Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University

Size: px
Start display at page:

Download "Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University"

Transcription

1 <USJI Seminar Report> Date Friday, September 21, 2012 Host USJI-DCC Venue U.S.-Japan Research Institute (USJI)/ The Waseda Digital Campus Consortium (DCC) Title The Future of Advanced Information Societies Keynote Speech William E. Kirwan, Chancellor, University of Maryland System Kaoru Yano, Chairman of the Board, NEC Corporation *Video Message Botaro Hirosaki, Executive Adviser, NEC Corporation Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University Panelists William E. Kirwan, Chancellor, University of Maryland System Botaro Hirosaki, Executive Adviser, NEC Corporation Shuzaburo Takeda, Specially appointed professor, Kyoto University Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Summary William E. Kirwan, Chancellor, University of Maryland System Mr. Kirwan begins by addressing the issue of cybersecurity and its role in education. The University of Maryland system has three major research universities and seven comprehensive universities institutes that focus mainly on undergraduate education up to the Master s level. One institution of the system is a counterpart to Maryland s digital campus University of Maryland, Maryland College. It is a digital-only campus and one of the fastest growing campuses of the system. Kirwan advances to the issue of cybersecurity. He offers three innovations that that are on the verge of fundamentally changing our lives and how we do business. The first innovation will occur in healthcare. Studies of the human genome will advanced science to breakthroughs in medical care. We will have personalized or customer-tailored healthcare and cures will be developed for diseases once never believed to be accomplishable. The second he offers is a seismic shift in the teaching and learning paradigm. USJI 1

2 This, coupled with advancements in cognitive science, will dramatically alter how we teach. The growth of new online universities such as U-Dacity are offering high quality educations at a low cost. Kirwan concedes that those in his position will have to re-think new teaching paradigms. The classroom of 2020 will be unrecognizable and radically different from today s classrooms. These technologies and innovations can help to lower cost of education. The third innovation that will radically alter our lives is cloud computing. Cloud computing can drive down the cost of computing and spread its use. Kirwan utilizes the analogy of the innovation of alternating current to electrical use to explain the multiplier effects that cloud computing will have on technology. However, cloud computing introduces new risks. Kirwan now moves to the issue of cybersecurity and cloud computing Cyber threats are unique in that they can result from an individual anywhere in the world that has access to the internet, even through a cyber café. The enemies are ubiquitous according to Kirwan. Those in education have a special obligation to focus on cyber security. Maryland is home to the NSA and the work of the NSA is so large that there is now a huge and developing private sector to meet the new demand for security specialists. The government and private sector looks to the UM to acquire expertise in the cyber field. One way UM is attaining this expertise is through research. UM-College Park has created a new cyber security center to address contemporary issues in cyber security. UM is also focusing on education in the cyber security field. All 12 campuses are involved in producing grads to meet the workforce need. UM has partnered with Northrup-Grumman to create an honors program to develop new cyber professionals. Botaro Hirosaki, Executive Adviser, NEC Corporation Hirosaki opens by discussing about the emerging importance of sustainable growth. While the world is still recovering from the effects of the global recession, long-term issues such as energy and global warming continue to be persistent. However, we must continue to work towards resolving these issues to help future generations. Last year, the OECD made its Green Growth declaration and the UN also issued its Green Economy declaration. 35 years ago, NEC proposed the concept of C&C ( Computers and Communication) to the world, but today this has become the concept of ICT, which is playing an increasingly important role in solving global challenges. A paradigm shift is now taking place in the world of ICT. There is now a big paradigm shift in computing. Further, the cost of computing has decreased dramatically in the last several decades. Efficiency once inconceivable 25 years ago is now feasible. Cloud computing also allows people to share data more easily and quickly. We are in an era when cloud computing allows for the collection of a greater variety of data including bio genome data or nano-science data. This new paradigm reinforced by ICT will become the new foundation of our society. USJI 2

3 ICT is becoming the foundation of building new products such as smart houses and smart grids. Thus, the more ICT handles such important roles in society, the greater the risk for networks becomes. In regards to cybersecurity, if we don t put together our best wisdom, the risks will prevail and it will be difficult for ICT to form a new foundation for the future. I think industry members such as NEC must make a contribution to developing this new foundation. Hirosaki now explains about the different security roles for different sectors. We in the industrial sector possess specific information, such as information about problems faced by our systems. Even within our company, there are mountains of sensitive data that is susceptible to DDOS attacks. On the other hand, universities have accumulated lots of recent technological research relating to security. By linking these more and more, we can strengthen the foundation for cybersecurity. Also, because the United States has advanced experience in the cyber-security world even at the national security level, it is important that Japan and the US, with their strong private sectors, cooperate in developing a new foundation for cyber-security. Finally, Hirosaki concludes by making remarks on NEC Group s vision for the next 10 years which includes being a leading global company leveraging the power of innovation to realize an information society friendly to humans and the earth and challenges us to prepare for a new future of innovation in network security. Shuzaburo Takeda, Specially appointed professor, Kyoto University Takeda begins with the subject of cybersecurity education. Maryland College has been carrying out online education in Okinawa for over half a century, which is now open to Japanese people as well. This cybersecurity program allows students to master the skills necessary for cybersecurity. The role Maryland College plays for the Okinawan people is very important. Because the number of top professionals in the field in Japan is extremely low, it is important to take advantage of the education provided by such a college. He now shifts to the subject of a paradigm shift, a notion introduced by Hirosaki. Takeda insists that the essence of the paradigm shift is a shift in the overall way of looking at things, so if we only focus on the economic, technological, or industrial aspects of the paradigm shift, we will not understand the full essence of it. So if we Japanese don t change our mindsets, we won t be able to keep up with Korea and China. For example, we must shift our focus from results to processes, and from isolation to systems. This paradigm shift will continue into the future, from paradigm shift version 1.0 to version 2.0, and then on to version 3.0, over the course of the century. As part of this shift, all infrastructure is now moving towards informatization. Cybersecurity is essential for social stability, which countries around the world recognize. Even US President Obama has referred to this many, many times. Cooperation between the US and USJI 3

4 Japan is essential for cybersecurity, yet so long as Japan doesn t even have laws concerning cybercrimes, Japan can t progress. I want us to press forward with such laws. The seriousness of cyber-crimes has been pointed out in the past, but why haven t we done anything yet? It can be said that the average mindset of Japanese society has still not adapted to globalization. What we need in Japan right now is a leader, to nominate people to spread the new mindset. The version 1 period of informatization in Japan presumed that globalization was occurring only in Japan, but prosperity brought about spiritual inversion (The Galapagos Syndrome). Version 2 occurred just after the Cold War ended, but Japan ignored it and fell behind Korea and China. This deepened our problem. A globalized society is one where people all around the world are recognized as equal. The world is flat, as Friedman said. Now, we have entered the era of Version 3.0. We can t say that America has been a leader until now, but both countries should cooperate in addressing the paradigm shift. I want there to be more leaders like President Kirwan in Japanese universities, and I want more universities and people to understand the importance of cybersecurity education. Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Hashimoto begins by explaining the difference between information networks and energy networks. Energy networks, he explains, begin with electricity or how we use it. Washing machines and other electrical appliances all use that form of network. Information networks, however, rely on a completely different infrastructure. The issue, he explains, is integrating the two into a single line. Very soon these two networks will be integrated into one. This is what we can call cyberization*. The discussion should focus on what happens once we combine these networks. Personally, I m looking forward to seeing how it develops. In regards to security, there s hardware security and software security. But there s also one more. We should also think about software bugs and defects and their proneness to attacks. Codes with error are prone to be attacked. These are the sorts of things we should also consider. Lastly, this is more of a question, but during Mr. Kirwan s presentation, he spoke about the development of UM-US as a center for private research. Why doesn t this sort of activity also occur in Japan? Question and Answer To Mr. Kirwan: How is it that the University of Maryland able to attract the private sector and form such a strong relationship for research in cybersecurity? Kirwan states that he s unable why it s unable to occur in Japan, but he says that at his university they work to establish relationships and they have advisory boards to help them formulate the curriculum of the future. The private firms are also able to outsource some of their research USJI 4

5 projects to the universities and even provide scholarships. This is a long-term and ongoing process. To Mr. Hirosaki: Can you elaborate on some of the differences in industry collaboration between the US and Japan? From my experience, the US and Europe both have centers of cyber innovation. Such cooperation is quite different in Japan. IN the US it is perceived that the pursuit of such innovation goes hand-in-hand with the development of society, not just the private sector. Such an attitude makes cooperation very easy. Perhaps this could be an influence of Japanese culture or history, but scholars in Japan are focused on the academic aspect of their work and so much its contribution to industry. To Professor Takeda: Same question. The Japanese government has budgeted quite a bit of money towards this endeavor. However, this is merely a hollow pursuit. The mindset of our academics must change. In this new world of globalization, universities will serve as a center for industry. Technological centers based at universities will become an important enterprise. I hope that we can transform our educational system. To Mr. Kirwan: With the rise of online education and learning, how can we be certain that students are actually learning? Harvard and MIT will begin giving students Certificates of Completion for given courses. Theoretically, if someone collects enough of these certificates, are these sufficient credentials for an actually degree? I do not know. This does not mean the end of higher education because traditional schools still have certain advantages. However, this type of schooling will have increasing significance for adult education. To Mr. Kirwan: Cybersecurity issues are now becoming important in Japan. How do cybersecurity experts join the field in the US? It has become such a critical national security issue because they encompass a huge role in our society. Lots of money is being invested in new degree programs money is coming from national and state-level governments. This is drawing people to the field because there is such great demand for jobs. Takeda: Same question. There is already a real threat. There is a 22 percent increase in attacks from Russia according to the Cyber Response Team (CRT) of the US. Even in Japan these risks exist. Infrastructure is especially vulnerable to such attacks. Kirwan (in response to Takeda): USJI 5

6 People in private companies have told me that they know external forces have gained access to their businesses that they have been under attack. The trick is to prevent the attackers from gaining information, not preventing them from getting in. USJI 6

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Statement of. William D. Green. Executive Chairman of the Board, Accenture. and Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research

More information

Keio University (Private)

Keio University (Private) Keio University Field of Study International Relations University Keio University (Private) Graduate School URL of University URL of Graduate School Program name Degrees Credit and years needed for graduation

More information

Board of Trustees. Strategic Planning Committee

Board of Trustees. Strategic Planning Committee Board of Trustees Caroline County Margaret Myers L. Nash McMahan Dorchester County Don W. Bradley, Vice Chair Vaughn D. Evans Kent County Thomas M. Groce, Jr. Matthew D. Hogans Queen Anne s County Jennifer

More information

School Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem-

School Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem- MALAYSIA School Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem- Mohamad Nor Bin Mohamad Taib Special Education Department, The Ministry of Education

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Accenture Overview Page 1

Accenture Overview Page 1 Accenture Overview Page 1 Company Overview Accenture is one of the world s leading management consulting, technology services and outsourcing organizations, with more than 246,000 employees; offices and

More information

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University Cybersecurity and Collaborative Research Projects Hiroto Yasuura Executive Vice President Kyushu University Systems become more complicated and hard to control. 1 ICT Used Anywhere Embedded Systems in

More information

Bachelor of Applied Science in Healthcare Technology and Management Bellevue College

Bachelor of Applied Science in Healthcare Technology and Management Bellevue College November 2011 Bachelor of Applied Science in Healthcare Technology and Management Bellevue College Introduction Bellevue College proposes to offer a Bachelor of Applied Science in Healthcare Technology

More information

How To Improve Health Care At Stevens.Org

How To Improve Health Care At Stevens.Org Symposium on Innovation in Healthcare Technology and Delivery March 10, 2014, 1-6pm, Stevens Babbio Center, Hoboken NJ 1:00-1:30 Opening Remarks Nariman Farvardin, PhD, Professor and University President,

More information

Educating Cyber Professionals:

Educating Cyber Professionals: SECURITY TRAINING AND EDUCATION Educating Cyber Professionals: A View from Academia, the Private Sector, and Government Mischel Kwon Mischel Kwon and Associates Michael J. Jacobs Cybersecurity Consultant

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

2. New Trend 1: From Fairness to Efficiency

2. New Trend 1: From Fairness to Efficiency Hitotsubashi Symposium Fundamental Tax Reforms in Japan In Search of Equity-Efficiency Balance Shigeki Morinobu Professor, Chuo Law School President of Japan Tax Institute 1. Introduction Upon entering

More information

The University of Akron College of Nursing Technology Plan 2009-2012

The University of Akron College of Nursing Technology Plan 2009-2012 The University of Akron College of Nursing Technology Plan 2009-2012 Vision: The vision for information technology (IT) in the College of Nursing is that all students, faculty, and staff learn, teach,

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

DRAFT THE CONTEXT: NORTHEASTERN 2015

DRAFT THE CONTEXT: NORTHEASTERN 2015 DRAFT NORTHEASTERN 2025: THE GLOBAL UNIVERSITY THE CONTEXT: NORTHEASTERN 2015 Northeastern University attracts students and faculty from around the world who value experiential learning as a cornerstone

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan

More information

www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited

www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited Table of Contents 03... The Rise of Open Source 04... The Talent Crunch 06... Insights

More information

Innovation & Quality for Higher Competitiveness of Companies

Innovation & Quality for Higher Competitiveness of Companies Innovation & Quality for Higher Competitiveness of Companies www.wipro.com DEVENDER MALHOTRA & SHALABH SRIVASTAVA WIPRO BPO Table of Contents Introduction...1 Understanding Innovation...2 Enablers of Innovation...2

More information

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes.

The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes. The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes. Every day business leaders make decisions designed to move their companies toward specific outcomes. Whether

More information

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education triplec 9(2): 460-465, 2011 ISSN 1726-670X http://www.triple-c.at Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

More information

Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation

Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation Session VI: Extending Benefits of the Knowledge-based Economy Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation By Gong Zhankui & Liu Chenyang APEC Study

More information

NINETY-FIRST MEETING WASHINGTON, D.C. APRIL

NINETY-FIRST MEETING WASHINGTON, D.C. APRIL DEVELOPMENT COMMITTEE (Joint Ministerial Committee of the Boards of Governors of the Bank and the Fund on the Transfer of Real Resources to Developing Countries) NINETY-FIRST MEETING WASHINGTON, D.C. APRIL

More information

elearning, the New Educational Paradigm and the Promise of Open and Distance Learning

elearning, the New Educational Paradigm and the Promise of Open and Distance Learning elearning, the New Educational Paradigm and the Promise of Open and Distance Learning Mr. Chairman, His Excellency, the VP of the Republic of Ghana Honorable Ministers of State present Honorable Ministers

More information

A Research on Security Awareness and Countermeasures for the Single Server

A Research on Security Awareness and Countermeasures for the Single Server , pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The

More information

1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program https://www.anthc.org/chs/behavioral/bha.

1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program https://www.anthc.org/chs/behavioral/bha. 1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program https://www.anthc.org/chs/behavioral/bha.cfm Under the direction of the Tribal Health Directors, ANTHC used the

More information

Fellowship Criteria. Nomination Process

Fellowship Criteria. Nomination Process Fellowship Criteria Division 14 The Society for Industrial and Organizational Psychology (Most of these points were taken directly or adapted from the APA Fellowship Status Manual, 1994, SIOP Administrative

More information

USM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE

USM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE USM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE INTRODUCTION This report was prepared at the request of the University System of Maryland (USM) Academic Affairs

More information

International Strategy of Nagasaki University

International Strategy of Nagasaki University International Strategy of Nagasaki University Nagasaki University was developed from Japan s first western medical school founded by a Dutch surgeon in 857. It suffered catastrophic disasters from an atomic

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is the author s version of a work that was submitted/accepted for publication in the following source: Gable, Guy (2006) The internet, globalization, and IT professional services. Journal of Global

More information

LEAP Wisconsin Assessment UW Institutional Case Studies

LEAP Wisconsin Assessment UW Institutional Case Studies LEAP Wisconsin Assessment UW Institutional Case Studies UW Institution: Authors: University of Wisconsin Colleges Gregory P. Lampe The University of Wisconsin Colleges Bachelor of Applied Arts and Sciences

More information

College of Nursing Strategic Plan 2014 2018 Strategic Goals and Objectives:

College of Nursing Strategic Plan 2014 2018 Strategic Goals and Objectives: College of Nursing Strategic Plan 2014 2018 The mission of the College of Nursing is to foster an environment of education of professional nurses. Graduates of the program Strategic Goals and Objectives:

More information

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute

More information

Texas Education Review

Texas Education Review Texas Education Review Leading Change with Technology-enhanced Education at The University of Texas at Austin: Five Guiding Principles William Powers, Jr., JD President, The University of Texas at Austin

More information

The Department of Accountancy

The Department of Accountancy The Department of Accountancy Statement from the Chair 2 The Department of Accountancy 4 History of the Department Faculty Specialities 6 Graduate Programs 9 Undergraduate Program 13 Financial Aid 16 Career

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

A Whole New World of Outsourcing. Norris Overton

A Whole New World of Outsourcing. Norris Overton A Whole New World of Outsourcing Norris Overton Outsourcing IT Services it s no longer a Gordian Knot, on the other hand, there are still risks for the unwary. Fifteen years ago outsourcing corporate IT

More information

THE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW

THE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW THE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW ACCESS INNOVATION COLLABORATION November 2015 www.contactnorth.ca Evolving Context 2 This is a time of change in higher education in Canada. David Agnew,

More information

A REPORT ON WORKPLACE SECURITY

A REPORT ON WORKPLACE SECURITY A REPORT ON WORKPLACE SECURITY In Asia Pacific, enterprises were expected to spend US$230 billion in 2014 to deal with cyber breaches, and it wasn t enough. In this age where cyber attacks are growing

More information

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them Moving Network Management from OnSite to SaaS Key Challenges and How NMSaaS Helps Solve Them Executive Summary In areas such as sales force automation and customer relationship management, cloud-based

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About

More information

Graduate Research and Education: New Initiatives at ORNL and the University of Tennessee

Graduate Research and Education: New Initiatives at ORNL and the University of Tennessee Graduate Research and Education: New Initiatives at ORNL and the University of Tennessee Presented to Joint Workshop on Large-Scale Computer Simulation Jim Roberto Associate Laboratory Director Graduate

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

Wither the Global Talent Pool?

Wither the Global Talent Pool? Wither the Global Talent Pool? The U.S. Remains Competitive But Lacks a Strategic Approach European Component of Internationalization Strategies in North American Universities Balance - Coimbra Group Seminar-

More information

College of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits.

College of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits. College of Science, Engineering and Technology School of Computing Learn without limits. college of science, engineering and technology WELCOME TO THE SCHOOL OF COMPUTING The vision of the school is to

More information

EDYTH T. JAMES DEPARTMENT OF NURSING

EDYTH T. JAMES DEPARTMENT OF NURSING EDYTH T. JAMES DEPARTMENT OF NURSING Our nursing program has a rich 106-year history that includes being the first nursing school established in the state of Maryland. The Washington Missionary College

More information

Engineering Management: The Future of Engineering Technology

Engineering Management: The Future of Engineering Technology Engineering Management: The Future of Engineering Technology Dr. Saeed D. Foroudastan, Dianna J. Prince Middle Tennessee State University Abstract The Master of Science of Professional Science (MSPS) program

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

CERT's role in national Cyber Security: policy suggestions

CERT's role in national Cyber Security: policy suggestions CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula What is national Cyber Security is? In another

More information

GENERAL INSURANCE BUSINESS UNDERWRITING

GENERAL INSURANCE BUSINESS UNDERWRITING GENERAL INSURANCE BUSINESS UNDERWRITING R.Qaiser, Professor, NIA, Pune For a general insurance company, underwriting business is the basic core activity. All other activities, in fact, emanate from this

More information

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Chairman Johnson, Ranking Member Carper, and Members of the committee: UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

More information

BYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE

BYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE BYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE The Faculty of The University of Texas School of Allied Health Sciences at Galveston, The University

More information

Comprehensive Strategy on Information Security: Executive Summary

Comprehensive Strategy on Information Security: Executive Summary Comprehensive Strategy on Information Security: Executive Summary To enhance competitiveness and national security for Japan: Building economic and cultural power through realization of world-class "highly

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

We Must Prepare Ph.D. Students for the Complicated Art of Teaching - Commentary - The Chronicle of Higher Education

We Must Prepare Ph.D. Students for the Complicated Art of Teaching - Commentary - The Chronicle of Higher Education Commentary November 11, 2013 We Must Prepare Ph.D. Students for the Complicated Art of Teaching By Derek Bok Graduate study for the Ph.D. in the United States presents a curious paradox. Our universities

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

Examining the Evolving Cyber Insurance Marketplace

Examining the Evolving Cyber Insurance Marketplace Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Careers@Singapore: Cyber Security & Data Analytics October - November 2015

Careers@Singapore: Cyber Security & Data Analytics October - November 2015 Careers@Singapore: Cyber Security & Data Analytics October - November 2015 HOT JOBS Scroll down to see the highlights of all the Career Opportunities. Or visit our job portal at contactsingapore.sg/jobs

More information

Security and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients

Security and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients Security and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients Executive Overview Within the legal sector, IT system security and compliance have changed dramatically

More information

CURRICULUM VITAE. Danny L. Rhodes

CURRICULUM VITAE. Danny L. Rhodes CURRICULUM VITAE Danny L. Rhodes Anderson University 139 Martin s Pointe Dr. PO Box 1163 Seneca, SC 29678 316 Boulevard 864-985-1550 Anderson, SC 29621 864-231-2086 drhodes@andersonuniversity.edu EDUCATION:

More information

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens Robert Malmgren Smart Grid Security Challenges - Legacy and Infrastructure Burdens Short bio Robert Malmgren Independent consultant that have worked with utility companies regarding IT- and info sec since

More information

INCO for Cyber Security. PTCIF: 21st Feb 2014

INCO for Cyber Security. PTCIF: 21st Feb 2014 INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.

More information

Report on the Florida State University School of Nursing Seminar on Excellence in Nurse Education

Report on the Florida State University School of Nursing Seminar on Excellence in Nurse Education Report on the Florida State University School of Nursing Seminar on Excellence in Nurse Education Prepared by Raoul A. Arreola, Ph.D. The University of Tennessee Health Sciences Center 1. The Seminar Agenda

More information

THE CLOUD: PROGRESS AND POTENTIAL

THE CLOUD: PROGRESS AND POTENTIAL THE CLOUD: PROGRESS AND POTENTIAL The cloud has made a tremendous amount of progress in a relatively short time on the technological landscape. Cloud solutions faced doubts soon after their introduction,

More information

DEAN OF THE SCHOOL OF HEALTH SCIENCES

DEAN OF THE SCHOOL OF HEALTH SCIENCES OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF HEALTH SCIENCES Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Health Sciences. The Search Committee will begin reviewing

More information

Cyber Security in East Asia and Policy Cooperation

Cyber Security in East Asia and Policy Cooperation Summary of USJI Seminar on Cyber Security in East Asia and Policy Cooperation between Japan and the United States September 8, 2010 On the Independence Day of the United States in 2009 cyber attacks in

More information

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC MIKE.ZUSMAN@CARVESYSTEMS.COM Carve s Roots (tl;dr)

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information

Managing Cyber Attacks

Managing Cyber Attacks Managing Cyber Attacks Regulators and Industry Participants Discuss Ways to Strengthen Defenses By Joanne Morrison June 25, 2015 Cybersecurity risks and testing are a major concern of regulators and market

More information

KIT 1.10 Years From Now Kyoto Institute of Technology

KIT 1.10 Years From Now Kyoto Institute of Technology Top Global University Project OPEN TECH INNOVATION An Initiative for Global, Social and Regional Collaboration Kyoto Institute of Technology Principle & vision of our initiative P1 10 Years From Now Kyoto

More information

New Business Model for Medical Billing Companies

New Business Model for Medical Billing Companies New Business Model for Medical Billing Companies Author: Mick Raich Vachette Pathology @ www.vachettepathology.com Introduction I ve worked in the medical billing world for the past 20 years, both for

More information

OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING

OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Nursing. The Search Committee will begin reviewing applications

More information

Security Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS

Security Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS Security Challenges for the Future Internet Evangelos arkatos Distr. Computing Systems Laboratory FORT ICS 11 Roadap of the talk Security Challenges: What is the problem? ackers are getting more sophisticated

More information

Effective Information Sharing and Analysis Process

Effective Information Sharing and Analysis Process Bringing Data to Life Presented by Michael Echols REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM DHS Responsibilities Emergency Communications Capabilities Secure dot-gov Assist in Protecting

More information

M.A. /M.S. in Education Purdue University College of Education

M.A. /M.S. in Education Purdue University College of Education M.A. /M.S. in Education Purdue University College of Education The Global Campus of Purdue University International College of Education Purdue University brings a wealth of resources and expertise to

More information

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing Igor Nai Fovino-Head of Research GCSEC The last two years will surely enter in the history of IT Security. 2010 was the year

More information

http://www.chinaccs.com.hk 2014 Interim Results 28 August 2014

http://www.chinaccs.com.hk 2014 Interim Results 28 August 2014 http://www.chinaccs.com.hk 2014 Interim Results 28 August 2014 Management Present MR. LI PING CHAIRMAN MR. SI FURONG PRESIDENT MS. HOU RUI EXECUTIVE VICE PRESIDENT & CFO MR. CHENG HONGYAN EXECUTIVE VICE

More information

Corporate Universities: Competitors or Collaborators?

Corporate Universities: Competitors or Collaborators? Corporate Universities: Competitors or Collaborators? Dr. Philip McGee, Program Coordinator for the Masters in Human Resource Development, Clemson University, South Carolina ABSTRACT universities bogged

More information

Our activities in the West Coast, past, present, and future.

Our activities in the West Coast, past, present, and future. SIH Symposium 2006.11.15 Session1 overseas offices JSPS SF Office Our activities in the West Coast, past, present, and future. 1 JSPS San Francisco Office 2 JUNBA (Japanese University Network in the Bay

More information

Fujitsu s Approach to Cloud-related Information Security

Fujitsu s Approach to Cloud-related Information Security Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Curriculum Development for Doctoral Studies in Education

Curriculum Development for Doctoral Studies in Education Curriculum Development for Doctoral Studies in Education Irine BAKHTADZE * Abstract Profound changes in high education which started in 1996 in Georgia have to be continued. We have to explore potentially

More information