Innovative Minds - On Point - One Group  

MindPoint Group Blog

26
Dec
2018

2018 YEAR IN REVIEW: Giving Back To Our Community

By:

MindPoint Group is proud to support organizations working to strengthen our communities through our Volunteer Initiative Program (VIP). Through the combined efforts of our enthusiastic employee volunteers and corporate contributions, we endeavor to give back to the communities in which we operate by supporting non-profit organizations that address community needs and issues.  All community initiatives are led by employee volunteers with full sponsorship from the company. This approach allows us to support non-profit organizations that are important to our employees.

As we approach the end of 2018, we want to give a big shout out to our VIP committee members for their amazing efforts and collective impact this year.  We are so very proud of being able to give back to our community and what we were able to accomplish together as a company and look forward to an even more impactful year in 2019!

 


Want to learn about our open positions?  Click this link

Categories: Cyber Security and tagged , , , , ,
Share:
 

MindPoint Group Blog

26
Aug
2018

MindPoint Group Achieving Diversity Without Mandate…What’s in the Secret Sauce?

By:

Frequently stated, not often enough repeated, “Diversity is an action, inclusivity is a culture, and belonging is a feeling” (Forbes, 2017).

Earlier this year, MindPoint Group (MPG) sponsored a group of employees, including myself, to attend the 5th Annual Lesbians Who Tech Summit. During the conference, I remember feeling chills run through my body as I sat in the Castro Theatre for the opening ceremony. I looked around the auditorium at all of the other technology minded professionals from many different walks of life. The space was both lavish and intimate. The Art Deco motif mixed with elegant pieces of rare furniture further accentuated the very sentiments behind the reason for our attendance.  I looked around and felt a feeling that had become very familiar to me: conscious of myself, and of the people around me. However, it was not alienation that I felt, but cohesion and appreciation of the uniqueness I was surrounded with.

I returned from this conference excited about how empowering and rare it is to be a part of the LGBTQ community in technology, particularly cybersecurity. The Lesbians Who Tech (LWT) Summit included over 5,000 Lesbian, Queer Women and Allies in all areas of technology. I was inspired not only being able to engage in my professional passion of cybersecurity every day, but humbled that I can do it while feeling comfortable being myself. When thinking about this further, I realized that this is the first company that I have worked for where I have been able to share several of my invisible identities with those who I work with.  When I first joined MPG over five years ago, I was optimistic yet somewhat skeptical that I would not be embraced by the company’s partners, management team, and employees should I decide to bring my “whole self” to work. It was important to me to be able to live transparently in all facets of my life, especially being able to feel like my genuine self while doing the work that I love. Somewhat reluctantly, I began to let my guard down and allow myself to share various aspects of my identity with those who I worked with. The response and inclusivity at MPG quickly demonstrated to me that this company believes in fostering a true, trusting environment; one where everyone can learn to work creatively and productively while being surrounded by all types of diversity.

In wanting to share my experience at LWT with others, I began to reflect on the things I heard during various conversations, breakout sessions, and seminars. I came to realize that many people did not share my workplace experience and support.  Instead, many had to make heartbreaking sacrifices to leave a job that they loved in order to remove themselves from a toxic work environment. For some, removing themselves was not an option, and as a result, they were not able to bring their whole self to work. Reflecting on life at MPG thus far, I realized I could be unapologetically me; having been inspired by notable members of the LGBTQ community such as comedian and writer Lena Waithe; businesswoman, actress and transgender rights advocate Angelica Ross; and US Virgin Islands Senator Janelle Sarauw who were all breaking barriers in not only their communities and field, but creating a cultural shift that inspired people to be true to themselves, and enabled them to be “free to be me.”

After self-reflection of my current workplace environment, I contemplated how I came to feel so comfortable here at MPG. It became evident to me that MPG is clearly built on the foundation of inclusion, as represented by the population of diverse employees within the organization.  Interestingly enough, while researching for this blog, I discovered that they do not actually have a documented diversity program. This revelation raised many questions for me:

  • How did they manage to accomplish such diversity within the company?
  • Once established, how is diversity and inclusion maintained within the organization?
  • As the company continues to grow, how are they able to ensure diversity and inclusion remain one of the pillars of the company’s foundation?
  • All of those questions lead me to one overarching question that I was determined to discover the answer to: What is the secret sauce to achieving such diversity and inclusion without a mandated policy?

So I set out to find answers to my questions by seeking statistical data as well as MPG’s perspective on some of these topics through interviews with the partners about their experiences and commitment to diversity and inclusion, and the importance that it plays while continuing to build and grow this company.

Women in the Cybersecurity Workforce

Since the end of the industrial revolution, more and more women are trading in their baking pans for briefcases. For cybersecurity and other predominately male dominated industries to become truly diverse and progressive, organizations across the globe must act to eliminate the rampant and often unapologetic sexist cultures and toxic norms.

According to “The 2017 Global Information Security Workforce Study,” women comprise only 11% of the global cybersecurity workforce and only 4% of leadership positions.  In comparison, at MPG women comprise 25% of the company’s workforce which is 13% higher than the global average.  More interestingly, women make up 40% of the leadership team at MPG which is astonishingly 10x more than the global average.

How is the Leadership Team Committed to Diversity?

As a managing partner and Vice President of Corporate Operations at MPG, Mariam Es-Haq understands first hand the many challenges women face in the workforce having experienced different forms of workplace discrimination throughout her career. Leveraging these experiences, she advocates diversity in all facets of business is vital to sustaining a positive and healthy workforce, stating “at the core of who we are at MPG is diversity, acceptance, celebration of individuality and perspective that each unique identity brings to the group.” This belief has translated into a corporate culture and a company that is a:

  • Promoter of “Bring Your Whole Self to Work”
  • Advocate of Diversity of Perspective / Experience
  • Early adopter of Benefits for All (gender neutral) prior to State and Federal Mandate
  • Activist of women in cybersecurity and STEM education
  • Champion of Professional Development / Career Growth

All of these components of MPG’s culture and the support shown to its employees when hiring members of minority populations enable MPG to become representatives of diversity and intentionally buck the norms of resistance to diversity in a corporate arena.

How do you keep the momentum of diversity going as MPG continues to grow?

“It’s simple really, by paying it forward and putting your money where your mouth is.” In hearing Marc Dixon, Managing Partner and Vice President of Business Development Operations, speak on this topic, it is clear that MPG continues to make their presence known in the cybersecurity realm. Dixon said “we are always looking for ways to support and promote programs or initiatives that provide opportunities for various diversity groups to have greater participation in our industry. Case in point, the goal of having more women in technology, specifically cybersecurity, is an ongoing focus for us. We consistently support programs that work toward that objective from internal training and mentorship of female employees in more technical fields such as security engineering or penetration testing to sponsorship of STEM programs at grade schools.” I nodded in agreement as I echoed the statements of Marc, thinking about the corporate initiatives that we have participated in from a philanthropic standpoint. As a member of MPG’s Volunteer Initiative Program (VIP), I know firsthand the monetary commitments and resources that MPG makes to further the diversification of this field, knowing that this specific return on investment is not primarily focused on increasing the company’s bottom line. Instead, the value that is assigned to these activities is much more substantive, coming in the form of creating future generations of diverse and inclusive environments, aimed at opening the door to individuals of typically marginalized populations.

Minority Representation in the Cybersecurity Workforce

While reviewing data compiled from the U.S. Equal Employment Opportunity Commission for the San Francisco Bay area, the “Scan Progress for Minorities in Cracking the Glass Ceiling” report found that in 2015, the racial gap in technology leadership positions between white men and minority men was larger than the gender gap between white men and white women. Even more astounding to discover was the fact that white women were 31% more likely than Hispanic men to be executives, 88% and 97% more likely than Asian and Black men respectively to hold those same positions. There aren’t too many ways this data can be interpreted other than for minority women, being underrepresented in both groups, it turns out that race, not gender, was the more important factor in limiting this demographic from successfully entering the management pipeline.

According to “Innovation Through Inclusion: The Multicultural Cybersecurity Workforce, 2017,” only 26% of the U.S. cybersecurity workforce is comprised of minorities. In comparison, MPG’s workforce is comprised of 55% minorities, which is 29% higher than the U.S. average but more importantly, at 55% of the workforce, minorities represent the majority at MPG, creating a truly diverse work environment.

With regard to minority representation in leadership, at MPG minorities make up 67% of the leadership team, compared to 23% of the U.S. average.  That equates to 44% more minorities in cybersecurity leadership positions at MPG than the U.S. average.

The statistics referenced above speak to the fact that while we still need to make significant progress in terms of diversity, the increase in women and minority representation is due to the efforts of companies like MPG who understand that diversity of perspective is key to innovation and success. As a manager in the field, I know how important it is for everyone on a team to be able to bring different ideas to the various problems we are tasked with solving. From the creative methods used to securely thwart cyber attacks of environments, it has been proven that in fields that value innovation and new ideas, diversity undoubtedly helps.  A study that demonstrates this is “How Diversity Makes Us Smarter,” by Katherine W. Phillips.  The study was designed to examine the influence of racial and opinion composition in small group discussions. The cogent evidence illustrates that diversity propels us to act cognitively in ways that homogeneity simply does not.

Based on my conversations with the partners at MPG, they figured out very early on the key to diversity and the positive impact it can have on the company and the cybersecurity industry. They understand that due to the technical nature of the field, people are often brought together to solve problems in groups. When those groups consist of homogeneous individuals, it often times makes it difficult to bring forth different opinions and perspectives, components that are vital while trying to be innovative. People who differ in gender, race, age, and various other dimensions bring unique information and experiences in support of the task at hand.

How is the Leadership Team Committed to Diversity?

Taking into consideration barriers to entry, support of employees with education and training, and inclusion of minorities in positions of leadership, Managing Partner and Vice President of Information Security & Privacy, Matt Shepherd, shares his rationale for why he believes strongly in creating a culture that ensures diversity is incorporated at each level. “If we take a hard look at MPG, I do not think we would be disappointed at what we saw. As an executive team, we have made sure there are no barriers to entry for candidates who pursue employment with MPG. We have very serious intentions for supporting diversity and would like to think we have created safe spaces for employees to share their concerns openly,” says Matt. The creation of an environment where employees at MPG know who in leadership positions they can go to for questions, ideas, and criticisms related to diversity and inclusion, and receive visible support is one that was very intentional. He too shared the sentiment of Patti Chanthaphone, Managing Partner and President that there is always more that can be done. This illuminated an important component of the answers that I have been in search of; that there is no end to achieving diversity and inclusion. Ensuring and appreciating the independence of humanity, cultures and practicing a mutual respect for qualities and experience different from that of our own does not happen accidentally, neither is it an activity that starts and ends.

How Does Diversity Impact Employee Hiring?

At this point, it was pretty clear to me that MPG was founded on strict principles of diversity and inclusion from the partner level, as evident in the diverse makeup of the leadership team. One of my questions had been answered: How did they manage to accomplish such diversity within the company? Answering that question only brought about others; how exactly does diversity impact employee hiring? As I posed this question to Managing Partner and President of MPG, Patti Chanthaphone, it became even more evident that diversity wasn’t an abstract concept or practice at MPG, it was MPG. Patti said that “although we (the four Partners) all come from very different backgrounds and ethnicities, we all share many of the same beliefs and ideologies of what a workplace should look like.” It was only after getting involved in the SBA programs did she realize the uniqueness of the company’s ownership, saying that “the culture here is built on empowering our employees. Programs and contracts show that we are geared to redefining diversity in the cybersecurity realm.” I thought to myself, whether it is conscious or not, the partners were communicating that this field should not be dominated by males or any other majority group. With the proliferation of cybercrime in today’s day and age, companies in the cybersecurity industry who are able to be agile in their recruiting methods and remove the boundaries and typical methods for recruiting talent will inherently be able to provide the most innovative and talented pool of resources to their clients.

So how did It Happen?

After individually examining the four partners’ thoughts on diversity and inclusion in the workplace, I thought it prudent to examine all of the parts of the leadership team together.

When you examine who these individuals are, it is no surprise MPG’s inclusive culture started with its four (4) founding partners who were the initial champions of its inclusive culture and who laid the groundwork for the company’s diversity.  The founding partners are comprised of:

  • 75% (3 out of 4) Minority,
  • 50% (2 out of 4) Female,
  • 25% (1 out of 4) LGBTQ,
  • 25% (1 out of 4) Caucasian, and
  • represent four different religious backgrounds.

More interestingly, 3 out of the 4 partners are/were in interracial marriages and have beautiful interracial children which gives them a unique and vested perspective and appreciation for diversity and inclusion.

(MPG Partners from left to right –  Marc Dixon, Patti Chanthaphone, Matt Shepherd, Mariam Es-Haq)

Diversity Cannot be Achieved Without Allies

Too often, I think we forgot that true diversity means inclusion of everyone, and that it takes participation from everyone to achieve diversity.  While so far, I have dedicated a significant amount of this blog to highlighting the “minority segment” that contributes to diversity, I think it is equally important to have a discussion regarding the importance of allies to diversity.  While interviewing for this blog, I asked the partners a series of questions.  One question was “Do you feel you can disclose your entire identity at work”.  All of the partners who I interviewed on this specific question are part of the ”minority segment”. When asked if he was able to disclose his entire identity in the workplace, Matt Shepherd responded, “I feel my viewpoint is irrelevant on this question. I don’t think it would be fair of me to claim there are some aspects of my identity that I have to keep secret because I think it diminishes the real concerns that people might have about discrimination based on gender, sexual orientation, and any other aspects that they feel they may need to conceal, even to the point of having to be fearful of their personal well-being. I am a white, CIS [cisgender], heterosexual male, so typically, the default setting of society and certainly the workplace in the cybersecurity industry for me is “comfortable.” He went on to further explain, not casting aside individual issues that a white, CIS, heterosexual male may have as being valid ones, but also acknowledging the importance of specific attention being paid to protecting any demographic from discrimination.

In that moment, I realized how important diversity was to the four partners; the notion that no one needs to sacrifice the importance of their own diversity to ensure others feel included was a powerful concept. It was in this moment I knew I had found the last ingredient to the secret sauce, the recipe was complete! At MPG, diversity and inclusion were baked into the mold, as a founding principle of the company. Even with the foundations being deeply rooted in equality,  preservation of such a culture would be difficult to maintain without the help of Allies. These individuals are typically members of the dominant group who work to end the oppression in their own personal or professional lives by supporting and advocating change. These thoughts took me back to my memorable experience at LWT. Without the need for excessive deliberation, I realized that more often than not, allies are some of the most effective and powerful voices of any movement, and that was certainly the case at MPG.

So What’s the Recipe for the Secret Sauce

As I continued the conversation with the partners, I also began to see a reoccuring theme that MPG was founded by a group of individuals who in one way or another have experienced or witnessed discrimination. Despite the negativity that they have witnessed, they did not run away from adversity, but took it upon themselves to do their part in the proliferation of diversity in the cybersecurty industry, by creating a company. One that makes sure people who may not fit into the majority are empowered enough to bring their entire identity to MPG, not only because diversity and inclusion inherently increase the strength of a workforce, but also because it is simply the right thing to do.

The answers I found throughout my journey boil down to the following ingredients:

Ingredient 1 – Four Parts Common Mindset:

The four partners that established MPG reflect different backgrounds and thus established this organization based on a very strong belief in diversity. The founding partners all come from very different places and were united because they all had the same mindset. Getting involved in the SBA 8(a) and WOSB programs, reading about each other’s socioeconomic backgrounds and associated bias, discrimination and other challenges as well as successes helped them see just how unique MPG is. The company culture that was established inherently uses this uniqueness to ensure all employees and programs are geared to reinforcing diversity not only in our workplace, but in the field of cybersecurity. MPG believes that this field and the company can be just as successful if not more with a diverse workforce.  Our diversity program may not be as formalized as many companies, but it is embedded in the fundamental beliefs and behavior of our leadership team, and our company culture.

Ingredient 2 – Equal Parts Fairness:

“There is a commonly used phrase “the underdog” that comes to mind when I think about the need for diversity.  In social justice, an underdog is a victim of injustice or persecution.  In sports, the underdog is the player or team who face tremendous odds and as a result is the predicted loser in a struggle or contest.  Women, minorities and blue collar workers of all races are the underdogs in our current workforce whether it is due to gender-bias, harassment, discrimination, or simply because of the lack of skills and training to participate in an economy transitioning to highly skilled labor.  For me, it’s not enough to root for the underdog.  You must empower and give the underdog a fair chance to succeed. The rest is up to the individual.” – Mariam Es-Haq, Vice President/Managing Partner

Ingredient 3 – An overflowing cup of Experience:

Members of the executive team understand the importance of never underestimating the value that people who share different experiences can bring to the workplace. Those from various backgrounds, with unique perspectives, entrenched in different cultures and lifestyles, all enrich the professional experiences of those around them. Encountering new concepts, values, and behaviors leads to thinking in deeper, more complex, and more creative ways to solve problems. By embracing each other’s differences, we can spark innovation, better understand and serve our customers, and gain competitive advantage (after all, we are talking about a business).

Ingredient 4 – A Slice of Life:

Ensuring diversity not as a priority, but a way of life. To reiterate, MPG’s leadership collectively represents almost all the groups represented by the diversity spectrum (age, sex, race and ethnicity, gender, sexual orientation, religious and political beliefs, disability, personality, socioeconomic status, education, and culture) in some capacity. And because that is the case, I believe that we are committed to making sure that diversity here is nurtured and sustained as a way of life rather than promoted as a mandated requirement. Hailing from all walks of life, MPG encourages its employees to bring those differences to the workplace adding their slice of life to the diversity recipe.

Directions:

After personally sampling the ingredients of the secret sauce, I now have answers to the questions posed at the beginning of this blog post. The how is pretty evident: the establishment of diversity within the company was accomplished during the inception of MPG. Before the first small business designation was even applied to the organization, the partners managed to ensure the importance of diversity and inclusion permeated throughout all layers of the organization. In this field, as rapidly as security threats change, it is vital that cybersecurity practitioners can combat those threats with innovation and originality. MPG has created a full course meal of strategic problem solvers who are equipped to affect change, manage diverse groups of people, and ready to nourish the appetite of this industry. Like the climate in the Castro Theater at LWT, the temperature to create diversity is perfect. As you determine what parts of the diversity recipe your organization is missing, try adding some of the ingredients listed above. I guarantee if your leadership team are as good of cooks as those at MPG, your recipe is sure to yield a Michelin star meal.


Want to be part of what we do next?  Join our Team.


Citations

Buck Gee, Denise Peck. The Illusion of Asian Success : Scan Progress for Minorities in Cracking the Glass Ceiling from 2007-2015

How Diversity Makes Us Smarter,” by Katherine W. Phillips

The 2017 Global Information Security Workforce Study: Women in Cybersecurity, 2017

Innovation Through Inclusion: The Multicultural Cybersecurity Workforce, 2017

The Lesbians Who Tech Summit

Categories: Cyber Security and tagged , , , , , , , , , , , , , , , , ,
Share:
 

MindPoint Group Blog

26
Jun
2018

Guide to Creating a Cybersecurity Challenge for Kids

By:

By:  Stephanie Carruthers and Nolan Kennedy

“Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick Driggers, from DHS at the Cyberthreat Intelligence Forum, reported on FedScoop. Driggers goes onto ask “So what are we doing to engage K-12”? As a Cybersecurity consulting firm, MindPoint Group (MPG) deals with this industry deficiency daily. To address the issue the company decided to utilize its Volunteer Initiative Program to begin a partnership with a local Washington DC school and begin cultivating future Cybersecurity professionals. MindPoint Group’s cyber challenge strives to introduce the growing field of Cybersecurity and hopefully get the kids excited through education and peak their interests in Cybersecurity as a possible career path.

On June 2, 2018 MindPoint Group hosted its second annual Ludlow-Taylor Elementary School Cyber Challenge. The event hosted at MindPoint Group’s Alexandria, VA facility comprised 4th and 5th grade participants from Ludlow-Taylor Elementary.

This year’s Challenge introduced the kids to two Cybersecurity-related fields of study,

  • Online Cyber Sleuthing using Social Media and
  • Secret Writing with Codes and Ciphers.

Descriptions of how each category was presented is broken out in the sections below.

Online Cyber Sleuthing using Social Media

The activity’s objective was to express the importance of using discretion when sharing information online. The topic was reinforced by guiding the class through a specially tailored social media page and allowing students to interactively call out as they spotted information that could be leveraged by someone with bad intentions. Data was seeded throughout the social media page to highlight several common vectors of information sleuthing:

  • Geotagged posts
  • Friends and family tagged in photos
  • Personal information such as phone numbers, email and home addresses, as well as places of employment
  • Daily routines and schedules
  • Personal interests and hobbies

Once a potential attack vector was identified, the class was asked to provide creative examples of how the information could be misused. Practical demonstrations of how the information could be leveraged were also shown, including using Google Maps street view to eerily scope out a home address and wielding personal interest data for password guessing and account hijacking.

Sleuthing Pippy’s Profile

The class started by visiting the public social media page of Pippy Horsse.

We browsed through Pippy’s timeline to get a quick overview of what Pippy had been posting lately.

We saw posts including phone numbers:

We saw posts with geotagged locations and schedules:

Finally, we some silly posts that though personal, provided contrast to the higher risk posts to help the students discern between the two:

After looking through Pippy’s timeline, the class then proceeded to dig through the “About” section of her profile. We quickly noticed a home and email address, and decided to put the home address into Google Maps and saw Pippy outside her home!

Pressing forward, we came to a list of family members. Used alongside a tagged photo posted by Pippy, we could now identify Pippy’s immediate family.

The real gold was in the “Details About Pippy” page, where we used the information provided to make an educated password guess against Pippy’s email address that we saw earlier.

After logging into Pippy’s email, we had the social media site send us a Password Reset email to demonstrate how we could potentially compromise every account associated with this email address.

This activity came to an end with a reminder to the class that we do not always know the people looking at the information we share online. Being smart about the information we share is an important habit to build as we continue to invest more and more of our time using the internet.

Secret Writing with Codes and Ciphers:

For this activity each student received a Secret Writing Manual. The manual contained information and images on numerous types of codes and ciphers.  Students learned that codes have replacement symbols, letters, or numbers and that ciphers have a key that both parties would need to know.

Many of the methods covered can be found in the book Top Secret: A Handbook of Codes, Ciphers and Secret Writing by Paul B. Janeczko. After discussing each method in the manual, the students broke into two groups and received their kits. The kit included:

  • two Caesar Cipher wheels (paper template located here);
  • one wooden rod (a dowel cut down to about 10” in length then sanded);
  • one strip of red film (similar to the red one in the pack here);
  • and an envelope containing their first puzzle.

Kit and Puzzle #1

Once students opened their first puzzle they received a strip of paper with unreadable letters. In order to decipher the message, the students then needed to use the wooded rod included in their kit. This cipher is called a Scytale cipher.

Once the students wrapped the strip of paper around the rod, their message read “Good job the password you seek is Hulk.” After telling the MindPoint Group team their password was Hulk, they received their next puzzle envelop.

Puzzle #2
In this envelope the students received a piece of paper with a message they would need to decipher. The paper’s text read “qlfhob grqh wkh qhaw sdvvzrug brx qhhg lv frpsxwhu.” This cipher is a Caesar Cipher and by using their Caesar Cipher wheels with a traditional shift of 3, when decoded the message read “nicely done the next password you need is computer.” After telling the MindPoint Group team their password was computer, they received their next puzzle envelope.

Puzzle #3
After opening the envelope, students received a paper containing groups of numbers that they would need to decipher. The cipher used is called a Greek Square Cipher (also known as Polybius Square). The key to this cipher was located in the student’s manual. After deciphering this message, the student were able to read “Congrats your new pass is kit kat.” After telling the MindPoint Group team their password was kit kat, they received their next puzzle envelope.

Puzzle #4
After opening the envelope, students would find a piece of paper with what appeared to be yellow and red scribbles on it. For this puzzle, students would need their red film strip to read the message. This is called a Red Reveal (you can read more information on how to make them here).

Once the students used their film to read the hidden message, it read “Cool now you see me! Password: (five symbols).“ The symbols used a Pigpen Cipher, which students would decipher to receive the word “Sloth.” After telling the MindPoint Group team their password was sloth, they received their next puzzle envelope.

Puzzle #5
This final puzzle contained two items: a deck of playing cards and a key.

This Playing Card Cipher needs a key in an agreed upon suite pattern and card pattern. In order to read the secret message, you’d need to put the cards in the right order, by using the key.

When all of the cards are stacked using the correct key, the message is readable on the side of the deck.

When the students informed the MindPoint Group team their password was pizza, they received their prize for completing the challenge.

Tips for Administering the Challenge for Older Student’s

If you are working with an older age group here are some tips to making these challenges a little more difficult:

  • The messages that need to be decoded can be a lot longer.
  • You should make the deciphered code word as another cipher. For example, on Puzzle #1 and using the Scytale, instead of plain text you could use a Pigpen cipher for the whole message.
  • When giving a Caesar Cipher puzzle, don’t tell the students what the shift number is, but have a clue hidden somewhere. For example, add six stickers on the envelope for a shift of six.

The students had a lot of fun and are already looking forward to next year. MindPoint Group is honored to continuing this journey and work with the next generation of future cybersecurity professionals.

About MindPoint Group’s Volunteer Initiative Program

MindPoint Group’s Volunteer Initiative Program (VIP) is a group of employees who are dedicated to community outreach through direct support of various charity organizations and programs. As a company, we recognize that with prosperity comes the responsibility to give back to the society of which we all are members. Since 2012, our volunteer initiatives have ranged from rolling up our sleeves providing direct physical support to charities, to financial support through donations as well as representing the company at national charity events. VIP is led by a committee that regularly convenes to approve sponsorship requests, support event planning, and coordinating events throughout the year. VIP actively promotes and encourages all employees to get involved and support both local and extended communities particularly those in which we all share membership.

VIP STEM Project:

  • 2018 Sponsorship/Enrollment of William-Ramsey Elem. School Top Math students in Congressional ‘s Cybersecurity Specialty Camp
  • 2018 Ludlow-Taylor Elementary School Cyber Challenge
  • 2017 Ludlow-Taylor Elementary School Cyber Challenge
Categories: Cyber Security, ISP Blog, Passwords, Risk Assessment, Risk Management and tagged , , , , ,
Share: