A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

Size: px
Start display at page:

Download "A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)"

Transcription

1 A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant University and others who wish to participate, announce their intention to collaborate as academic institutions on cybersecurity issues, particularly those at the intersection of technology, policy, law, and national strategy. For the 2012 academic year we ourselves commit to inform each other of courses and degree programs that we offer, research that is funded, publications that are produced, seminars, colloquia and conferences being planned, and training programs being offered, with the possibility of renewing the collaboration annually. We will look for opportunities to collaborate in these offerings as well as on research proposals to strengthen and expand our interests at the intersection of technology and policy in cyberspace. We are individually interested in educational outreach to other schools and universities, research exploring and formulating domestic and international cyberspace policy and strategy, and training to serving Rhode Island, domestic, and international audiences. Our institutions would also serve individually as potential partners with the private sector and/or government, consistent with law and regulation. RI CCTP will serve as a role model for other regional collaborations. Background Cyber threats are among the most serious national security and economic challenges facing the national and global community. That challenge and the threat to national interests are reflected in United States government strategies focused on national defense and international engagement in a networked world. Computers and networks, for which security was an afterthought, are now ubiquitous. The efficiencies provided by networks and computers have lured us into integrating these technologies throughout our national economies. Belatedly, we have come to realize that this tight integration provides opportunities for criminals and foreign powers to steal our identities, our monies, and our commercial and state secrets as well as attack our critical infrastructure and disrupt military operations. To protect our personal, commercial, and national assets we must now take steps, individually and collectively, on both the national and international levels to secure our computers and networks. We must engage in international initiatives to combat crime and commercial espionage and avoid disruption of critical services and infrastructure that could escalate into conflict. Addressing these problems requires a broad and deep understanding of both cybersecurity policy and technology. While most computer science departments have taught courses on cryptography for decades, they have only recently begun to introduce computer and network security into their curricula. September 13,

2 The policy aspects of cybersecurity have been the subject of studies organized by think tanks, the National Academies of Science, and international bodies. Professional military institutions studying national security and strategy have only recently begun to integrate cybersecurity issues into curricula despite more than a decade s worth of experience suggesting that networks and information technologies are both essential to operations and vulnerable to attack. Unfortunately, only a few universities in the United States and the United Kingdom offer instruction or degree programs that combine both technology and policy. Knowledge of both is essential in shaping policy and developing technology; therefore, a collaboration like this in Rhode Island could play a vital role for our nation. As noted in a recent study 1 by the Center for Strategic and International Studies, an educated cybersecurity workforce is urgently needed: We not only have a shortage of the highly technically skilled people required to operate and support systems already deployed, but also an even more desperate shortage of people who can design secure systems, write safe computer code, and create the ever more sophisticated tools needed to prevent, detect, mitigate and reconstitute from damage due to system failures and malicious acts. Because cybersecurity is both a domestic and global problem, we also need a population of welleducated analysts, scholars, officers, diplomats, and private sector individuals who are conversant with domestic and international cybersecurity policy. Sound policy development is informed by a solid knowledge of technology. Technology development, which often involves policy decisions 2, must respond to the needs of policy, especially in the international arena. Thus, collaborating on the two together in one regional setting is mutually advantageous. The Rhode Island Story Rhode Island can serve as a model for the nation in cybersecurity policy and technology formulation. The University of Rhode Island, Brown University, and the U.S. Naval War College are three exemplary institutions with complementary strengths. The University of Rhode Island (URI) is a national leader in teaching, service, and research in the field of digital forensics, a component of cybersecurity that focuses on analysis and attribution of cyber crime and cyber attacks. In addition, URI has a rich program in the broader area of cybersecurity technology education and research. Brown University, through its Department of Computer Science, the Watson Institute for International Studies, its new Institute for Computational and Experimental Research in Mathematics (ICERM), and 1 A Human Capital Crisis in Cybersecurity, K. Evans and F. Reeder, CSIS Commission on Cybersecurity for the 44 th Presidency, November Code: And Other Laws of Cyberspace, Version 2.0, Lawrence Lessig, Basic Books, September 13,

3 colleagues in the departments of political science and economics, is an international leader in computer and network security, policy formulation, mathematical cryptography, and the social sciences. The U.S. Naval War College is a professional military educational institution with four principal missions: to develop strategic and operational leaders, to help define the future Navy, to support combat readiness, and to strengthen maritime security cooperation. To fulfill these missions NWC faculty teach military officers and government officials as well conduct research into the full-range of issues regarding war and peace, strategy, and national security decision making. With the support of the academic and military leadership, NWC faculty have formed a cybersecurity working group that is helping integrate cyber security into the core curriculum, electives programs, research projects and war gaming. At the end of this report each institution has provided an overview of the specific activities they will undertake. We now present some of the general plans that will be part of each institution s activities. The Educational and Training Mission The educational mission would be carried out through courses and degree programs developed at each academic institution, enhanced by cross-institutional courses and faculty exchanges, where possible and subject to later negotiations. Implementation mechanisms might include memoranda of understanding, faculty appointments, cross-listings of courses, and video conferencing facilities. While the details of these educational programs are still in the planning stages, each institution would develop its own degree and training programs when practical and as permissible under law and regulation, using courses offered by all three institutions. Cross-institutional courses would enlarge the educational opportunities for all students while allowing each institution to develop its own strengths. The number and level of degree programs will be determined by student interest and staffing as well as the interests of each institution. Short-term programs or conferences on cybersecurity technology and policy would be offered to domestic and international audiences, perhaps with the collaboration of multiple institutions. Some of these would be training-based certificate programs whereas others could lead to professional Master s degrees designed for individuals studying part-time. Local or federal governments might sponsor workshops and training programs. The Service Mission Service to local and national businesses and governments and local schools would be delivered in several ways. First, the institutions would individually offer training to Rhode Island, domestic, and/or international audiences in cybersecurity technology and policy as well as digital forensics, with collaboration where possible and subject to negotiation. In this connection they would offer continuing education programs to the local community, consistent with each institution s mission. Second, they would also serve as a knowledge base for the state, the federal government including Congress, and the private sector. Knowledge would be disseminated through faculty and staff publications and student reports on institution websites. Finally, where possible, the institutions would also serve as a focal point September 13,

4 for outreach to schools and universities around the country. In this capacity, the collaboration would serve as a model for the creation of other technology and policy collaborative activities. The Research Mission The collaborators would engage in innovative and distinctive research based upon their substantive expertise. The core research agenda of the center will include: Research Institutional Expert Digital forensics Cybersecurity technologies Strategic implications of cyber conflict, including the URI URI, Brown NWC diffusion of power and complexity in cyberspace Impact of international and domestic law Governing cyber warfare Development of international institutional arrangements and norms Technology to protect information systems Behavioral understandings to bridge the policy-technology gap NWC NWC Brown Brown, URI Brown In addition, the group will engage U.S. and international scholars and practitioners in addressing cybersecurity challenges, and serve as a source of information, expertise and recommendations for the policymakers on specific cybersecurity issues. Faculty Faculty from the three major research institutions (U.S. Naval War College, University of Rhode Island, and Brown University) will be introduced to each other and encouraged to collaborate on research. NWC faculty specializing in national security and China, cyber doctrine and strategy, international law including the law of armed conflict, and war gaming are interested in collaborating, as are URI faculty members focusing on digital forensics and cybersecurity technology from the Departments of Computer Science and Electrical and Computer Engineering. Brown faculty members in Computer Science, Engineering, ICERM, Political Science, and the Watson Institute also will be involved in effort. There will September 13,

5 be many synergistic opportunities for teaching and research between the institutions, which will broaden and deepen the collaboration. Participation of Other Rhode Island Academic Institutions Participation is expected from other academic institutions in the state that are currently less well committed to cybersecurity; preliminary discussions have been held with Dr. José Griffiths, Vice President for Academic Affairs at Bryant University Bryant hosts regional cybersecurity conferences. Others are welcome to participate. The Partners Program URI and Brown will consider introducing CCTP Partners Program whose purpose would be to provide outreach and visibility to companies who want to participate in the activities of the center, give talks in periodic Partner Symposia, and recruit students. They also could arrange to have employees attend training sessions relevant to their interests. In return for their participation, partners will be expected to contribute to the discretionary income of the center. Funds derived in this manner will provide support for colloquia, symposia, and student events. The following organizations are candidates to become partners in the center. (Note that not all of these have been contacted but will be as the center plans develop.) Raytheon SAIC Deloitte McAfee Symantec Verisign Microsoft IBM Booz Allen Google Facebook MITRE DHS State Department Dept. Commerce Tiger s Lair Inc. ForensicSoft, Inc. Trap Data Group, Inc. Secure Works, Inc. Naval Undersea Warfare Center Adaptive Solutions RI National Guard RI EMA RI State Police Cyber Command Fleet Cyber Command 10 th Fleet NSA Certification The center institutions are applying or will consider applying for designation as National Security Agency Centers of Academic Excellence in IA Education and as NSA Centers of Academic Excellence Research. Budget To be determined as the center plans develop. Summary Rhode Island is home to three major complementary institutions uniquely positioned to become world leaders in cybersecurity issues. Thus, the time is opportune for these institutions to collaborate on bridging the gap between technology, policy, and national security. Such an activity can reinforce the September 13,

6 intellectual resources of the University of Rhode Island, Brown University, and the U.S. Naval War College, with the participation of neighboring academic institutions, to provide a very high quality of education for undergraduate, graduate, and professional students as well as excite interest among K-12 students in the new technologies. Where possible, they could serve as resource centers for small companies and a breeding ground for entrepreneurs, some of whom may choose to work and reside in Rhode Island. Finally, they could serve as resources for federal, state, and Congressional policymakers, based on innovative research on cybersecurity technology and policy questions and as a convener of international expertise to address evolving cybersecurity challenges. The three major institutions welcome the engagement of Bryant University and other academic institutions that wish to collaborate. September 13,

7 FOCUS AREAS OF EACH INSTITUTION The areas of focus of each of the three principal academic partners are described below. University of Rhode Island Focus Areas URI will expand its existing Digital Forensics Center (http://www.dfc.cs.uri.edu) to establish the University of Rhode Island Cyber Security Center (URICSC) to realize the mission of providing cyber security workforce enhancement, cyber security services, and cyber security technology research for the State of Rhode Island and the Nation. The URICSC will be URI s focal point for participating in the proposed RI CCTP. URI Digital Forensics and Cybersecurity Technology Education. URI is offering courses in digital forensics and the technical aspects of cybersecurity including: Computer Forensics Encryption and Security Live Forensics and Incident Response Information Assurance Network Forensics Ethical Hacking Network Security and Intrusion Detection Degree and certificate programs at URI that contain cyber security coursework include: Undergraduate Minors in o Digital Forensics o Information/Cybersecurity Graduate Certificate in Digital Forensics Professional Certificate in Digital Forensics Graduate Certificate in Information Assurance/Cybersecurity Master s and PhD Degrees in Computer Science with a focus on Digital Forensics and/or Cybersecurity Research Part of URI's cybersecurity education is an extensive internship program that places its students with federal, state, and local law enforcement organizations and local companies that provide digital forensics and cybersecurity services and product development. Nationally, URI is the U.S. National Science Foundation's Research Experience For Undergraduates (REU) Site For Digital Forensics and as such hosts NSF-sponsored interns each year from all over the country who learn digital forensics in the URI Digital Forensics Center. The proposed CCTP would allow URI to work with Brown and the NWC to joint-list these courses, develop new courses, and enrich URI s cybersecurity/digital forensics degree program offerings through courses offered by Brown and NWC. URI Digital Forensics and Cybersecurity Service and Training. The URI DFC has conducted training courses for federal, state, and local law enforcement including: network forensics, cell phone forensics, digital forensics for first responders, digital forensics analysis, network security for critical infrastructure providers (as part of the U.S. Dept of Homeland Security UASI initiative). It has built and maintains the RI State Police Computer Crimes lab - a centralized lab for all digital forensics in the state. The URI DFC September 13,

8 staff serves on the state s Internet Crimes Against Children Task Force and the state s Cyber Disruption Response Team. Nationally, the URI DFC is the primary partner with the U.S. Department of Justice's Electronic Crime Technology Center of Excellence and as such is leading their efforts in projects such as cell phone forensics gap analysis and a national assessment report on the digital evidence handling needs faced by state and local law enforcement. URI s participation in the RI CCTP will allow it to expand its services to the service mission of the proposed RI CCTP. URI Digital Forensics and Cybersecurity Technology Research. URI has an active research program in digital forensics and cybersecurity funded primarily by the U.S. Department of Justice and the U.S. National Science Foundation, including an NSF Career Award for the faculty member involved in Cyber Security Trust research. Recent research projects include: Cyber Security Trust Steganography Detection Automated Child Pornography Detection Power Grid Security Cloud Forensics Network Forensics Tools Wireless Security Cell Phone Forensics Tools Voting System Forensics Law Enforcement Search String Support Data Security For Data Center As part of the proposed RI CCTaP, URI will expand its research program further into cybersecurity technology areas while working closely with Brown, NWC, and the partner institutions on researching solutions in the cybersecurity technology/policy intersection. September 13,

9 Brown University Focus Areas We propose to create a center of excellence at Brown University that is an educational, research, and service center focusing on cybersecurity technology and policy issues that are both domestic and international in nature. The center would serve not only students at our institution but also the local and national business communities and governments. It would also offer training and certificate programs to both domestic and international students and professionals, thereby extending the outreach of the center in a manner designed to increase understanding and protection of computer and networking technology and confidence in the good intentions of the U.S. with regard to the use of this technology. Courses Below are representative computer science and policy courses that the center may offer. Hardware Security The Internet as a Social Medium Computer System Security Network Security Freedom of Expression, Privacy, and Security Online Cryptographic solutions and risk analysis The History of Internet Governance Secure Software Development The Politics of Cyber Policy Cybersecurity and International Relations The Legal Dimensions of Cyberspace Human Factors in Computer Security Cyber Economics International Law and Cyber Conflict Privacy and Security on the Web Research Building on Brown s recognized strength in computer science, engineering and mathematics, a significant research component will focus on technology to protect information systems, such as strong ubiquitous encryption, software and hardware supply chain security, application risk management, and secure cloud computing. Social science research into decision-making under endemic uncertainty, political challenges posed by the differing nature of cyber threats, and the lack of a common understanding/lexicon between the policy-technology communities will be addressed. With expertise in international institutions and norms, research will explore existing international legal frameworks and the possible need for new agreements, the development of global norms of behavior, and cybersecurity collaboration with like-minded states and the private sector to enhance collective security. In addition, with its established international relationships and reputation, Brown can serve a convening function as a forum for international engagement and capacity building training on cybersecurity issues. Other research topics may include enhancing private sector partnerships and information-sharing on cyber threats, cyber conflict risk mitigation efforts, protection of cyber-based critical national infrastructures, frameworks for data breach notification, economic incentives to improve cybersecurity, certification, and regulation of secure software development measures, and policies for the secure reliable management of cloud computing. 9

10 U.S. Naval War College Focus Areas NWC faculty have formed a cybersecurity working group with a mandate from the President and Provost of the Naval War College. The cybersecurity working group has recommended that the NWC create a Center for Cyber Warfare Studies (CCWS). This center will be dedicated to the interdisciplinary study of the challenges presented by cyber warfare, cyberspace operations, and cybered conflict in the twentyfirst century. 3 Mission: The mission of the CCWS is to: 1. Conceptualize, promote, and support research and teaching on cyber warfare, cyberspace operations, and cybered conflict 2. Facilitate interaction and collaboration between professional military educational institutions, civilian academics, and warfighters 3. Disseminate cutting-edge analysis via symposia and workshops to provide a forum for dialogue at the Naval War College between U.S. and international practitioners and scholars 4. Expand outreach and networking activities to establish and sustain a community of interest devoted to the study and teaching of cyber warfare, cyberspace operations, and cybered conflict 5. Work in conjunction with the EMC Informationist Chair to further the understanding of information-related capabilities in achieving U. S. operational and strategic objectives Objectives: The operational objectives for CCWS are to: 1. Normalize cyber warfare, cyberspace operations, and cybered conflict concepts in joint military operations and planning paradigms 3 Cyber warfare is defined as an armed conflict conducted in whole or part by cyber means. Military operations conducted to deny an opposing force the effective use of cyberspace systems and weapons in a conflict. It includes cyber attack, cyber defense, and cyber enabling actions. (Joint Terminology for Cyberspace Operations. GEN James E. Cartwright, USMC, VCJCS, July 2010) Cyberspace operations are defined as the employment of cyber capabilities where the primary purpose is to achieve military objectives in or through cyberspace. Such operations include computer network operations and activities to operate and defend the Global Information Grid. (Joint Terminology for Cyberspace Operations. GEN James E. Cartwright, USMC, VCJCS, July 2010) A cybered conflict is any conflict of national significance in which success or failure for major participants is critically dependent on computerized key activities along the path of events. (Dr. Chris Demchak, USNWC) 10

11 2. Foster collaboration and increased institutional ties between civilian and professional military education institutions and between U.S. and international academics and practitioners 3. Promote collaborative research among scholars and practitioners that results in panel presentations at major conferences, workshops and seminars, and published research Activities: The Center for Cyber Warfare Studies (CCWS) was created to ensure that education on cyber warfare, cyberspace operations, and cybered conflict remains current, relevant, and accessible to military officers who will build on this education when devising strategies to deal with the changing character of warfare in the twenty-first century. The Center supports education and curriculum development, including case studies that focus on developing strategies, counter-strategies, and operating concepts for cyber warfare, cyberspace operations, and cybered conflict in the global information environment. CCWS achieves this by sustained collaboration that draws on expertise from a wide range of disciplines that include practitioners, educators, historians, information warfare officers, cryptologists, and scientists. Representative activities conducted by members of the CCWS include hosting and participating in symposia and workshops in order to write and teach case studies and performing outreach and network building among U.S. and international researchers and practitioners who have expertise on cyber warfare, cyberspace operations, and cybered conflict. The CCWS workshops and conferences bring civilian scholars together with military faculty and practitioners to analyze the national and international security challenges posed by cyber warfare, cyberspace operations, and cybered conflict. The target audiences for CCWS symposia, research programs, and educational outreach activities are civilian and military faculty and practitioners who teach at civilian universities, military professional institutions, and military academies. Funding for CCWS represents a sustained commitment on the part of the U.S. Navy and the Naval War College to promote and support teaching and research on cyber warfare, cyberspace operations, and cybered conflict to future strategic leaders. Ultimately, CCWS fosters interaction, collaboration, and inter-agency coordination across professional military educational institutions throughout the country and with U.S. allies. Contacts Dr. Peter Dombrowski, Chair, Strategic Research Department, U.S. Naval War College, Dr. Victor Fay-Wolfe, Director URI Digital Forensics Center, University of Rhode Island, Dr. John E. Savage, Department of Computer Science, Brown University,

Cybersecurity Workforce Opportunities

Cybersecurity Workforce Opportunities Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

WEST POINT CYBER INITIATIVES

WEST POINT CYBER INITIATIVES WEST POINT CYBER INITIATIVES WEST POINT ASSOCIAT ION OF GRADUAT ES From left to right: Cadets during the Academy s Projects Day, demonstrating their research through the CRC in fiber optic communications;

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow IACP BRIEF Serving the Leaders of Today, Developing the Leaders of Tomorrow CYBER SECURITY: CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT 1 P age OVERVIEW The International Association of Chiefs

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization

The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization Technical Appendix to the Memorandum of Understanding toward

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Homeland Open Security Technology HOST Program

Homeland Open Security Technology HOST Program Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

1 Cyberspace and Security

1 Cyberspace and Security 1 Cyberspace and Security 1 Paper by Deputy Secretary of Defense William J. Lynn, Defending a New Domain: The Pentagon s Cyber Strategy, Foreign Affairs (Sep Oct 2010). In addition, an annual report by

More information

West Point Cyber Initiatives

West Point Cyber Initiatives West Point Cyber Initiatives From left to right: Cadets during the Academy s Projects Day, demonstrating their research through the CRC in fiber optic communications; the CRC s Cyber Defense Exercise cadets

More information

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Estonian Cyber Security Strategy : A National Response in New Threat Environment

Estonian Cyber Security Strategy : A National Response in New Threat Environment Estonian Cyber Security Strategy : A National Response in New Threat Environment Markko Künnapu Criminal Policy Department Ministry of Justice of Estonia 1 Vulnerability and threat levels - Global: global

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Cyber Security and You National Perspective Wednesday, April 27, 2011

Cyber Security and You National Perspective Wednesday, April 27, 2011 Cyber Security and You National Perspective Wednesday, April 27, 2011 Roberta Gotfried Director, Engineering Learning & University Relations Raytheon Company Outline Context A New Direction Threats Policies

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

DRAFT (February 7, 2000) Bert Garza. Faculty and Office for Computing and Information Science: Administrative and Management Structure

DRAFT (February 7, 2000) Bert Garza. Faculty and Office for Computing and Information Science: Administrative and Management Structure DRAFT (February 7, 2000) Bert Garza Faculty and Office for Computing and Information Science: Administrative and Management Structure BACKGROUND The Information Revolution is transforming society creating

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY

REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY 102 S Hall Rd Berkeley, CA 94720 510-664-7506 cltc@berkeley.edu REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY The University of California, Berkeley Center for Long-Term Cybersecurity (CLTC)

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

Criminal Justice Program Standards Aligned with College Standards

Criminal Justice Program Standards Aligned with College Standards 1 Criminal Justice Program Standards Aligned with College Standards 5.00 COLLEGE STANDARDS FOR FACULTY EVALUATION The additional Criminal Justice Program Standards, where relevant, appear in italics. This

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

The mission of the Graduate College is embodied in the following three components.

The mission of the Graduate College is embodied in the following three components. Action Plan for the Graduate College Feb. 2012 Western Michigan University Introduction The working premises of this plan are that graduate education at WMU is integral to the identity and mission of the

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Homeland Security: Information Assurance Challenges and Opportunities. Building the National Cyber Security Division

Homeland Security: Information Assurance Challenges and Opportunities. Building the National Cyber Security Division Homeland Security: Information Assurance Challenges and Opportunities Building the National Cyber Security Division The Homeland Security Act and national strategies direct DHS to take the lead on cyber

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

ILA Strategic Plan 2012 2017

ILA Strategic Plan 2012 2017 ILA Strategic Plan 2012 2017 If you practice, study, or teach leadership; If you seek a community of people who share your passion for leadership; We invite you to be a vital part of the continued growth

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship

Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship Texas A&M University Graduate and Professional Student Council Aggies Commit to Graduate and Professional Student Educational Experiences Fellowship Updated November 25, 2014 Table of Contents I. Award

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission

Enabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan

More information

Academic Program Assessment Plan Certificate: Homeland Security Studies

Academic Program Assessment Plan Certificate: Homeland Security Studies Academic Program Assessment Plan Certificate: Homeland Security Studies Department of History and Political Science College of Humanities and Social Sciences Colorado State University-Pueblo Plan appended

More information

Building Confidence between States

Building Confidence between States OSCE Workshop on Cyber/ICT Security in the Context of Regional and International Security Tashkent, 20-21 May 2015 Building Confidence between States Karsten Geier Head, Cyber Policy Coordination Staff

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Ccybersecurity Education

Ccybersecurity Education Ccybersecurity Education The Obstacle and Challenges Panel Discussion Summer Workshop on Cyber Security Education for Community College Faculty in West Texas Texas Tech University August 13, 2013 COMPUTER

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015

STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015 STRATEGIC PLAN for the SCHOOL OF COMMUNICATION 2012-2015 The global information revolution has entailed new responsibilities for institutions of higher education, and this is perhaps especially true for

More information

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community.

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community. ----- Original Message ----- From: Joseph Kizza To: Herbert Burhenn Sent: Friday, January 12, 2007 1:31 PM Subject: Re: New center Hello Provost Herbert Burhenn - This is great news for us and UTC. We

More information

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012) UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES Approved by SBA General Faculty (April 2012) Introduction In 1926, we embarked on a noble experiment the creation

More information

Time for Nuclear Straight Talk: Words Matter, and So Do Deeds

Time for Nuclear Straight Talk: Words Matter, and So Do Deeds January 2017 Time for Nuclear Straight Talk: Words Matter, and So Do Deeds Rebecca K. C. Hersman Overview President-elect Trump s December 22 nuclear tweet sent shockwaves through the nuclear policy community.

More information

Department of Defense Cyberspace Policy Report

Department of Defense Cyberspace Policy Report Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011 Contents INTRODUCTION... 1 SECTION

More information

HOMELAND DEFENSE AND SECURITY GRADUATE EDUCATION

HOMELAND DEFENSE AND SECURITY GRADUATE EDUCATION HOMELAND DEFENSE AND SECURITY GRADUATE EDUCATION HS Background HS was non-existent as a discipline before 2001 A 2001 government study identified gaps in education that prepares officials to undertake

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

know school PubliC affairs

know school PubliC affairs know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to

More information

April 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms.

April 10, 2009. Ms. Melissa Hathaway Acting Senior Director for Cyberspace National Security and Homeland Security Councils. Dear Ms. William B. Nelson President & CEO FS-ISAC 20496 Partridge Place Leesburg, VA 20175 703-777-2803 (Direct) 509-278-2412 (Fax) bnelson@fsisac.us www.fsisac.com April 10, 2009 Ms. Melissa Hathaway Acting Senior

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School. DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON. D.C. 20350 1000 SECNAVINST 1524.2B DASN (MPP) October 27, 2005 SECNAV INSTRUCTION 1524.2B From: Subj: Secretary of the Navy

More information

COALITION FOR INTERNATIONAL EDUCATION

COALITION FOR INTERNATIONAL EDUCATION COALITION FOR INTERNATIONAL EDUCATION Promoting U.S. Global Competence March 3, 2016 The Honorable Thad Cochran The Honorable Barbara Mikulski Chairman Ranking Member Committee on Appropriations Committee

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free)

Defense Systems Management College Fort Belvoir, VA 22060 5565 Phone, 703 805 3363; 800 845 7606 (toll free) JOINT SERVICE SCHOOLS Defense Acquisition University 2001 North Beauregard Street, Alexandria, VA 22311 1772 Phone, 703 845 6772 THOMAS M. CREAN The Defense Acquisition University (DAU), established pursuant

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

The development of Shinawatra University s international graduate program in joint public and business administration (PBA)

The development of Shinawatra University s international graduate program in joint public and business administration (PBA) The development of Shinawatra University s international graduate program in joint public and business administration (PBA) Introduction: Given the fact that management challenges in terms of political-economic-societaltechnological

More information

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15) University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

The additional Political Science Program Standards, where relevant, appear in italics.

The additional Political Science Program Standards, where relevant, appear in italics. 1 Political Science Program Standards Aligned with College Standards 5.00 COLLEGE STANDARDS FOR FACULTY EVALUATION The additional Political Science Program Standards, where relevant, appear in italics.

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION

DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION DEPARMTMENT OF HOMELAND SECURITY AUTHORIZATION BILL FOR FY 2008 AND FY 2009 SECTION-BY-SECTION TITLE I: AUTHORIZATION OF APPROPRIATIONS Sec. 101. Authorization of Appropriations. This section authorizes

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

MA in European Public Policy

MA in European Public Policy MA in European Public Policy Overview Brussels is the centre of European decision-making. It is estimated that some 60% of national legislation of EU Member States originates, in some form, in Brussels.

More information

S. 21 IN THE SENATE OF THE UNITED STATES

S. 21 IN THE SENATE OF THE UNITED STATES II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities

More information

University of Georgia College of Public Health Strategic Plan 2010 2015

University of Georgia College of Public Health Strategic Plan 2010 2015 University of Georgia College of Public Health Strategic Plan 2010 2015 Vision The College of Public Health at the University of Georgia serves the needs of local, state, national, and international populations

More information

INNOVATIVE SOLUTIONS AND THE LEADERS WHO CAN IMPLEMENT THEM

INNOVATIVE SOLUTIONS AND THE LEADERS WHO CAN IMPLEMENT THEM INNOVATIVE SOLUTIONS AND THE LEADERS WHO CAN IMPLEMENT THEM THE LOWELL MILKEN INSTITUTE FOR BUSINESS LAW AND POLICY AT THE UCLA SCHOOL OF LAW STANDS AT THE FOREFRONT OF INNOVATION AND EXCELLENCE IN BUSINESS

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Contents. Introduction... 2

Contents. Introduction... 2 Contents Introduction... 2 Main priorities... 3 Increased competitiveness and growth... 3 Higher quality research and education... 4 An ambitious climate and energy policy... 4 Enhancing security... 5

More information