Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
|
|
- Sabina Powers
- 2 years ago
- Views:
Transcription
1 Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010
2 Panel on Emerging Cyber Security Technologies Robert F. Brammer, Panel Moderator Introduction Good morning. My name is Bob Brammer, and I am the VP and Chief Technology Officer for Northrop Grumman s Information Systems Sector. It is my pleasure to be the moderator for this Panel on Emerging Cyber Security Technologies. This is clearly an important and timely subject. Given all of the threats and challenges that we have been discussing at this Cyberspace Symposium, we certainly need significant new technology developments to help to meet the objective of this symposium Ensuring Commander s Freedom of Action in Cyberspace. We have a strong panel to discuss this topic this morning, with representation from government, academia, and industry. Each of our panel members works with advanced developments in cybersecurity technology every day. We have organized this session so that each panel member will have about 10 minutes for prepared remarks on their work with emerging cybersecurity technologies. Then we will open the floor for questions from the audience for about 20 minutes. There should be enough insight from the panel members to help us all understand which emerging technologies will be significant in meeting our objective, distinguishing these technologies from others, unsuccessful, that may be described as submerging technologies. The technologies that we will discuss this morning are not only computer hardware, software, and networking, but also architectural concepts, mathematical algorithms, and psychological and economic models. Considered fully, cybersecurity is a multidisciplinary field that requires a broad range of expertise to advance. You will find that diversity in the members of this panel, whose expertise includes research in military cyber systems and operations, realtime cybersecurity, biologically inspired cybersecurity, social aspects of computing, and many other areas. Emerging Cyber Security Technologies Cybersecurity has become a national priority. In May of last year, President Obama, in announcing the results of the White House Cyberspace Review, said it's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation.
3 It's also clear that we're not as prepared as we should be, as a government or as a country. In recent years, some progress has been made at the federal level. But just as we failed in the past to invest in our physical infrastructure -- our roads, our bridges and rails -- we've failed to invest in the security of our digital infrastructure. Consistent with this national priority, cybersecurity is a major priority in Northrop Grumman s research program. To build the program, we use information gathered from a wide variety of sources. These sources include our customers and their operations, cyber threat analyses performed by external and internal sources, major global IT and telecommunications firms, niche and start-up technology companies, research universities, venture capital organizations, and industry analysts. In some cases, we establish cooperative R&D agreements, in others we work on contract R&D projects, and we fund joint projects with leading research universities. Our research investments include a portfolio of short-term, mid-term, and longterm projects. We work closely with our customers in cybersecurity research. We have worked for years with many US government agencies on the development of state of the art cybersecurity systems. These customers include defense, intelligence, and civil federal agency customers in both large-scale operations and in advanced research. In particular, we have had the privilege of working with Mike VanPutte at DARPA, who is on our panel today, on some of his projects, including the National Cyber Range and the Dynamic Quarantine of Worms. Northrop Grumman has also been very active in the OSTP-sponsored National Cyber Leap Year Summit and the follow-on activities. The National Cyber Leap Year event in August 2009 addressed point #9 in the President s announcement by focusing on stimulating activities to develop leap ahead technologies to solve our cybersecurity challenges. Northrop Grumman has made significant research investments to address these challenges. For example, last year we established our Northrop Grumman Cybersecurity Research Consortium including Carnegie Mellon, MIT, and Purdue to help us develop some of these leap-ahead technologies. Our research in this consortium spans many areas of cybersecurity, defined as protection of information and information systems on networks. These areas include hardware and software security, privacy, simulation of cyber attacks and defenses, protection of critical national infrastructures, and others. We have initiated ten projects at the universities with complementary research projects at NGC. We conduct this research in consortium labs across the US. The three university members of this panel are all principal investigators or research directors in the Northrop Grumman Cybersecurity Research Consortium.
4 With some of the university research projects, we want to take a longer-range view. In particular, we are working to develop a deeper understanding of cyberspace. There has been some discussion in this Symposium about how cyberspace is the fifth domain of military operations, complementing land, ocean, air, and space. Because of the significance of the assets in cyberspace, it is clear that there are many reasons for a major military presence in cyberspace. However, cyberspace is very different from the other four domains in important respects. In particular, physical laws, of which we have some significant understanding, govern the other four domains. Cyberspace is synthetic, and we do not yet have a theory of the physics of cyberspace. We do not yet have the analogs of Newton and Einstein who can develop a significant theoretical framework for cyberspace developments. However, in the meantime, we are doing some very important cyberspace research, while we are working to build a general theory of cyberspace and cybersecurity. To organize our cybersecurity research, Northrop Grumman has developed a research agenda that includes a broad range of relevant topics. We will continue to extend this agenda as we do the research and perform large-scale cybersecurity operations for our customers and our own network. Northrop Grumman s Research Agenda Using the information that we gather from all of the above sources, we have developed a detailed cybersecurity research agenda. This research agenda contains eight major categories. Each category has several subcategories, leading to 75 categories in all. We invest in many of these areas and track developments in all of them through our research projects and our Strategic Technology Partnership Program. The eight major cybersecurity investment areas in our research agenda are: 1. Foundations for Cybersecurity e.g., secure hardware, firmware, and software engineering, massive information management and analytics, multilevel-security and cross-domain solutions, cyberspace situational awareness at multiple organizational levels, 2. Cyber Security and Information Assurance Characterization and Assessment - - e.g., certification and accreditation, quality assessment, security metrics, 3. Cybersecurity for Internet and Control System Infrastructure e.g., secure networking protocols, telecom and SCADA security, 4. Functional Cybersecurity supply chain management, identity management, security operations center management, real-time forensics,
5 5. Domain-Specific Cybersecurity -- Part of these domains are not connected to the Internet, but there are significant cybersecurity issues to be addressed notwithstanding tactical and airborne military networks, power grid, health information systems and privacy, 6. Cyberattack and Cyberexploitation e.g., technology and operational issues, 7. Next-Generation Systems and Architectures e.g., moving target architectures, tagged architectures, converged network, storage, and server protocols and operations, secure green IT, quantum computing, 8. Social Dimensions of Cyber Security cybersecurity economics, ethics and trust on the Internet, international law and policies, We see some promising emerging technologies in many of these areas. However, substantial work by government, industry, and academia is needed to realize the potential of these technologies for large-scale implementations that will have national impact. Our panelists this morning will describe some specific examples of these emerging technologies. Panel Members I will introduce the panel members in alphabetical order. The first panel member is Dr. David Brumley. David is a professor in Carnegie Mellon s Department of Electrical and Computer Engineering. His research includes the automatic analysis of binary code for security vulnerabilities. David has multiple patents and best paper awards for his research in computer security. The second panel member is Dr. Tom Knight. Tom is a Senior Research Scientist in MIT s Computer Science and Artificial Intelligence Laboratory. Tom is working on the development of computing technology based on biological concepts, which is a very active research area for new concepts in cybersecurity. Tom has been nominated by the Institute of Engineering and Technology as one of the Top 25 most influential people in engineering and technology today. He is also a Fellow of the American Association for the Advancement of Science. The third panel member is Dr. Eugene Spafford. Spaf is a professor of Computer Science at Purdue University and Director of Purdue s Center for Research in Information
6 Assurance and Security (CERIAS). Under his leadership, CERIAS has become the largest academic cybersecurity research center, graduating more than 25% percent of the cybersecurity PH.D s in the last ten years. His current research includes many issues in computer and network security, including computer crime and ethics, and the social impacts of computing. He has received many awards, including the Meritorious Civilian Service Award from the USAF for his work on the Air Force Scientific Advisory Board, the IEEE Computer Society Award for excellence in information security education, and the President s Award from the Association for Computing Machinery. The fourth panel member is Dr. Michael VanPutte. Mike is a Program Manager in DARPA s Strategic Technology Office. Dr. VanPutte manages the DARPA Cyber Defense Program responsible for conceptualizing and managing a diverse portfolio of high risk and high payoff computer security and cyber warfare programs that include the National Cyber Range, Dynamic Quarantine of Worms, Scalable Network Monitoring, and the Cyber Genome Program focused on revolutionizing cyber security and cyber scientific experimentation. Before joining DARPA, Mike was a career Army officer and had many significant assignments, including being the Deputy Director of the Joint Task Force on Global Network Operations and the Chief of the Knowledge Engineering Group at the Army War College. Northrop Grumman s Information Systems Sector is a $10B information systems integration organization and one of the largest providers of security systems and services to the US public sector. As the CTO, I am responsible for the technology strategy and the internal research program. Cybersecurity is a major priority in our research program, and we are investing significantly in many of the areas that our panelists describe in this panel discussion.
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
WORKSHOP Rethinking Cyber Security for Industrial Control Systems
WORKSHOP Rethinking Cyber Security for Industrial Control Systems Bob Mick, Workshop Moderator VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Re-Thinking Cyber Security Why Re-Thinking?
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
West Point Cyber Initiatives
West Point Cyber Initiatives From left to right: Cadets during the Academy s Projects Day, demonstrating their research through the CRC in fiber optic communications; the CRC s Cyber Defense Exercise cadets
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Overview. Enabling Successful Development Efforts: Standards, People, and Culture: The Enterprise Perspective March 9, September 16, 2011
Software Assurance Information (SwA) Systems Forum Overview Enabling Successful Development Efforts: Standards, People, and Culture: The Enterprise Perspective March 9, 2009 September 16, 2011 Brian P.
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity
Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,
Preface to the Fourth Edition
The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through
Information Technology R&D and U.S. Innovation
Information Technology R&D and U.S. Innovation Peter Harsha Computing Research Association Ed Lazowska University of Washington Version 9: December 18, 2008 1 Peter Lee Carnegie Mellon University Advances
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA
PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,
The National Consortium for Data Science (NCDS)
The National Consortium for Data Science (NCDS) A Public-Private Partnership to Advance Data Science Ashok Krishnamurthy PhD Deputy Director, RENCI University of North Carolina, Chapel Hill What is NCDS?
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships. Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC
Bill Guenther, Chairman, CEO and Founder Mass Insight Global Partnerships Robert F. Brammer, Ph.D., President and CEO Brammer Technology, LLC CSF Conference June 25, 2012 An Initiative of 18 Tremont Street,
Douglas M. DePeppe Cyberlaw Attorney
Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Keynote Speaker, 2015 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2015), Cape Town, South Africa, December 7-10, 2015.
Keynote Speaker, 2015 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2015), Cape Town, South Africa, December 7-10, 2015. Title: Impact of Big Data on Computational Intelligence Aspects
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain From a wide range of industryleading cyber products to nation-level cyber operations, our customers trust Raytheon s capabilities to protect their
MEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
1 Cyberspace and Security
1 Cyberspace and Security 1 Paper by Deputy Secretary of Defense William J. Lynn, Defending a New Domain: The Pentagon s Cyber Strategy, Foreign Affairs (Sep Oct 2010). In addition, an annual report by
Bachelor of Information Technology
Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
Information Assurance Curricula and Certifications
Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
Data Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com
KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
The Cyber Security Crisis
The Cyber Security Crisis Eugene H. Spafford Professor & Executive Director CERIAS http://www.cerias.purdue.edu/ The State of Cybersecurity Overwhelming vulnerabilities About 4000 in each of 2003, 2004
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Preventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications
OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Rethinking Cyber Security We Now Have Years of Experience - Security
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
Cyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Ness Cyber Security Services
Ness Cyber Security Services. This document discloses subject matter in which Ness A.T. Ltd. has proprietary rights. Neither the furnishing, receipt nor possession thereof confers or transfers any right
Department of Information and Technology Management
INFOTEC Overview Department of Information and Technology Management Introduction The Information and Technology Management Department (INFOTEC) is responsible for providing modern, secure, fit for purpose
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon (Lgordon@rhsmith.umd.edu) EY Professor of Managerial Accounting and Information Assurance Affiliate
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
Cyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
CONTENT. King Hussein Faculty of Computing Sciences
CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.
Thank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
Future cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
Cybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
TURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
Rising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE CYBER SECURITY AND INFORMATION ASSURANCE RESEARCH AND DEVELOPMENT SENIOR STEERING GROUP OF THE FEDERAL NETWORKING AND INFROMATION TECHNOLOGY
MEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School
MEDIA, TECHNOLOGY, AND INFORMATION LAW Yale Law School MEDIA,TECHNOLOGY, AND INFORMATION LAW Yale Law School Yale Law School has long focused on the intersection of media, technology, information, and
Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Cyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education
American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About