Driving CYBER & STEAM Innovation Globally
Innovation Sound Bytes
Volume 11
May 2020
2020 CSTGIA Global Community
Ambassador Program
Luminary Interview Program
Calling All Luminaries
If you are a leader, catalyst, or serving the globe in the areas of CYBER, STE"A"M, or Innovation we want to tell your story.

A plethora of our CSTGIA partners have designed, developed, and delivered special COVID-19 programs and we are celebrating their ingenuity, generosity, and above and beyond service to the CYBER, STE"A"M, and Innovation populations.

We are recognizing the following Partner's programs and asking that you spread the word of their great works!

  • Center for Cyber Safety and Education's Free GARFIELD eLearning

Additional Youth Resources include:

NIST's Computer Security Resource Center (CSRC) - Telework Cybersecurity Resources include:

  • For additional resources please access them here.
Recognizing Our Community Partners
ACM's Women in Computing
ACM-W supports, celebrates, and advocates internationally for the full engagement of women in all aspects of the computing field, providing a wide range of programs and services to ACM members and working in the larger community to advance the contributions of technical women.

  • Professional & Student Chapters
  • Scholarships
  • Recent Research - A Global Approach to the Gender Gap in Mathematical, Computing, and Natural Sciences

Women in AFCEA
AFCEA actively works to increase the number of women in science, technology, engineering and mathematics (STEM) professions through its Women in AFCEA initiatives and panel discussions that occur throughout the year.

American Society for Quality - Section 505
We are a nonprofit organization whose members have a mind for quality. We strive to promote quality principles within the Philadelphia area through fostering an engaged community of people passionate about quality who use the tools, their ideas and expertise to make our world work better.

  • Training: Lean Six Sigma BB Transitions
  • CSQE Exam Prep

ASQ Innovation TC
Vision : To be the organization of choice for innovation, connecting those who are interested in innovation with resources to meet their professional needs. 

Mission:  To build and provide access to the growing and dynamic body of innovation knowledge through pathways including partnerships, training, and on-line presence for people in the innovation space, whether experienced or new, enabling them to become more effective forces for quality through innovation in their professional environments. 

  • Upcoming Events here including our upcoming 21 May 2020 Webinar
  • Tools A-Z here

Association for Women in Science
Advancing Gender Equity -- AWIS is a global network that inspires bold leadership, research, and solutions that advance women in STEM, spark innovation, promote organizational success and drive systemic change.

  • AWIS Research Center (Broadening Participation, Equitable Workplaces, Leadership & Recognition, Innovation & Entrepreneurship.

Boolean Girl, a non profit corporation founded in 2014, is educating girls to code, build, invent, and animate. We provide enrichment classes, all-girl camps, special events, and partnerships, preparing girls everywhere to explore computer programming and engineering.

Please see special COVID-19 special resources above.

Center for Cyber Safety and Education
Get advice from cybersecurity professionals on how to navigate the internet safely.

From  parents  to  teachers  and  librarians , we have the tools and knowledge you need on the topics that you care about:  cyberbullying safe shopping social media gaming  and  more .

Best of all, we’ve partnered with Garfield to bring you cutting-edge tools to keep classrooms safe and secure online. As your  non-profit Center for Cyber Safety and Education , we can’t wait to help you stay safe online.

CISO Innovation Shipyard Alliance
Technology Showcase Forum & C-level Executive Experiences

Great Talent is Out There. We’ll Help you Find Them. Create job descriptions and job postings that work. Search, match and engage cybersecurity professionals. Create and post a job posting for free.


Thought Leadership

Edge of Yesterday
Learning Though Stories

Immerse yourself in a world of adventure,
doing, and making. Find yourself
at the Edge of Yesterday

girlsgo cyberstart
Our mission in Girls Go CyberStart is to support young women to develop their creativethinking, problem-solving skills and explore cybersecurity in a safe, barrier-free environment.

Girls Computing League
We are a nonprofit who aims to empower underrepresented groups in the technology workplace by fostering the interests of young women in computer science, data science, and technology. Present society is plagued with the misconception that computer science is not a viable career for women and minorities, and through early education, we hope to reformulate what makes a modern-day computer scientist. Through local school chapter organizations, educational seminars, and scholarship programs, we help middle and high school-aged girls experience first-hand that they can be problem solvers and make a social impact by using learning and using technology. Our ultimate dream is that one day, these girls will spread the love for computer science, coding and innovation to others.

Girl Scout's Nation's Capital
We're 2.5 million strong—more than 1.7 million girls and 750,000 adults who believe in the power of every G.I.R.L. (Go-getter, Innovator, Risk-taker, Leader)™ to change the world.

Girl Scouting builds girls of courage, confidence, and character, who make the world a better place.

Mason Game and Technology Academy
The Mason Game and Technology Academy (MGTA) is part of the nationally acclaimed Mason Computer Game Design Program, and the interdisciplinary research institute and economic incubator, the Virginia Serious Game Institute (VSGI). MGTA was founded in 2013 to provide students the opportunity to develop and cultivate new skills.

Institute for Critical Infrastructure Technology
To cultivate a cybersecurity renaissance that will improve the resiliency of our Nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders. Join use for cutting edge and informing webinars, publications, and research.

International Consortium of Minority Cybersecurity Professionals
Achieving the consistent representation of women and minorities in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.

  • Various industry groups recognize the female cyber workforce representation as approximately 14%.
  • Only 6% percent of STEM workers are African American compared to an overall 11% of the US workforce.
  • Hispanics comprised only 7% of the STEM workforce while making up 15% of the US workforce.

ISACA's SheLeadsTech
ISACA's SheLeads Tech program seeks to increase the representation of women in technology leadership roles and the tech workforce. Program focus includes:

  • Raising Awareness
  • Preparing to Lead
  • Building Global Alliances
  • Consider becoming an Ambassador today!

Leaders in Energy
Welcome to our community of leaders working to scale and accelerate clean energy and sustainable solutions. Join our global action network to connect with people in the US and around the world (in over 100 countries) who are passionate about making a difference. We conduct monthly forums, including workshops, where we convene experts in our focus areas including sustainable communities, green economy, and multigenerational leadership. We also help our members connect with one another on opportunities related to employment and business partnering.

Loyola University
We believe a Jesuit education acquired at Loyola University Maryland best prepares you for academic achievement, the new world of work, and a balanced, flourishing, and purposeful life. From our strong academic programs to the thoughtful mentorship and guidance from faculty, coaches, and mentors, Loyola will help you discover your true potential. You’ll graduate ready for anything—and ready for everything.

Loyola supports our CYBER and SWE Communities!

Marymount University
Marymount University, the first Catholic college to be established in Virginia, was founded in 1950. Through the years, it has grown from a two-year college for women into a comprehensive, coeducational Catholic university serving approximately 3,500 undergraduate and graduate students.
While much has changed since the early years as a result of greatly expanded programs and services, the university’s core values and mission have held steady.

Marymount supports our CYBER and STEM communities!

Million Women Mentors
Million Women Mentors (MWM), an initiative of STEMconnector, is a national and global movement to spark the interest and confidence in women and girls to pursue STEM careers and leadership opportunities through the power of mentoring.

MiniWITI is an initiative sponsored by Women in Technology International (WITI), anchored in serving girls age 8 through 18. We’re on a mission to increase awareness in careers in science, technology, engineering, arts and math (STEAM) through real time, interactive learning. Our mission is simple. To create one million acts of curiosity to design the future.

Cultivating an environment of diversity and inclusion is a journey with no end. But where does it begin? NCWIT’s programs help education and business organizations begin their momentum of change. Data-driven, evidence-based approaches bring more voices to an inclusive table, put people on proven paths, and move entire communities toward measurable success.

National Cybersecurity Student Association
The National Cybersecurity Student Association is dedicated to expanding its membership’s professional network and cybersecurity industry connections. This commitment positions student members for greater success in the cybersecurity sector.

National CyberWatch Center
We are a consortium of higher education institutions, businesses, and government agencies focused on collaborative efforts to advance Information Security education and strengthen the national cybersecurity workforce.

Get the latest Cybersecurity NEWS .

National Cybersecurity Center of Excellence
The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity issues. This public-private partnership enables the creation of practical cybersecurity solutions for specific industries, as well as for broad, cross-sector technology challenges. Through consortia under Cooperative Research and Development Agreements (CRADAs), including technology partners—from Fortune 50 market leaders to smaller companies specializing in IT security—the NCCoE applies standards and best practices to develop modular, easily adaptable example cybersecurity solutions using commercially available technology. The NCCoE documents these example solutions in the NIST Special Publication 1800 series, which maps capabilities to the NIST Cybersecurity Framework and details the steps needed for another entity to recreate the example solution. The NCCoE was established in 2012 by NIST in partnership with the State of Maryland and Montgomery County, MD.

NVCC Cybersecurity Center
NOVA’s Cybersecurity program provides a curriculum that is  mapped to DHS and NSA cybersecurity education standards  and is designated by the agencies as a Center of Academic Excellence for two-year institutions (CAE2Y). Our AAS Cybersecurity degree is transferable to many four-year institutions and offers students the opportunity to participate in a variety of exciting  competitions  and extra-curricular activities. NOVA is a founding member of the National CyberWatch Center, a national consortium of colleges and universities focused on cybersecurity education.

Northern Virginia Technology Council
The Northern Virginia Technology Council (NVTC) is the membership and trade association for the technology community in Northern Virginia. As the largest technology council in the nation, NVTC serves about 1,000 companies and organizations, including businesses from all sectors of the technology industry, service providers, universities, foreign embassies, non-profit organizations and government agencies.

SANS is the most trusted and by far the largest source for information security training in the world. We offer training through several delivery methods - live & virtual, classroom-style, online at your own pace or webcast with live instruction, guided study with a local mentor, or privately at your workplace where even your most remote colleagues can join in via Simulcast. Our computer security courses are developed by industry leaders in numerous fields including cyber security training , network security, forensics, audit, security leadership, and application security. Courses are taught by real-world practitioners who are the best at ensuring you not only learn the material, but that you can apply it immediately when you return to the office. All of SANS security courses are also offered at a government customer's desired location . In addition to top-notch training, we offer certification via GIAC , an affiliate of the SANS Institute featuring over 35 hands-on, technical information security certifications in information security, a Master's Degree program through SANS Technology Institute graduate school, as well as numerous free security resources including newsletters , whitepapers and webcasts .

Secure Diversity
Secure Diversity empowers ALL genders and specifically Women to find career opportunities in cybersecurity through our events, our partners and the support of organizations.

Security University
Security University is the leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals in the world.
The mission of Security University is striving to provide our students with the highest quality Cybersecurity educational available through our Information Security and Information Assurance Training and Certifications for IT Security Professionals Worldwide

Our mission: “Promote building software applications in young girls to bridge the gender gap in technology.”
SheSoft is a 501(c)(3) non-profit organization dedicated to bridging the gender gap in technology by empowering young girls in upper elementary and middle school ages through seminars, webinars, workshops and software application competitions.

SIM Women
It is a pleasure to introduce you to SIM Women - a network inside the Society for Information Management to promote communication, mentorship, leadership and career development amongst the female members of SIM. My name is Kristen Lamoreaux and I am the group’s Founder.
SIM Women evolved as a result of my attendance at the 2006 Tri-State CIO Event, where I made a point to speak with as many female attendees as possible. In dialoging with those ladies, I discovered that some of the differences between female CIOs and the women who were direct reports to CIOs consisted of soft skills, mentoring and confidence

Attend the Annual SIM Women Virtual Summit - May 07, 2020

STEM for Her, formerly known as Women in Technology Education Foundation, is a 501(c)(3) non-profit foundation, based in the Maryland, Virginia, and Washington D.C. area that promotes education to create awareness, excitement, and opportunities among girls and young women to pursue successful STEM-related careers.

There are a plethora of programs including CyberPatriots, GIT Mentor-Protege, GIT Sharing Our Success, Women in Public Policy (PLEN), Techbridge Career Exploration.

TechGirlz is a nonprofit program of Creating IT Futures, a 501(c)3 nonprofit of CompTIA, that inspires middle school girls to explore the possibilities of technology to empower their future careers. TechGirlz is accomplishing its mission through the creation of free, fun, interactive “TechShopz” led by industry professionals, leaders and students. 

We share our free workshop curriculum with companies, organizations, schools and community groups so they can inspire girls around the world with technology.
Our vision is to create a world where girls have a lifelong passion and confidence in their use of technology throughout their careers.

Women CyberSecurity Society
Our mission is to increases the representation of women within the industry, lower the skills gap and celebrate achievements and milestones. 

We understand support is needed througout the lifecycle of their careers! So if you're a seasoned veteran or just getting started in cybersecurity, we have programs and services here to help you!

We work to empower women and girls interested in cybersecurity by providing support, programs and services to remove roadblocks and obstacles throughout the life-cycle of their careers. 

We aim to increase diversity and inclusion while increasing workforce skills and lowering the gender gaps within the industry. An estimated 3.5 million jobs will be vacant by 2021.

Women in Defense
Women In Defense (WID), a National Defense Industrial Association (NDIA) Affiliate, engages, cultivates and advances women in all aspects of national security. Incorporated in 1985, Women In Defense provides members a business environment for professional growth through strategic networking, education, and career development. This national alliance is comprised of women and men from industry and defense organizations of every size; all branches of the U.S. Armed Forces; Government agencies, academia, think tanks, associations, and professional services.

Women in Security and Privacy
Education : Help women identify and achieve the level of education and skills required to succeed in security and privacy positions across multiple industries.

Mentoring & Networking : Foster a community for knowledge-sharing, collaboration, mentorship, and networking.

Advancement : Support the career advancement of women in security and privacy.

Leadership : Increase thought leadership by women in security and privacy.

The Women in Security & Resilience Alliance (WISECRA) is a non-hierarchical “plug-and-play” construct that brings together various women in security and resilience associations / organizations from across the globe to network and share best practices.

The “plug-and-play” model allows participating associations / groups to both access, or plug into, the network’s professional resources and relationships, and contribute to the network, to the degree and frequency that they themselves deem appropriate. Similarly, each group can “unplug” from the network at any time and for any amount of time as they deem appropriate.

Participation in WISECRA is currently limited to representatives from various women in security and resilience associations /organizations appointed by their respective boards.

Women in Security KC
Here at Women in Security - Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security, Kansas City, is to inspire and support women at all career levels in Information Security.

Women in Technology
When one woman helps another, amazing things can happen. Professional careers leap forward. That's what Women in Technology is all about. As the premier professional association for women in the technology industry, we understand the unique challenges you face. No matter where you are in your professional development, or what technology-related field you're in, our community offers a broad range of support, programs and resources to advance women in technology from the classroom to the boardroom.

WIT - Girls in Technology
The Girls in Technology Mentor-Protégé Program is designed to help high school girls learn about the vast array of career opportunities available to young women interested in pursuing careers in Science, Technology, Engineering, Math (STEM) fields. Protégés and Mentors meet once a month for five months and participate in leadership development, networking, and discuss a range of topics related to success traits for growth and pursuing a career. Each program session starts with featured speakers or a discussion panel followed by small discussion group mentoring sessions with professional women.

Women in Technology International
Carolyn Leighton founded WITI to help women advance by providing access to - and support from - other professional women working in all sectors of technology ( read the story or watch the video .) WITI started in 1989 as The International Network of Women in Technology and, in 2001, evolved into The WITI Professional Association, the world's leading trade association for tech-savvy women. Today, WITI is the premiere global organization empowering women in business and technology to achieve unimagined possibilities.

Women's Society of Cyberjutsu
The Women’s Society of Cyberjutsu (WSC), a 501(c)3 non-profit, is dedicated to raising awareness of cybersecurity career opportunities and advancement for women in the field, closing the gender gap and the overall workforce gap in information security roles.

Scholarships for 2020 - 2021
AFCEA Science, Technology, Engineering, and Math (STEM) Major Scholarships for Undergraduate Students
2020 STEM Major Scholarships Available
  • STEM Major Scholarship ($2,500)
  • Undergraduate Diversity Scholarship ($3,000)
  • Cyber Security Scholarship ($5,000)
  • Student Member Scholarship ($2,500)

A Comprehensive list of cyber security scholarships

Whether you’re just starting to scout out potential undergraduate majors, already a student of cyber security, are looking to return for a more advanced degree, or are a cyber security professional, you’re probably excited by the massive need for cyber security professionals in almost every sector. While this is a great boon to those already in the job market, there are a number of hurdles potential or current cyber security students will have to face before they’re ready for their payday. Assuming you have the drive to get into the world of cyber security, the biggest hurdle can often be the price of your degree. Luckily for you, the demand for qualified cyber security professionals is so great that there are many, many ways to obtain a cyber security degree paying close to nothing. From top technology firms, to state initiatives, to competitive fellowships through intelligence agencies and defense departments, there are many options for greatly lowering your cost of schooling. There are even a number of options for getting your tuition covered and a salary through school. Explore the scholarships below to find funding opportunities for every degree level as well as for professional certifications and events.

2020 Cybersecurity & STEM Scholarships

A plethora of scholarships are available for our Cybersecurity and STEM students.

Due dates range from 2020 - 2021. See the details   here .
UNIGO Scholarships
If earning a cybersecurity degree is your goal, there are scholarships to help you pay for it. Cybersecurity scholarships are free money for college. Unlike a loan, you won't need to repay it if you accept the terms.
As cyberattacks rise, the need for trained intelligence pros is growing too. Cybersecurity scholarships are funds set aside for people studying cyber defense. This major is often a focal point in computer science, forensics or programming.

DoD STEM Scholarships
Department of Defense scholarships provide cash awards to students who have demonstrated ability and aptitude for excelling in STEM fields in disciplines of importance to DoD.

Intel Internships & Scholarships
NSA offers a wide selection of paid programs for high school, college and graduate students in many career fields.
Grants, Fellowships, and Research
The National Science Foundation funds research and education in most  fields of science and engineering . It does this through grants, and cooperative agreements to more than 2,000 colleges, universities, K-12 school systems, businesses, informal science organizations and other research organizations throughout the United States. The Foundation accounts for about one-fourth of federal support to academic institutions for basic research.
NSF receives approximately 40,000 proposals each year for research, education and training projects, of which approximately 11,000 are funded. In addition, the Foundation receives several thousand applications for graduate and postdoctoral fellowships.

The agency operates no laboratories itself but does support National Research Centers, user facilities, certain oceanographic vessels and Antarctic research stations. The Foundation also supports cooperative research between universities and industry, US participation in international scientific and engineering efforts, and educational activities at every academic level.

Horizon 2020
Science with and for Society
EU Prizes for Women Innovators
The European Commission is committed to promoting gender equality in research and innovation (R&I). It is part of the Commission's Strategic engagement for gender equality in all EU policies for the period 2016-2019. In addition, the EU has a well-established regulatory framework on gender equality, including binding Directives, which apply widely across the labour market including the research sector.

New research highlights what women in science, engineering and math look for in a future employer — and the steps businesses can take to attract and hire them.
With all the attention on (and investment in) attracting more women to work in STEM fields, inequality still persists. Many recent studies have tried to diagnose the core drivers of the problem: inadequate pipelines for women in grade schools and universities, biases in schools and workplaces that cause higher attrition rates, or even different choices women and men make along their STEM career paths that exacerbate inequalities.
New research from Universum examines the attitudes, career goals and aspirations of university women who plan to work in STEM fields. It offers employers specific steps they can take to attract more talented women to work for them, ensure women who come on board are more likely to stay in their roles, and push closer to achieving gender parity.

Women in Science
According to UIS data, less than 30% of the world’s researchers are women. UIS data also show the extent to which these women work in the public, private or academic sectors, as well as their fields of research. But to truly reduce the gender gap, we must go beyond the hard numbers and identify the qualitative factors that deter women from pursuing careers in science, technology, engineering and mathematics (STEM).

Partnerships for Innovation (PFI)
The Partnerships for Innovation (PFI) Program within the Division of Industrial Innovation and Partnerships (IIP) offers researchers from all disciplines of science and engineering funded by NSF the opportunity to perform translational research and technology development, catalyze partnerships and accelerate the transition of discoveries from the laboratory to the marketplace for societal benefit.

Michigan Council of Women in Technology
Women remain concerned with underrepresentation and gender bias within science, technology, engineering and mathematics (STEM) related fields, according to new research.
The Michigan Council of Women in Technology (MCWT) study titled , “Explore, Focus and Grow: A Technology Career Journey in Michigan,” aimed to understand females’ motivations and interests in pursuing a career in STEM fields as well as challenges associated with it.

Gendered Paths
Looking at international comparison studies (e.g. PISA), there are several countries that show differences between males and females in mathematics and science achievements favoring males. However, there are some countries without differences and even some countries favoring females. Thus, these differences can hardly be attributed to an overarching concept of gender-specific STEM ability. This indicates that developmental processes shaping students’ attitudes and behaviors towards STEM are different for males and females. Such processes may be diminished or amplified by the individual and social context, e.g. by societal/cultural values and stereotypes, estimations of significant others (e.g. parents, peers), or school approaches like gender-sensitive didactics at school.

This Research Topic focuses on aspects that contribute to this gendered paths into STEM, to shedding light on individual and social factors underlying STEM participation attitudes, behaviors for STEM education, career choice, and professions in STEM. Topics of potential interest include and aim at revealing and discussing impact factors and phenomena starting from pre-primary school up to university studies and STEM professions. The aim is to facilitate the interaction between researchers from different backgrounds to submit their conceptual and empirical papers that would address one or more of the following topics.

Topics of potential interest include:
  • the development/origins of STEM self-concept;
  • development of individual attitudes and behaviors during time (e.g. achievements, motivation, interest);
  • influence of social factors (parental or teacher support, peers, societal values, stereotypes, cross-cultural differences);
  • factors that contribute to students’ decision towards or away from STEM education, studies, or profession;
  • class phenomena (e.g. interactions in STEM courses);
  • intervention methods (e.g. gender-sensitive teaching approaches, teacher support).

Women continue to be underrepresented at every level
We see bright spots at senior levels.
But companies need to focus their efforts earlier in the pipeline to make real progress.

COVID-19 RISKS Within the Community
The Impact of COVID-19 on the Supply Chain
Dr. Adriana Sanford joins hosts Lew Weiss and Tim Grady to discuss the impact of COVID-19 on the supply chain. She has co-authored authored two books about the supply chain, in addition to her many other accomplishments. Listen to find out if your manufacturing operations will be affected and what you can do about it

How The Response to COVID19 Is Affecting Your Data Security

C yber Security Legal Expert and Senior Fellow with the Center of Intelligence and National Security at the University of Oklahoma, Adriana Sanford appears on Ep. #131 of TF7 Radio to unpack a variety of different concerns across the cyber security space as a result of the response to the COVID-19 pandemic. Sanford talks about the current request to telecommunications carriers to provide users location data for pandemic research and what that means both from a legal perspective and a security perspective. Sanford also breaks down Uber’s recent lawsuit against the city of Los Angeles regarding handing over the location and other data about their scooter rentals. And she also opines on topics everyone is asking about: can your COVID-19 disposition affect your work status, whether or not businesses can legally check your temperature without your consent, and whether or not they are required to notify you if they shared your location or medical data with a government agency.
Listen to Episode #131 Now!

COVID-19 Data & Privacy

There’s been a lot of buzz lately about utilizing people's location data on their smartphones to notify them when they’ve come into contact with someone who has tested positive for the COVID-19 coronavirus. Contact tracers is also becoming a hot topic, according to Dr. Adriana Sanford, a senior fellow with the Center of Intelligence and National Security at the University of Oklahoma.

Read the Article Here !
Industry News & Resources You Can Use
Cyber Security Roundup for May 2020
A .roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month

Groups urge more election security aid to states
A coalition of ideologically diverse groups on Thursday released a report examining the election security needs of five states that concluded the federal government has a long way to go on properly funding vital safeguards during the pandemic. “What Congress has provided so far is not enough to run safe and secure elections in 2020,” reads the report from the Alliance for Securing Democracy, the Brennan Center for Justice, Pitt Cyber and R Street Institute . “Our review shows that the March 27 grants will likely cover anywhere from less than 10 percent of what Georgia officials need to around 18 percent of what Ohio officials need.” Congress has devoted $400 million for elections in coronavirus aid thus far.

IEEE-USA’s e-books and audio books help IEEE members in the U.S. advance their careers, work on their soft skills, learn about public policy, even provide a fun distraction – and now, for the first time, the whole collection is available to members for free on the IEEE-USA Online Shop .

IEEE-USA Prolific K-12 Offerings

Tryengineering.org is a resource for students, their parents, their teachers and their school counselors. This is a portal about engineering and engineering careers, and we hope it will help young people understand better what engineering means, and how an engineering career can be made part of their future. Special summer Institute learning resources here .

  • IEEE's TryComputing.org is a free online pre-university computing education web site. IEEE TryComputing.org offers resources to inform and engage pre-university students, their teachers, school counselors and parents about computing and associated careers.
  • TryNano.org is a resource for anyone interested in learning about Nanoscience and Nanotechnology. Nanoscience and Nanotechnology are technical fields that focus on matter at the nanoscale - dimensions that are roughly 1 to 100 nanometers (1nm = 10-9m).
  • The LinkEngineering website is an online community of educators interested in providing meaningful engineering experiences to PreK-12 students of all abilities.
  • Engineer Your Life a guide to engineering for high school girls
  • eGFI, explore different engineering majors

More Resources for Teachers and Parents
Cyber, STEM, and Innovation Resources
NIST Call For Comments
NIST has out several calls for comments. This is a great way for SMEs to contribute.

NIST requests comments on Draft Special Publication (SP) 800-56C Revision 2 , Recommendation for Key-Derivation Methods in Key-Establishment Schemes , which describes two categories of key-derivation methods that can be used during a key-establishment scheme as defined in SP 800-56A or SP 800-56B . The keying material derived using these methods shall be computed in its entirety before outputting any portion of it and shall only be used as secret keying material. This revision permits the use of “hybrid” shared secrets, and a newly added section specifies the conditions under which multiple instances of key expansion can be performed using a single key-derivation key obtained via randomness extraction.
The public comment period for this document is open through May 15, 2020 . See the publication details for a copy of the document and instructions for submitting comments.

NIST has released the Final Public Draft of Special Publication (SP) 800-53 Revision 5, "Security and Privacy Controls for Information Systems and Organizations ," for public comment. Comments are due by May 15, 2020 .

This ( final public draft) revision of NIST Special Publication 800-53 presents a proactive and systemic approach to developing comprehensive safeguarding measures for all types of computing platforms, including general purpose computing systems, cyber-physical systems, cloud and mobile systems, industrial/process control systems, and Internet of Things (IoT) devices.

NIST requests comments on Draft Special Publication (SP) 800-210, General Access Control Guidance for Cloud Systems , which presents an initial step toward understanding security challenges in cloud systems by analyzing the access control (AC) considerations in all three cloud service delivery models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Essential characteristics that would affect the Cloud's AC design are also summarized, such as broad network access, resource pooling, rapid elasticity, measured service, and data sharing.

The public comment period for this document is open through May 15,2020 . See the publication details for a copy of the document and instructions for submitting comments.

NIST is releasing Draft NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM) , for public comment. This report promotes greater understanding of the relationship between cybersecurity risk management and ERM, and the benefits of integrating those approaches.

The public comment period closes on May 20, 2020 . See the publication details for a copy of the draft and instructions for submitting comments.

Today mobile devices are ubiquitous, and they are often used to access enterprise networks and systems to process sensitive data. Draft NIST Special Publication (SP) 800-124 Revision 2,  Guidelines for Managing the Security of Mobile Devices in the Enterprise , assists organizations in managing and securing mobile devices against the ever-evolving threats. To address these threats, this publication describes technologies and strategies that can be used as countermeasures and mitigations. Draft SP 800-124 Rev. 2 also provides recommendations for secure deployment, use, and disposal of mobile devices throughout the mobile device life-cycle. The scope of this publication includes mobile devices, centralized device management, and endpoint protection technologies, while including both organization-provided and personally-owned (bring your own device) deployment scenarios. 
The public comment period for this document is open through June 26, 2020 . See the publication details for a copy of the document and instructions for submitting comments.

The CSF Manufacturing Profile (NISTIR 8183) can be used as a roadmap for managing cybersecurity risk for manufacturers and is aligned with manufacturing sector goals and industry best practices. It provides a voluntary, risk-based approach for managing cybersecurity activities and cyber risk to manufacturing systems. The Manufacturing Profile is meant to complement but not replace current cybersecurity standards and industry guidelines that the manufacturer is embracing.
The public comment period for these documents ends on July 8, 2019 . See each of the publication details links for a copy of the documents, and instructions for submitting comments.

Cyber, STEM, and Innovation Resources
US Department of Education: Charting a Course for Success: America's Strategy for STEM Education
In an ever-changing, increasingly complex world, it's more important than ever that our nation's youth are prepared to bring knowledge and skills to solve problems, make sense of information, and know how to gather and evaluate evidence to make decisions. These are the kinds of skills that students develop in science, technology, engineering and math—disciplines collectively known as STEM. If we want a nation where our future leaders, neighbors, and workers have the ability to understand and solve some of the complex challenges of today and tomorrow, and to meet the demands of the dynamic and evolving workforce, building students' skills, content knowledge, and fluency in STEM fields is essential. We must also make sure that, no matter where children live, they have access to quality learning environments. A child's zip code should not determine their STEM fluency.

Tech Talks, Cyber Contributions, Playbooks
DreamPort is designed as an open facility that welcomes the public to tour, collaborate, and prototype in support of USCYBERCOM and its mission partners. Daily, monthly, and quarterly collaboration events will be announced through our website and via email for those that register to participate in our DreamPort Partnership Network.

Find out more about the complete line-up of community offerings HERE .
2020 Roundup Of Cybersecurity Forecasts And Market Estimates
Cybersecurity now dominates the priorities of every organization as each adapts to a post-COVID 19 world. Remote workers identities’ and devices are the new security perimeter.

You don’t have to choose between going back to school and getting a job. Welcome to the next generation of distance learning.

In the Purdue Cyber Apprenticeship Program , you work for an employer that pays for your education while you gain paid industry experience and training. When you complete the program, you will have earned either an associate degree in IT or a Bachelor of Science degree in cybersecurity from Purdue Global*, and you will have opportunities to sit for various industry recognized certifications, earn other specialty certificates, and get a Purdue Leadership Academy certificate—all without student debt and while you’ve been earning a paycheck.

How It Works
P-CAP is a paradigm shift in education, addressing the needs of employers and adult learners. Currently there are three ways to access education and training – through a university (or community college), online, or an apprenticeship. The P-CAP program blends these three models together, creating a new way to earn-and-learn for the 21st century.

Information here .
Bringing Value and Opportunity to Members Worldwide
We know that personal, professional, and organizational advancements harness innovation in many forms, thus we integrate a myriad of partner events, delivery initiatives, and channels focusing on touching people's lives in very transformational ways, enabling stronger alignment to PURPOSE and allowing them to THRIVE! 

Harness the power of our partner alliance to empower your and the community's ongoing success. 

The 11 Best Cyber Security Books — Recommendations from the Experts
CSTGIA and its ALLIANCE partners strive to provide unique opportunities which positively impact youth, students, professionals, veterans, and entrepreneurs, providing interactive, engaging, value-laden programming and a plethora of leadership and advocacy activities across the GLOBE within the CYBER , STEAM , and INNOVATION realms.

Near Term Partner Events
Visit the meetup’s website for the current topic description, the presenter’s bio, the meeting address, and simple logistics. For those who do not wish to join the meetup community, please send an email to gingerdoetsch@gmail.com and you will be placed on the rmf.lifeboat@gmail.com blind copy distro list to receive meeting announcements.

Non-Meetup members can RSVP for a meeting via the email address or by calling 703-402-4379. The RMF Archives are a treasure trove of prior meetings and collected intellectual capital.
ISSA National Capital Region
The National Capital Chapter of the Information Systems Security Association (ISSA) is comprised of information security professionals located in the Washington D.C. Metropolitan Area.
Members are actively involved in information security in government agencies, the military, non-profit organizations, and in large and small companies.

The chapter holds regular meetings at various locations throughout the D.C. area. Through its meetings and other events, the chapter fosters professional development and support for computer and information security professionals.

Membership is open to practicing security professionals or to those with an interest in the profession. New members are always welcome -- please feel free to attend one of our open meetings or to contact the chapter for more information.
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members.

Conferences, Workshops, Webinars, and Networking Opportunities Abound

Join Us for a Partner Event Soon!

ASQ Innovation Technical YouTube Channel

Increase Your Knowledge, Increase Your Abilities, Increase Your Impact

YouTube Channel Library Here !
Opportunities For Members to THRIVE
Join Our Partners in Actualizing our Elevation, Contribution, and Impact Agenda in 2020!
CSTGIA | www.cstgia.org