{"id":533,"date":"2021-10-06T14:21:40","date_gmt":"2021-10-06T20:21:40","guid":{"rendered":"https:\/\/www.boisestate.edu\/cybersecurity\/?p=533"},"modified":"2023-08-29T10:48:25","modified_gmt":"2023-08-29T16:48:25","slug":"the-cyberdome-initiative","status":"publish","type":"post","link":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/","title":{"rendered":"The Cyberdome Initiative"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The Cyberdome: a collaborative hub for\u00a0\u00a0<\/span><span style=\"font-weight: 400\">competency-based\u00a0 training,\u00a0 with\u00a0 the\u00a0\u00a0<\/span><span style=\"font-weight: 400\">mission of reducing risk and producing\u00a0\u00a0<\/span><span style=\"font-weight: 400\">a cybersecurity workforce, in sync with\u00a0\u00a0<\/span><span style=\"font-weight: 400\">Idaho\u2019s\u00a0 business,\u00a0 technology\u00a0 and\u00a0\u00a0<\/span><span style=\"font-weight: 400\">government sectors.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Building\u00a0 a\u00a0 holistic\u00a0 environment\u00a0 for\u00a0\u00a0<\/span><span style=\"font-weight: 400\">competency-based\u00a0 learning\u00a0 in\u00a0\u00a0<\/span><span style=\"font-weight: 400\">cybersecurity\u00a0 is\u00a0 the\u00a0 ground\u00a0 floor\u00a0 in\u00a0\u00a0<\/span><span style=\"font-weight: 400\">workforce\u00a0 development\u00a0 efforts and\u00a0\u00a0<\/span><span style=\"font-weight: 400\">leads\u00a0 to\u00a0 tool\u00a0 innovation\u00a0 and\u00a0 research\u00a0\u00a0<\/span><span style=\"font-weight: 400\">opportunities. By coupling these with a\u00a0\u00a0<\/span><span style=\"font-weight: 400\">cybersecurity service base for state organizations, we cut cost and time to implement, provide force-multiplying staff,\u00a0 and\u00a0 create\u00a0 a\u00a0 scalable\u00a0 operational\u00a0 model\u00a0 upon\u00a0 which\u00a0 new\u00a0 service\u00a0 methods\u00a0 and\u00a0 tools\u00a0 can\u00a0 be\u00a0 built\u00a0 over\u00a0 time.\u00a0 By\u00a0 leveraging public cloud providers, we achieve scale and elasticity without increasing capital costs. Further, a cloud\u00a0 provider enables the goal that all Idaho universities and colleges can participate, collectively, to the betterment of the\u00a0 whole state. This will be achieved by having regional training Security Operation Centers (SOCs) with the Cyberdome\u00a0 as the coordinating \/ advanced SOC. This model builds resiliency and also enables more pathways for learners.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Ultimately\u00a0 the\u00a0 Cyberdome\u00a0 meets\u00a0 all\u00a0 requested\u00a0 elements\u00a0 of\u00a0 the\u00a0 published\u00a0 IGEM-HERC\u00a0 intent\u00a0 &amp;\u00a0 purpose,\u00a0 \u201c<\/span><strong>development of expertise, products, and services which result in state economic growth.\u201d <\/strong><span style=\"font-weight: 400\">\u2022 <\/span><span style=\"font-weight: 400\">Expertise developed through enabling our Idaho students with real-world competency; <\/span><span style=\"font-weight: 400\">\u2022 <\/span><span style=\"font-weight: 400\">Products developed through commercialization of new methods (e.g., AI\/ML, Training, etc), tools, and\u00a0 techniques; and\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">Services delivered to SLTT clients in order to reduce risk.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The sum of these elements leads to strong workforce development, resulting in strong jobs and economic\u00a0 development \/ advancement for the state.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyberdome: a collaborative hub for\u00a0\u00a0competency-based\u00a0 training,\u00a0 with\u00a0 the\u00a0\u00a0mission of reducing risk and producing\u00a0\u00a0a cybersecurity&#8230;<\/p>\n","protected":false},"author":435,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[270,257],"tags":[],"class_list":["post-533","post","type-post","status-publish","format-standard","hentry","category-cyberdome","category-cybernews"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Cyberdome Initiative - Institute for Pervasive Cybersecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cyberdome Initiative - Institute for Pervasive Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The Cyberdome: a collaborative hub for\u00a0\u00a0competency-based\u00a0 training,\u00a0 with\u00a0 the\u00a0\u00a0mission of reducing risk and producing\u00a0\u00a0a cybersecurity...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\" \/>\n<meta property=\"og:site_name\" content=\"Institute for Pervasive Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T20:21:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-29T16:48:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.boisestate.edu\/cybersecurity\/wp-content\/themes\/core\/img\/theme\/branding-assets\/social-share.jpg\" \/>\n<meta name=\"author\" content=\"AWS-WP-AdminView\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"AWS-WP-AdminView\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\"},\"author\":{\"name\":\"AWS-WP-AdminView\",\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337\"},\"headline\":\"The Cyberdome Initiative\",\"datePublished\":\"2021-10-06T20:21:40+00:00\",\"dateModified\":\"2023-08-29T16:48:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\"},\"wordCount\":248,\"articleSection\":[\"Cyberdome\",\"CyberNews\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\",\"url\":\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\",\"name\":\"The Cyberdome Initiative - Institute for Pervasive Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/#website\"},\"datePublished\":\"2021-10-06T20:21:40+00:00\",\"dateModified\":\"2023-08-29T16:48:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/#website\",\"url\":\"https:\/\/www.boisestate.edu\/cybersecurity\/\",\"name\":\"Institute for Pervasive Cybersecurity\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.boisestate.edu\/cybersecurity\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337\",\"name\":\"AWS-WP-AdminView\",\"url\":\"https:\/\/www.boisestate.edu\/cybersecurity\/author\/aws-wp-adminview\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Cyberdome Initiative - Institute for Pervasive Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/","og_locale":"en_US","og_type":"article","og_title":"The Cyberdome Initiative - Institute for Pervasive Cybersecurity","og_description":"The Cyberdome: a collaborative hub for\u00a0\u00a0competency-based\u00a0 training,\u00a0 with\u00a0 the\u00a0\u00a0mission of reducing risk and producing\u00a0\u00a0a cybersecurity...","og_url":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/","og_site_name":"Institute for Pervasive Cybersecurity","article_published_time":"2021-10-06T20:21:40+00:00","article_modified_time":"2023-08-29T16:48:25+00:00","og_image":[{"url":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-content\/themes\/core\/img\/theme\/branding-assets\/social-share.jpg","type":"","width":"","height":""}],"author":"AWS-WP-AdminView","twitter_card":"summary_large_image","twitter_misc":{"Written by":"AWS-WP-AdminView","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/#article","isPartOf":{"@id":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/"},"author":{"name":"AWS-WP-AdminView","@id":"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337"},"headline":"The Cyberdome Initiative","datePublished":"2021-10-06T20:21:40+00:00","dateModified":"2023-08-29T16:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/"},"wordCount":248,"articleSection":["Cyberdome","CyberNews"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/","url":"https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/","name":"The Cyberdome Initiative - Institute for Pervasive Cybersecurity","isPartOf":{"@id":"https:\/\/www.boisestate.edu\/cybersecurity\/#website"},"datePublished":"2021-10-06T20:21:40+00:00","dateModified":"2023-08-29T16:48:25+00:00","author":{"@id":"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.boisestate.edu\/cybersecurity\/2021\/10\/06\/the-cyberdome-initiative\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.boisestate.edu\/cybersecurity\/#website","url":"https:\/\/www.boisestate.edu\/cybersecurity\/","name":"Institute for Pervasive Cybersecurity","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.boisestate.edu\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.boisestate.edu\/cybersecurity\/#\/schema\/person\/d031c768464b746671d6c7578cb57337","name":"AWS-WP-AdminView","url":"https:\/\/www.boisestate.edu\/cybersecurity\/author\/aws-wp-adminview\/"}]}},"featured_image_url":"","author_name":"AWS-WP-AdminView","cats":["Cyberdome","CyberNews"],"featured_caption":"","_links":{"self":[{"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/posts\/533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/435"}],"replies":[{"embeddable":true,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=533"}],"version-history":[{"count":6,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/posts\/533\/revisions"}],"predecessor-version":[{"id":1394,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/posts\/533\/revisions\/1394"}],"wp:attachment":[{"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/categories?post=533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.boisestate.edu\/cybersecurity\/wp-json\/wp\/v2\/tags?post=533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}