A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

Size: px
Start display at page:

Download "A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)"

Transcription

1 A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant University and others who wish to participate, announce their intention to collaborate as academic institutions on cybersecurity issues, particularly those at the intersection of technology, policy, law, and national strategy. For the 2012 academic year we ourselves commit to inform each other of courses and degree programs that we offer, research that is funded, publications that are produced, seminars, colloquia and conferences being planned, and training programs being offered, with the possibility of renewing the collaboration annually. We will look for opportunities to collaborate in these offerings as well as on research proposals to strengthen and expand our interests at the intersection of technology and policy in cyberspace. We are individually interested in educational outreach to other schools and universities, research exploring and formulating domestic and international cyberspace policy and strategy, and training to serving Rhode Island, domestic, and international audiences. Our institutions would also serve individually as potential partners with the private sector and/or government, consistent with law and regulation. RI CCTP will serve as a role model for other regional collaborations. Background Cyber threats are among the most serious national security and economic challenges facing the national and global community. That challenge and the threat to national interests are reflected in United States government strategies focused on national defense and international engagement in a networked world. Computers and networks, for which security was an afterthought, are now ubiquitous. The efficiencies provided by networks and computers have lured us into integrating these technologies throughout our national economies. Belatedly, we have come to realize that this tight integration provides opportunities for criminals and foreign powers to steal our identities, our monies, and our commercial and state secrets as well as attack our critical infrastructure and disrupt military operations. To protect our personal, commercial, and national assets we must now take steps, individually and collectively, on both the national and international levels to secure our computers and networks. We must engage in international initiatives to combat crime and commercial espionage and avoid disruption of critical services and infrastructure that could escalate into conflict. Addressing these problems requires a broad and deep understanding of both cybersecurity policy and technology. While most computer science departments have taught courses on cryptography for decades, they have only recently begun to introduce computer and network security into their curricula. September 13,

2 The policy aspects of cybersecurity have been the subject of studies organized by think tanks, the National Academies of Science, and international bodies. Professional military institutions studying national security and strategy have only recently begun to integrate cybersecurity issues into curricula despite more than a decade s worth of experience suggesting that networks and information technologies are both essential to operations and vulnerable to attack. Unfortunately, only a few universities in the United States and the United Kingdom offer instruction or degree programs that combine both technology and policy. Knowledge of both is essential in shaping policy and developing technology; therefore, a collaboration like this in Rhode Island could play a vital role for our nation. As noted in a recent study 1 by the Center for Strategic and International Studies, an educated cybersecurity workforce is urgently needed: We not only have a shortage of the highly technically skilled people required to operate and support systems already deployed, but also an even more desperate shortage of people who can design secure systems, write safe computer code, and create the ever more sophisticated tools needed to prevent, detect, mitigate and reconstitute from damage due to system failures and malicious acts. Because cybersecurity is both a domestic and global problem, we also need a population of welleducated analysts, scholars, officers, diplomats, and private sector individuals who are conversant with domestic and international cybersecurity policy. Sound policy development is informed by a solid knowledge of technology. Technology development, which often involves policy decisions 2, must respond to the needs of policy, especially in the international arena. Thus, collaborating on the two together in one regional setting is mutually advantageous. The Rhode Island Story Rhode Island can serve as a model for the nation in cybersecurity policy and technology formulation. The University of Rhode Island, Brown University, and the U.S. Naval War College are three exemplary institutions with complementary strengths. The University of Rhode Island (URI) is a national leader in teaching, service, and research in the field of digital forensics, a component of cybersecurity that focuses on analysis and attribution of cyber crime and cyber attacks. In addition, URI has a rich program in the broader area of cybersecurity technology education and research. Brown University, through its Department of Computer Science, the Watson Institute for International Studies, its new Institute for Computational and Experimental Research in Mathematics (ICERM), and 1 A Human Capital Crisis in Cybersecurity, K. Evans and F. Reeder, CSIS Commission on Cybersecurity for the 44 th Presidency, November Code: And Other Laws of Cyberspace, Version 2.0, Lawrence Lessig, Basic Books, September 13,

3 colleagues in the departments of political science and economics, is an international leader in computer and network security, policy formulation, mathematical cryptography, and the social sciences. The U.S. Naval War College is a professional military educational institution with four principal missions: to develop strategic and operational leaders, to help define the future Navy, to support combat readiness, and to strengthen maritime security cooperation. To fulfill these missions NWC faculty teach military officers and government officials as well conduct research into the full-range of issues regarding war and peace, strategy, and national security decision making. With the support of the academic and military leadership, NWC faculty have formed a cybersecurity working group that is helping integrate cyber security into the core curriculum, electives programs, research projects and war gaming. At the end of this report each institution has provided an overview of the specific activities they will undertake. We now present some of the general plans that will be part of each institution s activities. The Educational and Training Mission The educational mission would be carried out through courses and degree programs developed at each academic institution, enhanced by cross-institutional courses and faculty exchanges, where possible and subject to later negotiations. Implementation mechanisms might include memoranda of understanding, faculty appointments, cross-listings of courses, and video conferencing facilities. While the details of these educational programs are still in the planning stages, each institution would develop its own degree and training programs when practical and as permissible under law and regulation, using courses offered by all three institutions. Cross-institutional courses would enlarge the educational opportunities for all students while allowing each institution to develop its own strengths. The number and level of degree programs will be determined by student interest and staffing as well as the interests of each institution. Short-term programs or conferences on cybersecurity technology and policy would be offered to domestic and international audiences, perhaps with the collaboration of multiple institutions. Some of these would be training-based certificate programs whereas others could lead to professional Master s degrees designed for individuals studying part-time. Local or federal governments might sponsor workshops and training programs. The Service Mission Service to local and national businesses and governments and local schools would be delivered in several ways. First, the institutions would individually offer training to Rhode Island, domestic, and/or international audiences in cybersecurity technology and policy as well as digital forensics, with collaboration where possible and subject to negotiation. In this connection they would offer continuing education programs to the local community, consistent with each institution s mission. Second, they would also serve as a knowledge base for the state, the federal government including Congress, and the private sector. Knowledge would be disseminated through faculty and staff publications and student reports on institution websites. Finally, where possible, the institutions would also serve as a focal point September 13,

4 for outreach to schools and universities around the country. In this capacity, the collaboration would serve as a model for the creation of other technology and policy collaborative activities. The Research Mission The collaborators would engage in innovative and distinctive research based upon their substantive expertise. The core research agenda of the center will include: Research Institutional Expert Digital forensics Cybersecurity technologies Strategic implications of cyber conflict, including the URI URI, Brown NWC diffusion of power and complexity in cyberspace Impact of international and domestic law Governing cyber warfare Development of international institutional arrangements and norms Technology to protect information systems Behavioral understandings to bridge the policy-technology gap NWC NWC Brown Brown, URI Brown In addition, the group will engage U.S. and international scholars and practitioners in addressing cybersecurity challenges, and serve as a source of information, expertise and recommendations for the policymakers on specific cybersecurity issues. Faculty Faculty from the three major research institutions (U.S. Naval War College, University of Rhode Island, and Brown University) will be introduced to each other and encouraged to collaborate on research. NWC faculty specializing in national security and China, cyber doctrine and strategy, international law including the law of armed conflict, and war gaming are interested in collaborating, as are URI faculty members focusing on digital forensics and cybersecurity technology from the Departments of Computer Science and Electrical and Computer Engineering. Brown faculty members in Computer Science, Engineering, ICERM, Political Science, and the Watson Institute also will be involved in effort. There will September 13,

5 be many synergistic opportunities for teaching and research between the institutions, which will broaden and deepen the collaboration. Participation of Other Rhode Island Academic Institutions Participation is expected from other academic institutions in the state that are currently less well committed to cybersecurity; preliminary discussions have been held with Dr. José Griffiths, Vice President for Academic Affairs at Bryant University Bryant hosts regional cybersecurity conferences. Others are welcome to participate. The Partners Program URI and Brown will consider introducing CCTP Partners Program whose purpose would be to provide outreach and visibility to companies who want to participate in the activities of the center, give talks in periodic Partner Symposia, and recruit students. They also could arrange to have employees attend training sessions relevant to their interests. In return for their participation, partners will be expected to contribute to the discretionary income of the center. Funds derived in this manner will provide support for colloquia, symposia, and student events. The following organizations are candidates to become partners in the center. (Note that not all of these have been contacted but will be as the center plans develop.) Raytheon SAIC Deloitte McAfee Symantec Verisign Microsoft IBM Booz Allen Google Facebook MITRE DHS State Department Dept. Commerce Tiger s Lair Inc. ForensicSoft, Inc. Trap Data Group, Inc. Secure Works, Inc. Naval Undersea Warfare Center Adaptive Solutions RI National Guard RI EMA RI State Police Cyber Command Fleet Cyber Command 10 th Fleet NSA Certification The center institutions are applying or will consider applying for designation as National Security Agency Centers of Academic Excellence in IA Education and as NSA Centers of Academic Excellence Research. Budget To be determined as the center plans develop. Summary Rhode Island is home to three major complementary institutions uniquely positioned to become world leaders in cybersecurity issues. Thus, the time is opportune for these institutions to collaborate on bridging the gap between technology, policy, and national security. Such an activity can reinforce the September 13,

6 intellectual resources of the University of Rhode Island, Brown University, and the U.S. Naval War College, with the participation of neighboring academic institutions, to provide a very high quality of education for undergraduate, graduate, and professional students as well as excite interest among K-12 students in the new technologies. Where possible, they could serve as resource centers for small companies and a breeding ground for entrepreneurs, some of whom may choose to work and reside in Rhode Island. Finally, they could serve as resources for federal, state, and Congressional policymakers, based on innovative research on cybersecurity technology and policy questions and as a convener of international expertise to address evolving cybersecurity challenges. The three major institutions welcome the engagement of Bryant University and other academic institutions that wish to collaborate. September 13,

7 FOCUS AREAS OF EACH INSTITUTION The areas of focus of each of the three principal academic partners are described below. University of Rhode Island Focus Areas URI will expand its existing Digital Forensics Center (http://www.dfc.cs.uri.edu) to establish the University of Rhode Island Cyber Security Center (URICSC) to realize the mission of providing cyber security workforce enhancement, cyber security services, and cyber security technology research for the State of Rhode Island and the Nation. The URICSC will be URI s focal point for participating in the proposed RI CCTP. URI Digital Forensics and Cybersecurity Technology Education. URI is offering courses in digital forensics and the technical aspects of cybersecurity including: Computer Forensics Encryption and Security Live Forensics and Incident Response Information Assurance Network Forensics Ethical Hacking Network Security and Intrusion Detection Degree and certificate programs at URI that contain cyber security coursework include: Undergraduate Minors in o Digital Forensics o Information/Cybersecurity Graduate Certificate in Digital Forensics Professional Certificate in Digital Forensics Graduate Certificate in Information Assurance/Cybersecurity Master s and PhD Degrees in Computer Science with a focus on Digital Forensics and/or Cybersecurity Research Part of URI's cybersecurity education is an extensive internship program that places its students with federal, state, and local law enforcement organizations and local companies that provide digital forensics and cybersecurity services and product development. Nationally, URI is the U.S. National Science Foundation's Research Experience For Undergraduates (REU) Site For Digital Forensics and as such hosts NSF-sponsored interns each year from all over the country who learn digital forensics in the URI Digital Forensics Center. The proposed CCTP would allow URI to work with Brown and the NWC to joint-list these courses, develop new courses, and enrich URI s cybersecurity/digital forensics degree program offerings through courses offered by Brown and NWC. URI Digital Forensics and Cybersecurity Service and Training. The URI DFC has conducted training courses for federal, state, and local law enforcement including: network forensics, cell phone forensics, digital forensics for first responders, digital forensics analysis, network security for critical infrastructure providers (as part of the U.S. Dept of Homeland Security UASI initiative). It has built and maintains the RI State Police Computer Crimes lab - a centralized lab for all digital forensics in the state. The URI DFC September 13,

8 staff serves on the state s Internet Crimes Against Children Task Force and the state s Cyber Disruption Response Team. Nationally, the URI DFC is the primary partner with the U.S. Department of Justice's Electronic Crime Technology Center of Excellence and as such is leading their efforts in projects such as cell phone forensics gap analysis and a national assessment report on the digital evidence handling needs faced by state and local law enforcement. URI s participation in the RI CCTP will allow it to expand its services to the service mission of the proposed RI CCTP. URI Digital Forensics and Cybersecurity Technology Research. URI has an active research program in digital forensics and cybersecurity funded primarily by the U.S. Department of Justice and the U.S. National Science Foundation, including an NSF Career Award for the faculty member involved in Cyber Security Trust research. Recent research projects include: Cyber Security Trust Steganography Detection Automated Child Pornography Detection Power Grid Security Cloud Forensics Network Forensics Tools Wireless Security Cell Phone Forensics Tools Voting System Forensics Law Enforcement Search String Support Data Security For Data Center As part of the proposed RI CCTaP, URI will expand its research program further into cybersecurity technology areas while working closely with Brown, NWC, and the partner institutions on researching solutions in the cybersecurity technology/policy intersection. September 13,

9 Brown University Focus Areas We propose to create a center of excellence at Brown University that is an educational, research, and service center focusing on cybersecurity technology and policy issues that are both domestic and international in nature. The center would serve not only students at our institution but also the local and national business communities and governments. It would also offer training and certificate programs to both domestic and international students and professionals, thereby extending the outreach of the center in a manner designed to increase understanding and protection of computer and networking technology and confidence in the good intentions of the U.S. with regard to the use of this technology. Courses Below are representative computer science and policy courses that the center may offer. Hardware Security The Internet as a Social Medium Computer System Security Network Security Freedom of Expression, Privacy, and Security Online Cryptographic solutions and risk analysis The History of Internet Governance Secure Software Development The Politics of Cyber Policy Cybersecurity and International Relations The Legal Dimensions of Cyberspace Human Factors in Computer Security Cyber Economics International Law and Cyber Conflict Privacy and Security on the Web Research Building on Brown s recognized strength in computer science, engineering and mathematics, a significant research component will focus on technology to protect information systems, such as strong ubiquitous encryption, software and hardware supply chain security, application risk management, and secure cloud computing. Social science research into decision-making under endemic uncertainty, political challenges posed by the differing nature of cyber threats, and the lack of a common understanding/lexicon between the policy-technology communities will be addressed. With expertise in international institutions and norms, research will explore existing international legal frameworks and the possible need for new agreements, the development of global norms of behavior, and cybersecurity collaboration with like-minded states and the private sector to enhance collective security. In addition, with its established international relationships and reputation, Brown can serve a convening function as a forum for international engagement and capacity building training on cybersecurity issues. Other research topics may include enhancing private sector partnerships and information-sharing on cyber threats, cyber conflict risk mitigation efforts, protection of cyber-based critical national infrastructures, frameworks for data breach notification, economic incentives to improve cybersecurity, certification, and regulation of secure software development measures, and policies for the secure reliable management of cloud computing. 9

10 U.S. Naval War College Focus Areas NWC faculty have formed a cybersecurity working group with a mandate from the President and Provost of the Naval War College. The cybersecurity working group has recommended that the NWC create a Center for Cyber Warfare Studies (CCWS). This center will be dedicated to the interdisciplinary study of the challenges presented by cyber warfare, cyberspace operations, and cybered conflict in the twentyfirst century. 3 Mission: The mission of the CCWS is to: 1. Conceptualize, promote, and support research and teaching on cyber warfare, cyberspace operations, and cybered conflict 2. Facilitate interaction and collaboration between professional military educational institutions, civilian academics, and warfighters 3. Disseminate cutting-edge analysis via symposia and workshops to provide a forum for dialogue at the Naval War College between U.S. and international practitioners and scholars 4. Expand outreach and networking activities to establish and sustain a community of interest devoted to the study and teaching of cyber warfare, cyberspace operations, and cybered conflict 5. Work in conjunction with the EMC Informationist Chair to further the understanding of information-related capabilities in achieving U. S. operational and strategic objectives Objectives: The operational objectives for CCWS are to: 1. Normalize cyber warfare, cyberspace operations, and cybered conflict concepts in joint military operations and planning paradigms 3 Cyber warfare is defined as an armed conflict conducted in whole or part by cyber means. Military operations conducted to deny an opposing force the effective use of cyberspace systems and weapons in a conflict. It includes cyber attack, cyber defense, and cyber enabling actions. (Joint Terminology for Cyberspace Operations. GEN James E. Cartwright, USMC, VCJCS, July 2010) Cyberspace operations are defined as the employment of cyber capabilities where the primary purpose is to achieve military objectives in or through cyberspace. Such operations include computer network operations and activities to operate and defend the Global Information Grid. (Joint Terminology for Cyberspace Operations. GEN James E. Cartwright, USMC, VCJCS, July 2010) A cybered conflict is any conflict of national significance in which success or failure for major participants is critically dependent on computerized key activities along the path of events. (Dr. Chris Demchak, USNWC) 10

11 2. Foster collaboration and increased institutional ties between civilian and professional military education institutions and between U.S. and international academics and practitioners 3. Promote collaborative research among scholars and practitioners that results in panel presentations at major conferences, workshops and seminars, and published research Activities: The Center for Cyber Warfare Studies (CCWS) was created to ensure that education on cyber warfare, cyberspace operations, and cybered conflict remains current, relevant, and accessible to military officers who will build on this education when devising strategies to deal with the changing character of warfare in the twenty-first century. The Center supports education and curriculum development, including case studies that focus on developing strategies, counter-strategies, and operating concepts for cyber warfare, cyberspace operations, and cybered conflict in the global information environment. CCWS achieves this by sustained collaboration that draws on expertise from a wide range of disciplines that include practitioners, educators, historians, information warfare officers, cryptologists, and scientists. Representative activities conducted by members of the CCWS include hosting and participating in symposia and workshops in order to write and teach case studies and performing outreach and network building among U.S. and international researchers and practitioners who have expertise on cyber warfare, cyberspace operations, and cybered conflict. The CCWS workshops and conferences bring civilian scholars together with military faculty and practitioners to analyze the national and international security challenges posed by cyber warfare, cyberspace operations, and cybered conflict. The target audiences for CCWS symposia, research programs, and educational outreach activities are civilian and military faculty and practitioners who teach at civilian universities, military professional institutions, and military academies. Funding for CCWS represents a sustained commitment on the part of the U.S. Navy and the Naval War College to promote and support teaching and research on cyber warfare, cyberspace operations, and cybered conflict to future strategic leaders. Ultimately, CCWS fosters interaction, collaboration, and inter-agency coordination across professional military educational institutions throughout the country and with U.S. allies. Contacts Dr. Peter Dombrowski, Chair, Strategic Research Department, U.S. Naval War College, Dr. Victor Fay-Wolfe, Director URI Digital Forensics Center, University of Rhode Island, Dr. John E. Savage, Department of Computer Science, Brown University,

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Cybersecurity Workforce Opportunities

Cybersecurity Workforce Opportunities Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization

The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization Technical Appendix to the Memorandum of Understanding toward

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Criminal Justice Program Standards Aligned with College Standards

Criminal Justice Program Standards Aligned with College Standards 1 Criminal Justice Program Standards Aligned with College Standards 5.00 COLLEGE STANDARDS FOR FACULTY EVALUATION The additional Criminal Justice Program Standards, where relevant, appear in italics. This

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community.

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community. ----- Original Message ----- From: Joseph Kizza To: Herbert Burhenn Sent: Friday, January 12, 2007 1:31 PM Subject: Re: New center Hello Provost Herbert Burhenn - This is great news for us and UTC. We

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

ORGANIZATIONAL UNIT PROPOSAL FORM

ORGANIZATIONAL UNIT PROPOSAL FORM ORGANIZATIONAL UNIT PROPOSAL FORM DIRECTIONS: Use this form when proposing a new organizational unit, center, institute, department, school, or college. DATE OF REQUEST: Oct. 20, 2013 Date of AAC Approval:

More information

Homeland Open Security Technology HOST Program

Homeland Open Security Technology HOST Program Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research

More information

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School. DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON. D.C. 20350 1000 SECNAVINST 1524.2B DASN (MPP) October 27, 2005 SECNAV INSTRUCTION 1524.2B From: Subj: Secretary of the Navy

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

The additional Political Science Program Standards, where relevant, appear in italics.

The additional Political Science Program Standards, where relevant, appear in italics. 1 Political Science Program Standards Aligned with College Standards 5.00 COLLEGE STANDARDS FOR FACULTY EVALUATION The additional Political Science Program Standards, where relevant, appear in italics.

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free)

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free) JOINT SERVICE SCHOOLS Defense Acquisition University 2001 North Beauregard Street, Alexandria, VA 22311 1772 Phone, 703 845 6772 THOMAS M. CREAN The Defense Acquisition University (DAU), established pursuant

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

know school PubliC affairs

know school PubliC affairs know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant

More information

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO.: AAC 13-05 COMMITTEE DATE: October 9, 2012 BOARD DATE: October 16, 2012 APPLICATION OF UNIVERSITY OF MASSACHUSETTS

More information

Ccybersecurity Education

Ccybersecurity Education Ccybersecurity Education The Obstacle and Challenges Panel Discussion Summer Workshop on Cyber Security Education for Community College Faculty in West Texas Texas Tech University August 13, 2013 COMPUTER

More information

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

Master of Arts in Criminal Justice

Master of Arts in Criminal Justice Mission The mission of the Curry College Master of Arts in (MACJ) program is to provide students with the intellectual and pragmatic skills needed to become effective leaders, reflective practitioners,

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

April 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms.

April 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms. William B. Nelson President & CEO FS-ISAC 20496 Partridge Place Leesburg, VA 20175 703-777-2803 (Direct) 509-278-2412 (Fax) bnelson@fsisac.us www.fsisac.com April 10, 2009 Ms. Melissa Hathaway Acting Senior

More information

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education ANSER and AMERICAN MILITARY UNIVERSITY Homeland Security Education AGENDA Introduction Program Administration: AMU Content Administration: ANSER Homeland Security Courses Academic Degree Integration Options

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

Toward A Closer Digital Alliance

Toward A Closer Digital Alliance Toward A Closer Digital Alliance Presented at: GOVCERT.NL Symposium 2010 by: Melissa Hathaway HathawayGlobalStrategies@gmail.com 2020 Visions are Not Aligned NATO 2020: ASSURED SECURITY; DYNAMIC ENGAGEMENT

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Cyber Conflict Studies

Cyber Conflict Studies The Naval War College Foundation Center for Cyber Conflict Studies The Campaign for Cybersecurity contents Defending Cyberspace...page 2 Cyberspace... 4 What is Cyberspace... 6 Cybersecurity... 8 Averting

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015

STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015 STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015 The global information revolution has entailed new responsibilities for institutions of higher education, and this is perhaps especially true for

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship

Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship Updated November 25, 2014 Table of Contents I. Award

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

While interagency education and training have long been staples of the intelligence and

While interagency education and training have long been staples of the intelligence and Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

United States Cyber Security in the 21st Century

United States Cyber Security in the 21st Century United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a

More information

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Preface to the Fourth Edition

Preface to the Fourth Edition The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Rhode Island School of Design Strategic Plan Summary for 2012 2017. critical making. making critical

Rhode Island School of Design Strategic Plan Summary for 2012 2017. critical making. making critical Rhode Island School of Design Strategic Plan Summary for 2012 2017 critical making making critical executive summary This strategic plan serves as a guide for Rhode Island School of Design (RISD) over

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information