SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities



Similar documents
Instructions for applying for Exemptions:

Student Awards Agency for Scotland

CASE STUDIES ON CYBER SECURITY

The Scottish Informatics and Computer Science Alliance (SICSA) Annual Collaborative Progress Report 2012

Horizon 2020 Secure Societies

Bellevue University Cybersecurity Programs & Courses

Introduction to Cyber Security / Information Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Cyber Security in the University of Oxford: Collaborating without Conforming?

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Architecture and the Built Environment; building science, civil engineering, construction

Certified Cyber Security Analyst VS-1160

National Guidance for Clinical Academic Research Careers for Nursing, Midwifery and Allied Health Professions in Scotland ENTER

From. HNC/D to Degree

MSc in Physical Activity for Health PROPOSAL

By Pauline Robertson Mar 2015

Cyber crime risk management protecting your business 4 November 2015

List of courses eligible for Postgraduate Funding

2. Cyber security research in the Netherlands

Qualification Information Profiles (QIPs) for Access to HE Diploma and Scottish Wider Access Programme (SWAP)

Cairngorms National Park Business Support Audit User Guide. The Cairngorms National Park Area as a whole

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

H2020 "Secure Societies" Work Programme Digital Security 2015

Framework for Improving Critical Infrastructure Cybersecurity

Horizon 2020 Secure Societies

Cyber Security and Digital Forensics Training Platform

Big Data and Society: The Use of Big Data in the ATHENA project

Michelle Govan & Anand Philip Network & Security Engineering

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Progression to University Guide

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

Internet Governance and Cybersecurity Patrick Curry MACCSA

Transformational Smart Cities: cyber security and resilience

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Research Topics in the National Cyber Security Research Agenda

National Cyber Crime Unit

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Horizon 2020 Secure Societies

Outline Investment Roadmap

University Business & Start-up Support

Module 3 Applications of Information Systems: Enterprise Systems

Géraud Guilloud Horizon-2020 appels Atelier Big Data Technologies & Application

Digital War in e-business

Certified Cyber Security Analyst VS-1160

B.A. in Information Systems

Security & privacy in the cloud; an easy road?

Addressing Cyber Risk Building robust cyber governance

An enterprise grade information security & forensic technical team

Dept. of Financial Information Security

Taxi And Private Hire Car Licensing Consultation on The Impact of Modern Technology

2010 No EDUCATION, ENGLAND. The Education (Recognised Bodies) (England) Order 2010

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Project 2020: Preparing Your Organization for Future Cyber Threats Today

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

University of Maryland Cybersecurity Center (MC 2 )

ESKISP Conduct security testing, under supervision

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

ISO Information Security Management Services (Lot 4)

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Unit 3 Cyber security

Cyber Innovation and Research Consortium

REPORT. Next steps in cyber security

The UK cyber security strategy: Landscape review. Cross-government

Northrop Grumman Cybersecurity Research Consortium

MSc Cyber Security. identity. hacker. virus. network. information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Transcription:

SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive

What is SICSA? Collaboration of Scottish Universities whose goal is to develop and extend Scotland s position as a world leader in informatics and Computer Science research and Education 30 SICSA Funded research Staff Offered more than 90 PhD prize studentships Summer Schools Fellowships Informatics Ventures Supporting Scotland s technology innovators and entrepreneurs (CEO Masterclass, EIE, DEMOfest, IV Tuesday)

SICSA Universities University of Aberdeen University of Abertay University of Dundee University of Edinburgh Edinburgh Napier University University of Glasgow Glasgow Caledonian University Heriot-Watt University Robert Gordon University University of St Andrews University of Stirling University of Strathclyde University of West of Scotland

Cyber Security Research by Sector Anonymity Social Network Analysis Biometrics Systems Security CCTV/Image Recognition Usability Cloud Testing/Validation Complexity Cybercrime Cryptography Fraud Digital Forensics Steganography Ethical Hacking Natural Language Formal Methods Communication protocols/networking Human-Computer Interaction Authentication Intelligence Analysis Self-Healing Interfaces Quantum Modelling Text Mining Privacy Database Security Proofs Identity Management Trust

Examples of Research Jinchang Ren University of Strathclyde Visual Surveillance, Archive Restoration, Intelligent Information Processing, Pattern Recognition.. George Weir University of Strathclyde Cybercrime, digital forensics and network security Karen Renaud University of Glasgow Usability of Security Systems, Graphical Authentication Mechanisms, Electronic Voting, Privacy Ishbel Duncan University of St Andrews Cloud Security, Computer Security and Terrorism, Network Security, Penetration Testing, Privacy, Security and Trust in Software Systems and the Internet

Why Partner with an HEI? Mandatory Requirement Track Record Financial Credibility Established Frameworks for Leading Researchers Requiring Impact SDI/SE/Scotland Europa Funding 2007-2012 University of Edinburgh 27M (top 5 in UK) Heriot Watt 10M University of Glasgow 10M University of Dundee 5M University of St Andrews 3M University of Strathclyde 3M

How do I partner with an HEI in Cyber Security? Find partner group(s) Existing relationships Contact Interface/Universities Contact Cyber Security Business Development Find other European Partners Universities can help Contact Cyber Security Business Development

Interface Journey of Engagement Funding Scottish SMEs HEI Collaboration 5000 Fact finding Travel

PEER Funding SICSA Funding (SFC & SE) Support to enable engagement of Scottish SMEs in collaborative European Projects 1000/ 3000/ 10000

Horizon2020 Security Calls DS1-2014 Privacy DS2-2014 Access Control DS3-2015 The role of ICT in Critical Infrastructure Protection DS4-2015 Secure Information Sharing DS5-2015 Trust eservices DS6-2015 Risk management and assurance models FCT-1-2015 Tools and infrastructure for the fusion of big data include cyber offences generated data for forensic investigation FCT-6-2015 Law Enforcement capabilities 2: Detection and analysis of terroristrelated content on the Internet FCT-16-2015 Ethical/Societal Dimension Topic 4 - Investigate the role of social, psychological and economic aspects of the processes that lead to organised crime (including cyber related offences) DRS-12-2015 Critical Infrastructure Protection topic 1: Critical Infrastructure smart grid protection and resilience under smart meters threats DRS-14-2015 Critical Infrastructure Protection topic 3: Critical Infrastructure resilience indicator - analysis and development of methods for assessing resilience

Contact Martin Beaton Martin@informatics-ventures.com Rm 8.11 Appleton Tower 11 Crichton Street University of Edinburgh EH8 9AB Cyber Breakfast 25 th February http://tinyurl.com/nzb9wc3