Skip to main content

Teaching Cybersecurity to the Next Generation

August 30, 2013

From airline security to nuclear plants, our world is made up of systems. Threats to these systems from hackers have raised concerns about privacy, personal information protection, and even national security. So who will save us? Our kids.

It’s no surprise that kids these days know more about computers than their parents, generally speaking.  Private enterprises and the US Government are investing in programs, competitions, and internships all geared toward helping kids harness their hacking powers for good, not evil.  It’s a new generation of “white hat” hackers.

Cybersecurity is a priority for us here at Adaptive Communications – from vulnerability assessments to penetration testing to firewall implementation. In addition to providing those solutions to our clients, we also share the importance of cybersecurity with the community. Our CTO, Rich Dube, serves as a mentor for junior members of the Civil Air Patrol in a national high school cyber defense competition called CyberPatriot.

Training in Adaptive’s state-of-the-art engineering lab and working closely with Rich, the team focused on counteracting cybersecurity threats, an ever-growing problem in the US. At the CyberPatriot Competition in 2012, the team placed 53rd out of nearly 1,000 teams.  In 2013, the team finished in first place in the state competition.

“The biggest challenge was trying to condense vast amounts of information in a short period of time. These kids have grown up around computers, but they don’t really know a great deal about how computers operate, the core of these systems,” says Rich.

“White-Hat” hacking programs are growing in popularity across the nation. DefCon Kids is a camp that grew out of the largest annual hackers’ networking conference, Def Con, which originated in 1993. From skills labs to field trips, camp attendees are encouraged to question authority to truly understand how the technologies and systems that surround them work.

“These guys learn something new every time they come,” says Chris Hoff, the camp’s co-founder. “Every day they are here, they learn about electronics, they learn about privacy, how law enforcement works. They learn about social engineering.”

So what’s the outlook for these hacker heroes?

There is a growing demand for candidates with these skill sets across several industries. Here at Adaptive, we use these skills when performing Penetration Tests, as we attempt to circumvent the company’s security systems to determine where the vulnerabilities are and how to fix them. The more we can understand about the emerging threats across our landscape, the more we can do to combat them and teach future generations to do so as well.

Continued sponsorship of the CyberPatriots and other similar programs remains a priority for us at Adaptive. Rich believes, “raising awareness of cyber defense in of itself may decrease the existence of vulnerabilities in the first place from bad coding practices.”

Related Blogs

January 25, 2017

Escape and Evasion Egressing Restricted Networks

A command kill chain consists of payload delivery, code execution on a target system, and establishing a command and control (C2) channel outside of a...

See Details

March 08, 2018

Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security strate...

See Details

February 28, 2018

Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about contr...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.