Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
|
|
- Gavin Turner
- 8 years ago
- Views:
Transcription
1 Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions, participants, coordination Dept of Homeland Security overview National Science Foundation overview Carl Landwehr Cyber Trust Coordinator National Science Foundation June 26, 2005 What is Critical Information Infrastructure? Critical: damage/outage would have severe impact Personal injury Economic loss Critical to whom? Information infrastructure: Computer and communication networks per se Control of national infrastructures for electric power, oil and gas, water, etc. Other networks, e.g. medical records, banking, voting Who conducts research related to CIIP in the U.S.? Universities Computer Sci. depts,, Elect. and Comp. Eng. depts,, etc. Non-profit research organizations Federally funded: MITRE, Aerospace, RAND, SEI, etc. Other: SRI, Applied Research Lab, JHU/APL, Industry Vendors: Telecomm, software, control (AT&T, Honeywell, Rockwell-Collins, Microsoft, HP, ) Integrators: Raytheon, Lockheed Martin, etc. Government Military/govt. labs: NRL, AFRL, NIST, NSA National Labs (DoE( DoE,, primarily): Sandia,, PNNL, LANL, LLNL, ANL, Who sponsors this research? Industry To suit their corporate needs Amounts and topics often not public Government In-house research Sponsored research NSF: National Science Foundation DHS: Dept of Homeland Security DOE: Dept of Energy DARPA: Defense Advanced Research Projects Agency ARDA: Advanced Research and Development Agency Dept of Justice, Treasury, Who coordinates the government-funded research? National Science and Technology Council (NSTC) Environment and Natural Resources Cabinet level office Science NSTC Dir. OSTP (Dr. Marburger) Technology Net & IT R&D Nanoscale S&T Aerospace Homeland Security Infrastructure Subcommittee CIIP Interagency Working Group PITAC Physical Structures and Systems Interagency Working Group
2 How are these research funds budgeted/reported? Networking and Information Technology Research and Development (NITRD) Program Co-Chairs: Chairs: Dr. Peter Freeman, NSF AD for CISE and Dr. Simon Szykman,, NCO Director FY06 requested budget (multi-agency) $2.2B Recent events: Feb., 2005, President s s Information Technology Advisory Committee PITAC issues report on Cybersecurity, emphasizing need for additional research funds and other recommendations May 2005: NSTC Dir. Dr. Marburger,, Testimony to House Science Committee NSTC Dir. Marburger Testimony May to House Science Committee Two important priorities for NITRD are information security and assurance and the management of enormous data flows. assuring the security, safety, and highly dependable performance of systems, networks, and software in critical applications and infrastructures is one of the most significant and difficult challenges in information technology R&D. CIIP [has] begun the process of defining our top cyber security R&D needs and mapping those against current activities. This is crucial if we are to better address the critically important issue of defining priorities. NSF to establish in FY 2005 a new Science and Technology Center devoted to cyber security R&D. Led by the University of California, Berkeley, the multi-institutional institutional collaborative effort will investigate key issues of computer trustworthiness in an era of increasing attacks at all levels on computer systems and information-based technologies. CIIP Interagency Working Group Includes over 20 organizations from over a dozen departments/agencies. Meets monthly, developing National Cyber Security R&D Plan, which includes: Discussion of threats and vulnerabilities Identification of broad cyber security research areas and topics within these categories Definition of area, description of current state-of of- the-art, and technical challenges Identification of interagency priorities Analysis of current R&D investments Recommendations regarding future investments and R&D investment policy guidance for decision-makers Note: initial (FY05) National CIP R&D Plan released jointly by DHS and OSTP in April (from Infrastructure subcommittee) Who coordinates the government-funded research? Infosec Research Council Charter Informally chartered, government sponsored, voluntary Goal Facilitate collaboration of the participating organizations Promote intelligent information security research investments. Provide a bimonthly forum to: Discuss critical information security issues, Convey member s research needs Describe current research initiatives and proposed courses of action for future research investments. Active topic Hard Problem List update Department of Homeland Security Overview DHS Cyber Security R&D Portfolio: Budget FY 2005 cyber security R&D budget: $18M Overall DHS S&T budget for 2005: $1.1B FY 2006 budget: $16.7M (President s s budget request) DHS S&T portfolio budgets developed through a formal strategic planning process DHS: Important R&D Areas Securing the Infrastructure Secure domain name system Secure routing protocols Cyber Security Functional Requirements Attack protection and prevention Secure process control systems (retrofit and future infrastructure) Attack detection, response, and recovery Situational awareness, indications & warning Secure software engineering & development Software assurance, code testing & analysis Lightweight, low-latency authentication Forensics, traceback, attribution Hardware/firmware security Domain-Specific Security Needs Wireless Internet protocol priority service Distributed & embedded Secure operating systems Other Needs Privacy computing platforms Foundations Red teaming for Cyber Security Enabling Metrics and testing Technologies for R&D Economic assessment Testbeds Long term goal of risk-based Modeling and simulation decision making Network mapping Security technology and policy management
3 DHS: Initial Research Priorities Securing infrastructural protocols: Securing the Domain Name System and Internet routing protocols. Cyber security testbeds: Large scale testbed network and software testing framework (DETER) Large-scale data sets for security testing (PREDICT): Supports development of cyber security metrics. Economic assessment activities: Along with metrics, will provide a foundation for risk- based cyber security decision making. Next-generation cyber security technologies. Execution of top priorities from IAIP Directorate. NSF Overview NSF Organization Directorate for Biological Sciences Directorate for Computer and Information Science and Engineering Directorate for Education & Human Resources Directorate for Engineering Office of Integrative Activities National Science Board Office of the Director Directorate for Mathematical & Physical Sciences Directorate for Social, Behavioral, & Economic Sciences Directorate for Geosciences Office of Polar Programs What NSF/CISE has been doing For many years: Investments in high ranking proposals addressing trust and security in computing FY 02: Trusted Computing program initiated FY 03: Increasing focus in specific research programs Trusted Computing Security-related related Network Research Data and Application Security Embedded and Hybrid Control Systems Security FY 04: Integrated CISE-wide emphasis on Cyber Trust Two Center-Scale Activities awarded: CIED and STIM Summary of FY04 awards available at: FY 05: Continuing Cyber Trust emphasis; awards due 8/2005 NSF/EHR activities Scholarship for Service (SFS) program Targeting education and capacity building Tuition reimbursement and job placement Curriculum development More than 70 active awards, $58M total; new awards for FY05 expected soon Advanced Technical Education program Targets 2-year 2 colleges; about 10 active awards, about $5M total NSF Science and Technology Center - TRUST Team for Research in Ubiquitous Secure Technology Recent 5-year, 5 roughly $18M award to U California Berkeley leading several other major research institutions: Cornell, Stanford, CMU, Vanderbilt And outreach partners: San Jose State, Smith College, Fisk University, Spelman College, California Community Colleges, Oakland City High Schools, Pittsburgh area schools. Industrial Partners: IBM, HP, Intel, Microsoft, Symantec, Cisco, ESCHER (Boeing, Lockheed Martin, Ford, GM, Raytheon), Qualcomm, Bellsouth, Tennessee Valley Authority Goal: develop new science and technology that will radically transform the ability of organizations (software vendors, operators, local and federal agencies) to design, build, and operate trustworthy information systems for our critical infrastructure. Cyber Trust Vision Society in which People can justifiably rely on computer-based systems to perform critical functions securely People can justifiably rely on systems to process and communicate sensitive information securely People can rely on a well-trained and diverse workforce to develop, configure, and operate essential computer-based systems Without fear of sudden disruption by cyber attacks
4 Critical Infrastructure, Cyber Security, and Cyber Trust Homeland Security NSF NSF Cyber Cyber Trust Trust Critical Infrastructure (CI) Systems with Cyber Security concerns Cyber aspects Important Non-CI of of CI CI Systems Cyber Systems Location of Cyber Trust research institutions (about 180 existing awards) US 5 Digit Zipcode Centers by COUNT attack - relative by solicitation area $M Forensics Recover from attacks Survive attacks Detect/understand att. Prevent attacks Build it right Know what to build FY04 Cyber Trust and related award Funding by Solicitation Area Multi / Inter disciplinary Applications Networks Foundations Systems CT-Fnd CT-Sys CT-Net CT-App CT-MI by discipline Cyber Trust Program FY05 Summary $M OS/FS/ Storage Sec Network security App, DB, Web sec Crypto theory and app Trust, Priv, Sec M&S Sec sys architecture Sec. sys development Discipline Sec test. & eval. Forensics FY05 submissions to Cyber Trust: # proposals # projects #awards Individual / small group ? Team ? Center-scale 16 11? Total funding available about $35M Less than 10% will make it through to award stage Results public by August 2005
5 How to apply for support for CISE US Japan collaboration support Thank you. 1. Have an existing NSF grant 2. Locate a Japanese collaborator 3. File a supplemental request under your existing grant 4. Wait for FY06 Carl Landwehr National Science Foundation Program Director, Cyber Trust CISE/CNS CLandweh@nsf.gov
NSF Cyber Trust Report
NSF Cyber Trust Report For US-Japan CIIP Experts Workshop, Sept 28-29 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation Homeland Security Critical Infrastructure
More informationNSF Activities in Cyber Trust
NSF Activities in Cyber Trust For ACM CCS Industry/Govt Track Oct. 26, 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation What s s the Problem? Today s s software-based
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationCyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationGovernment Perspectives on the Future of Advanced Networking Technologies
Government Perspectives on the Future of Advanced Networking Technologies Combined briefings presented at: GLOBALCOMM GLOBALCOMM Government Summit and Innovations Summit June 5, 2006 June 7, 2006 Simon
More informationIndustry involvement in education and research - TCIPG
1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015 Outline History and facts TCIPG Overview and Vision
More informationUNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationCyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
More informationIn December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity
Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,
More informationScience or Security. George O. Strawn NSF & NITRD (retired)
Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationBenefits of Collaborative Science and Innovation - Improve Cyber Security
Public-Private Cooperation in Cybersecurity Research Strategy Development across the Globe A View from the U.S. Department of Homeland Security (DHS) Background Envision a future... in which universities
More informationTRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider
More informationTRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More informationDHS S&T Cyber Security R&D Program
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security R&D Program PSU NSRC Industry Day State College, PA October 17, 2006 Douglas Maughan, Ph.D. Program Manager, HSARPA douglas.maughan@dhs.gov
More informationAbout the National Science and Technology Council
About the National Science and Technology Council The National Science and Technology Council (NSTC) was established by Executive Order on November 23, 1993. This Cabinet-level Council is the principal
More informationRISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0%
RISK AND RESILIENCE $58,000,000 +$38,000,000 / 190.0% Overview The economic competiveness and societal well-being of the United States depend on the affordability, availability, quality, and reliability
More informationToward a Federal Cybersecurity Research Agenda: Three Game-changing Themes
Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes Dr. Jeannette Wing Assistant Director for Computer
More informationDOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
More informationRefining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector
Refining Security: A Case Study of Public/Private Collaboration to Further PCS Security in the Energy Sector Martha Austin, Executive Director The Institute for Information Infrastructure Protection (I3P)
More informationControl Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department
Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, email=office@jpcert.or.jp, o=japan Computer
More informationWhite House Response to the National Academy s Report on Strengthening Forensic Science in the United States
White House Response to the National Academy s Report on Strengthening Forensic Science in the United States Mr. Rick Weiss Assistant Director, Strategic Communications and Senior Policy Analyst Office
More informationI3P SCADA Security Research Plan
I3P SCADA Security Research Plan Unifying Stakeholders and Security Programs to Address SCADA Vulnerability and Infrastructure Interdependency Ron Trellue, Team Lead Sandia National Laboratories 1 What
More informationDHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview TCIPG Industry Workshop UIUC November 8, 2011 Greg Wigton Program Manager Cyber Security Division
More informationMS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
More informationTestimony of. Before the. May 25, 2011
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
More informationCYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
More informationTime: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists
Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationPREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationCYBERINFRASTRUCTURE FRAMEWORK $143,060,000 FOR 21 ST CENTURY SCIENCE, ENGINEERING, +$14,100,000 / 10.9% AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK $143,060,000 FOR 21 ST CENTURY SCIENCE, ENGINEERING, +$14,100,000 / 10.9% AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,
More informationMary Ellen Seale National Protection and Programs Directorate May 16, 2012
Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationThe Cyber Security Crisis
The Cyber Security Crisis Eugene H. Spafford Professor & Executive Director CERIAS http://www.cerias.purdue.edu/ The State of Cybersecurity Overwhelming vulnerabilities About 4000 in each of 2003, 2004
More informationSymposium on the Interagency Strategic Plan for Big Data: Focus on R&D
Symposium on the Interagency Strategic Plan for Big Data: Focus on R&D NAS Board on Research Data and Information October 23, 2014 Big Data Senior Steering Group (BDSSG) Allen Dearry, NIH, Co-Chair Suzi
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
More informationNational Communications System. December 6, 2007
1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate
More informationCS/ITP Concurrent Degree (CSEN-BS/ITP-MS)
CS/ITP Concurrent Degree (CSEN-BS/ITP-MS) The Bachelor of Science degree is from the Department of Computer Science (CS) and the Master of Science degree is from the Interdisciplinary Telecom Program (ITP).
More informationNASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
More informationDHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
More informationThe Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy June
More informationCYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43%
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationCybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationCyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu
Cyber Security Education: My Personal Thoughts Bharat Doshi bharat.doshi@jhuapl.edu Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training
More informationTestimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
More informationNational Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
More informationNIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
More informationDepartment of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
More informationTESTIMONY OF DR. GREGORY D. HAGER JOHNS HOPKINS UNIVERSITY
TESTIMONY OF DR. GREGORY D. HAGER JOHNS HOPKINS UNIVERSITY BEFORE THE HOUSE COMMITTEE ON SCIENCE, SPACE AND TECHNOLOGY SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HEARING ON A REVIEW OF THE NETWORKING AND
More informationFrost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
More informationDHSR&D and Its Importance to the Military
Order Code RS21270 Updated February 24, 2005 CRS Report for Congress Received through the CRS Web Homeland Security Research and Development Funding, Organization, and Oversight Summary Genevieve J. Knezo
More informationFacilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
More informationCyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. michael.mcgrath@anser.org NDIA White
More informationDiscover Viterbi: Cyber Security Engineering & Informatics Programs
Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts
More informationNew Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
More informationNext Generation Internet (NGI) Initiative. George Strawn (NSF) Co-chair Large Scale Networking WG CIC R&D Subcommittee
Next Generation Internet (NGI) Initiative George Strawn (NSF) Co-chair Large Scale Networking WG CIC R&D Subcommittee Vision for NGI Allow researchers to live in the future, developing and experiencing
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG Center Overview TCIPG Summary Extend and integrate previously
More informationHow To Protect Your Data From Being Hacked
Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER michael.mcgrath@anser.org
More informationcyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman
More informationResearch and Development Trends in Critical Infrastructure Protection in the U.S.
1 Research and Development Trends in Critical Infrastructure Protection in the U.S. AKIHIRO FUJII Information and Communications Research Unit 1 Introduction Evaluating the risks that face the infrastructures
More informationCyber Legislation & Policy Developments 2014
Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal
More informationUniversity of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationTestimony of. Cita M. Furlani Director
Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce Joint Hearing Before the United States House
More informationOne Hundred Thirteenth Congress of the United States of America
S. 1353 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Friday, the third day of January, two thousand and fourteen An
More informationSecurity Research at the Center for Advanced Technology in Telecommunications
Security Research at the Center for Advanced Technology in Telecommunications Highlights NSA Center of Excellence in IA Education, 2002- NSF/NSA Cyber Corps Program (ASPIRE), 2002- NY State funded Cybercrime
More informationCyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
More informationBig Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
More informationCYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
More informationThe Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
More informationTestimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
More informationARC INDUSTRY FORUM 2015
ARC INDUSTRY FORUM PRESENTATION TOPIC: MANAGING INDUSTRIAL CYBER SECURITY RISK Tyler Williams Manager, Industrial Cyber Security Shell Global Solutions tyler.williams@shell.com 1 THE TRADITIONAL APPROACH
More informationToward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
More informationA New Standards Project on Avoiding Programming Language Vulnerabilities
A New Standards Project on Avoiding Programming Language Vulnerabilities Jim Moore Liaison Representative from IEEE Computer Society to ISO/IEC JTC 1/SC 7 Liaison Representative between ISO/IEC JTC 1/SC
More informationMoraine Valley Community College. Strategic Technology Priorities and Goals
Moraine Valley Community College Strategic Technology Priorities and Goals FY 2016-2019 Letter from the President Moraine Valley Community College s mission of providing a learning-centered environment
More informationNIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH
NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH SANS ICS Security Summit March 18, 2014 Jason D. Christopher Nadya Bartol Ed Goff Agenda Background Use of Existing Tools: C2M2 Case
More informationHow To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
More informationAgenda Item 2. USM Cyber Security Landscape and Contributions to the State
Agenda Item 2 USM Cyber Security Landscape and Contributions to the State BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION TOPIC: USM Cyber Security Landscape and Contributions to
More informationA Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationResearch and Educational Networking Information Analysis and Sharing Center (REN-ISAC)
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Doug Pearson Director, REN-ISAC ren-isac@iu.edu Copyright Trustees of Indiana University 2003. Permission is granted
More informationNational Science Foundation Models for Funding Undergraduate Research
National Science Foundation Models for Funding Undergraduate Research First Australian Summit on the Integration of Research, Teaching, and Learning November 2009 NSF Strategic Goals Discovery Advance
More informationCybersecurity Guidance for Industrial Automation in Oil and Gas Applications
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls
More informationTeaching Information Security to Engineering Managers
Teaching Information Security to Engineering Managers Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 Why Bother? Lots of CS and EE programs
More informationNational Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment
0 National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints Continuous - Continuous Monitoring - Continuous Assessment - Continuous Education 1 Amtrak Information Security Challenges
More informationCloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance
Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing?
More informationCybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
More informationGrand Challenges, Federal Priorities and Funding an NSF/CISE view
Grand Challenges, Federal Priorities and Funding an NSF/CISE view Jim Kurose Assistant Director, NSF Computer & Information Science & Engineering Distinguished Professor College of Information and Computer
More information