Wednesday, October 25, 2023

Cyber notes

 Agenda - should be established at the end of each meeting and reviewed at the beginning of the meet to establish structure, ensure all points are discussed and 

all attendees are prepared to discuss their topics.
Open items / assignments should have an accountable persons name attached even if people are working in groups. The accountable person should present the deliverable and send an email no later than Tuesday @10 am, to allow the entire team to review the work and be ready for the Wed meeting.  
This session will eventually move to a problem solving meeting for people that are having road blocks, right now it is a recognizance meeting and an assignment meeting.
Work/deliverables should be completed with your assigned person /team during the Week - Thursday / Monday are recommended dates to meet.
Cyber Team Members:
Estimate a minimum of 60 team members per year and 10 companies to provide clinics to Per year.
What assets are needed to execute each module of the plan?
Training assets for:
Education
  •  companies e.g. education
  • new cyber-team members (Cyber Jon's) e.g. Jonathan's lol - onboarding 
  • Branding should be created
  • etc
Tools
  • Questionnaire assessments
  • etc.
Cyber Team Member recruitment plan: (needs to be created) Strawman
  1. Course Requirements / Certificate Qualification
    • Team members must be at least sophomores an taken xyz class
    • Team members must commit x hours per week
    • Etc.
  2. Interviewers
  • Team members must be interviewed by at least 2 Cyber Team members with unanimous agreement,
  • A 5 question assessment should be completed by each interviewer and provided to the Professor in charge.
Company requirements
Must be a 
  • non-profit /profit with at least xyz # of company employees
  • Have xyz technology
  • etc

Saturday, October 14, 2023

Google Funding

 Work and Contact Information:

  • Personal and professional contact details

  • Work history and relevant qualifications

Narrative for Proposed Project:

  • Vision for the project

  • Implementation plan

  • Staffing strategy

  • Contribution to project goals

Intended Use of Funds and Budgets:

  • Explanation of how the funds will be used

  • Detailed budget breakdown

Wednesday, October 4, 2023

Applications

 Applications are now open to apply for funding from Google to create a student-based cyber cynic at UCONN Stamford.

The UCONN Stamford campus is the perfect fit for a clinic.
Google wants schools to help build a local workforce in diverse underserved communities to help protect hospitals, nonprofits, schools and utilities from cyber-attacks.
They will provide funding of up to $1 million dollars per school.
We have been reaching out to local non-profits in the area for participation.
Currently, Google does not have any clinics in CT with the last one funded at Columbia.
The clinic that we are looking to build is the student model.

For decades, schools of law and medicine have operated “clinics,” where students work with real-world clients with limited resources and gain valuable hands-on experience.

Now, the “clinic” model has been adapted for the field of cybersecurity. University-based cybersecurity clinics train students from diverse backgrounds and academic expertise to strengthen the digital defenses of non-profits, hospitals, municipalities, small businesses, and other under-resourced organizations in our communities, while also developing a talent pipeline for cyber civil defense.

This is a fantastic opportunity for our campus, community and students.

Sunday, September 17, 2023

Cyber email

 We need a report of progress and what each student is working on.

Important that we start to make progress and communicate thru email.
Communication is the lifeblood of any project, and it is vital to the success of this extremely important cyber security program,
They just awarded 2.2 million to UC Berkley last month.
Please let us know any progress made or questions needed.
Google, in collaboration with the Consortium of Cybersecurity Clinics, will support selected colleges, universities, and community colleges with up to $1M each to increase access and opportunities for students interested in pursuing careers in cybersecurity. In addition, recipients can access the Google Cybersecurity Certificate, Google Titan security keys, and student mentorship opportunities from Google.

Google Cyber Program

 Consortium-Determined Essentials: 

Committed faculty champions: Someone who can generate ideas and gain institutional support. Having a champion that has support from administrative and academic leadership and flexibility to orient their teaching, research, and service toward a clinic extra time is critical.


Institutional and Interdisciplinary support: Successful clinics require institutional efforts, e.g., creating new courses, securing funding, or taking resources from the school. Proactive universities open these programs to all different degree programs, graduates and undergraduates.


Clinic Vision:Consortium members recommend taking a look at existing models and identifying which components best suit an individual host institution.


Local Partners: Local partners are crucial for new clinics as they connect the clinic to organizations in need, vouch for program quality, and help find suitable clients. Including a local partner in funding proposals can enhance proposal acceptance and ensure clinic longevity. The choice of a local partner should align with the target clientele


Clinic Models

Class, Capstone Project, Club or Internship


Potential Clients to serve

Public entities, nonprofits, small businesses, blend


Program Instruction Method

Faculty taught, faculty advised instructor taught, Mentor-supported









Consortium clinics have found that $300k is a good funding target for the first year, and $100k each year thereafter.


Here are typical line items for a clinic budget:

Faculty and instructor paid time for the clinic: May include summer salary.

Graduate researcher / TA / Post-doc for clinic teaching assistance: Often 1 TA per semester.

Equipment: Laptops and security keys. Software for analysis. Secure storage and collaboration tools.

Curriculum development expenses: Budget for the creation of clinic specific curriculum materials



Cyber notes

  Agenda - should be established at the end of each meeting and reviewed at the beginning of the meet to establish structure, ensure all poi...