

Broadening Participation in Cyber Security. Dr. William Robinson, Outreach Director, Vanderbilt Dr . Kristen Gates, Executive Director of Education Dr. Sigurd Meldal, PI San Jose State University. Presentation Outline. Motivation The statistics behind broadening participation

Télécharger la présentation

Broadening Participation in Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Broadening Participation in Cyber Security Dr. William Robinson, Outreach Director, Vanderbilt Dr. Kristen Gates, Executive Director of Education Dr. Sigurd Meldal, PI San Jose State University

  2. Presentation Outline • Motivation • The statistics behind broadening participation • TRUST Center goals for participation • TRUST portfolio of outreach programs • Role models and mentoring • Building community • New initiatives for TRUST • TRUST Post-Doctoral Fellowships to broaden participation • TRUST Graduate Student Scholarships • Summary Broadening Participation in Cyber Security, W.H. Robinson

  3. The Challenge “[The] under-participation in CS [computer science] by large segments of our society representsa loss of opportunity for individuals, a loss of talent in the workforce, anda loss of creativity in shaping the future of technology. Not only is it a basic equity issue, but it threatens our global economic viability as a nation.” [1] [1] P. A. Freeman and J. Cuny, "Common ground: A diverse CS community benefits all of us," Computing Research News, vol. 17, 2005. Broadening Participation in Cyber Security, W.H. Robinson

  4. Ph.D. Production by Gender For computer science (CS), computer engineering (CE), and information (I) [1] • U.S. demographics • Gender ratio for ages 15-64 years: 1 male(s)/female [1] S. Zweben. (2011). 2009-2010 Taulbee Survey: Undergraduate CS degree production rises; Doctoral production steady. Available: http://www.cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_2009-2010_Results.pdf Broadening Participation in Cyber Security, W.H. Robinson

  5. Ph.D. Production by Ethnicity For computer science (CS), computer engineering (CE), and information (I) [1] • U.S. demographics • American Indian or Alaska Native alone: 0.9% • Black or African American alone: 12.6% • Hispanic or Latino ethnicity, of any race: 16.3% [1] S. Zweben. (2011). 2009-2010 Taulbee Survey: Undergraduate CS degree production rises; Doctoral production steady. Available: http://www.cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_2009-2010_Results.pdf Broadening Participation in Cyber Security, W.H. Robinson

  6. TRUST Goals Years 6-10 In TRUST, our diversity efforts will take a “grass roots” approach by building strong partnerships with faculty and institutions that will help us achieve our goals of inclusion of women and underrepresented minorities (URM) Infuse the science and engineering supply chain with new, diverse, and talented individuals Retain those individuals within TRUST research areas Prepare those individuals for successful careers, especially as researchers and educators in academia Metrics to achieve (overall center demographics) Participation by women: 30% Participation by underrepresented minorities (African Americans, Hispanics, and Native Americans): 10% Broadening Participation in Cyber Security, W.H. Robinson

  7. Presentation Outline • Motivation • The statistics behind broadening participation • TRUST Center goals for participation • TRUST portfolio of outreach programs • Role models and mentoring • Building community • New initiatives for TRUST • TRUST Post-Doctoral Fellowships to broaden participation • TRUST Graduate Student Scholarships • Summary Broadening Participation in Cyber Security, W.H. Robinson

  8. Increasing Minority Graduates “Minority students suffer from the absence of minority role models in the classroom. But too few minority students are encouraged and guided into graduate education so that they can ultimately become faculty members who can [then] inspire and educate even more minority students.” Dr. John Brooks SlaughterFormer President and CEONational Action Council for Minorities in Engineering (NACME) Broadening Participation in Cyber Security, W.H. Robinson

  9. What Must Role Models Do? • Act as Advisors, Allies, and Advocates (AAA) [1] • Sometimes we need “roadside” assistance along life’s path • Advisor • Directing research towards successful degree completion • Ally • Planning collectively towards a successful career path • Advocate • Promoting in the “closed room” [1] Mr. Sundiata Jangha, University of Maryland Baltimore County Broadening Participation in Cyber Security, W.H. Robinson

  10. TRUST-REU Program TRUST Summer Research Experiences for Undergraduates (TRUST-REU) • Program Overview • 8-week summer research experience guided by TRUST faculty mentors and graduate students • Educational activities include lab tours and industry field trips • Graduate school advising and subsidized GRE prep course • $4,000 Stipend + travel allowance + room and board provided • Program Participants • 2006-2011: TRUST has hosted 73undergraduate students • 40% female • 45% URM • 97% U.S. persons • 85% in grad school or applying • 2011: TRUST 13 students (across four Center institutions) • Participant Testimonial • More Information Online • Program Description at: • https://www.truststc.org/reu/ “The best part was the exposure to both the academic and industrial pathways. Without the first-hand company seminars and research experience I gained from the program, I would have made a much weaker decision as in which path to choose!” Broadening Participation in Cyber Security, W.H. Robinson

  11. SECuR-IT Cyber Security Internship Summer Experience, Colloquium and Research Experience in Information Technology SECuR-IT is a 10-week academic summer immersion program in computer security • Program Overview: • Paid internship at a Silicon Valley and San Francisco technology company • Learning cohort of MS and PhD students • Program cost funded by industry partner • Seminars conducted by TRUST faculty and industry experts that expose students to a range of information technology and computer security research topics • Program details at: http: truststc.org/securit Broadening Participation in Cyber Security, W.H. Robinson

  12. Women’s Institute in Summer Enrichment WISE 2011 at Carnegie Mellon University • One-week residential summer seminar • Graduates, post-doctoral, and professors • Topics: cyber security, healthcare, privacy • 2011 Speakers: • Lorrie Cranor: CyLab, Carnegie Mellon University • Dorothy Glancy, Santa Clara University Law • Leslie Lambert: Juniper Networks • Brenda Fellows: Fellows Corporate Consortium • Michelle Nix: McKesson • Adrian Perrig: TRUST, Carnegie Mellon University • Brad Malin: TRUST, Vanderbilt University • Deb Frinkie,National Security Agency “We came across miles with diverse backgrounds, lived like teens, convened daily for learning and most evenings for play. Everyone was smart, engaged in their careers and lovely in their own ways and demeanors. It was an honor to spend the week together, from which I have learned many lessons…” http://www.truststc.org/wise Broadening Participation in Cyber Security, W.H. Robinson

  13. IMPACT: Building Community CDSIA: Curriculum Development in Security and Information Assurance 2011 Participating Universities Cal Poly Pomona (HSI) Cal Poly San Luis Obispo CSU Chico CSU Dominguez Hills (HSI/MSI) CSU East Bay CSU Humboldt CSU Los Angeles (HSI/MSI) CSU Long Beach (HIS/MSI) CSU Northridge (HSI) CSU Sacramento CSU Stanislaus (HSI) CSU San Bernardino (HSI) San Francisco State University San Diego State University (HSI/MSI) San José State University (TRUST) Carnegie Mellon University (CyLab) UC Berkeley (TRUST) Colorado State University Drexel State University Mt. San Antonio College (HSI) Jackson State University (HBCU) Howard University (HBCU) Fisk University (HBCU) Mills College Tuskegee University (HBCU) Polytechnic University of Puerto Rico (HSI) Inter American University of Puerto Rico (HSI) Virginia State University(HBCU) Youngstown State University “It was an excellent space to learn from the expertise of Industry and academic leaders… a good platform for education to exchange ideas in IA, especially building capacity in IA.” “My department is considering development of new courses in MBA and bachelors program of Information systems. I will take advantage of this seminar to coordinate the development of new curriculum. • Demographics • 25% Female Participants • 55% HSI/MSI/HBCU Institutions • 15 California State University Institutions • 5 Historical Black College or University • 1 California Community College • 1 Historically Female Institution Broadening Participation in Cyber Security, W.H. Robinson

  14. Leveraging Education Relationships CAHSI: Computer Alliance for Hispanic Serving Institutions CAHSI and TRUST working together to advance the mission and mutual goals of both organizations through collaborative efforts. URM student recruitment Education and mentoring CAHSI and TRUST will work together to prepare CAHSI students for a successful REU with TRUST TRUST-REU 2011 placed six REU students having research/academic affiliation with CAHSI Broadening Participation in Cyber Security, W.H. Robinson

  15. Building Community via Sponsorship • Association of Computer/Information Sciences and Engineering Departments at Minority Institutions (ADMI) Symposium 2011 • http://www.admiusa.org/admi2011/ • Held at Clemson, SC • Met several ADMI board members • Met HBCU faculty involved with security research • Planning sponsorship for 2012 Symposium (Washington, DC) • Cornell SoNIC Summer Research Workshop • http://www.cs.cornell.edu/workshop/sonic/ • Hosted by Prof. Hakim Weatherspoon • Brought students from Howard University to Cornell for the summer • Learn about network research • CS faculty from Howard were invited to TRUST Autumn Conference Broadening Participation in Cyber Security, W.H. Robinson

  16. Presentation Outline • Motivation • The statistics behind broadening participation • TRUST Center goals for participation • TRUST portfolio of outreach programs • Role models and mentoring • Building community • New initiatives for TRUST • TRUST Post-Doctoral Fellowships to broaden participation • TRUST Graduate Student Scholarships • Summary Broadening Participation in Cyber Security, W.H. Robinson

  17. TRUST Graduate Student Scholarships • Designed for incoming URM graduate students at all partner institutions • Helps to retain students across the transition from the undergraduate level to the graduate level • TRUST faculty members nominate URM students to receive a supplement to enhance an admission offer • Helps to recruit highly desirable students into our home departments • Developing a nomination form • Will publicize to TRUST faculty for Fall 2012 • Supplement is intended to leverage the financial commitment that has already been made by the home department • The student should already be admitted to the department • Nomination would include documentation to that effect Broadening Participation in Cyber Security, W.H. Robinson

  18. TRUST Post-Doctoral Fellowships • TRUST will support a post-doctoral position at any TRUST partner institution to broaden participation • Modeled after the FACES Portable Post-doctoral Fellowship (Coordinated by Dr. RaheemBeyah) • http://www.faces.gatech.edu/2007/postdoc.htm • Leverage the NSF Alliance for Graduate Education and the Professoriate (AGEP) program (http://www.nsfagep.org/) for applicants who choose a post-doc • Potential benefits for potential faculty candidate • Connect with TRUST faculty • Complete additional publications • Collaborate on new research topics • Sharpen skills such as proposal-writing skills • Should make the candidate more competitive for a tenure-track position • Especially at the host institution Broadening Participation in Cyber Security, W.H. Robinson

  19. Summary Undergraduate Education Graduate Education Professoriate or Industry • Leverage TRUST programs across multiple communities: undergraduate to the professorate and beyond • TRUST-REU, CDSIA, WISE • Broaden participation of women and minorities in TRUST research thrusts • Develop the next generation of cyber security professionals • Engage a diverse group of researchers (faculty and students) TRUST Outreach, W. Robinson

More Related