University of Maryland Cybersecurity Center (MC 2 )



Similar documents
2. Cyber security research in the Netherlands

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Research Topics in the National Cyber Security Research Agenda

MARYLAND CYBERSECURITY CENTER

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Logging In: Auditing Cybersecurity in an Unsecure World

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

Cybersecurity education for the next generation Emerging best practices

Introduction to Cybersecurity Overview. October 2014

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

TUSKEGEE CYBER SECURITY PATH FORWARD

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

UNM Information Assurance Scholarship for Service (SFS) Program

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Security & privacy in the cloud; an easy road?

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)

Supplier Vigilance: A Critical Layer of Defense

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Security Metrics & The Boardroom How does security articulate business value. Rick Miller IBM, Director Managed Security Services

U. S. Attorney Office Northern District of Texas March 2013

Fight fire with fire when protecting sensitive data

Abstract Introduction What Does Industry Need?

Electric Energy and Power Panel Sessions

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Microsoft s cybersecurity commitment

Developing Secure Software in the Age of Advanced Persistent Threats

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Statement of Stephen W. Orfei General Manager PCI Security Standards Council

SECURITY MANAGEMENT PRACTICES

Cybersecurity at ODU ( )

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Working with the FBI

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Practical Steps To Securing Process Control Networks

Dr. Dave Dampier Professor of Computer Science and Engineering

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Preparing for Performance Building the Cybersecurity Workforce We Need. Maurice Uenuma 13 November 2013

Master of Cyber Security

Cyber Security: Designing and Maintaining Resilience

Northrop Grumman Cybersecurity Research Consortium

How to Get Hired for a Cybersecurity Internship. by Wilton Jowett

The USNA Cyber Program

Information Security Addressing Your Advanced Threats

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

How To Become A Cybersecurity Consultant

CARTES 2012 Demo presentation. Secure Cloud Storage

Comprehensive real-time protection against Advanced Threats and data theft

Cyber security trends & strategy for business (digital?)

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

Middle Class Economics: Cybersecurity Updated August 7, 2015

Security Intelligence

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Cyber Security at NSU

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

The Landscape of Cyber, critical infrastructure and how Regulation fits in

Educating Cyber Professionals:

Securing the Connected World.

Protecting critical infrastructure from Cyber-attack

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.

How To Understand And Understand Cyber Security

BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION. TOPIC: USM Cyber Security Task Force Recommendations

Cyber Security Metrics Dashboards & Analytics

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Small-Scale Cyber Security Competitions

2012 Bit9 Cyber Security Research Report

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

TRANSATLANTIC CYBER SECURITY SUMMIT

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Security Camp Conference Fine Art of Balancing Security & Privacy

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Security Intelligence Services. Cybersecurity training.

Cybersecurity Education

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY )

Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Quarterly Cybersecurity BILT Meeting August 6, Meeting Minutes

RETHINKING CYBER SECURITY Changing the Business Conversation

Certified Cyber Security Analyst VS-1160

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

Transcription:

University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/

Cybersecurity Challenge Goal: Preserve enormous positive impact of the Internet 2M Youtube videos uploaded per day More in 60 days than TV networks in 60 years 140M tweets per day 107 trillion emails sent in 2010 800M active Facebook users (> 50% log in daily) Key role in Arab springs in Tunisia, Egypt Global E-commerce market heading toward $1 trillion

Cybersecurity Challenge Goal: Reverse the escalation and impact of attacks High-profile intrusions NASDAQ, RSA, Sony (3x), Google, Booz Allen Cyber attacks on countries (Estonia, Georgia) 26 chemical companies subjected to industrial espionage Norton study: $114B lost to cybercrime per year Average $7.2M lost per data breach event One event listed as costing $1B in IP lost

Why is this hard? Security is an attribute, not a discipline Goal: do X securely-- X is the important part! Requires an interdisciplinary approach Technology (what can be done) Economics (incentives for doing it) Sociology/psychology (how people will respond) Rapidly changing problem landscape

MC2 has a Strategic Location NIST NSA

MC2 has Broad Expertise College of Computer, Mathematics and Natural Sciences A. James Clark School of Engineering R. H. Smith School of Business School of Public Policy MC 2 College of Information Studies College of Behavioral and Social Sciences Government partners Academic Partners Corporate Partners

The Key Components of MC2 have International Prestige Map shows universities in the Top 20 Rank in the world in each of Engineering, Computer Science, Mathematics, Physics, Social Sciences, Economics & Business MICHIGAN MIT BERKELEY STANFORD Univ of MARYLAND Source: www.arwu.org Academic Ranking of World Universities

UMD has Leading Centers, SCIFs close to campus INTELLIGENCE COMMUNITY CENTER FOR ACADEMIC EXCELLENCE Institute for Research in Electronics & Applied Physics CLOUD COMPUTING CENTER SUPPLY CHAIN MANAGEMENT CENTER

MC2 Faculty: Leaders in Cybersecurity Education & Research Faculty Books in Cybersecurity

MC2 Cybersecurity Research Areas Software Security: Secure coding, Automatic program analysis, Enforcing privacy Cyber Threat Analysis: Criminological behaviors, sociological, threat & malware quantification Cyber Economics Cryptography Digital Forensics Cybersecurity Policy Wireless Networks: Security and information assurance; DDOS attacks; wireless sensor networks Supply Chain Security & Integrity: Logistics best practices, net-centricity management Cyber Physical Systems Visualization of Complex Networks

Noteworthy Recent News UMD Professors secure $1 Million cooperative agreement with NIST for cyber-physical systems research. will help NIST develop and deploy standards, test methods, and measurement tools to support consistently reliable performance of new smart systems Gordon and Loeb s You May Be Fighting the Wrong Security Battles, featured in Wall Street Journal Showcased a model developed by two professors to guide company executives decisions on the optimal level of investment to protect an information set

Cybersecurity Programs Master s in Computer Science with Cybersecurity concentration Professional Master s Program in Cybersecurity (Fall 2012) Cyber Supply Chain Certificate Program (Spring 2012) Summer Programs in Cybersecurity (Summer 2011) - One-week Cyber Camp program for high school students - NSF-sponsored 9-week Research Experience for Undergrads Partners include Lockheed Martin, SAIC, Google, MIT Lincoln Lab, Tenable Google-sponsored Cybersecurity Seminar series with leading speakers Active student-run Cybersecurity Club in place, with 500 members, won the Mid-Atlantic Collegiate Cyber Defense Competition (CCDC), 1 of 8 CCDC finalists in nation UMD Cybersecurity Club Questions? Contact Eric Chapman, Associate Director, echapman@umd.edu 301-405-7136

What will you do? Securing our computer infrastructure is a great problem of our time Becoming more important as time goes on A solution requires concerted effort across all of academia, government, industry Will you help us solve the hard problems?