Cybersecurity Education Workshop 2018

April 23rd & 24th, 2018

Lake Tahoe – California

The CyberSecurity Education Workshop 2018 is being held on April 23 – April 24 in South Lake Tahoe, CA

National Science Foundation
NSA National Cybersecurity Curriculum Program

The goal of the workshop is to bring together experts in cybersecurity with representatives from funding agencies, and focus on high-quality curriculum efforts in Cyber Security Education. Curriculum on display will include projects sponsored by the NSA National Cybersecurity Curriculum Program and NSF.


David Rice

David leads the protection and security of Apple’s new products worldwide. Prior to joining Apple in 2011, David helped global organizations respond to the increased sophistication of cyber adversaries and their technological advances. Serving in technical and leadership roles at the National Security Agency and the United States Navy, the U.S. government awarded him for developing security configuration and design guidance for critical national infrastructure and global networks. For nearly two decades, David shaped the discussion and practice of cybersecurity. His experience is the basis for his critically acclaimed book “Geekonomics: The Real Cost of Insecure Software.”David holds a Master of Science in Information Warfare and Systems Engineering from the Naval Postgraduate School (NPS). He serves on the NPS Foundation Board focusing on cyber initiatives.

Dr. Leonard T. Reinsfelder

Training Director, NSA/CSS; Commandant, National Cryptologic School (NSA).

Dr. Reinsfelder has served at NSA for 36 years with 20 years in operational assignments at increasing levels of responsibility and 16 years at the National Cryptologic School leading education efforts in the Academic Services, Cryptology, and Language departments. From the early 1970’s through the mid-1990’s, Dr. Reinsfelder taught in public education at various universities as an Adjunct Professor. He has received the many awards while assigned to NSA, including:
• Hispanic Forum Dr. Bradier Rivera Excellence Award (2009)
• Intelligence Community Diversity Award (2004)
• Meritorious Civilian Service Award (1999)
• Director, DIA Outstanding Unit Award (1993-1997)

Victor Piotrowski

Dr. Piotrowski represents the National Science Foundation as the lead program director of the CyberCorps’ Scholarship for Service, the Secure and Trustworthy Cyberspace program, as well as a workforce development program called CyberTraining. Prior to working at the NSF, he was a Computer Science professor and chair at the University of Wisconsin-Superior.

Steven LaFountain

Steven LaFountain currently serves as the dean of the NSA’s College of Cyber. The College of Cyber is focused on the education and training of the cyber-related workforce of the NSA, as well as the U.S Cyber Command. LaFountain is also responsible for maintaining the GenCyber program which aims to teach and spark interest in cybersecurity in middle and high school students across the country.

Rodney Petersen

Rodney Petersen is the director of the National Initiative for Cybersecurity Education (NICE) at the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce. He served as the Managing Director of the EDUCAUSE Washington Office and a Senior Government Relations Officer. He founded and directed the EDUCAUSE Cybersecurity Initiative and was the lead staff liaison for the Higher Education Information Security Council. Prior to joining EDUCAUSE, he worked at two different times for the University of Maryland – first as Campus Compliance Officer in the Office of the President and later as the Director of IT Policy and Planning in the Office of the Vice President and Chief Information Officer.  He received his law degree from Wake Forest University and bachelors degrees in political science and business administration from Alma College.

Ruthe Farmer

Ruthe Farmer has focused on inclusion in technology since 2001 and is Chief Evangelist at CSforAll. She served as Senior Policy Advisor for Tech Inclusion at the White House Office of Science & Technology Policy focusing on President Obama’s call to action for Computer Science for All, and previously strategy and K-12 programs at the National Center for Women & Information Technology (NCWIT) . She has launched multiple national inclusion programs including Aspirations in Computing, TECHNOLOchicas, the AspireIT outreach program, Lego Robotics for Girl Scouts and more. She served as 2012 Chair of CSEDWeek, was named a White House Champion of Change for Technology Inclusion in 2013, received the Anita Borg Institute Award for Social Impact in 2014, and the UK Alumni Award for Social Impact in 2015. Ruthe holds a BA from Lewis & Clark College and an MBA in Social Entrepreneurship from the University of Oxford.

Diana L. Burley

Diana L. Burley, Ph.D., is executive director and chair of the Institute for Information Infrastructure Protection (I3P) and full professor of human & organizational learning at the George Washington University (GW).Prior to joining GW, she managed a multi-million dollar computer science education and research portfolio and led the CyberCorps program for the U.S. National Science Foundation. Dr. Burley is a globally recognized cybersecurity expert who currently co-chairs the ACM/IEEE-Computer Society Joint Task Force on Cybersecurity Education to produce the 1st set of global cybersecurity curricular guidelines.

Matt Bishop

Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis. He is a recognized expert in vulnerability analysis, secure systems/software design, network security, access control, authentication, and UNIX security, Bishop also works to improve computer security instruction. He is one of the co-directors of the Computer Security Laboratory here. He does research in computer security. Currently, he seems to focus on election processes, data sanitization, and the insider problem. He also likes teaching.

Monday, April 23rd


8:00 – 8:15 AM

Maureen Turney, NSA
Sidd Kaza, Towson University

8:15 – 9:00 Keynote:
Steve Lafountain, Dean, College of Cyber, NSA
David Rice, Director, Global Security, Apple Inc.
9:00 – 9:15 The National Cybersecurity Curriculum Program (NCCP)
Maureen Turney, NSA
9:15 – 9:45 Cyber Curriculum and the Cyber Cube
Melissa Dark, Purdue University/NSA (CON)     Powerpoint
Blair Taylor, Towson University/NSA (CON)
9:45-10:00 Break
10:00-11:15 Curriculum showcase
Digital Forensics – Texas A&M University, Trez Jones
Visualization to Teach Web Security – NCAT, Li Yang, University of Tennessee Chattanooga, Xiaohong Dorothy Yuan,     Visualization Powerpoint
Secure Design in IoT, DePaul University, Filipo Sharevski
Reverse Engineering and Malware Analysis – Dakota State University, Josh Stroschein
Strategic Thinking – Augusta University, John Heslen     NSA Grant Powerpoint
11:15-12:15 Curriculum Expo A
12:15-1:45 Lunch (On your own)
1:45-2:45 Curriculum Expo B
2:45-3:30 Panel: K-12 and Community Colleges (Moderator: Melissa Dark)
K-12 –   Ruthe Farmer, Chief Evangelist, CSforAll
Cyber Engineering High School: Tommy Morris, University of Alabama in Huntsville
Community Colleges: Cara Tang, Portland Community College
3:30 – 3:45 Break – Coffee and Cookies
3:45 – 4:00 Always Education:
Vali Tadayon, University of Cincinnati
4:00-4:15 CLARK:
Sidd Kaza, Towson University
4:15-4:50 Discussion Breakouts:
Building, Launching, and Sustaining the Cyber Cube
4:50 Closing

Tuesday, April 24th

8:00 – 8:10 AM Opening
8:10 – 8:30 Outreach: Education and the Cyberworkforce
Dr. Leonard T. Reinsfelder, Commandant, National Cryptologic School
8:30 – 9:15 Panel: Perspectives
Moderator: Blair Taylor
Josh Moses, OMB
Scott Buck, Intel
Victor Piotrowski, NSF
Rodney Peterson, NICE
9:15 – 9:30 Capture the Flag Management System:     Powerpoint
Josh Strochein, Dakota State University
9:30 – 9:45 Nice Challenge:     Powerpoint
California State University, San Bernardino
9:45 – 10:00 Competency-based Curriculum:
Casey O’Brien, Prince George’s Community College
10:00 – 10:15 Break
10:15 – 11:00 Discussion Breakouts:
The Future of the Cyber Ed Workshop
11:00 – 12:00 Curriculum Expo C
12:00 – 1:15 Lunch on your own
1:15 – 2:15 Curriculum Expo D
2:15 – 2:30 History of Cybersecurity Education:
Matt Bishop, University of California, Davis
2:30 – 2:45 ACM/IEEE/AIS/IFIP Cybersecurity Curriculum (CSEC 2017):     Powerpoint
Matt Bishop, University of California, Davis     History Powerpoint
Diana Burley, George Washington University
2:45 – 3:00 CSEC mapping:
Diana Burley, George Washington University
3:00 – 3:30 Report back from breakouts
3:30 – 4:00 Closing and Future


Lake Tahoe Resort Hotel

4130 Lake Tahoe Blvd.
South Lake Tahoe, CA 96150

To reserve a room please call 530-544-5400 and use group code CYBER. Reservation:

Please note, the cutoff date for reserving rooms in Tahoe is March 23, 2018.  

Breakfast is included in your room reservations.


Base Camp Pizza Co.

Italian plates, pies & cocktails turned  out in an upbeat atmosphere.
1001 Heavenly Village Way #25a

California Burger Company

Gourmet burgers & whiskey offered  in a hip tavern.
1001 Heavenly Village Way #2b

Ace High Saloon and Smokehouse

Relaxed, rustic BBQ restaurant with cocktails and mountain-view patio.
4125 Lake Tahoe Boulevard, # K

Fire + Ice

Latin, Italian & Asian-inspired  all you can eat grill.
4100 Lake Tahoe Blvd

McP’s Taphouse Grill

Popular Irish spot features local  talent & offers traditional pub fare.
4125 Lake Tahoe Blvd A

Stateline Brewery & Restaurant

Pub grub, including burgers & pizza,  plus house drafts at this microbrewery.
4118 Lake Tahoe Blvd

Driftwood Café

Locally roasted coffee &  homemade soups.
1001 Heavenly Village Way #1a

The Baked Bear

For dessert, try their homemade  cookie ice cream sandwiches!
4118 Lake Tahoe Blvd #5


1 Air Force Institute of Technology Seth Hamman Adversarial Thinking – 1 week module using behavorial game theory


2 Alabama Huntsville Tommy Morris SCADA – 6 SCADA modules
3 Arkansas Little Rock Mengjun Xie Networking and network security in the cloud
4 Augusta University John Henslen Strategic Thinking
5 California State, San Bernardino Vinny Nestler NICE Challenges
6 Colorado School of Mines Chuan Yue Authenticating passwords-repository of exercises (teach software developers to do a better job authenticating passwords)
7 Dakota State University Kyle Cronin Cellular and Mobile,  Networking Principles; Hacking and Vulnerabilities – modular based
8 DePaul University Filipo Sharevski Secure Design with focus on IoT
9 George Washington University Diana Burley CSEC Essentials roadmap
10 Idaho, University of Jim Alves-Foss Modules on principles, networks, software vulnerabilities, development and acq. of secure software
11 Iowa State University Julie Rursch Security networking; Systems and tools in security, and Adv. Security concepts
12 Massachusetts Lowell, University Xinwen Fu IoT security and privacy
13 Michigan Technological University Yu Cai Cyber Ethics, Cyber Security I and II, Scripting for automation and security, Wireless system admin., Digital Forensics
14 Naval Postgraduate School Cynthia Irvine Industrial Control Systems
15 New Orleans University SCADA Irfan Ahmed SCADA  Concept Maps
16 New Orleans University Irfan Ahmed Concept Maps for 3 courses: Intro to security, Digital forensics, Network pentest
17 North Carolina A&T Mohd Anwar Cybersecurity Fundamentals, Secure Software Engineering, Cybersecurity Product Development
18 North Carolina State University Douglas Reeves Cybersecurity 1 & 2, Networks, Software, Privacy, Crypto     Poster
19 Old Dominion University Ariel Pinto Risk – Multidisciplinary     Risk 1  Risk 2  posters
20 Prairie View A&M University Na Li Privacy
21 Prince Georges Community College Casey O’Brien Competency-based curriculum     Powerpoint
22 Purdue University Northwest Michael Tu Software Security and Secure Programming
23 Rochester Institute of Technology Leon Reznik Intelligence Security Systems: Machine Learning and Artificial Intelligence
24 Texas A&M University Daniel Ragsdale Digital Forensics, Secure Coding and Ethical Pen-testing, Cybersecurity and Digital Ethics
25 Towson University Josh Dehlinger Cybersecurity Principles course and modules on risk, mobile risk, software testing, ICS, LTE, and HCI
26 Virginia Tech Mike Hohnka Networking specific to SDN, vehicular databases, telecom, and physical layer security


27 West Florida, University of Eman EL-Sheikh Secure Software Development for ICS


1 Cincinnati, University of Richard Harknett                        Vali Tadayon Develop and host a role-based mulit-tiered web application curriculum management platform and pilot.
2 Colorado School of Mines Chuan Yue Modules for learning side-channel attacks and defenses on smartphones
3 Columbus State University Jianhua Yang Modules and labs for stepping-stone intrusion detection techniques
4 Dakota State University Josh Stroschein Content development of Reverse Engineering, Software Exp. & Security, Malware Analysis; K12 Ed Content; CTF, Framework Design
5 Florida State University  Xiuwen Liu Software and firmware reverse engineering
6 Fordham University Thaier Hayajneh Basic and advanced topics in IoT Forensics
7 George Mason University – Auffert Jean-Pierre (JP) Auffret Risk Management and Wireless / Mobile security
8 Highline University Amelia Phillips Digital Forensics and Legal Curricula
9 Louisiana  State University

Towson University

Golden Richard, III

Aisha Ali-Gombe

Introducing Active Learning to Malware Analysis Curriculum
10 Maryland, Baltimore, University of Markus Rauschecker Education on laws, regulations and policies
11 Maryland, University of Susan Campbell Multidisciplinary (economics, psychology, and cybersecurity) approach to evaluate human threats and design systems for the desired human-computer interactions
12 Maryland, University of Gang Qu Hardware reverse engineering course
13 Michigan Tech Yu Cai Infrastructure Service Admin and Security, Advanced Network Security, Penetration Testing and Audit, Cybersecurity for Industrial Control Systems
14 Missouri, St. Louis, University of Jianli Pan Wireless/mobile and cyber threats and vulnerabilities
15 Nebraska, Omaha, University of Abhishek Parakh Quantum Cryptography Laboratories
16 New Orleans, University of Joe Sylve Reverse engineering of modern malware
17 New York University Nasir Memon Intro to Cyber Security and Cloud Security
18 North Carolina A&T State University  Xiaohong Dorothy Yuan Android application vulnerabilities and mitigation
19 Old Dominion University  Adrian Gheorghe Blockchain and Cybersecurity     Poster
20 Penn State, ARL not attending Debra Del Vecchio,                     Kevin Kuczynski Principles of Cyber Operation and Cyber Operations Law and Policy
21 Purdue University  Busiime Ida Ngambeki Secure Programming Concept Inventory
22 SOCHE Seth Hamman Cybersecurity Legal and Ethical Aspects     Poster
23 Syracuse University  Yuzhe Tang Labs for Cryptographic Engineering on Modern Systems
24 Tennessee, Chattanooga, University of  Li Yang Visualization tools and labs, Cross-Site Scripting and Cross-site Request Forgery, DNS cache poisoning and pharming, Logic Flaw, Ad Fraud, IoT Botnet, Browser Extensions
25 Texas A&M San Antonio  Akhtar Lodgher Threats/vuln., risk mgmt, software reverse eng., cryptography
26 Texas, Dallas, University of  Latifur Khan Security threats and vulnerabilities – using big data management and analytics (BDMA).


27 Towson University  Siddharth Kaza Prototype Curriculum Management System (CLARK)
28 Virginia Tech – SRE  Kara Nance Software Reverse Engineering