Analysis of Cybersecurity Content in the Air Traffic Collegiate Training Initiative (AT CTI) Program

Size: px
Start display at page:

Download "Analysis of Cybersecurity Content in the Air Traffic Collegiate Training Initiative (AT CTI) Program"

Transcription

1 Analysis of Cybersecurity Content in the Air Traffic Collegiate Training Initiative (AT CTI) Program Juan Lopez Jr. MS & Deanne W. Otto, PhD 1 Abstract The aim of the study was to assess the existence and integration level of cybersecurity content in educational programs from institutions participating in the Air Traffic Collegiate Training Initiative (AT CTI). The curricula of 36 post secondary academic institutions were reviewed to ascertain the inclusion of cybersecurity content. Program catalogs, course syllabi, and descriptive course narratives were subjected to content analysis for manifest variables. Results indicate that cybersecurity content is almost non existent in the curriculum of institutions participating in the program. The massive overhaul of the Federal Aviation Administration s (FAA) National Airspace System (NAS) to the Next Generation Air Transportation System (NextGen) warrants consideration of integrating cyber oriented content in AT CTI curriculum. Recommended strategies to provide relevant cyber oriented content tailored to the Air traffic Control community from participating institutions designated as Centers of Academic Excellence in Information Assurance are discussed. Introduction: Managing the cybersecurity of information and communications systems for critical infrastructure and key resources (CIKR) has become an increasingly complex endeavor. Protecting and ensuring the continuity of the CIKR of the United States is essential to the Nation s security, public health and safety, economic vitality, and our way of life (Chertoff, 2009). National critical infrastructure systems such as the power grid and transportation systems are also increasingly becoming interconnected to enterprise 1 Juan Lopez, Jr. Holds an MS in Information and Telecommunications Systems Management from Capitol College and a MS in Information Resource Management focused on Information Assurance and Computer Networks from the Air Force Institute of Technology. He is currently pursuing a PhD in Computer Science from the Air Force Institute of Technology where he is also a Cyberspace research engineer contractor. Deanne W. Otto holds a PhD in Teaching & Learning with emphases in Research Methodologies & Statistics, Education Foundations, and Educational Testing & Measurement from the University of North Dakota. Dr. Otto currently serves as a research engineer contractor supporting the Air Force Institute of Technology s Center for Cyberspace Research. 1

2 networks to achieve efficiencies, improve system performance, improve productivity, and increase safety through automation. While the benefits have been enormous, this widespread interconnectivity also poses significant risks to our nation's computer systems and, more importantly, to the critical operations and infrastructures they support (GAO, 2005). Federal and industry experts believe that critical infrastructure control systems are more vulnerable to cyber threats today than in the past (Powner & Rhodes, 2007; Baker, Waterman & Ivanov, 2010; Baker, Filipiak & Timlin, 2011). The transportation systems sector, and more specifically the aviation subsector, is undergoing tremendous change in systems automation with the implementation of the Next Generation Air Transportation System (NextGen). Critical Infrastructure system owners and stakeholders in the aviation subsector are finding it increasingly difficult to make informed cyber security decisions as the drive to increase automation in aviation systems continues. The reason for the increased difficulty in decision making is the aviation subsector s expectation that NextGen will safely and efficiently accommodate the large growth of air traffic expected in the near future. NextGen should be sufficiently scalable to contend with a two fold or more increase in demand expected by the year 2020 (Ezberger, 2004). According to the FAA NextGen implementation plan (2012), NextGen will enhance safety, reduce delays, save fuel and reduce aviation s adverse environmental impact (Huerta, 2012). The transformation of NextGen consists of six core programs, (1) Automatic Dependent Surveillance Broadcast (ADS B), (2) Data Communications (Data Comm), (3) System Wide Information Management (SWIM), (4) Common Support Service Weather (CSS Wx), (5) National Airspace System (NAS) Voice System (NVS), and (6) Collaborative Air Traffic Management Technologies (CATMT). The introduction of technology, particularly the use of computer technology, has changed the way that workers perform their tasks and the types of training and skills that workers need in order to complete these tasks. Research has shown that the use of computers has eliminated the need for humans to perform tasks that involve solving routine problems or communicating straightforward information (Autor, Levy & Murnane, 2003; Levy & Murnane, 2004). Automation is expected to relieve air traffic controllers of routine monitoring and control tasks so they can devote more time to solving strategic control problems, managing traffic flows during changing weather conditions and handling other unusual events (Ezberger, 2004). Planned NextGen automation system improvements will provide air traffic controllers with greater decision making tools, while digital information sharing is helping aircraft operators, controllers and traffic managers to work together to maximize efficiency in the air and on the ground (Huerta, 2012). Nevertheless, automation has solved old problems but ultimately caused new and different types of accidents (Chialastri, n.d.). According to Robert Scott (cited in Flightglobal, 2012): 2

3 The intellectual and physical skills once required of the pilot have largely been replaced by an emphasis on 'soft skills' and automation management. The pilot who once cynically challenged sources of information now readily accepts information from a variety of sources, many computergenerated, without question. We should expect that Air Traffic Controllers could potentially experience a similar deterioration of skills due to increased automation and information richness as a consequence of the transition to NextGen. Various studies on aviation safety continue to focus on identifying inconsistencies to improve factors that contribute to aviation mishaps. A key finding by the Government Accounting Office (2002) with a potential to be amplified as a consequence of NextGen was the communication processes between the FAA and the military services. Most notable were existing formal networks of communication that have not always been sufficient to ensure the comprehensive exchange of all critical aviation safety information. Specifically, they found (1) a lack of a common definition of what constitutes an aviation safety hazard of mutual concern, and (2) gaps in the formal communication processes which caused delays in bringing critical safety information to the attention of key officials. Most alarming is the degree of institutionalized informal information exchange that is currently sustained largely by personnel rather than formal agency/service relationships, which the GAO concluded is therefore vulnerable to the retirement of key aviation safety personnel and senior leaders. The informal networks can be expected to experience considerably more disruption from adoption of NextGen information exchanges. It appears that a significant portion of the information exchange paths were personality driven and based on tacit knowledge. The rapid replacement rate expected over the next 5 10 years of an aging workforce coupled with a more cyber oriented and virtually astute employees could skew the information path patterns in unexpected ways with undesirable consequences if not proactively and deliberately managed. There also exist the potential to realize unexpected operational benefits from information rich environments. At a minimum, senior leaders and key stakeholders should plan for and develop strategies to mitigate inconsistencies during the transition that could otherwise be masked from the dilution of human derived information paths caused by the overlay of virtual information paths created by NextGen. The National Research Council (1998) continues to emphasize that efforts to modernize and further automate the air traffic controller system should not compromise safety by marginalizing the human controller s ability to effectively monitor the process, intervene as spot failures occur in the software or environmental disturbances require, or assume manual control if the automation becomes untrustworthy. However, the threat from 3

4 cyber induced events (malicious or inadvertent) can potentially further complicate the decision making process particularly when a cyber threat may mimic normal airport operations (McCallie, Butts, & Mills, 2011). Cybersecurity has become an interdisciplinary issue for many organizations. Any cybersecurity initiative must account for technology, operations, and people. If, in fact, any of those three measures are not accounted for, systems become immediately vulnerable (Maconachy, Schou, Ragsdale, & Welch, 2001). An essential element of cybersecurity has always been the people portion of the triangle. Many organizations have learned that the human in the loop, the proverbial human firewall of a system, must be adequately trained and educated to serve as an effective tool against cyber induced events (von Solms & Warren, 2011). However, a message that has continued to propagate with increasing frequency is that there appears to be an acute shortage of Internet security experts in the government with no large pool of applicants waiting in the wings to join the fight (Beidel & Magnuson, 2011). Critical infrastructure sectors are currently experiencing substantial cybersecurity challenges. A variety of tangential and fundamental issues make implementing robust cybersecurity measures in critical infrastructure a challenge. Some of the most prominent issues are information sharing (GAO, 2012), improving the management of security surveys and vulnerability assessments of CIKR asset owners and operators (GAO, 2012), and public private partnerships (Cavelty, & Suter, 2009). In 2007, the Government Accounting Office recognized that while DHS has initiatives under way to fulfill its many cybersecurity responsibilities, major tasks remain to be done. These include assessing and reducing cyber threats and vulnerabilities and coordinating incident response and recovery planning efforts. However, the human capital talent required to meet these demands are still not being produced in sufficient quantity and quality. There is a recognized and persistent shortage of cybersecurity experts (current and projected) in both the public and private sectors (Finkle & Randewich, 2012; Beidel & Magnuson, 2011). In 2009, the Department of Homeland Security (DHS) publically announced they were seeking to hire 1,000 cybersecurity experts during the time period when the U.S. Cyber Command was being established (Krebs, 2009).DHS has fallen very short of that number and readjusted their hiring target to less than half the initial estimate. In 2012, DHS established a cybersecurity recruitment and development program to institutionalize cybersecurity and recruit the appropriate talent. Secretary Napolitano s intent is to expand the national pipeline of men and women with advanced cybersecurity skills, and also enable DHS to become a preferred employer for the talent produced by that pipeline. The three programs included are: 4

5 Cybersecurity Internship Program is a 10 week program designed for current undergraduate students during the summer between their junior and senior years in college Secretary's Honors Program for Cybersecurity Professionals is a two year program for recent college graduates designed to develop technically skilled cyber professionals across the U.S. Department of Homeland Security Emerging Leaders in Cybersecurity Fellowship is a two year program for recent graduates with a master's degree and is designed to develop the next generation of cyber leaders within the U.S. Department of Homeland Security The critical shortage in cybersecurity expertise has prompted several new business models to emerge in the private sector as well. For example, the National Security Agency (NSA) partnered with academic institutions with a primary goal of exposing students to the scientific and intellectual foundation of cyber operations, giving them a glimpse of how such knowledge can be applied in innovative cyber careers with the government (NSA, 2012). Graduates of the program are expected to pursue careers in cyber operations with the NSA and other similar agencies. Similarly, Northrop Grumman partnered with the University of Maryland in hopes of providing them and other technical firms with an annual crop of graduates in cybersecurity (Overly, 2012) Although these initiatives are designed to develop the cybersecurity talent needed in several critical infrastructure sectors, they are clearly not focused on cybersecurity skills needed by the NextGen air traffic control community. The FAA recognizes that their sociotechnical environment is in the midst of a rapid transformation. According to Huerta (2011), Our information systems are taking a quantum leap from the days of closed legacy networks that were created before the Internet became a household word. We are evolving towards entire networks of networks that use internet protocols. And we are moving our entire national air space system into the Next Generation. We are going from closed computer systems to open systems. We have to do this in order to implement NextGen and the advantages of GPS based navigation such as better terrain awareness, streamlined routes and better weather data.with that evolution from closed systems to open systems the cyber security risks will increase. We know this. The FAA has made substantial progress in raising the cybersecurity literacy of their workforce that interacts with traditional computer information systems (e.g. web browser, electronic mail, and business transaction systems). More than 96 percent of 5

6 FAA employees completed their cyber security [sic] awareness training last year. Nearly 10,000 FAA contract support personnel also completed their annual security and privacy awareness training (Huerta, 2011). The progress achieved across the FAA is commendable. However, the training only addresses the cybersecurity literacy for nonair traffic control related systems. Not addressed is the cybersecurity literacy needs of the air traffic controller workforce operating, maintaining, and interacting with NextGen systems that are highly reliant on increased automation (Huerta, 2011). Although increased reliance on automation is expected to achieve efficiency gains and improve air safety of the NAS, over reliance on automation for error detection by humans can degrade below detection thresholds for non automation dependent operators (Sanchez, Krumbholz, & Silva, 2009; Skitka, Mosier, & Burdick, 1999). The Automation Paradox is well documented in the literature and is out of scope for discussion in this study. However, what warrants concern in the context presented herein is the degree to which air traffic control system reliability can be diminished by cyber means (i.e. cyber attack). Research and development opportunities to investigate this phenomenon should be deliberately planned into the research life cycle of the FAA. In order to promote research synergy, the government accounting office has recommended that NASA and the FAA combine research and development efforts. The GAO (2005) recognized that: The human is the most important element in the air transportation system and must be considered first and foremost in the design of improvements to it. Humans design, develop, deploy, manage, maintain, and operate all elements of the system. Yet, the human component is often inadequately considered when improvements are made to the system. Efforts between the FAA and NASA to establish a research partnership demonstrates a concerted effort to generate synergy in this area. Table 1 provides an excerpt of the list of initial human factors research that was derived from common internal research areas of both agencies (FAA & NASA, 2011). The reader is encouraged to review a more complete narrative for each research area in Appendix A of the reference. The FAA is mainly responsible for R&D to support near term implementation and midterm implementation, while NASA conducts much of the research to address far term implementation (GAO, 2010). However, the list does not explicitly identify human factors research with regard to cybersecurity, near term or long term. 6

7 Focus Area Workforce development Table 1. FAA & NASA initial research focus areas (FAA & NASA, 2011) Description Workforce selection and training research helps to identify new skills, knowledge, and abilities that will be needed by NextGen controllers, maintainers, and pilots. The primary focus is on the changing role of NAS operators in the NextGen environment. Workstation requirements Safety assessment and management of risks Ground operations optimization Traffic flow management and collaboration Human interaction with technology and automation Workstation functional and design requirements research focuses on improving the operations of air traffic controllers and technical operations to ensure the envelope of human performance is considered as part of safety, capacity, and performance goals. Safety risk research develops and evaluates new methods that allow credible safety evaluations of highly complex, automation intensive systems. In addition, risk and error management research investigates opportunities for pilot error with the introduction of NextGen automated systems and procedures and the associated pilot roles and responsibilities. Ground operations research addresses pilot and controller situational awareness in the use of NextGen capabilities during imprecise surface movements for improved operations in all visibility conditions. Traffic flow research develops strategies and DSTs that allow traffic flow managers to minimize disruptions caused by hazardous weather and to enhance CDM. NextGen technologies encompass research on data communications and human computer interfaces for NAS actors in the NextGen environment. It produces human factors data to determine minimum required data communications display characteristics and flight crew procedures to achieve the desired performance. 7

8 Human automation functional allocation Higher traffic levels and TBO will likely cause automation to take on a greater role in the NextGen environment. Humans, however, will continue to retain a prominent or leading role in many functions. Research in this area focuses on the proper allocation of functions to humans and automated systems, as well as human / machine roles and responsibilities within those functions. Procedure design and training Trajectory based operations NextGen implementation research centers on instrument procedures, training and personnel qualification, and single pilot research. It focuses on the special skills and knowledge needed by NAS actors to ensure the envelope of human performance considerations is adequately aligned with the development of NextGen capabilities in order to accrue intended benefits. NextGen operations research involves separation assurance and collision avoidance as well as trajectory based operations. It involves new operations under NextGen, such as pilot negotiation, selection, implementation, and monitoring of aircraft state relative to position, altitude, and time. This research explores greater levels of automation support to help mitigate controller workload. Air/ground integration Air/ground integration research provides a systems approach to air ground integration as the NAS transitions from current operations to new concepts, taking into account changes in responsibilities and procedures between controllers and pilots. NextGen will require advanced concepts and technologies, along with higher levels of automation all of which will result in changes to roles and responsibilities for pilots and air traffic controllers. These transitions, in combination with increased interaction with automation, can lead to unwanted side effects, such as increased errors, loss of situational awareness, or mode confusion (FAA & NASA, 2012). Absent from the FAA and NASA research implementation plan for NextGen is the lack of an explicit focus on cybersecurity. What should draw cause for concern is the increased risk of cyber induced events of NextGen systems and the effects on air traffic control operations. Introduction of reliable automation to the Air Traffic Control (ATC) environment should reduce task load demands on the controller (Kopardekar, Prevot, and Jastrzebski, 2009; Metzger and Parasuraman, 2005). With reliable automation and an intuitive user 8

9 interface concept, one controller should be able to effectively manage more aircraft than in today s ATC environment. While the work load will increase the human element will remain to verify and confirm air traffic requirements and provide the knowledge needed to make judgment calls. The FAA and NASA (2012) clearly recognize the contrast. The initial focus was on the tower cab working environment. Results showed that new capabilities will supplement human perception, but controllers will remain responsible for the same major job functions they currently perform and are likely to continue relying upon their own perceptions and judgments, perhaps looking to the automation to confirm a course of action (p.18). Increased reliance on automation is an integral consequence of the transition to advanced technology. What must not be masked or allowed to be diluted are the inherent attributes of cybersecurity principles that become a significant influence in the human machine interface. Essentially, the increased automation and system integration are carried over perhaps transparently and increase the cybersecurity risk to the NAS as a byproduct of human machine interaction. Recognizing the potential issues related to this topic, the following questions surface. How can this gap be addressed? What cybersecurity education is appropriate for programs that currently exist for air traffic controllers? What are the emerging cyber threats that an air traffic controller can be expected to confront in NextGen systems? The intersection of these events warrants consideration of the cybersecurity education being offered to air traffic controllers and air traffic management personnel beyond traditional cybersecurity awareness. This study scrutinizes the educational content of AT CTI programs for the presence of cybersecurity content. The study includes a discussion of the implications for practitioners and a prescriptive approach for addressing the cybersecurity education requirements for institutions participating in the AT CTI program. National Initiative for Cybersecurity Education (NICE): The NICE framework is a comprehensive catalog that lists hundreds of cybersecurity tasks and skills, organized by categories and specialty areas. The intention of the framework is to describe cybersecurity work regardless of organizational structures, job titles, or other potentially idiosyncratic conventions (Duffie, 2011). The national program manager for NICE at the National Institute of Standards and Technology (NIST), Dr. Ernest McDuffie, encouraged the DHS Task Force to take on the specific adaptation of the NICE framework for mission critical roles, expressing the sentiment that it was much needed (cited in HSAC, 2011). The FAA should consider taking the same 9

10 approach as the DHS task force to extend the cybersecurity tasks and skills commensurate with a wide breadth of aviation occupations. The FAA should leverage what has already been developed to shorten the learning curve and adopt an already existing framework that would expedite adoption and policy development. The framework can also be used to guide curriculum mapping and as the basis for curriculum development of cybersecurity content specific to the needs of the air traffic control community. Huerta (2011) encourages new ideas from the community at large We need you in the game with your best ideas as to how we secure NextGen systems, how we operate our infrastructure and how we deal with a continually evolving cyber threat. Methodology: Content analysis was used to examine the existence and integration level of cybersecurity content in educational programs from institutions participating in the Air Traffic Collegiate Training Initiative (AT CTI). The FAA has agreements with institutions in the United States that have included curricula that are considered to contain the fundamentals of aviation within the degree programs (FAA, 2012). Currently, there are 36 institutions actively participating in the AT CTI program with one additional institution Western Michigan University that will be enrolling students in the near future. Program catalogs, course syllabi, and descriptive course narratives were subjected to computer assisted content analysis for manifest variables of cybersecurity principles. The principles defined by the NIST s Generally Accepted Principles and Practices for Securing Information Technology Systems (Swanson & Guttman, 1996) provided the theoretical framework that guided the qualitative scrutiny to which the content were subjected. According to Swanson and Guttman, certain intrinsic expectations must be met whether the system is small or large or owned by a government agency or by a private corporation. The sampling frame consisted of the entire list of educational institutions (N = 36) participating in the AT CTI program as of May 17, The list of participating institutions is provided in Table 1. The units of data collection are the (1) course syllabi containing the course name and a course description and, (2) program catalog with an associated descriptive narrative. All content reviewed were in digital form and publically accessible from the World Wide Web. Only web content that was date stamped between the periods of January 1, 2008 to September 30, 2012 were considered for analysis. Two coders were utilized to perform the analysis. Inter rater agreement was determined using Cohen s Kappa. The kappa coefficient (K) measures pairwise agreement among a set of coders making category judgments, correcting for expected chance agreement (Carletta, 1996). The inter rater reliability measure was high (K =.71). A measure in the range of.61 to.80 is considered substantial (Landis & Koch, 1977). 10

11 Manifest content that indicate the presence of a cybersecurity principle were measured as a nominal variable and labeled (1) affirmative or (2) negative. Manifest content that indicate degree of integration in the program was based on the degree of freedom in course selection available to the student. The level of measurement is ordinal and labeled as (1) Very High = required core course, (2) Moderate = required elective course, (3) Low = optional elective course, or (4) None = course is non existent in the program. This approach results in a matrix of mutually exclusive categories to code the manifest variables and account for every outcome evaluated. 11

12 Table 1. List of approved AT CTI institutions (alphabetical order) Institution Aims Community College Arizona State University Broward College Community College of Beaver County Daniel Webster College Dowling College Eastern New Mexico University Roswell Embry Riddle Aeronautical University Daytona Embry Riddle Aeronautical University Prescott Florida Institute of Technology College of Aeronautics Florida State College at Jacksonville Green River Community College Hampton University Hesston College InterAmerican University of Puerto Rico Jacksonville University Kent State University LeToureanu University Lewis University Metropolitan State University of Denver Miami Dade College Middle Georgia College Middle Tennessee State University Minneapolis Community Technical College Mount San Antonio College Purdue University Sacramento City College St. Cloud State University The Community College of Baltimore County Texas State Technical College Waco Tulsa Community College University of Alaska Anchorage University of North Dakota University of Oklahoma Vaughn College of Aeronautics and Technology Western Michigan University 2 Location Greely, CO Mesa, AZ Pembroke Pines, FL Beaver Falls, PA Nashua, NH Shirley, NY Roswell, NM Daytona Beach, FL Prescott, AZ Melbourne, FL Jacksonville, FL Auburn, WA Hampton, VA Hesston, KS Bayamón, PR Jacksonville, FL Kent, OH Longview, TX Romeoville, IL Denver, CO Homestead, FL Cochran, GA Murfreesboro, TN Eden Prairie, MN Walnut, CA West Lafayette, IN Sacramento, CA St. Cloud, MN Baltimore, MD Waco, TX Tulsa, OK Anchorage, AK Grand fork, ND Norman, OK Flushing, NY Battle Creek, MI 2 Institution is pending final FAA approval to offer the listed courses in the program. 12

13 Analysis: Most of the institutions provide a basic introduction to computing course which is typically focused on the functional use of productivity applications (e.g. word processing, spreadsheet application, and graphics presentation) use of electronic mail, and Internet browser. Some curriculum provided courses that included the mention of Internet security with regard to personal privacy. Virtually no institutions indicated a course specifically containing the language of cybersecurity in the title or the course description. Further analysis of catalog descriptive narratives for each program indicated no specific inclusion of cybersecurity content within the AT CTI curriculum. There exists a strong trend across the entire program that indicates a lack of cybersecurity integration across all aspects of the ATC curriculum. While it is important to educate the next generation of cyber leaders, significant resources are already in place with National Center of Academic Excellence in Information Assurance Education (CAE/IAE), National Center of Academic Excellence in Information Assurance Research (CAE/R), or National Center of Academic Excellence in Information Assurance 2 Year Education (CAE/2Y) (NSA, 2012). In addition, STEM fields of study in the categories of Science, Technology, Engineering, and Mathematics at colleges and universities, as well as STEM high school programs, and the infrastructure for successful implementation of cybersecurity education already exists. The NICE framework can be leveraged to guide curriculum mapping across the entire AT CTI program. It is worth noting that nearly 5% of the institutions on the AT CTI list have the resident expertise and capability to start offering cybersecurity courses by virtue of being designated as an NSA National Center of Academic Excellence in Information Assurance Education (CAE/IAE), or CAE in Information Assurance Research (CAE/R), or CAE in Information Assurance 2 Year Education (CAE/2Y). Table 2 provides a list of CAE designated institutions that are also an approved AT CTI institution. Table 2. CAE/IAE institutions that are also AT CTI approved Institution Arizona State University Florida Institute of Technology Hampton University Lewis University Minneapolis Community and Technical College Purdue University St. Cloud State University The Community College of Baltimore County Designation CAE/IAE, CAE/R CAE/R CAE/IAE CAE/IAE CAE/2Y CAE/R CAE/IAE CAE/2Y Each program has elective course requirements. A cybersecurity course that exposes the student to principles of cybersecurity would be a good starting point early in the career 13

14 path of an Air Traffic Controller. A deliberate effort should be undertaken to customize and shape the cybersecurity curriculum content to meet the emerging needs of NextGen Air traffic controllers and aviation management. Content analysis examined the presence of cybersecurity principles in each of eight key areas. Content analysis suggests a need to better address cybersecurity risk factors, impact to air traffic control operations, and recommendation on how to recognize and mitigate cyber induced effects. Further practice and research needs should be documented and deliberately included as part of human factors research. Conclusion: Our findings suggest a potential cybersecurity skill gap in what is being offered in AT CTI academic programs and what might actually be needed with regard to the cybersecurity knowledge, skills, and abilities of Air traffic Controllers. The NICE framework provides a starting point to begin documenting cyber security knowledge, skills, and abilities specific to air traffic controllers that can be shared by a wide community. This approach will enable standardization and validation across the enterprise at large. The contrast presented here highlights salient cybersecurity issues that educators and practitioners should consider as an essential building block for further program development, delivery, and evaluation of NextGen implementation phases. As Huerta (2011) emphasized during the annual IT/ISS conference, We need you in the game with your best ideas as to how we secure NextGen systems, how we operate our infrastructure and how we deal with a continually evolving cyber threat. 14

15 References Beidel, E., and Magnuson, S. (August 2011). Government, military face severe shortage of cybersecurity experts. National Defense Magazine. Retrieved from ment, MilitaryFaceSevereShortageOfCybersecurityExperts.aspx Carletta, J. (1996) Assessing agreement on classification tasks: The kappa statistic. Computational Linguistics, 22(2), pp Cavelty, M.D., and Suter, M. (2009).Public Private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection, 4(2), Chertoff, M. (2009). National infrastructure protection plan: Partnering to enhance protection and resiliency. Retrieved from Chialastri, A. (n.d.). Automation in aviation. Retrieved from /37990/ InTech Automation_in_aviation.pdf Department of Homeland Security (n.d.). Cybersecurity recruitment and development programs [Brochure]. Retrieved from and development programs Duffie, E.L. (2011). National initiative for cybersecurity education: Strategic plan. Retrieved from plan_sep2012.pdf Federal Aviation Administration, and National Aeronautics and Space Administration (2011). Next generation air transportation system human factors research coordination plan. Retrieved from Finkle, J., and Randewich, N. (12 June 2012). Experts warn of shortage of U.S. cyber pros. Retrieved from media techsummit symantec idusbre85b1e

16 Flightglobal (2012). Airline safety review: Accident rates. Retrieved from features/safety review 2011/accident rates/ Government Accounting Office (31 May 2012). Critical Infrastructure Protection: DHS Could Better Manage Security Surveys and Vulnerability Assessments, GAO Government Accounting Office (January 2002). Aviation Safety: FAA and DOD response to Similar Safety Concerns. Report to the Honorable Norman Y. Mineta, Secretary of Transportation, and the Honorable Donald H. Rumsfeld, Secretary of Defense. Washington, DC: GAO. Homeland Security Advisory Council (2012). CyberSkills task force report. U.S. Department of Homeland Security: Washington, DC. Retrieved from default/files/publications/hsac%20cyberskills%20report%20 %20Final.pdf Kopardekar, P., Prevot, T., and Jastrzebski, M. (2009). Traffic complexity measurement under higher levels of automation and higher traffic densities. Air Traffic Control Quarterly, 17(2), Krebs, B. (1 October 2009). DHS seeking 1,000 cyber security experts. Washington Post. Retrieved from _ cyber_securit.html Metzger, U., and Parasuraman, R. (2005). Automation in future air traffic management: Effects of decision aid reliability on controller performance and mental workload. Human Factors, 47(1), McCallie, D., Butts, J., and Mills, R. (2011). Security analysis of the ADS B implementation in the next generation air transportation system. International Journal of Critical Infrastructure Protection, 4(2), doi: /j.ijcip , National Security Agency (21 May 2012). NSA announces new program to prime college students for careers in cyber ops. Retrieved from 16

17 press_room/2012/new_college_cyber_ops_program.shtml Overly, S. (11 June 2012). University of Maryland, Northrop Grumman partner on cybersecurity program. Washington Post. Retrieved from capitalbusiness/university ofmaryland northrop grumman partner on cybersecurityprogram/2012/06/09/gjqa7dafuv_story.html von Solms, R., and Warren, M. (2011). Towards the human information security firewall. International Journal of Cyber Warfare and Terrorism, 1(2), doi: /ijcwt Swanson, M.; Guttman, B. (1996). Generally accepted principles and practices for securing information technology systems. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved from 14/ pdf 17

Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience

Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience Graduates of an institution of higher education that have received

More information

Next Generation of Aviation. ICAO NGAP Symposium Dr. Thomas Carney, AABI President

Next Generation of Aviation. ICAO NGAP Symposium Dr. Thomas Carney, AABI President Aviation Accreditation Board International (AABI) Raising the Standards for the Next Generation of Aviation Professionals ICAO NGAP Symposium Dr. Thomas Carney, AABI President Overview A review of the

More information

Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience

Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience Institutions Authorized to Certify its Graduates for an Airline Transport Pilot (ATP) Certificate with Reduced Aeronautical Experience Graduates of an institution of higher education that have received

More information

FAA s Progress and Challenges in Integrating Unmanned Aircraft Systems into the National Airspace System

FAA s Progress and Challenges in Integrating Unmanned Aircraft Systems into the National Airspace System Before the Committee on Transportation and Infrastructure Subcommittee on Aviation United States House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Wednesday Dec. 10, 2014 CC-2015-002

More information

National Airspace System Security Cyber Architecture

National Airspace System Security Cyber Architecture National Airspace System Security Cyber Architecture James H. Williams 202 385 7100 Federal Aviation Administration T.L. Signore 703 983 7919 MITRE Corporation signoret@mitre.org Abstract. The Federal

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Chicago Center Fire Contingency Planning and Security Review

Chicago Center Fire Contingency Planning and Security Review Chicago Center Fire Contingency Planning and Security Review Background In the early morning hours of September 26, 2014, the Federal Aviation Administration s (FAA) Chicago Air Route Traffic Control Center

More information

2016 Individual Exchange Premiums updated November 4, 2015

2016 Individual Exchange Premiums updated November 4, 2015 2016 Individual Exchange Premiums updated November 4, 2015 Within the document, you'll find insights across 50 states and DC with available findings (i.e., carrier participation, price leadership, gross

More information

ANTHONY P. CARNEVALE NICOLE SMITH JEFF STROHL

ANTHONY P. CARNEVALE NICOLE SMITH JEFF STROHL State-Level Analysis HELP WANTED PROJECTIONS of JOBS and EDUCATION REQUIREMENTS Through 2018 JUNE 2010 ANTHONY P. CARNEVALE NICOLE SMITH JEFF STROHL Contents 1 Introduction 3 U.S. Maps: Educational concentrations

More information

Coordination Procedures for Aeronautical Frequencies to Support Emergency Firefighting Requirements

Coordination Procedures for Aeronautical Frequencies to Support Emergency Firefighting Requirements Coordination Procedures for Aeronautical Frequencies to Support Emergency Firefighting Requirements Federal Aviation Administration Spectrum Engineering Group AJW-1C November, 2012 Table of Contents 1.

More information

Rural Psychiatry. Mohamed Ramadan MD MS Board Certified Psychiatrist Mohave Mental Health Clinic Bullhead City Arizona

Rural Psychiatry. Mohamed Ramadan MD MS Board Certified Psychiatrist Mohave Mental Health Clinic Bullhead City Arizona Rural Psychiatry Mohamed Ramadan MD MS Board Certified Psychiatrist Mohave Mental Health Clinic Bullhead City Arizona National Context Recognition of potential shortage by national groups: American Association

More information

United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS

United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS UPDATED REQUIREMENTS FOR FORMAT OF MASTER MAILING LIST The meeting of creditors

More information

Introduction. The Bricks and Bytes of Our Aviation Infrastructure

Introduction. The Bricks and Bytes of Our Aviation Infrastructure Civil Aviation Infrastructure: Protecting A System-of-Systems Brian M. Legan, Vice President Christopher Kelly, Senior Vice President Booz Allen Hamilton, Inc. Introduction Homeland Security Presidential

More information

LexisNexis Law Firm Billable Hours Survey Top Line Report. June 11, 2012

LexisNexis Law Firm Billable Hours Survey Top Line Report. June 11, 2012 LexisNexis Law Firm Billable Hours Survey Top Line Report June 11, 2012 Executive Summary by Law Firm Size According to the survey, we found that attorneys were not billing all the time they worked. There

More information

The Most Affordable Cities For Individuals to Buy Health Insurance

The Most Affordable Cities For Individuals to Buy Health Insurance The Most Affordable Cities For Individuals to Buy Health Insurance Focusing on Health Insurance Solutions for Millions of Americans Copyright 2005, ehealthinsurance. All rights reserved. Introduction:

More information

Emerging Trends in Information. Impacting the States

Emerging Trends in Information. Impacting the States Emerging Trends in Information Technology and Policies Impacting the States Doug Robinson, Executive Director National Association of State Chief Information Officers About NASCIO National association

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

United States Bankruptcy Court District of Arizona

United States Bankruptcy Court District of Arizona United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS UPDATED REQUIREMENTS FOR FORMAT OF MASTER MAILING LIST The meeting of creditors

More information

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE

More information

ENS Governmental Format Status (As of 06/16/2008)

ENS Governmental Format Status (As of 06/16/2008) Alaska AK Production (G) Region D Tan - Development Required Alabama AL Production (G) Region C Arkansas AR Production (G) Region C D Yellow - Pended for required Beta Site Green - In Production - Direct

More information

STATE INCOME TAX WITHHOLDING INFORMATION DOCUMENT

STATE INCOME TAX WITHHOLDING INFORMATION DOCUMENT STATE INCOME TAX WITHHOLDING INFORMATION DOCUMENT Zurich American Life Insurance Company (ZALICO) Administrative Offices: PO BOX 19097 Greenville, SC 29602-9097 800/449-0523 This document is intended to

More information

Required Minimum Distribution Election Form for IRA s, 403(b)/TSA and other Qualified Plans

Required Minimum Distribution Election Form for IRA s, 403(b)/TSA and other Qualified Plans Required Minimum Distribution Election Form for IRA s, 403(b)/TSA and other Qualified Plans For Policyholders who have not annuitized their deferred annuity contracts Zurich American Life Insurance Company

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

Notices of Cancellation / Nonrenewal and / or Other Related Forms

Notices of Cancellation / Nonrenewal and / or Other Related Forms Forms are listed alphabetically by form title. INDEX POLICY CODES 1. Auto 2. Fire and Multiple Peril 3. Liability 4. Property, other than Fire and Multiple Peril (e.g. Crime & Inland Marine) 5. Workers

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

VCF Program Statistics (Represents activity through the end of the day on June 30, 2015)

VCF Program Statistics (Represents activity through the end of the day on June 30, 2015) VCF Program Statistics (Represents activity through the end of the day on June 30, 2015) As of June 30, 2015, the VCF has made 12,712 eligibility decisions, finding 11,770 claimants eligible for compensation.

More information

A N S W E R S R E L 2 0 0 9 N

A N S W E R S R E L 2 0 0 9 N ISSUES& ANSWERS REL 2009 No. 076 Reducing stereotype threat in classrooms: a review of socialpsychological intervention studies on improving the achievement of Black students U.S. D e p a r t m e n t o

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

DON T JUST MAKE A LIVING. MAKE LIVING BETTER. ENGINEERING & OPERATIONS OPPORTUNITIES

DON T JUST MAKE A LIVING. MAKE LIVING BETTER. ENGINEERING & OPERATIONS OPPORTUNITIES DON T JUST MAKE A LIVING. MAKE LIVING BETTER. ENGINEERING & OPERATIONS OPPORTUNITIES DON T JUST MAKE A LIVING. MAKE LIVING BETTER. ENGINEERING & OPERATIONS OPPORTUNITIES At Johnson Controls, we are continually

More information

Rates are valid through March 31, 2014.

Rates are valid through March 31, 2014. The data in this chart was compiled from the physician fee schedule information posted on the CMS website as of January 2014. CPT codes and descriptions are copyright 2012 American Medical Association.

More information

INTRODUCTION. Figure 1. Contributions by Source and Year: 2012 2014 (Billions of dollars)

INTRODUCTION. Figure 1. Contributions by Source and Year: 2012 2014 (Billions of dollars) Annual Survey of Public Pensions: State- and Locally- Administered Defined Benefit Data Summary Report: Economy-Wide Statistics Division Briefs: Public Sector By Phillip Vidal Released July 2015 G14-ASPP-SL

More information

March 21, 2011. Dear Ranking Member Costello:

March 21, 2011. Dear Ranking Member Costello: U.S. Department of The Inspector General Office of Inspector General Transportation Washington, DC 20590 Office of the Secretary of Transportation March 21, 2011 The Honorable Jerry F. Costello Ranking

More information

The Vermont Legislative Research Shop

The Vermont Legislative Research Shop The Vermont Legislative Research Shop State Responses to Terrorism Every state has responded in some way to the events of September 11 th. Most states have named a Director of Homeland or a liaison to

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Piloting a searchable database of dropout prevention programs in nine low-income urban school districts in the Northeast and Islands Region

Piloting a searchable database of dropout prevention programs in nine low-income urban school districts in the Northeast and Islands Region ISSUES& ANSWERS REL 2008 No. 046 Piloting a searchable database of dropout prevention programs in nine low-income urban school districts in the Northeast and Islands Region U.S. D e p a r t m e n t o f

More information

A descriptive analysis of state-supported formative assessment initiatives in New York and Vermont

A descriptive analysis of state-supported formative assessment initiatives in New York and Vermont ISSUES& ANSWERS REL 2012 No. 112 At Education Development Center, Inc. A descriptive analysis of state-supported formative assessment initiatives in New York and Vermont ISSUES& ANSWERS REL 2012 No. 112

More information

Community College/Technical Institute Mission Convergence Study

Community College/Technical Institute Mission Convergence Study Center for Community College Policy Education Commission of the States Community College/Technical Institute Mission Convergence Study Phase 1: Survey of the States Prepared by Donald E. Puyear, Ph.D.

More information

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation

National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal

More information

PART I - APPLICANT INFORMATION. 7. TELEPHONE NUMBER(S) (Including Area Code) SECONDARY

PART I - APPLICANT INFORMATION. 7. TELEPHONE NUMBER(S) (Including Area Code) SECONDARY 1. NAME (First, Middle Initial, Last) DEPENDENTS' REQUEST FOR CHANGE OF PROGRAM OR PLACE OF TRAINING (Under Provisions of Chapters 33 and 35, Title 38, U.S.C.) INTERNET VERSION AVAILABLE - You may complete

More information

Strategic Plan September 2012

Strategic Plan September 2012 Strategic Plan September 2012 NIST NICE Component Leads Overall Lead Ernest L. McDuffie, Ph.D. Lead for the National Initiative for Cybersecurity Education (NICE) United States Department of Commerce (DoC)

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

How To Regulate Rate Regulation

How To Regulate Rate Regulation Rate Regulation Introduction Concerns over the fairness and equity of insurer rating practices that attempt to charge higher premiums to those with higher actual and expected claims costs have increased

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

How To Use The Homeland Security Network (Hsin)

How To Use The Homeland Security Network (Hsin) Homeland Security Information Network (HSIN) Theresa Phillips HSIN Program Manager Strategic Overview HSIN Mission: HSIN provides a common network platform for gathering, fusing, analyzing and reporting

More information

Hail-related claims under comprehensive coverage

Hail-related claims under comprehensive coverage Bulletin Vol. 29, No. 3 : April 2012 Hail-related claims under comprehensive coverage Claims for hail damage more than doubled in 2011 compared with the previous three years. Hail claims are primarily

More information

Health Workforce Data Collection: Findings from a Survey of States

Health Workforce Data Collection: Findings from a Survey of States Health Workforce Data Collection: Findings from a Survey of States Jean Moore, DrPH David Armstrong, PhD Health Workforce Technical Assistance Center School of Public Health University at Albany, SUNY

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Health Insurance Exchanges and the Medicaid Expansion After the Supreme Court Decision: State Actions and Key Implementation Issues

Health Insurance Exchanges and the Medicaid Expansion After the Supreme Court Decision: State Actions and Key Implementation Issues Health Insurance Exchanges and the Medicaid Expansion After the Supreme Court Decision: State Actions and Key Implementation Issues Sara R. Collins, Ph.D. Vice President, Affordable Health Insurance The

More information

Mapping State Proficiency Standards Onto the NAEP Scales:

Mapping State Proficiency Standards Onto the NAEP Scales: Mapping State Proficiency Standards Onto the NAEP Scales: Variation and Change in State Standards for Reading and Mathematics, 2005 2009 NCES 2011-458 U.S. DEPARTMENT OF EDUCATION Contents 1 Executive

More information

Nurse Practitioners and Physician Assistants in the United States: Current Patterns of Distribution and Recent Trends. Preliminary Tables and Figures

Nurse Practitioners and Physician Assistants in the United States: Current Patterns of Distribution and Recent Trends. Preliminary Tables and Figures Nurse Practitioners and Physician Assistants in the United States: Current Patterns of Distribution and Recent Trends Preliminary Tables and Figures Kevin M. Stange, PhD Assistant Professor Gerald R. Ford

More information

90-400 APPENDIX B. STATE AGENCY ADDRESSES FOR INTERSTATE UIB CLAIMS

90-400 APPENDIX B. STATE AGENCY ADDRESSES FOR INTERSTATE UIB CLAIMS INTERSTATE UIB CLAIMS Alabama Multi- Unit (#01) Industrial Relations Bldg. Montgomery, AL 31604 Alaska Interstate Unit (#02) P.O. Box 3-7000 Juneau, AK 99801 Arizona Interstate Liable Office (#03) Department

More information

Health Insurance Coverage of Children Under Age 19: 2008 and 2009

Health Insurance Coverage of Children Under Age 19: 2008 and 2009 Health Insurance Coverage of Children Under Age 19: 2008 and 2009 American Community Survey Briefs Issued September 2010 ACSBR/09-11 IntroductIon Health insurance, whether private or public, improves children

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending

U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending by State and Program Report as of 3/7/2011 5:40:51 PM HUD's Weekly Recovery Act Progress Report: AK Grants

More information

ADEA Survey of Dental School Seniors, 2014 Graduating Class Tables Report

ADEA Survey of Dental School Seniors, 2014 Graduating Class Tables Report ADEA Survey of Dental School Seniors, 2014 Graduating Class Tables Report Published February 2015 Suggested Citation American Dental Education Association. (February 2015). ADEA Survey of Dental School

More information

State Small Business Credit Initiative (SSBCI) Community Development Venture Capital Association March 13, 2014

State Small Business Credit Initiative (SSBCI) Community Development Venture Capital Association March 13, 2014 State Small Business Credit Initiative (SSBCI) Community Development Venture Capital Association March 13, 2014 1 SSBCI Overview Created by Small Business Jobs Act of 2010. Treasury awarded almost $1.5

More information

AN INSIDE LOOK AT SOCIAL RECRUITING IN THE USA

AN INSIDE LOOK AT SOCIAL RECRUITING IN THE USA AN INSIDE LOOK AT SOCIAL RECRUITING IN THE USA THE BULLHORN REACH RANKINGS REPORT TM WWW.BULLHORNREACH.COM @BULLHORNREACH JUNE 2012 COPYRIGHT 2012 BULLHORN, INC. ALL RIGHTS RESERVED. EXECUTIVE SUMMARY

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2013

Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2013 Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2013 A Nationwide Survey of Program Directors Conducted by the American Society of Radiologic Technologists

More information

Community Cyber Security. Center for Infrastructure Assurance and Security

Community Cyber Security. Center for Infrastructure Assurance and Security Community Cyber Security Overview CIAS program Nevada implementation Get involved Physical and Cyber Threats Intersect The most destructive scenarios involve cyber actors launching several attacks on our

More information

FOR RELEASE: 3/23/00 IR-2000-17 IRS EXPANDS LOW-INCOME TAXPAYER CLINIC GRANTS, AWARDS $4.4 MILLION TO PROGRAMS IN 32 STATES

FOR RELEASE: 3/23/00 IR-2000-17 IRS EXPANDS LOW-INCOME TAXPAYER CLINIC GRANTS, AWARDS $4.4 MILLION TO PROGRAMS IN 32 STATES FOR RELEASE: 3/23/00 IR-2000-17 IRS EXPANDS LOW-INCOME TAXPAYER CLINIC GRANTS, AWARDS $4.4 MILLION TO PROGRAMS IN 32 STATES WASHINGTON In another step to expand legal assistance for taxpayers, the Internal

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Frequently Asked Questions About Using The GRE Search Service

Frequently Asked Questions About Using The GRE Search Service Frequently Asked Questions About Using The GRE Search Service General Information Who can use the GRE Search Service? Institutions eligible to participate in the GRE Search Service include (1) institutions

More information

Driving under the influence of alcohol or

Driving under the influence of alcohol or National Survey on Drug Use and Health The NSDUH Report December 9, 2010 State Estimates of Drunk and Drugged Driving In Brief Combined 2006 to 2009 data indicate that 13.2 percent of persons aged 16 or

More information

Table 1: Advertising, Marketing and Promotional Expense as a Percentage of Net Operating Revenue

Table 1: Advertising, Marketing and Promotional Expense as a Percentage of Net Operating Revenue Table 1: Advertising, Marketing and Promotional Expense as a Percentage of Net Operating Revenue NAIC Group % Attorney s Title 3.8% Chicago / Fidelity 0.9% Diversified 0.6% First American 2.7% Investors

More information

Vocational Rehabilitation

Vocational Rehabilitation Vocational Rehabilitation Senate Education Appropriations Committee October 7, 2015 Emily Sikes, Chief Legislative Analyst, OPPAGA oppaga THE FLORIDA LEGISLATURE S OFFICE OF PROGRAM POLICY ANALYSIS & GOVERNMENT

More information

STD AAPPS: Getting Started

STD AAPPS: Getting Started STD AAPPS: Getting Started Bruce Heath Team Lead AAPPS Webinar Series 01/28/2014 Overview Organization Program Support Team Cooperative agreement monitoring Technical Assistance AAPPS Moving forward/key

More information

The Economic Impact of Commercial Airports in 2010

The Economic Impact of Commercial Airports in 2010 The Economic Impact of Commercial Airports in 2010 January 2012 Prepared for: Airports Council International North America Prepared by: CDM Smith 8805 Governor s Hill Drive Cincinnati, Ohio 45249 Table

More information

50-State Analysis. School Attendance Age Limits. 700 Broadway, Suite 810 Denver, CO 80203-3442 303.299.3600 Fax: 303.296.8332

50-State Analysis. School Attendance Age Limits. 700 Broadway, Suite 810 Denver, CO 80203-3442 303.299.3600 Fax: 303.296.8332 0-State Analysis School Attendance Age Limits 700 Broadway, Suite 810 Denver, CO 80203-32 303.299.3600 Fax: 303.296.8332 Introduction School Attendance Age Limits By Marga Mikulecky April 2013 This 0-State

More information

Alabama Commission of Higher Education P. O. Box 302000 Montgomery, AL. Alabama

Alabama Commission of Higher Education P. O. Box 302000 Montgomery, AL. Alabama Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Alabama Commission of Higher Education P. O. Box 302000 Montgomery, AL 36130-2000 (334) 242-1998 Fax: (334) 242-0268 Alaska Commission

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)

More information

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008 Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach

More information

The Case for Change The Case for Whopping Big Change

The Case for Change The Case for Whopping Big Change TESTIMONY The California Assembly Higher Education Committee October 7, 2013 Presentation by: David Longanecker President, Western Interstate Commission for Higher Education (WICHE) FINANCING CALIFORNIA

More information

NAAUSA Security Survey

NAAUSA Security Survey NAAUSA Security Survey 1. How would you rate the importance of each of the following AUSA security improvements. Very important Somewhat important Not too important Not at all important Secure parking

More information

Motor Vehicle Financial Responsibility Forms

Motor Vehicle Financial Responsibility Forms Alphabetical Index Forms are listed alphabetically by form title. Important Note: The forms shown herein for each state may not be a complete listing of all the financial responsibility forms that are

More information

ANTI FRAUD BUREAUS ALASKA ARKANSAS ARIZONA CALIFORNIA

ANTI FRAUD BUREAUS ALASKA ARKANSAS ARIZONA CALIFORNIA ANTI FRAUD BUREAUS Anti-Fraud Bureaus are generally state operated agencies that have been organized to detect, investigate and deter insurance frauds of many types. Fraud bureaus and insurance company

More information

ONLINE SERVICES FOR KEY LOW-INCOME BENEFIT PROGRAMS What States Provide Online with Respect to SNAP, TANF, Child Care Assistance, Medicaid, and CHIP

ONLINE SERVICES FOR KEY LOW-INCOME BENEFIT PROGRAMS What States Provide Online with Respect to SNAP, TANF, Child Care Assistance, Medicaid, and CHIP 820 First Street NE, Suite 510 Washington, DC 20002 Tel: 202-408-1080 Fax: 202-408-1056 center@cbpp.org www.cbpp.org Updated June 8, 2011 ONLINE SERVICES FOR KEY LOW-INCOME BENEFIT PROGRAMS What States

More information

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective. CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective Methodology: The Computer Science Teachers Association (CSTA), in

More information

AAIS Mobile-Homeowners 2008 Series

AAIS Mobile-Homeowners 2008 Series Policy Forms and Endorsements IT IS WOLTERS KLUWER FINANCIAL SERVICES' POLICY TO LIMIT THE SALE OF BUREAU FORMS TO THE MEMBERS AND SUBSCRIBERS OF THOSE RESPECTIVE BUREAUS. PURCHASE AND USE OF BUREAU FORMS

More information

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014 NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Foreign Language Enrollments in K 12 Public Schools: Are Students Prepared for a Global Society?

Foreign Language Enrollments in K 12 Public Schools: Are Students Prepared for a Global Society? Foreign Language s in K 2 Public Schools: Are Students Prepared for a Global Society? Section I: Introduction Since 968, the American Council on the Teaching of Foreign Languages (ACTFL) has conducted

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

The Digital Identity Ecosystem of the States: Securing the Enterprise

The Digital Identity Ecosystem of the States: Securing the Enterprise The Digital Identity Ecosystem of the States: Securing the Enterprise Security Industry Alliance September 28, 2011 Doug Robinson, Executive Director National Association of State Chief Information Officers

More information

Motor Vehicle Financial Responsibility Forms

Motor Vehicle Financial Responsibility Forms Alphabetical Index Forms are listed alphabetically by form title. Important Note: The forms shown herein for each state may not be a complete listing of all the financial responsibility forms that are

More information

Alaska (AK) Arizona (AZ) Arkansas (AR) California-RN (CA-RN) Colorado (CO)

Alaska (AK) Arizona (AZ) Arkansas (AR) California-RN (CA-RN) Colorado (CO) Beth Radtke 50 Included in the report: 7/22/2015 11:15:28 AM Alaska (AK) Arizona (AZ) Arkansas (AR) California-RN (CA-RN) Colorado (CO) Connecticut (CT) Delaware (DE) District Columbia (DC) Florida (FL)

More information

Meeting Oregon s new high school math graduation requirements: examining student enrollment and teacher availability

Meeting Oregon s new high school math graduation requirements: examining student enrollment and teacher availability ISSUES& ANSWERS REL 2012 No. 126 At Education Northwest Meeting Oregon s new high school math graduation requirements: examining student enrollment and teacher availability ISSUES& ANSWERS REL 2012 No.

More information

HEALTH INSURANCE EXCHANGES UNDER THE AFFORDABLE CARE ACT: THE BUMPY ROAD TO IMPLEMENTATION

HEALTH INSURANCE EXCHANGES UNDER THE AFFORDABLE CARE ACT: THE BUMPY ROAD TO IMPLEMENTATION HEALTH INSURANCE EXCHANGES UNDER THE AFFORDABLE CARE ACT: THE BUMPY ROAD TO IMPLEMENTATION Russell S. Buhite Shareholder MARSHALL DENNEHEY WARNER COLEMAN & GOGGIN Tampa, Florida Theodore J. Tucci Partner

More information

Closing the College Attainment Gap between the U.S. and Most Educated Countries, and the Contributions to be made by the States

Closing the College Attainment Gap between the U.S. and Most Educated Countries, and the Contributions to be made by the States National Center for Higher Education Management Systems Closing the College Attainment Gap between the U.S. and Most Educated Countries, and the Contributions to be made by the States Patrick J. Kelly

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: ATF 2305 COURSE TITLE: Instrument Flight PREREQUISITE(S): ATF 1101 or ATF 1109 COREQUISITE(S): STUDENT

More information

When The Cloud Goes Bust: Data Breaches In The Cloud

When The Cloud Goes Bust: Data Breaches In The Cloud When The Cloud Goes Bust: Data Breaches In The Cloud CHRISTOPHER PIERSON, PH.D., J.D. LSQ JAMES T. SHREVE, ESQ. BUCKLEYSANDLER LLP Session ID: CLD-107 Session Classification: Intermediate Scenario 1 -

More information

How To Get A National Rac (And Mac)

How To Get A National Rac (And Mac) 7 th National RAC (and MAC) Summit December 5 6, 2012 Washington, DC Jane Snecinski P.O. Box 12078 Atlanta, GA 30355 www.postacuteadvisors.com National client base (both public and private sector) based

More information

Community College Survey of Student Engagement Benchmarks of Effective Educational Practice Spring 2009

Community College Survey of Student Engagement Benchmarks of Effective Educational Practice Spring 2009 Office of Institutional Research Community College Survey of Student Engagement Benchmarks of Effective Educational Practice Spring 2009 IR Report # 188 August 2009 Introduction to CCSSE The Community

More information

3. How Do States Use These Assessments?

3. How Do States Use These Assessments? 3. How Do States Use These Assessments? This is the third in a series of four related papers from the Center on Education Policy (CEP) describing career readiness assessments across states and districts.

More information