CINXE.COM

PCRN: Presidential Cybersecurity Education Award

<!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <title> PCRN: Presidential Cybersecurity Education Award </title> <meta name="description" content="The Perkins Collaborative Resources Network (PCRN) provides resources and tools for state directors and state staff who administer career and technical education programs." /><meta name="generator" content="" /><meta name="keywords" content="CTE, Career, Technical, Education, Career and Technical Education" /><meta name="robots" content="index, follow" /><link href="/promoted.rss" type="application/rss+xml" rel="alternate" title="RSS 2.0" /> <link rel="stylesheet" type="text/css" href="/croogo/css/normalize.css?1731698301" /> <link rel="stylesheet" type="text/css" href="/croogo/css/bootstrap.min.css?1731698301" /> <link rel="stylesheet" type="text/css" href="/croogo/css/pcrn.css?1731698301" /> <script type="text/javascript"> //<![CDATA[ var Croogo = {"basePath":"\/","Wysiwyg":{"uploadsPath":"\/uploads\/","attachmentsPath":"\/file_manager\/attachments\/browse"}}; //]]> </script> <script type="text/javascript" src="/croogo/js/jquery/jquery-1.11.1.min.js?1731698301"></script> <script type="text/javascript" src="/croogo/js/jquery/jquery.matchHeight-min.js?1731698301"></script> <script type="text/javascript" src="/croogo/js/bootstrap.min.js?1731698301"></script> <script type="text/javascript" src="/croogo/js/pcrn.js?1731698301"></script> <script type="text/javascript" src="//www.google.com/jsapi"></script> <script type="text/javascript" src="/wysiwyg/js/wysiwyg.js?1731698301"></script><script type="text/javascript" src="/ckeditor/js/wysiwyg.js?1731698300"></script> <link rel="apple-touch-icon" sizes="57x57" href="/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="/manifest.json"> <meta name="msapplication-TileColor" content="#ffffff"> <meta name="msapplication-TileImage" content="/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <!--[if IE 8]> <link rel="stylesheet" type="text/css" href="/croogo/css/ie8.css?1731698301" /> <![endif]--> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-2FEHY71TZ8"></script> <script> window.dataLayer = window.dataLayer || []; function gtag() { dataLayer.push(arguments); } gtag('js', new Date()); gtag('config', 'G-2FEHY71TZ8'); </script> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=ED"></script> </head> <body> <div class="container"> <!-- Normal Header --> <div class="row header"> <div class="col-xs-6 left"> <a href="/" class="logoBox"><span class="sr-only">PCRN Logo</span></a> </div> <div class="col-xs-6"> <div class="topNav"> <div id="menu-7" class="menu"> <ul><li><a href="/" id="link-153" class="home">Home</a></li><li><a href="/calendar/upcoming-events" id="link-332" class="calendar">Calendar</a></li><li><a href="/news/newsroom" id="link-333" class="newsroom">Newsroom</a></li></ul></div> <!-- Google Search Box --> <div id='customSearch'> <gcse:searchbox-only resultsUrl="/custom_search/results" queryParameterName="q"></gcse:searchbox-only> </div> <link rel="stylesheet" type="text/css" href="/css/google_search_override.css?1731698302" /> </div> </div> </div> <div class="row nav"> <div class="col-xs-12"> <div id="menu-3" class="menu"> <ul class="sf-menu"><li><a href="/legislation/about-legislation" id="link-18" class="legislation-and-regulations">Legislation and Regulations</a><ul><li><a href="/legislation/about-legislation" id="link-255" class="about-legislation-and-regulations">About Legislation and Regulations</a></li><li><a href="/legislation/perkins-v" id="link-306" class="perkins-v">Perkins V</a></li><li><a href="/legislation/about-essa" id="link-233" class="every-student-succeeds-act-essa">Every Student Succeeds Act (ESSA)</a></li><li><a href="/legislation/educational-flexibility-program" id="link-321" class="educational-flexibilitybred-flex">Educational Flexibility<br>(Ed-Flex)</a></li><li><a href="/legislation/national-ffa-organization" id="link-248" class="national-ffa-organization-federal-charter-amendments">National FFA Organization Federal Charter Amendments</a></li><li><a href="/legislation/about-wioa" id="link-354" class="workforce-innovation-and-opportunity-act-wioa">Workforce Innovation and Opportunity Act (WIOA)</a></li><li><a href="/legislation/methods-of-administration" id="link-344" class="meth">Methods of Administration</a></li><li><a href="/legislation/uniform-guidance" id="link-343" class="unifo">Uniform Guidance</a></li></ul></li><li><a href="/grants/funding-opportunities" id="link-19" class="grant-programs">Grant Programs</a><ul><li class="rightMenu"><a href="/grants/discretionary-grants" id="link-326" class="discretionary-grants">Discretionary Grants</a><ul><li><a href="/grants/innovation-and-modernization-grant-program" id="link-330" class="innovation-and-modernization-program">Innovation and Modernization Program</a></li><li><a href="/grants/native-american-career-and-technical-education-program" id="link-327" class="native-american-career-and-technical-education-program">Native American Career and Technical Education Program</a></li><li><a href="/grants/native-hawaiian-career-and-technical-education-program" id="link-328" class="native-hawaiian-career-and-technical-education-program">Native Hawaiian Career and Technical Education Program</a></li><li><a href="/grants/tribally-controlled-postsecondary-career-and-technical-institutions-program" id="link-329" class="tribally-controlled-postsecondary-career-and-technical-institutions-program">Tribally Controlled Postsecondary Career and Technical Institutions Program</a></li></ul></li><li><a href="/grants/funding-opportunities" id="link-303" class="funding-opportunities">Funding Opportunities</a></li><li><a href="https://s3.amazonaws.com/PCRN/file/cte_highlights_of_arp_esser_state_plans.pdf" id="link-367" class="cte-highlights-of-arp-esser-state-plans" data-event="S3 Views" data-action="URLs" data-label="https://s3.amazonaws.com/PCRN/file/cte_highlights_of_arp_esser_state_plans.pdf" target="_blank">CTE Highlights of ARP ESSER State Plans</a></li><li><a href="/grants/state-formula-grants" id="link-336" class="state">State Formula Grants</a><ul><li><a href="/grants/state-plan" id="link-337" class="state-plans">State Plans</a></li><li><a href="/grants/monitoring" id="link-338" class="monitoring">Monitoring</a></li><li><a href="/grants/state-allocations" id="link-339" class="state-allocations">State Allocations</a></li><li><a href="/pcrn/profile/fiscal/national" id="link-340" class="state-profiles">State Profiles</a></li></ul></li><li><a href="/grants/town-hall-webinars" id="link-314" class="town-hall-webinars">Town Hall Webinars</a></li><li><a href="/pcrn/explorer" id="link-364" class="perkins-state-plans-and-data-explorer">Perkins State Plans and Data Explorer</a></li></ul></li><li><a href="/accountability/about-accountability" id="link-20" class="accountability">Accountability</a><ul><li><a href="/accountability/about-accountability" id="link-258" class="about-accountability">About Accountability</a></li><li><a href="/accountability/core-indicators" id="link-99" class="indicators-of-performance">Indicators of Performance</a></li><li><a href="/accountability/consolidated-annual-report" id="link-100" class="consolidated-annual-report-car">Consolidated Annual Report (CAR)</a></li><li><a href="/accountability/reports-to-congress" id="link-270" class="re">Reports to Congress</a></li><li><a href="/accountability/technical-assistance-to-states" id="link-264" class="technical-assistance-to-states">Technical Assistance to States</a></li><li><a href="/accountability/data-quality-institute" id="link-284" class="data-quality-institutes">Data Quality Institutes</a></li><li><a href="/accountability/linking-data" id="link-104" class="linking">Linking Data</a></li><li><a href="/accountability/data-security-and-privacy" id="link-294" class="data-security-and-privacy">Data Security and Privacy</a></li><li><a href="/accountability/quality-indicator-project" id="link-362" class="quality-indicator-project">Quality Indicator Project</a></li><li><a href="/nodes/../../pcrn/explorer" id="link-360" class="perkins-state-plans-and-data-explorer">Perkins State Plans and Data Explorer</a></li></ul></li><li><a href="/initiatives/about-national-initiatives" id="link-21" class="national-initiatives selected">National Initiatives</a><ul><li class="rightMenu"><a href="/initiatives/credentials" id="link-299" class="pathways-to-credentials">Pathways to Credentials</a><ul><li><a href="/initiatives/programs-of-study" id="link-379" class="programs-of-study">Programs of Study</a></li><li><a href="/initiatives/supporting-student-success-in-cte" id="link-380" class="supporting-student-success-in-cte">Supporting Student Success in CTE</a></li><li><a href="/initiatives/cte-scholars" id="link-381" class="us-presidential-scholars-in-career-and-technical-education-program">U.S. Presidential Scholars in Career and Technical Education Program</a></li><li><a href="/unlocking-career-success" id="link-376" class="unlocking-career-success">Unlocking Career Success</a></li><li><a href="/initiatives/work-based-learning" id="link-377" class="work-based-learning">Work-Based Learning</a></li></ul></li><li><a href="/initiatives/about-national-initiatives" id="link-259" class="about-national-initiatives selected">About National Initiatives</a></li><li><a href="/initiatives/career-pathways-systems" id="link-236" class="career-pathways-systems">Career Pathways Systems</a></li><li><a href="/initiatives/cte-challenge-prize-competitions" id="link-231" class="cte-challenge-prize-competitions">CTE Challenge Prize Competitions</a></li><li><a href="/initiatives/cte-correctional-education" id="link-374" class="cte-correctional-education">CTE Correctional Education</a></li><li><a href="/initiatives/cte-teacher-pipeline" id="link-283" class="cte-teacher-pipeline">CTE Teacher Pipeline</a></li><li><a href="/initiatives/cte-research-network" id="link-309" class="cte-research-network-20">CTE Research Network 2.0</a></li><li><a href="/initiatives/cybersecurity" id="link-368" class="cybersecurity-education">Cybersecurity Education</a></li><li><a href="/initiatives/employability-skills-framework" id="link-109" class="employability-skills">Employability Skills</a></li><li><a href="/initiatives/nectep" id="link-366" class="national-evaluation-of-career-and-technical-education-under-perkins-v-nectep">National Evaluation of Career and Technical Education under Perkins V (NECTEP)</a></li></ul></li><li><a href="/resources/search-resources" id="link-384" class="resources">Resources</a></li><li><a href="/contact/about-date" id="link-383" class="contact-us">Contact Us</a></li></ul></div> </div> </div> <div class="row content"> <div class="col-xs-12"> <!-- Normal non-page display --> <div class="row"> <div class="col-xs-12"> <div class="node-body"> <link href="/css/video-js.min.css" rel="stylesheet" /><script src="/js/video.js"></script> <style type="text/css">.media-body { font-size: 13px; } .videoContain { width: 260px; height: 154px; display: none; padding: 10px; border: 1px solid #ddd; border-bottom: none; } .videoContain.open { display: block; overflow: hidden; } .vjs-big-play-button { width: 100% !important; height: 154px; top: 0 !important; left: 0 !important; padding-top: 38px; border: none !important; box-shadow: none !important; background: none !important; } .vjs-captions { color: #fff !important; font-weight: bold; font-size: 28px; padding-bottom: 10px; padding-top: 10px; } #videoTabs { overflow: hidden; width: 510px; /*background: #f1f1f1;*/ border: 1px solid #ddd; border-top: none; } #videoTabs .tab { display: block; float: none; margin: 10px; border-top: #ddd 1px solid; padding: 10px; padding-bottom: 0; text-align: left; font-size: 12px; text-decoration: none; } #videoTabs .tab#video2 { float: none; } #videoTabs .tab.active { /*background: #ccc;*/ color: #555; font-weight: 700; text-decoration: none; } table.esf-lesson-components td, table.esf-lesson-components th { border: #ddd 1px solid; } </style> <style type="text/css">.node-body { padding: 10px; 27px; } .impact-pullquote { background: #E0E4E8; margin: 20px 0 0 100px; padding: 15px 40px 30px; } .impact-pullquote h2 { color: #698593; font-weight: 400; font-size: 24px; } .impact-pullquote h3, .bg-info h3 { font-size: 25px; font-weight: 500; margin: 0 0 0; } .impact-pullquote p { line-height: 1.58em; } .bg-info h3 { margin: 10px 0; line-height: 1.33em; } .panel { border-radius: 0; } strong { font-weight: 600; } </style> <div class="row"> <div class="col-xs-12"><span style="font-size:12px;display:block;padding-bottom:20px;color:#2f5025;"><a href="/initiatives/about-national-initiatives">National Initiatives</a>&nbsp;/&nbsp;<a href="/initiatives/cybersecurity">Cybersecurity Education</a>&nbsp;/&nbsp;Presidential Cybersecurity Education Award</span></div> </div> <div class="row"> <div class="cyber-security-content-item"> <h1>Presidential Cybersecurity Education Award</h1> <div class="cyber-security-content"> <p>The PCEA is presented by the U.S. Secretary of Education to teachers in the field of cybersecurity to honor their contributions to the education of our nation&rsquo;s students. The award is bestowed annually to two teachers &mdash; one at the elementary level and one at the secondary level &mdash; who &ldquo;demonstrate superior achievement in instilling skills, knowledge, and passion with respect to cybersecurity and cybersecurity-related subjects.&rdquo; These recipients embody the dedication and expertise of educators who are critical to increasing the cybersecurity awareness of all students, inspiring the nation&rsquo;s future cybersecurity workforce, and contributing to a more secure society. The award acknowledges both the exemplary achievements demonstrated by the teachers and that of the teacher&rsquo;s students.&nbsp;The Rules, Terms, and Conditions for the 2024 PCEA are included below. The nomination period opens on August 1, 2024&nbsp;and closes on September 13, 2024&nbsp;at 11:59:59 p.m. Eastern Daylight Time.&nbsp;<!--The Rules, Terms, and Conditions for the 2022 PCEA are included below. The nomination period closes on July 31, 2022 at 11:59:59 p.m. Eastern Daylight Time.--></p> <p>The 2024&nbsp;PCEA will be the fifth iteration of the award.&nbsp;The prior four winners are listed below:</p> <ul> <li>2020 winners: <ul> <li>Kara Four Bear of New Town Middle School in New Town, North Dakota</li> <li>Donna Woods of Canyon Springs High School in Moreno Valley, California</li> </ul> </li> <li>2021 winners: <ul> <li>Sergio de Alba&nbsp;of Miano Elementary School in Los Banos, California</li> <li>Kristina L. Rice&nbsp;of Spotsylvania High School in Spotsylvania, Virginia</li> </ul> </li> <li>2022 winners: <ul> <li>Benjamin Dougherty&nbsp;of Lakota West High School in West Chester, Ohio&nbsp;</li> <li>Robert &ldquo;Allen&rdquo; Stubblefield, Jr.&nbsp;of Troy High School in Fullerton, California</li> </ul> </li> <li>2023 winners: <ul> <li>Elizabeth Cerrone of The Innovation Center in St. Vrain Valley, Colorado</li> <li>Jahi Garner of Palm Middle School in Moreno, California</li> </ul> </li> </ul> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h2>Rules, Terms, and Conditions</h2> <h3>What is the Presidential Cybersecurity Education Award?</h3> <div class="cyber-security-content"> <p>The Presidential Cybersecurity Education Award is bestowed by the United States Secretary of Education (Secretary) on teachers in the field of cybersecurity to honor their contribution to the education of our nation&rsquo;s students. The award, established by Executive Order 13870 on May 2, 2019, is led by the U.S. Department of Education (Department), in consultation with the&nbsp;White House Office of the National Cyber Director and the National Science Foundation.</p> <p>The award is presented annually to two teachers&mdash;one at the elementary or middle level (kindergarten through eighth grade) and one at the secondary level&mdash;who demonstrate superior achievement in instilling skills, knowledge, and passion with respect to cybersecurity and cybersecurity-related subjects. The award also recognizes teachers who demonstrate superior accomplishment in promoting student academic achievement.</p> <p>Teachers from all 50 states, the District of Columbia, Puerto Rico, American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, the U.S. Virgin Islands, and the Department of Defense Education Activity (DoDEA), and Tribal Nations schools are eligible to apply or be nominated.</p> <p>Award recipients embody the expertise and dedication of teachers who are critical to increasing the cybersecurity awareness of all students, inspiring the nation&rsquo;s future cybersecurity workforce, and contributing to a more secure society.</p> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>Why Apply?</h3> <div class="cyber-security-content"> <p>The Administration and Secretary are committed to enhancing the cybersecurity workforce and recognizing the cybersecurity teachers who serve a critical role in the development of America&rsquo;s future cybersecurity professionals. The United States Government also recognizes the challenges and successes teachers face daily in the highly technical field of cybersecurity education. Therefore, this award highlights the accomplishments of two teachers by providing recognition, such as:</p> <ul> <li>A certificate signed by the Secretary;</li> <li>Public recognition as a leader in the field of cybersecurity education; and</li> <li>Attendance at events, as appropriate, which may include professional development opportunities, discussions with policymakers on how to improve cybersecurity education, and opportunities to build lasting partnerships with colleagues across the nation.</li> </ul> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>Eligibility</h3> <div class="cyber-security-content"> <p>Nominees must:</p> <ul> <li>Be a&nbsp;&ldquo;teacher&rdquo; as defined in this announcement;</li> <li>Instill in their students skills, knowledge, and passion with respect to cybersecurity or cybersecurity-related subjects, increase students&rsquo; awareness of cybersecurity issues, and encourage their students to explore further education and careers in cybersecurity or cybersecurity-related subjects as part of their teaching responsibilities at a public or private &ldquo;elementary school&rdquo; or &ldquo;secondary school,&rdquo; as defined in this announcement;</li> <li>Be a full-time employee of the elementary school or secondary school, or school district, as determined by state and school district policies;</li> <li>Teach in one of the 50 states, the District of Columbia, Puerto Rico, American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, the U.S. Virgin Islands, the DoDEA, or Tribal Nations schools;</li> <li>Be a U.S. citizen or permanent resident; and</li> <li>Have not received this award before.</li> </ul> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>Definitions</h3> <div class="cyber-security-content"> <p>The following definitions are provided for the purpose of this award. Some of the definitions originate from legislation, while others were developed in collaboration with the Federal agencies referenced in the Executive Order establishing this award.</p> <ul> <li><strong>Elementary school:</strong> The term &ldquo;elementary school&rdquo; means a nonprofit institutional day or residential school, including a public elementary charter school or tribal school, that includes any grades from kindergarten up to, and including, grade 8, as determined under State law.</li> <li><strong>Secondary school:</strong> The term &ldquo;secondary school&rdquo; means a nonprofit institutional day or residential school, including a public secondary charter school or Tribal school, that provides secondary education, as determined under State law, except that the term does not include any education beyond grade 12.</li> <li><strong>Cybersecurity or cybersecurity-related subjects:</strong> The term &ldquo;cybersecurity&rdquo; means measures that focus on protecting computers, networks, and information from unauthorized access or attacks. Examples include, but are not limited to, the following: computer science, coding, cyber-operations, cyber-science, cyber-society, cryptography, data loss prevention and encryption, forensics, malware detection, system administration, software development and protection, web exploitation, computer networks and security, information sciences and technology, information security, reverse engineering, password protection, social or systems engineering, defensive hacking, and security intelligence. Please note, the teaching of content such as &ldquo;cyber-bullying,&rdquo; &ldquo;cyber-hygiene,&rdquo; and &ldquo;cyber-awareness&rdquo; do not fall under this definition.</li> <li><strong>Teacher:</strong> The term &ldquo;teacher&rdquo; means an individual who is employed in a public or private elementary school or secondary school, and who is responsible for educating students on cybersecurity or cybersecurity-related subjects.</li> <li><strong>Superior educator accomplishment:</strong> The term &ldquo;superior educator accomplishment&rdquo; means a teacher&rsquo;s evidence of conducting teaching and learning about cybersecurity or cybersecurity-related subjects at an increasing level of complexity over the last five years with demonstrated exceptional outcomes. Examples of such accomplishment include, but are not limited to, demonstrated evidence that the teacher has, over the last five years: (1) taught the knowledge, skills, abilities, and tasks of the National Initiative for Cybersecurity Education (NICE) Framework; (2) increased cybersecurity career awareness; (3) infused cybersecurity across curricular disciplines; (4) integrated innovative cybersecurity educational approaches; (5) developed work-based learning and training through an employer partnership or consortia; (6) designed academic and/or career pathways aligned to the NICE Framework and the multi-part definition of career pathways from the Workforce Innovation and Opportunity Act; (7) started a successful cyber program, club, competition team, or mentoring program; (8) attended professional development workshops; (9) led a cyber camp; (10) earned an industry-valued credential or certification in a cybersecurity or cybersecurity-related subject; and (11) scaled or repeated a cybersecurity intervention (e.g., lesson, partnership, etc.) across a school district, state, or the country.</li> <li><strong>Academic achievement:</strong> The term &ldquo;academic achievement,&rdquo; with respect to a teacher&rsquo;s students, means the increased knowledge, skills, and abilities of the students in cybersecurity or cybersecurity-related subjects. Examples include, but are not limited to: (1) high grades; (2) a concentration in a Career Technical Education (CTE) cybersecurity program of study; (3) passage of performance-based cybersecurity assessments; (4) participation in a cybersecurity work-based learning opportunity via an internship, apprenticeship, or other employment; (5) an industry-valued credential (including trade or degree) in cybersecurity; (6) military placement; or (7) involvement and significant placement in student cybersecurity competitions, such as <a href="https://www.uscyberpatriot.org/" target="_blank">https:uscyberpatriot.org</a>.</li> </ul> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>The Award Process: Overview</h3> <h4>Nomination Process</h4> <div class="cyber-security-content"> <p>The information provided by either nominators or teachers themselves (self-nominations) is completely voluntary. Anyone, including principals or other administrators; teachers; parents; students; state and local educational agency staff; federal, state, and local elected officials; and the public may nominate exceptional individuals who teach, promote, or inform students about cybersecurity or cybersecurity-related subjects in a public or private elementary or secondary school.</p> <p>To submit a complete nomination, the following information is required:</p> <ul> <li>Teacher&rsquo;s name</li> <li>Level of education taught (elementary or secondary)</li> </ul> <p>Work information required:</p> <ul> <li>Teacher&rsquo;s state</li> <li>Teacher&rsquo;s city</li> <li>Teacher&rsquo;s work information (name and address of school, school district, or facility)</li> <li>Teacher&rsquo;s work email address</li> <li>Teacher&rsquo;s work contact number</li> <li>Nominator&rsquo;s work email address and phone number (for nominations that come from someone besides the teacher (e.g., principal nominating a teacher))</li> <li>One narrative not exceeding 500 words that describes, with respect to the nominated teacher, superior teacher accomplishment (as defined in this announcement). A second narrative not exceeding 500 words that describes academic achievement (as defined in this announcement) by the teacher&rsquo;s students. Narrative submissions may include a weblink or a video that showcases accomplishments, but a weblink or video is not required. The narrative responses should describe how the teacher has: (1) built strong foundations for cybersecurity literacy; (2) increased diversity, equity, and inclusion in cybersecurity; and (3) prepared the cybersecurity workforce for the future, as included in the 2018 Federal STEM Education five-year strategic plan, Charting A Course for Success: America&rsquo;s Strategy For STEM Education.</li> <li>One letter of reference from a principal, school district superintendent, or general reference (e.g., a parent, local industry leader, community leader, etc. with whom the teacher has worked) with a work contact email and phone number. Should the nominee be a top candidate, the Department reviewers will contact the reference to verify the following with respect to the nominated teacher: (1) superior educator accomplishment; (2) academic achievement by the teacher&rsquo;s students; and (3) that the teacher is in good standing (e.g., not on probation; has received positive yearly reviews; etc.).</li> </ul> <p>Nominations may be submitted by the same individual or entity for more than one teacher as separate nominations.</p> <p>Nominations should be submitted to CyberAwards@ed.gov. Once a nomination is submitted, an automated email response will be generated from the Department to confirm receipt to the person who submitted the nomination. Therefore, teachers who are nominated by someone else will not be notified unless they are chosen to receive the Presidential Cybersecurity Education Award.</p> <p><strong>The nomination period opens August 1, 2024&nbsp;and closes&nbsp;on September 13, 2024 at 11:59:59 p.m.&nbsp;Eastern Daylight Time.</strong></p> </div> </div> </div> <div class="row"> <div class="cyber-security-content-item"> <h4>Instructions to Nominators</h4> <div class="cyber-security-content"> <p>Eligibility will be confirmed by Department reviewers. Incomplete nominations will be considered ineligible. Nominators should provide evidence in the narrative format described in the Nomination Process section of this announcement. Documents will be accepted in Microsoft Word (.doc, .docx) or Adobe Portable Document file (.pdf) formats. Please include the teacher&rsquo;s name, teacher&rsquo;s contact information, and page numbers on each page of the nomination. If the nomination is being prepared by someone other than the nominee, the nominator is encouraged to work with the nominee to complete the nomination to ensure that the information is reported accurately.</p> <p>The award is focused on those who demonstrate their abilities teaching students in a variety of methods and environments (classroom, co-curricular, after-school programs, work-based learning, etc.), not only on those who are cybersecurity practitioners. The Executive Order directs the Department to focus on demonstrated teaching accomplishments, and not consider the teacher&rsquo;s &ldquo;research, scholarship, or technology development.&rdquo; Therefore, there is no requirement that information about a teacher&rsquo;s &ldquo;research, scholarship, or technology development&rdquo; be included in the nomination, and such information will not be considered during review and selection.</p> </div> </div> </div> <div class="row"> <div class="cyber-security-content-item"> <h4>Review Criteria</h4> <div class="cyber-security-content"> <p>Each nomination will be evaluated based on the entirety of the document submitted. The following criteria will be used during the review of nominations:</p> <ul> <li>The extent to which the teacher demonstrates evidence of superior accomplishment related to teaching about cybersecurity and cybersecurity-related subjects;</li> <li>The extent to which the teacher substantiates teaching effectiveness using external indicators of academic achievement as defined in this announcement; and</li> <li>The extent to which the teacher&rsquo;s leadership contributes to educational excellence at the school, district, state, and/or national level.</li> </ul> </div> </div> </div> <div class="row"> <div class="cyber-security-content-item"> <h4>Selection</h4> <div class="cyber-security-content"> <p>All nominations will be subjected to the following review process:</p> <ul> <li>Once the nomination period has ended, the Department will review the nominations for eligibility and assign all eligible nominations for review by Department staff (reviewers) with expertise in cybersecurity, technical education, or cybersecurity-related education.</li> <li>Copies of each eligible nomination will be provided to reviewers for the selection of awardees. Staff will maintain strict confidentiality when reviewing nominations and notify the Presidential Cybersecurity Education Award Manager should any conflicts of interest arise.</li> <li>The reviewers will then each provide their recommendation for one elementary and one secondary teacher awardee to the Secretary. The Department will review and vet the awardees. The Department will notify the awardees of their selection using the contact information provided in the nomination.</li> </ul> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>Questions or Technical Assistance</h3> <div class="cyber-security-content"> <p>Please contact <a href="mailto:CyberAwards@ed.gov">CyberAwards@ed.gov</a>.</p> </div> </div> </div> <hr /> <div class="row"> <div class="cyber-security-content-item"> <h3>Authority</h3> <div class="cyber-security-content"> <p>The Secretary of Education is responsible for administering the Presidential Cybersecurity Education Award, which is authorized under Executive Order 13870.</p> <p>Privacy Act Statement: The Department&rsquo;s authority to ask for this information is Executive Order 13870 issued on May 2, 2019. The information provided is voluntary. The main purpose for the information is to make awards. Should nominations not provide the information requested, nominations may be deemed ineligible. The routine use disclosures which may be made of the information will be published in a Systems of Records Notice (SORN) in the Federal Register. The Department will be able to disclose information from this SORN for certain enumerated purposes to specific users without the nominees&rsquo; or awardees&rsquo; prior written consent pursuant to such routine use disclosures. The routine use disclosures are expected to include disclosures to references listed in applications and nominations in order to permit the Department to determine that applicants and nominees meet the criteria for the Presidential Cybersecurity Education Award, to the general public to announce the awardees, to the media to announce the awardees and to respond to inquiries about them, to government officials to notify them of the awardees in their States or districts, to assist with preparing congratulatory letters, certificates, or other honors, or to schedule events and office visits, to state and local education official to inform them of awardees in their states, districts, or schools, to White House or other Federal agencies for speechwriting and briefings of officials who will be addressing the awardees at events or to obtain needed security clearances at such events, to individuals and entities, such as vendors, in preparation for the awards ceremony or related educational and celebratory activities, to the Department&rsquo;s contractors as needed to carry out any function of the Department, to members of Congress in response to an inquiry made at the nominee&rsquo;s or awardee&rsquo;s written request, to the Department of Justice to obtain advice, to the Department of Justice, parties, counsel, representatives, witnesses, courts, or other adjudicative authorities as relevant and necessary to administrative or judicial litigation, to appropriate parties and entities to respond to a breach of data, to researchers to carry out research on the purposes and functions of the system of records, to law enforcement officials if information in the system of records on its face or in connection with other information indicates that there has been a violation of statute, regulation, or order, and to the Department of Justice or the Office of Management and Budget if the Department concludes that disclosure is desirable or necessary in determining whether particular records are required to be disclosed under the Freedom of Information Act or the Privacy Act.</p> </div> </div> </div> </div> </div> </div> <script> $(document).ready(function() { $('.resource-links.to-search').on('click', 'a', function() { var topicIds = $(this).data('topics'); var typeIds = $(this).data('types'); $('#searchTopics').val(JSON.stringify(topicIds)); $('#searchTypes').val(JSON.stringify(typeIds)); $('#searchViewForm').submit(); return false; }); }); </script> </div> </div> <div class="row footer"> <div class="col-xs-6 left"> <p>U.S. Department of Education<br /> Office of Career, Technical, and Adult Education<br /> Division of Academic and Technical Education</p> </div> <div class="col-xs-6 right"> <a href="/page/disclaimer">Disclaimer</a>&nbsp;|&nbsp;<a href="/page/privacy">Privacy Policy</a>&nbsp;|&nbsp;<a href="mailto:CTE@ed.gov">Feedback</a> </div> </div> </div> <!-- --> <!-- --> <script type="text/javascript"> //web fonts WebFontConfig = { google: { families: ['Open+Sans:400,300,300italic,600,400italic,700:latin'] } }; (function() { var wf = document.createElement('script'); wf.src = ('https:' == document.location.protocol ? 'https' : 'http') + '://ajax.googleapis.com/ajax/libs/webfont/1/webfont.js'; wf.type = 'text/javascript'; wf.async = 'true'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(wf, s); })(); //google search code (function() { var cx = '008186086369876114029:plv_0izcmyq'; var gcse = document.createElement('script'); gcse.type = 'text/javascript'; gcse.async = true; gcse.src = 'https://cse.google.com/cse.js?cx=' + cx; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(gcse, s); })(); $(document).ready(function() { //capture external links not produced via HtmlHelper (manually tagged) $('.content').on('click', 'a.external', function() { var theHref = $(this).attr('href'); window.location = '/page/transfer?url=' + encodeURIComponent(theHref); return false; }); //first visit modal /* var firstView = ('' == 'yes') ? true : false; */ /* if (firstView && false) { $.fancybox.open($('.firstViewModal'), { autoSize: false, width: 600, height: 'auto', padding: 30 }); } */ //survey /* var surveyModal = ('' == 'yes') ? true : false; */ /* if (surveyModal && false) { var showSurvey = setTimeout(function() { $.fancybox.open($('.surveyModal'), { autoSize: false, width: 560, height: 'auto', padding: 20 }); }, 30000); $('#dismissSurvey').click(function() { $.fancybox.close($('.surveyModal')); $.ajax({ type: 'GET', url: '/clear_survey', success: function(data) { console.log(data); } }); return false; }); } */ //tls notice $('#closeTLSNotice').click(function() { $(this).closest('#tlsMessage').slideUp(); $.ajax({ type: 'GET', url: '/clear_tls', success: function(data) { //console.log(data); } }); return false; }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10