Cyber Security in the University of Oxford: Collaborating without Conforming?



Similar documents
The Global Cyber Security Capacity Centre

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

How To Understand And Understand The European Priorities In Information Security

Advancing cyber security. Cyber Security Academy

The UK cyber security strategy: Landscape review. Cross-government

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

CESG Certification of Cyber Security Training Courses

Internet Governance and Cybersecurity Patrick Curry MACCSA

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

Cybersecurity Framework: Current Status and Next Steps

How To Write An Article On The European Cyberspace Policy And Security Strategy

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Security & privacy in the cloud; an easy road?

Cyber security Building confidence in your digital future

CASE STUDIES ON CYBER SECURITY

UNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES

Big Data, Big Risk, Big Rewards. Hussein Syed

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

Addressing Cyber Risk Building robust cyber governance

UK s new Research Institute investigates the science of cybersecurity

Research Topics in the National Cyber Security Research Agenda

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

TUSKEGEE CYBER SECURITY PATH FORWARD

CONTENT. King Hussein Faculty of Computing Sciences

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

MSc Cyber Security. identity. hacker. virus. network. information

CYBER SECURITY TRAINING SAFE AND SECURE

Quick Reference. Future Manufacturing Platform Grants

National Cyber Security Policy -2013

WORK PROGRAMME Topic ICT 9: Tools and Methods for Software Development

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

Cybersecurity in the Commonwealth: Setting the Stage

ENISA workshop on Security Certification of ICT products in Europe

Stakeholders meeting. Ethical protocols and standards for research in Social Sciences today

8970/15 FMA/AFG/cb 1 DG G 3 C

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

9360/15 FMA/AFG/cb 1 DG G 3 C

Cyber Security Strategy

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

DEFENCE TECHNICAL UNDERGRADUATE SCHEME (DTUS) FACT SHEET FOR DESG ENTRY

Cyber security Building confidence in your digital future

Cybersecurity at ODU ( )

FACULTY OF THE BUILT ENVIRONMENT /

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

Kangas Cybersecurity strategy

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Committees Date: Subject: Public Report of: For Information Summary

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Smart grid security analysis

Learning and Development Programme

Framework for Improving Critical Infrastructure Cybersecurity

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

National Cyber Security Strategy

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

CENTRAL MANCHESTER UNIVERSITY HOSPITALS NHS FOUNDATION TRUST

CyberSecurity Solutions. Delivering

The enemies ashore Vulnerabilities & hackers: A relationship that works

Master of Science in Cyber Security and Management

Queen Mary, University of London An Overview

On the European experience in critical infrastructure protection

Connecting things. Creating possibilities. A point of view

Towards closer EU-ASEAN collaboration in cybersecurity

HORIZON Lessons Learned from the First ICT Calls of Horizon 2020 and Conclusions on Cypriot Participation. Research Promotion Foundation

University Business & Start-up Support

Transcription:

Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy

Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user s assets. Organization and user s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user s assets against relevant security risks in the cyber environment. ITU-T X.1205

A personal journey psychology anthropology philosophy... Computer Science Cyber Security Software Engineering Law, business, politics, economics... Systems Security

Cyber Security Activity in the University

Research Education University itself Oxford Intern Saïd Business Oxford Martin Oxford e-res IT Services Computer Sci Blavatnik Sch

Research The foundations of non-standard authentication Corporate Insider Threat Detection: Cyber Security Inside and Out Evaluating Usability, Security, and Trustworthiness of Ad-hoc Collaborative Environments Federated Secure Sensor Network Laboratory Self-organizing Adaptive Technology underlying Resilient Networks Trustworthy Digital Systems Trustworthy Clouds - Privacy and Resilience for Internet-scale Critical Infrastructure Trust Enabling Augmented-Reality Support For Information-Environments Physical attack containment CyberVis Ensuring Consent and Revocation Framework for Responsible Research & Innovation in ICT Future Home Networks and Services Unleashing the power of information for a sustainable future High Performance Computing Technologies for Smart Distribution Network Operation Identity security aggregation threat Integrated Mobile Security Kit Information Security University Information Security Policies Information Security Project Insider threat detection

Academic Centres of Excellence in Cyber Security Research GCHQ-EPSRC sponsored programme; modelled on a large, established scheme in the USA. Review process: assessment based on research portfolio, doctoral programme, staff profile, vision and plans Eight centres recognised in 2012; three more in 2013 Oxford, Bristol, Royal Holloway, Imperial, UCL, Southampton, QUB, Lancaster, Cambridge, Birmingham, Newcastle Academic Centre of Excellence in Cyber Security Research

Our aim is to understand how to deliver effective cyber security both within the UK and internationally. We will make this knowledge available to governments, communities and organisations to underpin the increase of their capacity in ways appropriate to ensuring a cyber space which can continue to grow and innovate in support of well-being, human rights and prosperity for all.

availability and use of tools to support control of cyber risk collect case studies, examples of best practice develop metrics and models of cyber security capacity maturity disseminate and use metrics to drive improved practice national and international policy working groups legal and regulatory environments availability of a high-quality cyber securityskilled workforce and leadership, society, culture and the susceptibility of people to cyber crime

Sadie Creese Dept. of Computer Science Ian Brown Oxford Internet Institute Marco Gercke Cybercrime Research Inst. Paul Cornish Exeter University Bill Dutton Oxford Internet Institute Ivan Toft Blavatnik School of Govt. Angela Sasse UCL David Upton Saïd Business School Andrew Martin Dept. of Computer Science Michael Goldsmith Dept. of Computer Science Fred Piper Royal Holloway U. London

new model of PhD/DPhil promoted and funded by research councils 3.6m grant; 12 funded places per year; 3 annual intakes year one: intensive education in cyber security two mini-projects (internships encouraged) seminars, industry deep dives, field trips years two four: research in an Oxford academic department skills training throughout retain contacts with internship companies security of big data effective verification and assurance cyberphysical security real-time security

cyber security principles: systems cyber security principles: risk and operations usable security security architectures and information defence high-integrity systems engineering cross-disciplinary Research Methods forensic techniques and criminology security of distributed Systems systems modelling tools cyber security analytics and decision support malware skills business process and context security policy and governance of cyberspace international relations and cultural norms ethics

Collaborating GCHQ support and other parts of government EPSRC Global Uncertainties Programme regular research grants Academic Centres of Excellence Research Institutes CDTs Industrial Support and Collaboration direct funding TSB projects CASE studentships EU FP7 / Horizon 2020 collaborating across disciplines brings some (now) well-known challenges superb opportunities but their nurture takes time and resources even collaborating within disciplines can be novel cyber =? = reality issues of nomenclature... bounding... scope

Collaborating... not conforming intelligence agencies make for strange bedfellows staying at arm s-length can be very desirable... similar concerns for other parts of government budgets and timescales (and topics) not always appropriate... and companies?! classic dichotomies of short/long-term research; theory/practice; scientific curiosity/economic imperative particularly notable in the cyber security domain pressing, urgent problems abound tendency to treat the symptoms not the cause balance isn t at all bad, actually! but needs on-going attention

Conclusion Universities exceedingly well-placed to contribute unique mix of skills for collaboration Government funding welcome drinking from a fire-hose anticipated drought someday Who sets the agenda?! All sides still learning on this