UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015



Similar documents
UTCS Scholarships for Service

Research Note Engaging in Cyber Warfare

A New Obstacle For Cyberinsurance Coverage

Ccybersecurity Education

UNM Information Assurance Scholarship for Service (SFS) Program

Data Analytics & Information Security

The GW CyberCorps Program

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

A Detailed Strategy for Managing Corporation Cyber War Security

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Recruiting Cybersecurity Professionals: A Best Practice. National Security Agency September 22, 2011

Preface to the Fourth Edition

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Security Studies MA. Your entry in to the World of National Security DESIGNED FOR THE REAL WORLD SECURITY JOB MARKET:

The main object of my research is :

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

Becoming a Cyber Professional: A Discussion with Recent Graduates

master of business administration APPALACHIAN STATE UNIVERSITY

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Symantec Cyber Security Services: A Recipe for Disaster

NICE 2015 Conference

OVERVIEW DEGREES & CERTIFICATES

White Paper on Financial Industry Regulatory Climate

Train Like You Will Fight

Becoming a Cyber Professional: A Discussion with Recent Graduates

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

GRADUATE PROGRAMS. Information Systems

Oil & Gas Cybersecurity

Cyber Security Management

Confrontation or Collaboration?

APPALACHIAN STATE UNIVERSITY. master of business administration

CAREER OPPORTUNITIES

Homeland Security Major

Northrop Grumman Cybersecurity Research Consortium

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

[STAFF WORKING DRAFT]

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

The Danish Cyber and Information Security Strategy

Have you submitted a Free Application for Federal Student Aid (FAFSA) for this academic year? Yes No

ORGANIZATIONAL UNIT PROPOSAL FORM

Three- Year Dual Degree LBJ School and UT School of Law FAQs

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Public Affairs Communications Certificate at UGA

Faculty member completing template Isaac Ghansah, Director of Center for Information Assurance

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML

National Rankings AND RECOGNITION. Bloomberg Businessweek. Princeton Review. Hispanic Business. Since 2007 inaugural rankings.

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

AC : FROM DEFENSE TO DEGREE: INTEGRATING MILI- TARY VETERANS INTO ENGINEERING PROGRAMS

CYBERSECURITY CERTIFICATION PROGRAMS

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

How To Write A National Cybersecurity Act

Cybersecurity Education

U.S. National Cybersecurity

Homeland Open Security Technology HOST Program

US Army War College Fellowship

Public Law th Congress An Act

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Department of Political Science

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

Preventing and Defending Against Cyber Attacks November 2010

AS PREPARED EMBARGOED UNTIL DELIVERY

Security Studies MA

ASYMMETRIC THREAT GLOBAL SNAPSHOT AUGUST 2011

POLICIES TO MITIGATE CYBER RISK

Cybersecurity High School and Beyond

Introduction to Cybersecurity Overview. October 2014

Cyber Terrorism and Information Security Brett Pladna East Carolina University

How To Get An Mba At Mass Dartham

Research Experience for Undergraduates Emerging Issues in Computer Networking

Offensive capabilities

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Preventing and Defending Against Cyber Attacks October 2011

NATIONAL DEFENSE AND SECURITY ECONOMICS

think unmanned aircraft are the future of flight in general.

A conversation with Allan Friedman about cybersecurity issues

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY

Work in Progress: The Bridge to the Doctorate Experience A Reflection on Best Practices and Project Outcomes

UMUC FED Program. Online Open House July 22, 2015

Foundations of Computer Security

Law Firms and Cyber Security

Developing your Portfolio

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Advance America s Promise as You Build an Exceptional Future

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

At Meeting No. 487 held on 26 January 2015, the Graduate Council approved the attached proposal that is now submitted to the Faculty Senate.

Priority III: A National Cyberspace Security Awareness and Training Program

How To Make A Speech At The Cyber Defenders Discovery Camp

LEADERSHIP: MA, EdS, EdD, PhD

UMBC CYBER SCHOLARS APPLICATION MAJORS

Promoting a cyber security culture and demand compliance with minimum security standards;

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Preventing and Defending Against Cyber Attacks June 2011

4 YEAR FLIGHT PLAN: B.A in Political Science

Transcription:

UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1

From the Headlines U.S. Not Ready for Cyberwar Hostile Attackers Could Launch, The Daily Beast, 2/21/13 The Chinese reportedly have been hacking into U.S. infrastructure, and Leon Panetta says future attacks could plunge the U.S. into chaos. We re not prepared. If the nightmare scenario becomes suddenly real... If hackers shut down much of the electrical grid and the rest of the critical infrastructure goes with it... If we are plunged into chaos and suffer more physical destruction than 50 monster hurricanes and economic damage that dwarfs the Great Depression... Then we will wonder why we failed to guard against what outgoing Defense Secretary Leon Panetta has termed a cyber-pearl Harbor. Slideset 1: 2

How Bad Is It? Cyberwarfare greater threat to US than terrorism, say security experts, Al Jazeera America, 1/7/14 Cyberwarfare is the greatest threat facing the United States outstripping even terrorism according to defense, military, and national security leaders in a Defense News poll. 45 percent of the 352 industry leaders polled said cyberwarfare is the gravest danger to the U.S., underlining the government s shift in priority and resources toward the burgeoning digital arena of warfare. Slideset 1: 3

The U.S. at Risk? Experts believe that U.S. is perhaps particularly vulnerable to cyberattack compared to many other countries. The U.S. is highly dependent on technology. Sophisticated attack tools are easy to come by. A lot of critical information is available on-line. Critical infrastructure may be accessible remotely. Other nations exercise more control over information and resources. Slideset 1: 4

The U.S. Government Takes this Seriously The Pentagon has concluded that computer sabatoge coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force. (Wall Street Journal, 5/31/11) The Pentagon will expand its cyber security force from 900 personnel to a massive 4,900 troops and civilians over the next few years following numerous concerns over the dangerously vulnerable state of their defenses, according to US officials. (rt.com, 1/18/13) Slideset 1: 5

What UT is Doing As part of the U.S. push to enhance cyber defenses, UT and other major universities are ramping up programs to train cyber professionals. UTCS houses the Center for Information Assurance and Security, with around 12 affiliated faculty members. UT Austin is designated (May 2013) by NSA and DHS as a National Center of Academic Excellence in Information Assurance Research. UTCS offers a certificate in Information Security, sanctioned by the U.S. government. UTCS (January, 2014) offers NSF Scholarships for Service, designed to equip students as security professionals and promote public service. Slideset 1: 6

UTCS Security Certification In an attempt to educate security professionals, the Committee on National Security Systems (CNSS), through U.S. universities and companies, offers security training and certification. UT is authorized to confer CNSS 4011 certification: Information Systems Security (INFOSEC) Professional. This establishes general competence in the areas of computer and network security. Slideset 1: 7

Goals of the Certification Educate students in security-related disciplines Provide exposure to key responsibilities regarding security oversight or management of security systems Enable students to recognize threats and vulnerabilities of information systems and gain working knowledge of INFOSEC principles and practices Develop skill/ability to design, execute, evaluate INFOSEC security procedures and practices Slideset 1: 8

Certification: Classes Required Certification requires completing the following six courses. CS429: Computer Systems I CS439: Computer Systems II CS356: Computer Networks CS361: Intro to Computer Security CS361S: Network Security and Privacy CS361C: Information Assurance and Security* * This requirement may change in the near term. Slideset 1: 9

What s In It for the Student? Security is one of the hottest and most intellectually stimulating specializations within computer science. The student gains the following benefits: Understands this vital and challenging material Gains a competitive advantage in the workplace Becomes a more valuable employee Potentially earns higher starting salary Provides a national service Currently, over 100 CS majors are pursuing the Certification. Slideset 1: 10

Scholarships for Service Our NSF grant supports students seeking a career in information assurance and security. Participants are undergraduates or five-year masters students. Receive two years of generous financial support (or three if in five-year masters). Complete InfoSec Certificate in Information Security. Receive extensive mentoring from the UTCS security faculty. Participate in security-related summer internships. Become part of a cohort of student security scholars. In return, students commit to professional employment with a government agency in security-related service, of duration equal to the period of support. Slideset 1: 11

Program Goals Prepare the student with the academic knowledge to be a successful cybersecurity professional. Provide the student with career development skills to be a professional public servant. Increase student involvement in cybersecurity research. Place all program participants in summer internships. Upon graduation, place participants in full-time positions in information assurance within government agencies. Slideset 1: 12

Eligibility for the Program Each participant in the program must: be a UT CS major (students may apply when CS Entry Level, but must be official CS majors to begin the program); have a minimum UT GPA of 3.2 be a United States citizen; meet the criteria for employment with the U.S. Federal Government; be able to receive a U.S. Federal Government security clearance. Slideset 1: 13

Required Activities Participate in an annual kick-off event; Be paired with a UTCS faculty member; Formulate personal goals for academic and career development and report progress monthly; Join a research team; Present research at a university forum; Attend research presentations in the UT CIAS lecture series; Participate in Security Day; Attend a site visit at a Texas agency; Attend on-campus and national career fairs; Mentor incoming students. Slideset 1: 14

UTCS Committed to Cybersecurity As one of the top 10 CS departments in the nation, UTCS is committed to enhancing the cybersecurity of the nation. Through world-class, cutting edge security research. By educating the next generation of cybersecurity professionals. By encouraging government service. What starts here changes the world! Slideset 1: 15