The Future of Cybersecurity Education



Similar documents
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Participants: Introduction:

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Report on CAP Cybersecurity November 5, 2015

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

Certification Programs

Middle Class Economics: Cybersecurity Updated August 7, 2015

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Security & privacy in the cloud; an easy road?

THE BUSINESS VALUE OF SOFTWARE QUALITY

Information Systems Security Certificate Program

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

Certification Programs

Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)

UNM Information Assurance Scholarship for Service (SFS) Program

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

CFIR - Finance IT 2015 Cyber security September 2015

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The Nature of Cyber Security. Eugene H. Spafford

Security Awareness & Training. Steve Kruse, Impruve Bill Pankey, The Tunitas Group

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

CYBER SECURITY TRAINING SAFE AND SECURE

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Data Analytics & Information Security

The Importance of Defining and Documenting Information Security Roles and Responsibilities By Charles Cresson Wood, CISSP, CISA, CISM

National Initiative for Cyber Security Education

Cyber Security at NSU

Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.

RETHINKING CYBER SECURITY Changing the Business Conversation

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

CESG Certification of Cyber Security Training Courses

DHS. CMSI Webinar Series

Developing a Mature Security Operations Center

Frontiers in Cyber Security: Beyond the OS

What Is A Security Program? How Do I Build A Successful Program?

Becoming Proactive in Application Management and Monitoring

CYBER SECURITY WORKFORCE

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

The 5 Cybersecurity Concerns You Can t Overlook

Testing Rails. by Josh Steiner. thoughtbot

Understanding the NIST Cybersecurity Framework September 30, 2014

SCAC Annual Conference. Cybersecurity Demystified

Enterprise Cybersecurity: Building an Effective Defense

North Texas ISSA CISO Roundtable

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Security Metrics What Can We Measure?

Solving the Security Puzzle

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Creating an Online Cybersecurity Capstone Simulation. Alan Carswell Jim Cook

NASBA ANNUAL MEETING SPEECH James C. Young, Ph.D., CPA - October 25, 2011

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Navigating the NIST Cybersecurity Framework

TRENDS AND DRIVERS OF WORKFORCE TURNOVER

InfoSec Academy Forensics Track

Cyber Learning Solutions

Cyber Education triangle clarifying the fog of cyber security through targeted training

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Q&A by Megan Schmidt, editor, with David Archer, founder of LearningMeasure.com

How To Become A Cybersecurity Consultant

What Works in Supply Chain and Partner Security: Using BitSight to Assess and Monitor Third-Party Cybersecurity

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

Transcription:

The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego

Severe Cybersecurity Workforce Shortage! 2

Early Aviation Attempts 3

Wright Brothers 4

Wright Brothers Experiments 5

Model of Aerodynamic Forces Orville s diagram from experiments: http://airandspace.si.edu/explore-and-learn/multimedia/detail.cfm?id=5804 6

Success! 7

Further Model Development http://www.me.metu.edu.tr/courses/me410/exp6/exp6.html 8

Experiments to Verify Model 1930 test at NASA Langley (NACA) https://www.youtube.com/watch?v=3_wgkvqwtno 9

Continuing Improvements to Models https://engineering.purdue.edu/~aerodyn/ 10

Effectiveness of Engineering 11

Aviation Safety Deaths Type per bn km Air 0.05 Bus 0.4 Car 3.1 Foot 54.2 Motorcycle 108.9 Pedal cycle 44.6 Rail 0.6 Van 1.2 Water 2.6 https://en.wikipedia.org/wiki/aviation_safety#accidents_and_incidents 12

Aviation Safety Trend https://en.wikipedia.org/wiki/aviation_safety#accidents_and_incidents 13

Hallmark of Science and Engineering A record of improvement in predictive range and accuracy http://opinionator.blogs.nytimes.com/2013/08/24/what-is-economics-good-for/?_r=0 14

Aviation and Cybersecurity How do they Compare? 15

Side-by-side Comparison Feature Aviation Cybersecurity Experimental data Model Record of Improvement Wind tunnels, computer sims Aerodynamics Unmatched safety record?? 16

Cybersecurity Incident Trend 17

Cyber Attack Trend, Year Over Year Increasing number of attacks Increasing severity Increasing impact Prevention and detection techniques largely ineffective Attackers increasingly aggressive and proficient Is it that organizations don t know what to do, or that they don t have sufficient resources? 18

What are We Doing? Industry best practices Standards and compliance But the trend is getting worse Are we doing them wrong? If we can do them better, will we be secure? 19

Consider the Source Where do industry best practices come from? Experiments? Scientific models? Intuition This should work Maybe it has worked in some circumstances Popularity The 50 largest companies do it 20

Popularity Example Maturity Models System Security Engineering - Capability Maturity Model (SSE-CMM, ISO/IEC 21827) ISO/IEC 21827:2008 does not prescribe a particular process or sequence, but captures practices generally observed in industry. Building Security In Maturity Model (BSIMM) We built the BSIMM entirely from observations we made by studying sixty-seven real software security initiatives. The BSIMM does not tell you what you should do; instead, it tells you what everyone else is actually doing. 21

Cargo Cult Replacement of content by style or magical thinking 22

Cargo Cult Cybersecurity Copying security practices or techniques, or applying security design principles, without understanding how they work or the context in which they work 23

Industry Security Best Practices Model From the point of view of those who depend on them http://www.nedmartin.org/v3/amused/how-planes-fly 24

Not Unexpected Result Major companies hacked in 2014: 25

Compliance vs. Security 26

To Be Fair to Ourselves Security is (usually) not the mission Security may interfere with the mission Security is a cost sink and often an afterthought 27

To Be Fair to Ourselves What happens when you build a house on a foundation of sand? We have to protect systems and networks often developed without security in mind And we usually can t change them And we don t get enough resources Compliance is all we are allowed to do It s how security is measured But that implies that there is a right way 28

What is the Right Way? How can we know what that right way is? How can we be better than best practices? 29

That s What Education Should Teach Cybersecurity education should teach how to differentiate between cargo cult security and real security Cybersecurity education should teach cybersecurity engineering 30

What is Cybersecurity? Cybersecurity definition: Trustworthy control of authorized access by people to information in computer systems (or by programs working on behalf of people) 31

What is Cybersecurity Engineering? Cybersecurity engineering: A field of practice that combines techniques of systems engineering, operational security, software engineering, and acquisition in order to develop processes, tools, and measures that help protect digital information. 32

Why Cybersecurity Engineering? The only way to stay ahead of the curve Depending on understanding the latest malware means you are always playing catch up with adversaries Compliance always lags behind reality Training in fundamentals prepares for whatever turns up and is never obsolete 33

Some Foundations of Cybersecurity Engineering Difference between and importance of Policy Mechanism Assurance Reference monitor concept 34

Severe Cybersecurity Workforce Shortage! 35

Obvious Need for Cybersecurity Engineers? http://thehill.com/blogs/congress-blog/technology/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a http://www.zdnet.com/article/cybersecuritys-hiring-crisis-a-troubling-trajectory/ 36

Why Would That Help? What proof do we have that simply hiring more people with hacker skills would solve this urgent problem? Are there any successful, fully staffed examples? If people are not doing the right thing, will more people doing the same thing be better? Malware detection and reverse engineering, forensics, incident handling are all reactive Implying that we are doing as well as possible with securing our systems up front? 37

Where are we going to find 30,000 Hackers? How do we train so many people in these very specific skills? DHS has National Initiative for Cybersecurity Careers and Studies NIST has National Initiative for Cybersecurity Education 38

Current State of Cybersecurity Education Some NSA/DHS centers of academic excellence IA programs List of required courses Many highly specialized cert prep courses E.g., SANS Collections of cert prep courses Some (many? most?) MS and certificate programs At the end of the program, you have an MS and a handful of certs 39

Technicians and Engineers Engineers Apply science and mathematics to solve problems Design processes, measures, and tools Capable of adapting processes to new situations Must understand why as well as how Technicians Focused primarily on how Follow processes created by engineers Generally don t deviate from accepted processes 40

Why that is a Problem The current concern over cybersecurity could easily abate, driven by new technology and more secure architectures. Pushing too many people into the profession now could leave an overabundance of highly trained and narrowly skilled individuals. Martin C. Libicki, David Senty, and Julia Pollak. Hackers Wanted: An Examination of the Cybersecurity Labor Market. Santa Monica, CA: RAND Corporation, 2014. http://www.rand.org/pubs/research_reports/rr430. Also available in print form. 41

Why That is a Problem 42

Why That is a Problem 43

Cargo Cult Cybersecurity Education Teaching specific security practices and techniques without adequately explaining the context in which they work, but with the expectation that students will somehow understand security when they are done 44

Future of Cybersecurity Education Continued growth in near term of cert prep, technical training programs And lots of new certs Gradual realization that hiring more pure technicians doesn t appreciably improve security Growing emphasis on teaching cybersecurity as a field of engineering Growing emphasis developing secure systems 45

The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego