RSA 2012: Cyber security school challenge reaches 8000 children in 2011

In 2011, the program reached 8000 children in schools, libraries and scout groups. Of the 8000 children, 3000 were ‘taught’ by the Nationwide program, resulting in the cyber security school challenge awarding Nationwide with the ‘team winner’ award.

Brocaglia was joined by ambassadors of the program - including Julie Peeler, (ISC)2 and Lisa Hodkinson, CISO of Nationwide - who shared their experiences of how volunteering can help educate children about the dangers of socialising and playing online.

The cyber security school challenge encourages interested volunteers to follow the three steps (as outlined on the website) and “potentially save children’s lives”. The three steps are as follows:

  1. Review the information, games and programs provided by our partners (including (ISC)2 and Carnegie mellon) and choose the lesson plans that suit your needs. Bring together a team of enthusiastic volunteers within your company that can act in different roles: advisors, schedulers, presenters, and lesson planners.
  2. Choose the age of child you’d like to choose, and go to the schools of your choice and teach the lessons: be interactive and engaging. “Finding ambassadors to ‘get you in the door’ of the schools has proved essential”, said Brocaglia. “Parents are priceless ambassadors to help encourage your attendance in their child’s school.” Julie Peeler advised that initial contact with the school be made during the summer so you can be ready to go in September.
  3. Track and measure the children you’re helping. Report back to the Cyber security school challenge on your progress and get counted in the challenge: Share your tips, challenges, and successes. You may also want to consider presenting to the parents and teachers – they too need the knowledge and skill-set to feel confident advising and supporting their children.

If you would like to volunteer and get involved with the cyber security school challenge, please register your interest here.

 

What’s hot on Infosecurity Magazine?