Cyber security in education in Greece
|
|
|
- Mercy Porter
- 10 years ago
- Views:
Transcription
1 Cyber security in education in Greece Sokratis K. Katsikas
2 NIST SP800-50
3 NIS education in Europe EU Cyber security strategy and NIS directive At the national level it recommends (d) An indication of the education, awareness raising and training programmes
4 NIS education in Europe The NIS platform ( 3 WGs WG3 on Secure ICT R&I Snapshot of education and training environment (
5 WG3 Education deliverable: Preliminary findings Cybersecurity education is a fast growing field Training in this area has become available from various sources and awareness programs.
6 WG3 Education deliverable: Preliminary findings Achievements Increase in number of university programs focusing on various aspects of cybersecurity. Emergence of a number of government initiatives supporting the development of cybersecurityskills and related professions Emergence of awareness programs in EU member states and ENISA-driven coordinated European awareness program. Emergence of several efforts working on assessing the needs of cybersecurity education and training. Growing number of organizations and enterprises providing cybersecuritytraining to all members/employees.
7 Gaps WG3 Education deliverable: Preliminary findings Lack of general agreement on the science of cybersecurity, leading to great diversity in training and curricular offered under the name of cybersecurity. Creation of common context in cybersecurity needs to be encouraged. Lack of differentiation between traditional programs offering fundamental security related curriculum and cybersecurity programs. While fundamental preparation is always key to good education, multidisciplinary skills necessary to a cybersecurity professional need to be included in many more programs.
8 WG3 Education deliverable: Preliminary findings Dearth of multidisciplinary programs and related degrees, as well as multi-faceted training materials. At a minimum, technologists focusing on cybersecurity need to have good understanding of privacy, legal and regulatory frameworks, economics or usability issues. Likewise, those focusing on legal and societal issues need to acquire a solid understanding of technology. Lack of mechanisms to quickly create and share materials on emerging threats or newly crucial skills, to ensure education provided under various cyber-security programs is up to date and matches the requirements of the dynamic workplace. Lack of mechanisms for continuing education for those who already acquired undergraduate and graduate degrees.
9 WG3 Education deliverable: Preliminary findings Although some EU countries have made strides in bringing cybersecurity students in contact with industry and government for apprenticeship projects, to help forge a practical foundation for the application of skills, these programs are usually limited and don t have solid sources of funding. Cybersecurity is a very dynamic field. Like similarly fast paced environments, it suffers from the lack of reliable mechanisms to bring the results of research into the curriculum as quickly as possible and to engage students more in academic research.
10 Universities Technological Education Institutes (TEIs)
11 NIS education in Greece: PhD Programmes In all Universities where faculty specialized in NIS exists Research teams active in NIS exist in most Universities and in some TEIs Strongest research teams in University of Piraeus ( - ) and University of the Aegean (InfoSec Lab - p?group=l1)
12 NIS education in Greece: MSc Programmes University of the Aegean ( ptyxiaka/genika.php) Intensive Programme on Information & Communication systems Security IPICS (
13 NIS education in Greece: Undergraduate programmes 23 programmes in 18 Universities 19 programmes in 13 TEIs Most (6) courses offered in UniPi Dept. of Digital Systems 5 University programmes offer more than 3 courses 2 University programmes (NTNU and TUC) do not offer any NIS courses
14 NIS education in Greece: Undergraduate programmes Only 1 TEI programme offers more than one NIS course 7 TEI programmes do not offer any NIS courses Contents against ACM/IEEE Computer Science Curricula 2013 ( final-report.pdf)
15 NIS education in Greece: Undergraduate programmes Universities TEIs IAS/Foundational concepts in security IAS/Principles of secure design IAS/Defensive programming 8 1 IAS/Threats and attacks IAS/Network security 22 8 IAS/Cryptography IAS/Web security 19 7 IAS/Platform security 7 4 IAS/Security policy and governance IAS/Digital forensics 3 1 IAS/Secure software engineering 1 - Number of courses 43 12
16 Thank you!
Cybersecurity Education snapshot for workforce development in the EU
Cybersecurity Education snapshot for workforce development in the EU Network and Information (NIS) Platform Working Group 3 Final version v0.9 Last modified: September 2015 Editors: Claire Vishik (Intel),
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Advanced Curriculum on Intelligent Transport System (ITS) by Means of ICT (TransITS)
Advanced Curriculum on Intelligent Transport System (ITS) by Means of ICT (TransITS) Aim The aim of this project is to solve or overcome the following main inherent problems the ITS higher education and
Joint Master in Information Security and Data Management (ISDM)
PROJECT CONCEPT PAPER Joint Master in Information Security and Data Management (ISDM) First draft: Dr. Derar Eleyan, Palestine Technical University-Palestine. Key Action 2: Capacity Building in the Field
Roadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
CYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
MSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)
Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical
Cyber Security in Austria
Cyber Security in Austria The Austrian Cyber Security Strategy Andreas Reichard 18 th May, 2015 Roadmap Austrian Cyber Security Strategy 1/2 MRV MRV 11/2011 03/2012 06/2012 09/2012 10/2012 03/2013 Fed.
CONTENT. King Abdullah II Faculty of Engineering
CONTENT About Mission, Vision & Goals Engineering Faculty Engineering Resources Bachelor Programs B. Sc. Program in Electronics Engineering B. Sc. Program in Computer Engineering B. Sc. Program in Communication
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
Information Security Standards in Critical Infrastructure Protection
Information Security Standards in Critical Infrastructure Protection Berlin 11/11/2015 Alessandro Guarino StudioAG Introduction Computers everywhere! ICT Technologies pervasive even in very analog settings:
Norway and the Nordic s
Cyber Security Education 2.0: Minding the Gap for Computational Sovereignty in Norway and the Nordic s Professor Dr. Stewart Kowalski Information Security Vice Dean of Education Faculty of Computer and
Welcome to Stockholm University (SU) and the Department of Computer and Systems Sciences (DSV) Uno GH Fors, DDS, PhD Professor Vice head of DSV
Welcome to Stockholm University (SU) and the Department of Computer and Systems Sciences (DSV) Uno GH Fors, DDS, PhD Professor Vice head of DSV Stockholm University The largest University in Sweden 1878
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
THE TERTIARY TECHNOLOGICAL EDUCATION IN GREECE AND ITS POSITION IN THE SINGLE EUROPEAN HIGHER EDUCATION AREA
THE TERTIARY TECHNOLOGICAL EDUCATION IN GREECE AND ITS POSITION IN THE SINGLE EUROPEAN HIGHER EDUCATION AREA Chatzichristos Christos 1, Karasavvoglou Anastasios 2, Vassiliadis Spyros 1 1 Technological
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. [email protected]
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA [email protected] 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the
ESCoRTS A European network for the Security of Control & Real Time Systems
ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in
Nursing Informatics Education Professor John MANTAS Health Informatics Laboratory Faculty of Nursing University of Athens Email: [email protected].
Nursing Informatics Education Professor John MANTAS Health Informatics Laboratory Faculty of Nursing University of Athens Email: [email protected] Why Nursing Informatics Education is of particular importance?
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
How To Be A Successful Member Of The European Agency For Security And Safety
CEPOL Cybercrime forensics & digital evidence course Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Role of eu-lisa on the Cybersecurity: Present and Future Perspectives Tallinn
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:
FC 2 Collaborative Seed Grant Program
FC 2 Collaborative Seed Grant Program Program Description: The Florida Center for Cybersecurity (FC 2 ) supports and encourages collaboration across the State University System (SUS) to promote research
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development Wm. Arthur Conklin University of Houston, College of Technology 312 Technology Bldg, Houston, TX
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and
TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE
UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME IN FORENSIC SCIENCE Chapter 1 Article 1.1 Article
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
How To Develop A Cyber Security Society
CYBER SECURITY EDUCATION IN MONTENEGRO: CURRENT TRENDS, CHALLENGES AND OPEN PERSPECTIVES Ramo Šendelj, Ivana Ognjanović University of Donja Gorica, Montenegro Abstract Cyber-security threats evolve as
UNDERGRADUATE PROGRAMS
UNDERGRADUATE PROGRAMS FACULTY OF COMMERCIAL SCIENCES Business Administration (English) Business Administration International Trade (English) * Banking and Finance (English) * Political Science and International
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
Helmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU
Helmut Wacket Head of Oversight Division Cybersecurity: regulatory framework and central bank initiatives in the EU Cybersecurity in the EU Securing network and information systems in the EU is essential
Risk Management in Practice A Guide for the Electric Sector
Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015 Before we continue let s get over our fears and myths
BIRMINGHAM CITY UNIVERSITY. Faculty of Education, Law and Social Sciences. Job Description
BIRMINGHAM CITY UNIVERSITY Faculty of Education, Law and Social Sciences Job Description Job Title: Programme Director Senior Academic in Forensic Psychology Department: School of Social Sciences Division:
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Connected Health (Priority Area D)
PRIORITY AREA D: CONNECTED HEALTH ACTION PLAN Connected Health (Priority Area D) Context Connected health and independent living technologies are technologies that facilitate remote delivery of healthcare
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Program Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know
Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know Gus Coldebella, Goodwin Procter LLP John Geschke, VP and General Counsel, Zendesk, Inc. Jim Jaeger, VP, Cybersecurity
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
Speaking Notes. Meeting of Chairpersons of EU. Communications, Education and Transport Committees
Speaking Notes Meeting of Chairpersons of EU Communications, Education and Transport Committees Thank you for the invitation to join you here today, on this important week in Ireland and Europe s digital
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
STUDENT LEARNING ASSESSMENT REPORT
STUDENT LEARNING ASSESSMENT REPORT PROGRAM: Post baccalaureate Certificate in Data science SUBMITTED BY: Diane Murphy DATE: October 28, 2015 BRIEFLY DESCRIBE WHERE AND HOW ARE DATA AND DOCUMENTS USED TO
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
DRAFT THE CONTEXT: NORTHEASTERN 2015
DRAFT NORTHEASTERN 2025: THE GLOBAL UNIVERSITY THE CONTEXT: NORTHEASTERN 2015 Northeastern University attracts students and faculty from around the world who value experiential learning as a cornerstone
ACCOUNTING AND FINANCE
LIVERPOOL HOPE UNIVERSITY FACULTY OF ARTS AND HUMANITIES ACCOUNTING AND FINANCE YOUR FUTURE STARTS WITH HOPE 030815 Accounting and Finance Fact File Faculty: Arts and Humanities Department: Business School
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
