Cybersecurity education for the next generation Emerging best practices



Similar documents
Cybersecurity education for the next generation. Advancing a collaborative approach

Nanci Knight IBM Academic Initiative Ecosystem Development Relationship Manager West Region cell:

Ahead of the threat with Security Intelligence

Cybersecurity Education

CYBER SECURITY TRAINING SAFE AND SECURE

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

Cyber Security at NSU

NICE and Framework Overview

Bellevue University Cybersecurity Programs & Courses

CYBER SECURITY INFORMATION SHARING & COLLABORATION

MS Information Security (MSIS)

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Defending against modern cyber threats

Cybersecurity: Mission integration to protect your assets

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Microsoft s cybersecurity commitment

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Professional Services Overview

Cyber Security Solutions Integrated. Proactive. Resilient.

KEY TRENDS AND DRIVERS OF SECURITY

TUSKEGEE CYBER SECURITY PATH FORWARD

The Protection Mission a constant endeavor

Five keys to a more secure data environment

DHS. CMSI Webinar Series

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

CONSULTING IMAGE PLACEHOLDER

Cybersecurity in the States 2012: Priorities, Issues and Trends

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

UNM Information Assurance Scholarship for Service (SFS) Program

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

CyberSkills Management Support Initiative

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

Increase insight. Reduce risk. Feel confident.

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

The Next Generation of Security Leaders

The Landscape of Cyber, critical infrastructure and how Regulation fits in

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

IBM & Security Gov. Point Of Views

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Cybersecurity Definitions and Academic Landscape

FIVE PRACTICAL STEPS

Deloitte Cyber Risk Services Providing trust in a digital world

IBM s Global University Programs & Regional Economic Development

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Critical Controls for Cyber Security.

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Network Management and Defense Telos offers a full range of managed services for:

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Faculdade de Direito, Lisboa, 02-Jul The Competitive Advantage of Cybersecurity

Protecting against cyber threats and security breaches

Building a Team to Capitalize on the Promise of Big Data

An Information Assurance and Security Curriculum Implementation

Can We Become Resilient to Cyber Attacks?

Pamplin College of Business Strategic Plan

Vendor Risk Management Financial Organizations

Address C-level Cybersecurity issues to enable and secure Digital transformation

NORTHEASTERN Distinctively Excellent PhD Education. Context

Security Analytics for Smart Grid

Security Transcends Technology

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Introduction to Cyber Security / Information Security

Gregg Gerber. Strategic Engagement, Emerging Markets

AB 1149 Compliance: Data Security Best Practices

DYNAMIC INFRASTRUCTURE Helping build a smarter planet

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

Cybersecurity Enhancement Account. FY 2017 President s Budget

How To Write A National Cybersecurity Act

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

How To Become A Cybersecurity Consultant

State of Information Security

University of Maryland Cybersecurity Center (MC 2 )

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

National Initiative for Cyber Security Education

Course Descriptions November 2014

The fast track to top skills and top jobs in cyber. Guaranteed.

Security as Architecture A fine grained multi-tiered containment strategy

How To Understand Cloud Economics

7 Things All CFOs Should Know About Cyber Security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Big Data, Big Risk, Big Rewards. Hussein Syed

The Benefits of an Integrated Approach to Security in the Cloud

Transcription:

Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate Strategy viveros@us.ibm.com 1 2013 IBM Corporation 2013 IBM Corporation

Agenda 1. Cybersecurity is Imperative to Industry 2. Findings from a Cybersecurity Survey 3. IBM Initiatives to Support Cybersecurity Education 4. Concluding Remarks 2

Agenda 1. Cybersecurity is Imperative to Industry 2. Findings from a Survey to Leading Academics 3. IBM Initiatives to Support Cybersecurity Education 4. Concluding Remarks 3

Innovative technology changes everything 1 trillion connected objects 1 billion mobile workers Social business Bring your own IT 4 Cloud and virtualization

Motivations and sophistication are rapidly evolving National Security Nation-state actors Stuxnet Espionage, Activism Competitors and Hacktivists Aurora Monetary Gain Revenge, Curiosity Insiders and Script-kiddies Code Red Organized crime Zeus 5

Security skills to help manage heightened security risks are difficult to find 58% 53% 66% are unable to find people with the right skills enable to measure the effectiveness of their security efforts struggle with an understaffed IT team 81% of chief information security officer functions are re-organizing or have been re-organized within the last six months. Corporate Executive Board, Information Risk Executive Council Study, July 2012 6

Agenda 1. Cybersecurity is Imperative to Industry 2. Findings from a Cybersecurity Survey 3. IBM Initiatives to Support Cybersecurity Education 4. Concluding Remarks 7

Analysis approach IBM monitors over 200 cybersecurity academic programs as part of its Cyber Security Innovation program From those 200+ institutions, we selected 15 programs in 6 different countries The selections were made based on geographic location, program maturity, and diversity of approaches We conducted 60 minute qualitative interviews with faculty members, department chairs and others We augmented the research with data from IBM s 2012 Tech Trends which surveyed over 450 students and 250 educators from 13 countries 8

Cybersecurity is top of mind for students, educators, industry and government there is a proliferation of programs and a very strong demand for trained professionals Industry and government are currently facing a significant skills gap There is an enormous focus from national governments The academic programs we interviewed all stated that the demand for their students is extremely high In the future, our interviewees envisioned: A larger threat Increasing demand and more programs New skills needed and taught More rigor and a broader scope The DoHS can t find enough people to hire, and there are not enough people in the pipeline to protect companies, critical infrastructures and governments in future Governments, business and the IT security industry need to work together to make cyber security more visible and attractive as a career. 1 - Mark Weatherford, Deputy Under-secretary for Cybersecurity at the US Department of Homeland Security (DoHS) 9 SOURCES: (1) RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS, ComputerWeekly.com, 2/26/13

Students and educators see security as an important topic they also see it as a barrier to technology adoption and feel their institutions aren t doing enough Percentage of students and educators who see security as a top barrier to technology adoption Less than 60% of students and educators believe their academic programs address the creation and development of IT security practices for these emerging technology areas With all of the progress being made by cybersecurity academic programs, there is still work needed to fully embed information security practices and principles 10 SOURCE: IBM 2012 Tech Trends

Trends and Challenges more of everything - Information security increasing in relevance - Greater attention and demand, needing a response - Expanded domain for cybersecurity - General move from principles to practices of security straining organizational and technology resources Competing resources and topics Lack of equipment, laboratories and hands-on experience Finding qualified instructors and professors Dealing with a very dynamic curriculum 11

Programs are addressing the challenges in different ways taking different approaches to cybersecurity education, but still sharing common principles Formal discipline Theory and practice Teach in an integrated fashion Specializing early & focused on application Basic principles in all programs Independent study and student interest groups Government and industry collaboration Strong faculty development Fundamentals early & focused on theory 12

These trends, challenges, issues and differing perspectives cannot be met by each academic program on its own a set of leading practices is needed 13

Collaborate within your own institution Holistic Interdisciplinary Programs provide a broad spectrum of traditional and emerging technical areas Covers security policy and management Requires an ethics course Offers courses in policy, management, public policy, international affairs, psychology, law, and economics Joint programs with other schools Interdisciplinary education for cybersecurity is essential. It is not only about computer science and engineering. We are working to bring together multiple programs from our university criminology, brain sciences, statistics, ethics, healthcare, informatics, economics and risk analysis to truly develop a comprehensive approach to security thinking. 14 Diverse programs Most programs are focused at the graduate level, fewer have dedicated undergraduate programs Concentrations or minors Dr. Bhavani Thuraisingham Louis A. Beecherl Jr. Distinguished Professor, Department of Computer Science, Executive Director of the Cyber Security Research and Education Institute, The University of Texas at Dallas

Co-evolve with industry and government Extensive laboratory work and projects 15 15 Hands-on Business focused Special interest groups, grey hat clubs and hacking competitions Students as tech support or security operations for university Mandatory internships Formalized processes Industry advisory board Business partners provide inputs on curriculum design Fellowships and scholarships Fund research, sponsor design projects and research centers Send employees for training and advanced degrees We take pride in our close association with industry in building our cybersecurity research and education programs. We can realign our research and curricular focus based on their exposure to the latest trends and needs in the market. Dr. Suku Nair Professor and Chair, Department of Computer Science and Engineering, Director of SMU HACNet Labs, Southern Methodist University

Connect across the global academic community Research oriented Global collaboration Formal research institute(s) that are cross-department Single and multi university research initiatives with national governments Students are the primary form of technology transfer Most global collaborations aren t formal A need for a common language between scientists, industry and policy makers Need the development of a foundation for the science of security There is a significant need for a common language of information security, not within the technical discipline, but between government, academia and different industries information security specialists need to be understood by engineers, policy makers and business leaders, and vice versa. Prof. Dr. Michael Waidner Chair Professor for Security in Information Technology, Technical University of Darmstadt, Director of the Fraunhofer Institute for Secure Information Technology 16

Recommendations 1 Increase awareness and expertise 2 3 4 5 Treat security education as a global issue Approach security comprehensively, linking technical to nontechnical fields Seek innovative ways to fund labs and pursue real-world projects Advance a science of security Strive to balance the near-term requirements of industry and government while educating future faculty members and making investments in research 17

Agenda 1. Cybersecurity is Imperative to Industry 2. Findings from a Cybersecurity Survey 3. IBM Initiatives to Support Cybersecurity Education 4. Concluding Remarks 18

IBM University Programs Research (Collaboration) Readiness (Skills) Recruiting (Jobs) Responsibility (Volunteers) Regions (Smarter Cities, Startups & Workforce) PRODUCTS COMMUNICATIONS WORKFORCE SUPPLY CHAIN TRANSPORTATION BUILDINGS 19 2013 IBM Corporation

The IBM Academic Initiative is designed to grow skills needed to build a Smarter Planet Since inception in 2004: 37,000 faculty across 13,000+ institutions have participated in the Academic Initiative, teaching 130,000 courses to 3.8M students ibm.com/academicinitiative Extensive expertise, capabilities, and community resources to develop world-class curricula No charge access to IBM technology & tools Real-world cases and experiential learning Activities to connect students to an ecosystem of industry partners Helping faculty teach skills relevant to high growth market areas where job growth is brisk 20 2013 IBM Corporation

Execution framework to build cybersecurity human capital while creating awareness of IBM security capabilities CAPABILITIES Securely Provision Operate & Maintain Protect & Defend Investigate Operate & Collect Analyze SKILLS TAXONOMY: Security Consultants, Security Architects, Digital Forensic, Security Analysts, etc. 1 PROGRAMS & CERTIFICATIONS CYBER SECURITY PROFESSIONALS 2 3 IBM SECURITY AMBASSADORS IBM PRODUCTS Red Books Best Practices UNIVERSITY PARTNERS IBM SECURITY BRAND AWARENESS 4 Faculty Award, SUR, OCR, IDR 21 2013 IBM Corporation

IBM Academic Initiative website offers software, redbooks and course material to academics 22 http://www-03.ibm.com/ibm/university/academic/pub/page/security

Enablement for Faculty Members Security Training Program 5 day program to train-the-trainers Overview The program is an introduction to information security around a IBM security taxonomy, built with the aid of publications from security related bodies and associations such as ACM, ISC2, NICE and ISACA. The objective is to introduce the university faculty with the core topics of Information Security, to help them understand the scope and breadth of security measures/controls and management that need to be addressed, risk management and governance models and an introduction to frameworks like ISO27001 and COBIT that oversee the controls. The content can be leveraged to create coursework in universities under a structured set of foundational core topics and electives. Offer to those schools making a commitment to IBM by signing agreements to use IBM technology Syllabus (sample topics) The role of Security 1.What does it mean to be secured? 2.Principles and concepts asset protection, confidentiality, integrity, defense-in-depth 3.Risk identification and analysis 4.Security as a business process 5.Security services authentication, authorization, audit, integrity, nonrepudiation 6.Security management policy management and enforcement, identity assurance. 23 End-to- end Security 1.Establishment of trust what does it take? 2.End-to-end security extend security principles across domains: networks, endpoints, systems, applications, data, people, processes and physical 3.Digital identity lifecycle management, provisioning, separation of duties, password management, etc. 4.Authentication basis of authentication, multi-factor, single sign-on, etc. 5.Access control requirements reliability, consistency, etc. Application Security 1.Federation scenarios of cross-domain services 2.SOA security WSsecurity, identity aware ESB 3.Cryptography encryption and signing algorithms, certificates, PKI, etc. 4.Policy management business, architectural and operational 5.Application security SDLC, secure programming, secure coding practices, software language security support. Data Security Management 1. Data in motion, at rest; in applications, database security, DLP 2. Threat Management, 3. Network Security: perimeter security defense, routers, firewalls, tunneling,etc. 4. Endpoint Management: security patching, security compliance management. 5. Security Intelligence: SIEM, incident response, digital forensics. 6. Security models and architectures. Compliance & Operations 1.Industry Compliance: SOX, HIPAA, NERC-CIP, GLBA. 2.Operational Resilience, Business Recovery, Legal Aspects 3.Industry Solutions non traditional endpoints, embedded systems, implications of industry innovations: Smart Grid, Smart Buildings, Connected Home. 4.Security Operational Centers- SOC-NOC integration. 5.Educational Resources

Cyber Security Operations Center for Educational Purposes Provide students with hands-on approach to learning Cyber Security and to experience real world challenges. Specific tasks may include: Monitor university or other networks (real and/or simulated) Students perform assessment of security events, learning approaches on response to security breaches, and forensics, mitigation techniques Students can build dashboards, build reports, and learn the tools to be most effective Students learn to anticipate future threats based on behavioral analysis using real-time and historical data This hands-on lab could be equipped with monitors, network intrusion detection devices, application scanning software, security intelligence software, among others. 24 2013 IBM Corporation

Agenda 1. Cybersecurity is Imperative to Industry 2. Findings from a Cybersecurity Survey 3. IBM Initiatives to Support Cybersecurity Education 4. Concluding Remarks 25

Concluding Remarks Become an active participants of the ecosystem to build security skills by contributing with your expertise Ensure cybersecurity education is pervasive across all disciplines business, public policy, engineering, computer science, etc. Build capabilities to the new perimeter of systems and solutions beyond the network Approach security with big data & analytics behavior analysis Promote hands-on approaches that would allow students to move beyond classroom exercises 26

27 2013 IBM Corporation