Ambitious Training Initiative Taps Talents of Blind and Visually Impaired

When David Mayne first started looking for a job in cybersecurity, the recruiter at his first-choice company told him no.
Mayne had already overcome tremendous hardship, losing his eye and his leg following a severe car accident, then finding a way to raise his four children on his own.
Mayne landed at Novacoast, a cybersecurity company specializing in IT services and software development.
After the company moved from Santa Barbara, Calif., to Wichita, Kansas, Mayne reached out to state and city organizations to recruit for Novacoast's training program.
That's how he met the team at Envision, a local organization that helps people who are blind or visually impaired through employment, outreach, rehabilitation, education, and research.
Curriculum Adapts to the Tools With the right tools - such as a computer with a screen reader and a Braille keyboard - BVI individuals can work in cybersecurity and IT roles, such as a SOC analyst, help-desk engineer, or network administration, Mayne realized.
So with the support of Novacoast CEO Paul Anderson, Mayne led the development of the Apex Program, an online, on-demand course to prepare VBI students for cybersecurity certification exams.
About 25 students have enrolled in the program since its inception in May 2023, and Mayne says he hopes to register 100 this year.
The program is free, its $7,500 cost covered by state grants.
16 states have partnered with the Apex Program, with Florida and Texas expected to join the fold this year, Mayne says.
The training materials are delivered in several different ways to accommodate student needs: audio-only, text-only, and PowerPoint and Word document versions that auto advance or advance manually.
Creating a curriculum that was accessible and still tackled the challenging topics completely was challenging, Mayne says.
Mayne is currently updating the materials, as the exams will be updated in July.
Training Pays Off for Students and Employers So far, four students have completed the Apex Program course.
One of the first graduates, Curtis Johnson, recently joined Novacoast as a SOC 1 Analyst, the company's first direct hire from the program.
Finding the Apex Program through a Facebook ad was a game-changer for Johnson, who was born blind due to congenital glaucoma.
For Mayne, bringing Johnson on board was important for both the company and the success of the Apex Program.
About 70 organizations have said they are willing to interview the program's graduates.
Cybersecurity Is a Career, Not Just a Job Mayne has been working with the White House's Office of the National Cyber Director to spread the word about the program, which also was featured in a recent short film from WorkingNation, a nonprofit media organization that explores the future of work in the US. WorkingNation's Melissa Panzer, the short film's director, says that she hopes the film inspires business leaders to look to unlikely talent pools and expand who they consider for opportunities.
The Apex Program plans to expand beyond its focus on BVI individuals to veterans and disabled veterans, which could open the program up to 500 to 800 students a year, Mayne says.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 09 Apr 2024 14:40:07 +0000


Cyber News related to Ambitious Training Initiative Taps Talents of Blind and Visually Impaired

Ambitious Training Initiative Taps Talents of Blind and Visually Impaired - When David Mayne first started looking for a job in cybersecurity, the recruiter at his first-choice company told him no. Mayne had already overcome tremendous hardship, losing his eye and his leg following a severe car accident, then finding a way ...
7 months ago Darkreading.com
6 Best Cybersecurity Training for Employees in 2024 - Cybersecurity awareness training programs are comprehensive, long-term products that show your workforce how to spot security threats and potential attacks. Cybersecurity training products typically offer informational videos, quizzes, and phishing ...
10 months ago Esecurityplanet.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
9 months ago Securityzap.com
Mastering Cybersecurity: Developer Training - Discover how to create an effective and engaging training program for your developers. Create a security training program with clearly defined goals to influence your developers to prioritize learning. Developers are likelier to participate and exert ...
10 months ago Feeds.dzone.com
How to Safeguard Your Data Through Security Awareness Training? - As cybercriminals employ increasingly advanced tactics, IT security awareness training becomes a pivotal defense mechanism. This article delves deeper into the imperative of such training and provides actionable tips to enhance the effectiveness of ...
7 months ago Cybersecurity-insiders.com
Researchers Uncover Simple Technique to Extract ChatGPT Training Data - Can getting ChatGPT to repeat the same word over and over again cause it to regurgitate large amounts of its training data, including personally identifiable information and other data scraped from the Web? The answer is an emphatic yes, according to ...
11 months ago Darkreading.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
6 months ago Hackread.com
Google Researchers Find ChatGPT Queries Collect Personal Data - The LLMs are evolving rapidly with continuous advancements in their research and applications. Recently, cybersecurity researchers at Google discovered how threat actors can exploit ChatGPT queries to collect personal data. StorageGuard scans, ...
11 months ago Cybersecuritynews.com
Latest Information Security and Hacking Incidents - The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle ...
8 months ago Cysecurity.news
Understanding CAT Culture in Cybersecurity: Collaboration, Awareness, and Training - In the dynamic and ever-evolving landscape of cybersecurity, organizations are increasingly recognizing the importance of fostering a robust security culture to mitigate risks and safe-guard sensitive data. One such approach gaining traction is the ...
7 months ago Cybersecurity-insiders.com
Navigating an AI-Enhanced Landscape of Cybersecurity in 2024: A Proactive Approach to Phishing Training in Enterprises - As we stand at the precipice of 2024, the intersection of artificial intelligence and cybersecurity looms large, with phishing attacks emerging as a focal point of concern. The integration of AI is poised to redefine the threat landscape, introducing ...
11 months ago Securityboulevard.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Tech workers fear being left unprepared for the future - While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate ...
10 months ago Helpnetsecurity.com
CVE-2020-3177 - A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to conduct ...
4 years ago
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training - I recently had the opportunity to engage in conversation with Jonathan, a lead analyst at Rapid7, where our discussion led to the internal technical training that he gives to their new analysts. These more passive learning approaches failed to engage ...
8 months ago Isc.sans.edu
Google Researchers' Attack Prompts ChatGPT to Reveal Its Training Data - A team of researchers primarily from Google's DeepMind systematically convinced ChatGPT to reveal snippets of the data it was trained on using a new type of attack prompt which asked a production model of the chatbot to repeat specific words forever. ...
11 months ago 404media.co
Cisco Training Bootcamps: Get the Scoop from Subject Matter Experts - Cisco Training Bootcamps have been on the scene for a couple years now. Plus, we got a sneak peek at what they'll cover in the upcoming Cisco Training Bootcamp webinar on December 13, 2023, at 10 a.m. Pacific Time. A Cisco Training Bootcamp provides ...
11 months ago Feedpress.me
ISACA Joins Forces with Erasmus+ for SHE@CYBER Project - This initiative, under the EC Cooperation partnerships in vocational education and training, is a concerted effort to address the cybersecurity skills gap in Europe, with a particular focus on empowering women and underrepresented groups in the ...
8 months ago Itsecurityguru.org
White House hosts Counter Ransomware Initiative summit, with a focus on not paying hackers - The third annual White House-led counter ransomware summit convening 48 countries, the European Union and Interpol launches in Washington today, featuring several new elements including a pledge from most member states not to pay ransoms and a ...
11 months ago Therecord.media
Microsoft SFI progress report elicits cautious optimism | TechTarget - "After a year, it looks like Microsoft has made some smart and substantive initial progress in elevating security across the whole organization: investment in security-focused head count, inclusion of security into performance reports across the ...
1 month ago Techtarget.com
Monthly Threat Webinar Series in 2023: What to Expect - We firmly believe that the internet should be available and accessible to anyone and are committed to providing a website that is accessible to the broadest possible audience, regardless of ability. These guidelines explain how to make web content ...
1 year ago Trendmicro.com
Server-Side Request Forgery Attack Explained: Definition, Types, Protection - A Server-Side Request Forgery attack is a security vulnerability in which a hacker tricks a server into accessing unintended resources on his behalf. An SSRF attack can lead to sensitive information being leaked or the attacker gaining control of ...
1 year ago Heimdalsecurity.com
Living Security Unify Go improves human risk management - Living Security announced Unify Go, a free tool for Living Security training customers that surfaces security vulnerabilities across the workforce by aggregating and correlating employee behavior across security training, phishing, and email security ...
11 months ago Helpnetsecurity.com
Top LLM vulnerabilities and how to mitigate the associated risk - As large language models become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. While the AI threat landscape changes every day, there are a handful of LLM vulnerabilities that we know pose significant risk ...
10 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)