Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Size: px
Start display at page:

Download "Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking"

Transcription

1 Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.15

2 Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining 6.16 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

3 Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Definition Problem Solving Diversity of Perspective Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Defending Assessments Defending Assessments Technical Writing Writing for Leadership Debating Skills Knowing your Audience Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Vulnerability Assessments Cryptology Technical Architecture Information Architecture Network Defense Incident Response Networks & Networking Databases Programming Scripting Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.17

4 Applicable Programs and Courses Courses Competency Skill Good Maybe Critical Thinking Problem Definition NONE NONE Data Collection & Examination Communication & Collaboration Problem Solving AMU - Intelligence Operations AMU - Analytics II AMU Threat Analysis MU - Analytic Techniques MU - Cyber Threat Analysis ASU - Advanced Intelligence analysis: Operating in Complex Environments Diversity of Perspective NONE NONE Big Picture/Summarization/Synthesis ASU - Grand Strategy, Intelligence Analysis, and Rationality Scope Management HPU - Intelligence Team Management UM - Intelligence Management and Oversight UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations DC3 - Cyber Analyst Course UM - Library Research Skills DC3 - Cyber Analyst Course UM - Library Research Skills HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting Collection Management ISA - Intelligence Collection ASU - Intelligence Analysis and National Security Perspectives ISA - Cyber Collections HPU - Intelligence Operations HPU - Intelligence Collection HPU - Intelligence Practicum HPU - Recruitment Cycle HPU - All Source Intelligence NPS - Cyber Systems and Operations UM - Intelligence Collection: Sources and Challenges SN - Cyber Intelligence Training AMU - Collection Open Source Data HPU - Open Source Intelligence ISA - Cyber Collections AMU - SIGINT UM - Intelligence Collection: Sources and Challenges Defending Assessments NONE NONE Defending Assessments NONE NONE Technical Writing ERAU - Technical Report Writing HPU - Writing for Publication Writing for Leadership CMU - Professional Writing HPU - Writing for Publication ISA - Analyst Training: Writing, Analysis, and Preparing Briefings Debating Skills NONE NONE Knowing your Audience NONE NONE 6.18 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

5 Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Conflict Resolution ISA - Intelligence Concepts for Cyber Conflict Attention to Detail NONE NONE Assimilate New Information NONE NONE Public Speaking ERAU - Speech UDM - Intelligence Acquisition: Debriefing and Interviewing Techniques CMU - Strategic Presentation Skills Malware NONE NONE HPU - Analytical Methods Penetration Testing NPS - Cyber Wargame: Blue Team CMU - Hacking Exposed Social Engineering NPS - Cyber Wargame: Red Team NPS - Network Operations DISA - Social Networking DISA - Phishing NIU - Social Networks and Intelligence Web Servers NONE NONE Wireless Networks UC - Telecommunications Forensics Web Applications NONE NONE UC - Principles of Cybersecurity NPS - Computer Architecture and HPU - Analytical methods Vulnerability Assessments NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations Cryptology UP - Cryptography NPS - Network Security Technical Architecture UM - Cyberspace and Cybersecurity NPS - Cyber Communications Architectures NPS - Computer Architecture and NPS - Network Operations in a Contested Environment ISA - Cyberforce Superiority Information Architecture NONE NONE Network Defense Incident Response ISA - Cyberforce Superiority UC - Computer Forensics Investigations NPS - Network Operations Networks & Networking NPS - Communications Networks NPS - Internet Protocols NPS - Network Operations NPS - Network Operations in a Contested Environment NPS - Network Security UP - Network Security FSU - Networking Essentials UP - Principles of Cybersecurity NPS - Computer Architecture and Databases NONE NONE NPS - Network Vulnerability Assessment and Risk Mitigation UC - Principles of Cybersecurity UC - Telecommunications Forensics Programming UM - Cyberspace and Cybersecurity NPS - Computer Architecture and Scripting NONE NONE Data Mining CMU - Data Mining CMU - Business Intelligence and Data Mining NPS - Information Management for Cyber Operations UC - Critical Incident Command, Response, and All Hazards CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.19

6 Programs Reviewed School Name Course Name School Name Course Name American Military University (online) Strategic Intelligence Bellevue University (Nebraska) (continued) Political Islam and Terrorism Transnational Crime and Corruption Angelo State University Bellevue University (Nebraska) Collection Analytics II Intelligence Operations Threat Analysis SIGINT Cybercrime Analysis Cyber Ethics: Privacy and Intellectual Property Law, Ethics, and Cybersecurity Criminal Intel Analysis Intelligence Profiling Deception, Propaganda and Disinformation Counterintelligence Information Operations Intelligence Analysis and National Security Perspectives Grand Strategy, Intelligence Analysis, and Rationality Transformational Imperative: Reorganizing in a Multi-polar World Advanced Intelligence analysis: Operating in Complex Environments Practice of US Intelligence and National Security Introduction to Applied Statistics Intelligence Support to Policy Making: Impact of 9/11 Special Operations: Creating Strategic Intelligence Effects Cyber Arms Race and the Intelligence Policy Nexus Intelligence and Counter-Terrorism National Security, Transnational Interests Comparative Intelligence Cultures Post-Conflict Politics: Peacekeeping and Peacebuilding Green Security: Eco-conflict and its Challenges Army War College Carnegie Mellon University Analyzing Anti-Americanism Strategic Deterrence Cyberwar and Cyberdeterrence Democracy, Ethnicity, Development in Africa Democracy, Political Economy and Human Rights across Asia Democracy, Gender, Reform across the Middle East Comparative Foreign Policy Hard and Soft Power Deterring the Enemy Domestic and International Security Environments and the National Security System Contemporary Security Issues and national Security Policies and Strategies Geography and US National Security Decision Analysis for Senior Leaders Strategic Intelligence for Counterterrorism: Contemporary Threats to National Security Cyberwarfare Cyberspace Theory and Strategic Security Implications Business Intelligence and Data Mining Cybersecurity in Critical Infrastructure Protection Data Mining Decision Making Under Uncertainty Hacking Exposed Information Assurance Policy Information Security Risk Analysis Information Security: Comparison of US and European Policies Information Warfare Professional Writing Strategic Presentation Skills Terrorism Security and Intelligence 6.20 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

7 School Name Course Name School Name Course Name Department of Defense Cyber Counterintelligence in Cyber Space Henley-Putnam University Leadership Analysis Crime Center (DC3) Phase 1 (continued) Political Analysis Cyber Analyst Course Introduction to Cyber Investigations Area Studies Analysis Extremist Organizations Embry-Riddle Aeronautical University Cybersecurity Introduction Technical Report Writing Speech Intelligence Technology Computer Forensics Business Information System Terrorism Group Dynamics Analyzing the Terrorist Mind Terrorism and Society Kidnapping Strategies Influence Warfare Advanced Consequence Management and Incident Command Ferris State University Principles of Information Security System Henley-Putnam University Computer Forensics All Things Digital Data and Intelligence Competitive Theory Organized Crime, Gang and Terrorist Organizations Risk Analysis and Strategy Networking Essentials Recruitment Cycle Cover Double Agents, Denial, Deception Analytical methods Computer Intrusion Defense Cyberterrorism, Cyberwarfare, Cybercrime Hostage Negotiation, Hostage Survival Stalking and Workplace Violence Advanced Threat Assessment Background Investigations Vehicular Security Building and Perimeter Security Explosives and Arson Security White Collar Crime Open Source Intelligence Surveillance and Counterserveillance Intelligence Operations Intelligence Practicum Intelligence Team management Secret Societies All Source Intelligence Intelligence Policy and Reform Intelligence Collection WMD Terrorism Counterespionage Vetting Counterterrorism Analysis Cults and Charismatic Leaders Advanced Domestic Terrorism Operational Concepts and Planning Case Studies in Covert Operations Strategic Intelligence Intelligence & Security Academy, LLC Writing for Publication National Security Policy Process History of US Intelligence Intro to US Intelligence Risk Awareness Intelligence Homeland Security Intelligence Intelligence Budget Process Intelligence Concepts for Cyber Conflict Cyber Collections Operational intelligence Counter Terrorism: Actionable Intelligence Analyst Training: Writing, Analysis, and Preparing Briefings Intelligence Collection Cyberforce Superiority Intelligence and the Law CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.21

8 School Name Course Name School Name Course Name Mercyhurst University in Intelligence Naval PostGraduate School (NPS) Cyber Communications Architectures Intelligence Theories and Applications Competitive Intelligence Law Enforcement Intelligence (continued) Network Operations Topics in Signals Operations Cyber Mission Planning Cyber Policy Strategy Intelligence Communications Contemporary Leadership for Intelligence Managing Strategic Intelligence Network Operations in a Contested Environment Information Management for Cyber Operations Analytical Techniques Cyber Threat Analysis Comparative History of Intelligence Evolution of Counterintelligence Intelligence to Support Targeting Strategic Business Intelligence Intelligence and the Constitution Analyzing Financial Crimes Nonproliferation Analysis National Security Studies in Terrorism Counterintelligence Events and Concepts Penn State Cyber Wargame: Blue Team Cyber Wargame: Red Team Cyber Systems and Operations Computer Architecture and Operating Systems Conflict and Cyberspace Computer Security Information Assurance: Secure Management of Systems Network Security Network Vulnerability Assessment and Risk Mitigation Computer Science National Intelligence University Intelligence, the Military, and Warfare Counterespionage and Policy Making Topics in Intelligence Strategic Crisis Exercise Information Power and National Security Propaganda, Persuasion and Influence Cyber Intelligence Economics Foreign Languages and Cultures Geography Information Sciences and Technology Political Science Psychology Sociology Information, People, and Technology Security and Risk Analysis Foreign Information and Cyber Strategies Cyber Threat Secure Ninja Threat of Terrorism and Crime Secure Ninja Cyber Intelligence Training Naval PostGraduate School (NPS) Social Networks and Intelligence Advanced Information Power Seminar Cyber Systems and Operations Communications Networks Internet Protocols Secure Ninja Cyber Counterintelligence Secure Ninja Introduction to Cyber Crime 6.22 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

9 School Name Course Name School Name Course Name University of Detroit Mercy University of Pittsburgh Information Science Spatial Analysis and Mapping Cryptography Terrorism Human Information Processing Homeland Security and Threat Assessment Roots of 21st Century Conflict Intelligence Acquisition: Debriefing and Interviewing Techniques Policy Analysis and Strategy Creation Leadership and Behavior in Organizational Intelligence Interactive System Design Human Factors in Systems Information Security and Privacy Network Security Information Ethics Legal Issues in Information Handling Information Security Professionals University of Maryland Topics in Intelligence Seminar in Security Issues Organizational Theory Intercultural Communication and Leadership Utica College (online) System Administrator in Information Systems Security Information System Security Officer System Certifiers Principles of Cybersecurity Financial Decision Making for Managers Statistics for Managerial Decision Making Managing Intelligence Activities Intelligence Collection: Sources and Challenges Intelligence Analysis: Consumers, Uses, and Issues Cyber Intelligence Critical National Infrastructures and National Security Cybercrime Investigations Cyber Counterintelligence Domestic Terrorism and Extremist Groups Counterterrorism and Cyber Conflict Espionage and Counterintelligence Intelligence Led Enforcement Intelligence Management and Oversight Leadership Seminar DISA Critical Incident Command, Response, and All Hazards Computer Forensics Investigations Telecommunications Forensics Cyber Awareness Challenge Library Research Skills IC ISS Awareness Cyberspace and Cybersecurity Social Networking Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology Phishing National Cybersecurity Policy and Law Enterprise Cybersecurity Policy Global Cybersecurity CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.23

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education Student and Faculty Login The University Request Information Sitemap Read Our Expert Guide To: Potential for obtaining intelligence jobs is enhanced by focus in intelligence studies Earn a Bachelor or

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS Taught Masters programmes What s special about studying in the Department of International Relations at Sussex? With a history that spans

More information

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) Brief presentation of the program: The training covers specialized courses in sciences for risk, geopolitics and security, environmental and

More information

Cyber Adversary Characterization. Know thy enemy!

Cyber Adversary Characterization. Know thy enemy! Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Bachelor s Degrees. Criminal Justice Courses. Communication Courses. Bachelor s Degrees

Bachelor s Degrees. Criminal Justice Courses. Communication Courses. Bachelor s Degrees Bachelor s Degrees Dean: William H. Clements Associate Dean of Administration: Debra R. Wick Associate Dean of Enrollment Management (interim): John A. Kunelius Chair, Division of Continuing Studies: Mark

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Criminal Justice Courses

Criminal Justice Courses Criminal Justice Courses Course ID Course Title Credits CJ-100 Introduction to Criminal Justice and Administration 3 CJ-110 Criminal Law 3 CJ-120 Introduction to Law and the Court Systems 3 PSY-100 Essentials

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

How To Get A Masters Degree In Intelligence Analysis

How To Get A Masters Degree In Intelligence Analysis MASTER OF SCIENCE IN INTELLIGENCE ANALYSIS Director: Erick Barnes Office: Briggs Building 135 McNichols Campus Telephone: (313) 578-0363 Fax: (313) 993-1166 E-mail: barnese@udmercy.edu Website: http://liberalarts.udmercy.edu/intelanalysis/

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack

More information

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES STUDENT HANDBOOK FOR CRIMINOLOGY MAJORS 2015-2016 SEPTEMBER 2015 REVISION DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES UNDERGRADUATE PROGRAM

More information

Defense Security Service

Defense Security Service Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,

More information

m a s t e r o f s c i e n c e i n

m a s t e r o f s c i e n c e i n m a s t e r o f s c i e n c e i n Global affairs The M.S. in Global Affairs is the flagship graduate program of the Center for Global Affairs (CGA), ranked by the Foreign Policy Association in 2010 and

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study Guide to Graduate Programs Master of Arts Degrees Certificates of Graduate Study The Institute of World Politics is a graduate school of national security and international affairs, dedicated to developing

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Secure Data Centers For America A SOLUTION TO

Secure Data Centers For America A SOLUTION TO Secure Data Centers For America A SOLUTION TO A HOMELAND & NATIONAL SECURITY THREAT AGAINST CRITICAL INFRASTRUCTURE AND KEY RESOURCES IN STATE AND LOCAL GOVERNMENTS By Ralph R. Zerbonia and Universe Central

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14)

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14) Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code () Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date: CS Track: 1.

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Information Assurance Program at West Point

Information Assurance Program at West Point Information Assurance Program at West Point Daniel-Ragsdale@usma.edu John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

The Human Factor of Cyber Crime and Cyber Security

The Human Factor of Cyber Crime and Cyber Security The Human Factor of Cyber Crime and Cyber Security Challenges: September 11th has marked an important turning point that exposed new types of security threats and disclosed how cyber criminals pursuit

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

Spring 2015 Courses Security Studies Masters and Certificate

Spring 2015 Courses Security Studies Masters and Certificate Spring 2015 s Masters and MSSS Core s 6155 Changing Nature of National Security (601 33871 J. Roshandel) This course aims to provide an intellectual footing as well as the conceptual tools necessary to

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars) Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural

More information

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range Tactical Range Facility Criminal Sgt. Major James Massey Range 11 Classes Offered Officer Safety & Field Tactics Officer Safety & Field Tactics in a Terrorism Environment Officer Safety & Field Tactics

More information

National Cyber Security Strategies: United States

National Cyber Security Strategies: United States National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education ANSER and AMERICAN MILITARY UNIVERSITY Homeland Security Education AGENDA Introduction Program Administration: AMU Content Administration: ANSER Homeland Security Courses Academic Degree Integration Options

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

Who Are The Enemies? What Can They Do?

Who Are The Enemies? What Can They Do? Who Are The Enemies? What Can They Do? Internet Software Security Issues in the Software Development Process Dr Charles P Pfleeger Pfleeger Consulting Group chuck@pfleeger.com Overview WAMPS 2009 - Workshop

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

GW Law Alumni Elective Courses Survey

GW Law Alumni Elective Courses Survey GW Law Alumni Elective Courses Survey About You 1. Year of graduation (if you hold multiple degrees from GW Law, please select your most recent graduation year) [drop-down list included 1925-2010] 2. Practice

More information

Description of Homeland Security

Description of Homeland Security Majoring in.... Homeland Security Description of Homeland Security What is homeland security? Homeland security and emergency preparedness (the official name of the major) is the study of international

More information

PROGRAMS STUDY. Information Technology

PROGRAMS STUDY. Information Technology PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating

More information

2015-2016 ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT

2015-2016 ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT KING GRADUATE SCHOOL MBA in BUSINESS MANAGEMENT MPH in PUBLIC HEALTH MS in CRIMINAL JUSTICE KING GRADUATE SCHOOL MBA in BUSINESS MANAGEMENT The MBA concentrations available to students are: FINANCE INFORMATION

More information

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Section 1A Overview RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY Hiring Process Overview. This instruction establishes procedures for filling cyber security workforce

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Society, Law Enforcement and the Internet

Society, Law Enforcement and the Internet Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York carter@qosient.com

More information

How To Get A Security Degree In Australia

How To Get A Security Degree In Australia Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.

More information