SlideShare a Scribd company logo
1 of 13
CYBER ED
A CYBER SECURITY NECESSITY
WHAT DO ALL THESE HAVE IN COMMON?
101.00
0
63.000
Unkno
1440
20.764320.00
THE PROBLEM
• Human error accounts for 52% of
security breaches
• “Identity theft is the fasted growing
crime” - Barack Obama
• Users not aware of exposure to
constantly evolving threats
• Average Users Cyber Security education
mostly based on personal experience
with surfing the web
THE CAUSE
• Traditional IT security training is
nearly non-existent
• “None of the top 10 U.S. computer science
programs at American universities require
a single course in cybersecurity before
graduation, signaling a dearth of proper
training for the next generation of IT
administrators and developers.”
• http://thevarguy.com/network-security-and-data-protection-software-
solutions/study-no-cybersecurity-training-required-top
• Anti-Virus is useless if a user
doesn’t know how to properly
navigate the web and workstation
THE SOLUTION – STANDARDIZED
EDUCATION
• Cross-platform security trainings
application with gamification!
• Divided into different IT subsections
(Wi-Fi 101, Preventing Social
Engineering, etc.)
• Successful completion of training
modules will digitally “certify”
user
• Platform will ensure that NO IN-
DEPTH TECHNICAL KNOWLEDGE IS
NEEDED, BUT WILL BE OBTAINED
VALUE PROPOSITION – CUSTOMER
SEGMENT
• Create an incentive for colleges,
companies, and users to start arming
themselves for internet threats!
• Build a ‘Baader – Meinhof’
Phenomenon and make internet
security a mainstream issue
• Material for education is already out
there, but barley utilized
HERE IS HOW IT WORKS – TRADITIONALLY
Personal Device
(Laptop /
Smartphone)
‘UCCS –
Wireless’
Wifi Hotspot
Global Internet
(Netflix /
Facebook/
Emails)
HERE IS HOW IT WORKS – OUR CONCEPT
CYBER ED
Education
High Speed
Network
Slow Speed
Network
Personal Device
(Laptop / Smartphone)
Global Internet
(Netflix / Facebook/
Emails)
Our
Product
FEATURES
• Data and statistics can be recorded,
analyzed, and used for consulting
• Helpful with identifying potential
weaknesses in user education
• Better allocation of risk mitigation strategies
(Social Engineering VS. Web-Safety)
• Periodic check of user safety
performance rating
• Useful for ensuring that learned material is
solidified and applied during monthly
checkups
FINANCIAL PROJECTIONS & FUTURE PLANS
• Create contract with college
campus based on student
population
• Current average:
• $4 - $6 per student
• $2 - $4 per faculty member
COMPETITION
• Cyber security and internet safety educational content already
available for free
• No incentive to use it, no requirements
• Software doesn’t solve problem
• Many programs and lectures exist, none solve a problem, all just present
information
• No product is actively targeting specific customer segments
• Different approach needed for college students, office workers, general
public, etc.
MILESTONES
• Implement prototype together with UCCS IT department
• Involve most local college campuses with help of EDUROOM
• Already has usable platform to connect local campus networks
• Involve nationwide colleges and eventually market platform to
chain restaurants that already offer free Wi-Fi hotspots
(Starbucks, McDonalds, Chipotle, etc.)
SUMMARY
• Comprehensive way for colleges and
companies to increase risk mitigation
• Get away from 52% user - caused risk
• Ensure that overall security awareness is
rising (inevitable necessity)
• PREVENT A DATA BREACH!

More Related Content

What's hot

Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
 
BYOD: The Good, The Bad and The Connected
BYOD: The Good, The Bad and The ConnectedBYOD: The Good, The Bad and The Connected
BYOD: The Good, The Bad and The Connectedspaul6414
 
The role of a University Computing Service in an increasingly mobile world OR...
The role of a University Computing Service in an increasingly mobile world OR...The role of a University Computing Service in an increasingly mobile world OR...
The role of a University Computing Service in an increasingly mobile world OR...Eduserv
 
ETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) UnionETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) Unionekunnen
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8sebaraff
 
Erdleymurray Sini2007
Erdleymurray Sini2007Erdleymurray Sini2007
Erdleymurray Sini2007Peter Murray
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentArnoldBail
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case StudySecurly
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility RefreshPatrick Loftus
 
Secrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumSecrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumLearning.com
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinaltbanks
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service patricia franklin
 
Introduction to the Mobile Web
Introduction to the Mobile WebIntroduction to the Mobile Web
Introduction to the Mobile WebGene Crawford
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product BriefSecurly
 
Naalphatu Toure Annomated Biblography B
Naalphatu Toure Annomated Biblography BNaalphatu Toure Annomated Biblography B
Naalphatu Toure Annomated Biblography BNaalphatu Toure
 

What's hot (20)

Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
BYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some ConsiderationsBYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some Considerations
 
BYOD: The Good, The Bad and The Connected
BYOD: The Good, The Bad and The ConnectedBYOD: The Good, The Bad and The Connected
BYOD: The Good, The Bad and The Connected
 
The role of a University Computing Service in an increasingly mobile world OR...
The role of a University Computing Service in an increasingly mobile world OR...The role of a University Computing Service in an increasingly mobile world OR...
The role of a University Computing Service in an increasingly mobile world OR...
 
ETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) UnionETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) Union
 
Mobile
MobileMobile
Mobile
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8
 
Erdleymurray Sini2007
Erdleymurray Sini2007Erdleymurray Sini2007
Erdleymurray Sini2007
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI Student
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case Study
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh
 
Secrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumSecrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety Curriculum
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
 
Introduction to the Mobile Web
Introduction to the Mobile WebIntroduction to the Mobile Web
Introduction to the Mobile Web
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Storyboard
StoryboardStoryboard
Storyboard
 
Storyboard
StoryboardStoryboard
Storyboard
 
Naalphatu Toure Annomated Biblography B
Naalphatu Toure Annomated Biblography BNaalphatu Toure Annomated Biblography B
Naalphatu Toure Annomated Biblography B
 

Similar to Cyber Ed

American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Security Innovation
 
Think tank event mobile app testing v1.3
Think tank event   mobile app testing v1.3Think tank event   mobile app testing v1.3
Think tank event mobile app testing v1.3Samer Desouky
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologiesERAUWebinars
 
Module 3
Module 3 Module 3
Module 3 EX28
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
ODL_Unit_II_2021.ppt
ODL_Unit_II_2021.pptODL_Unit_II_2021.ppt
ODL_Unit_II_2021.pptSasi Kumar
 

Similar to Cyber Ed (20)

American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
How students can get prepared for COMPTIA mobility+ plus certification (IOS,...
How students can get prepared for COMPTIA mobility+  plus certification (IOS,...How students can get prepared for COMPTIA mobility+  plus certification (IOS,...
How students can get prepared for COMPTIA mobility+ plus certification (IOS,...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
Think tank event mobile app testing v1.3
Think tank event   mobile app testing v1.3Think tank event   mobile app testing v1.3
Think tank event mobile app testing v1.3
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
 
Module 3
Module 3 Module 3
Module 3
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
ODL_Unit_II_2021.ppt
ODL_Unit_II_2021.pptODL_Unit_II_2021.ppt
ODL_Unit_II_2021.ppt
 

Cyber Ed

  • 1. CYBER ED A CYBER SECURITY NECESSITY
  • 2. WHAT DO ALL THESE HAVE IN COMMON? 101.00 0 63.000 Unkno 1440 20.764320.00
  • 3. THE PROBLEM • Human error accounts for 52% of security breaches • “Identity theft is the fasted growing crime” - Barack Obama • Users not aware of exposure to constantly evolving threats • Average Users Cyber Security education mostly based on personal experience with surfing the web
  • 4. THE CAUSE • Traditional IT security training is nearly non-existent • “None of the top 10 U.S. computer science programs at American universities require a single course in cybersecurity before graduation, signaling a dearth of proper training for the next generation of IT administrators and developers.” • http://thevarguy.com/network-security-and-data-protection-software- solutions/study-no-cybersecurity-training-required-top • Anti-Virus is useless if a user doesn’t know how to properly navigate the web and workstation
  • 5. THE SOLUTION – STANDARDIZED EDUCATION • Cross-platform security trainings application with gamification! • Divided into different IT subsections (Wi-Fi 101, Preventing Social Engineering, etc.) • Successful completion of training modules will digitally “certify” user • Platform will ensure that NO IN- DEPTH TECHNICAL KNOWLEDGE IS NEEDED, BUT WILL BE OBTAINED
  • 6. VALUE PROPOSITION – CUSTOMER SEGMENT • Create an incentive for colleges, companies, and users to start arming themselves for internet threats! • Build a ‘Baader – Meinhof’ Phenomenon and make internet security a mainstream issue • Material for education is already out there, but barley utilized
  • 7. HERE IS HOW IT WORKS – TRADITIONALLY Personal Device (Laptop / Smartphone) ‘UCCS – Wireless’ Wifi Hotspot Global Internet (Netflix / Facebook/ Emails)
  • 8. HERE IS HOW IT WORKS – OUR CONCEPT CYBER ED Education High Speed Network Slow Speed Network Personal Device (Laptop / Smartphone) Global Internet (Netflix / Facebook/ Emails) Our Product
  • 9. FEATURES • Data and statistics can be recorded, analyzed, and used for consulting • Helpful with identifying potential weaknesses in user education • Better allocation of risk mitigation strategies (Social Engineering VS. Web-Safety) • Periodic check of user safety performance rating • Useful for ensuring that learned material is solidified and applied during monthly checkups
  • 10. FINANCIAL PROJECTIONS & FUTURE PLANS • Create contract with college campus based on student population • Current average: • $4 - $6 per student • $2 - $4 per faculty member
  • 11. COMPETITION • Cyber security and internet safety educational content already available for free • No incentive to use it, no requirements • Software doesn’t solve problem • Many programs and lectures exist, none solve a problem, all just present information • No product is actively targeting specific customer segments • Different approach needed for college students, office workers, general public, etc.
  • 12. MILESTONES • Implement prototype together with UCCS IT department • Involve most local college campuses with help of EDUROOM • Already has usable platform to connect local campus networks • Involve nationwide colleges and eventually market platform to chain restaurants that already offer free Wi-Fi hotspots (Starbucks, McDonalds, Chipotle, etc.)
  • 13. SUMMARY • Comprehensive way for colleges and companies to increase risk mitigation • Get away from 52% user - caused risk • Ensure that overall security awareness is rising (inevitable necessity) • PREVENT A DATA BREACH!