CyberHeroes

CyberHeroes is a one-week training program (18-23 of March) that brings together twenty talented youngsters from The Netherlands and New Mexico, USA. Together they will be trained in ethical hacking skills to address current security threats. Over the course of one week, they will take on hacker battles, work on CSI-type cyber challenges with local police, study the history of cryptography, learn to fight cyber crime alongside international hackers, and much more.

See the program here

Cyberworkplace

Cyberworkplace is a non-profit initiative based in Rotterdam, the Netherlands, that helps reduce the current shortage of cybersecurity experts in the labor market by providing in-demand 21st-Century coding skills to vulnerable youth populations.

The program is built upon modern teaching methods, including peer-to-peer techniques and project-based learning.

Cyberworkplace attracts cyber security talents such as gamers, hackers, and tech-savvy youngsters to help them develop the skills they need for the 21st-century labor market and eventually match them with leading IT security companies and organizations for internships and more. In this way, Cyberworkplace works to close the gap that exists between cyber security talents and potential employers.

Cultivating Coders

Cultivating Coders brings computer coding curriculum and hands-on training to rural, tribal, and inner-city areas where resources for technical training or computer science education are not currently available.

The program focuses on providing web application development fundamentals and coding education for high school students aged 13-18, young adults aged 18-29 and is designed to optimize graduates’ further educational opportunities and employability.

Cultivating Coders is on a mission to build a pipeline of talented coders poised to solve local problems and advance along career pathways. Our core expertise is providing rigorous technology training and workforce preparation services to under served communities. Incorporated in Albuquerque, New Mexico in 2015, we’re blazing trails from rural America to inner-city neighborhoods by taking computer science camps to young people in overlooked communities.

Anouk Vos

Anouk Vos is Chairman and Co-Founder of Cyberworkplace. She is also partner and Cybersecurity /Innovation lead at Revnext, a strategic consulting firm focusing on high-tech issues, offering cross-sectorial, thoroughly substantiated, and objective advice in the realm of cybersecurity.

Anouk has ten years of experience as a strategic cybersecurity advisor for (inter)national government bodies, multinationals, and NGOs. Amongst others, she has worked at the Ministry of Foreign Affairs, the National Cyber Security Centre, and as a cybersecurity lead of a strategic advisory office.

She won the Lof Spotlight prize for Female Leadership in 2015 and has been elected as one of the Inspiring Fifty in 2016 and 2017, the fifty most inspiring women in the technology sector. In 2017, she won the title of Business Woman of the Year in Rotterdam in the category of “Upcoming Talent.” In 2018, she was voted one of the 50 most influential women in cybersecurity by SC Magazine. In her work, she positions cybersecurity before the process rather than as an afterthought.

Charles Ashley III

Charles Ashley III is the Chief Executive Officer and Founder of Cultivating Coders,  a New Mexico-based company that provides technical training and curriculum in web and mobile application development to K-12 schools in tribal, rural, and overlooked urban areas that lack resources in coding and computer science education.

Prior to his current role, Charles was a Marketing & Strategy Consultant for several clients including  Harmonix Technologies, VARA Wines and DeVry  University. He previously served as Film Liaison & Marketing Manager for Bernalillo  County’s Economic Development Department in New Mexico and was Manager of Marketing for CNM’s STEMulus Center.

Charles  currently sits on the Learning Alliance board and has served on a variety of boards such as US Eagle Federal Credit Union, New Mexico AIDS Services,  Albuquerque Youth Basketball League Board, Mayor Berry’s Albuquerque Deep Dive Council for Arts & Culture, and Mayor Keller’s Education Transition Team.

Philip R. Zimmermann

Philip R. Zimmermann is the creator of Pretty Good Privacy, an email encryption software package. Originally designed as a human rights tool, PGP was published for free on the Internet in 1991. Despite the lack of funding, the lack of any paid staff, the lack of a company to stand behind it, and despite government persecution, PGP nonetheless became the most widely used email encryption software in the world.  In 2002 PGP was acquired from NAI by a new company called PGP Corporation, where Zimmermann served as special advisor and consultant until its acquisition by Symantec in 2010. Since 2004, his focus has been on secure telephony for the internet, developing the ZRTP protocol and creating products that use it, including Silent Phone and Zfone. Zimmermann is Co-founder of Silent Circle, a provider of secure communications services.

Zimmermann has received numerous technical and humanitarian awards for his pioneering work in cryptography. To name a few, in 2015 he received the US Privacy Champion Award from the Electronic Privacy Information Center, in 2014 he was inducted into the Cyber Security Hall of Fame, and Foreign Policy Magazine named him one of the Leading Global Thinkers of 2014, and in 2012 the Internet Society inducted him into the Internet Hall of Fame.

Zimmermann now teaches crypto at Delft University of Technology’s Faculty of Electrical Engineering, Mathematics and Computer Science, in the Netherlands.

Dr. Melanie Rieback

Dr. Melanie Rieback is the CEO/Co-founder of Radically Open Security, the world’s first non-profit computer security consultancy company. She is also a former Assistant Professor of Computer Science at VU who performed RFID security research (RFID Virus and RFID Guardian), that attracted worldwide press coverage, and won several awards (VU Mediakomeet, ISOC Award, NWO I/O award, IEEE Percom Best Paper, USENIX Lisa Best Paper).

Melanie worked as a Senior Engineering Manager on XenClient at Citrix, where she led their Vancouver office. She was also the head researcher in the CSIRT at ING Bank, where she spearheaded their Analysis Lab and the ING Core Threat Intelligence Project.

For fun, she co-founded the Dutch Girl Geek Dinner in 2008. Melanie was named 2010 ICT Professional of the Year (Finalist) by WomeninIT, one of the 400 most successful women in the Netherlands by Viva Magazine (Viva400) in 2010 and 2017, one of the fifty most inspiring women in tech (Inspiring Fifty Netherlands) in 2016 and 2017, and the Most Innovative IT Leader by CIO Magazine NL (TIM Award) in 2017. Her company, Radically Open Security, was also named the 50th Most Innovative SME by the Dutch Chamber of Commerce (MKB Innovative Top 100) in 2016.

The Seaport Police

The Seaport Police Rotterdam carry responsibility for the safety in the port of Rotterdam and on the port sites. The work of the seaport police focuses on nautical supervision, environmental enforcement, crime prevention, border surveillance and incident handling on the water.

The Seaport Police is working in close cooperation with the students at Cyberworkplace, where together they look at real criminal cases, the role cybersecurity has in the port of Rotterdam, different challenges on digital forensics, spoofing, and potential port-threatening cyberattacks.

Two very special members of the Seaport Police, Dirk-Jan Grootenboer and Peter Duin, will be taking the students on a patrol boat adventure in the Rotterdam harbor, Europe’s largest port.

Dirk-Jan Grootenboer works as a digital local police officer at the Seaport Police. Grootenboer aids in making the activity of the police transparent through social media and web care. Grootenboer sets up, maintains, and strengthens already existing digital networks.

Peter Duin has worked as a researcher for the police since 2004. He specializes in exploring cyberattacks, which is an area of growing importance, considering the increasing digitization within the port of Rotterdam. Duin’s work reflects his belief that everyone has the right to be protected from cyber-threats.

Oscar Koeroo

Oscar Koeroo is currently working at the Dutch telco KPN in the Chief Information Security Office’s Strategy & Policy team. Oscar is responsible for the KPN Security Policy on the subject of identity, applied cryptography, system security, and network security. He advises the business at the operational level and strategic level to prevent attacks on KPN itself, its customers, and society.

At KPN, he is responsible for the development of policies and advice on how to implement/apply cryptographic principals and usage in applications, network design, identity and access management, application security, web application security, and system hardening.

Floor Jansen

Floor Jansen is known for working on high-tech forms of cybercrime that are often committed by young, tech-savvy people on the dark side of the web. She is the co-founder of Hack_Right. Hack_Right is an alternative or additional penalty trajectory where young people aged 12 to 23 who are sentenced for the first time for a cybercrime can be eligible. The aim of Hack_Right is to prevent recidivism and further develop the cyber talent of young people within the framework of the law. Jansen is also a Strategic Advisor at the National High Tech Crime Unit of the Dutch police, and she started a NoMoreDDoS movement that is showing promising results.

Maarten van Duivenbode

Maarten van Duivenbode is the founder of Duivenbode ICT, an advice company (ZZP and MKB) in the IT field, focusing on cloud options, software choice, and hardware delivery.  Duivenbode is also an ICT supplier and installer of camera security. Private customers can also be served in the field of Wi-Fi optimization and camera security.  Duivenbode was also a co-founder of Adhesion Consultancy, a consultancy firm founded by 5 young entrepreneurs with the inspiration to support companies with their ongoing processes. Adhesion Consultancy adheres to the following four core values: independence, expertise, solution-orientation, and innovation.

“Thank you” to our partners

Programming with Java

Our students started programming with Java! Today we are having the first lesson of a four-week course. The focus is on encapsulation.

What is “encapsulation”?

Like the name suggests, encapsulation is the storing of data within a single unit. Imagine that this data exists within a pill capsule. The purpose of the capsule is to protect what is inside it (data) from outside code. Encapsulation is a way of hiding the data of a class from other classes.

Why Learn Java?

Java is one of the best programming languages to learn in terms of increasing your attractiveness to employers in the tech field. Java is also usually good for beginners because it is a statistically- typed language, which means that your code will be checked for errors, which is very useful for people just starting out. The community of people who know Java is also large, so there are a lot of resources on the subject if our students ever need extra help outside the classroom.

Sources: Encapsulation in JavaWhy Learn Java?

Launching the CyberHeroes Project!

A week in the Netherlands lies ahead this spring for a handful of Cultivating Coders graduates, thanks to an extraordinary collaborative effort between organizations and support from the U.S. Embassy there. Side-by-side with young programmers from the Netherlands, the visiting coders will take on hacker battles, work on CSI-type cyber challenges with local police, study the history of cryptography, and learn to fight cybercrime alongside international hackers. Sightseeing and touring in Rotterdam, and its surrounding areas, is also written into the program agenda, including a patrol boat adventure in the Rotterdam harbor, Europe’s largest port. 

In 2017, Anouk Vos, Chairman for Cyberworkplace, was invited to the United States to promote “ethical hacking” and her program to teach it: take young hackers and equip them with state-of-the-art coding skills-  that no traditional school provides-  then plug program graduates in with government agencies and private enterprises to boost those organizations’ cybersecurity.  

During that visit, Ms. Vos met Charles Ashley III, the President of Cultivating Coders, which is a mobile coding camp serving the United States. It offers eight-week intensive boot camp-style courses to high school aged students who typically don’t have access to this type of education because of limited resources or geographic isolation. From this initial meeting, a unique partnership was born; now, both programs are selecting students to attend the CyberHeroes event in Rotterdam. 

“I am beyond enthusiastic about this collaboration,” said Ms. Vos. “Ethical hacking skills are extremely important to cope with current security threats. I feel that by bringing our communities together we are starting a trailblazing 21st Century workforce.” 

According to Mr. Ashley, to call this opportunity ‘amazing’ would be an understatement. “Our goal has always been to expose young people to the endless possibilities one could experience in life. This trip is a great springboard to that for our graduates,” he said. 

Cultivating Coders brings computer coding curriculum and hands-on training to rural, tribal, and inner-city areas where resources for technical training or computer science education are not currently available. The program focuses on providing web application development fundamentals and coding education for high school students aged 13-18, young adults aged 18-29 and is designed to optimize graduates’ further educational opportunities and employability.

Making Cyberworkplace Smart and Hacking it!

Cyberworkplace is launching an exciting new project designed to test the security of smart devices that are becoming more and more ubiquitous in homes across the globe: Google Home/Alexa, smart light switches, alarm systems, motion sensors, and so on. These “smart” systems are typically linked to the internet and often interact with each other. These devices are often incredibly convenient and not to mention fashionable. Unfortunately, however, whether or not these devices are secure is often an afterthought.

Fibaro system smart devices

The project will be undertaken under the guidance of Maarten Van Duivenbode of Duivenbode ICT over the span of three weeks. Students will be installing various smart devices in the Cyberworkplace basement and then attempting to hack into them. The final results of the project will be presented on Friday February 8th. Although this project is fun and light-hearted on the surface, it has the intention of uncovering unfortunate truths about the potentially unsafe devices many of us are so eagerly introducing into our homes.

Press release in Dutch:

Jongeren van de Rotterdamse Cyberworkplace hacken een slim huis!

De hackers van de Cyberworkplace aan de Schiedamse Vest gaan de komende drie weken aan de slag  met een bijzonder project: hack een slim huis! In samenwerking met Maarten Van Duivenbode van Duivenbode ICT duiken ze in de wereld van slimme apparaten zoals thermostaten, slimme schakelaar, bewegingssensoren, alarmsystemen. Tal van aan het internet gekoppelde producten worden in een aantal dagen geïnstalleerd en aan elkaar verbonden. Waarom??? Om de beveiliging van deze veelgebruikte producten eens goed te testen.

Anouk Vos, voorzitter van de Cyberworkplace, vindt het een belangrijk experiment. “Men schat dat tegen 2020 ongeveer 75 miljard “dingen” online zijn. Onze jongeren bouwen in de Cyberworkplace met deze dingen het huis van de (nabije) toekomst om de Internet of Things ontwikkeling eens tegen het licht te houden. Is het mogelijk om slimme stopcontacten aan bewegingssensoren en slimme  keukengadgets te koppelen en te manipuleren? We zullen het zien!”

Het project begint op vrijdag 25 januari. Op vrijdag 8 februari wordt het eindresultaat getoond. De jongeren hebben er zin in. Projectmanager van de Cyberworkplace Nasya Handzhiyska heeft hoge verwachtingen: “We gaan een huishouden robotiseren om er vervolgens een 21e -eeuws spookhuis  van te maken. Toeters, bellen en heel veel enge hacks…can’t wait!”

Workshop on Crisis Management and OT Security

How do crisis management and business continuity relate to cybersecurity? Iowa Carels answered this question in her interactive lecture, where our students got to create their own crisis management exercises.

Business continuity focuses on preparatory planning with the aim of ensuring that the most important aspects of their business will continue to function in spite of a calamity. It also focuses on the recovery of a business, including its less important aspects, if a crisis were to occur.

Business crisis management encapsulates business continuity within it, but is much broader. Business crisis management starts before the process of business continuity and continues long after. It involves actions such as identifying risks and addressing them before they have the ability to turn into a crisis.

As cyberattacks on companies (such as DDoS attacks) are becoming increasingly common, all businesses must now be prepared to face a cybersecurity crisis if or, maybe better said, when it happens.

In the afternoon, Ilya Tillekens from Hudson Cybertec gave another lecture on OT Security, presenting very interesting real-life examples.

OT stands for “Operational Technology”, and is distinct from IT, or “Informational Technology”. OT monitors and controls the functioning of real-world, physical devices. OT is often used to regulate industrial systems. Traditionally, OT systems are not connected to internet networks, which is predominately what makes them distinct from IT systems. Now, however, with an increasing number of devices becoming “smart”, a convergence between IT/OT devices is rapidly occurring. For instance, coffee-makers used to consist strictly OT technology, but now that they are being connected to the internet, so they can be operated from a remote distance via someone’s cellphone, this represents OT/IT convergence.

OT security systems play a role in ensuring that critical infrastructure such as power stations, dams, and public transport function. Thus, making sure they are safe from tampering is essential.

Sources: Business Continuity Trends Versus Crisis ManagementWhat is OT Security?