Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University



Similar documents
Statement of. William D. Green. Executive Chairman of the Board, Accenture. and

Keio University (Private)

Board of Trustees. Strategic Planning Committee

School Management Concerning Collaboration with Social Resources in the Community Its Approaches and Problem-

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Accenture Overview Page 1

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University

Bachelor of Applied Science in Healthcare Technology and Management Bellevue College

How To Improve Health Care At Stevens.Org

Educating Cyber Professionals:

How To Discuss Cybersecurity In European Parliament

2. New Trend 1: From Fairness to Efficiency

The University of Akron College of Nursing Technology Plan

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

University of Maryland Cybersecurity Center (MC 2 )

Cyber security in an organization-transcending way

DRAFT THE CONTEXT: NORTHEASTERN 2015

Government + Enterprise + Innovation + Strategy

National Cyber Threat Information Sharing. System Strengthening Study

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited

Innovation & Quality for Higher Competitiveness of Companies

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The main object of my research is :

Cybersecurity: Mission integration to protect your assets

Policies and Practices on Network Security of MIIT

The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes.

Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education

Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation

NINETY-FIRST MEETING WASHINGTON, D.C. APRIL

elearning, the New Educational Paradigm and the Promise of Open and Distance Learning

A Research on Security Awareness and Countermeasures for the Single Server

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

September 4, appearing before you today. I am here to testify about issues and challenges in providing for

1. Alaska, Alaska Native Tribal Health Consortium Behavioral Health Aide Training Program

Fellowship Criteria. Nomination Process

USM COMMITTEE ON MEES: RE-ENVISIONING A SYSTEM LEVEL GRADUATE PROGRAM IN ENVIRONMENTAL SCIENCE

International Strategy of Nagasaki University

This is the author s version of a work that was submitted/accepted for publication in the following source:

LEAP Wisconsin Assessment UW Institutional Case Studies

College of Nursing Strategic Plan Strategic Goals and Objectives:

Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), doi: /MC

Texas Education Review

The Department of Accountancy

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

A Whole New World of Outsourcing. Norris Overton

THE FUTURE OF HIGHER EDUCATION A CANADIAN VIEW

A REPORT ON WORKPLACE SECURITY

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them

CYBERSECURITY: Is Your Business Ready?

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

Graduate Research and Education: New Initiatives at ORNL and the University of Tennessee

Michael Yakushev PIR-Center, Moscow (Russia)

Wither the Global Talent Pool?

College of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits.

EDYTH T. JAMES DEPARTMENT OF NURSING

Engineering Management: The Future of Engineering Technology

Some Thoughts on the Future of Cyber-security

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Privacy and Security in Healthcare

CERT's role in national Cyber Security: policy suggestions

GENERAL INSURANCE BUSINESS UNDERWRITING

Chairman Johnson, Ranking Member Carper, and Members of the committee:

BYLAWS OF THE FACULTY OF THE UNIVERSITY OF TEXAS SCHOOL OF ALLIED HEALTH SCIENCES AT GALVESTON PREAMBLE

Comprehensive Strategy on Information Security: Executive Summary

Thank you for your very kind introduction.

We Must Prepare Ph.D. Students for the Complicated Art of Teaching - Commentary - The Chronicle of Higher Education

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

NNIT Cybersecurity. A new threat landscape requires a new approach

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

Examining the Evolving Cyber Insurance Marketplace

Priority III: A National Cyberspace Security Awareness and Training Program

Cyber Security & Data Analytics October - November 2015

Security and Compliance Play Critical Roles in Protecting IT Assets of Law Firms and Their Clients

CURRICULUM VITAE. Danny L. Rhodes

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

INCO for Cyber Security. PTCIF: 21st Feb 2014

Report on the Florida State University School of Nursing Seminar on Excellence in Nurse Education

THE CLOUD: PROGRESS AND POTENTIAL

DEAN OF THE SCHOOL OF HEALTH SCIENCES

Cyber Security in East Asia and Policy Cooperation

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Managing Cyber Attacks

KIT 1.10 Years From Now Kyoto Institute of Technology

New Business Model for Medical Billing Companies

OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING

Security Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS

Effective Information Sharing and Analysis Process

M.A. /M.S. in Education Purdue University College of Education

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Interim Results 28 August 2014

Corporate Universities: Competitors or Collaborators?

Our activities in the West Coast, past, present, and future.

Fujitsu s Approach to Cloud-related Information Security

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Cyber Security at NSU

Curriculum Development for Doctoral Studies in Education

Transcription:

<USJI Seminar Report> Date Friday, September 21, 2012 Host USJI-DCC Venue U.S.-Japan Research Institute (USJI)/ The Waseda Digital Campus Consortium (DCC) Title The Future of Advanced Information Societies Keynote Speech William E. Kirwan, Chancellor, University of Maryland System Kaoru Yano, Chairman of the Board, NEC Corporation *Video Message Botaro Hirosaki, Executive Adviser, NEC Corporation Moderator Shigeki Goto, Professor, Department of Computer Science and Engineering, Waseda University Panelists William E. Kirwan, Chancellor, University of Maryland System Botaro Hirosaki, Executive Adviser, NEC Corporation Shuzaburo Takeda, Specially appointed professor, Kyoto University Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Summary William E. Kirwan, Chancellor, University of Maryland System Mr. Kirwan begins by addressing the issue of cybersecurity and its role in education. The University of Maryland system has three major research universities and seven comprehensive universities institutes that focus mainly on undergraduate education up to the Master s level. One institution of the system is a counterpart to Maryland s digital campus University of Maryland, Maryland College. It is a digital-only campus and one of the fastest growing campuses of the system. Kirwan advances to the issue of cybersecurity. He offers three innovations that that are on the verge of fundamentally changing our lives and how we do business. The first innovation will occur in healthcare. Studies of the human genome will advanced science to breakthroughs in medical care. We will have personalized or customer-tailored healthcare and cures will be developed for diseases once never believed to be accomplishable. The second he offers is a seismic shift in the teaching and learning paradigm. USJI 1 http://www.us-jpri.org/en/index.html

This, coupled with advancements in cognitive science, will dramatically alter how we teach. The growth of new online universities such as U-Dacity are offering high quality educations at a low cost. Kirwan concedes that those in his position will have to re-think new teaching paradigms. The classroom of 2020 will be unrecognizable and radically different from today s classrooms. These technologies and innovations can help to lower cost of education. The third innovation that will radically alter our lives is cloud computing. Cloud computing can drive down the cost of computing and spread its use. Kirwan utilizes the analogy of the innovation of alternating current to electrical use to explain the multiplier effects that cloud computing will have on technology. However, cloud computing introduces new risks. Kirwan now moves to the issue of cybersecurity and cloud computing Cyber threats are unique in that they can result from an individual anywhere in the world that has access to the internet, even through a cyber café. The enemies are ubiquitous according to Kirwan. Those in education have a special obligation to focus on cyber security. Maryland is home to the NSA and the work of the NSA is so large that there is now a huge and developing private sector to meet the new demand for security specialists. The government and private sector looks to the UM to acquire expertise in the cyber field. One way UM is attaining this expertise is through research. UM-College Park has created a new cyber security center to address contemporary issues in cyber security. UM is also focusing on education in the cyber security field. All 12 campuses are involved in producing grads to meet the workforce need. UM has partnered with Northrup-Grumman to create an honors program to develop new cyber professionals. Botaro Hirosaki, Executive Adviser, NEC Corporation Hirosaki opens by discussing about the emerging importance of sustainable growth. While the world is still recovering from the effects of the global recession, long-term issues such as energy and global warming continue to be persistent. However, we must continue to work towards resolving these issues to help future generations. Last year, the OECD made its Green Growth declaration and the UN also issued its Green Economy declaration. 35 years ago, NEC proposed the concept of C&C ( Computers and Communication) to the world, but today this has become the concept of ICT, which is playing an increasingly important role in solving global challenges. A paradigm shift is now taking place in the world of ICT. There is now a big paradigm shift in computing. Further, the cost of computing has decreased dramatically in the last several decades. Efficiency once inconceivable 25 years ago is now feasible. Cloud computing also allows people to share data more easily and quickly. We are in an era when cloud computing allows for the collection of a greater variety of data including bio genome data or nano-science data. This new paradigm reinforced by ICT will become the new foundation of our society. USJI 2 http://www.us-jpri.org/en/index.html

ICT is becoming the foundation of building new products such as smart houses and smart grids. Thus, the more ICT handles such important roles in society, the greater the risk for networks becomes. In regards to cybersecurity, if we don t put together our best wisdom, the risks will prevail and it will be difficult for ICT to form a new foundation for the future. I think industry members such as NEC must make a contribution to developing this new foundation. Hirosaki now explains about the different security roles for different sectors. We in the industrial sector possess specific information, such as information about problems faced by our systems. Even within our company, there are mountains of sensitive data that is susceptible to DDOS attacks. On the other hand, universities have accumulated lots of recent technological research relating to security. By linking these more and more, we can strengthen the foundation for cybersecurity. Also, because the United States has advanced experience in the cyber-security world even at the national security level, it is important that Japan and the US, with their strong private sectors, cooperate in developing a new foundation for cyber-security. Finally, Hirosaki concludes by making remarks on NEC Group s vision for the next 10 years which includes being a leading global company leveraging the power of innovation to realize an information society friendly to humans and the earth and challenges us to prepare for a new future of innovation in network security. Shuzaburo Takeda, Specially appointed professor, Kyoto University Takeda begins with the subject of cybersecurity education. Maryland College has been carrying out online education in Okinawa for over half a century, which is now open to Japanese people as well. This cybersecurity program allows students to master the skills necessary for cybersecurity. The role Maryland College plays for the Okinawan people is very important. Because the number of top professionals in the field in Japan is extremely low, it is important to take advantage of the education provided by such a college. He now shifts to the subject of a paradigm shift, a notion introduced by Hirosaki. Takeda insists that the essence of the paradigm shift is a shift in the overall way of looking at things, so if we only focus on the economic, technological, or industrial aspects of the paradigm shift, we will not understand the full essence of it. So if we Japanese don t change our mindsets, we won t be able to keep up with Korea and China. For example, we must shift our focus from results to processes, and from isolation to systems. This paradigm shift will continue into the future, from paradigm shift version 1.0 to version 2.0, and then on to version 3.0, over the course of the century. As part of this shift, all infrastructure is now moving towards informatization. Cybersecurity is essential for social stability, which countries around the world recognize. Even US President Obama has referred to this many, many times. Cooperation between the US and USJI 3 http://www.us-jpri.org/en/index.html

Japan is essential for cybersecurity, yet so long as Japan doesn t even have laws concerning cybercrimes, Japan can t progress. I want us to press forward with such laws. The seriousness of cyber-crimes has been pointed out in the past, but why haven t we done anything yet? It can be said that the average mindset of Japanese society has still not adapted to globalization. What we need in Japan right now is a leader, to nominate people to spread the new mindset. The version 1 period of informatization in Japan presumed that globalization was occurring only in Japan, but prosperity brought about spiritual inversion (The Galapagos Syndrome). Version 2 occurred just after the Cold War ended, but Japan ignored it and fell behind Korea and China. This deepened our problem. A globalized society is one where people all around the world are recognized as equal. The world is flat, as Friedman said. Now, we have entered the era of Version 3.0. We can t say that America has been a leader until now, but both countries should cooperate in addressing the paradigm shift. I want there to be more leaders like President Kirwan in Japanese universities, and I want more universities and people to understand the importance of cybersecurity education. Shuji Hashimoto, Vice Chair, USJI/ Vice President, Waseda University Hashimoto begins by explaining the difference between information networks and energy networks. Energy networks, he explains, begin with electricity or how we use it. Washing machines and other electrical appliances all use that form of network. Information networks, however, rely on a completely different infrastructure. The issue, he explains, is integrating the two into a single line. Very soon these two networks will be integrated into one. This is what we can call cyberization*. The discussion should focus on what happens once we combine these networks. Personally, I m looking forward to seeing how it develops. In regards to security, there s hardware security and software security. But there s also one more. We should also think about software bugs and defects and their proneness to attacks. Codes with error are prone to be attacked. These are the sorts of things we should also consider. Lastly, this is more of a question, but during Mr. Kirwan s presentation, he spoke about the development of UM-US as a center for private research. Why doesn t this sort of activity also occur in Japan? Question and Answer To Mr. Kirwan: How is it that the University of Maryland able to attract the private sector and form such a strong relationship for research in cybersecurity? Kirwan states that he s unable why it s unable to occur in Japan, but he says that at his university they work to establish relationships and they have advisory boards to help them formulate the curriculum of the future. The private firms are also able to outsource some of their research USJI 4 http://www.us-jpri.org/en/index.html

projects to the universities and even provide scholarships. This is a long-term and ongoing process. To Mr. Hirosaki: Can you elaborate on some of the differences in industry collaboration between the US and Japan? From my experience, the US and Europe both have centers of cyber innovation. Such cooperation is quite different in Japan. IN the US it is perceived that the pursuit of such innovation goes hand-in-hand with the development of society, not just the private sector. Such an attitude makes cooperation very easy. Perhaps this could be an influence of Japanese culture or history, but scholars in Japan are focused on the academic aspect of their work and so much its contribution to industry. To Professor Takeda: Same question. The Japanese government has budgeted quite a bit of money towards this endeavor. However, this is merely a hollow pursuit. The mindset of our academics must change. In this new world of globalization, universities will serve as a center for industry. Technological centers based at universities will become an important enterprise. I hope that we can transform our educational system. To Mr. Kirwan: With the rise of online education and learning, how can we be certain that students are actually learning? Harvard and MIT will begin giving students Certificates of Completion for given courses. Theoretically, if someone collects enough of these certificates, are these sufficient credentials for an actually degree? I do not know. This does not mean the end of higher education because traditional schools still have certain advantages. However, this type of schooling will have increasing significance for adult education. To Mr. Kirwan: Cybersecurity issues are now becoming important in Japan. How do cybersecurity experts join the field in the US? It has become such a critical national security issue because they encompass a huge role in our society. Lots of money is being invested in new degree programs money is coming from national and state-level governments. This is drawing people to the field because there is such great demand for jobs. Takeda: Same question. There is already a real threat. There is a 22 percent increase in attacks from Russia according to the Cyber Response Team (CRT) of the US. Even in Japan these risks exist. Infrastructure is especially vulnerable to such attacks. Kirwan (in response to Takeda): USJI 5 http://www.us-jpri.org/en/index.html

People in private companies have told me that they know external forces have gained access to their businesses that they have been under attack. The trick is to prevent the attackers from gaining information, not preventing them from getting in. USJI 6 http://www.us-jpri.org/en/index.html