Strategic Initiative Overview An Ecosystem Approach

Size: px
Start display at page:

Download "Strategic Initiative Overview An Ecosystem Approach"

Transcription

1 Strategic Initiative Overview An Ecosystem Approach Cyber Texas Conference San Antonio Apr 2015

2 University of Texas Panel Dr. Michelle S. Atchison UT System Associate Vice Chancellor for Federal Relations Defense and National Security Phone: Dr. Gregory B. White UT San Antonio Professor Department of Computer Science Director of the Center for Infrastructure Assurance and Security Phone: (210) Computer and Information Security National Collegiate Cyber Defense Competition and the CyberPatriot National High School Cyber Defense Competition. Dr. Bhavani Thuraisingham UT Dallas Louis A. Beecherl, Jr. I, Distinguished Professor Department of Computer Science and Executive Director of the Cyber Security Research Institute (972) as.edu Data and Applications Security, Digital Forensics, Trustworthy Web Services and Semantic Web, Biometrics, Secure Cloud Computing, Analyzing and Securing Social Media, and Information Systems Security. Dr. Ann Q. Gates UT El Paso Professor Department of Computer Science Director of the Cyber ShARE Center of Excellence (915) (office) Software Engineering Secure Software Systems Software Fault Monitoring Software Property Elicitation and Specification Semantic Web Technologies Dr. Donald A. Hicks UT Dallas Professor of Political Economy and Public Policy Special Assistant to President David Daniel Phone: Technology innovation, processes of emerging technologies and 2 industries

3 NEW: UT System Cyber Security Capabilities Catalog Categories: Courses and Programs Research Areas Dedicated Resources External Strategic Partnerships Non Certificate Certificate Courses Degree Programs Physical/ Hardware Analytics/ Virtual Institutes/ Centers Specialty Faculty/ Staff Pub/Pvt State/ Fed CoE Current Grants/ Contracts Arlington x x x x x x x Austin x x x x x x x Dallas x x x x x x x x x x El Paso x x x x x x x x x x San x x x x x x x x x x Antonio Tyler x x x x x Dedicated Resources include Facilities and Faculty (Specialties/Contacts) External Strategic Partnerships /Types **Contract details available on request

4 UT By the Numbers 2 nd Largest US University System In Texas : supports 1/3 of Undergrads and 2/3 of health care professionals FY 13: $13.9 B Operating budget $3.1B (70 %) of all research funds awarded to Tx public universities 54% Federal 65% from Health related institutions $17.6B in Endowments (2011) Staff: 87,000 +, 19,099 Faculty 48,819 degrees/certificates in AY12 66% undergrad 35% of Tx Public University 65% of public Health related institutions **UTPA and UTB joining to form UT Rio Grande Valley 4

5 UT Research: Strategic Impact Areas Landscape, Community, Regional Planning Anthropology Sustainability And Policy Integrative Biology Natural and Cultural Attributes: Scale and Depth of Research Multidisciplinary Approach Transformational orientation Risk Affordability Energy Acoustic Robotics Cyber Cloud Space Geological Sciences Archaeologic al Research Civil, Architectural, Environmental Engineering & Studies CLOUD Cyber Cloud Eneryy System Eng UxV Materials Brain & Neuro Adv. Manufacturing Convergent Analysis M&S * Advanced Manufacturing Bio security &Infectious Disease Health Med X over

6 An Ecosystem Approach to Future Capabilities Education and Training Degrees with cyber emphasis Certification & non cert programs for cont. ed. & specialty needs Agile hands on training & exercises Basic to adv. ed. linkage Industry Outreach &COIs Cultivate stakeholders External engagement with industry and government Understand user perspective Research and Applied Technology Public/Private projects Early Research focus for students Transformation and application Network & Infrastructure Agile development means Application orientation Secure collaboration Knowledge & production generation

7 An Ecosystem Approach to Future Cyber Security Capabilities EDUCATION AND TRAINING Dr. Gregory B. White University of Texas at San Antonio

8 Education and Training A growing need for cybersecurity professionals Job openings expected to increase 36.5% by 2022 It is pretty much impossible to hire folks with the indicated backgrounds There are maybe four or five thousand people in North America I can hire right now who have the technical skills keen to us. Alex Stamos, CIO Yahoo

9 Programs in the UT System DHS/NSA Designated Centers of Academic Excellence UT San Antonio (IAE and Research) UT Dallas (IAE and Research) UT El Paso (IAE) UT Austin (Research) DIA Designated Center of Academic Excellence UT El Paso (Intelligence Community) UT Rio Grande Valley (Intelligence Community)

10 UT System Cybersecurity Degrees UT San Antonio BBA in Infrastructure Assurance BS in Computer Science with concentration in Information Security MBA in Infrastructure Assurance MS in Computer Science with concentration in Information Security Ph.D. in Business Administration or Computer Science with concentration in Infrastructure Assurance or Information Security UT El Paso BS in Computer Science with a Secure Cyber Systems Track MS in Intelligence and National Security Studies MS in Software Engineering with a Secure Cyber Systems Track UT Dallas MS, PhD in Computer Science with a graduate certificate in Information Assurance UT Austin BS in Computer Science with a certificate in Information Security

11 UT System Certifications and External Programs Security related certificate programs CISSP, Security+, Network+ Homeland Security, Intelligence and National Security Cybersecurity Competitions K 12 initiatives Summer programs Competitions and games Cybersecurity Exercises State and Local Government Assistance

12 An Ecosystem Approach to Future Cyber Security Capabilities RESEARCH AND APPLIED TECHNOLOGY Dr. Bhavani Thuraisingham University of Texas at Dallas

13 Our Accomplishments Multiple Universities have received the NSA/DHS Centers for Academic Excellence in both Cyber Security Education and Research Multiple NSF Scholarship for Service awards to train US citizens Publications in Top Tier Journals and Conferences; Multiple IEEE and ACM Transactions, IEEE Security and Privacy Symposium, ACM Conference on Computer and Communications Security Numerous awards including IEEE Fellow, ACM Fellow, Multiple IEEE and ACM Awards Editorial board of major journals; Program Chairs for major conferences Prestigious grants including NSF CAREER, DoD YIP, DoD MURI, and awards from NSF, AFOSR, ONR, ARO, DHS, DARPA, NIH,

14 Our Sponsors (Sample)

15 Research Thrust 1 Active Malware Defense Reactively Adaptive Malware and Frankenstein Reverse Engineering for Malware Detection Android Malware Detection Novel Data/Stream Mining Techniques for: Malware detection Insider threat analysis Intrusion detection Host Health Management Author Attribution Risk Analysis for Botnets

16 Research Thrust 2 Secure Cloud Computing Virtual Machine Introspection Secure Virtualization Hybrid Cloud Security Secure Cloud Data Storage Secure Cloud Query Processing Cloud-based Assured Information Sharing Cloud-based Malware Detection Cloud Forensics

17 Research Thrust 3 Data Security and Privacy Secure Data Provenance Privacy-preserving Record Linkage and Mining Adversarial Data Mining Policy and Incentive-based Assured Information Sharing Security and Privacy for Social Networks Inference Control Risk-aware Data Security and Privacy

18 Research Thrust 4 Cryptography/Systems/Language/Networks/ Hardware Security Cryptographic Techniques Biometrics Control Systems Security Hardware Trojan Detection Wireless Network Security Software Engineering and Security Formal Methods for Security Binary Code Analysis Network Measurements

19 Research Thrust 5 Data Analytics for Security Semantic Web Data Management and Integration Geospatial Data Management and Integration Stream-based Novel Class Detection for Text Social Network Data Analytics Multimedia Data Management and Mining Novel Query Processing in Data Management

20 Research Thrust 6 Domain Specific Cyber Security Cyber Physical Systems Security Oil and Gas, Power Grid, Manufacturing Healthcare Informatics and Cyber Security Access Control, Data Security and Privacy Financial Systems and Cyber Security Security Protocols Cyber Issues in Border Security RFID Security, Biometrics, Analytics

21 Directions Collaborative research project with the UT System Schools Cyber Physical Systems Security with focus on Oil and Gas,. Jointly prepare MURI topics and send to AFOSR, ONR, ARO, so that our topics can get into the MURI BAA Joint education initiative to NSF and other agencies Joint proposals to NSF SatC (Security and Trustworthy Cyber Space program) Work with UT System to have a joint initiative with public/private partnerships

22 An Ecosystem Approach to Future Cyber Security Capabilities Collaboration Environments Dr. Ann Q. Gates University of Texas at El Paso Cyber ShARE Center of Excellence

23 Connections Inform Define strategy Educate workforce Innovate solutions Advance knowledge Transfer technology Impact policy Public Sector Academia Private Sector Cyber Security Challenges

24 Perspectives Enterprise Defense and Security Infrastructure Health Social Aspects Social Engineering Shareholder Advocacy Systems Software Hardware IT Infrastructure Cyber Physical Intelligent Systems.. Educ. Policy Standards Laws and Regulations Doctrines

25 Example of Interrelationships and Expertise: Border Security Communication Networks Sensors Secure Software Policy Identity Resilient Systems Protection Intrusion Detection Risk Management

26 Models for connecting COMMUNITY BUILDING

27 relations/cyber security PUBLIC

28 PRIVATE Dialog: IBM Connections Cloud Features Secure tool for sharing information, documenting activities, and communicating Defined Communities by invitation Capability to create sub communities Shared files that can be shared by all or part of of the community Features Wiki Blog Forum Ideation Activities: documentation of meetings, efforts, and action items REMARKS The health of the ecosystem requires interactions among the components. Cyber Security challenges are complex and need involvement from multiple areas and sectors. Connections across academia and public/private sectors will yield synergistic, system outcomes.

29 Contact Dr. Ann Q. Gates Acknowledgements: Supported in part by the National Science Foundation under Grant Nos. HRD and DUE Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

30 An Ecosystem Approach to Future Cyber Security Capabilities NETWORK AND INFRASTRUCTURE Dr.. Donald A. Hicks University of Texas at Dallas

31 Net Work A Net-Centric Workbench for Texas Next Industrial Era Ecosystem Presentation prepared for Strategic Initiative Overview D.A. Hicks Office of the President UT-Dallas Henry B. Gonzalez Convention Center San Antonio, Texas April 23-24, 2015 Graphic Graphic Source: Source: lib uchicago edu/wp-content/uploads/2013/10/bigdata-attribute-infocux-technologies jpg

32 MANUFACTURING IS THE DOMINANT WEALTH-PRODUCING SECTOR OF THE TEXAS ECONOMY. The reach of the goods-producing sector is throughout the rest of the economy is impressive: Professional and Business Services, Government, Construction, Finance & Insurance, Transportation & Warehousing and Utilities Source: Dallas Morning News, A Crude Awakening, December 8, 2014, D 1. Texas Remains a Manufacturing Powerhouse

33 Texas Research & Education Hubs Are Co-Located with Texas Dominant Industrial Clusters And We Can Do More to Enable Their Innovation Potential in Manufacturing Manufacturing Products & Parts Industrial Machinery Mfg. Metalworking Machinery Mfg. Other Fabricated Metal Product Mfg. Other ADAM General Sector Purpose Products Machinery & Parts Mfg. Plastic Products Mfg. Other Nonferrous Metal Mfg. Iron & Steel Mills & Ferroalloys Alumina & Aluminum Production Machine Shops & Threaded Products Coating, Engraving & Heat Treating Metal Other Miscellaneous Mfg. Other Electrical Equipment & Components Forging & Stamping UTDesign/US Ignite/ARC Rapid Application Development & High Speed Network Design W.M. Keck 3 D Innovation Center (Rapid Prototyping) Advanced Manufacturing & Design Center Digital Metal Laser Sintering (DMLS) TiiMS Advanced Manufacturing Systems Smalley Institute for Nano S&T (DMDI; Automation & Data Systems)

34 A Net-Centric Design, Development, Rapid Prototyping & Learning Platform Will Accelerate Manufacturing Innovation, Integration and Sustain Supplier Base & Workforce Vitality Manufacturing Products & Parts Industrial Machinery Mfg. Metalworking Machinery Mfg. Other Fabricated Metal Product Mfg. Other ADAM General Sector Purpose Products Machinery & Parts Mfg. Plastic Products Mfg. Other Nonferrous Metal Mfg. Iron & Steel Mills & Ferroalloys Alumina & Aluminum Production Machine Shops & Threaded Products Coating, Engraving & Heat Treating Metal Other Miscellaneous Mfg. Other Electrical Equipment & Components Forging & Stamping UTDesign/US Ignite/ARC Rapid Application Development & High Speed Network Design W.M. Keck 3 D Innovation Center (Rapid Prototyping) Advanced Manufacturing & Design Center Digital Metal Laser Sintering (DMLS) TiiMS Advanced Manufacturing Systems Smalley Institute for Nano S&T (DMDI; Automation & Data Systems)

35 Houston Dallas Source: JP MorganChase & Co. New Skills at Work local skills gaps as part of jpmorgan chases new skills at work initiative/

36 Net-Centric Talent & Training Portals Innovative Materials & Process Demonstration Platform for Advanced Manufacturing OEMS & Suppliers Manufacturing Cyber Learning C x Platform ccxxx

37 Bringing a Virtual Texas Industrial Ecosystem to Life!! A Net-Centric Platform for Manufacturing Design, Development, Learning, Logistics, Sustainment & Systems Integration Corporate Customer NSF/ DoE/NIH/DoD, etc. Manufacturing OEMs, Parts Suppliers & University S&E R&D Centers Strategic Partners Tier 1 Supplier Workforce Skill Development Centers TRL/MRL Integration Centers EXPAND REACH Ecosystem ENHANCE CONTROL Process Control TRANSFORM MARKETS Supply Networks Enterprise Production Supply Chains

38 An I-35 Aerospace Defense Defense Advanced Advanced Manufacturing Manufacturing (ADAM) Footprints Corridor along an I-35 Spine Obscures a Potential Super-Cluster Power Strip Wichita KS: Air Capital of the World Wichita State University: National Institute for Aviation Research (NIAR) Aerospace Companies: Kansas (121) Wichita (66) Oklahoma City, OK: Backbone of Largest U.S. MRO Complex Oklahoma Aerospace & Defense Alliance Aerospace Companies: Oklahoma (91) Oklahoma City (25) Tulsa (12) Fort Worth/Dallas, TX: 2 nd largest ADAM Sector Cluster in U.S. Aerospace Companies: Texas (93) Fort Worth (65) Dallas (52) San Antonio & Austin, TX: Southwest Research Institute (SwRI) Aerospace Companies: San Antonio (22) Austin (28) South Texas: Cameron County Boca Chica Spaceport: Commercial Flight Center Houston/Galveston, TX: National Aeronautics and Space Administration (NASA) Aerospace Companies: Houston (81) Monterrey, Mexico: Aerospace Companies: Mexico (~200) Nuevo León: Monterrey (24)

39 Source: ists/jim landers/ a world beatingnafta partnership.ece

40 QUESTIONS

41 Cyber UT Research: Strategic Impact Areas Research Areas Collaboration Environments Exercise and Training for Operational Risk Mitigation and Analysis Mature Modeling Digital Forensic/Insider Threat Cyber Security, Training, Certification Programs, & exercises Economics of Cyber Cyber Resilency Data and Applications Security, Programming Language Security and Network Security Open Source Software Sharing Featured Information UTSA named #1 in Cyber Training by HP Survey in IT RESOURCES: Center for Infrastructure Assurance and Security (UTSA) Cyber Security Research and Education Institute (UTD) Institute for Cyber Security (UTSA) Regional Cyber and Energy Security (RCES) (UTEP) Cyber SHARE (UTEP) Strategic Partnerships: UT System Research Cyberinfrastructure (UTRC) Project 41

42 Cloud IT UT Research: Strategic Impact Areas Research Areas Open Cloud Engineering Standards Data Center Ecological Framework for Assured Data Cloud Binary Code Analysis and Migration from Legacy System (Dr. Lin, UTD) HPC in Cloud (UTSA) Advance Computing Technologies Interdisciplinary computational sciences, engineering and IT Information Assurance Bioinformatics Synthetic Biology Big Data for Health Care Systems (UTSA) RESOURCES: Cyber SHARE (UTEP) Texas Advanced Computing Center (UT Austin) Institute for Computational Engineering and Sciences (UT Austin) Cyber Security Research and Education Institute (UTD) Institute for Data Analytics and Performance Management (UTD) Center for Computational Biology and Bioinformatics (UT Austin) Strategic Partnerships: Cloud and Big Data Lab 42

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education

More information

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham Louis A. Beecherl, Jr. I Distinguished Professor of Computer Science Director of the Cyber Security Research Center

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

NSF Workshop on Big Data Security and Privacy

NSF Workshop on Big Data Security and Privacy NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Big Data R&D Initiative

Big Data R&D Initiative Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY

HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY Ángel Cabrera, President George Mason University NAIOP Northern Virginia December 9, 2015 George Mason University is Virginia s largest

More information

Dr. Dave Dampier Professor of Computer Science and Engineering

Dr. Dave Dampier Professor of Computer Science and Engineering Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University CAE-2Y:

More information

US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program. NITRD Program US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Electrotechnology-Related Research in the FY 2015 Budget

Electrotechnology-Related Research in the FY 2015 Budget 24 Electrotechnology-Related Research in the FY 2015 Budget Chris J. Brantley James Savage Institute of Electrical and Electronics Engineers USA HIGHLIGHTS The FY 2015 federal budget request continues

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

Seidenberg School of Computer Science. Dyson College of Arts and Sciences. and Information Systems. College of Health Professions

Seidenberg School of Computer Science. Dyson College of Arts and Sciences. and Information Systems. College of Health Professions According to CNNMoney, 8 of the top 20 fastest growing jobs are in computing. Make your way to Pace s Seidenberg School and go to the head of the line. Work toward greatness. One Pace Plaza New York, NY

More information

Work in Progress: The Bridge to the Doctorate Experience A Reflection on Best Practices and Project Outcomes

Work in Progress: The Bridge to the Doctorate Experience A Reflection on Best Practices and Project Outcomes Work in Progress: The Bridge to the Doctorate Experience A Reflection on Best Practices and Project Outcomes T. Aktosun (UT Arlington) A. Arciero, B. Flores, H. Knaust (UT El Paso) C. Villalobos (UT Pan

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

The Massachusetts Open Cloud

The Massachusetts Open Cloud The Rafik B. Hariri Institute for Computing at Boston University The Massachusetts Open Cloud Azer Bestavros Founding Director Hariri @ BU = Incubator for Big R&D Ideas 2 1 Important Driver: Big Data Not

More information

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

College of Business The University of Texas at Brownsville and Texas Southmost College Facts and Figures

College of Business The University of Texas at Brownsville and Texas Southmost College Facts and Figures College of Business The University of Texas at Brownsville and Texas Southmost College Facts and Figures SCOB Facts and Figures 1 Mission Prepare students in the Lower Rio Grande Valley of Texas for their

More information

UNIVERSITY OF TEXAS ARLINGTON

UNIVERSITY OF TEXAS ARLINGTON UNIVERSITY OF TEXAS ARLINGTON Total Academic Cost Proposed Fall 2016 Proposed Fall 2017 Fall 2016 $4,646 $4,808 $162 $4,976 $168 $10,764 $11,460 $696 $12,201 $741 $4,259 $4,409 $150 $4,564 $155 $8,136

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

TABLE OF CONTENTS FOR TECHNOLOGY TRANSFER AND RESEARCH COMMITTEE

TABLE OF CONTENTS FOR TECHNOLOGY TRANSFER AND RESEARCH COMMITTEE TABLE OF CONTENTS FOR TECHNOLOGY TRANSFER AND RESEARCH COMMITTEE Committee Meeting: 5/2/2012 Austin, Texas James D. Dannenbaum, Chairman R. Steven Hicks, Vice Chairman Alex M. Cranberg Printice L. Gary

More information

Prairie View A&M University Computer Science Department 招 生 简 介

Prairie View A&M University Computer Science Department 招 生 简 介 Prairie View A&M University Computer Science Department 招 生 简 介 Prairie View A&M University A member of Texas A&M University Systems Founded in 1876, the 2 nd oldest state institution of Texas, located

More information

Cybersecurity education for the next generation Emerging best practices

Cybersecurity education for the next generation Emerging best practices Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting

More information

Framework Focus Action Items Responsible Parties Goals/Metrics (Best estimates)* Timeline (Best estimates)*

Framework Focus Action Items Responsible Parties Goals/Metrics (Best estimates)* Timeline (Best estimates)* Preface: The U. T. System Board of Regents unanimously adopted A Framework for Advancing Excellence throughout The University of Texas System (Framework) presented by Chancellor Francisco G. Cigarroa at

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging

More information

Discover Viterbi: Computer Science

Discover Viterbi: Computer Science Discover Viterbi: Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan Balding Graduate & Professional Programs November 2, 2015 WebEx Quick Facts Will I be

More information

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Discover Viterbi: Cyber Security Engineering & Informatics Programs Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts

More information

NIST Cybersecurity Framework Overview

NIST Cybersecurity Framework Overview NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

Master of Cyber Security

Master of Cyber Security Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

More information

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is

More information

Participants: Introduction:

Participants: Introduction: National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS

More information

Technology. Intelligence Health. Proactive Health Informatics

Technology. Intelligence Health. Proactive Health Informatics Technology Intelligence Health MS PhD Proactive Health Informatics School of Informatics and Computing Indiana University, Bloomington IN USA 2014/2015 1 2 Introduction Students who graduate from the Proactive

More information

The National Consortium for Data Science (NCDS)

The National Consortium for Data Science (NCDS) The National Consortium for Data Science (NCDS) A Public-Private Partnership to Advance Data Science Ashok Krishnamurthy PhD Deputy Director, RENCI University of North Carolina, Chapel Hill What is NCDS?

More information

HHSN316201200042W 1 QSSI - Quality Software Services, Inc

HHSN316201200042W 1 QSSI - Quality Software Services, Inc ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

More information

Year 2 Report. Miguel Velez-Reyes, Ph.D. RCES Center Director

Year 2 Report. Miguel Velez-Reyes, Ph.D. RCES Center Director Year 2 Report Miguel Velez-Reyes, Ph.D. RCES Center Director Outline Background Year 2 in Review Years 3-6 Challenges and Opportunities Revised Center Goals and Structure Final Comments 2 Background Created

More information

National Big Data R&D Initiative

National Big Data R&D Initiative National Big Data R&D Initiative Suzi Iacono, PhD National Science Foundation Co-chair NITRD Big Data Senior Steering Group for CASC Spring Meeting April 23, 2014 Why is Big Data Important? Transformative

More information

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity

More information

Strategic Plan Fiscal Years 2012-2016. Creating Value Through Collaboration

Strategic Plan Fiscal Years 2012-2016. Creating Value Through Collaboration Strategic Plan Fiscal Years 2012-2016 Creating Value Through Collaboration VISION The vision of the UT System Supply Chain Alliance is to be a leader in the delivery of world-class supply chain services

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

THE STATE OF THE CLOUD

THE STATE OF THE CLOUD TESTIMONY OF C. MAULI AGRAWAL VICE PRESIDENT FOR RESEARCH THE UNIVERSITY OF TEXAS AT SAN ANTONIO BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY HONORABLE

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Automated Student and Adult Learner Follow Up System Final Report 2008

Automated Student and Adult Learner Follow Up System Final Report 2008 TWC Apprenticeship Program 2006-2007 Exit Cohort As authorized by Texas Education Code, Chapter 133, the Texas Workforce Commission (TWC) receives funds from the Texas Legislature for registered apprenticeship

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

PH.D. IN BUSINESS ADMINISTRATION

PH.D. IN BUSINESS ADMINISTRATION PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent

More information

University of Texas System Productivity Dashboard A Model for Excellence

University of Texas System Productivity Dashboard A Model for Excellence University of Texas System Productivity Dashboard A Model for Excellence Association for Institutional Research, May 2013 Dr. Stephanie Bond Huie Vice Chancellor ad interim for Strategic Initiatives Jennifer

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

SCHOOL OF INFORMATICS AND COMPUTING. Exceed. Expectations

SCHOOL OF INFORMATICS AND COMPUTING. Exceed. Expectations SCHOOL OF INFORMATICS AND COMPUTING Exceed Expectations Our programs will exceed your expectations and help you exceed your own. Our students and faculty are breaking new ground every day: creating applications

More information

ENGINEERING What can I do with this major?

ENGINEERING What can I do with this major? ENGINEERING What can I do with this major? ANY ENGINEERING DISCIPLINE Research and Development Design Production Operations Management Teaching Consulting Sales and Marketing Law Manufacturing Healthcare

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922. CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Discover Viterbi: Systems Architecting & Engineering. Professor Azad Madni. Meghan McKenna Balding

Discover Viterbi: Systems Architecting & Engineering. Professor Azad Madni. Meghan McKenna Balding Discover Viterbi: Systems Architecting & Engineering Professor Azad Madni Meghan McKenna Balding November 9, 2015 WebEx Quick Facts Will I be able to get a copy of the slides after the presentation? YES!

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Keynote Speaker, 2015 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2015), Cape Town, South Africa, December 7-10, 2015.

Keynote Speaker, 2015 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2015), Cape Town, South Africa, December 7-10, 2015. Keynote Speaker, 2015 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2015), Cape Town, South Africa, December 7-10, 2015. Title: Impact of Big Data on Computational Intelligence Aspects

More information

The Land of Opportunity

The Land of Opportunity The Land of Opportunity Where is Texas? Borders New Mexico, Oklahoma, Arkansas, Louisiana and International border with Mexico Population: 26 Million Size: 2 nd Largest state in the U.S. With more than

More information

Booz Allen Engineering Services. Global Integrated Solutions Based on Technical Excellence and Mission Insight. Ready for what s next.

Booz Allen Engineering Services. Global Integrated Solutions Based on Technical Excellence and Mission Insight. Ready for what s next. Booz Allen Engineering Services Global Integrated Solutions Based on Technical Excellence and Mission Insight Ready for what s next. Engineering Services delivers to our defense and civilian government

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

Hofstra University. Big Data Laboratory Robotics and Advanced Manufacturing Laboratory

Hofstra University. Big Data Laboratory Robotics and Advanced Manufacturing Laboratory Hofstra University Big Data Laboratory Robotics and Advanced Manufacturing Laboratory Sina. Y. Rabbany, Ph.D. Acting Dean School of Engineering and Applied Science Professor and Director of bioengineering

More information

Computer Science. College of Engineering

Computer Science. College of Engineering Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree

More information

The Pratt Community Fiscal Year 2013

The Pratt Community Fiscal Year 2013 The Pratt Community Fiscal Year 2013 125 faculty (100 tenure-track)* 91 post-docs 431 PhD students 436 masters students 1,227 undergraduates 220 staff The Pratt community comprises more than 2,500 people.

More information

Engineering Internship Opportunities

Engineering Internship Opportunities Engineering Internship Opportunities Overview Summer 2015 Internship Locations Engineering Function Matrix Electrical Flight Industrial Materials Electrical System Design Wire Design, Install and Integration

More information

TO: Brent Lindquist, Dean. FROM: Lee M. Cohen, Professor and Chair. DATE: September 8, 2014. SUBJECT: Strategic Plan, Fall 2014

TO: Brent Lindquist, Dean. FROM: Lee M. Cohen, Professor and Chair. DATE: September 8, 2014. SUBJECT: Strategic Plan, Fall 2014 TO: Brent Lindquist, Dean FROM: Lee M. Cohen, Professor and Chair DATE: September 8, 2014 SUBJECT: Strategic Plan, Fall 2014 The Department of Psychological Sciences is currently home to 31 full- time

More information

Employment Change Due to Carbon Pricing, 2035 Policy Scenario Vs Baseline Industry Name North American Industrial Classification System # (NAICS)

Employment Change Due to Carbon Pricing, 2035 Policy Scenario Vs Baseline Industry Name North American Industrial Classification System # (NAICS) Employment Change Due to Carbon Pricing, 2035 Policy Scenario Vs Baseline Industry Name North American Industrial Classification System # (NAICS) 2035 (Net Jobs) Construction - 23 4774 1.21% Scientific

More information

NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses

NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses NITRD: National Big Data Strategic Plan Summary of Request for Information Responses Introduction: Demographics Summary of Responses Next generation Capabilities Data to Knowledge to Action Access to Big

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

MTech / ME / MArch / MBA (Infrastructure Management) COURSE-WISE ELIGIBILITY ( ) APPENDIX - VI. Code 01

MTech / ME / MArch / MBA (Infrastructure Management) COURSE-WISE ELIGIBILITY ( ) APPENDIX - VI. Code 01 01 02 03 04 05 06 08 09 11 12 13 14 AERONAUTCAL AUTOMOTIVE TECHNOLOGY Bio-Medical Electronics and Industrial Instru. Bio-Medical Signal Processing and Instrumentation Intelligent Systems CHEMICAL COMMUNICATION

More information

Programs that matter

Programs that matter SCHOOL OF INFORMATICS AND COMPUTING Programs that matter Our programs will change the way you think and expand your opportunities. Our students and faculty are breaking new ground every day: creating applications

More information

The 2012 Data Informed Analytics and Data Survey

The 2012 Data Informed Analytics and Data Survey The 2012 Data Informed Analytics and Data Survey Table of Contents Page 2: Page 2: Page 4: Page 21: Page 36: Page 39 Introduction Who Responded? What They Want to Know What They Don t Understand Managing

More information

The Emerging IIC Verticals Taxonomy Landscape

The Emerging IIC Verticals Taxonomy Landscape Authors: Robert A. Martin Senior Principal Engineer, Cyber Security Partnerships The MITRE Corporation ramartin@mitre.org Aaron Soellinger Program Manager Sentient Science IIC Journal of Innovation - 1

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

College of Engineering and Applied Science

College of Engineering and Applied Science College of Engineering and Applied Science Building a Strong Backbone for STEM Education Dr Robert Block, Assistant Dean Welcome to the PLTW Conference! About the Engineering College (EAS) EAS STEM Degrees

More information

The Future of Cybersecurity Education

The Future of Cybersecurity Education The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego Severe Cybersecurity

More information

Sunnie Chung. Cleveland State University

Sunnie Chung. Cleveland State University Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

TABLE OF CONTENTS FOR AUDIT, COMPLIANCE, AND MANAGEMENT REVIEW COMMITTEE

TABLE OF CONTENTS FOR AUDIT, COMPLIANCE, AND MANAGEMENT REVIEW COMMITTEE TABLE OF CONTENTS FOR AUDIT, COMPLIANCE, AND MANAGEMENT REVIEW COMMITTEE Brenda Pejovich, Chairman Wallace L. Hall, Jr. R. Steven Hicks Jeffery D. Hildebrand Robert L. Stillwell Committee Meeting: /4/203

More information

Texas. DeVry Impact. Summary Statistics. Earnings by Education Level. Total Wage Growth Over Studied Period. 65% Growth $44,262. 42% Growth $39,478

Texas. DeVry Impact. Summary Statistics. Earnings by Education Level. Total Wage Growth Over Studied Period. 65% Growth $44,262. 42% Growth $39,478 Texas DeVry Inc. s eight Texas locations 1 produced $82.7 million in economic impact in FY2010. As part of this economic impact, DeVry Inc. schools supported 809 jobs. Wage Impact annually, while the degree

More information

TABLE OF CONTENTS FOR ACADEMIC AFFAIRS COMMITTEE

TABLE OF CONTENTS FOR ACADEMIC AFFAIRS COMMITTEE TABLE OF CONTENTS FOR ACADEMIC AFFAIRS COMMITTEE R. Steven Hicks, Chairman Ernest Aliseda Alex M. Cranberg Brenda Pejovich Robert L. Stillwell Committee Meeting: 11/5/2014 Board Meeting: 11/6/2014 El Paso,

More information

IBM s Global University Programs & Regional Economic Development

IBM s Global University Programs & Regional Economic Development Education for a Smarter Planet IBM s Global University Programs & Regional Economic Development www.ibm.com/university Big Data and Analytics Education Conference October 25-26, 2014 Susan M. Puglia VP,

More information

Integrated Ecosystems

Integrated Ecosystems Integrated Ecosystems Toronto s Complete Business Performance System Business Case In association with: The Information and Communications Technology Council (ICTC) is a centre of expertise in ICT business

More information

Building Security In:

Building Security In: #CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me

More information

UNIVERSITY OF TEXAS at BROWNSVILLE SCHOOL OF BUSINESS MASTER OF BUSINESS ADMINISTRATION DEGREES (MBA) STUDENT INFORMATION

UNIVERSITY OF TEXAS at BROWNSVILLE SCHOOL OF BUSINESS MASTER OF BUSINESS ADMINISTRATION DEGREES (MBA) STUDENT INFORMATION UNIVERSITY OF TEXAS at BROWNSVILLE SCHOOL OF BUSINESS MASTER OF BUSINESS ADMINISTRATION DEGREES (MBA) STUDENT INFORMATION University of Texas at Brownsville School of Business MBA ONLINE A. General Description

More information