Loading...


 all right. So welcome everybody again. This is our second networking event we have and, and I think this is a great way for students to get a feel for what is going on in the industry. What is, you know, what, what this project is all about, and maybe ask questions about how things are going and what what's in it for you? So just an overview. This is a project that was fun, that is funded by the NSA and and the and led by University of New Haven and a few other colleges. One of them happens to be coastline Community College in California. The other is Tennessee Tech, Tennessee University of Texas, North Texas, and then UH Maui College. So the idea here is to is to have a cohort of students who, who, who essentially are training in cybersecurity basics or or some details going through the step from last month or last couple of months till the end of next year, which seems like a long time, but actually it goes pretty fast and and the idea of this cohort was not just for you to go through the technologies and content of of
all right. So welcome everybody again. This is our second networking event we have and, and I think this is a great way for students to get a feel for what is going on in the industry. What is, you know, what, what this project is all about, and maybe ask questions about how things are going and what what's in it for you? So just an overview. This is a project that was fun, that is funded by the NSA and and the and led by University of New Haven and a few other colleges. One of them happens to be coastline Community College in California. The other is Tennessee Tech, Tennessee University of Texas, North Texas, and then UH Maui College. So the idea here is to is to have a cohort of students who, who, who essentially are training in cybersecurity basics or or some details going through the step from last month or last couple of months till the end of next year, which seems like a long time, but actually it goes pretty fast and and the idea of this cohort was not just for you to go through the technologies and content of of  cybersecurity, but also to see and get a feel for what the industry is about and how it's how it's evolving and changing. Okay, so what it may be today may not very well be at the end of next year, or some things might be. So that's an overview of the project. Is mostly for Sunny, right? I think most of you students will probably know what you're in already with that said, let me hand it over to our guest. Let's see. So you're here, McKenna, you're here. And ghost, McKenna, you might want to introduce yourself and and then we will you can take it from there. This is the agenda that everybody is aware of.
cybersecurity, but also to see and get a feel for what the industry is about and how it's how it's evolving and changing. Okay, so what it may be today may not very well be at the end of next year, or some things might be. So that's an overview of the project. Is mostly for Sunny, right? I think most of you students will probably know what you're in already with that said, let me hand it over to our guest. Let's see. So you're here, McKenna, you're here. And ghost, McKenna, you might want to introduce yourself and and then we will you can take it from there. This is the agenda that everybody is aware of.  little bit more about that Pacific technology cooperation group. The big takeaway here is one of our crown jewels is that we we put on, arguably, what is the largest cybersecurity competition for high schoolers, both private and public, and we're very proud of what that does, by way of greater exposure to cybersecurity, the tools associated With that, and just improving participation in that field. Now, I'm going to dive into what most everybody is interested in, and really here to discuss, I'll start off with the IT commodity areas. And what I want to point out here is that the it commodity areas span a very vast ecosystem of different disciplines that are a part of Information Technology, where a lot of people may only assume or know of a few specializations that make it make up information technology. The reality is, is that there are many everything from someone that's interested in forensics and problem solving to someone that may be more interested into coding and building software applications, someone that may be more interested in physically designing networks. And what I've done is I've highlighted a few of those that I wanted to point out as some key areas that we see at Kapu solutions as high growth areas, Architecting, which is essentially the design and engineer of enterprise networks systems, which would be an encompassing of multiple applications compliance, which is born out of a requirement from the federal government for companies to embrace and comply with security frameworks such as cmmc. We can kind of discuss that if there's any interest there. And then, of course, the elephant in the room, which is AI machine learning and all manner of everything that's associated with that. I'll move on to cybersecurity rules. There's just too vast of an ecosystem to cover everything that cover that falls under the Information Technology umbrella. However, as a core capability within Kapu solutions, that being cybersecurity, we wanted to focus in on that. And there's three that we feel are of particular interest, as kind of stated before, one of the hot commodity areas is AI ml, so data scientists, which are the individuals that curate and train the models, and then the AI ml engineers that actually build the models and take what those data scientists provide to improve the accuracy of the models that they program, and then, of course, the network engineers, which just goes back to the architectural piece that I mentioned
little bit more about that Pacific technology cooperation group. The big takeaway here is one of our crown jewels is that we we put on, arguably, what is the largest cybersecurity competition for high schoolers, both private and public, and we're very proud of what that does, by way of greater exposure to cybersecurity, the tools associated With that, and just improving participation in that field. Now, I'm going to dive into what most everybody is interested in, and really here to discuss, I'll start off with the IT commodity areas. And what I want to point out here is that the it commodity areas span a very vast ecosystem of different disciplines that are a part of Information Technology, where a lot of people may only assume or know of a few specializations that make it make up information technology. The reality is, is that there are many everything from someone that's interested in forensics and problem solving to someone that may be more interested into coding and building software applications, someone that may be more interested in physically designing networks. And what I've done is I've highlighted a few of those that I wanted to point out as some key areas that we see at Kapu solutions as high growth areas, Architecting, which is essentially the design and engineer of enterprise networks systems, which would be an encompassing of multiple applications compliance, which is born out of a requirement from the federal government for companies to embrace and comply with security frameworks such as cmmc. We can kind of discuss that if there's any interest there. And then, of course, the elephant in the room, which is AI machine learning and all manner of everything that's associated with that. I'll move on to cybersecurity rules. There's just too vast of an ecosystem to cover everything that cover that falls under the Information Technology umbrella. However, as a core capability within Kapu solutions, that being cybersecurity, we wanted to focus in on that. And there's three that we feel are of particular interest, as kind of stated before, one of the hot commodity areas is AI ml, so data scientists, which are the individuals that curate and train the models, and then the AI ml engineers that actually build the models and take what those data scientists provide to improve the accuracy of the models that they program, and then, of course, the network engineers, which just goes back to the architectural piece that I mentioned 
 to move into cybersecurity. The next thing I wanted to point out is the traditional network certification paths. I believe myself the doctor, Mr. Rosales. We kind of grew up in an environment where there was really one dominant player in the network architecture business, and the gold standard was the Cisco certifications. So if you became an associate, and you moved into a specialist, and then you eventually got to professional, and eventually leveled up to engineer, then then you were on the glide path to senior expert level network architecture certification. That also applies to system where the vast majority of system administrators would follow a Microsoft path, and that is still applicable in many cases. But what I wanted to point out is that at Kapu solutions and for what we're seeing trend wise is we're no longer in a system where it is not a singular company that dominates. We've kind of moved into an environment where you have something that's agnostic, hybrid, hybrid, being on premise and cloud. And then there's virtualization. There are different operating systems on the server level that you need to be familiar with. That kind of point out Linux as big one. And then also databases, and how we've kind of moved from a SQL Oracle understanding to more of specific database builds. CRM is a big one, so customer relation management, or customer relation management, and then another big one is going to be ERP, which is Enterprise Resource programs. If there's any takeaway from this, it would be that the hybrid environment and those two specialized database programs, if you begin to understand the security implications of running those, those will serve you very well moving in the industry, here's some additional trends that we're seeing. So I won't go too much deeper into the AI ml, but definitely neural network design is top of mind for anyone that's looking at that, including on the security side, as we start to automate a lot of the security analysts, roles that have been traditionally filled by teams of people and are now giving way to systems that are able to simultaneously monitor systems and or sensors and logs across networks, compile that information and provide great threat analysis. Python programming goes hand in hand with the neural network being that that is the program of AI ml. And then I wanted to also point out something that you may not be tracking, which is the layer one lower voltage. And layer one is from the OSI model. The physical layer is what I mean by that, and the number of work, or the large amount of work that comes out of that, to include the physical security side. So not everything is digital. There is a physical security aspect to the field that you guys are currently studying. I've got
to move into cybersecurity. The next thing I wanted to point out is the traditional network certification paths. I believe myself the doctor, Mr. Rosales. We kind of grew up in an environment where there was really one dominant player in the network architecture business, and the gold standard was the Cisco certifications. So if you became an associate, and you moved into a specialist, and then you eventually got to professional, and eventually leveled up to engineer, then then you were on the glide path to senior expert level network architecture certification. That also applies to system where the vast majority of system administrators would follow a Microsoft path, and that is still applicable in many cases. But what I wanted to point out is that at Kapu solutions and for what we're seeing trend wise is we're no longer in a system where it is not a singular company that dominates. We've kind of moved into an environment where you have something that's agnostic, hybrid, hybrid, being on premise and cloud. And then there's virtualization. There are different operating systems on the server level that you need to be familiar with. That kind of point out Linux as big one. And then also databases, and how we've kind of moved from a SQL Oracle understanding to more of specific database builds. CRM is a big one, so customer relation management, or customer relation management, and then another big one is going to be ERP, which is Enterprise Resource programs. If there's any takeaway from this, it would be that the hybrid environment and those two specialized database programs, if you begin to understand the security implications of running those, those will serve you very well moving in the industry, here's some additional trends that we're seeing. So I won't go too much deeper into the AI ml, but definitely neural network design is top of mind for anyone that's looking at that, including on the security side, as we start to automate a lot of the security analysts, roles that have been traditionally filled by teams of people and are now giving way to systems that are able to simultaneously monitor systems and or sensors and logs across networks, compile that information and provide great threat analysis. Python programming goes hand in hand with the neural network being that that is the program of AI ml. And then I wanted to also point out something that you may not be tracking, which is the layer one lower voltage. And layer one is from the OSI model. The physical layer is what I mean by that, and the number of work, or the large amount of work that comes out of that, to include the physical security side. So not everything is digital. There is a physical security aspect to the field that you guys are currently studying. I've got  Here in terms of supporting national interests and security. So all right, so I already talked about the strategic importance of Hawai'i and why we're located here. I mean, I would say there's over 375 military civilian personnel that operates and supports indo Paco, and about 100 service members and civilians that work here in Hawai'i. That's a lot of a lot of data, a lot of information we have to protect. And as as it keeps on continuing growing the workforce and cyber continues to grow, I would say later on my slides, I'll talk about the Defense Department, defense cyber workforce framework. I think Jon talked about little bit about about it, but I'll talk a little bit more about it, and what's current and what are you looking for workforce and talent in the cyber arena, protecting critical infrastructure and the defense network. Again, I again, why is unique? Because we're Island and resources are limited. Rely on internal resources here to support our critical needs in terms of, you know, cyber threats and defense. Again, our defense network is pretty robust, but there's not enough military and civilian employees to support that, and with the critical infrastructure we have sustained support, it requires requirements to protect information data, and building that workforce is critical. It does not start in just college. It starts, I would say, you know, elementary to middle school and high school level, k 12. And my company is looking in that working with workforce development organizations to build that talent. It's not just college. It starts in the K 12 sector. Career Opportunities. Jon talked about that, you know, entry level med fair positions. I'm going to talk about resourcing, getting you there. You know, internships that I support, a support programs like the DoD SkillBridge. I'm not sure how many veterans here, or veteran students here, my company, and other companies I support, support that and transition from military to civilian in the cyber or IT workforce. Internships are great. You know, whether it's paid for great paid or for grade, it's great to get you in the workforce. Later on, I'm going to talk about an internship program that's with DoD called p3 i which helps students transition, or helps not transition, but helps give them experience. How, how's it Life is life working in DoD's like and you know how that transition from internship to employment works? I don't want to talk about skills and certification. Jon talked about that, but I do want to harp on important soft skills. I mean, we can talk about certification all day, but soft skills is something that a lot of employers are looking at if you're willing to learn and understand the environment, your depth new things and good problem solvers. I would tell you that is a good soft skill to have. Another good soft skill to have is communication skills. Just because you know your technical skills in cybersecurity, you're doing times where you have to communicate your skills to non technical key stakeholders. They must understand what this you know, even though you're technically advanced and skilled, you're non technical stakeholders, like some of your boss and DOD may not understand, so you have to break it down in layman terms. Also, I'm gonna talk about some experience on not only just working real world projects and your internships, but also hands on labs with the community. I you know, working with the community is also a great way to develop skills and soft skills to build on
Here in terms of supporting national interests and security. So all right, so I already talked about the strategic importance of Hawai'i and why we're located here. I mean, I would say there's over 375 military civilian personnel that operates and supports indo Paco, and about 100 service members and civilians that work here in Hawai'i. That's a lot of a lot of data, a lot of information we have to protect. And as as it keeps on continuing growing the workforce and cyber continues to grow, I would say later on my slides, I'll talk about the Defense Department, defense cyber workforce framework. I think Jon talked about little bit about about it, but I'll talk a little bit more about it, and what's current and what are you looking for workforce and talent in the cyber arena, protecting critical infrastructure and the defense network. Again, I again, why is unique? Because we're Island and resources are limited. Rely on internal resources here to support our critical needs in terms of, you know, cyber threats and defense. Again, our defense network is pretty robust, but there's not enough military and civilian employees to support that, and with the critical infrastructure we have sustained support, it requires requirements to protect information data, and building that workforce is critical. It does not start in just college. It starts, I would say, you know, elementary to middle school and high school level, k 12. And my company is looking in that working with workforce development organizations to build that talent. It's not just college. It starts in the K 12 sector. Career Opportunities. Jon talked about that, you know, entry level med fair positions. I'm going to talk about resourcing, getting you there. You know, internships that I support, a support programs like the DoD SkillBridge. I'm not sure how many veterans here, or veteran students here, my company, and other companies I support, support that and transition from military to civilian in the cyber or IT workforce. Internships are great. You know, whether it's paid for great paid or for grade, it's great to get you in the workforce. Later on, I'm going to talk about an internship program that's with DoD called p3 i which helps students transition, or helps not transition, but helps give them experience. How, how's it Life is life working in DoD's like and you know how that transition from internship to employment works? I don't want to talk about skills and certification. Jon talked about that, but I do want to harp on important soft skills. I mean, we can talk about certification all day, but soft skills is something that a lot of employers are looking at if you're willing to learn and understand the environment, your depth new things and good problem solvers. I would tell you that is a good soft skill to have. Another good soft skill to have is communication skills. Just because you know your technical skills in cybersecurity, you're doing times where you have to communicate your skills to non technical key stakeholders. They must understand what this you know, even though you're technically advanced and skilled, you're non technical stakeholders, like some of your boss and DOD may not understand, so you have to break it down in layman terms. Also, I'm gonna talk about some experience on not only just working real world projects and your internships, but also hands on labs with the community. I you know, working with the community is also a great way to develop skills and soft skills to build on  your talent here in the cyber workforce community. Uh, earlier, I talked about what DoD was looking for. So this is the department defense, cyber workforce framework. This has been updated. As you can see, cyber is not, you know, means everything. So they have seven workforce elements that DOD looks for, looking for talent. You know, not just cyber, but it cyberspace, the cyberspace effects, intelligence, cyber safety enablers, software engineers, AI, data. And under those elements, there's 33 specialty areas. And under those is 17 work roles, and I'll show you later on example, what DoD looks for in terms of what tasks and KSAs, knowledge skills and abilities that are tend to look for in building these job descriptions for contractors like me and Jon when they hire folks to support department defense, You can see, this is one of many elements here. I put it because it and cyber, if you don't, you got to have a little bit of IT skills do cyber. But if you look on the cyber skills, you can see that the job description, and this is like a evaluation sheet with DoD looks at, you know, all right, the job script. Put it out there. We're looking for our cybersecurity, cyber defense analyst, okay, which is under their framework code, 511, and ID, and this is their work world definition under the description. There are KSAs that follows that, and when they do hire, well, this is more on pertaining to government employees, not contractors. They look at that as a checklist, and I do as a contractor. He's modeled that as well myself, because if they're going to use this as a reference and checklist evaluation sheet, I use it as well as hiring folks in the cyber it work realm.
your talent here in the cyber workforce community. Uh, earlier, I talked about what DoD was looking for. So this is the department defense, cyber workforce framework. This has been updated. As you can see, cyber is not, you know, means everything. So they have seven workforce elements that DOD looks for, looking for talent. You know, not just cyber, but it cyberspace, the cyberspace effects, intelligence, cyber safety enablers, software engineers, AI, data. And under those elements, there's 33 specialty areas. And under those is 17 work roles, and I'll show you later on example, what DoD looks for in terms of what tasks and KSAs, knowledge skills and abilities that are tend to look for in building these job descriptions for contractors like me and Jon when they hire folks to support department defense, You can see, this is one of many elements here. I put it because it and cyber, if you don't, you got to have a little bit of IT skills do cyber. But if you look on the cyber skills, you can see that the job description, and this is like a evaluation sheet with DoD looks at, you know, all right, the job script. Put it out there. We're looking for our cybersecurity, cyber defense analyst, okay, which is under their framework code, 511, and ID, and this is their work world definition under the description. There are KSAs that follows that, and when they do hire, well, this is more on pertaining to government employees, not contractors. They look at that as a checklist, and I do as a contractor. He's modeled that as well myself, because if they're going to use this as a reference and checklist evaluation sheet, I use it as well as hiring folks in the cyber it work realm.  Pacific Intel Innovation Initiative. This is mainly focused on college students. We're being going on our third year, and there's not only it cyber, but there's internships in electronic warfare, data science and all other STEM fields out there. But I'm going to talk about it cyber here is that it's a good way to well, all internships is a good way to experience workforce and DOD this summer, we showcase the viceroy Maven internship. These internships, is a internship that requires you have a security clearance, and it helps you. It's a great way to understand how DoD works, and get the opportunity to network and learn new skills. Get mentored by DOD civilians, DoD's contractors and DOD military personnel. It's a great program. It is a paid internship, and our goal is to after internship, seek employment with the DoD organization, also with PT rhy. We do support peripherals. You know, we supported one this year, in February, we did a matchmaking session with a lot of these students. It was a great way to network and get local talent to the Department of Defense, organization to companies for employment. So to wrap things up for global strategic solutions. You know, I'm here to mentor, train and build a pipeline in the STEM area in particular, it and cyber mean a company has access to various platforms that build the pipeline. One, one notable the DoD cyber exchange. That's where I got DoD workplace. DOD cyber workforce framework. I help support certification, and if not, I look for other partners to help support other students that looking for employment mentorship and career growth. That's, that's, that's, that's continuous for my company, you know, if it's not with my company, and, you know, with other partner companies as well, Kapu solutions, MC three, technology, large business like Huntington and in Blue Zone, if it's not work, Ikaika, I see can partner with other companies and see if they're looking interested in looking for potential talent here in the island. All right. So with that said, if you want more information on you know, the cyber camp p3 I here's the information. One of my Help Desk employees will reach out to you, and we can try to resource the internship or a community project that involves high school, middle school cybersecurity projects with that said, Hey, thank you. And any questions, I'll be standing by. Great.
Pacific Intel Innovation Initiative. This is mainly focused on college students. We're being going on our third year, and there's not only it cyber, but there's internships in electronic warfare, data science and all other STEM fields out there. But I'm going to talk about it cyber here is that it's a good way to well, all internships is a good way to experience workforce and DOD this summer, we showcase the viceroy Maven internship. These internships, is a internship that requires you have a security clearance, and it helps you. It's a great way to understand how DoD works, and get the opportunity to network and learn new skills. Get mentored by DOD civilians, DoD's contractors and DOD military personnel. It's a great program. It is a paid internship, and our goal is to after internship, seek employment with the DoD organization, also with PT rhy. We do support peripherals. You know, we supported one this year, in February, we did a matchmaking session with a lot of these students. It was a great way to network and get local talent to the Department of Defense, organization to companies for employment. So to wrap things up for global strategic solutions. You know, I'm here to mentor, train and build a pipeline in the STEM area in particular, it and cyber mean a company has access to various platforms that build the pipeline. One, one notable the DoD cyber exchange. That's where I got DoD workplace. DOD cyber workforce framework. I help support certification, and if not, I look for other partners to help support other students that looking for employment mentorship and career growth. That's, that's, that's, that's continuous for my company, you know, if it's not with my company, and, you know, with other partner companies as well, Kapu solutions, MC three, technology, large business like Huntington and in Blue Zone, if it's not work, Ikaika, I see can partner with other companies and see if they're looking interested in looking for potential talent here in the island. All right. So with that said, if you want more information on you know, the cyber camp p3 I here's the information. One of my Help Desk employees will reach out to you, and we can try to resource the internship or a community project that involves high school, middle school cybersecurity projects with that said, Hey, thank you. And any questions, I'll be standing by. Great.