Blockchain: A Revolution For STEM Education

Image: Getty / Teen Working On A GPU Rig

Fostering An Appreciation Of Decentralization

Written by: Andrew B. Raupp / @stemceo

These days, it seems like everyone is talking about blockchain technology. News about bitcoin and other cryptocurrencies is hard to resist, especially when their value shoots up and down and everyone wants to know how the blockchain can make them rich or poor — financially. But the real value of blockchain isn’t necessarily tied solely to disrupting the monetary status quo. It also lies in how this technology could transform and streamline transactions and recordkeeping in all sorts of fields — specifically education.

A Blockchain Primer

If you’re not familiar with how blockchain technology works or need to brush up, it’s helpful to compare cryptocurrency with the way your regular bank does business. Banks basically have all your account data on one digital spreadsheet to keep track of your transactions. That’s fine, but a highly centralized data system is vulnerable to hackers, and you can’t send money to a family member without going through an intermediary (the bank). Cryptocurrency, on the other hand, depends on a totally decentralized network of users to store information about all transactions. There’s no bank as a gatekeeper, but information (the block) is added to a permanent chain that no one can change. It’s safer because everyone in the network has access to the information at all times, so if someone is trying to change the record, everyone can see that happening — and stop it.

Image: Financial Times / PwC United States

An Educational Revolution

Last year, MIT delivered its first blockchain diplomas to graduates — on their smartphones. It was more than just a digitized certificate: Unlike a paper diploma, which could be easily lost or falsified, blockchain ensures that this important piece of data is never lost. It also cuts out the university or traditional clearinghouse as the intermediary needed to issue transcripts. Instead, students have direct access to their educational records right on their phones. Whether their house burns down or they move across the world, their diploma is secure.

Image: Learning Machine / MIT’s Digital Diploma 1 of 3

Anatomy of a digital diploma: “The MIT digital diploma ‘makes it possible for [students] to have ownership of their records and be able to share them in a secure way, with whomever they choose,’ says Mary Callahan, MIT registrar and senior associate dean.” -MIT News

Image: Learning Machine / MIT’s Digital Diploma 2 of 3

“Using MIT’s new digital diploma system, employers and schools can quickly verify that a graduate’s degree is legitimate by using a link or uploading the student’s file.” -MIT News

Image: Learning Machine / MIT’s Digital Diploma 3 of 3

“The presentation layer has a customized image of a traditional MIT diploma; the content layer contains code with the student’s public key and generates the image; and the receipt layer proves the transaction has been recorded on the blockchain.” -MIT News

This is more than just a matter of convenience. If other credentials like certificates and badges are also stored on the blockchain, it will become much easier for students to move between universities and dictate their own educational trajectory because barriers to transferring credits would begin to fall away. In this world, MOOCs could also be more easily completed for meaningful credit that leads to a degree. A person’s entire educational record could be accessed at the touch of a button.

If individual educational records were encrypted in this way, K-12 assessments could be better coordinated as well. Instead of annual high-stakes tests that vary by state and grade level, one could imagine a more longitudinal assessment system that tracked achievement over time. For example, if an eighth-grade student passed a tenth-grade geometry test, she would carry that accomplishment on her record wherever she went, allowing her to continue her math education at the appropriate level for her as an individual, rather than having to retake the same test for the next several years. In this way, blockchain could help revolutionize personalized education.

Integrating Blockchain Into STEM Education

Image: Getty / Two Students Studying Electronics

If blockchain is the wave of the future (as it certainly seems to be), it seems logical to make sure that today’s students are prepared to engage with this technology in their careers. This is already happening in higher education, as colleges like Virginia Tech and NYU add blockchain concentrations. Studying blockchain capitalizes on a number of STEM disciplines, including computer engineering and higher math to encrypt the data.

Because the technology is relatively new and complex, there are currently very few opportunities for K-12 students to learn more about blockchain. Though some independent courses do exist, there is a real need to develop age-appropriate curriculum in this area. For younger students, understanding the basics about networks and honing relevant math skills is a good start; for older students, financial literacy dovetails nicely with cryptocurrency to spark interest. Additionally, learning to code is always an important STEM skill, and classes in Python will be particularly useful in understanding blockchain. As with all STEM education opportunities, the earlier it begins and the more hands-on it is, the more likely kids are to stick with it and see themselves as the blockchain contributors of the future.

A Philosophy Of Decentralization

Image: Getty / Students Building Computers

Finally, it’s worth noting that blockchain represents a major step in the cultural shift towards decentralized knowledge. Just as the technology itself eliminates an intermediary that stands between you and your money (or your educational record), so too does it hint at a world in which stuents may have more direct access to and control over their education. If blockchain leads to decentralized records and greater access to global databases of knowledge, education will be further democratized and many more people will have access to the learning that they desire.

This movement comes at a time when education — and particularly STEM education — is highly corporatized. There’s money to be made from selling people an education, but it would be a real mistake to allow corporate monopolies to have all the power over what we teach our students. Despite colleges becoming ever more commodified, no single organization “owns” STEM education. In order for the STEM education movement to thrive, it must remain decentralized and accessible to all, regardless of socioeconomic standing or country of origin. It should also not be co-opted by special interests that value profits over innovation and authentic learning experiences.

Image: Getty / Student Studying On A Tablet

By teaching students the STEM basics they need to understand blockchain, we can also foster in them an appreciation for the values that it brings to the table. It’s a valuable technology, to be sure, but it’s also steeped in a culture that sees information as something everyone has a right to obtain freely, without having to pay a mediator for access to it. In this philosophy, knowledge is a birthright — and an effective STEM education can help keep it that way.

This article was originally featured in Forbes Community Voice™ on November 30th, 2018.

Andrew B. Raupp is the Founder / Executive Director @stemdotorg.

“Democratizing science, technology, engineering and math (STEM) education through sound policy & practice…”

The Inherent Fluidity of STEM Careers

Image: Getty / STEM Student Welding In Shop Class

Preparing Today’s Minds For The STEM Jobs Of Tomorrow

Written by: Andrew B. Raupp / @stemceo

Education reform continues to be fiercely debated, but one thing is clear: It’s imperative that leaders align K-12 classrooms with the growing demands of the future science, technology, engineering and mathematics (STEM) workforce. What makes this task particularly challenging is that today’s youth will likely face challenges that the adults around them can barely imagine. We’re living in a precarious moment in human history in which some have argued that technology is so disruptive that productivity is outpacing job growth. Preparing the children of today to succeed in a completely different job market is a responsibility we cannot ignore — even though it may feel impossible to keep up with such rapid change.

Zeroing In On A Moving Target

Although the government officially recognizes hundreds of STEM degrees, simply choosing to study an existing field will not guarantee a young person a lifetime career. The very nature of STEM is that it’s always evolving as researchers and inventors build on past knowledge to spark innovation. In fact, the pace of change today is likely to affect all sorts of jobs we may think of as stable, from insurance writers and loan officers to seamstresses and referees. School-age children could see roles like tax preparers and library technicians disappear by the time they graduate. Artificial intelligence (AI) and increased automation stand to change the employment landscape dramatically, leading to fewer jobs that involve actual humans in the future.

On the bright side, there are also plenty of attractive STEM careers available today that were unheard of a decade ago. Mobile app developers, big data analysts and driverless car engineers are all up-and-coming roles in fields that only exist because of the endless forward march of human progress. This embodies the fluidity of STEM: As old technologies and related job opportunities fall away, new ones arise in their place.

Image: Getty / Drone Operator


Recognizing The Potential Of The Future Now

Within their short lifetimes, members of Generation Z have witnessed the rise of new technologies like next-generation batteries, blockchain, the internet of things (IoT), autonomous vehicles and nanosensors, all of which will spark new opportunities and change the job outlook around the world. According to Willis Towers Watson, more than 60% of children attending school today will work in a career that does not currently exist. This will likely result in new positions such as autonomous transportation specialist, human-technology integration expert, excess capacity broker and others we have yet to imagine.

Growing digital connectivity and the accessibility of affordable technology have democratized and redefined STEM careers. For example, social media influencers now play a vital role in today’s modern businesses by creating guerrilla marketing campaigns to promote goods and services. Many are also taking on roles such as in situ data scientist, focusing on analytics often collected using mobile devices and stored in the cloud. Countless jobs have arisen through companies and platforms such as Uber, Shipt and Upwork, which began as STEM experiments but now serve as gateways into the gig economy that may one day rival the size of our current workforce.

Image: Getty / Engineers Working In An Advanced Robotics Laboratory


Preparing Children For STEM Careers

Preparing students for future careers in STEM as well as for a workplace that emphasizes independence and flexibility is the major task ahead of anyone interested in education today. Though novel vocational opportunities are exciting, facing the changing future of work and preparing students for STEM careers means embracing new pedagogical approaches and developing curriculums that go beyond the basics of what is currently available. The task is two-fold: We must encourage the skills needed to keep up with the rapid changes happening around us while anticipating what the future will hold next.

To do this, it’s crucial to begin STEM learning as early as possible. According to King’s College London, children’s feelings about science and any career aspirations in STEM are formed before age 14 — that is, by the time they are in middle school. Getting children interested in and feeling positive about STEM will go a long way toward raising a generation that’s excited about excelling in these fields.

However, early STEM education must also be developmentally appropriate. For example, preschoolers and early elementary students should be encouraged to play and manipulate materials to develop scientific thinking. Researchers at Johns Hopkins point out that block play helps children develop spatial reasoning skills that are crucial in many STEM fields. STEM toys can be used in ways that encourage inquiry, experimentation and theorizing, which are the founding principles of the scientific method.

Image: Getty / STEM Students Building A Robot


As children mature, connecting STEM learning to real-world problems becomes key. Where once they were invested in building the tallest Lego tower, students might now be led to solve problems in school or at home by experimentation and applying ideas they’ve learned about in class. A revolutionary STEM education should focus on hands-on building and problem-solving rather than memorizing textbook material in order to engage students. Older students should also be explicitly encouraged to explore evolving career fields — both those that exist and those that may be available in another decade or two. While many students may enjoy STEM, they won’t consider a career path in it unless they know what’s available to them.

Building A Foundation For STEM Inclusivity

It should also be noted that early, robust STEM education has the power to transform equity in scientific fields. Though STEM education in its current form is not “culturally neutral,” committing to collaborative STEM learning during early childhood education can make high-paying careers in STEM fields available to everyone, regardless of gender, race or country of origin. Starting early means that all children are encouraged to see themselves as scientists capable of solving problems and designing inventions. STEM must be included in the educational standards that all children are expected to meet and no longer seen as something for only the most gifted or mature. When we make this shift, we will lay the foundation for STEM education that prepares all students for whatever the future holds.

“Moving Target: Preparing Today’s Minds For The STEM Jobs Of Tomorrow” was originally featured in Forbes Community Voice™ on November 8th, 2018.

Andrew B. Raupp is the Founder / Executive Director @stemdotorg. “Democratizing science, technology, engineering and math (STEM) education through sound policy & practice…”

Is World Changing ET Technology Hidden In Plain Sight?

Image: Getty / Interstellar Telescope


Written by: Andrew B. Raupp (@stemceo) / Edited by: Joaquin Flores

If you’ve been up late scouring the latest offerings on Netflix lately, you may have come across Unacknowledged, a fascinating new documentary that details available evidence on the existence of alien life forms as compiled by Dr. Steven Greer and his The Disclosure Project. While the film may not stand up to any true Scully-level skeptics, the provocative ideas posed about alien technology offer some excellent food for thought as we consider what our modern world would look like with the sudden reveal of previously “hidden” technologies.

Greer and his colleagues posit that there’s ample evidence of the existence of UFO research programs, and countless government officials have corroborated actual sightings, as well as the presence of dark money budgets that have fueled this research to the tune of millions, if not billions, of US taxpayer dollars. Our curiosity about alien life and extraterrestrial technology is indisputable, and it seems clear now that there is also evidence that governments have been working in the shadows to better understand what might be out there beyond our own humble planet. But while some of Greer’s claims may veer into conspiracy territory for some, there’s also a fascinating idea at the heart of the film: what if knowledge about aliens is being suppressed because their technology would drastically alter our current culture and economic systems?

The Power of “Free Energy”

Dr. Steven Greer brilliantly connects the dots by luring viewers in with credible UFO evidence and dizzying information that involves the likes of JFK and Marilyn Monroe, ultimately segueing into a radical shift that gets the audience to consider what would occur if humans had access to the kind of “free energy” that he believes powers alien spacecraft.

The idea of the disruptive potential of free energy, which could power our world without the use of finite fossil fuels and costly electrical infrastructure makes up the bulk of the third act of the film, “The Lost Century.” And while Greer acknowledges how completely world changing it would be to have access to truly “free” energy, he also notes that it’s not actually a new idea, and gives a major nod to the innovative engineer Nikola Tesla and his potentially world changing work in the 19th century.

While “Tesla” is now synonymous with innovative CEO Elon Musk and his electric car company (as well as his recent successful launch of a bright red roadster into space), science buffs know that Nikola Tesla was a brilliant and eccentric engineer whose experiments created a powerful form of energy that threatened the very existence of burgeoning electric monopolies. In fact, science, technology, engineering and mathematics (STEM) students across the world continue to play with Tesla’s ideas — a search for “tesla coil” on video sharing platform YouTube reveals almost half a million results, many of the videos created by amateur and student engineers.

Image: Getty / Flying Saucers


So, how does the science behind free energy work? The details in the film are a bit fuzzy, but Greer and other experts refer to “zero point energy,” which Mark McCandlish, military aeronautic illustrator, describes the power of such energy as: “the amount of energy in a cubic meter of space-time is 1026 power. That’s ten with 26 zeros behind it. That’s enough energy in a coffee cup to boil all the oceans of Earth completely away into steam.”

If humans were able to access such a power source, Greer argues that we would be able to eliminate many of the problems that plague our modern world. While Greer makes clear that he’s a true believer that this energy is already available and being actively hidden by governments as a way of continuing to allow traditional energy companies and defense contractors to profit, he’s also begun work to try to create and harness this energy without waiting for the curtain to be pushed back. His latest project, Sirius Disclosure, focuses on energy technologies, and new ways of perhaps recreating the powerful energy that a few select Americans have already seen in action from top secret, alien spacecraft.

Meanwhile, Back on Earth

The desire to access technology from alien life forms is certainly compelling, especially given that the work and time required to take on large scale, high tech projects here on our own humble planet can be staggering at best. As recently reported by Popular Mechanics, Japanese glass makers and scientists based in the ultra dry desert conditions of the American West are hard at work on the large scale, collaborative project of creating the Giant Magellan Telescope (GMT), a significant feat that could influence our ability to observe and contact other life forms. As PM notes, “the giant telescope will have 10 times the resolving power of the Hubble Space Telescope, revealing distant galaxies, the birth of stars, and the compositions of exoplanet atmosphere…When it all comes together in the 2020s, the GMT will be able to resolve an object the size of a dime at 60 miles away.”

An exciting project to be sure, but one that we earthlings will have to wait years to achieve. While one solution may be the deus ex machina of technology from outer space, another solution is the one that we’ve already known about for quite some time. Develop stronger, high quality, and accessible STEM programs in classrooms around the world, and increase our own planet’s capacity for the kind of technological innovation that can fundamentally change our society. From reducing our dependence on fossil fuels, to uniting together in unprecedented peace, the problems of our modern time could well be solved by unknown life from a far, or, with commitment and focus, we can work to unlock our own technological potential, right here, right now.

This article originally appeared in Fort Russ News (FRN): A publication of the Center for Syncretic Studies on March 9th, 2018.

Andrew B. Raupp is the Founder / Executive Director @stemdotorg

“Democratizing science, technology, engineering and math (STEM) education through sound policy & practice…

2017 Year-end Cybersecurity Report

Image: @stemdotorg


Written by: Andrew B. Raupp / @stemceo

The digital revolution that we’re currently living through has already made the world better in a number of immeasurable ways. In just a few short years it’s become possible to work anywhere, anytime, thanks to the power that cloud computing brings to the table (1). Information sharing has become effortless and, thanks to analytics, largely automated (2). Even industries that are largely disconnected from the tech sector now rely on these types of advancements on a daily basis to work smarter, not harder, improving bottom lines across the board.

Unfortunately, the “always connected” environment that we’re now living in has also made the world far more dangerous at the same time — particularly as far as cybersecurity is concerned. According to a study that was recently conducted in association with IBM and the Ponemon Institute, the average cost of a single data breach incident is on the rise (3). Last year, the consolidated cost of a single event grew to a new record high of $4 million — up from the $3.8 million total the previous year. If you consider things in terms of each record that is lost, stolen or otherwise compromised, that breaks down to a cost to businesses of roughly $158 — also up from its previous record high of $154.

In an effort to keep up with the rapidly changing demands of an inherently dangerous Internet-driven culture, cybersecurity as a very concept has had to evolve just as rapidly. Even the United States government has begun to acknowledge just what a pressing issue this is with cybersecurity becoming a major focus of the Department of Homeland Security in recent years (4).

Understanding what cybersecurity is, why it’s important, the types of threats it helps to protect us against and the future of an entire industry is one of the keys to remaining protected in the understandably uncertain years to come.

What is Cybersecurity?

“Cybersecurity” is traditionally defined as the collection of technologies, processes and best practices designed to protect IT systems around the world from harm. It’s a term that has come to encompass the techniques used not just to protect individual computers, but also hardware and software resources, entire networks and the data that moves across them on a daily basis from attack, damage and unauthorized access (5).

It’s important to understand that in today’s world, cybersecurity encompasses both digital technologies (like proactive network scanning) and physical security (like data warehouse management systems) (6). Everyone from private businesses to government agencies to financial institutions, medical organizations and beyond work diligently to ward off the growing number of cyber attacks that are happening each day, both in an effort to safeguard confidential business or personal information and (in the case of the government) protect our national security.

The key takeaway is that in 2017, “cybersecurity” doesn’t describe any one particular solution or technique — it’s a combination of elements that, when taken together, all add up to something meaningful and proactive. Everything from traditional antivirus software to proactive network scanning, disaster recovery and business continuity planning efforts, operational physical security and even end-user education is all essential in terms of fighting off modern day threats.

To the last point, end-user education is simultaneously one of the most “low tech” and essential ways for a business to stay protected in the digital age. While it’s true that many newer attacks are growing more sophisticated by the day, the “tried but true” techniques that have been around as long as the Internet can still be alarmingly effective. The massive Russian cyber attackthat ended with the release of nearly 10 years worth of emails that were damaging to Hillary Clinton’s 2016 presidential campaign, for example, had its roots in one of the oldest malicious techniques that exists: a phishing attempt (7).

In March of 2015, Clinton campaign chairman John Podesta received an email saying that hackers were in the process of trying to infiltrate his Gmail account. The problem was that the email wasn’t legitimate at all — it was a counterfeit Google email aimed at tricking him into entering his username and password (7). After clicking on the fraudulent link and falling directly into the hands of hackers, the rest is history. Remove politics from the equation: had John Podesta not fallen victim to one of the most “low tech” methods of intrusion that currently exists, the world would likely look very different today.

All of this underlines the importance of looking at cybersecurity in the modern era less as any one particular technique and more as a complicated network of systems and processes, all working in tandem to guarantee 100% proactive protection at all times.

Image: @stemdotorg


The Importance of Cybersecurity: By the Numbers

John Podesta and the Hillary Clinton campaign are not alone — it is growing increasingly common to wake up and read about yet another massive data breach that has struck some of the largest organizations on Earth. Consider the following statistics as made available from a study from the Identity Theft Resource Center:

  • Between January 1, 2005 and February 8, 2017 there were over 7,000 different breaches confirmed by media sources and/or notifications from government agencies.
  • Throughout the course of those breaches, the 888,600,656 compromising records were stolen.
  • In 2015 alone there were over 169 million records stolen in 781 breaches across sectors like healthcare, education, financial, business and government.
  • In addition to hacking or computer intrusion (which includes things like phishing, ransomware and other malware), the leading causes of many of these breaches included things like insider theft, physical theft, employee error, employee negligence, improper disposal, unauthorized access and vulnerabilities that could be attributed to a subcontractor, third party or business associate.
  • This is a trend that shows no signs of slowing down anytime soon. In 2015, the total number of data breaches and other security incidents rose by an astounding 38% over 2014.

You would think that with numbers like these, people and especially businesses all over the world would already be taking steps to protect themselves from the dangerous digital environments that we’re now operating in. Unfortunately, you would be wrong. Consider the following statistics:

  • According to the Cisco 2016 Annual Security Report, the number of small businesses in particular that are taking steps to protect themselves is actually decreasing. Only 29% used standard tools to prevent breaches in 2015, while 39% indicated that they had done so in 2014 (8).
  • Roughly 52% of those who responded to a survey said that they were confident a successful cyber attack would strike their organization at some point within the next year (11).
  • Only 38% of those who responded to a survey said that they felt their global organization was prepared to handle a “sophisticated cyber incident” executing using multiple techniques (11).
  • When surveyed, 74% of CISOs indicated that they were at least somewhat concerned about their employees stealing valuable information (11).
  • 81% of people who had become victims of a data breach said that their business did not have the necessary system in place, nor the resources to manage it, to detect data breaches in real-time. Instead, almost all of them relied on notification from a third party partner (11).

The Lurking Implications of the Internet of Things

The Internet of Things (also commonly referred to as the IoT) is a concept defining a network made up of billions of devices, all connected to both the Internet and to each other, that are creating, storing and sharing information with one another in real-time. It’s the same fundamental technology that lets you automatically adjust the temperature in your home using an app on your smartphone, or that lets you instantly share real-time healthcare information with your primary care physician using a wearable device like a smartwatch.

Now, consider two things. First, the fact that any device connected to a network — from the most powerful computer to a smart television set — is a potential vulnerability just waiting to be taken advantage of by someone who knows what they’re doing. Next, think about the fact that Cisco estimates there will be 200 billion devices all over the world that make up the Internet of Things by 2020 (13). Those two facts paint a very broad picture about the potential cybersecurity implications looming just over the horizon as the IoT becomes a more ingrained part of our lives in the not-too-distant future.

  • According to estimates from the research firm IDC, spending on the Internet of Things will top $1.7 trillion annually by 2020 (13).
  • This number is made up in part of the massive “smart home” industry, which itself generated $79 billion in revenue in 2014 (13).
  • By 2020, 90% of all cars sold worldwide will be connected in some way to the Internet of Things (13).
  • If you limit the discussion to just smart watches, fitness trackers and other types of wearable devices, there will be 173.4 million devices in the wild by 2019 according to IDC experts (13).

WIth the sheer volume of data being created and transmitted thanks to the Internet of Things alone, it is imperative that cybersecurity move away from reactive strategies of “wait and respond” and into proactive territory. Even techniques like network scanning must evolve to not only offer real-time identification, but must embrace predictive analytics in an effort to identify suspicious behaviors and patterns to stop problems before they have a chance to occur.

The Future of Cybersecurity Careers

As one would expect when talking about a topic as important and as pressing as cybersecurity, careers in the field are constantly in-demand in nearly every segment that you can think of. According to a study conducted by the University of Maryland University College, there were actually be a global shortfall of about 1.5 million positions in the field by as soon as 2019 (9).

Likewise, the demand for talented individuals trained in state-of-the-art cybersecurity techniques and systems is expected to grow rapidly — according to the Bureau of Labor Statistics, demand for information security analysts is expected to grow at 18% per year between 2014 and 2024, which is much faster than the national average for other positions (10). For reference, the media pay for an information security analyst in 2015 was $90,120 per year, which breaks down to roughly $43.33 per hour (10).

People like information security analysis are so important moving forward because they’re not just tasked with making the best use of existing technologies to allow us to stay protected. They’re also tasked with coming up with all new ones (10). As the techniques of hackers and others with malicious intentions become more sophisticated and advanced, cybersecurity efforts must change along with them. These are the people who will be mission-critical in terms of actually creating the innovative solutions needed to combat the digital threats of tomorrow, let alone the ones of today.

Potential employers for future cybersecurity professionals include nearly every sized business in every industry that you can think of. The major factor to understand about cybersecurity is that it is an issue that doesn’t discriminate. Hackers can potentially steal just as much from private citizens as they can from state governments depending on the information they obtain and the value of that data on the black market.

Even healthcare, which one probably would not think about when making a list of high value targets, is actually the single most targeted sector there is(12). A hacker who obtains someone’s credit card information might be able to make a few hundred dollars in fraudulent purchases before getting shut down. A hacker who obtains medical records, on the other hand, could potentially make hundreds of thousands of dollars in fraudulent equipment or medical purchases that can then be resold at a premium on the black market.

Because of this, cybersecurity isn’t just an in-demand form of employment — it’s needed by any business or other organization that uses the Internet in any way. Which, in 2017, is “all of them.”

In the End

Technology isn’t just an important part of our lives — it is perhaps the most important part, both in terms of our personal lives and in the world of business. “Cybersecurity” no longer involves just “making sure that your computer doesn’t have a virus” or “helping to protect you if your credit card information gets stolen on your next shopping trip.” The implications of a data breach in 2017 have potentially devastating consequences, to say nothing of how things will grow more severe incredibly rapidly as the Internet of Things and similar technologies take hold.

Cybersecurity, along with the hardworking men and women who make up this field, will become our first lines of defense to help guarantee that we as a society enjoy all of the benefits that our connected lives bring to the table with as few of the potential cyber cataclysms as possible. Make no mistake: the importance of cybersecurity as a very idea and as a value simply cannot be overstated enough.

Andrew B. Raupp is the Founder / Executive Director @stemdotorg

“Democratizing science, technology, engineering and math (STEM) education through sound policy & practice…