Challenges of Cyber Security Education at the Graduate Level

Size: px
Start display at page:

Download "Challenges of Cyber Security Education at the Graduate Level"

Transcription

1 Institute for Cyber Security Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, Ravi Sandhu 1

2 Cyber Security Status Cyber technologies and systems have evolved Cyber security goals have evolved Computer security Information security = Computer security + Communications security Information assurance Mission assurance Cyber security research and practice are loosing ground Ravi Sandhu 2

3 Graduate Cyber Security Education Tech- Light Tech- Medium Tech- Heavy 3

4 Cyber Security as a Discipline Computer Science and Engineering Cyber Security Ravi Sandhu 4

5 Cyber Security as a Discipline Computer Science and Engineering Cyber Security Ravi Sandhu 5

6 Fundamental Challenge I Too much material to teach Growing faster than teachers can keep up Computer science theory Computer system principles and practice Cyber security theory Cyber security system principles and practice Statistics, sociology, organizational theory, economics, psychology, game theory. Laws, regulations, compliance. Privacy. History, successes and failures.. The packaging challenge Ravi Sandhu 6

7 Fundamental Challenge II Immature field What is fundamental to cyber security? Where are the boundaries of a cyber system? What are the goals of cyber security? The discipline challenge Ravi Sandhu 7

8 Cyber Security Goal Enable system designers and operators to say: This system is secure Ravi Sandhu 8

9 Cyber Security Goal Enable system designers and operators to say: This system is secure Not attainable There is an infinite supply of attacks Ravi Sandhu 9

10 Cyber Security Goal Enable system designers and operators to say: This system is secure enough Many successful examples Ravi Sandhu 10

11 The ATM (Automatic Teller Machine) system is secure enough global in scope The ATM Paradox Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments Ravi Sandhu 11

12 Cyber Security Goal Enable system designers and operators to say: This system is secure enough In an innovative ecosystem the innovation drive will ensure that the bar for enough will be fairly low Ravi Sandhu 12

13 Productivity-Security Cyber Security is all about tradeoffs Productivity Security Let s build it Cash out the benefits Next generation can secure it Let s not build it Let s bake in super-security to make it unusable/unaffordable Let s sell unproven solutions There is a middle ground We don t know how to predictably find it Ravi Sandhu 13

14 Grand Challenges Develop a scientific discipline to predictably find the sweet spots for different application and mission contexts to predictably find, incentivize and deploy microsec that leads to desirable macrosec outcomes that can be meaningfully taught in Universities at all levels: BS, MS, PhD Prognosis we shall succeed (we have no choice) but we need to change to succeed Ravi Sandhu 14

15 ICS Projects Secure information sharing Social network security Secure data provenance Attribute based access control Botnet and malware analysis Smart grid security Hardware security Future internet Ravi Sandhu 15

Cyber Security Research: A Personal Perspective

Cyber Security Research: A Personal Perspective CS 6393 Lecture 1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 Prognosis

More information

The Future of Cyber Security

The Future of Cyber Security Institute for Cyber Security The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Ravi Sandhu 1 Cyber Security Status

More information

The Future of Access Control: Attributes, Automation and Adaptation

The Future of Access Control: Attributes, Automation and Adaptation Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 ravi.sandhu@utsa.edu

More information

The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?

The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Institute for Cyber Security The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, 2011 ravi.sandhu@utsa.edu

More information

The Science, Engineering, and Business of Cyber Security

The Science, Engineering, and Business of Cyber Security Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS

More information

The Science, Engineering, and Business of Cyber Security

The Science, Engineering, and Business of Cyber Security Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University

More information

Cyber Security: What You Need to Know

Cyber Security: What You Need to Know Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University of Texas at San Antonio October 2009 ravi.sandhu@utsa.edu www.profsandhu.com

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

Cyber Security: Past, Present and Future

Cyber Security: Past, Present and Future Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August 2009 ravi.sandhu@utsa.edu www.profsandhu.com

More information

CS 6393 Lecture 7. Privacy. Prof. Ravi Sandhu Executive Director and Endowed Chair. March 8, 2013. ravi.sandhu@utsa.edu www.profsandhu.

CS 6393 Lecture 7. Privacy. Prof. Ravi Sandhu Executive Director and Endowed Chair. March 8, 2013. ravi.sandhu@utsa.edu www.profsandhu. CS 6393 Lecture 7 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 Privacy versus Security Privacy Security I think this

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

Federated Identity and Single-Sign On

Federated Identity and Single-Sign On CS 6393 Lecture 5 Federated Identity and Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 15, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 The Web Today User

More information

Purpose-Centric Secure Information Sharing

Purpose-Centric Secure Information Sharing Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu

More information

Foundations Applications Technologies

Foundations Applications Technologies Institute for Cyber Security ICS Research Projects Ravi Sandhu Institute for Cyber Security University of Te exas at San Antonio August 30, 2012 IIIT Delhi 1 ICS Philosophy Foundations Applications Technologies

More information

Security Models: Past, Present and Future

Security Models: Past, Present and Future Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com

More information

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS AN INFORMATION SECURITY BATTLEFIELD From Static to Dynamic Defense Cyber Security Strategies, LLC 1 2008-2010 Is The Cyber Tipping Point ESTONIA GEORGIA CABLE

More information

Introduction to E-Commerce

Introduction to E-Commerce Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or

More information

EXECUTIVE CERTIFICATE IN SALES LEADERSHIP NYIM executive certificate series

EXECUTIVE CERTIFICATE IN SALES LEADERSHIP NYIM executive certificate series EXECUTIVE CERTIFICATE IN SALES LEADERSHIP NYIM executive certificate series EXECUTIVE EDUCATION SUPERCHARGE YOUR SALES POTENTIAL. Transform Yourself. The landscape of sales has changed dramatically over

More information

John Sibley Butler Director, IC 2 Institute The University of Texas. Entrepreneurship and Wealth Creation for A Developing World

John Sibley Butler Director, IC 2 Institute The University of Texas. Entrepreneurship and Wealth Creation for A Developing World John Sibley Butler Director, IC 2 Institute The University of Texas Entrepreneurship and Wealth Creation for A Developing World IC 2 INSTITUTE The University of Texas at Austin A think and do tank www.ic2.org

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012 1. Global E Business and Collaboration Lecture 2 TIM 50 Autumn 2012 Objective of the Learning The Major Feature of Business Systems Performance of Business Organization Levels of Business management The

More information

Big Data Executive Survey

Big Data Executive Survey Big Data Executive Full Questionnaire Big Date Executive Full Questionnaire Appendix B Questionnaire Welcome The survey has been designed to provide a benchmark for enterprises seeking to understand the

More information

The Customer Value Proposition

The Customer Value Proposition The Customer Value Proposition Differentiation through the Eyes of Your Customer Pamela Hudadoff Dedicated to making expert marketing techniques more accessible Applied Product Marketing LLC Web: http://www.appliedproductmarketing.com

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Aims and Objectives Basics

Aims and Objectives Basics Name: Class: Date Taken: Total Possible Marks: 8 Aims and Objectives Basics Complete the following questions in the time allowed by your teacher QUICK DEFINITIONS Write a short, accurate definition for

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Security and the Cloud: Cloud Trust Brokers Ravi Ganesan* Founder, SafeMashups +1.415.680.5746 ravi@safemashups.com ravi@findravi.com www.safemashups.com www.findravi.com *This work was performed when

More information

What is the Right Security Solution for Mobile Computing? #RSAC

What is the Right Security Solution for Mobile Computing? #RSAC SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for

More information

8 QUESTIONS YOU SHOULD ASK WHEN BUYING A CASH MANAGEMENT SOLUTION

8 QUESTIONS YOU SHOULD ASK WHEN BUYING A CASH MANAGEMENT SOLUTION 8 QUESTIONS YOU SHOULD ASK WHEN BUYING A CASH MANAGEMENT SOLUTION See if your retail banking network is costing more than it should An NCR white paper Contents Keep cash flowing, customers happy and costs

More information

Your Responsibilities

Your Responsibilities Your Responsibilities On The Web Session Goals Your Responsibilities on the Web or Conversations on the Online World Online Trends E-Philanthropy Strategy Great Web Sites Strong Email Marketing Best in

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

SOUTH DAKOTA BOARD OF REGENTS. Full Board ******************************************************************************

SOUTH DAKOTA BOARD OF REGENTS. Full Board ****************************************************************************** SOUTH DAKOTA BOARD OF REGENTS Full Board AGENDA ITEM: 17 a DATE: March 28-29, 2012 ****************************************************************************** SUBJECT: New Program: DSU Minor in Health

More information

Scenarios for Future Digital Ecosystem and their Implications for Creating Economic Value: Telecommunications and E-learning in the Asia-Pacific

Scenarios for Future Digital Ecosystem and their Implications for Creating Economic Value: Telecommunications and E-learning in the Asia-Pacific Scenarios for Future Digital Ecosystem and their Implications for Creating Economic Value: Telecommunications and E-learning in the Asia-Pacific CHARLA GRIFFY-BROWN Director & Associate Professor, Center

More information

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust

More information

Executive Sponsor for Quality through Engagement (QTE) Executive Sponsor for Asian Affinity Group Executive Sponsor for Hershey Track and Field Games

Executive Sponsor for Quality through Engagement (QTE) Executive Sponsor for Asian Affinity Group Executive Sponsor for Hershey Track and Field Games Alan R. Warehime Professor Penn State University BACKGROUND INFORMATION Personal Residence: 425 Hillcrest Avenue State College, PA 16803 Telephone: (O) 814-863-2847 (M) 717.270.4066 E-mail: dazzara@psu.edu

More information

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

More information

XEBHRA: A Virtualized Platform for Cross Domain Information Sharing

XEBHRA: A Virtualized Platform for Cross Domain Information Sharing 2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP XEBHRA: A Virtualized Platform for Cross Domain Information Sharing Adventium Labs Charles N. Payne, Jr. July 23, 2013 Company Profile of your company

More information

Strategic Plan 2012 2020

Strategic Plan 2012 2020 Department of Economics College of Arts and Sciences Texas Tech University Strategic Plan 2012 2020 Mission The Department of Economics is dedicated to excellence in teaching, research, and service. The

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Angelo State University Department of Psychology, Sociology, and Social Work SWK 2307: Introduction to Social Work

Angelo State University Department of Psychology, Sociology, and Social Work SWK 2307: Introduction to Social Work Page 1 of 8 Angelo State University Department of Psychology, Sociology, and Social Work SWK 2307: Introduction to Social Work Course Dates, Time, and Location Summer Session I, 2016: June 6, 2016 to July

More information

Title Business Intelligence: A Discussion on Platforms, Technologies, and solutions

Title Business Intelligence: A Discussion on Platforms, Technologies, and solutions Title Business Intelligence: A Discussion on Platforms, Technologies, and solutions Overview The main thrust of the tutorial is to compare and contrast Business Intelligence (BI) Platforms to develop business

More information

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu Cyber Security Education: My Personal Thoughts Bharat Doshi bharat.doshi@jhuapl.edu Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

Development of a Bachelor of Science Degree in Engineering Management with a Concentration in Construction Management at Christian Brothers University

Development of a Bachelor of Science Degree in Engineering Management with a Concentration in Construction Management at Christian Brothers University Development of a Bachelor of Science Degree in Engineering Management with a Concentration in Construction Management at Christian Brothers University Eugene McGinnis 1, Neal F. Jackson 2 and Siripong

More information

Building Security In:

Building Security In: #CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me

More information

FlawlessConsulting. for Project Managers. A Designed Learning Workshop

FlawlessConsulting. for Project Managers. A Designed Learning Workshop FlawlessConsulting TM for Project Managers A Designed Learning Workshop Flawless Consulting TM for Project Managers The essence The game has changed. Staff functions have to compete Where they once had

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

ebook The Essential Guide to Content Personalization: the Science That Drives It and How to Start Using It Written by Asaf Rothem @asaf_rothem

ebook The Essential Guide to Content Personalization: the Science That Drives It and How to Start Using It Written by Asaf Rothem @asaf_rothem ebook The Essential Guide to Content Personalization: the Science That Drives It and How to Start Using It Written by Asaf Rothem @asaf_rothem Page 2 Table of Contents Executive Summary 3 The Challenge:

More information

Energy Symposium Meeting Notes

Energy Symposium Meeting Notes Energy Symposium Meeting Notes Purpose of the Energy Symposium Break-out Discussions Observations and Insights Overall Conclusion Next Steps Appendix Mike Ahern s Presentation Slides October 22,2012 508-831-6563

More information

Technology. Building Your Cloud Strategy with Accenture

Technology. Building Your Cloud Strategy with Accenture Technology Building Your Cloud Strategy with Accenture 2 Cloud computing, in its simplest form, allows companies to procure technology as services, including infrastructure, applications, platforms and

More information

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information

More information

INCOSE System Security Engineering Working Group Charter

INCOSE System Security Engineering Working Group Charter 1 PURPOSE Recent data breach cases and industrial control system incidents call attention to the inadequacy of current approaches to systems security [1, 2]. Each case presents more compelling evidence

More information

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds The Hardware Layer

More information

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:

More information

Online Banking : Benefits and Related Issues. (By : Anju Dagar, Assistant professor, Ad- hoc, Delhi University)

Online Banking : Benefits and Related Issues. (By : Anju Dagar, Assistant professor, Ad- hoc, Delhi University) Online Banking : Benefits and Related Issues (By : Anju Dagar, Assistant professor, Ad- hoc, Delhi University) Abstract The World Wide Web has permeated virtually every aspect of modern life. If you have

More information

Technology. Building Your Cloud Strategy with Accenture

Technology. Building Your Cloud Strategy with Accenture Technology Building Your Cloud Strategy with Accenture 2 Cloud computing, in its simplest form, allows companies to procure technology as services, including infrastructure, applications, platforms and

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

(BACHELOR) BS In Political Science And Public Admin

(BACHELOR) BS In Political Science And Public Admin (BACHELOR) BS In Accounting (BACHELOR) BS In Business Administration (BACHELOR) BS In Business Communication (BACHELOR) BS In Child Development (BACHELOR) BS In Computer Information Systems (BACHELOR)

More information

INDUSTRIAL-ORGANIZATIONAL (I-0) PSYCHOLOGY

INDUSTRIAL-ORGANIZATIONAL (I-0) PSYCHOLOGY INDUSTRIAL-ORGANIZATIONAL (I-0) PSYCHOLOGY Nurcan Ensari, Ph.D. Associate Professor Management I-O Psychology - An Overview What is I-O Psychology? What do I-O Psychologists Do? What are typical I-O Psychology

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Challenges in Delivering Large-scale Services over Cloud Environments

Challenges in Delivering Large-scale Services over Cloud Environments Computation World 2014 Panel CLOUD/SERVICES Challenges in Delivering Large-scale Services over Cloud Environments Moderator Christoph Reich, Furtwangen University of Applied Science, Germany Panelists

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

National Institute of Standards and Technology Smart Grid Cybersecurity

National Institute of Standards and Technology Smart Grid Cybersecurity National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards

More information

Cyber Incident Response

Cyber Incident Response Secure Information Sharing for Cyber Response Teams Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE) Ravi Sandhu, Professor

More information

Eindhoven December 4, 2014

Eindhoven December 4, 2014 Eindhoven December 4, 2014 Waves: Visualizing spatio-temporal Soccer Data Insight Reports of sport events can be enhanced by real-time feature analysis. Solutions Complex spatio-temporal sports-analytics

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Data Science at U of U

Data Science at U of U Data Science at U of U Je M. Phillips Assistant Professor, School of Computing Center for Extreme Data Management, Analysis, and Visualization Director, Data Management and Analysis Track University of

More information

How To Research Security And Privacy Using Data Science

How To Research Security And Privacy Using Data Science Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline

More information

Cloud Computing: Issues Related with Cloud Service Providers

Cloud Computing: Issues Related with Cloud Service Providers Cloud Computing: Issues Related with Cloud Service Providers Nikhil Ranjan Assistant Professor Tula s Institute, Dehradun (An Engineering & Management College) Abstract- The Cloud Computing and the storage

More information

What Directors need to know about Cybersecurity?

What Directors need to know about Cybersecurity? What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

I n t r o d u c t i o n

I n t r o d u c t i o n and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies

More information

Ouray School R-1. Information Technology Internal Audit Report. January 2016

Ouray School R-1. Information Technology Internal Audit Report. January 2016 Information Technology Internal Audit Report January 2016 Ouray School R-1 Executive Summary In support of the FY2015/16 Internal Audit Plan, a review of the information technology (IT) process was conducted

More information

Management: English: Fine Arts:

Management: English: Fine Arts: Ateneo de Manila University The Ateneo de Manila University was established in 1859.As a Jesuit University, it seeks the goals of Jesuit liberal education through the harmonious development of moral and

More information

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri (rkarri@poly.edu) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber

More information

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Information Schools: Traditions Growing, Morphing and Expanding. David Fenske

Information Schools: Traditions Growing, Morphing and Expanding. David Fenske Information Schools: Traditions Growing, Morphing and Expanding David Fenske Standards and Traditions ALA standards Library and Information Science But these staples are already changing internally and

More information

OUR MISSION: OUR INITIATIVES:

OUR MISSION: OUR INITIATIVES: OUR MISSION: Orange Duffel Bag Initiative, a 501c3, provides at-risk teens and young adults programs proven to improve their education success, ongoing advocacy, support to their guardians and caring adults,

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

Security in Changing IT Ecosystem: Virtualization and Cloud Computing

Security in Changing IT Ecosystem: Virtualization and Cloud Computing Security in Changing IT Ecosystem: Virtualization and Cloud Computing Dr. Dhiren Patel Indian Institute of Technology Gandhinagar, India dhiren@iitgn.ac.in Cloud Computing World is further shrinking!!!

More information

Successful Transformation of ICT Graduate Program: A Role Model for Developing Countries

Successful Transformation of ICT Graduate Program: A Role Model for Developing Countries Successful Transformation of ICT Graduate Program: A Role Model for Developing Countries Prof Dr BS Chowdhry Former Director IICT & Dean Faculty of Electrical Electronics and Computer Engineering Mehran

More information

EL Program: Smart Manufacturing Systems Design and Analysis

EL Program: Smart Manufacturing Systems Design and Analysis EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Objectives: To develop the coaching and leadership skills necessary to drive sales performance in the branch

Objectives: To develop the coaching and leadership skills necessary to drive sales performance in the branch Successful Sales Leadership I for Branch Managers This three-day course teaches the branch managers how to focus on the activities that drive sales performance. Lead your team to meet the desired strategic

More information

Department of Management, Marketing, and Hospitality

Department of Management, Marketing, and Hospitality Department of Management, Marketing, and Hospitality Department Chair: Alan Hamlin Business 316 ~ (435) 586-5417 Administrative Assistant: Candice Houston Business 303 ~ (435) 586-5462 Advisor: Paula Alger

More information

3 Traceable Network Technology

3 Traceable Network Technology 3 Traceable Network Technology 3-1 Research and Development of Traceable Network Technology Open networks mandate improved security of connected devices and their users, as well as improved security in

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems The field of computing enables much of the on-going revolution in information technology and communications. Its techniques, tools and problem-solving approaches have proven most powerful and effective.

More information