Norway and the Nordic s



Similar documents
PROGRAMME DESCRIPTION FOR THE PhD PROGRAMME IN INDUSTRIAL ECONOMICS AND TECHNOLOGY MANAGEMENT 2015/2016

Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/

Cyber security in education in Greece

Dr. Dave Dampier Professor of Computer Science and Engineering

EXECUTIVE MBA INTERNATIONAL PROGRAM PART TIME IN COOPERATION WITH ESCP-EAP EUROPEAN SCHOOL OF MANAGEMENT

Does the program qualify for supplemental Palmetto Fellows and LIFE Scholarship awards? Yes No

SCHOOL OF GRADUATE STUDIES DEPARTMENT OF MICROBIOLOGY, IMMUNOLOGY, AND PARASITOLOGY. POLICY GOVERNING MIP GRADUATE STUDENTS AND RECRUITS February 2014

Concordia University Course Evaluation Survey: Summary Report

Deadline for application submission for the fellowship is April 1, All application materials must be enclosed in one sealed envelope.

1. Could you describe your department in terms of the undergraduate and graduate programs offered?

Undergraduate Catalog

School of Information & Communications Technology (ICT) Experience Seneca

SOCIETY, DEVELOPMENT AND PLANNING

How To Get A Degree In Armenian Higher Education

DOCTOR OF PHARMACY and MASTERS OF BUSINESS ADMINISTRATION

DOCTOR OF PHARMACY and MASTERS OF BUSINESS ADMINISTRATION

ACCOUNTING Ph.D. PROGRAM REQUIREMENTS KRANNERT GRADUATE SCHOOL OF MANAGEMENT (revised July 2014)

California International Business University

Degree Level Expectations, Learning Outcomes, Indicators of Achievement and the Program Requirements that Support the Learning Outcomes

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

7 BACHELOR OF SCIENCE DEGREE STUDIES

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

MADELEINE (LYNN) FOORD, PH.D., M.ED., PT * lfoord@mghihp.edu

Department of Information Systems and Cyber Security

Information Security Management

USF Graduate Catalog SECTION 23.

THE ROYAL INSTITUTE OF ART'S PROGRAMME SYLLABUS FOR THE PROGRAMME IN. FINE ARTS (300 ECTS credits)

EAPAA Accreditation Committee Evaluation Report

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

Literacy Studies - Master's Degree Programme

DEPARTMENT OF PSYCHOLOGY UNIVERSITY OF COPENHAGEN. Strategy Department of Psychology University of Copenhagen

Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University

FINANCIAL ENERGY ANALYSIS

NISlab - Norwegian Information Security laboratory

Undergraduate Degree Map for Completion in Four Years

TELEMARK UNIVERSITY COLLEGE (TUC)

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

Master Business Intelligence and Process Management

Lisa M. Lindgren, Ph.D. Curriculum Vitae St. John s University

Programme Specification and Curriculum Map for MSc Computer and Network Security

CALIFORNIA STATE UNIVERSITY, BAKERSFIELD ACADEMIC SENATE NEW MINOR: HEALTH CARE MANAGEMENT RES AAC/BPC

USF Graduate Catalog SECTION 18.

dual degrees & 1+1s with Partner Institutions #gobeyond

Undergraduate Degree Map for Completion in Four Years

How To Become A Successful Business Leader

MBA/MHA STUDENT HANDBOOK

Common Standard of Quality for PhD education at NTNU A. Recruitment Role/Responsibility Task Activity Measures

Student Manual. Ph.D. in International Business Administration. A. R. Sanchez, Jr. School of Business

Master s Thesis Regulations Public Health Science. Indhold

CATHOLIC EDUCATIONAL ASSOCIATION OF THE PHILIPPINES

Offshore technology- Industrial Asset Management - Master's Degree Programme

Irmeli Järventie Current Position Research Interests Academic Education Academic Positions

Technical Writing and Skills in Engineering Technology Programs

UNIVERSITY FACULTY SENATE FORMS

5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems

STANDARD REGULATIONS FOR THE DEGREE OF DR. PHILOS. (AND EQUIVALENT DEGREES) Recommendation of the Norwegian Council of Universities as of

George Hack, PhD. Cell: SW 132 Street Archer, Florida EDUCATION

INVESTIGATE CRIMINAL JUSTICE AT RADFORD UNIVERSITY

National Research University Higher School of Economics London Metropolitan University. Dual Degree Master of Public Administration

Graduate School. take your career to the next level. Health Administration. Buffalo New York

University of Maryland Cybersecurity Center (MC 2 )

Undergraduate Degree Map for Completion in Four Years

Train Like You Will Fight

Joseph Y. Ugras, Ph.D. 5 Hayes Court / Newtown PA /

Undergraduate Degree Map for Completion in Four Years

MSc Research (Human Geography):

Tokyo Tech Education Reform

UNM Information Assurance Scholarship for Service (SFS) Program

Undergraduate Degree Map for Completion in Four Years

UNIVERSITY OF DAR ES SALAAM BUSINESS SCHOOL POSTGRADUATE PROGRAMMES

PhD Programmes in the US

College of Business AACSB Continuous Improvement Review Accreditation Report

Centre for Entrepreneurship. Master of Science in. Innovation and. graduate

Curriculum for the Master of Science Programme in Information Technology at the IT University of Copenhagen, Digital Innovation and Management

Formation à l ED STIC ED STIC Doctoral education. Hanna Klaudel

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Fields of study within doctoral degree programmes in natural science: Biology Resource Management Biotechnology

JOSHUA R. PIERCE. Corporate Finance, International Finance, Financial Constraints, Labor Markets, Risk Management, Capital Structure

OAKLAND UNIVERSITY. Graduate Education. Modify Approved Graduate Academic Program. merge programs split program X rename program X modify program

Tokyo Tech Education Reform

Curriculum Vitae ALTON A. S. LOVVORN, PH.D. May 2013

Communication, Journalism, Telecommunications (Graduate)

Undergraduate Degree Map for Completion in Four Years

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

Jane A. LeClair, Ed.D Chapelhill Drive Victor, NY

Transcription:

Cyber Security Education 2.0: Minding the Gap for Computational Sovereignty in Norway and the Nordic s Professor Dr. Stewart Kowalski Information Security Vice Dean of Education Faculty of Computer and Media Technology Norwegian Information Security Lab (NISlab) Center for Cyber and Information Security

Education your Stairway to Heavenly Security 2 (2016/2017) Information Security Management Group Cisco Lab & Cyber range PhD in Information Security Bachelor in IT-Operations and Information Security (BITSEC) Master in Information Security (MIS) - Cybersecurity - Forensics - Information Security Management Experienced Based Master in Information Security (MISEB) Biometris Lab Forensic Lab

3 NISLAB STUDY PROGRAMS 160 140 120 100 142 108 Bachelor IT-Operations and Security (BISTSEC merged Program 2016/17)* Master Information Security (MIS) * Experienced Based Master Information Security (MISEB) ** PhD Information Security (PhD-IS)* 80 Number of Students 60 40 20 16 22 0 BITSEC MIS MISEB PIS (PhD-IS * Status intake 2015 ** 1 st /2 nd year only

Norwegian Information Security Laboratory

(Practical Models vs Theoretical Models for Education Systems) Find NTNU in the school of Athens? Find HIG, NISlab, MTL, CCIS in the School of Athens https://www.youtube.com/watch?v=uorg6jfbzeu

A Systemic Gap

WHY IS THERE SUCH A GAP AS CHANGE IN QUANTITY = CHANGE IN KIND COMPUTATION AS A COMMODITY A NEW GAP 7

PROBLEM 1 CYBER SECURITY AND COMPUTATIONAL SOVEREIGNTY 8 Computation and IT Technology research and development, adoption and implementation is driven to a large extent by hype and security and privacy issues and legal constraints are neither thought about or taught correctly!

EXAMPLE GARTNERS SECURITY HYPE CURVES 2003 9

PROBLEM 1 CYBER SECURITY AND COMPUTATIONAL SOVEREIGNTY 10 Computation and IT Technology research and development, adoption and implementation is driven to a large extent by hype and security and privacy issues and legal constraints are neither thought about or taught correctly! Do you want to buy a parachute? What??????? We need to make this thing a light as possiblle!

11 PROBLEM 1 Computer and Media Technology research and development, adoption and implementation is driven to a large extent by hype and security issue and other constraints are neither thought about or taught correctly correctly! http://ca.news.yahoo.com/blogs/good-news/airplane-recovery-parachute-saves-three-livesconnecticut-crash-171749029.html

:Problem: A GAP in our Society between Hypothesis: It is Systemic There is always a control GAP with new technology!

The idea of these lunch seminars is to create an informal setting, where a 13 topic is presented A 100,000,000 during Reason the first to 15-20 propose minutes, a and where the remaining time is set aside Nordic for discussion. Executive Masters in Business Administration Security & Privacy Technology and Law? Computer World May 8 th 2015

The idea of these lunch seminars is to create an informal setting, where a 14 Conceptual Socio-Technical Model of topic is presented Nordic Executive during the MBA first in 15-20 minutes, and where the remaining time is set aside Security for discussion. Technology, Privacy and Law

THE FIRST SWEDISH DOT 15 Swedish information security university education begain with the forming of IFIP TC 11 in 1983. 15

DETAILS OF THE FRAMEWORK 16 Design/architecture Context, geographical/space and time bound "system point" Theory/model Physical construction Process-Store- Communicate- Collect-Display Operational Administrative Managerial Legal Ethical Technical Aspects Non-Technical Aspects Content subject areas Systemic module - an epistemological device, - meta-science, and - criteria for control 16

Cyber Security Education 1.0 https://oldplay.dsv.su.se/hypercaster/3762/width=640/height=360/link.js

Mapping to NIST NICE 20

Sept 2015 21

22

MIND THE GAP IS IT A THREE BODY PROBLEM? 23 EXECUTIVE MBA SECURITY & PRIVACY TECHNOLOGY AND LAW Business Security and Privacy Management Governance Public & Private Sectors Technologies and Innovation Legal Informatics

24 FUTURE COMMON PROJECTS: EDUCATION Dual Degree with Concordia University, Canada (Autumn 2016) Nordic Master: InfoSec Mgmt & Privacy (Spring 2017) NordSecMob: Nordic Master in Security & Mobile Computing Bachelor/Master Information Security Introduction Courses Bachelor in IT- Operations and Security PhD in Information Security Master in Information Security Norwegian MOOC Common Body of Knowledge Cyber Security and Privacy Experience Based Masters Police/Cyber Defense

NISlab hosts COINS: Norway s Security PhD Student Network Networking (Security Divas, SWITS, NordSec, NISK) Support students with travel grants Finse winter school (FRISC/COINS); Metochi summer school Ph.D. student seminar (autumn): Ca. 30%-40% of students plus Swedish/European partner network and invited speaker Capture the flag team: International visibility of Norwegian applied IT security Increased visibility: Attract more and better candidates for positions 25

26 END-TO-END SECURITY RESEARCH AND EDUCATION NTNU NISlab CCIS NORSIS http://www.ndia.org/divisions Divisions/Divisions/Scienc eandengineeringtechnology/documents/coyl e%20ndia.pdf NORSIS

NISlab hosts CCIS: Norway s most important Partner Network in Security 27

PLEASE JOIN US 28