SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
|
|
|
- Letitia Stafford
- 10 years ago
- Views:
Transcription
1 SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation s ability to produce high-quality digital systems and a well-trained workforce. Achieving a cybersecure society is a critical challenge in today's world, as corporations, agencies, national infrastructure, and individuals have been victims of cyber-attacks. These attacks exploit weaknesses in technical infrastructures and human behavior. Understanding the motivations and incentives of individuals and institutions, both as attackers and defenders, can aid in creating a more secure and trustworthy cyberspace. Addressing this problem requires multi-disciplinary expertise in computational, statistical, mathematical, economic, and computer sciences, and ultimately the transition of new concepts and technologies to practice. Fundamental research in algorithms, models, probability theory, reliability, statistical theory and analysis, cryptanalysis, system structures, and secure computing is needed to stay ahead of new threats enabled by new technologies. The increasing power and ubiquity of computers implies that in the next era of computing many existing algorithms used to secure transmissions will no longer be robust or adequate. Research is needed in market mechanisms that can align incentives, hedge risks, and reduce the frequency and severity of attacks, and research that provides a deeper understanding of the social and behavioral factors affecting cybersecurity. The development and deployment of innovative cybersecurity models and practices throughout scientific environments is also required. This research and development requires a well-trained professional workforce with new skills and knowledge, necessitating creative and innovative approaches to the education and preparation of tomorrow s cybersecurity researchers. Total Funding for SaTC (Dollars in Millions) Enacted/ Actual Annualized FY 2013 CR FY 2014 Request $ $ $ Goal The long-term goal of the SaTC program is to build the knowledge base in cybersecurity that enables discovery, learning, and innovation in this critical area, and ultimately leads to a more secure and trustworthy cyberspace. The program aligns with the President s Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program (released in December 2011), which details four subgoals that together cover a set of interrelated priorities for the federal agencies that conduct or sponsor research and development in cybersecurity. These four goals are: (1) inducing change, (2) developing scientific foundations, (3) maximizing research impact, and (4) accelerating transition to practice. In order to achieve these goals, a coordinated, interdisciplinary program is needed. Approach The Directorates for Computer and Information Science and Engineering (CISE); Education and Human Resources (EHR); Engineering (ENG); Mathematical and Physical Sciences (MPS); and Social, Behavioral, and Economic Sciences (SBE) participate in this program. Each of these organizations supports a research community whose abilities are needed to collectively build the envisioned cybersecure and trustworthy environment and to prepare the scientists and supporting workforce needed NSF-Wide Investments - 27
2 Secure and Trustworthy Cyberspace to sustain and improve that environment. The SaTC program is managed by a Working Group (WG) made up of program directors from the participating directorates. EHR invests in the CyberCorps: Scholarship for Service (SFS) program, which supports cybersecurity education and workforce development. SFS has funded more than 1,700 students and provides capacity building grants to promote cybersecurity education and research at higher education institutions. SFS will continue its focus on increasing the number of qualified students entering the fields of information assurance and cybersecurity, and enhancing the capacity of the United States higher education enterprise to continue to produce professionals in these fields to secure the Nation s cyberinfrastructure. The following paragraphs describe the specific objectives of NSF s SaTC program, and how they relate to the four thrusts of the Federal Cybersecurity Strategic Plan: Inducing Change Focus the direction of research on four game-changing research topics designed-in security, moving target defense, tailored trustworthy space, and cyber economic and behavioral incentives to better understand the motivations, incentives, and behaviors of users, attackers, and defenders. For example, study how information flows within and between these groups, how organizations or policies can be developed to align individual and societal incentives, or how targets are selected and defended. Provide the foundations and tools for privacy, confidentiality, accountability, and anonymity, as well as extraction of knowledge from massive datasets without compromising societal values. Advance the design and implementation of software that exhibits resiliency in the face of an attack, the design and composition of software components into large-scale systems with known security properties, the design of reliable systems including attention to behavior and human factors that can function dependably even if some subset of components do not function as intended, and support the transition of novel software into shared cyberinfrastructure. Developing Scientific Foundations Develop the scientific foundations for digital systems that can resist attacks, including a range of cryptographic algorithms and statistical tools that can withstand attacks from novel computing engines, such as quantum computers, and that support operation in environments with restricted computational resources. Develop the mathematical and statistical theory and methodologies required to model and predict the behavior of large-scale, complex systems; assure that the large-scale computations in many fields of research are not vulnerable to manipulation or compromise; and develop and implement improved cybersecurity defenses for scientific environments and cyberinfrastructure. Develop the scientific foundations to understand how individuals, groups, organizations, and other actors make decisions in the realm of cybersecurity. Develop market-based approaches to align incentives for investments, efficiently share risks, and internalize externalities. Maximizing Research Impact Ensure that the Nation s populace understands the security and privacy characteristics and limitations of the digital systems on which they rely daily. Coordinate with the NSF Cyber-enabled Materials, Manufacturing, and Smart Systems (CEMMSS) investment to support foundational research in cybersecurity issues arising in advanced manufacturing, robotics, and critical infrastructure, such as Smart Grids. NSF-Wide Investments - 28
3 FY 2014 NSF Budget Request to Congress Investigate opportunities and challenges in organizational alliances around cybersecurity; examine alternative governance mechanisms, for example, private-public partnerships and international agreements. Accelerating Transition to Practice Provide insight and incentives into the process for innovation diffusion and adoption at the organizational, group, and individual levels. Drive innovation through applied research, development, and experimental deployment. Transition successful basic research results and commercial innovations into early adoption and use tailored for NSF communities and learning environments. Enable NSF cyberinfrastructure as a premier proving ground and state-of-the-art environment for advancing cybersecurity solutions and moving them into technical and organizational practice. In addition, SaTC will address the pivotal issues in the education and preparation of tomorrow s cybersecurity researchers. Specific objectives are: Promote innovation and development of new curricula and learning opportunities to create and sustain an unrivaled cybersecurity workforce, capable of developing sound and secure cyberinfrastructure components and systems. Study new approaches to training and education in cybersecurity to understand their impact and provide a basis for continual refinement and improvement. Investment Framework Directorate/Office Actual Enacted/ Annualized FY 2013 CR FY 2014 Request Computer and Information Science and Engineering $58.89 $59.00 $75.00 Education and Human Resources Engineering Mathematical and Physical Sciences Social, Behavioral, and Economic Sciences Total $ $ $ Totals may not add due to rounding. SaTC Funding by Directorate (Dollars in Millions) FY 2013 In, 61 SaTC proposals were funded from a solicitation jointly issued by CISE (including the Division of Advanced Cyberinfrastructure, formerly the Office of Cyberinfrastructure), MPS, and SBE. These proposals support the four thrust areas of the Federal Cybersecurity Strategic Plan: inducing change, developing scientific foundations, maximizing research impact, and accelerating transition to practice. In addition, six CAREER awards associated with SaTC were funded in. In FY 2013, a SaTC solicitation was jointly issued by CISE, EHR, ENG, MPS, and SBE to elicit research proposals to expand research and development of secure and trustworthy cyberspace using the approach outlined above in the Federal Cybersecurity Strategic Plan. NSF-Wide Investments - 29
4 Secure and Trustworthy Cyberspace To develop the SaTC community, in, the directorates held community-building workshops and Principal Investigator (PI) meetings. In 2013, meetings will be held to facilitate the exchange of ideas on the SaTC program and related research and development. Interdisciplinary workshops that focus on specific problems (e.g., metrics, fundamental results, evidence-based research) in the scientific foundations of cybersecurity are planned, as well as meetings to educate SaTC program directors about other NSF programs that focus on transitions to practice, such as NSF Innovation Corps and the Accelerating Innovation Research activity in the Partnerships for Innovation program. NSF held a workshop in partnership with the Computing Community Consortium and the Semiconductor Research Corporation on fundamental cybersecurity issues of interest to both industry and academic researchers. NSF has collaborated with, and will continue to collaborate with, other federal partners on cybersecurity: NSF co-chairs the NITRD Cyber Security and Information Assurance Senior Steering Group, which provides leadership across the government in cybersecurity R&D and provides a forum for information sharing. In addition, NSF and the Department of Education co-lead the Formal Education Component of the National Initiative for Cybersecurity Education. In, NSF and the National Security Agency (NSA) jointly held a Principal Investigator (PI) workshop, as well as jointly funded the Cyber-Physical Systems Virtual Organization at Vanderbilt University to encourage it to extend its scope into cybersecurity and to better understand how it relates to smart systems. In, the SFS program continued its focus on increasing the number of qualified students entering the fields of information assurance and cybersecurity and enhancing the capacity of the United States higher education enterprise to continue to produce professionals in these fields to meet the needs of our increasingly technological society. SFS funded 43 projects in. In FY 2013, NSF will continue funding SFS capacity building proposals focusing on broadening participation of women, veterans, and underrepresented minority groups. At least two university pilots on cybersecurity education and secure programming, jointly supported by CISE and EHR, will be launched in FY NSF will hold a workshop to help create a community of researchers and students interested in cross CISE-SBE-EHR related issues. These efforts will include the development of a National Virtual Lab for Cybersecurity Education to promote collaboration and resource sharing. In FY 2013, a fourth perspective on cybersecurity education has been added to the SaTC solicitation with the aim to promote innovation, development, and assessment of new learning opportunities and to create and sustain an unrivaled cybersecurity workforce capable of developing secure cyberinfrastructure components and systems, as well as to raise the awareness of cybersecurity challenges to a more general population. FY 2014 Request The following activities are planned: Expand the research portfolio to include more cross-disciplinary projects to cover a broader set of research topics and to increase transition to practice. Fund up to two large, multi-institutional projects that provide high-level visibility to grand challenge research areas. Develop a mechanism for supporting foundational research that has industrial impact, such as Grant Opportunities for Academic Liaison with Industry (GOALI) supplements or co-funding with an industrial consortium. Expand cybersecurity outreach and collaboration efforts by establishing a partnership with at least one other agency (e.g., the Department of Homeland Security, National Institute of Standards and Technology, NSA) for co-funding or transition of projects, and hold a workshop with the European Union to determine mutual interests. Hold a SaTC PI meeting to help build a broad community that crosses disciplinary interests. NSF-Wide Investments - 30
5 FY 2014 NSF Budget Request to Congress Expand the education and preparation of cybersecurity researchers by funding projects on curriculum development and evaluation in cybersecurity. Support efforts to define a cybersecurity body of knowledge and to establish curricula recommendations for new courses, degree programs, and educational pathways. FY 2015 Beyond Building on the knowledge base developed during the previous years, SaTC will continue to focus on game-changing research and education and the development of digital systems that are resistant to attacks. In coordination with the CEMMSS WG, the focus will be to secure advanced manufacturing systems, robotics, and critical infrastructure; and transition to practice research results ready for experimental deployment, early adoption, commercial innovation, or implementation in cyberinfrastructure. To more effectively achieve its long-term goals, SaTC will develop partnerships with other agencies, industry, and international organizations. The cybersecurity research community is also expected to grow to include more researchers who cross the boundaries between computer science, engineering, economics, social and behavioral sciences, statistics, and mathematics, thereby creating a flourishing cybersecurity research and development ecosystem. NSF will continue to promote the development of new curricula and learning opportunities to augment the cybersecurity workforce with focused efforts to recruit and retain underrepresented minorities, women, first-generation/low-income students, and/or veterans. Evaluation Framework NSF has engaged the Science Technology Policy Institute (STPI) to conduct a program evaluation feasibility study for the SaTC program. This evaluation feasibility study will examine the baseline portfolio of SaTC investments and identify metrics to measure progress of goals as part of an impact assessment. This feasibility study will be conducted to develop a plan for an impact assessment of the SaTC investment. The approach outlined below will be followed: Meetings will be held with the SaTC WG and SaTC management to examine the past and current portfolio of awards, including an assessment of the components of the portfolio by technical and scientific content. In addition, various recommendations from federal advisory boards and stakeholder communities on how to structure future cybersecurity investments will be synthesized. A roadmap will be refined to help NSF track progress toward its major scientific objectives (e.g., discovery of the root causes of threats and attacks and continuous investment in transformational approaches that improve the security of cyberspace; development of a systematic scientific approach to cybersecurity, including discovery of laws and principles). This effort may entail workshops with the stakeholder community to define the major research questions and research goals for SaTC. Based on the results of the workshops and related activities (stated above), a third party contractor and NSF will develop the appropriate plan for assessing progress across NSF s SaTC activities. The initial contract for the evaluation feasibility study was put into place and a kick-off meeting was held during the fourth quarter of. Work is ongoing to establish an evaluation framework, which will be in place by the end of FY Additionally, in, NSF and the Organizational Assessment Group of the U.S. Office of Personnel Management (OPM) worked together to assess the extent to which the SFS program achieved its major goals. The OPM evaluation team conducted focus groups, administered surveys to the different stakeholders of the SFS program (e.g., students, graduates, PIs, faculty, agency supervisors, hiring officials and recruiters), and also conducted a workforce analysis to project the federal hiring demands NSF-Wide Investments - 31
6 Secure and Trustworthy Cyberspace for computer professionals. The evaluation is expected to be completed in October In FY 2013, NSF and OPM plan to look for ways to increase the marketing of the SFS program to agencies and expand the internship opportunities for students. A competency gap analysis of competencies needed once on the job is underway. NSF-Wide Investments - 32
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43%
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
US Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
COGNITIVE SCIENCE AND NEUROSCIENCE
COGNITIVE SCIENCE AND NEUROSCIENCE Overview Cognitive Science and Neuroscience is a multi-year effort that includes NSF s participation in the Administration s Brain Research through Advancing Innovative
NSF INNOVATION CORPS (I-Corps)
NSF INNOVATION CORPS (I-Corps) Overview The National Science Foundation (NSF) seeks to develop and nurture a national innovation ecosystem that builds upon fundamental research to guide the output of scientific
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
Overview of the National Science. Foundation (NSF)* HBCU-Up LDI. Costello L. Brown August 2-6, 2010. *http://www.nsf.gov/news/mmg/mmg_disp.cfm?
Overview of the National Science Foundation (NSF)* _ HBCU-Up LDI Costello L. Brown August 2-6, 2010 *http://www.nsf.gov/news/mmg/mmg_disp.cfm?med The National Science Foundation (NSF) The National Science
Division of Behavioral and Cognitive Sciences STRATEGIC PLAN
Division of Behavioral and Cognitive Sciences STRATEGIC PLAN NATIONAL SCIENCE FOUNDATION Directorate for Social, Behavioral, and Economic Sciences November 2011 National Science Foundation Directorate
Information Technology R&D and U.S. Innovation
Information Technology R&D and U.S. Innovation Peter Harsha Computing Research Association Ed Lazowska University of Washington Version 9: December 18, 2008 1 Peter Lee Carnegie Mellon University Advances
National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
NATIONAL SCIENCE FOUNDATION. Earnestine Easter Program Director Directorate for Education and Human Resources
NATIONAL SCIENCE FOUNDATION Earnestine Easter Program Director Directorate for Education and Human Resources EHR S ORGANIZATIONAL STRUCTURE Office of the Assistant Director Division of Graduate Education
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses
NITRD: National Big Data Strategic Plan Summary of Request for Information Responses Introduction: Demographics Summary of Responses Next generation Capabilities Data to Knowledge to Action Access to Big
Education and Workforce Development in the High End Computing Community
Education and Workforce Development in the High End Computing Community The position of NITRD s High End Computing Interagency Working Group (HEC-IWG) Overview High end computing (HEC) plays an important
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Workforce Development for Teachers and Scientists Funding Profile by Subprogram and Activity
Activities at the DOE Laboratories Funding Profile by Subprogram and Activity FY 2012 Current (dollars in thousands) FY 2013 Annualized CR* Request Science Undergraduate Laboratory Internships 6,500 7,300
NSF Programs that Support STEM Education
NSF Programs that Support STEM Education Karen Crosby & Gül Kremer Program Officers NSF Education and Human Resources Directorate (EHR) HBCU-UP/CREST PI Meeting February 19 th -20 th STEM Organization
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development Corby Hovis [email protected] Directorate for Education and Human Resources National Science Foundation
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
Preparing a 21 st Century Workforce
Preparing a 21 st Century Workforce Science, Technology, Engineering, and Mathematics (STEM) Education in the 2014 Budget We ll reward schools that develop new partnerships with colleges and employers,
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY
102 S Hall Rd Berkeley, CA 94720 510-664-7506 [email protected] REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY The University of California, Berkeley Center for Long-Term Cybersecurity (CLTC)
School of Nursing. Strategic Plan
School of Nursing Strategic Plan 2010 to 2015 Table of Contents Executive Summary...2 Preamble...4 Mission...6 Vision...6 Values...6 Research...8 Education...10 Community and Clinical Partnerships...12
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
June 9, 2014. Dear Colleagues:
June 9, 2014 Dear Colleagues: Today our Nation s security, economic progress, and modern lifestyle all rely upon maintaining a trustworthy digital infrastructure that is resilient and responsive to threats.
NORTHEASTERN 2025. Distinctively Excellent PhD Education. Context
Draft: April 10, 2016 NORTHEASTERN 2025 Distinctively Excellent PhD Education Context We are in a moment of Northeastern s history when our PhD programs have the opportunity to excel by building on the
Data Science at NSF Draft Report of StatSNSF committee: Revisions Since January MPSAC Meeting
Data Science at NSF Draft Report of StatSNSF committee: Revisions Since January MPSAC Meeting Iain Johnstone, Fred Roberts, Co-chairs Apr 2014 1 Subcommittee of MPS AC 1. Introduction Charged by MPS AD
Participants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
National Science Foundation Where Discoveries Begin
National Science Foundation Where Discoveries Begin QEM Network Day at NSF for MSIs September 15, 2009 Joanne Tornow, Ph.D. Senior Advisor Biological Sciences Directorate National Science Foundation [email protected]
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Strategic Initiatives College of Science, August, 2004
College of Science Strategic Initiatives College of Science, August, 2004 MISSION: To graduate students who understand and appreciate the art of scholarship, who have an excellent grasp of the fundamental
Executive Summary... 3 Preamble... 4 Mission... 5 Vision... 5 Values... 5 Research... 6 Education... 8 Community and Clinical Partnerships...
Table of Contents Executive Summary... 3 Preamble... 4 Mission... 5 Vision... 5 Values... 5 Research... 6 Education... 8 Community and Clinical Partnerships... 10 Stony Brook University School of Nursing
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
Office of Research Strategic Plan November 4, 2013
Office of Research Strategic Plan November 4, 2013 SOUTH DAKOTA STATE UNIVERSITY Vision: As a leading land-grant university, South Dakota State University will champion the public good through engaged
Career Management. Making It Work for Employees and Employers
Career Management Making It Work for Employees and Employers Stuck in neutral. That s how many employees around the world would describe their career. In fact, according to the 2014 Global Workforce Study,
National Big Data R&D Initiative
National Big Data R&D Initiative Suzi Iacono, PhD National Science Foundation Co-chair NITRD Big Data Senior Steering Group for CASC Spring Meeting April 23, 2014 Why is Big Data Important? Transformative
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
FY 2016 ANNUAL PERFORMANCE PLAN
FY 2016 ANNUAL PERFORMANCE PLAN NSF s FY 2016 Performance Plan reflects NSF s priorities as identified through its planning and budget process. The table below provides a summary of NSF s performance goals
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
