兔子先生

Skip Navigation

兔子先生Global Media Center Experts Say It Will Take A Moonshot Commitment To Achieve Cybersecurity By 2028

Protecting cyberspace from attacks both foreign and domestic by 2028 requires a national 鈥渕oonshot鈥 commitment to rally support and educate our young people to create the necessary workforce to bolster our security, insisted speakers at the symposium, 鈥淎ttacking the Roots of Cyber (In) Security: The Role of Education.鈥 The Cyber Center for Education & Innovation (CCEI)鈥揌ome of the National Cryptologic Museum (NCM) conference was hosted by University of Maryland University College (UMUC) Nov. 8.

They used as their model John Kennedy鈥檚 call to action鈥攖o land a man on the moon before the end of the 1960s鈥攖hat inspired the nation.

鈥淭he moonshot effort resulted in millions of kids signing up to be engineers, aspiring to be as great as the hundreds of thousands of heroes who put a handful of heroes on the surface of the moon and returned them safely,鈥 said opening keynote speaker retired Army Gen. Dennis Via, who is now an executive vice president and Defense Fellow at Booz Allen Hamilton.聽 鈥淭his is the kind of game-changing initiative we need today to attack the roots of cyber insecurity.鈥

But skeptics at the conference questioned whether the cause of cybersecurity could possibly inspire the same enthusiasm as the potential for a moon landing.

Retired Navy Adm. Betsy Hight, now vice president of Cybersecurity Practice at Hewlett-Packard, said the term 鈥渃ybersecurity鈥 itself creates a language barrier in describing the need for protection in the digital age.

鈥淲hen President Kennedy said, let鈥檚 go land on the moon, we all knew what that meant,鈥 Hight said. 鈥淲e knew it would take a lot of discipline and we pulled all together.聽 Do you think this term cybersecurity is a little daunting and misunderstood in such an endeavor?鈥

Via conceded that Hight was right.

鈥淚 am not certain how the term 鈥榗ybersecurity鈥 resonates to an elementary school or a middle school student,鈥 he said.聽 鈥淚f you are speaking to parents, would they really know what you are talking about?鈥

Perhaps the answer is to start with talking up STEM education鈥攚ith its focus on Science, Technology, Engineering and Mathematics disciplines鈥攖hat already has become the buzz term of education, he said.

Afternoon panel on 鈥淣ew Technology, STEM Education, and the Cybersecurity Moonshot鈥 with (L to R) Moderator Dr. MJ Bishop, inaugural director, Center for Academic Innovation, University System of Maryland; Dr. Matt Gaston, director, Emerging Technology Center, Software Engineering Institute, Carnegie-Mellon; Benjamin Herold, staff writer, Education Week; Dr. Dee Kanejiya, founder and CEO, Cognii; Rachel Zimmerman, deputy commissioner, CyberPatriot

鈥淕et them excited about this thing called STEM. That is the foundation to me,鈥 he said. 鈥淭hat is what inspires them to light that spark to say this is something I want to do, and then encourage them as they go through elementary, middle and high school. As we talk to the young people here, we have to listen to what resonates with them.鈥

The symposium focused on a report issued by the Trump administration鈥檚 National Telecommunications Advisory Committee the week before the conference that called for a 鈥淐ybersecurity Moonshot.鈥

UMUC President Javier Miyares said the report notes the increasing reliance on the internet for everything we do, 鈥渁nd that [reliance] places each of us, along with our national security, at risk.鈥澛 The report, he said, calls for the internet to be 鈥渟afe and secure for the function of government and critical services for the American people by 2028.鈥

UMUC is proud that since 2010 its cyber programs have added more than 11,500 graduates to the workforce, while another 17,300 students are currently enrolled in those programs, he said.

鈥淓qually important, the governor, the General Assembly, and the Maryland State Department of Education are all taking tangible steps to embed computer science and security concepts in curricula, starting in the early elementary grades,鈥 he said.

In his remarks, Brit Kirwin, the University System of Maryland chancellor emeritus, noted a violation of a fundamental principle of economics鈥攖hat a shortfall in the number of cyber experts coupled with an industry willing to pay top dollar for talent, should have produced a greater flow of talent to fill the gap.聽 Yet the gap just keeps getting bigger.

Perhaps, he said, there is a more fundamental issue. 鈥淭he rate of change in the cyber infrastructure, which is phenomenal, is so great that we simply can never have the size and quality of the workforce needed to make our nation cyber secure.鈥

Candy Alexander, president of the International Board of the Information Systems Security Association, said the industry is constantly impatient with the graduates coming into the workforce, saying they are not hitting the ground running. Business has to be reminded, she said, that it has a responsibility to continually invest in employee education because technology is changing so quickly.

George Washington University professor Diane Burley echoed Adm. Hight鈥檚 concerns that students even at the college level don鈥檛 know what cybersecurity is.聽 It should be presented to them in ways that the students ask to be employed in it.

And still, she said, only 300 colleges and universities, out of 4,500 nationwide have been designated by the National Security Administration to have the curricula and guidelines to teach cybersecurity.

Featured speaker Education Week staff writer Ben Herold discussed findings from the Education Week Research Center/Consortium for School Networking Survey

And if all of the college students needed for cybersecurity jobs were to suddenly seek to learn it, finding enough professors to teach them would be difficult, Burley said, adding that industry needs to provide employees to teach students, and that would help students make the connection between what they are learning and what they will be doing.

But Mary Ann Davidson, the chief security officer for Oracle, said perhaps the approach to cybersecurity is backward.聽 She gave the analogy of the story of the Dutch boy and the dike.聽 He saw a leak and put his finger in it and saved the town.

鈥淲e keep thinking if we had enough Dutch boys with enough fingers, we could solve this problem,鈥 she said.聽 But there never will be enough Dutch boys to plug all of the security leaks.聽 鈥淭he problem is we have to redesign the dike.鈥

Computer programs are not designed to be secure, Davidson said.聽 Until that is turned around to reduce the number of leaks, 鈥渨e will continue to build unsafe systems that will outstrip the number of cybersecurity people to fix it.鈥

Cindy Widick, the National Security Agency 鈥檚 chief of Cybersecurity Operations, talked about the 鈥渢alent war鈥 for personnel who can protect the internet from a growing threat from international adversaries as well as criminals. The moonshot analysis is a good one, she said.

鈥淚 think back to the Apollo program,鈥 Widick said. 鈥淚 remember the excitement. I remember it being a national rallying goal.聽 When I think of a moon shot, I think of something that is going to be hard, challenging something that is going to require commitment over time. I think of it as achieving a goal that is worth it as well as something that taps into the human aspiration to be the best at something.鈥

Still, the gap between visualizing a moon shot and understanding the abstraction of cybersecurity is a challenge that must be overcome, said M.J. Bishop, the Inaugural Director of the University of Maryland鈥檚 Center for Academic Innovation.

The profession doesn鈥檛 even have a name, she said. Cybersecurityist?

鈥淭he very group we are trying to address, middle schoolers, who we need to get to think about STEM careers, can鈥檛 think abstractly,鈥 Bishop said. 鈥淵ou can visualize a moon shot; you can鈥檛 visualize cybersecurity.聽 They just gloss over it and move on to the next thing.鈥

Cover photo:聽Cindy Widick, chief, Cybersecurity Operations Group, NSA/CSS Cybersecurity Operations Mission Manager (CSOMM) delivered the closing keynote address

Contact Us

Our helpful admissions advisors can help you choose an academic program to fit your career goals, estimate your transfer credits, and develop a plan for your education costs that fits your budget. If you鈥檙e a current 兔子先生student, please visit the Help Center.

Personal Information
Contact Information
Additional Information
This field is required.
This field is required.
 

By submitting this form, you acknowledge that you intend to sign this form electronically and that your electronic signature is the equivalent of a handwritten signature, with all the same legal and binding effect. You are giving your express written consent without obligation for 兔子先生to contact you regarding our educational programs and services using e-mail, phone, or text, including automated technology for calls and/or texts to the mobile number(s) provided. For more details, including how to opt out, read our privacy policy or contact an admissions advisor.

Please wait, your form is being submitted.