Save the Date
Mark your calendars for the 2019 Community College Cyber Summit (3CS), July 30-Aug. 1, at Bossier Parish Community College in Louisiana. Join your fellow educators from around the country at the only national academic conference focused on cybersecurity education at community colleges. For more information, visit HERE .
Get Holiday Hacks for Your Cybersecurity Classroom
The hustle and bustle of holiday shopping, peppermint mochas and fervent cookie baking are infiltrating our lives these days. To help take one thing off your plate, the National CyberWatch Center has put together five Holiday Hacks for your cybersecurity classroom! Read these innovative blogs, and get your classrooms in tip-top shape for 2019 HERE .
Virtual Brown Bag Lunch
The National CyberWatch Center's Curriculum Standards Panel is looking for presentation proposals for the 2019 Virtual Brown Bag Lunch program. All proposals should aim to unveil new innovations in cybersecurity education and can be in a prototype format. Entries must be between 20 and 30 minutes, detail opportunities for audience engagement and discussion and should align with one of these specialties: Operate and Maintain, Investigate, Collect and Operate, Analyze, Oversight and Development, Securely Provision, and Protect and Defend. The deadline to submit is Jan. 15.  Learn more  HERE .
Q & A with the Student Association
Are you ready to be a part of the country's largest cybersecurity student association? Or are you curious about different aspects of this illustrious group? Then get in the know about the National Cybersecurity Student Association at the Q & A session and tour of the student portal on Thursday, Dec. 27, 8 p.m. ET. Join hosts Gustavo Hinojosa, NCSA executive director, and Dr. Vitaly Ford, NCSA chapter development director, for this learning web experience. Register HERE .
IEEE Computer Society Center for Secure Design (CSD) Report
In this report, "Avoiding the Top 10 Software Security Design Flaws," a group of software security professionals have contributed both real-world data and expertise to identify some of the most significant design flaws that have led to security breaches over the past several years. The list of issues presented is focused on the most widely and frequently occurring flaws compiled from data provided by the member organizations of the IEEE Computer Society Center for Secure Design. Read the full report HERE.
Read the full report HERE .
Free Webinar on Women in Cybersecurity
With only 11 percent of women working in cybersecurity and more than 300,000 job openings in this field, the opportunities are endless. This free webinar, sponsored by Women in CyberSecurity (WiCyS), will present on what lies ahead for this cyber field and how women can break through. Register HERE .
Operationalizing Cyber Risk Analytics
Are you working to transform cybersecurity into a business enabler? If so, then enjoy a new, free eBook, “Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics.” This is a guide for the modern day cybersecurity leader to put cyber risk into motion and allow cybersecurity operations to enable the business. Learn where to gather appropriate data, what it takes to financially quantify cyber risks, the end goal of cyber risk analytics and key stakeholders.
Read more HERE .
Cyber Colosseum
Are you ready to take your cybersecurity training to the next level, learning and competing with realistic content, on your schedule? Cyber Colosseum is a 24/7 environment, accessible from anywhere, providing subscribers access to fully immersive and technology-rich environments to learn new skills, test talent, and demonstrate competencies in continuous competitions. At only $1.99/hour, or less, join now and enjoy one free credit and 30% off your first order!
Learn more HERE .
Examining the Effectiveness of Cyber Team Competitions
How effective are cyber team competitions that simulate real-life operational environments? The Army Research Laboratory collected data from the 12th annual Mid-Atlantic Collegiate Cyber Defense Competition to assess teamwork, leadership behaviors, work processes and structure to determine how effective these team competitions are in developing a capable workforce.
Read more HERE .
Participate in Research on Cybersecurity Curriculum
You are invited to participate in a research project whose purpose is to investigate the factors that influence undergraduate cybersecurity curriculum adoption based on technology adoption models. This anonymous 20-minute questionnaire is intended for faculty or administrators with curriculum oversight for 2- and 4-year undergraduate cybersecurity courses or curriculum.
The study will contribute results for Todd Whittaker’s doctoral dissertation at Dakota State University under Dr. Cherie Noteboom. To access the survey, click this link or paste this this address into your browser:
Welcome National CyberWatch Center's Newest Members

Not yet a National CyberWatch member? Learn more  HERE .
Have an event you would like us to promote? Email information to