BSW #279 – Dr. Chuck Gardner
Full Audio
View Show IndexSegments
1. CYBER.ORG’s Project Access: Training a Diverse Future Workforce – Dr. Chuck Gardner – BSW #279
In an effort to diversify the cybersecurity talent pool and improve cybersecurity literacy, CYBER.ORG created Project Access, a nationwide effort designed to expand access to cybersecurity education for blind and vision impaired students between the ages of 13-21 who are in pre-employment transition (Pre-ETS).
Through the Cybersecurity and Infrastructure Security Agency’s Cybersecurity Education and Training Assistance Program (CETAP) grant, CYBER.ORG pioneered a series of camps this past summer in Arkansas, Maine, Virginia, and Michigan to introduce blind and vision impaired students to key cybersecurity topics, help them develop cybersecurity skills, and explore the possibility of a career in a growing industry.
This is one of CYBER.ORG’s efforts to improve diversity and inclusion in the cybersecurity industry – starting with K-12 students.
Segment Resouces: To learn more about CYBER.ORG and Project Access or to get involved, visit: www.cyber.org www.cyber.org/events www.cyber.org/initiatives/project-access
You can reach Dr. Chuck Gardner, Sr. Director of Government and Non-Profit Engagement for CYBER.ORG at [email protected].
Announcements
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Guest
Chuck Gardner serves as the Senior Director of Government and Non-Profit Engagement for CYBER.ORG, the academic initiative of the Cyber Innovation Center. He has more than 10 years of classroom experience and holds an EdD (Educational Leadership) and an MBA (Marketing) from the University of Phoenix and a BS (Marine Transportation) from the United States Merchant Marine Academy. After leaving the maritime industry in 2006 he became a career-changing educator, first teaching algebra and geometry in middle school, then moving to a high school robotics and cyber classroom, where he first encountered CYBER.ORG and wrote content for them. Moving from a curriculum development specialist, to the director of curriculum, to the Associate Director, he oversaw all aspects of content development and the delivery of professional development workshops to teachers from across the country. As a Senior Director, he now oversees much of the federal and state-based outreach and national support for standards adoption, pathway development, and education/workforce development initiatives.
Hosts
2. Fake CISO Profiles, Executive Communication, and Developing Cybersecurity Leadership – BSW #279
In the leadership and communications section, Fake CISO Profiles on LinkedIn Target Fortune 500s, Cybersecurity Executive Communication and importance of Metrics, Tips for developing cybersecurity leadership talent, and more!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Hosts
- 1. Fake CISO Profiles on LinkedIn Target Fortune 500sSomeone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. But the fabricated LinkedIn identities are confusing search engine results for CISO roles at major companies, and they are being indexed as gospel by various downstream data-scraping sources.
- 2. What CISOs Want to See From NIST’s Impending Zero Trust GuidelinesThe goals of the government’s zero trust push are familiar to chief information security officers (CISOs) steeped in the details of zero trust: - End reliance on securing perimeter defenses. Clear perimeters no longer exist for most organizations thanks to remote work, cloud computing, mobile devices and the Internet of Things. - Make sure both access for authorized parties and security aren’t tied to location. That means insiders aren’t automatically allowed and outsiders aren’t automatically excluded. Gaining access to one resource doesn’t mean other lateral resources open up without further authorization. - Other elements include strong data encryption, increased centralized visibility into who is accessing what and improved cybersecurity practices across the board.
- 3. White House Releases Software Supply Chain Security GuidanceThe White House published a memo requiring agencies to comply with guidance from the Office of Management and Budget (OMB) which aims to improve software supply chain integrity and security. Signed by OMB Director Shalanda Young, the memo builds on Executive Order (EO) 14028, Improving the Nation’s Cybersecurity from May 2021, which is focused on the security and integrity of the software supply chain. The recent memo, published on September 14, requires each federal agency to comply with the NIST guidance when using third-party software on the agency’s information systems or otherwise affecting the agency’s information.
- 4. Cybersecurity Executive Communication and importance of MetricsEight Essential Components of Communication: Source <-> Message <-> Channel <-> Receiver <-> Feedback Environment — Context — Interference
- 5. Tips for developing cybersecurity leadership talentNavigating the skills gap from an employer's perspective starts with investing in talent. Get advice on how to develop and hire emerging leaders from an industry analyst.
- 6. 4 Tactics that Backfire When Dealing with a Difficult ColleagueWhen you’re at your wit’s end with a challenging colleague and it feels like you’ve tried everything, well-meaning friends and coworkers may tell you to “just ignore it” or to “suck it up” and move on with your life. But suppressing our emotions rarely helps. In this piece, the author outlines four tactics that are tempting to try — but often backfire — when dealing with a difficult colleague. Another one to avoid: waiting to see if your difficult colleague will just leave on their own. Your dream that they’ll walk out the door may come true, but there’s no guarantee that the culture will shift or that you’ll get along with their replacement. Ultimately you’re better off trying to create a workable situation with your colleague now. And remember: even small improvements can make a big difference.