2022 Innovations

The National CyberWatch Center’s Innovations in Cybersecurity Education Awards and Recognition Program is a vehicle where cybersecurity educators can share their advancements and innovations in their programs, accelerate adoption of new ideas throughout the academic community, and receive proper recognition for their work.


A review panel of peer educators evaluated all submissions and a Best Submission and Best Submission Runner-Up, along with select entries were selected in each of the following categories:

  • Evidence-based Strategies: How does your innovation impact individual competence development or organizational effectiveness? How can we be sure our teaching or the cybersecurity practices included in a curriculum actually work? Other examples include:
    • Theory or Essay: make claims and supporting statements without conducting a study
    • Expert opinion or (selective) qualitative literature review: a narrative listing/evaluation of information (opinion or publication) backing a claim
    • Case study or uncontrolled observation: a narrative description of evidence to back a claim from a detailed study in one setting
    • Case comparison or meta-synthesis (systematic review): a narrative synthesis of evidence from multiple settings that backs a claim
    • Retrospective (cross-sectional) cohort study: one-time measure of others’ opinions using a survey or other observation to obtain correlations
    • Prospective (longitudinal) cohort study: repeated measure of others’ opinions using a survey or other observation to obtain correlations
    • Quasi- or non-randomized experiment: selectively sampled measure of predictive relationships in a natural setting using statistical controls to obtain direct and indirect effects from a model comparison
    • Randomized controlled experimental study: randomly sampled measure of predictive relationships in a controlled experimental setting to obtain difference scores
    • Meta-analysis: a quantitative synthesis of evidence to produce corrected correlations (p) of predicted relationships
  • Instruction: How do you teach cybersecurity principles, safe practices, and hands-on skills? What are creative designs that make instruction more effective?
  • Practice: How do you incorporate new technologies, tactics, and techniques into your curriculum? What are program elements that help develop competent faculty?
  • Program Development: What are the unique features of your cybersecurity education program? Describe the partnerships that have been instrumental in creating effective innovations


  • Submissions were accepted from Feb. 18, 2022 (12:00 pm ET) – May 10, 2022 (11:59pm ET)
  • You can submit more than one innovation
  • Submissions chosen for inclusion in the Innovations booklet will be published as they are received (be concise, please proofread carefully and be mindful of grammar, spelling, and typographical errors)
  • Submit only innovations that are currently in use or have been used in cybersecurity education. Please do not submit ideas or innovations that may be used in the future
  • Your submission will require including links to your Innovation’s website, pictures, press releases, etc.

For more information about the Innovations in Cybersecurity Education program please email info@nationalcyberwatch.org


  • Provide a platform for recognizing innovative ways that cybersecurity education is taught
  • Provide a pathway for faculty to submit to the prestigious Cybersecurity Skills Journal (CSJ)
  • Disseminate educator’s innovations through the annual Innovations in Cybersecurity Education publication, via National CyberWatch monthly e-newsletters, blogs, dedicated marketing emails, at conferences, and in robust social media campaigns
  • Reinforce support for creative solutions to educational challenges
  • Provide the community with a growing inventory of programs and educators from which to find and emulate good ideas


  • Bring national prestige to the contributing educator and institution
  • Join a dynamic national network of innovators
  • Eliminate the reinvention of the proverbial wheel by bringing awareness to what other institutions are doing that is proven successful
  • Included in the Innovations in Cybersecurity Education publication
  • Acknowledged (winners) during opening plenary session at the annual Community College Cyber Summit (3CS)