POPULARITY
All Aboard the Innovation Express: RSAC 2025 On Track for Cybersecurity's FutureLet's face it—RSAC isn't just a conference anymore. It's a movement. A ritual. A block party for cybersecurity. And this year, it's pulling into the station with more tracks than ever before—figuratively and literally.In this On Location episode, we reconnect with Cecilia Murtagh Marinier, Vice President of Innovation and Scholars at RSAC, to dive into what makes the 2025 edition a can't-miss experience. And as always, Sean and Marco kick things off with a bit of improvisation, some travel jokes, and a whole lot of heart.From the 20th Anniversary of the Innovation Sandbox (with a massive $50M investment boost from Crosspoint Capital) to the growing Early Stage Expo, LaunchPad's Shark-Tank-style sessions, and the new Investor & Entrepreneur track, RSAC continues to set the stage for cybersecurity's next big thing.And this year, they're going bigger—literally. The expansion into the Yerba Buena Center for the Arts brings with it a mind-blowing immersive experience: DARPA's AI Cyber City, a physically interactive train ride through smart city scenarios, designed to show how cybersecurity touches everything—from water plants to hospitals, satellites to firmware.Add in eight hands-on villages, security scholars programs, coffee-fueled networking zones, and a renewed focus on inclusion, mentorship, and accessibility, and you've got something that feels less like an event and more like a living, breathing community.Cecilia also reminds us that RSAC is a place for everyone—from first-timers unsure where to begin to seasoned veterans ready to innovate and invest. It's about showing up, making a plan (or not), and being open to the unexpected conversations that happen in hallways, lounges, or over espresso in the sandbox village.And if you can't make it in person? RSAC has made sure that everything is accessible online—600 speakers, 600 vendors, and endless ways to engage, reflect, and be part of the global cybersecurity story.So whether you're hopping in the car, boarding a flight, or—who knows—riding a miniature DARPA train through Northridge City, one thing's for sure: RSAC 2025 is going full speed ahead—and we're bringing you along for the ride.⸻
Cyberattacks are fast becoming our biggest global threat - so why aren't we better prepared? Matt O'Kane takes us on an inspiring journey from overcoming blindness to leading a cybersecurity business, shining a light on the evolving landscape of cyber threats. He critiques current cyber education methods, revealing how they often prepare students for calm seas rather than the turbulent waters of real-world challenges. O'Kane advocates for a hands-on, competitive approach to cyber education, likening it to a digital playground where students can safely explore, tinker, and compete. By cultivating curiosity and resilience in young cyber defenders, he envisions educational environments that balance safety with the freedom to innovate. This narrative calls for a bold reimagining of how we prepare for the cyber threats of tomorrow. Progress? is a UNSW Centre for Ideas project, with illustrations designed by Lucy Klippan, video production by AVI and All things All Creatures, and podcast production by Matt Sladen and Kara Jensen-MacKinnon. See omnystudio.com/listener for privacy information.
In this episode, Laurie Salvail, Ph.D., Executive Director of CYBER.ORG, joins me to discuss the importance of cybersecurity education for K-12 students. Primarily funded by the Cybersecurity and Infrastructure Security Agency (CISA), CYBER.ORG is a powerful and free resource available to K-12 students and educators in the United States. CYBER.ORG's Range, a cloud-based virtual environment, empowers K-12 students with real-world cybersecurity skills in a secure platform.Action Items and Discussion HighlightsTo inquire about professional development opportunities and resources for your school, contact CYBER.ORG at info@cyber.org or through the website.Cybersecurity and Infrastructure Security Agency (CISA) is one of the main funders of CYBER.ORG.CYBER.ORG offers no-cost professional development for teachers and caregivers across the US.Currently, over 35,000 teachers have access to CYBER.ORG content and other resources.Resources at Cyber.Org are available to all schools -- public, private, and homeschools.If a child is old enough to receive some type of technology, then they are old enough to learn how to use it.For cybersecurity education and training to be effective, they should be delivered in a fun, interactive, and immersive manner.Encourage industry professionals in your network to volunteer at local schools, speak to students about their cybersecurity-related careers, and help promote awareness about the field.Time Stamps00:02 -- Introduction00:49 -- Guest's Professional Highlights02:41 -- About Cyber.Org06:08 -- Vulnerability of youth to different forms of cyber attacks07:22 -- Gaining access to Cyber.Org resources08:34 -- Gaps in cyber education from K-1213:36 -- How early should kids be exposed to cybersecurity awareness programs?15:21 -- Cybersecurity is everyone's business17:13 -- Should cybersecurity education be part of the K-12 core curriculum as early as possible? 22:35 -- Many schools have their own cybersecurity curriculum and cybersecurity program. So, where do cyber.org resources fit in for these schools?28:26 -- How can listeners, as well as their organizations, help the cause of K-12 cybersecurity education?Memorable Laurie Salvail Quotes/Statements"A big part of who we are, though, is that we do grant writing to make our resources available completely free of charge for any school district teacher; we will never charge the user for anything at all.""We are very thankful to receive funding from the Cybersecurity and Infrastructure Security Agency (CISA). They're one of our main funders right now, allowing us to create these resources for students across the US. "We are able to offer no-cost professional development for our teachers and caregivers across the US.""If you want to teach a student about cybersecurity, come to cyber.org, and we've got free resources for you to dive into and learn how to have those conversations where we're exciting our children.""We have over 35,000 teachers right now that have access to our content.""Cybersecurity is an important topic for all students at all grade levels. There's an age-appropriate way to do it at those levels, and we're here to help, so spreading that message is really important.""Resources at Cyber.Org are available to all schools, public, private, and homeschool families.""Every school is unique, and every school is different, and we hop on a call with each school to say, what will work in your building, what do your students
Money Talks is hosted by Dr Nancy Lottridge Anderson, President of New Perspectives and Ryder Taff, Portfolio Manager at New Perspectives. In this episode, we learn about keeping your personal information safe online with guests Dr. George Trawick, Cyber Coordinator and Associate Professor of Computer Science and Engineering at Mississippi State University and Shelly Hollis, Director of the Center for Cyber Education at Mississippi State University. Shelly Hollis mentions the Cybersecurity Conference at the Refufge Conference Center in Flowood on January 17, 2025. For more information click on this link https://tinyurl.com/CyberSafeMS. Also mentioned was the Cybersecurity and Infrastructure Security Agency. They. can be found at Home Page | CISA. Hosted on Acast. See acast.com/privacy for more information.
Diane M. Janosek, PhD, JD, is the former training director/commandant at the National Security Agency's National Cryptologic University, and most recently deputy director of NSA Compliance. Today, she is the CEO at Janos LLC and award-winning cybersecurity leader, author, and sought-after speaker. In this episode, she joins host Paul John Spaulding to discuss cybersecurity education, how schools and certifications play a role, and more. This episode is brought to you by Cybersecurity Ventures, page one for the global cyber economy, and a trusted source for cybersecurity facts, figures, and statistics. To learn more, visit https://cybersecurityventures.com
In this episode, host Raghu Nandakumara sits down with Kyla Guru, a Stanford University student and passionate cybersecurity advocate. Kyla's journey started at the age of 14, leading her to found Bits N' Bytes Cybersecurity Education. She shares the importance of proactive cyber education, insights from her work with government and private sector organizations, and the role of AI in cybersecurity defense. Kyla also emphasizes integrating security into product development and the significance of grassroots community engagement in fostering cybersecurity awareness. --------“Even with artificial intelligence, we should just think about how our defense in depth, our security posture hasn't necessarily changed that much. It has changed in terms of improvement, but it's a cat-and-mouse game and the threat actors are also improving so we have to adapt. It's not just a one-and-done. ‘I've done my security. I'm done with it. I'm not going to think about it.' It's more so, ‘Okay, can we revise this now that the threat actors are evolving? What can we do to just stay ahead of the needle?' And I think as designers, that's a big thing to think about when you're designing a product is like, ‘Okay, if I build this, if I design this this way, how would attackers try and go around it and what is their next move?”--------Time Stamps (00:43) Kyla's background and journey into cybersecurity(08:28) Proactive approaches to cyber education(11:09) Ways to measure cybersecurity education impacts(19:25) Incorporating the zero trust concept into education(25:53) Importance of secure by design(32:52) Significance of user experience in security(35:29) Day-to-day in threat intelligence(38:21) Addressing common and recurring vulnerabilities(42:39) AI's impact on cybersecurity(47:08) Future of cybersecurity and the human element(49:20) Advice to cybersecurity professionals --------SponsorAssume breach, minimize impact, increase resilience ROI, and save millions in downtime costs — with Illumio, the Zero Trust Segmentation company. Learn more at illumio.com.--------LinksConnect with Kyla on LinkedInCheck out Bits N' Bytes Cybersecurity EducationLearn more about GirlCon
Cybersecurity threats are changing, emerging, and growing every day to include city funds, government websites, and water systems and other infrastructure. Local officials should stay aware of the changing cybersecurity landscape and evolving hacker tactics. In this episode, Scott interviews Dr. Michael Ramage, Director of Cyber Education and Research Center at Murray State University, to learn about the most important issues to know. Dr. Ramage will also present a more in-depth version of this discussion at the 2024 TML Annual Conference and Exhibition in October. Don't miss this episode or the presentation, both of which provide an overview of the dangers facing your communities, while highlighting steps and governance necessary to protect your network, data, and, ultimately, your people. Further Information:Murray State University Cyber Program Home PageMurray State Cyber Center YouTube Channel (Including 10 @ 10)2024 TML Annual Conference Cyber Presentation – Friday Agenda (see 9:00 - 10:15 a.m.)TML Risk Pool's Cyber Bytes #3: Preventing Fraudulent InstructionTML Risk Pool's Cyber Liability Home Page
In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janka, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry. Impactful Moments: 00:00 - Welcome 01:20 - Introducing guest, Tanya Janca 03:09 - “IDK How to Make SemGrep Rules…” 0707 - Finding Shadow IT & Embezzlers 11:27 - Join Our Mastermind 12:09 - Becoming an AppSec Professional 15:22 - Elections CISO 18:00 - Speaking at Conferences 21:15 - Microsoft Calls Me One Day… 23:21 - Parting Ways; But Still Friends 24:30 - “Can You Train Our Devs?” 27:50 - Fairness Is Important 32:27 - Put Yourself Out There! Links: Connect with our guest, Tanya Janca: https://www.linkedin.com/in/tanya-janca/ Check out SemGrep Academy: https://academy.semgrep.dev/ We Hack Purple Podcast: https://wehackpurple.buzzsprout.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc.On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in a compelling conversation with Robert Fernandes, CISO at the Investment Center, a financial service provider based in New Jersey. Together, they delve into the concept of viewing cybersecurity not merely as a cost center but as a profit center. This innovative perspective is fundamentally altering how businesses approach their cybersecurity investments.Sean Martin opens the discussion by addressing the evolving landscape of cybersecurity. He highlights how traditional views of cybersecurity — such as those held for an insurance policy — are outdated. Robert Fernandes agrees and emphasizes that times have changed; there's a growing need for businesses to leverage their cybersecurity posture as a competitive advantage. He advocates for the proactive use of a robust cybersecurity program to attract clients and secure trust, much like other marketing strategies.Drawing parallels from various industries, Fernandes notes that grocery stores and restaurants don't just sell food; they sell safe and high-quality food experiences. Similarly, automobile manufacturers sell not just vehicles but also safety and comfort. In the same vein, cybersecurity should be seen as an integral part of the product, enhancing its value and appeal to customers. For Fernandes, this shift in thinking can transform a company's cybersecurity program from a necessary expense into a key marketing asset.Fernandes also discusses the importance of breaking down silos within organizations. Effective communication between different departments, such as marketing, operations, and cybersecurity, can lead to a more cohesive strategy where cybersecurity is embedded in the company's culture and operations. This integration can significantly enhance the company's security posture, making it a selling point rather than an afterthought.One particularly intriguing point Fernandes makes is the role of education in shifting perceptions about cybersecurity. He stresses the need to inform and educate stakeholders - from end-users to executives - about the importance of cybersecurity. By moving past buzzwords and misconceptions, businesses can better understand and articulate the value of their cybersecurity measures to clients and partners. Martin and Fernandes also touch on the role of cyber insurance in conveying trust. A robust cyber insurance policy can serve as a testament to the company's strong security posture, further building client confidence.Ultimately, the conversation underscores that by rethinking cybersecurity - from product design to marketing and beyond - businesses can realize substantial benefits. This episode is a must-listen for business leaders looking to turn their cybersecurity efforts into a profitable and strategic advantage.Top Questions AddressedHow can businesses transform cybersecurity from a cost center to a profit center?What are the benefits of breaking down organizational silos in cybersecurity strategy?How does educating stakeholders affect the perception and effectiveness of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc.On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in a compelling conversation with Robert Fernandes, CISO at the Investment Center, a financial service provider based in New Jersey. Together, they delve into the concept of viewing cybersecurity not merely as a cost center but as a profit center. This innovative perspective is fundamentally altering how businesses approach their cybersecurity investments.Sean Martin opens the discussion by addressing the evolving landscape of cybersecurity. He highlights how traditional views of cybersecurity — such as those held for an insurance policy — are outdated. Robert Fernandes agrees and emphasizes that times have changed; there's a growing need for businesses to leverage their cybersecurity posture as a competitive advantage. He advocates for the proactive use of a robust cybersecurity program to attract clients and secure trust, much like other marketing strategies.Drawing parallels from various industries, Fernandes notes that grocery stores and restaurants don't just sell food; they sell safe and high-quality food experiences. Similarly, automobile manufacturers sell not just vehicles but also safety and comfort. In the same vein, cybersecurity should be seen as an integral part of the product, enhancing its value and appeal to customers. For Fernandes, this shift in thinking can transform a company's cybersecurity program from a necessary expense into a key marketing asset.Fernandes also discusses the importance of breaking down silos within organizations. Effective communication between different departments, such as marketing, operations, and cybersecurity, can lead to a more cohesive strategy where cybersecurity is embedded in the company's culture and operations. This integration can significantly enhance the company's security posture, making it a selling point rather than an afterthought.One particularly intriguing point Fernandes makes is the role of education in shifting perceptions about cybersecurity. He stresses the need to inform and educate stakeholders - from end-users to executives - about the importance of cybersecurity. By moving past buzzwords and misconceptions, businesses can better understand and articulate the value of their cybersecurity measures to clients and partners. Martin and Fernandes also touch on the role of cyber insurance in conveying trust. A robust cyber insurance policy can serve as a testament to the company's strong security posture, further building client confidence.Ultimately, the conversation underscores that by rethinking cybersecurity - from product design to marketing and beyond - businesses can realize substantial benefits. This episode is a must-listen for business leaders looking to turn their cybersecurity efforts into a profitable and strategic advantage.Top Questions AddressedHow can businesses transform cybersecurity from a cost center to a profit center?What are the benefits of breaking down organizational silos in cybersecurity strategy?How does educating stakeholders affect the perception and effectiveness of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: ✨ Jason Nurse, Reader in Cyber Security, University of Kent, UK [@UniKent]On LinkedIn | https://www.linkedin.com/in/jasonrcnurseOn Twitter | https://twitter.com/jasonnurse____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
In today's episode, we talk with Paul Moreno, who currently works as CISO at Catawiki. Before Catawiki Paul, worked for the biggest tech giants in the world such as Pinterest, Uber, or Adyen and witnessed the rise of Silicon Valley in San Francisco firsthand. In this episode we talked about the integration of AI in security orchestration and response, emphasizing the importance of comprehensive cybersecurity education for all and the pivotal role of government and privacy laws in ensuring digital safety. To end on a lighter note, Paul wishes everyone to work on things that make them happy and shares valuable insights for everyone getting starting with their #cybercareers. Get in contact with Paul: https://www.linkedin.com/in/unic0rn/ Timecodes: (00:00) - AI for Security Orchestration and Response (12:07) - Rise of Silicon Valley (18:10) - Pinterest, Uber, Adyen (25:11) - CISO at Catawiki (32:34) - Personal and Professional Happiness
Join Sean Martin and Aviv Cohen as they embark on a fascinating exploration of the often misunderstood world of cybersecurity. They discuss the importance of recognizing cybersecurity professionals as the modern-day heroes they are, and the need for children to understand and appreciate their parents' roles in this field.Cohen introduces a unique tool to bridge this understanding gap - a beautifully illustrated book titled "Castle Defenders: What Do Cyber Parents Do?". The book, written in engaging rhyme, uses the metaphor of a castle needing defense to explain the complex world of cybersecurity to children. It serves not only as a bedtime story but also as a platform for parents to discuss online safety and cybersecurity literacy with their children.The book has been met with enthusiastic feedback, with parents sharing their experiences of reading it to their children, and children asking for repeated readings. It also includes ten cybersecurity rules, providing children with practical tools to stay safe online. The conversation underscores the urgent need for more cyber defenders in our world and the importance of fostering understanding and respect for this role from a young age.This episode is a must-listen for anyone interested in the intersection of technology, cybersecurity, and society, and especially for those who wish to inspire the next generation of cyber defenders.About the Book: Castle Defenders: What Do Cyber Parents Do?Mommy is late for dinner again, and Emma and Oliver are frustrated. Daddy comes to the rescue with spaghetti and an enchanting tale of brave knights and mysterious castles, revealing how he and Mommy work tirelessly to protect the people on the internet from bad hackers and other online threats.Castle Defenders by Dana Meschiany is a charming story, filled with delightful illustrations and playful storytelling, is perfect for young minds eager to explore the captivating world of cybersecurity.Note: This story contains promotional content. Learn more.Guest: Aviv Cohen, CMO at Pentera [@penterasec]On Linkedin | https://www.linkedin.com/in/avivco/ResourcesLearn more about Pentera and their offering: https://itspm.ag/pentera-tyuwCatch more stories from Pentera at https://www.itspmagazine.com/directory/penteraBook | Castle Defenders: What Do Cyber Parents Do?: https://www.amazon.com/Castle-Defenders-What-Cyber-Parents/dp/B0C51PCQ6QAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Join Sean Martin and Aviv Cohen as they embark on a fascinating exploration of the often misunderstood world of cybersecurity. They discuss the importance of recognizing cybersecurity professionals as the modern-day heroes they are, and the need for children to understand and appreciate their parents' roles in this field. Cohen introduces a unique tool to bridge this understanding gap - a beautifully illustrated book titled "Castle Defenders: What Do Cyber Parents Do?". The book, written in engaging rhyme, uses the metaphor of a castle needing defense to explain the complex world of cybersecurity to children. It serves not only as a bedtime story but also as a platform for parents to discuss online safety and cybersecurity literacy with their children. The book has been met with enthusiastic feedback, with parents sharing their experiences of reading it to their children, and children asking for repeated readings. It also includes ten cybersecurity rules, providing children with practical tools to stay safe online. The conversation underscores the urgent need for more cyber defenders in our world and the importance of fostering understanding and respect for this role from a young age. This episode is a must-listen for anyone interested in the intersection of technology, cybersecurity, and society, and especially for those who wish to inspire the next generation of cyber defenders.About the Book: Castle Defenders: What Do Cyber Parents Do?Mommy is late for dinner again, and Emma and Oliver are frustrated. Daddy comes to the rescue with spaghetti and an enchanting tale of brave knights and mysterious castles, revealing how he and Mommy work tirelessly to protect the people on the internet from bad hackers and other online threats.Castle Defenders by Dana Meschiany is a charming story, filled with delightful illustrations and playful storytelling, is perfect for young minds eager to explore the captivating world of cybersecurity.Note: This story contains promotional content. Learn more.Guest: Aviv Cohen, CMO at Pentera [@penterasec]On Linkedin | https://www.linkedin.com/in/avivco/ResourcesLearn more about Pentera and their offering: https://itspm.ag/pentera-tyuwCatch more stories from Pentera at https://www.itspmagazine.com/directory/penteraBook | Castle Defenders: What Do Cyber Parents Do?: https://www.amazon.com/Castle-Defenders-What-Cyber-Parents/dp/B0C51PCQ6QAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Peggy Smedley and Rigoberto Chinchilla, professor of applied engineering and technology, Eastern Illinois University, talk about cyber from a historical perspective. He says most equipment was never designed to withstand attacks. They also discuss: The importance of cybersecurity in education. Legacy problems in cybersecurity. If companies are making mistakes or staying ahead of cyber. eiu.edu/cyber (11/21/23 - 848) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Rigoberto Chinchilla, Eastern Illinois University, worker of tomorrow This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
Peggy Smedley and Rigoberto Chinchilla, professor of applied engineering and technology, Eastern Illinois University, talk about cyber from a historical perspective. He says most equipment was never designed to withstand attacks. They also discuss: The importance of cybersecurity in education. Legacy problems in cybersecurity. If companies are making mistakes or staying ahead of cyber. eiu.edu/cyber (11/21/23 - 848) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Rigoberto Chinchilla, Eastern Illinois University, worker of tomorrow This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
White House releases National Cyber and Workforce Education Strategy Latest DeFi exploit sees millions in losses No link found between cyber insurance and paying ransoms Thanks to today's episode sponsor, Opal Opal is the data-centric identity platform. Identity is one of the last great enterprise frontiers. It's fragmented with legacy architecture. Opal's mission is to empower enterprises to understand and calibrate access end to end. The best security teams from companies like Databricks, Figma, Blend, and Drata use Opal to build identity security for scale. Visit Opal.dev.
Podcast: ICS Cyber Talks PodcastEpisode: Cyber Edu 1: Avi Weissman, founder and Co-CEO @See-Security InfoSec College about cyber education & trainingPub date: 2023-05-27Nachshon Pincu and Kfir Tzukrel co-hosting Avi Weissman, founder, and Co-CEO @See Security InfoSec & Cyber Warfare College, in a conversation about cyber education & training How did cyber education and training start in Israel? Is it worth entering the cyber industry? What is the future of cyber security? Who is the cyber industry suitable for? What is the best way to get cyber education and training: On your own, offline on study sites, online on college websites, F2F in college, or at university? What are the important things to look for in cyber training? What percentage of SEE-Security College graduates who come to study without previous work experience manage to find a job in Cyber? To what extent do the studies prepare them for the working world, and how much do they need to complete, such as taking additional tests such as CISSP? There are advanced certifications such as CISO and Architect, are they intended for people who want to get these jobs, or for those who are in these jobs and want to deepen their knowledge? What are "study levels" and "employment levels"? How and when do you start working? Does the employer always look for experience? What do you want listeners to take away from the conversation? And more... נחשון פינקו וכפיר צוקרל מארחים את אבי וויסמן מייסד ומנכ"ל משותף במכללת ללימודי סייבר סי-סקיורטי. אבי מוותיקי העוסקים בתחום הכשרת הסייבר בישראל בשיחה על איך נכנסים לתחום הסייבר, ואיזו הכשרה נדרשת קצת היסטוריה, איפה התחיל נושא הכשרת הסייבר בישראל, והאם ידעתם שיגאל גויטע מחזיק בתעודה מספר 0001 בקורס הסייבר הראשון בישראל. האם כדאי להיכנס לענף הסייבר? מה עתידו? למי ענף הסייבר מתאים? לבד? אוף-ליין באתרי הלימוד? און ליין באתרי הלימוד והמכללות? פרונטלי במכללה? באוניברסיטה? מה הדברים החשובים שצריך לחפש בהכשרת סייבר? מה אחוז הבוגרים שלמכללת סי-סקיורטי המגיעים ללימודים ללא ניסיון תעסוקתי קודם, אכן מצליחים למצוא משרה בסייבר עד כמה הלימודים מכינים בפועל לעולם התעסוקתי, וכמה הם נדרשים להשלים למבחנים בינלאומים כגון סי.אי.אס.אס.פי מה הן קומות לימוד ומדרגות תעסוקה איך ומתי מתחילים לעבוד? אם המעסיק תמיד מחפש ניסיון? ועוד The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Nachshon Pincu and Kfir Tzukrel co-hosting Avi Weissman, founder, and Co-CEO @See Security InfoSec & Cyber Warfare College, in a conversation about cyber education & training How did cyber education and training start in Israel? Is it worth entering the cyber industry? What is the future of cyber security? Who is the cyber industry suitable for? What is the best way to get cyber education and training: On your own, offline on study sites, online on college websites, F2F in college, or at university? What are the important things to look for in cyber training? What percentage of SEE-Security College graduates who come to study without previous work experience manage to find a job in Cyber? To what extent do the studies prepare them for the working world, and how much do they need to complete, such as taking additional tests such as CISSP? There are advanced certifications such as CISO and Architect, are they intended for people who want to get these jobs, or for those who are in these jobs and want to deepen their knowledge? What are "study levels" and "employment levels"? How and when do you start working? Does the employer always look for experience? What do you want listeners to take away from the conversation? And more... נחשון פינקו וכפיר צוקרל מארחים את אבי וויסמן מייסד ומנכ"ל משותף במכללת ללימודי סייבר סי-סקיורטי. אבי מוותיקי העוסקים בתחום הכשרת הסייבר בישראל בשיחה על איך נכנסים לתחום הסייבר, ואיזו הכשרה נדרשת קצת היסטוריה, איפה התחיל נושא הכשרת הסייבר בישראל, והאם ידעתם שיגאל גויטע מחזיק בתעודה מספר 0001 בקורס הסייבר הראשון בישראל. האם כדאי להיכנס לענף הסייבר? מה עתידו? למי ענף הסייבר מתאים? לבד? אוף-ליין באתרי הלימוד? און ליין באתרי הלימוד והמכללות? פרונטלי במכללה? באוניברסיטה? מה הדברים החשובים שצריך לחפש בהכשרת סייבר? מה אחוז הבוגרים שלמכללת סי-סקיורטי המגיעים ללימודים ללא ניסיון תעסוקתי קודם, אכן מצליחים למצוא משרה בסייבר עד כמה הלימודים מכינים בפועל לעולם התעסוקתי, וכמה הם נדרשים להשלים למבחנים בינלאומים כגון סי.אי.אס.אס.פי מה הן קומות לימוד ומדרגות תעסוקה איך ומתי מתחילים לעבוד? אם המעסיק תמיד מחפש ניסיון? ועוד
An inside look at RaaS White House cyber strategy goes big on education Chinese attackers hit TP-Link routers Thanks to today's episode sponsor, Hunters If your SIEM is causing an endless cycle of noisy alerts, manually writing generic detection rules, and limited data ingestion & retention, your SOC might need an upgrade. Hunters is a SaaS platform, purpose built for your Security Operations team. Solaris Group, a leading German FinTech, implemented Hunters SOC Platform to eliminate the burden of redundant detection engineering and manual event correlation – allowing SOC analysts to focus on higher-value tasks. Visit hunters.security to learn how your SOC can Move Beyond SIEM and let them know you heard about Hunters on the CISO Series.
The cybersecurity community has had lots of conversations about workforce development, but it's time to take action. Learn about the efforts to bring cybersecurity education to the K-12 sector as part of the effort to narrow the skills gap and build the next generation of cyber defenders. Speakers: Laurie Salvail, Executive Director, CYBER.ORG Kacy Zurkus, Senior Content Manager, RSA Conference
Weaver Outrage Meter: Low North Dakota Announces Mandatory Cybersecurity Education North Dakota just announced a new educational mandate for grade school students to learn more about cybersecurity. Such a move is not only a smart one, but it is going to have a positive impact on future generations of cybersecurity professionals. Cyber skills gap acknowledged Good example of government leadership and action Good news for MSPs (and other employers) in the near future https://www-kxnet-com.cdn.ampproject.org/c/s/www.kxnet.com/news/state-news/north-dakota-is-first-state-to-approve-required-cybersecurity-education/amp/ MSP Recession Planning More talk about a recession here in the United States; it seems inevitable that we are headed into, or may already be in a recession. What, if anything, can you do to prepare? Credit tightening will impact service providers, but more so on the reactive side. VARs, system integrators, break/fix companies, these are the types of IT business models most vulnerable to tight credit markets and will feel the financial pain more acutely compared to an MSP with steady, predictable recurring revenue and cash flow. Historical impact of recessions on MSPs Credit markets tightening, who will suffer most? Can MSPs thrive during recessionary periods? CaaS dangers MSPs should avoid Compliance as a Service is getting more attention in the IT channel. With such attention, MSPs (and non-MSPs) are both jumping onto the CaaS bandwagon. But, just as with most things in life, there are right ways and wrong ways to go about developing a CaaS strategy and offering. Here are some helpful tips to get you pointed in the right direction. Beware of reactive CaaS providers Scanning is not compliance If you've never been through an external organizational certification or audit, CaaS is probably going to be more challenging for you
The cybersecurity industry is facing a massive talent shortage. In fact, Cybersecurity Ventures has predicted that there will be 3.5 million unfilled positions in cybersecurity by 2025. As cyber threats continue to rise in number and complexity, security leaders are stretching their employees and resources thin to defend their organizations against these advanced threats and build cyber resilience. Despite the demand for talent, many of those who are trying to break into the cybersecurity industry are faced with numerous barriers. From financial restrictions to managing unrealistic expectations from their hiring managers, the entry-level security practitioners are struggling to get their foot in the door. In this episode, Tia Hopkins, Chief Cyber Resilience Officer and Field CTO at eSentire, is joined by Ken Underhill, CEO at Cyber Life, to discuss: How to prepare the next generation of cybersecurity leaders, Which soft skills security practitioners should have to advance in their careers, How security leaders can cultivate more talent, and more. --- Have a question you want us to answer in the next Office Hours episode? Reach out to us: hello@esentire.com About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company's mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire's Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com
In this episode of the CYBER24 podcast, presented by VLCM, we talk about cybersecurity education with Laurie Salvail, the executive director of CYBER.org. She's working to improve cybersecurity literacy and expand K-12 cybersecurity education to help student stay safe online and prepare them for cybersecurity careers. PanelistsLaurie Salvail, Executive Director of CYBER.org
Mission Critical: Closing the Cybersecurity Workforce Gap E34 Did you know that the global cybersecurity workforce gap is roughly 3.4 million people? This means that the supply of skilled cybersecurity workers needed to protect businesses from cyber threats has struggled to keep up with growing demand. The January 2023 episode of the Arizona Technology Council’s […] The post Mission Critical: Closing the Cybersecurity Workforce Gap E34 appeared first on Business RadioX ®.
John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective. Timecode Guide: [01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content [06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success” [13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches [16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team [21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands” Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! What is your origin story for wanting to educate other hackers? Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience. “Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.” What feelings do you get looking back on the YouTube content you've created so far? John prioritizes clarity, transparency, and honesty in what he does, and he's not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he's showing in his videos, he prefers to keep things honest, to show where he's made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work. “I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It's not all sexy, there's a lot of failure in hacking.” Have you ever considered focusing on the blue team or the defensive side of cybersecurity? The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John's own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team. “We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?” What advice do you have for red team content creators that want to share content and spread awareness safely? With the impact that he's had and the content he's put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before. Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone. “Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.” ---------- Links: Check out our guest, John Hammond, on YouTube and LinkedIn. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn. Catch up with Chris Cochran on Twitter and LinkedIn. Continue the conversation by joining our Discord.
The current global landscape has amplified the need for organizations to provide employees with consistent cyber education. What should you consider in creating and maintaining such a culture? Host Mary Rosendahl, Managing Director, CashPro Security Product Executive, Bank of America Guest Roland Chan, Cyber Crime Prevention Executive, Global Information Security, Bank of America MAP 4885973 / 8-3-23
John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective. Timecode Guide: [01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content [06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success” [13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches [16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team [21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands” Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley What is your origin story for wanting to educate other hackers? Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience. “Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.” What feelings do you get looking back on the YouTube content you've created so far? John prioritizes clarity, transparency, and honesty in what he does, and he's not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he's showing in his videos, he prefers to keep things honest, to show where he's made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work. “I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It's not all sexy, there's a lot of failure in hacking.” Have you ever considered focusing on the blue team or the defensive side of cybersecurity? The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John's own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team. “We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?” What advice do you have for red team content creators that want to share content and spread awareness safely? With the impact that he's had and the content he's put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before. Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone. “Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.” Hacking the Vocabulary: Cybersecurity Capture the Flag (CTF): Competitions to demonstrate expertise in attacking computer resources. The “flag” is normally a file or code a team recovers and provides as proof of their successful penetration of defenses. Python Programming Language: A powerful, general-use programming language, often used in web development, data science, and creating software prototypes. The Onion Router (TOR): A free and open-source software for enabling anonymous communication, with each “onion” network having layers of encryption. Kaseya VSA Ransomware Incident: A ransomware attack in July of 2021. This paralyzed as many as 1,500 organizations by compromising tech-management software from a company called Kaseya. Log4j: A Java-based logging utility used by developers to keep track of what happens in their software applications or online services. Zero-Day Vulnerability: A vulnerability in a system or device that has been disclosed but is not yet patched. ---------- Links: Check out our guest, John Hammond, on YouTube and LinkedIn. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn. Catch up with Chris Cochran on Twitter and LinkedIn. Continue the conversation by joining our Discord.
Joining the podcast this week is Bash Kazi, CEO of Cyber Range Solutions. He shares perspective on the importance of experiential and continuous training across red team, blue team and threat hunting and creating real world environments to learn based on existing and emerging threats. He also shares some stories from the field such as a voter hacking simulation won by a 15-year-old student as well as available resources and organizations that provide veterans a place to learn cyber skills for low or no cost. CEO, Cyber Range Solutions Mubashir G. Kazi is the CEO of Cyber Range Solutions. He has over 25 years of global experience with governments and Fortune 500 companies (3M, Exxon & Xerox) in the areas of engineering, security, Information Technology and program management. Mr. Kazi holds graduate and post-graduate degrees in Engineering from McGill University in Montreal, Canada and has extensive post-graduate research and training in Advanced Project, Risk Management and Program Management skills specific to the fields of engineering and technology management from Stanford University. Mubashir has also served as a management consultant on several security programs around the world (Qatar, Israel, UAE, Pakistan, Afghanistan and USA). His expertise includes national border security, counter narcotics technology development & deployment, engineering management, cyber security training and international program management. Mubashir was the Architect and Program Manager supervising the design, management and execution for a program involving the deployment of several thousand personnel for the development of a National Data Repository, Border Security, Machine Readable Passport and Electronic Voter Registration system for the Ministry of Interior, Government of Pakistan. Mubashir has architected the creation of one of the largest citizen data repositories and overseen the national census data gathering initiative to document over 100 million individuals. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e181
What is the price for cybersecurity education and are you gated out of accessing it?What if you could get world class training for the price that YOU decide?John Strand, Blackhills Information Security, and AntiSyphon are bringing you Pay What You Can training, specifically Active Defense and Cyber Deception.https://dev.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/Guest Links:https://twitter.com/strandjshttps://twitter.com/BHinfoSecurityhttps://www.antisyphontraining.com/https://www.linkedin.com/company/black-hills-information-security/https://www.blackhillsinfosec.com/"Your 5 Year Path" Video Mentioned on Stream:https://www.youtube.com/watch?v=Uv-AfK7PkxUSimply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.
Whether it is educating students in cyber practices, teaching cyber courses or protecting the college itself with security, Gloucestershire College are reaching, preaching and teaching cyber from all angles.It is Episode 10 of the Bamboo Talking Tech podcast! In this episode, our host Ellen Smith and CEO, Lorrin White are joined by Gloucestershire College's CFO and Vice Principal, Andrew Bates.So, just how important is technology in education?Let's dive in!
Welcome to The Fraudian Slip, the Identity Theft Resource Center's (ITRC) podcast, where we talk about all-things identity compromise, crime and fraud that impact people and businesses. Joining us to talk about cyberattack events and how you can protect your business, your family, and yourself is the ITRC's CEO Eva Velasquez and Zarmeena Waseem, Director of Cyber Education at the National Cyber Security Alliance. Read the full transcript: https://idtheft.center/TheFraudianSlipNCSA Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
This week, Mat and Mike are joined by Jeremy Johns and Producer Jim. They discuss their stories about their experiences on the Purdue Cyber Range, and Jim makes a near-fatal mistake. It's Cybersecurity Awareness Month and Cyber Career week! Only for October, take 25% off our world-class Cyber Range Training courses. Just book and save. Learn more at cyber.tap.purdue.edu/cybersecurity-awareness-month-------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu
Kevin Nolten, Director of Academic Outreach from Cyber.org, joins Business Security Weekly to discuss how cyber education is the key to solving the skills gap and developing the next generation of cybersecurity professionals. Kevin will share examples of how we, the cybersecurity community, can get involved in K-12 and higher education programs, strategies for developing young talent, and how Cyber.org's curriculum can be used to train your employees! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw231
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and why companies should use a digital asset approach to assessing risk. Evans also talks about how she put together one of the most popular cyber security educational curriculums in the world, and how you can take advantage of it to further your career. All this and much, much more on Episode #155 of Task Force 7 Radio.
Kevin Nolten, Director of Academic Outreach from Cyber.org, joins Business Security Weekly to discuss how cyber education is the key to solving the skills gap and developing the next generation of cybersecurity professionals. Kevin will share examples of how we, the cybersecurity community, can get involved in K-12 and higher education programs, strategies for developing young talent, and how Cyber.org's curriculum can be used to train your employees! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw231
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and why companies should use a digital asset approach to assessing risk. Evans also talks about how she put together one of the most popular cyber security educational curriculums in the world, and how you can take advantage of it to further your career. All this and much, much more on Episode #155 of Task Force 7 Radio.
This week, Mike shares a resource that provides workshops, events, and techniques to help educators teach cyber security and include those concepts into curriculum. Ryan shares an article that talks about recent trends in math instruction such as building students' problem-solving skills without including memorization of basic concepts. Tune in! Don't just listen, join the conversation! Tweet us at @AcademicaMedia or with the hashtag #BigIdeasinEducation with questions or new topics you want to see discussed. Articles: www.cyber.orghttps://www.edweek.org/teaching-learning/opinion-what-it-takes-to-actually-improve-math-education/2021/06?utm_source=tw&utm_medium=soc&utm_campaign=editHosts: Ryan Kairalla (@ryankair); Michael Hernandez (@edtechmichael)Producer: Ross Ulysse
Ron and Cyndi Gula interview Larry Sjelin and Julina Macy of the Center for Information Assurance and Security (CIAS) at the University of Texas-San Antonio (UTSA). UTSA's CIAS was the first place winner of the Gula Tech Foundation's March 2021 grant competition for non-profits focused on increasing public cybersecurity awareness. Ron and Cyndi discussed Data Care and cyber education, including CIAS' efforts to increase interest among K-12 students in cyber through their innovative card game.
Ron and Cyndi interview Philip Niedermair, the Founder of the National Cyber Group and a member of the Gula Tech Foundation advisory board, about Cyber Education and Development and Retention of the Cyber Workforce. They also discussed the Cyberspace Solarium effort. Additionally, they discussed leadership and some interesting stories about US naval history.
Episode Introduction Anyone can work in cybersecurity, with the right training. That’s what Josh Mason believes, and he would know. He’s a former Air Force pilot turned cybersecurity expert who spends his days training the military in cyber warfare at Jacobs’s Defense Cyber Crime Center. He’s also an instructor for With You With Me, an Australian company which helps people without a tech background get jobs in tech. In this episode of Cyber Security Heroes by IRONSCALES, Josh shares the historical perspective of cyber certifications, along with his opinion on the various courses and degrees available — and his recommendations for the best (and cheapest) path forward to a career in tech. Show Links Check out Jacobs Follow Josh Mason on LinkedIn Follow IRONSCALES on LinkedIn or Twitter Connect with Brendon Rod on LinkedIn
In this episode I discuss a variety of cyber topics from Ransomware to Cyber Education with Corey Munson of PC Matic. In fact it is actually Corey interviewing me, so it is a little different approach this week. If you have questions about the podcast, email me at darren@thecyburguy.com or find me at www.linkedin.com/in/darrenmott .
Vasileios Karagiannopoulos is a senior academic teacher at the University of Portsmouth. At the current moment, he is teaching areas of cybercrime and cybersecurity. In this episode of the podcast, we addressed cybersecurity and topics surrounding this topic. For more information, listen to the podcast episode // Cybercrime awareness clinic link (https://www.port.ac.uk/research/research-projects/cybercrime-awareness-clinic) // If you want to help this podcast, I created a Patreon. All the help is welcome (https://www.patreon.com/steacomedy_philosophy) // You can enter in contact via email (stea.comedy.philosophy@outlook.pt) // Or even by my social media accounts: Instagram (https://instagram.com/stea_comedy?igshid=5upgor5cwjh2) // Twitter (https://twitter.com/Stea_Comedy?s=09) // Tiktok (https://www.tiktok.com/@stea_comedy?) // Youtube channel (https://www.youtube.com/channel/UClvnLCF-TCnjfMVP-7xa5yQ)
On today's show, our host Abe Thompson talks with Amber Schroader on the world of data forensics and the impotence of having more women in cybersecurity. In an age of continuously generated data and diminishing privacy, it's essential to educate ourselves on where our information goes. As a prominent female in the cyber industry, Amber Schroader has done a lot for educating the next generation of women in cyber, whether for personal online safety or as a full-on career. Listen in as we discuss creating the future of women in cybersecurity on NCF. Visit our sponsors: Cyber Resilience Institute BlockFrame Inc. SecureSet Academy Murray Security Services
Diane M Janosek is the NSA Training Director and Commandant of the National Cryptologic School. In this episode of Cybercrime Radio, she tells us about many NSA training and education initiatives, including GenCyber, STARTALK, the National Centers of Academic Excellence in Cybersecurity, and the National Cryptologic School. Diane also shares with us why WiCyS and mentorship are so important to her. To learn more about the NSA and the National Cryptologic School visit https://nsa.gov • For more on cybersecurity, visit us at https://cybersecurityventures.com/
On this week’s Cyber Report, sponsored by Northrop Grumman, Philip Niedermair, CEO of the National Cyber Group (NCG.) and managing director of strategic alliances for Whiteford, Taylor & Preston (WTP) and Ron Gula, co-founder of GulaTech Adventures, a cyber security investment fund that is working with the next generation of cyber security start-ups, discuss the needed cyber security and IT learning continuum for students of all ages. Predicting cyber attacks before they happen is impossible. Until it’s not. Visit www.northropgrumman.com/cyber to learn more.
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and why companies should use a digital asset approach to assessing risk. Evans also talks about how she put together one of the most popular cyber security educational curriculums in the world, and how you can take advantage of it to further your career. All this and much, much more on Episode #155 of Task Force 7 Radio.
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and why companies should use a digital asset approach to assessing risk. Evans also talks about how she put together one of the most popular cyber security educational curriculums in the world, and how you can take advantage of it to further your career. All this and much, much more on Episode #155 of Task Force 7 Radio.
Ariel Evans, the CEO of Cyber Innovative Technologies and the Founder of Cyber Intelligence 4U appears on Episode #155 to unpack the complexities of Cyber Risk in a way that only she can. We ask Evans what she thinks companies need to change to increase their cyber resiliency, how digital assets are used, how she thinks about Cyber Resiliency, and why companies should use a digital asset approach to assessing risk. Evans also talks about how she put together one of the most popular cyber security educational curriculums in the world, and how you can take advantage of it to further your career. All this and much, much more on Episode #155 of Task Force 7 Radio.
A Conversation with Dave Feenan - Technology Ireland ICT Skillnet about Cyber Education
In this episode, our guests Bobbie Stempfley, Tom Patterson, and Eric Lankford explain and share what the National Cyber Moonshot initiative is, and the six strategic pillars for a safe and secure internet to bring economic growth, national security, enhanced privacy, technology advances, and global leadership benefits. Specifically, this episode focuses on the Cyber Education workshop, which is convening with leading experts and practitioners to look at breakthrough concepts and realities in use across the nation and around the world. The goal of the Education Pillar is to dramatically increase the availability, quality, and diversity of cybersecurity talent in the United States for Cybersecurity Moonshot Initiative strategic focus areas, while also educating all citizens of their shared responsibilities in creating a safe and secure internet environment. Bobbie has served at both DHS and CERT and now works for Dell’s office of the CISO. Tom is the Chief Trust Officer of Unisys, and Eric is the founding partner of K12 SIX.
TryHackMe - training the next generation of online hackers.
Headquartered in Colorado Springs, CO, the National Cybersecurity Center (NCC) is taking on tough cybersecurity challenges through its programs like the Cyber Education program. With exciting Cyber Education initiatives like the NCC Student Alliance, a student organization focused on K-12 cybersecurity education, the mission is to directly tackle the urgent demand for trained cybersecurity talent in the workplace by providing curriculum and nationally recognized certification opportunities. In this episode, NCC Marketing Manager Micki Cockrille explores this topic in-depth with Cyber Education Program Leader and cyber expert Thomas Holt Russell as he answers questions of how NCC is solving the cyber talent gap. This episode is brought to you by: National Cybersecurity Center Visit our sponsors: Cyber Resilience Institute BlockFrame Inc. SecureSet Academy Murray Security Services
On this week’s Cyber Report, sponsored by Northrop Grumman, Rep. Mike Gallagher, PhD, R-Wisc., the co-chairman of the Cyberspace Solarium Commission, discusses deterrence and the need for through-life cyber education for the American public from K-12 and beyond with Defense & Aerospace Report Editor Vago Muradian.
Thank you for joining us at the intersection of technology, cybersecurity, and society. In this episode, Sean and Marco are coming to you from the RSA Conference in San Francisco and are joined by Angel Grant and Andrew Woodward. The State of Cyber Education Awareness. In this conversation, we discuss the role of education in building the next generation of the workforce for the cybersecurity field and how companies and universities can work together to achieve the same goal. Ultimately with better results. “Companies are made of people” is an old saying that too often we tend to forget, just as we forget that people also build the technology and are ultimately responsible for the future of this and the CyberSecurity industry. As the Digital Revolution keeps moving forward at an oft-restless pace, the roles are becoming more interconnected and so new careers, new educational programs, and new work backgrounds must include skills not even considered relevant a few years ago. The talent gap is real but is not just an industry gap; it is also an educational institution gap that can be filled with being creative, open-minded, practical, diversity-oriented programs; educating new generations with a mindset of lifelong learning attitude will also prove valuable. We discuss this and much more, with our guests: - Andrew Woodward Executive Dean of the School of Science at Edith Cowan University - Angel Grant, Director of Digital Risk Solutions at RSA Security As it often happens at ITSPmagazine, this conversation starts and ends with the human element. If you are human, we invite you to listen up, and enjoy! For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage
I'm Dr. B and I have a particular view on cybersecurity's governance, risk, and compliance role in the organization; in this podcast show, I will share with you this view. Cyber risk plays a big role in the overall cybersecurity strategy of any organization and I'll take you through this journey, so you can also understand how to leverage this knowledge to make your business more resilient or expand your current knowledge on this subject.www.execcybered.comDr. B.
I'm Dr. B and I have a particular view on cybersecurity's governance, risk, and compliance role in the organization; in this podcast show, I will share with you this view. Cyber risk plays a big role in the overall cybersecurity strategy of any organization and I'll take you through this journey, so you can also understand how to leverage this knowledge to make your business more resilient or expand your current knowledge on this subject.www.execcybered.comDr. B.
We all know about the cyber threats that are out there thanks to the media. Do you really know the reasons why? In this episode, Darnley gives stats along with an insightful breakdown in what you and your employees need to do in order to stay ahead of the curve from cybercriminal attacks. It starts with you.
Interview with CEO of the Cyber Education Foundation Michael Daugherty: 4/9/19, Hr. 1 by Conduit Media
Michael J. Daugherty/LabMD and The Cyber Education Foundation Mike Daugherty is the CEO of LabMD, a cancer testing laboratory. He has spent most of the last decade defending his company against charges that it had deficient cyber-security practices. The early years of his entering and fighting Washington, DC, are recorded in his book The Devil […] The post Michael Daugherty with LabMD and The Cyber Education Foundation appeared first on Business RadioX ®.
Courtney Kofeldt is the Technology Coordinator and a Teacher at the Pennsylvania Leadership Charter School which is completely on-line. She shares tools and resources that are valuable to an on-line school and you can find value in as well. Follow Courtney http://twitter.com/Ms_Kof This episode of House of #EdTech is brought to you by TodaysMeet. Visit http://www.todaysmeet.com/houseofedtech House of #EdTech is sponsored by Audible.com. There are over 150,000 titles to choose from for your iPhone, Android, Kindle or other mp3 player. http://www.audibletrial.com/houseofedtech All links and shownotes at http://www.chrisnesi.com/2015/02/cyber-education-interview-with-courtney-kofeldt.html FEEDBACK Call: (732) 903-4869 Voxer: cnesi4602 Email: feedback@chrisnesi.com Twitter: http://twitter.com/mrnesi Send a voice message from http://www.chrisnesi.com
In this segment we talk about how to model and encourage students to use social media constructively and become good digital citizens. Follow:@ShellTerrell @iplante @s_bearden @Katrinastevens1 @thomascmurray ajpodchaski @bamradionetwork Shelly Sanchez Terrell is a teacher trainer, the author of The 30 Goals Challenge for Educators, and an international speaker deemed as one of the top educators in social media. Susan M. Bearden is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne.Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this week's segment we talk about how to create on-going, differentiated, and highly personalized, professional development. Follow: @shfarnsworth @maineschooltech @iplante @s_bearden @Katrinastevens1@thomascmurray ajpodchaski@bamradionetwork #edtechchat #edchat #edtech #PTc Sheryl Farnsworth is a School Improvement Consultant, with an emphasis in Literacy, and Technology, and AIW from Iowa. Sharon Plante is Director of Technology at Eagle Hill-Southport in Southport, CT. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
Some schools and teachers have strict policies against teachers engaging students on social media. Other schools and districts say the biggest mistake you can make is to not engage students through social media. Listen to the pros and cons. Follow: @kathycook1, @thomascmurray, @KleinErin @bodymindchild @bamradionetwork Kathy Cook is Director of Educational Technology and a faculty member at the University of Phoenix College of Education and a former K-12 teacher. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. co-founded and moderates both #sbgchat and #edtechchat. Erin Klein is a second grade teacher, blogs at Kleinspiration.com and also blogs for Scholastic as a member of the National Writing Project.
Online learning is growing in popularity. It is being implemented in various ways, some more successful than others. In this episode we explore what works in online learning, what doesn't and why. Follow: @brad_rathgeber @iplante @Katrinastevens1 @s_bearden @thomascmurray ajpodchaski@bamradionetwork #edtechchat #edchat #edtech #PTchat Brad Rathgeber is the Executive Director of the Online School for Girls, a nationwide consortium of more than eighty independent schools, that builds high quality, relationship-centric online courses. Sharon Plante is Director of Technology at Eagle Hill-Southport in Southport, CT. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this episode, your hosts cover the highlights of the 3/1/14 #SatChat on inspiring learning with technology. Follow: @bcurrie5, @thomascmurray @wkrakower @ScottRRocco @bamradionetwork Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Murray serves on the advisory board for THE Journal and has co-founded and moderates both #sbgchat and #edtechchat. Billy Krakower is a co-moderator and is a Computer & Resource Reading Room Teacher in Woodland Park, N.J. Scott Rocco is Superintendent of Schools in Spotswood, N.J., and co-founder of #Satchat.
In this segment we talk about the new ways to showcase your student's great work and why it matters. Follow: @tomascmurray @Joesanfelippofc @TonySinanis @bamradionetwork Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Murray's QCSD cyber and blended learning programs have been highlighted by Forbes.com, T.H.E. Journal, Project Red, and on Digital Learning Day 2013. Tom co-founded and moderates both #sbgchat and #edtechchat.
Dysfunctional relationships between tech directors and teachers can be profoundly frustrating to all. However, strong, collaborative relationships between tech directors and teachers can create exceptional learning possibilities. In the segment we talk about how to optimize these relationships to support learning. Follow: @Aaron_Becker32 @casas_jimmy @mwdegner @thomascmurray @ajpodchaski @iplante @Katrinastevens1 @s_bearden @bamradionetwork #edtechchat #edchat #edtech #PTchat Jimmy Casas is the principal at Bettendorf High School in Bettendorf, IA and named 2012 Iowa State Principal of the Year and co-founder/moderator of #IAedchat. Aaron Becker has served for the Fairfield Community School District in Iowa as a high school principal. He is co-founder #IAedchat. Matt Degner is Principal at South East Junior High. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this segment we take a look at project based learning and how technology is opening up new possibilities for learning by doing. Follow: @ajpodchaski @Joe_Mazza @iplante @Katrinastevens1 @s_bearden @amandacdykes @TechNinjaTodd @thomascmurray @bamradionetwork #edtechchat #edchat #edtech #PTchat Amanda Dykes is a Science and Tech Ed/STEM teacher in Birmingham, AL. She has degrees in technology integration and speaks often on being a connected educator was well as using technology and PBL in the classroom. Todd Nesloney is a 5th grade teacher in Waller, TX. He is one of the National School Board Association's "20 to Watch" and the Center for Digital Educations "Top 40 Innovators In Education". Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this segment we discuss meeting teachers and school leaders where they are to build a bridge to connectivity. Our guest and hosts discuss the scaffolding required to build capacity and offer real-world strategies and tactics to infuse connectivity into school culture. Follow: @ajpodchaski @Joe_Mazza @iplante @Katrinastevens1 @s_bearden @thomascmurray @bamradionetwork #edtechchat #edchat #edtech #PTchat Dr. Joe Mazza serves as K-12 Director of Connected Teaching, Learning & Leadership for the 6th largest school district in Pennsylvania. He is the Founder and co-host of #PTchat. Susan M. Bearden, is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
February 5th is digital learning day and over 700 groups will be getting involved. Learn more about it and why you should participate. Follow: @thomascmurray @TerriThinks @OfficialDLDay @All4EdProject24 @bamradionetwork Terri Schwartzbeck serves as a Senior Digital Outreach Associate at the Alliance for Excellent Education, functioning at the intersection of policy and communications. Sara Hall is director of the Alliance’s Center for Secondary School Digital Learning and Policy. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this segment of #edtechchat, we review the highlights of the the 1 /13/14 #Edtechchat the implications of the new tools for teaching writing. Follow: @thomascmurray @coolcatteacher @katrinastevens1 @s_bearden @ajpodchaski @bamradionetwork Vicki Davis is an author, speaker and a classroom technology teacher and author of Flattening Classrooms, Engaging Minds. Katrina Stevens, a former teacher and administrator, is an education consultant with the Tuscany Group. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this segment we talk with Eric Sheninger and Joe Mazza about how education technology is changing the mandate and practice of education leadership. Follow: @NMHS_Principal @Joemazza @Thomascmurray @bamradionetwork Eric Sheninger, is an award-winning Principal at New Milford High School located in Bergen County, NJ, speaker and author of Leadership for Principals Digital Leadership: Changing Paradigms for Changing Times.Dr. Joe Mazza, @Joe_Mazza, is Project Manager for Connected Teaching, Learning and Learship aat North Penn, Pennsylvania. Tom Murray, @thomascmurray, serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pennsylvania.
Tom Murray, co-founder of #edtechchat, joins us for a year end review of the best education apps, tools and digital resources. Tune in to this year end, 12 minute smackdown. @coolcatteacher @thomascmurray @bamradionetwork Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. He was featured in Tech & Learning Magazine's Leadership Profile in December of 2012. Murray's QCSD cyber and blended learning programs have been highlighted by Forbes.com, T.H.E. Journal, Project Red, and on Digital Learning Day 2013, among others. Murray serves on the advisory board for THE Journal and has co-founded and moderates both #sbgchat and #edtechchat.
In this summary of the 11/11/13 Edtechchat, we look at some of the hurdles and pitfalls educators need to be aware of around using web tools. Follow: @adambellow, @KatrinaStevens1, @thomascmurray, @bamradionetwork Adam Bellow is founder and President of eduTecher and eduClipper, and Technology Training Specialist for a school district on Long Island. Katrina Stevens is an education consultant with the Tuscany Group, and cofounder of #MDedchat and #edtechchat. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa.
In this summary of the 10/31/13 Edtechchat, U.S. Secretary of Edcuation Arne Duncan is our guest moderator. Tune in as we recap the week's chat on being a connected educator. Follow: @ajpodchaski@S_bearden @thomascmurray @bamradionetwork Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Susan M. Bearden is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne.
In this summary of the 10/14/13 Edtechchat on google Apps for education, we are joined by one of the nation's leading trainers on Google education apps. Follow: @ajpodchaski@rkiker @thomascmurray @bamradionetwork Rich Kiker is a director of online Learning for a K-12 school district. Previously, he was was a Media Technology Chair and Technology Coach in Pennsylvania's Classrooms for the Future initiative. Rich is one of the leading certified Google trainers in the nation. Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, PA.
The transition to digital learning and digital classrooms has begun. In this summary of the 10/07/13 Edtechchat we explore the questions being asked and some of the guidelines emerging to help educators through the digital transition. Follow: @pamoran @maryannwolfed @gkleiman2 @thomascmurray @bamradionetwork Pam Moran is superintendent of Albemarle County Public Schools in Virginia. Her blog is http://spacesforlearning.wordpress.com. Mary Ann Wolf, PhD is the CEO of Wolf Ed. She co-directs the MOOC-Ed on the Digital Learning Transition; wrote the Culture Shift: Teaching in a Learner-Centered Environment; and co-authored two papers on mobile learning for UNESCO and CoSN and the Leveraging Teacher Preparation 2.0 for CTQ. Glenn Kleiman is the Executive Director of the Friday Institute for Educational Innovation and a Professor at the NC State University College of Education and founder of Teaching Tools Software, Inc. and the author of Brave New Schools: How Computers Can Change Education. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, PA.
In this summary of the 9/23/13 Edtechchat we discuss the Maker Education Movement which focuses on co-creating and hands-on learning. Follow: @thomascmurray @tieandjeans @ajpodchaski @blanken@bamradionetwork Laura Blankenship is the Computer Science Coordinator at The Baldwin School outside of Philadelphia. Andrew Carle is the Director of Maker Education at Flint Hill School in Northern Virginia. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, PA. Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ.
This week's chat on focused on the books being read and recommended by #edtechchat participants. The discussion yielded many great suggestions. Listen in as we review the books everyone is reading. Follow: @iplante @s_bearden @ajpodchaski @KatrinaStevens1 @thomascmurray @bamradionetwork Katie Regan is a high school English educator and technology integration specialist and one of the #ladygeeks from lady geeks.org where she co-hosts a web show and podcast all about technology every Thursday night. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, PA. Sharon Plante is Director of Technology at Eagle Hill-Southport in Southport, CT. Susan M. Bearden is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne.
In this episode of EdTechChat Radio, we discuss smart strategies and tools for curating digital resources. Follow:@thomascmurray @web20classroom @bcurrie5 @L_hilt @jstevens009 @bamradionetwork Steven Anderson is the Director of Instructional Technology for the Winston-Salem/Forsyth County Schools where he oversees the technology program for 80 schools and 53,000 students. He has won several awards including being named a 2012 ASCD Emerging Leader and the worldwide Edublogs Educational Twitterer of the Year. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this episode of EdTechChat Radio, we discuss smart strategies and tools for curating digital resources. Follow:@thomascmurray @web20classroom @bcurrie5 @L_hilt @jstevens009 @bamradionetwork Steven Anderson is the Director of Instructional Technology for the Winston-Salem/Forsyth County Schools where he oversees the technology program for 80 schools and 53,000 students. He has won several awards including being named a 2012 ASCD Emerging Leader and the worldwide Edublogs Educational Twitterer of the Year. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this episode of EdTechChat Radio, we discuss what makes really great and effective technology-based professional development. We also cover things to avoid. Follow:@thomascmurray @ajpodchaski @Cvanderark@SrtaLisa @garnet_hillman @Getting_Smart @bamradionetwork Caroline Vander Ark Davis is COO and Partner of Getting Smart an education advocacy firm that advocates for innovations that customize learning and extend access (Twitter @Cvanderark). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this premier episode of EdTechChat Radio the teachers and edtech integrators explore the challenges of bridging the gap between school IT staff, tech integrators, classroom teachers and students. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal (@thomascmurray). Sharon Plante is Director of Technology at Eagle Hill-Southport in Southport, CT (@iplante). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ (@ajpodchaski). Susan M. Bearden is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne, FL(@s_bearden) Greg Graham is the author of, "Cell Phones in the Classroom? No, Students Need to Pay Attention." Liz Kolb is a clinical assistant professor at The University of Michigan and authored "Cell Phones in the Classroom: A Practical Guide for the K-12 Educator." Lisa Nielsen,award-winning blogger and author of "Teaching Generation Text," is a long time public school educator.
In this episode of EdTechChat Radio, we discuss what makes really great and effective technology-based professional development. We also cover things to avoid. Follow:@thomascmurray @ajpodchaski @Cvanderark@SrtaLisa @garnet_hillman @Getting_Smart @bamradionetwork Caroline Vander Ark Davis is COO and Partner of Getting Smart an education advocacy firm that advocates for innovations that customize learning and extend access (Twitter @Cvanderark). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this episode of EdTechChat Radio, we discuss what makes really great and effective technology-based professional development. We also cover things to avoid. Follow:@thomascmurray @ajpodchaski @Cvanderark@SrtaLisa @garnet_hillman @Getting_Smart @bamradionetwork Caroline Vander Ark Davis is COO and Partner of Getting Smart an education advocacy firm that advocates for innovations that customize learning and extend access (Twitter @Cvanderark). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this episode of EdTechChat Radio, we discuss what makes really great and effective technology-based professional development. We also cover things to avoid. Follow:@thomascmurray @ajpodchaski @Cvanderark@SrtaLisa @garnet_hillman @Getting_Smart @bamradionetwork Caroline Vander Ark Davis is COO and Partner of Getting Smart an education advocacy firm that advocates for innovations that customize learning and extend access (Twitter @Cvanderark). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal.
In this premier episode of EdTechChat Radio the teachers and edtech integrators explore the challenges of bridging the gap between school IT staff, tech integrators, classroom teachers and students. Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal (@thomascmurray). Sharon Plante is Director of Technology at Eagle Hill-Southport in Southport, CT (@iplante). Alex J Podchaski serves as the Director of Technology at Oak Knoll School of the Holy Child in Summit, NJ (@ajpodchaski). Susan M. Bearden is the Director of Information Technology at Holy Trinity Episcopal Academy in Melbourne, FL(@s_bearden)
A vibrant discussion on ways to turn around the dreaded faculty meeting. Highlights and commentary from the 3/26 Edchat. Follow:@blairteach, @thomascmurray @cybraryman1 @bamradionetwork Tom Murray serves as the Director of Technology and Cyber Education for the Quakertown Community School District in Bucks County, Pa. Tom is a former middle school assistant and elementary school principal. Nancy Blair is a school improvement consultant who frequently worked with the high schools that work and making middle grades work initiatives. Jerry Blumengarten taught for 32 years at inner city NY school.