The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
|
|
|
- Richard Hicks
- 10 years ago
- Views:
Transcription
1 The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure the security of our Navy s information systems. These new threats require a shift in thinking from the old normal to a new normal, according to the Navy s Chief Information Officer Robert Carey. And Chairman of the Joint Chiefs of Staff ADM Michael Mullen, USN states that we need a force capable of continued operations while defending against cyber-attacks. A makeover of culture, conduct and capabilities is integral to the success of a new cyber security strategy, one that is designed to create a comprehensive layered defense that will form the foundation for the future of naval computer information and network defense. The Navy has reactivated the Tenth Fleet as the U.S. Navy's Fleet Cyber Command under the command of VADM Bernard J. McCullough III, USN. And the Naval Academy has begun to adapt its educational offerings to reflect the requirement that its graduates be prepared to lead in the Navy s fight for information dominance and cyber security. The Naval Academy has established a Center for Cyber Security Studies (CCSS) to serve as a locus for innovation and learning related to a broad variety of issues associated with the study of cyber security. The CCSS leads curriculum development related to information assurance and cyber security, and provides support for cyber-related faculty research, midshipmen internships, summer professional experiences, conferences, speakers and seminars. Opportunities exist for establishing midshipmen programs such as cyber scholars, for engaging midshipmen in practical applications via in-house CCSS run cyber attack and defense exercises, for creating and supporting summer professional cyber experiences, and for establishing a cyber-focused Distinguished Visiting Professorship or Faculty Chair. The CCSS provides a vehicle for supporting a Computer Network Defense Lab to provide midshipmen with the skills necessary to design, maintain and defend a computer network. And midshipmen will be able to develop the skills necessary to conduct cyber attacks and reconnaissance in a Computer Network Attack Lab. Midshipmen will use state-of-the-art commercial digital forensics software and hardware to learn how to identify cyber crime in a Computer Forensics Lab, and will study critical infrastructure attack and protection issues in a Supervisory Control and Data Acquisition (SCADA) Lab. The CCSS will also support a Wireless Network Security Lab and a Biometrics Lab. The Naval Academy has hired its first CCSS Director, CAPT (sel) Steven Simon, USN, who will be joining the faculty in late spring or summer CAPT Simon is tasked with developing a detailed strategic plan for the Center, including staffing, hardware and software requirements, goals and objectives, and the establishment of a permanent physical home for the Center at the
2 Naval Academy. The Director will work closely with Naval Academy faculty and administration in the design and implementation of new interdisciplinary courses and fields of concentrated study, summer professional experiences, internships, and the development of appropriate facilities, all of which are focused on the fields of cyber security and cyber warfare. The U.S. Naval Academy Foundation is an independent, non-profit corporation committed to raising and resourcefully investing private gifts for the benefit of the U. S. Naval Academy. These private contributions supplement federal funds to provide a margin of excellence that transforms programs from adequate to outstanding. Private funds are also used to jump start and operate new programs until appropriated funds become available. These programs have significant impact on the quality of the education provided at the Academy, the development of future Navy and Marine Corps officers, and ultimately, the long-term security of our nation. Private donors are invited to support the establishment of the Center for Cyber Security Studies at the Naval Academy by contributing resources to meet the Center s initial and ongoing support requirements. For more information, please contact Steve Maconi, Director of Development, U. S. Naval Academy Foundation at or [email protected]. July 2010
3 The Center for Cyber Security Studies Lecture Series 22 November 2010 Professor David C. Gompert Former Acting Director, National Intelligence Distinguished Visiting Professor in National Security Studies, USNA "How We Got Here: Digital Revolution, Globalization, and Military Transformation 7 February 2011 GEN Michael Hayden Former director, CIA; former director, NSA Distinguished Visiting Professor, George Mason School of Public Policy "Understanding the Cyber Domain" 28 February 2011 The Honorable Howard A. Schmidt, CISSP, CSSLP Special Assistant to the President and Cybersecurity Coordinator "Strategic Cyber Defense Efforts"
4 The Center for Cyber Security Studies Private Gift Opportunities Cyber Warfare Speaker Series. In Spring of 2010, the Naval Academy inaugurated the Cyber Warfare Lecture Series. These presentations by academic technical experts, policymakers, and warfare leaders expose midshipmen, faculty and staff to a broad array of cyber topics and their impact on the practice and philosophy of modern warfare. Includes travel costs, honorarium and small speaker gift. $7,500 for 5 speakers annually. Cyber Internships. Midshipmen summer internships with cyber-related organizations such as the National Security Agency (NSA) and National Defense University (NDU). Occurring during summer training blocks, these six-week internships provide midshipmen with a unique opportunity to apply the technical knowledge gained during academic studies to realworld government and military problems. $35,000 for 5 midshipmen Faculty Cyber Professional Development. Intensive specialized computer security training courses for USNA cyber-technical faculty to maintain leading-edge currency on emerging cyber topics which then convey into the classroom. Typically offered by organizations such as the SANS Corporation. $7,000 per attendee. Midshipmen Training. Midshipmen-focused intensive specialized computer security training courses, such as those developed and taught by the SANS Corporation. These midshipmen will lead in-house mini-cdx events for the rest of the Brigade. $3,000 per attendee. Computer Forensics Lab. This lab will provide midshipmen with the skills necessary to employ, develop and test digital forensics equipment and techniques. Midshipmen will learn to identify organizational policy infractions and cyber crimes, and safeguard digital forensic evidence. Onetime cost: $125,000 (10 dedicated modular forensic workstations $8,000 each, 10 mobile forensics units $4,500 each). Supervisory Control and Data Acquisition (SCADA) Lab. This lab will provide midshipmen with the skills necessary to understand and protect against the vulnerabilities of computer-based automated controls that are often associated with infrastructure systems (e.g., electrical grids, water systems, oil pipelines, physical security systems, etc). Onetime Cost: $100,000 for programmable logic controllers (PLCs) and associated software controllers, a dedicated network, Remote Terminal Units, and specialized Human-Machine Interface (HMI) software.
5 Sandboxed Computer Network Attack Lab. This lab will provide midshipmen with the skills necessary to conduct network intelligence gathering, network intrusion operations, network attack operations, and network exploitation. Onetime Cost: $100,000 for 2 high end servers, 8 routers, 32 PCs (16 PCs on a sandbox network and 16 PCs on the USNA network), and associated switches, monitors, racks, as well as licenses for virtualization software. Wireless Network Security Lab. This lab will provide midshipmen with the skills necessary to protect and exploit vulnerabilities associated with wireless communication systems, mobile ad hoc networks and sensor networks. Onetime Cost: $75,000 for 18 laptops, video, audio and other sensors with embedded processors, and related equipment. Mini-CDX. Laptops, servers and associated equipment on mobile carts, allowing for cyber security events to be moved to locales of interest around the Yard. Onetime Cost: $100,000 for 32 laptops, two high-end servers, associated switches, as well as licenses for virtualization software. Cyber Security Studies Faculty Position. The intent of this position is to bring distinguished academic leadership to the Naval Academy s cyber security program. Distinguished Visiting Professor: $175,000 annually. Faculty Chair: $220,000 annually.
The USNA Cyber Program
The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Computer Science Department United States Naval Academy. With Knowledge we Serve our Friends... With Knowledge we Defeat our Enemies
Computer Science Department United States Naval Academy With Knowledge we Serve our Friends... With Knowledge we Defeat our Enemies Overview >Why CS/IT? Two ABET Accredited Majors Computer Science is the
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
COMPSCIDEPTINST 1520 15 Dec 2012. 1. Purpose. This instruction updates the Computer Science Department s Assessment Plan.
COMPSCIDEPTINST 1520 15 Dec 2012 Computer Science Department Instruction 1520 From: Chair, Computer Science Department Subj: ASSESSMENT PLAN Encl: (1) Long-Range Assessment Plan 1. Purpose. This instruction
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
Train Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership [email protected] Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
CURRICULUM VITAE. Danny L. Rhodes
CURRICULUM VITAE Danny L. Rhodes Anderson University 139 Martin s Pointe Dr. PO Box 1163 Seneca, SC 29678 316 Boulevard 864-985-1550 Anderson, SC 29621 864-231-2086 [email protected] EDUCATION:
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
Information Assurance Program at West Point
Information Assurance Program at West Point [email protected] John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support
Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.
Cyber Security 2014 Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr. Joel Dubow Hacking Incidents Reported to the Cyber
Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Strategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
ACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy
An enterprise grade information security & forensic technical team
An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital
Indiana State Government, K-12 Cyber Safety
INCSC INDIANA CYBERSECURITY SERVICES CENTER Hans Vargas Purdue University Professor Melissa Dark Purdue University INDIANA CENTRALIZED OFFICE OF TECHNOLOGY The Indiana Office of Technology (IOT) encompasses
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Cyber Education: A Multi-Level, Multi-Discipline Approach
Cyber Education: A Multi-Level, Multi-Discipline Approach Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor United States Military Academy West Point, New York 10996 USA edward.sobiesk,
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Cyber Risk to Help Shape Industry Trends in 2014
Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com
KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
Cybersecurity Workforce Opportunities
Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially
Cybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit] About me Currently: Principal Consultant on Mandiant s Industrial
Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, 2015-----Washington, DC
Day 1, Nov 17, 2015 8:00 a.m. 9:00 a.m. Check in/setup 9:00 a.m. 9:10 a.m. Welcome and Introductions 9:10 a.m. 9:30 a.m. Federal Perspective Keynote Global/National Landscape: Former Congressman Steve
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
WORKSHOP Rethinking Cyber Security for Industrial Control Systems
WORKSHOP Rethinking Cyber Security for Industrial Control Systems Bob Mick, Workshop Moderator VP Emerging Technologies ARC Advisory Group [email protected] 1 Re-Thinking Cyber Security Why Re-Thinking?
CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
Cybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015
UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
INVESTIGATE CRIMINAL JUSTICE AT RADFORD UNIVERSITY
INVESTIGATE CRIMINAL JUSTICE AT RADFORD UNIVERSITY Since 1974, Radford University has been preparing students to make an impact with careers in criminal justice. The Criminal Justice program at Radford
