{"componentChunkName":"component---src-templates-post-js","path":"/blog/living-our-mission-blog-series-cyber-security-teaching-the-perfect-match-for-developing-cyber-curriculum-in-project-ares-for-circadences-megan-daudelin/","result":{"data":{"wordpressPost":{"title":"Living Our Mission Blog Series: Cyber Security + Teaching = the Perfect Match for Developing Cyber Curriculum in Project Ares for Circadence’s Megan Daudelin ","content":"<p><span data-contrast=\"auto\">Ever wondered about the people behind Project Ares’ development? How does Circadence identify and develop learning curriculum material to benefit today’s cyber professionals? The crux of the strategy stems from the talents within our own Circadence family and is the driving force behind </span><span data-contrast=\"auto\">this “</span><span data-contrast=\"auto\">Living our Mission” article. We are sharing the unique talents of </span><b><span data-contrast=\"auto\">Megan </span></b><b><span data-contrast=\"auto\">Daudelin</span></b><b><span data-contrast=\"auto\">, Team Lead of Curriculum Development</span></b><span data-contrast=\"auto\"> for our flagship gamified learning platform</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> Project Ares. While one </span><span data-contrast=\"auto\">might</span><span data-contrast=\"auto\"> expect </span><span data-contrast=\"auto\">that </span><span data-contrast=\"auto\">a cyber background is critical to any tech-focused role</span><span data-contrast=\"auto\"> in a security compan</span><span data-contrast=\"auto\">y</span><span data-contrast=\"auto\">, Megan </span><span data-contrast=\"auto\">would </span><span data-contrast=\"auto\">argue that having a strong understanding of learning theories, experience teaching cyber subjects, and placing oneself in the customer’s shoes equally weigh in importance to successfully build</span><span data-contrast=\"auto\"> rich cyber</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">curriculum</span><span data-contrast=\"auto\"> into our products. </span><span data-ccp-props=\"{}\"> </span></p>\n<h2><span data-ccp-props=\"{}\"> </span><span data-contrast=\"none\">Blending Forensics, Hospital Security, and Cyber Education  </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">Megan has a rich history in </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">cyber security</span><span data-contrast=\"auto\"> industry</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">which started after </span><span data-contrast=\"auto\">she </span><span data-contrast=\"auto\">graduat</span><span data-contrast=\"auto\">ed</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">w</span><span data-contrast=\"auto\">ith her bachelor’s </span><span data-contrast=\"auto\">degree, </span><span data-contrast=\"auto\">and continued as she worked full time while completing her Master’s </span><span data-contrast=\"auto\">in Digital Forensics Management </span><span data-contrast=\"auto\">from Champlain College</span><span data-contrast=\"auto\">. </span><span data-contrast=\"auto\">Prior to Circadence, she</span><span data-contrast=\"auto\"> served as a Digital Forensic Analyst at ManTech </span><span data-contrast=\"auto\">and Information Security Content Analyst at Tenable Network Security.</span><span data-contrast=\"auto\"> She </span><span data-contrast=\"auto\">also</span><span data-contrast=\"auto\"> worked as a Network Security Analyst at New London Hospital</span><span data-contrast=\"auto\"> between her stints at ManTech and Tenable</span><span data-contrast=\"auto\">, monitoring networks and medical devices in accordance with HIPPA</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> Those experiences helped her learn the importance of understanding an end-user’s behavior to identify and investigate digital evidence. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Her career as a digital forensic analyst revolved around gathering and </span><span data-contrast=\"auto\">interpreting </span><span data-contrast=\"auto\">data. She recalls </span><span data-contrast=\"auto\">a previous job</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">where she was responsible for writing up a narrative around a customer by referencing only the information available in a customer’s device. She would get a sense of the day-to-day digital life </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">user</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">le</span><span data-contrast=\"auto\">d to understand who</span><span data-contrast=\"auto\"> and how</span><span data-contrast=\"auto\"> that person was using the technology. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“That’s the part I liked, taking a vast amount of information and drawing the lines</span></i><i><span data-contrast=\"none\"> t</span></i><i><span data-contrast=\"none\">hrough the ‘dust cloud’ of data</span></i><i><span data-contrast=\"none\"> to </span></i><i><span data-contrast=\"none\">figure out the connections between everything and turn the ‘cloud’ into a digestible amount of information.</span></i><i><span data-contrast=\"none\">”</span></i><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">As Megan</span><span data-contrast=\"auto\"> embraced </span><span data-contrast=\"auto\">new skill</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">acquisition</span><span data-contrast=\"auto\"> on the job, she</span><span data-contrast=\"auto\"> grew to appreciate how problem-solving played a critical role in managing threats</span><span data-contrast=\"auto\"> for her employers and their customers.</span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-contrast=\"auto\">It was her passion for identify</span><span data-contrast=\"auto\">ing</span><span data-contrast=\"auto\"> the tools and techniques t</span><span data-contrast=\"auto\">hat best helped </span><span data-contrast=\"auto\">harden </span><span data-contrast=\"auto\">security </span><span data-contrast=\"auto\">posture </span><span data-contrast=\"auto\">that</span><span data-contrast=\"auto\"> led her back to the classroom</span><span data-contrast=\"auto\"> as an Adjunct Professor at her a</span><span data-contrast=\"auto\">lma mater</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Champlain College, to help groom </span><span data-contrast=\"auto\">the next generation of cyber professionals</span><span data-contrast=\"auto\">.</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">Her professional experience </span><span data-contrast=\"auto\">across </span><span data-contrast=\"auto\">multiple disciplines in cyber</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> from digital forensics to network security to ethical hacking and incident response</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> allow</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> her to teach courses on </span><span data-contrast=\"auto\">a variety of cybersecurity disciplines</span><span data-contrast=\"auto\">—a job she still does today. </span><span data-ccp-props=\"{}\"> </span></p>\n<h2><span data-ccp-props=\"{}\"> </span><span data-contrast=\"none\">Using Teaching to Inform Cyber Learning in Project Ares</span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">Over the last two years, Megan has taken her love for teaching and applied it directly to the innovation within Project Ares. She </span><span data-contrast=\"auto\">is able to</span><span data-contrast=\"auto\"> see how her students learn best</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">whether through direct</span><span data-contrast=\"auto\">,</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">hands-on</span><span data-contrast=\"auto\"> </span><span data-contrast=\"auto\">experiences </span><span data-contrast=\"auto\">or</span><span data-contrast=\"auto\"> learning from peers</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">and she applies those observations </span><span data-contrast=\"auto\">within a customer’s experience in the platform. All of this comes with the understanding that she must remember not to get “too deep” into one thought pattern, to maintain the “</span><span data-contrast=\"auto\">10,000 foot</span><span data-contrast=\"auto\"> view” as she puts it, so that she can build cyber learning curriculum that is cross-disciplinary and cross-functional. </span><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><span data-contrast=\"auto\">Megan put her cyber and teaching skills to the ultimate test at the </span><a href=\"https://vimeo.com/370416459\"><span data-contrast=\"none\">Microsoft Ignite “Into the Breach”</span></a><span data-contrast=\"auto\"> cyber defense experience in November 2019. </span><span data-contrast=\"auto\">She helped design </span><span data-contrast=\"auto\">six </span><span data-contrast=\"auto\">custom-built Battle Rooms in Project Ares </span><span data-contrast=\"auto\">that </span><span data-contrast=\"auto\">were </span><span data-contrast=\"auto\">used</span><span data-contrast=\"auto\"> in a competition-style </span><span data-contrast=\"auto\">activity </span><span data-contrast=\"auto\">among event registrants</span><span data-contrast=\"auto\">.  The battle rooms provided a </span><span data-contrast=\"auto\">gamified learning </span><span data-contrast=\"auto\">approach to</span><span data-contrast=\"auto\"> teach cyber professionals about Microsoft Security Tools.</span><span data-contrast=\"auto\"> Megan </span><span data-contrast=\"auto\">used </span><span data-contrast=\"auto\">the </span><span data-contrast=\"auto\">Project Ares </span><span data-contrast=\"auto\">virtual environments to </span><span data-contrast=\"auto\">create </span><span data-contrast=\"auto\">a </span><span data-contrast=\"auto\">hands-on, </span><span data-contrast=\"auto\">experiential</span><span data-contrast=\"auto\"> learning </span><span data-contrast=\"auto\">activity</span><span data-contrast=\"auto\"> that focused on problem-solving using Microsoft tools. </span><span data-contrast=\"auto\">By </span><span data-contrast=\"auto\">adopting the end-user’s perspective</span><span data-contrast=\"auto\">, </span><span data-contrast=\"auto\">she </span><span data-contrast=\"auto\">was able to </span><span data-contrast=\"auto\">help</span><span data-contrast=\"auto\"> the player</span><span data-contrast=\"auto\">s</span><span data-contrast=\"auto\"> through the maze from the home page of the Project Ares interface down to the data they were looking for</span><span data-contrast=\"auto\"> to </span><span data-contrast=\"auto\">find the answers they needed.</span><span data-contrast=\"auto\"> </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><i><span data-contrast=\"none\">“It was quite the adventure learning all these </span></i><i><span data-contrast=\"none\">new security solutions </span></i><i><span data-contrast=\"none\">and </span></i><i><span data-contrast=\"none\">organizing them into </span></i><i><span data-contrast=\"none\">a cohesive storyline</span></i><i><span data-contrast=\"none\">. </span></i><i><span data-contrast=\"none\">We weren’t</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">asking </span></i><i><span data-contrast=\"none\">independent </span></i><i><span data-contrast=\"none\">questions</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">to teach TTPs in a silo</span></i><i><span data-contrast=\"none\">. I</span></i><i><span data-contrast=\"none\">nstead, we were walking </span></i><i><span data-contrast=\"none\">the players</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">through a single attack pattern. The narrative</span></i><i><span data-contrast=\"none\"> was knit together </span></i><i><span data-contrast=\"none\">so that they </span></i><i><span data-contrast=\"none\">could </span></i><i><span data-contrast=\"none\">underst</span></i><i><span data-contrast=\"none\">an</span></i><i><span data-contrast=\"none\">d </span></i><i><span data-contrast=\"none\">that </span></i><i><span data-contrast=\"none\">the tasks</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">in the Battle Rooms were </span></i><i><span data-contrast=\"none\">related to </span></i><i><span data-contrast=\"none\">the progressive arc of a </span></i><i><span data-contrast=\"none\">full-scope </span></i><i><span data-contrast=\"none\">attack and there were different points</span></i><i><span data-contrast=\"none\"> along the kill chain where the Microsoft tools could help to identify, </span></i><i><span data-contrast=\"none\">analyze, and respond</span></i><i><span data-contrast=\"none\">.” </span></i></p></blockquote>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Looking ahead… </span><span data-ccp-props=\"{&quot;335559738&quot;:40}\"> </span></h2>\n<p><span data-contrast=\"auto\">As </span><span data-contrast=\"auto\">Megan </span><span data-contrast=\"auto\">works hard </span><span data-contrast=\"auto\">to build learning</span><span data-contrast=\"auto\"> curriculum</span><span data-contrast=\"auto\"> into Project Ares, she can’t help but think about what lies ahead for the cyber security industry. </span><span data-ccp-props=\"{}\"> </span></p>\n<blockquote><p><span data-ccp-props=\"{}\"> </span><i><span data-contrast=\"none\">“I hope the prioritization of training and education continues to increase; I hope the prioritization of security as a pillar of someone’s organization continues to get recognition. I think we’re coming out of a phase where organizations felt that </span></i><i><span data-contrast=\"none\">they</span></i><i><span data-contrast=\"none\"> </span></i><i><span data-contrast=\"none\">could just ignore the elephant that’s stomping around their data center. </span></i><span data-ccp-props=\"{}\"> </span></p>\n<p><span data-ccp-props=\"{}\"> </span><i><span data-contrast=\"none\">I’m hopeful we’re moving into </span></i><i><span data-contrast=\"none\">a</span></i><i><span data-contrast=\"none\"> time </span></i><i><span data-contrast=\"none\">that people are b</span></i><i><span data-contrast=\"none\">ecoming</span></i><i><span data-contrast=\"none\"> more aware of their</span></i><i><span data-contrast=\"none\"> organization’s </span></i><i><span data-contrast=\"none\">digital activity online</span></i><i><span data-contrast=\"none\">….</span></i><i><span data-contrast=\"none\"> not just</span></i><i><span data-contrast=\"none\"> in a check-the-box </span></i><i><span data-contrast=\"none\">periodic program kind of way</span></i><i><span data-contrast=\"none\">, but </span></i><i><span data-contrast=\"none\">in the sense </span></i><i><span data-contrast=\"none\">that cyber security readiness and training</span></i><i><span data-contrast=\"none\"> has ongoing </span></i><i><span data-contrast=\"none\">funding and </span></i><i><span data-contrast=\"none\">cross-function </span></i><i><span data-contrast=\"none\">collaboration</span></i><i><span data-contrast=\"none\">. </span></i><i><span data-contrast=\"none\">The industry is moving toward recognition that this is where priorities lie.” </span></i><span data-ccp-props=\"{}\"> </span></p></blockquote>\n<p><span data-contrast=\"auto\">It is t</span><span data-contrast=\"auto\">his kind </span><span data-contrast=\"auto\">of</span><span data-contrast=\"auto\"> forward</span><span data-contrast=\"auto\">-thinking </span><span data-contrast=\"auto\">mindset </span><span data-contrast=\"auto\">in employees </span><span data-contrast=\"auto\">that helps Circadence deliver state-of-the-art products and we are incredibly proud to have Megan within the Circadence family! </span><span data-ccp-props=\"{}\"> </span></p>\n"},"site":{"siteMetadata":{"title":"Circadence","description":"Build cyber skills hands-on with Project Ares cyber range platform."}}},"pageContext":{"id":"15b453aa-a42b-57eb-a42b-d6b0b6e6a7c1","featured_img":"https://staging.circadence.com/wp-content/uploads/2019/12/joshua-sortino-LqKhnDzSF-8-unsplash.jpg"}}}