{"id":138,"date":"2025-02-17T01:51:42","date_gmt":"2025-02-17T01:51:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=138"},"modified":"2026-03-07T19:40:42","modified_gmt":"2026-03-07T19:40:42","slug":"cyse-368","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/cyse-368\/","title":{"rendered":"CYSE 368 &#8211; Cyber Clinic"},"content":{"rendered":"<h2 data-section-id=\"19oo5hc\" data-start=\"241\" data-end=\"268\">ODU Cybersecurity Clinic<\/h2>\n<p data-start=\"270\" data-end=\"705\">During my time at <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Old Dominion University<\/span><\/span>, I had the opportunity to participate in the <strong data-start=\"371\" data-end=\"399\">ODU Cybersecurity Clinic<\/strong>, a program that allows cybersecurity students to work with real organizations to strengthen their security practices. The clinic operates in partnership with industry professionals, including mentors from <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Valor Cybersecurity<\/span><\/span>, who guide students through real-world cybersecurity projects.<\/p>\n<p data-start=\"707\" data-end=\"1007\">As part of this experience, I worked on a small team of three students to conduct cybersecurity risk assessments for several local businesses. These assessments involved evaluating security practices, identifying potential vulnerabilities, and recommending improvements to reduce cybersecurity risks.<\/p>\n<p data-start=\"1009\" data-end=\"1323\">Because the work involved real organizations and sensitive information, some project details cannot be disclosed due to a non-disclosure agreement (NDA). However, the experience provided valuable insight into how cybersecurity professionals evaluate risk and develop practical security solutions for organizations.<\/p>\n<hr data-start=\"1325\" data-end=\"1328\" \/>\n<h1 data-section-id=\"2lwizd\" data-start=\"1330\" data-end=\"1362\">Cybersecurity Risk Assessments<\/h1>\n<h3 data-section-id=\"1o7ic3d\" data-start=\"1364\" data-end=\"1375\">Context<\/h3>\n<p data-start=\"1376\" data-end=\"1640\">Our team was tasked with conducting cybersecurity risk assessments for <strong data-start=\"1447\" data-end=\"1471\">six local businesses<\/strong>. The goal of these assessments was to evaluate each organization\u2019s cybersecurity posture and identify potential vulnerabilities that could expose them to cyber threats.<\/p>\n<h3 data-section-id=\"q7zcng\" data-start=\"1642\" data-end=\"1656\">What I Did<\/h3>\n<p data-start=\"1657\" data-end=\"1932\">Working as part of a three-person team, I participated in reviewing security practices and identifying areas where improvements could be made. This included evaluating aspects such as access control, security awareness, system configurations, and incident response readiness.<\/p>\n<p data-start=\"1934\" data-end=\"2231\">After identifying potential risks, our team developed recommendations to help the organizations improve their security posture. These recommendations were presented in a professional report designed to help business leaders understand their cybersecurity risks and potential mitigation strategies.<\/p>\n<h3 data-section-id=\"f6com9\" data-start=\"2233\" data-end=\"2247\">Reflection<\/h3>\n<p data-start=\"2248\" data-end=\"2654\">This experience allowed me to apply concepts from my cybersecurity coursework in a real-world environment. Conducting risk assessments helped me develop a stronger understanding of how organizations evaluate cybersecurity threats and prioritize security improvements. It also strengthened my ability to communicate technical cybersecurity concepts in a way that non-technical stakeholders could understand.<\/p>\n<hr data-start=\"2656\" data-end=\"2659\" \/>\n<h1 data-section-id=\"1kpt68e\" data-start=\"2661\" data-end=\"2728\">Featured Project: FLY Enterprises Security Improvement Initiative<\/h1>\n<p data-start=\"2730\" data-end=\"3020\">One of the organizations our team worked closely with was <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">FLY Enterprises<\/span><\/span>. This project involved a more in-depth analysis of the organization\u2019s cybersecurity practices and the development of several security resources to help strengthen their overall security posture.<\/p>\n<h3 data-section-id=\"1da8l2f\" data-start=\"3022\" data-end=\"3042\">My Contributions<\/h3>\n<p data-start=\"3043\" data-end=\"3225\">As part of this project, I contributed to developing several cybersecurity resources designed to improve the organization&#8217;s security awareness and incident readiness. These included:<\/p>\n<ul data-start=\"3227\" data-end=\"3393\">\n<li data-section-id=\"nbkcwd\" data-start=\"3227\" data-end=\"3268\">\n<p data-start=\"3229\" data-end=\"3268\">Security awareness training materials<\/p>\n<\/li>\n<li data-section-id=\"fwcssh\" data-start=\"3269\" data-end=\"3298\">\n<p data-start=\"3271\" data-end=\"3298\">An incident response plan<\/p>\n<\/li>\n<li data-section-id=\"3k7vv\" data-start=\"3299\" data-end=\"3339\">\n<p data-start=\"3301\" data-end=\"3339\">Cybersecurity policy recommendations<\/p>\n<\/li>\n<li data-section-id=\"1foobaj\" data-start=\"3340\" data-end=\"3393\">\n<p data-start=\"3342\" data-end=\"3393\">Guidance for improving overall security practices<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3395\" data-end=\"3650\">Due to confidentiality agreements, I am unable to share specific technical details about the organization\u2019s systems or vulnerabilities. However, the experience provided valuable practice in developing professional cybersecurity documentation and policies.<\/p>\n<h3 data-section-id=\"f6com9\" data-start=\"3652\" data-end=\"3666\">Reflection<\/h3>\n<p data-start=\"3667\" data-end=\"3983\">Working with a real organization provided an opportunity to see how cybersecurity policies and training programs can directly impact an organization\u2019s security posture. This experience helped me better understand the importance of communication, documentation, and user awareness in cybersecurity defense strategies.<\/p>\n<p data-start=\"3985\" data-end=\"4160\">It also reinforced the importance of developing practical solutions that organizations can realistically implement, rather than focusing only on theoretical security concepts.<\/p>\n<hr data-start=\"4162\" data-end=\"4165\" \/>\n<h1 data-section-id=\"1s71cdg\" data-start=\"4167\" data-end=\"4185\">Skills Developed<\/h1>\n<p data-start=\"4187\" data-end=\"4294\">Through this internship experience, I strengthened several important cybersecurity and professional skills:<\/p>\n<ul data-start=\"4296\" data-end=\"4480\">\n<li data-section-id=\"1lj99k4\" data-start=\"4296\" data-end=\"4329\">\n<p data-start=\"4298\" data-end=\"4329\">Cybersecurity risk assessment<\/p>\n<\/li>\n<li data-section-id=\"hx91al\" data-start=\"4330\" data-end=\"4361\">\n<p data-start=\"4332\" data-end=\"4361\">Security policy development<\/p>\n<\/li>\n<li data-section-id=\"ktu4v4\" data-start=\"4362\" data-end=\"4392\">\n<p data-start=\"4364\" data-end=\"4392\">Incident response planning<\/p>\n<\/li>\n<li data-section-id=\"j2k5eu\" data-start=\"4393\" data-end=\"4436\">\n<p data-start=\"4395\" data-end=\"4436\">Security awareness training development<\/p>\n<\/li>\n<li data-section-id=\"2gq8b8\" data-start=\"4437\" data-end=\"4480\">\n<p data-start=\"4439\" data-end=\"4480\">Professional communication and teamwork<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4482\" data-end=\"4592\">These skills are critical for roles in <strong data-start=\"4521\" data-end=\"4591\">security operations, cybersecurity consulting, and risk management<\/strong>.<\/p>\n<hr data-start=\"4594\" data-end=\"4597\" \/>\n<h1 data-section-id=\"ix7c6d\" data-start=\"4599\" data-end=\"4626\">Impact on My Career Goals<\/h1>\n<p data-start=\"4628\" data-end=\"4964\">The experience I gained through the ODU Cybersecurity Clinic helped bridge the gap between academic learning and real-world cybersecurity practice. Working with real organizations allowed me to apply cybersecurity concepts in practical situations and better understand the challenges businesses face when implementing security controls.<\/p>\n<p data-start=\"4966\" data-end=\"5169\">This internship reinforced my interest in cybersecurity defense and risk management and provided valuable experience that will help prepare me for future roles in cybersecurity operations and consulting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ODU Cybersecurity Clinic During my time at Old Dominion University, I had the opportunity to participate in the ODU Cybersecurity Clinic, a program that allows cybersecurity students to work with real organizations to strengthen their security practices. The clinic operates in partnership with industry professionals, including mentors from Valor Cybersecurity, who guide students through real-world&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/cyse-368\/\">Read More<\/a><\/div>\n","protected":false},"author":29376,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/users\/29376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/138\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}