Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University
|
|
- Sherman Nelson
- 8 years ago
- Views:
Transcription
1 <USJI Seminar Report> Date Friday, September 21, 2012 Host USJI-DCC Venue U.S.-Japan Research Institute (USJI)/ The Waseda Digital Campus Consortium (DCC) Title The Future of Advanced Information Societies Keynote Speech William E. Kirwan, Chancellor, University of Maryland System Kaoru Yano, Chairman of the Board, NEC Corporation *Video Message Botaro Hirosaki, Executive Adviser, NEC Corporation Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University Panelists William E. Kirwan, Chancellor, University of Maryland System Botaro Hirosaki, Executive Adviser, NEC Corporation Shuzaburo Takeda, Specially appointed professor, Kyoto University Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Summary William E. Kirwan, Chancellor, University of Maryland System Mr. Kirwan begins by addressing the issue of cybersecurity and its role in education. The University of Maryland system has three major research universities and seven comprehensive universities institutes that focus mainly on undergraduate education up to the Master s level. One institution of the system is a counterpart to Maryland s digital campus University of Maryland, Maryland College. It is a digital-only campus and one of the fastest growing campuses of the system. Kirwan advances to the issue of cybersecurity. He offers three innovations that that are on the verge of fundamentally changing our lives and how we do business. The first innovation will occur in healthcare. Studies of the human genome will advanced science to breakthroughs in medical care. We will have personalized or customer-tailored healthcare and cures will be developed for diseases once never believed to be accomplishable. The second he offers is a seismic shift in the teaching and learning paradigm. USJI 1
2 This, coupled with advancements in cognitive science, will dramatically alter how we teach. The growth of new online universities such as U-Dacity are offering high quality educations at a low cost. Kirwan concedes that those in his position will have to re-think new teaching paradigms. The classroom of 2020 will be unrecognizable and radically different from today s classrooms. These technologies and innovations can help to lower cost of education. The third innovation that will radically alter our lives is cloud computing. Cloud computing can drive down the cost of computing and spread its use. Kirwan utilizes the analogy of the innovation of alternating current to electrical use to explain the multiplier effects that cloud computing will have on technology. However, cloud computing introduces new risks. Kirwan now moves to the issue of cybersecurity and cloud computing Cyber threats are unique in that they can result from an individual anywhere in the world that has access to the internet, even through a cyber café. The enemies are ubiquitous according to Kirwan. Those in education have a special obligation to focus on cyber security. Maryland is home to the NSA and the work of the NSA is so large that there is now a huge and developing private sector to meet the new demand for security specialists. The government and private sector looks to the UM to acquire expertise in the cyber field. One way UM is attaining this expertise is through research. UM-College Park has created a new cyber security center to address contemporary issues in cyber security. UM is also focusing on education in the cyber security field. All 12 campuses are involved in producing grads to meet the workforce need. UM has partnered with Northrup-Grumman to create an honors program to develop new cyber professionals. Botaro Hirosaki, Executive Adviser, NEC Corporation Hirosaki opens by discussing about the emerging importance of sustainable growth. While the world is still recovering from the effects of the global recession, long-term issues such as energy and global warming continue to be persistent. However, we must continue to work towards resolving these issues to help future generations. Last year, the OECD made its Green Growth declaration and the UN also issued its Green Economy declaration. 35 years ago, NEC proposed the concept of C&C ( Computers and Communication) to the world, but today this has become the concept of ICT, which is playing an increasingly important role in solving global challenges. A paradigm shift is now taking place in the world of ICT. There is now a big paradigm shift in computing. Further, the cost of computing has decreased dramatically in the last several decades. Efficiency once inconceivable 25 years ago is now feasible. Cloud computing also allows people to share data more easily and quickly. We are in an era when cloud computing allows for the collection of a greater variety of data including bio genome data or nano-science data. This new paradigm reinforced by ICT will become the new foundation of our society. USJI 2
3 ICT is becoming the foundation of building new products such as smart houses and smart grids. Thus, the more ICT handles such important roles in society, the greater the risk for networks becomes. In regards to cybersecurity, if we don t put together our best wisdom, the risks will prevail and it will be difficult for ICT to form a new foundation for the future. I think industry members such as NEC must make a contribution to developing this new foundation. Hirosaki now explains about the different security roles for different sectors. We in the industrial sector possess specific information, such as information about problems faced by our systems. Even within our company, there are mountains of sensitive data that is susceptible to DDOS attacks. On the other hand, universities have accumulated lots of recent technological research relating to security. By linking these more and more, we can strengthen the foundation for cybersecurity. Also, because the United States has advanced experience in the cyber-security world even at the national security level, it is important that Japan and the US, with their strong private sectors, cooperate in developing a new foundation for cyber-security. Finally, Hirosaki concludes by making remarks on NEC Group s vision for the next 10 years which includes being a leading global company leveraging the power of innovation to realize an information society friendly to humans and the earth and challenges us to prepare for a new future of innovation in network security. Shuzaburo Takeda, Specially appointed professor, Kyoto University Takeda begins with the subject of cybersecurity education. Maryland College has been carrying out online education in Okinawa for over half a century, which is now open to Japanese people as well. This cybersecurity program allows students to master the skills necessary for cybersecurity. The role Maryland College plays for the Okinawan people is very important. Because the number of top professionals in the field in Japan is extremely low, it is important to take advantage of the education provided by such a college. He now shifts to the subject of a paradigm shift, a notion introduced by Hirosaki. Takeda insists that the essence of the paradigm shift is a shift in the overall way of looking at things, so if we only focus on the economic, technological, or industrial aspects of the paradigm shift, we will not understand the full essence of it. So if we Japanese don t change our mindsets, we won t be able to keep up with Korea and China. For example, we must shift our focus from results to processes, and from isolation to systems. This paradigm shift will continue into the future, from paradigm shift version 1.0 to version 2.0, and then on to version 3.0, over the course of the century. As part of this shift, all infrastructure is now moving towards informatization. Cybersecurity is essential for social stability, which countries around the world recognize. Even US President Obama has referred to this many, many times. Cooperation between the US and USJI 3
4 Japan is essential for cybersecurity, yet so long as Japan doesn t even have laws concerning cybercrimes, Japan can t progress. I want us to press forward with such laws. The seriousness of cyber-crimes has been pointed out in the past, but why haven t we done anything yet? It can be said that the average mindset of Japanese society has still not adapted to globalization. What we need in Japan right now is a leader, to nominate people to spread the new mindset. The version 1 period of informatization in Japan presumed that globalization was occurring only in Japan, but prosperity brought about spiritual inversion (The Galapagos Syndrome). Version 2 occurred just after the Cold War ended, but Japan ignored it and fell behind Korea and China. This deepened our problem. A globalized society is one where people all around the world are recognized as equal. The world is flat, as Friedman said. Now, we have entered the era of Version 3.0. We can t say that America has been a leader until now, but both countries should cooperate in addressing the paradigm shift. I want there to be more leaders like President Kirwan in Japanese universities, and I want more universities and people to understand the importance of cybersecurity education. Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Hashimoto begins by explaining the difference between information networks and energy networks. Energy networks, he explains, begin with electricity or how we use it. Washing machines and other electrical appliances all use that form of network. Information networks, however, rely on a completely different infrastructure. The issue, he explains, is integrating the two into a single line. Very soon these two networks will be integrated into one. This is what we can call cyberization*. The discussion should focus on what happens once we combine these networks. Personally, I m looking forward to seeing how it develops. In regards to security, there s hardware security and software security. But there s also one more. We should also think about software bugs and defects and their proneness to attacks. Codes with error are prone to be attacked. These are the sorts of things we should also consider. Lastly, this is more of a question, but during Mr. Kirwan s presentation, he spoke about the development of UM-US as a center for private research. Why doesn t this sort of activity also occur in Japan? Question and Answer To Mr. Kirwan: How is it that the University of Maryland able to attract the private sector and form such a strong relationship for research in cybersecurity? Kirwan states that he s unable why it s unable to occur in Japan, but he says that at his university they work to establish relationships and they have advisory boards to help them formulate the curriculum of the future. The private firms are also able to outsource some of their research USJI 4
5 projects to the universities and even provide scholarships. This is a long-term and ongoing process. To Mr. Hirosaki: Can you elaborate on some of the differences in industry collaboration between the US and Japan? From my experience, the US and Europe both have centers of cyber innovation. Such cooperation is quite different in Japan. IN the US it is perceived that the pursuit of such innovation goes hand-in-hand with the development of society, not just the private sector. Such an attitude makes cooperation very easy. Perhaps this could be an influence of Japanese culture or history, but scholars in Japan are focused on the academic aspect of their work and so much its contribution to industry. To Professor Takeda: Same question. The Japanese government has budgeted quite a bit of money towards this endeavor. However, this is merely a hollow pursuit. The mindset of our academics must change. In this new world of globalization, universities will serve as a center for industry. Technological centers based at universities will become an important enterprise. I hope that we can transform our educational system. To Mr. Kirwan: With the rise of online education and learning, how can we be certain that students are actually learning? Harvard and MIT will begin giving students Certificates of Completion for given courses. Theoretically, if someone collects enough of these certificates, are these sufficient credentials for an actually degree? I do not know. This does not mean the end of higher education because traditional schools still have certain advantages. However, this type of schooling will have increasing significance for adult education. To Mr. Kirwan: Cybersecurity issues are now becoming important in Japan. How do cybersecurity experts join the field in the US? It has become such a critical national security issue because they encompass a huge role in our society. Lots of money is being invested in new degree programs money is coming from national and state-level governments. This is drawing people to the field because there is such great demand for jobs. Takeda: Same question. There is already a real threat. There is a 22 percent increase in attacks from Russia according to the Cyber Response Team (CRT) of the US. Even in Japan these risks exist. Infrastructure is especially vulnerable to such attacks. Kirwan (in response to Takeda): USJI 5
6 People in private companies have told me that they know external forces have gained access to their businesses that they have been under attack. The trick is to prevent the attackers from gaining information, not preventing them from getting in. USJI 6
Statement of. William D. Green. Executive Chairman of the Board, Accenture. and
Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research
More informationKeio University (Private)
Keio University Field of Study International Relations University Keio University (Private) Graduate School URL of University URL of Graduate School Program name Degrees Credit and years needed for graduation
More informationBoard of Trustees. Strategic Planning Committee
Board of Trustees Caroline County Margaret Myers L. Nash McMahan Dorchester County Don W. Bradley, Vice Chair Vaughn D. Evans Kent County Thomas M. Groce, Jr. Matthew D. Hogans Queen Anne s County Jennifer
More informationSchool Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem-
MALAYSIA School Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem- Mohamad Nor Bin Mohamad Taib Special Education Department, The Ministry of Education
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationAccenture Overview Page 1
Accenture Overview Page 1 Company Overview Accenture is one of the world s leading management consulting, technology services and outsourcing organizations, with more than 246,000 employees; offices and
More informationCybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University
Cybersecurity and Collaborative Research Projects Hiroto Yasuura Executive Vice President Kyushu University Systems become more complicated and hard to control. 1 ICT Used Anywhere Embedded Systems in
More informationBachelor of Applied Science in Healthcare Technology and Management Bellevue College
November 2011 Bachelor of Applied Science in Healthcare Technology and Management Bellevue College Introduction Bellevue College proposes to offer a Bachelor of Applied Science in Healthcare Technology
More informationHow To Improve Health Care At Stevens.Org
Symposium on Innovation in Healthcare Technology and Delivery March 10, 2014, 1-6pm, Stevens Babbio Center, Hoboken NJ 1:00-1:30 Opening Remarks Nariman Farvardin, PhD, Professor and University President,
More informationEducating Cyber Professionals:
SECURITY TRAINING AND EDUCATION Educating Cyber Professionals: A View from Academia, the Private Sector, and Government Mischel Kwon Mischel Kwon and Associates Michael J. Jacobs Cybersecurity Consultant
More informationHow To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
More information2. New Trend 1: From Fairness to Efficiency
Hitotsubashi Symposium Fundamental Tax Reforms in Japan In Search of Equity-Efficiency Balance Shigeki Morinobu Professor, Chuo Law School President of Japan Tax Institute 1. Introduction Upon entering
More informationThe University of Akron College of Nursing Technology Plan 2009-2012
The University of Akron College of Nursing Technology Plan 2009-2012 Vision: The vision for information technology (IT) in the College of Nursing is that all students, faculty, and staff learn, teach,
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationUniversity of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
More informationCyber security in an organization-transcending way
Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security
More informationDRAFT THE CONTEXT: NORTHEASTERN 2015
DRAFT NORTHEASTERN 2025: THE GLOBAL UNIVERSITY THE CONTEXT: NORTHEASTERN 2015 Northeastern University attracts students and faculty from around the world who value experiential learning as a cornerstone
More informationGovernment + Enterprise + Innovation + Strategy
Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything
More informationNational Cyber Threat Information Sharing. System Strengthening Study
Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening
More informationGlobal Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning
Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan
More informationwww.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited
www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited Table of Contents 03... The Rise of Open Source 04... The Talent Crunch 06... Insights
More informationInnovation & Quality for Higher Competitiveness of Companies
Innovation & Quality for Higher Competitiveness of Companies www.wipro.com DEVENDER MALHOTRA & SHALABH SRIVASTAVA WIPRO BPO Table of Contents Introduction...1 Understanding Innovation...2 Enablers of Innovation...2
More informationThe Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationPolicies and Practices on Network Security of MIIT
2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and
More informationThe Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes.
The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes. Every day business leaders make decisions designed to move their companies toward specific outcomes. Whether
More informationSocial Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education
triplec 9(2): 460-465, 2011 ISSN 1726-670X http://www.triple-c.at Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education
More informationPromoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation
Session VI: Extending Benefits of the Knowledge-based Economy Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation By Gong Zhankui & Liu Chenyang APEC Study
More informationNINETY-FIRST MEETING WASHINGTON, D.C. APRIL
DEVELOPMENT COMMITTEE (Joint Ministerial Committee of the Boards of Governors of the Bank and the Fund on the Transfer of Real Resources to Developing Countries) NINETY-FIRST MEETING WASHINGTON, D.C. APRIL
More informationelearning, the New Educational Paradigm and the Promise of Open and Distance Learning
elearning, the New Educational Paradigm and the Promise of Open and Distance Learning Mr. Chairman, His Excellency, the VP of the Republic of Ghana Honorable Ministers of State present Honorable Ministers
More informationA Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
More informationAN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view
More informationSeptember 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for
Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The
More information1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program https://www.anthc.org/chs/behavioral/bha.
1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program https://www.anthc.org/chs/behavioral/bha.cfm Under the direction of the Tribal Health Directors, ANTHC used the
More informationFellowship Criteria. Nomination Process
Fellowship Criteria Division 14 The Society for Industrial and Organizational Psychology (Most of these points were taken directly or adapted from the APA Fellowship Status Manual, 1994, SIOP Administrative
More informationUSM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE
USM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE INTRODUCTION This report was prepared at the request of the University System of Maryland (USM) Academic Affairs
More informationInternational Strategy of Nagasaki University
International Strategy of Nagasaki University Nagasaki University was developed from Japan s first western medical school founded by a Dutch surgeon in 857. It suffered catastrophic disasters from an atomic
More informationThis is the author s version of a work that was submitted/accepted for publication in the following source:
This is the author s version of a work that was submitted/accepted for publication in the following source: Gable, Guy (2006) The internet, globalization, and IT professional services. Journal of Global
More informationLEAP Wisconsin Assessment UW Institutional Case Studies
LEAP Wisconsin Assessment UW Institutional Case Studies UW Institution: Authors: University of Wisconsin Colleges Gregory P. Lampe The University of Wisconsin Colleges Bachelor of Applied Arts and Sciences
More informationCollege of Nursing Strategic Plan 2014 2018 Strategic Goals and Objectives:
College of Nursing Strategic Plan 2014 2018 The mission of the College of Nursing is to foster an environment of education of professional nurses. Graduates of the program Strategic Goals and Objectives:
More informationKshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17
Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute
More informationTexas Education Review
Texas Education Review Leading Change with Technology-enhanced Education at The University of Texas at Austin: Five Guiding Principles William Powers, Jr., JD President, The University of Texas at Austin
More informationThe Department of Accountancy
The Department of Accountancy Statement from the Chair 2 The Department of Accountancy 4 History of the Department Faculty Specialities 6 Graduate Programs 9 Undergraduate Program 13 Financial Aid 16 Career
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationChristos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
More informationA Whole New World of Outsourcing. Norris Overton
A Whole New World of Outsourcing Norris Overton Outsourcing IT Services it s no longer a Gordian Knot, on the other hand, there are still risks for the unwary. Fifteen years ago outsourcing corporate IT
More informationTHE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW
THE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW ACCESS INNOVATION COLLABORATION November 2015 www.contactnorth.ca Evolving Context 2 This is a time of change in higher education in Canada. David Agnew,
More informationA REPORT ON WORKPLACE SECURITY
A REPORT ON WORKPLACE SECURITY In Asia Pacific, enterprises were expected to spend US$230 billion in 2014 to deal with cyber breaches, and it wasn t enough. In this age where cyber attacks are growing
More informationMoving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them
Moving Network Management from OnSite to SaaS Key Challenges and How NMSaaS Helps Solve Them Executive Summary In areas such as sales force automation and customer relationship management, cloud-based
More informationCYBERSECURITY: Is Your Business Ready?
CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring
More informationAmerican Public University System - A Multi-Disciplinary Approach to Cybersecurity Education
American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About
More informationGraduate Research and Education: New Initiatives at ORNL and the University of Tennessee
Graduate Research and Education: New Initiatives at ORNL and the University of Tennessee Presented to Joint Workshop on Large-Scale Computer Simulation Jim Roberto Associate Laboratory Director Graduate
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationWither the Global Talent Pool?
Wither the Global Talent Pool? The U.S. Remains Competitive But Lacks a Strategic Approach European Component of Internationalization Strategies in North American Universities Balance - Coimbra Group Seminar-
More informationCollege of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits.
College of Science, Engineering and Technology School of Computing Learn without limits. college of science, engineering and technology WELCOME TO THE SCHOOL OF COMPUTING The vision of the school is to
More informationEDYTH T. JAMES DEPARTMENT OF NURSING
EDYTH T. JAMES DEPARTMENT OF NURSING Our nursing program has a rich 106-year history that includes being the first nursing school established in the state of Maryland. The Washington Missionary College
More informationEngineering Management: The Future of Engineering Technology
Engineering Management: The Future of Engineering Technology Dr. Saeed D. Foroudastan, Dianna J. Prince Middle Tennessee State University Abstract The Master of Science of Professional Science (MSPS) program
More informationSome Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationPrivacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
More informationCERT's role in national Cyber Security: policy suggestions
CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another
More informationGENERAL INSURANCE BUSINESS UNDERWRITING
GENERAL INSURANCE BUSINESS UNDERWRITING R.Qaiser, Professor, NIA, Pune For a general insurance company, underwriting business is the basic core activity. All other activities, in fact, emanate from this
More informationChairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
More informationBYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE
BYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE The Faculty of The University of Texas School of Allied Health Sciences at Galveston, The University
More informationComprehensive Strategy on Information Security: Executive Summary
Comprehensive Strategy on Information Security: Executive Summary To enhance competitiveness and national security for Japan: Building economic and cultural power through realization of world-class "highly
More informationThank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
More informationWe Must Prepare Ph.D. Students for the Complicated Art of Teaching - Commentary - The Chronicle of Higher Education
Commentary November 11, 2013 We Must Prepare Ph.D. Students for the Complicated Art of Teaching By Derek Bok Graduate study for the Ph.D. in the United States presents a curious paradox. Our universities
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationNNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
More informationTOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
More informationExamining the Evolving Cyber Insurance Marketplace
Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,
More informationPriority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
More informationCareers@Singapore: Cyber Security & Data Analytics October - November 2015
Careers@Singapore: Cyber Security & Data Analytics October - November 2015 HOT JOBS Scroll down to see the highlights of all the Career Opportunities. Or visit our job portal at contactsingapore.sg/jobs
More informationSecurity and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients
Security and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients Executive Overview Within the legal sector, IT system security and compliance have changed dramatically
More informationCURRICULUM VITAE. Danny L. Rhodes
CURRICULUM VITAE Danny L. Rhodes Anderson University 139 Martin s Pointe Dr. PO Box 1163 Seneca, SC 29678 316 Boulevard 864-985-1550 Anderson, SC 29621 864-231-2086 drhodes@andersonuniversity.edu EDUCATION:
More informationRobert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens
Robert Malmgren Smart Grid Security Challenges - Legacy and Infrastructure Burdens Short bio Robert Malmgren Independent consultant that have worked with utility companies regarding IT- and info sec since
More informationINCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
More informationReport on the Florida State University School of Nursing Seminar on Excellence in Nurse Education
Report on the Florida State University School of Nursing Seminar on Excellence in Nurse Education Prepared by Raoul A. Arreola, Ph.D. The University of Tennessee Health Sciences Center 1. The Seminar Agenda
More informationTHE CLOUD: PROGRESS AND POTENTIAL
THE CLOUD: PROGRESS AND POTENTIAL The cloud has made a tremendous amount of progress in a relatively short time on the technological landscape. Cloud solutions faced doubts soon after their introduction,
More informationDEAN OF THE SCHOOL OF HEALTH SCIENCES
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF HEALTH SCIENCES Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Health Sciences. The Search Committee will begin reviewing
More informationCyber Security in East Asia and Policy Cooperation
Summary of USJI Seminar on Cyber Security in East Asia and Policy Cooperation between Japan and the United States September 8, 2010 On the Independence Day of the United States in 2009 cyber attacks in
More informationIoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC MIKE.ZUSMAN@CARVESYSTEMS.COM Carve s Roots (tl;dr)
More informationIntroduction of the GCCD. (Global Cybersecurity Center for Development)
Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD
More informationManaging Cyber Attacks
Managing Cyber Attacks Regulators and Industry Participants Discuss Ways to Strengthen Defenses By Joanne Morrison June 25, 2015 Cybersecurity risks and testing are a major concern of regulators and market
More informationKIT 1.10 Years From Now Kyoto Institute of Technology
Top Global University Project OPEN TECH INNOVATION An Initiative for Global, Social and Regional Collaboration Kyoto Institute of Technology Principle & vision of our initiative P1 10 Years From Now Kyoto
More informationNew Business Model for Medical Billing Companies
New Business Model for Medical Billing Companies Author: Mick Raich Vachette Pathology @ www.vachettepathology.com Introduction I ve worked in the medical billing world for the past 20 years, both for
More informationOAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Nursing. The Search Committee will begin reviewing applications
More informationSecurity Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS
Security Challenges for the Future Internet Evangelos arkatos Distr. Computing Systems Laboratory FORT ICS 11 Roadap of the talk Security Challenges: What is the problem? ackers are getting more sophisticated
More informationEffective Information Sharing and Analysis Process
Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting
More informationM.A. /M.S. in Education Purdue University College of Education
M.A. /M.S. in Education Purdue University College of Education The Global Campus of Purdue University International College of Education Purdue University brings a wealth of resources and expertise to
More informationEvolution of Cyber Security and Cyber Threats with focus on Cloud Computing
Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year
More informationhttp://www.chinaccs.com.hk 2014 Interim Results 28 August 2014
http://www.chinaccs.com.hk 2014 Interim Results 28 August 2014 Management Present MR. LI PING CHAIRMAN MR. SI FURONG PRESIDENT MS. HOU RUI EXECUTIVE VICE PRESIDENT & CFO MR. CHENG HONGYAN EXECUTIVE VICE
More informationCorporate Universities: Competitors or Collaborators?
Corporate Universities: Competitors or Collaborators? Dr. Philip McGee, Program Coordinator for the Masters in Human Resource Development, Clemson University, South Carolina ABSTRACT universities bogged
More informationOur activities in the West Coast, past, present, and future.
SIH Symposium 2006.11.15 Session1 overseas offices JSPS SF Office Our activities in the West Coast, past, present, and future. 1 JSPS San Francisco Office 2 JUNBA (Japanese University Network in the Bay
More informationFujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
More informationRemarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationCurriculum Development for Doctoral Studies in Education
Curriculum Development for Doctoral Studies in Education Irine BAKHTADZE * Abstract Profound changes in high education which started in 1996 in Georgia have to be continued. We have to explore potentially
More information