Cybersecurity https://seor.sitemasonry.gmu.edu/ en Mason Engineering BS in cyber security engineering earns ABET accreditation https://seor.sitemasonry.gmu.edu/news/2021-01/mason-engineering-bs-cyber-security-engineering-earns-abet-accreditation <span>Mason Engineering BS in cyber security engineering earns ABET accreditation</span> <span><span>Anonymous (not verified)</span></span> <span>Tue, 01/19/2021 - 09:45</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Mason Engineering’s bachelor’s degree program in <a href="https://volgenau.gmu.edu/expertise/cybersecurity">cyber security engineering</a> has been <a href="https://volgenau.gmu.edu/academics/accreditation">accredited</a> by the Engineering Accreditation Commission of ABET, the global accreditor of college and university programs in applied and natural science, computing, engineering, and engineering technology.   </p> <p>ABET accreditation assures that programs meet standards to produce graduates ready to enter critical technical fields that are leading the way in innovation and emerging technologies and anticipating the welfare and safety needs of the public. </p> <p>“ABET accreditation is important to all engineering programs. The BS in cyber security engineering being the first ABET-accredited cyber security engineering program, and the first accredited with the new cyber security program criteria, is an important achievement for the new Volgenau Department of Cyber Security Engineering, but it is only the beginning,” says Peggy Brouse, professor and associate chair for the department. “The department is launching the new MS CYSE degree this spring semester. In addition, we are in a great position to extend research that we already have with the National Security Agency and the Department of Homeland Security. We are excited for the future.” </p> <p>Students pursuing a BS in cybersecurity engineering learn from distinguished faculty in the classroom and gain hands-on experience through projects and a year-long senior design capstone where faculty, students, and even alumni come together to tackle real-world problems.  </p> <p>Alumnus turned senior design capstone advisor Matthew Wilkes, BS cyber security engineering ’18, says of the students he has mentored, “I want to ensure they’re encouraged to be successful in both their project and beyond. I won’t make it easy for them because if it was easy every student could do it.” Wilkes was among the first students to graduate from the program.  </p> <p>“Any student who graduates from Mason with a degree in cyber security engineering has very high expectations,” says Wilkes.  </p> <p>Students praise the program and the opportunities that Mason offers. “Mason’s cybersecurity program has helped me build a solid base of practice and theory to fuel extracurricular study,” says cyber security engineering student Zaine Wilson. “Professors Tom Winston, Jim Jones, Mohamed Gebril, and all the other professors in the department, you won't find a group of more caring, inspiring, and wise mentors anywhere else.” </p> <p>ABET’s voluntary peer-review process is highly respected because it adds critical value to academic programs in the technical disciplines, where quality, precision, and safety are of the utmost importance. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/511" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/81" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/571" hreflang="en">Accreditation</a></div> <div class="field__item"><a href="/taxonomy/term/951" hreflang="en">Department of Cyber Security Engineering</a></div> </div> </div> </div> </div> </div> Tue, 19 Jan 2021 14:45:18 +0000 Anonymous 1371 at https://seor.sitemasonry.gmu.edu Mason to lead regional hub for national cybersecurity advanced manufacturing innovation partnership https://seor.sitemasonry.gmu.edu/news/2020-11/mason-lead-regional-hub-national-cybersecurity-advanced-manufacturing-innovation <span>Mason to lead regional hub for national cybersecurity advanced manufacturing innovation partnership</span> <span><span>Melanie Balog</span></span> <span>Fri, 11/20/2020 - 05:05</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="e1c6789c-af71-4730-a020-c0d78fc2b7bc" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>George Mason University is poised to be named a managing member in the <a href="https://cymanii.com/">Cybersecurity Manufacturing Innovation Institute</a> (CyManII), a $111 million public-private partnership led by the University of Texas at San Antonio. CyManII will have a five-year corporative agreement with the U.S. Department of Energy to lead a consortium of 59 proposed member institutions in introducing a cybersecure energy-ROI that drives American manufacturers and supply chains.</p> <p>“CyManII represents a great step forward for U.S. and Virginia’s leadership in cybersecurity and advanced manufacturing,” says <a href="https://volgenau.gmu.edu/">Volgenau School of Engineering</a> Dean Ken Ball. “Mason’s well-recognized strength in cybersecurity research and its offering one of the largest cybersecurity engineering academic programs in the nation position it incredibly well to support CyManII’s ambitious five-year goals.”</p> <p>As part of its national strategy, CyManII will focus on four high priority areas where collaborative research and development can help U.S. manufacturers: securing automation, securing the supply chain network, improving energy efficiency, and building a national program for education and workforce development. CyManII’s research objectives will focus on understanding the evolving cybersecurity threats to manufacturing industries, developing new cybersecurity and energy-conserving technologies and methods, and sharing information and knowledge with the broader community of U.S. manufacturers.</p> <p>Mason anticipates managing and operating CyManII’s East Coast headquarters on its Arlington Campus. The headquarters will house CyManII’s primary offices, meeting space, and training facilities in the National Capital Region.</p> <p>It will contain lab space and equipment to demonstrate, test, and validate CyManII’s emerging cybersecurity and advanced manufacturing technologies and products. The 13,000-square-foot facility will support robotic platforms to evaluate security vulnerabilities, especially the impact of 5G on autonomous vehicles, the power grid, and smart manufacturing.  The space will also host a robotic smart manufacturing testbed.</p> <p>Mason researchers from the Volgenau School of Engineering will play key roles in CyManII’s first-year projects, including finding ways to protect manufacturing supply chains from cyber threats and designing better security into advanced manufacturing plants.</p> <p>“CyManII is another step forward in Mason’s rapidly expanding leadership in the National Capital Region,” said Interim Vice President for Research, Innovation, and Economic Impact Aurali Dade. “We expect to leverage our many partnerships with the area’s technology leaders to grow advanced manufacturing here.”</p> <p>CyManII is funded by the <a href="https://www.energy.gov/eere/office-energy-efficiency-renewable-energy" target="_blank">Office of Energy Efficiency and Renewable Energy</a>’s <a href="https://www.energy.gov/eere/amo/advanced-manufacturing-office" target="_blank">Advanced Manufacturing Office (AMO)</a> and co-managed with the <a href="https://www.energy.gov/ceser/office-cybersecurity-energy-security-and-emergency-response" target="_blank">Office of Cybersecurity, Energy Security, and Emergency Response (CESER)</a>.</p> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="6bb0031d-2fe5-4990-8547-5e0805eb9f81" class="block block-layout-builder block-inline-blockbasic"> </div> </div> </div> Fri, 20 Nov 2020 10:05:05 +0000 Melanie Balog 1226 at https://seor.sitemasonry.gmu.edu Commonwealth Cyber Initiative (CCI) NoVA Node announces call for proposals https://seor.sitemasonry.gmu.edu/news/2020-04/commonwealth-cyber-initiative-cci-nova-node-announces-call-proposals <span>Commonwealth Cyber Initiative (CCI) NoVA Node announces call for proposals </span> <span><span>4429684e-ae8d-…</span></span> <span>Mon, 04/06/2020 - 09:23</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="2851a669-5ade-4f4f-9e96-43bd783e95db"> <div class="cta"> <a class="cta__link" href="https://volgenau.gmu.edu/expertise/cyber-security/cybersecurity-news"> <h4 class="cta__title">Read About Cybersecurity News <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="158ce92b-daa5-457c-b5df-f3ed0b682ad5" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/liza cropped.jpg" alt="Liza Wilson Durant, executive director of the NoVA Node" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Professor Liza Wilson Durant is the NoVa Node's executive director. (photo by Creative Services)</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="60946750-bdc5-46b6-af69-7572661458a1" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The CCI NoVA Node announces a call for proposals for the <strong>Cyber Advanced Translational Research Development Grant (CATRDG)</strong> competition. The competition will enhance Virginia’s cyber innovation economy by providing funding to qualified teams. Participating teams must focus on the commercialization of a cybersecurity technology or process. Team proposals must be submitted by May 15.</p> <p>The CATRDG program defines cybersecurity technology or process broadly and includes technologies and processes designed to protect the following, but not limited to­—networks, devices, software, IoT, cyber-physical systems, unmanned vehicles or systems, cyber resilience, autonomous cyber defense, configuration security, vulnerability analysis, manufacturing processes, power grid, infrastructure, programs, and data from cyber mediated attack, damage, or unauthorized access.</p> <p>“NoVA Node partners are committed to working together to accelerate the translation of academic cybersecurity innovations to the marketplace through the development, management, and marketing of intellectual property (IP); incubation support provided to small businesses; and the provision of entrepreneurship training to faculty and students,” says <a href="https://volgenau.gmu.edu/profile/view/6183">Liza Wilson Durant</a>, executive director of the CCI NoVa Node. “The fund is an essential tool in the node’s innovation toolbox.”</p> <p>The grants will help innovation teams pay for key materials and supplies, as well as the personnel and activities that are necessary to test products and gather initial market feedback critical to participating in accelerators or obtaining seed or angel funding.</p> <p>The NoVa Node will select three or four competitive proposals for funding at levels up to $50,000 for 12 months. Teams must provide a one-to-one match for a budget of up to $100,000. These matching resources may include equipment, personnel time, indirect from university faculty related effort, or monies from other sources but may not be matched with Commonwealth resources.</p> <p>To be eligible for support, proposing teams must include at least one investigator from one or more of the public institutions of higher education participating in the NoVA Node. Teams may be led by a principal investigator from a small business or a NoVA Node academic partner institution. The NoVa Node encourages teams to leverage student participation. Small businesses can either contact faculty members directly or seek assistance to connect with faculty by emailing ott@gmu.edu.</p> </div> </div> </div> </div> Mon, 06 Apr 2020 13:23:40 +0000 4429684e-ae8d-405e-870a-3b7aefe68162 (Martha Bushong) 371 at https://seor.sitemasonry.gmu.edu Mason ranked No. 1 nationally in Cybersecurity Talent Discovery https://seor.sitemasonry.gmu.edu/news/2019-07/mason-ranked-no-1-nationally-cybersecurity-talent-discovery <span>Mason ranked No. 1 nationally in Cybersecurity Talent Discovery</span> <span><span>Melanie Balog</span></span> <span>Mon, 07/08/2019 - 14:42</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><span class="intro-text">George Mason University has been recognized as a Cyber FastTrack National “Top Tier College” that is the best in the nation in Cybersecurity Talent Discovery.</span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq251/files/styles/small_content_image/public/2024-09/cyberphoto2getty.jpg?itok=CB5qaGUC" width="342" height="228" alt="hands type on a laptop keyboard with symbols wifi, internet incryption, padlock superimosed as graphics" loading="lazy" /></div> </div> <figcaption>Getty Images</figcaption></figure><p>Mason recently topped a nationwide Cyber FastTrack field of 5,200 U.S. colleges for the honor, with a contest-best 312 students discovering their aptitude for cybersecurity careers through a competition sponsored by the SANS Technology Institute. Cyber FastTrack is a free online program for college students and graduates that was designed by world leaders in cybersecurity and backed by Virginia Gov. Ralph Northam and 24 other U.S. governors in the hopes of closing the nation’s cyber skills gap with China and Russia.</p> <p>Southern Arkansas University’s Main Campus, Austin Peay State University, Michigan State University and Old Dominion University rounded out the top five finishers.</p> <p>“It is an honor for our university to receive this notice,” said <a href="https://volgenau.gmu.edu/profile/view/4783">Peggy S. Brouse</a>, a professor within Mason’s <a href="https://volgenau.gmu.edu/">Volgenau School of Engineering</a> and the director of the nation’s first <a href="https://volgenau.gmu.edu/program/view/20490">Bachelor of Science Cyber Security Engineering program</a>. “We have worked very hard in VSE to have superior programs and research in cybersecurity.”</p> <p>Mason’s Bachelor of Science Cyber Security Engineering program launched in spring 2015, with 28 students graduating three years later. The program has since expanded to nearly 400 students, Brouse said.</p> <p>“The leadership shown by George Mason University is commendable,” said Alan Paller, director of research at the SANS Institute. “Without the talent being discovered in Cyber FastTrack, shortages of elite talent will put the United States at a severe disadvantage in protecting power systems, financial systems and military systems in times of conflict and protecting businesses and personal privacy in peace time. George Mason University has set a high bar for other schools in Virginia and in the nation.”</p> <p>Students from all disciplines are encouraged to enroll in the Cyber FastTrack program. Through the program’s online challenges, quizzes, exams and tutorials, students learn disciplines such as forensics, intrusion detection, security operations, system and network penetration testing and application penetration testing.</p> <p>The highest performing students were awarded Cyber Honors Academy Scholarships for free training at the SANS Institute. Another 200 well-performing students each received $500 in scholarships toward college tuition.</p> <p>Plans are already underway at Mason to add a Master of Science in Cyber Security Engineering component to enhance the undergraduate program.</p> <p>“Because of the importance of cybersecurity in our country,” Brouse said, “I don’t see any limit to the popularity and expansion of the program.”</p> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="281edaca-cf17-464a-bc0d-ed720cc13100" class="block block-layout-builder block-inline-blockbasic"> </div> </div> </div> Mon, 08 Jul 2019 18:42:54 +0000 Melanie Balog 626 at https://seor.sitemasonry.gmu.edu Mason ranks 11th  nationally in cybersecurity education https://seor.sitemasonry.gmu.edu/news/2019-02/mason-ranks-11th-nationally-cybersecurity-education <span>Mason ranks 11th  nationally in cybersecurity education</span> <span><span>John Hollis</span></span> <span>Mon, 02/11/2019 - 15:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="c040b2ec-a05e-4abf-9623-6969783455d5" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div> <p>George Mason University was ranked 11th nationally by Cyber Degrees in its recently released top-20 list of institutions with <a href="https://www.cyberdegrees.org/listings/top-schools/" rel="noreferrer" target="_blank">top cybersecurity programs</a>. </p> </div> <div> <p>Mason was also ranked fourth nationally for its <a href="https://masononline.gmu.edu/programs/applied-science-cybersecurity-concentration-bas/">online cybersecurity bachelor’s program</a>, 10th for its <a href="https://masononline.gmu.edu/programs/applied-information-technology-cyber-security-concentration-ms/" rel="noreferrer" target="_blank">online master’s in information technology program</a> and 12th for its <a href="https://masononline.gmu.edu/programs/information-technology-bs/" rel="noreferrer" target="_blank">online information technology bachelor’s program</a>.   </p> </div> <div> <p>Daniel Garrison, director of Mason Engineering Online in the <a href="https://volgenau.gmu.edu/" rel="noreferrer" target="_blank">Volgenau School of Engineering</a>, said Mason’s regional and national standing in cybersecurity education is one reason Amazon decided to choose Northern Virginia as the site for one of its newest headquarters.   </p> </div> <div> <p>“That signals not only the strength of our region but, in [Amazon’s] decision to partner with George Mason, an affirmation of our leadership in all things computing, including the security of its cyber infrastructure,” Garrison said.   </p> </div> <div> <p>According to the Cyber Degrees website, its rankings are based on Integrated Postsecondary Education Data Systems data on computer science and engineering program completions, the Ponemon Institute’s report on the best schools for cybersecurity and the U.S. Department of Homeland Security and National Security Agency-designated National Centers of Academic Excellence-Cyber Defense report. </p> </div> <div> <p> </p> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="5212db64-16e2-4895-99c1-e7e1439c36af" class="block block-layout-builder block-inline-blockbasic"> </div> </div> </div> Mon, 11 Feb 2019 20:18:17 +0000 John Hollis 801 at https://seor.sitemasonry.gmu.edu Cybersecurity’s next generation of experts prepares for the future at Virginia Cyber Competition https://seor.sitemasonry.gmu.edu/news/2017-03/cybersecuritys-next-generation-experts-prepares-future-virginia-cyber-competition <span>Cybersecurity’s next generation of experts prepares for the future at Virginia Cyber Competition </span> <span><span>4429684e-ae8d-…</span></span> <span>Thu, 03/02/2017 - 11:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="c2368342-1cf0-4a24-98e1-a604a332bb4d" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><blockquote> </blockquote> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="de41a87d-385c-4711-9c89-4843e83dc41e" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="376c99a0-538c-4d3f-ad64-3acf24166f05"> <div class="cta"> <a class="cta__link" href="https://volgenau.gmu.edu/expertise/cyber-security/cyber-security-research"> <h4 class="cta__title">Research Cybersecurity <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="f2f32ceb-1921-41cc-af87-ab2c7d8f50a8"> <div class="cta"> <a class="cta__link" href="https://volgenau.gmu.edu/program/view/20490"> <h4 class="cta__title">Learn about our BS in Cyber Security Engineering <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="aea39b0b-9ed6-41b5-9d79-2da085185d3b" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/33175629895_21c1e323fe_z.jpg" alt="Volgenau School's Cyber Security Engineering students participate in the inaugural Virginia Cyber Cup Challenge" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Cyber Security Engineering students participate in the inaugural Virginia Cyber Cup Challenge.</p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="acb11e41-e504-4471-bf79-a44ea8df7e3f" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The inaugural Virginia collegiate cyber competition used the Virginia Cyber Range to host a “Jeopardy” style cybersecurity team competition.</p> <p>“The best part of the conference was actually getting to solve unique technical challenges. The competition required us to use the technical skills we have, to solve challenges that were new to us,” said Doreen Joseph a student, majoring in Cyber Security Engineering at Mason. </p> <p>Cyber ranges function like shooting ranges and help with training in weapons, operations, or tactics. A cyber range is a virtual environment used for cyber warfare training and cyber technology development.</p> <p>Students majoring in Cyber Security Engineering take many classes and gain skills to solve new problems that they will encounter in this ever-changing field. Their coursework, combined with competitions like this, allows them to apply knowledge directly to new situations.<br /> Nine colleges competed in the inaugural event. Each invited college brought one team of up to six students, plus another five selected student observers. Teams from Virginia Tech, JMU, and Radford were among the competitors, but this was the first time Mason students had done anything like this.</p> <p>“I am so proud of our team,” said Peggy Brouse, director of Cyber Security Engineering. “Considering that this was our first competition and one of the laptops stopped working at the beginning of the four hours, I was very happy. The participant team (six students) placed fourth out of nine teams. The observer team (five students) took third place. “<br />  <br />  “The most important thing I learned is to avoid overanalyzing challenges because sometimes, the answer is right in front of you hiding in plain sight,” said Joseph.<br />  <br /> Joseph said she thought the team’s biggest challenge related to this exact situation. When they tried to decode a Morse code recording, she said she and her team thought they had to convert the sound recording to Morse code. Later, they discovered that the recording was Morse code, so they needed to convert it to text.</p> <p>“We were especially frustrated because we had solved the challenge up to that last part, but we were stuck. We were overanalyzing it,” said Joseph.</p> <p>“We learned a few things to do differently next time,” said Brouse. “But the most important thing is that everyone had fun.”</p> <p><strong>About the conference:</strong><br /> The event, hosted by Virginia Military Institute and sponsored by the Virginia Secretary of Technology and Senator Mark Warner, the Commonwealth Cyber Fusion emphasized integrating technology with policy and intelligence. In addition to the competition, there were speeches by cyber experts and a number of cyber employers who interviewed students for internships and cyber jobs.</p> <p>Students who participated in the competition included:  Matthew Burke, Yaqi He, Nadia Jehangir, Doreen Joseph, Benjamin Krause, Douglas MacDonald, Marco Perdomo, Natalie Parke, Thuc (Chuck) Tran, Matthew Wilkes, KangI Xu, Stephen Zamory.</p> <p>The cyber coaches were Dr. Jim Jones from the Volgenau School of Engineering and Cody McMahon from Raytheon.</p> <p> </p> </div> </div> </div> </div> Thu, 02 Mar 2017 16:06:37 +0000 4429684e-ae8d-405e-870a-3b7aefe68162 (Martha Bushong) 1201 at https://seor.sitemasonry.gmu.edu