Skip to content ↓ | Skip to navigation ↓

cssc_badgeNow that National Cyber Security Awareness Month (NCSAM) has come to an end, it is important to remember that security is not just a one-time event or something that we should focus on only one month of the year. Additionally, it is critical that we take the time to educate our young cyber users to be security savvy.

The Executive Women’s Forum, in partnership with Carnegie Mellon University, (ISC)2 and the National Cyber Security Alliance, has created a Cyber Security School Challenge, challenging us to take cyber security information to our local schools and educate the children.

Although the EWF focuses on women in security, anyone—both men and women, in and out of the security industry—can participate in the challenge, and it is an easy way to educate our most important users about online safety. This challenge includes materials that can be used, including getting started materials, school introduction letters, lesson plans and scheduling guides. Additionally, there are educational websites and even an interactive game that can be shared or used.

Taking the time to educate our youngest users, who have been interacting with the online ecosystem at younger and younger ages is what I consider a civic responsibility to our changing society. Additionally, it helps grow our communities where we work and live. Consider 8-year-old Reuben Paul, who is a cyber aware CEO. He suggests we teach youngsters about cyberbullying, as well as strong passwords.

Although NCSAM has ended, it is a worthwhile endeavor to spend an hour or two with our children and help protect them as they navigate the sea of information (that most definitely includes monsters!) available to them.

Consider giving back to your community and making a difference.

It will benefit the children and make you feel pretty good, too.


Related Articles:


picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Header image courtesy of