Beyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts
|
|
- Barbra Bryant
- 5 years ago
- Views:
Transcription
1 Beyond Academia: Cyber Security Research Impacts January 2017 Never Stand Still The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 1
2 ACCS INCUBATOR IMPACT #1: MILITARY DEFENCE OF CYBER SPACE The Australian Centre for Cyber Security (ACCS) was established in the University of New South Wales Canberra in mid It has a small core staff which plugs into an additional 55 academic staff across the university in Sydney and Canberra. This report relates to the cumulative impact of the ACCS Incubator (the small core unit in Canberra) in the period , even though most staff only joined the centre recently. This is a pioneering team undertaking research and education, some of which is unique in Australia. It is led by a nationally prominent researcher who has received nine Category 1 research grants. Staff Professor Jill Slay AM Dr Benjamin Turnbull Dr Elena Sitnikova Dr Nalin Asanka Gamagedara Arachchilage Professor Greg Austin Tim Wilson-Brown Dr Gideon Greech Dr Nicolas Micalieff Dr Jai Galliott The ACCS Incubator has eight cross-cutting research priorities, as set out in our Research Plan, a publicly available document. 1. Cyber-enabled war, ADF strategies and capability 2. Assessing mission-critical aspects of cyber attack and defence 3. Cyber intrusions, detection and forensics 4. Cyber education and skilling, especially for security agencies 5. Human aspects of cyber security and privacy 6. Cyber dependency and resilience of critical national infrastructure 7. International threat environment, diplomatic responses and national cyber security policy 8. Ethics in cyber space Doctoral Candidates Lt. Col. Lisa Davidson Lt. Col. David Ormrod Sqn. Ldr. Daniel Clark Lt. Col. Andy Williams Ms. Awanthika Senarath Mr. Nour Moustafa Mr. Chamila Dilshan Wijayarathna Mr. Ben Witham Mr. Steven Wilson Since July 2014, ACCS has become an important national asset for research and ideas informing security policy in cyber space (defence, diplomacy, counter-terrorism, espionage, cyber technologies) 1. ACCS is the only university centre in the country now consistently researching the topic of Australian military policy for cyber war; and this research has been discussed with relevant senior officials on a variety of occasions 2. ACCS partnered with the Defence Science and Technology Group (DSTG) in November 2015 to organise a one-day symposium, with research papers, on Redefining R&D Needs for Australian Cyber Security, the first such event of its kind in the country 3. Knowledge transfer through a suite of Master s degrees unique in Australia oriented to national security agencies and defence force, and associated professional development courses ($2 million new income in 2016) 4. An ACCS staff member was the only Australian scholar to provide a research paper as a public submission on cyber war issues to the last Defence White Paper process ( ) 5. The Australian Army and RAAF send Ph D students to ACCS for supervised research to support post-study leadership roles in fields directly related to their doctoral studies 6. Relevant national security agencies regularly invite ACCS staff and doctoral students to advise on the results of their research 7. ACCS staff contribute regularly to globally prominent media outlets (.e.g. Boston Globe and The Conversation), journalist reports (e.g. MIT Technology Review), and industry conferences on these military-related subjects 8. ACCS organises well-attended briefings for Australian officials and foreign diplomats on relevant military-related research 9. ACCS staff brief their research to Australian Defence colleges 10. ACCS staff interact with officials in the United States Department of Defense on research findings, with one scholar briefing in the Office of the Secretary for Defense 2 The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 3
3 SECURITY IN CYBER SPACE: THE MATRIX OF RESEARCH AREAS Software Power Supply Countering Terrorism Hardware Protecting Children Privacy Securing the Digital Economy Protecting Critical Infrastructure Policy Cyber Enabled War Espionage Networks Education & Skills Payload Countering Crime Information Ecosystem 4 The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 5
4 IMPACT #2: CYBER SECURITY IN THE CIVIL SECTOR ACCS has become an important resource for research and ideas informing national policy on civil sector (non-defence) cyber security 1. ACCS is the only university centre in the country to have published a research paper previewing the Australian government s April 2016 Cyber Security Strategy and to have published a research paper analysing it after the release of the strategy 2. ACCS staff have been invited to brief leading Australian corporations, business groups, and government agencies (including ANZ, NBNCo, ASIC, Thales, Childrens esafety Commissioner) on these topics 3. ACCS has received research grants from the private sector to develop some of that work, especially around usable security 4. The Centre Director has been invited to lead a national level task force on professionalisation of the cyber security workforce in Australia 5. Another ACCS scholar has been invited to join an industry-based national task force on cyber security 6. ACCS secured a partnership with Data 61 to be a national focal point for research on human aspects of cyber security 7. ACCS staff speak regularly at industry conferences on these topics in Australia and overseas (with events in 2016 alone in Beijing, Washington DC, Oxford, London, and Delhi) 8. An ACCS researcher received positive and negative responses to a proposal to set up a Cyber Civil Corps (a cyber militia ) under the direction of the Minister for Communications 9. An ACCS researcher is working as part of a team to develop a non-profit organisation in the field of cyber security community-based education IMPACT #3: TECHNICAL PROBLEM SOLVING FOR GOVERNMENT AND BUSINESS ACCS has become an important resource for providing technical solutions through research to selected problems of cyber security for government agencies and corporations 1. Secured partnership with Data 61 (CSIRO) to be a national focal point for research on human aspects of cyber security 2. Leading corporations in India and the United States have contacted us to discuss application of our published research on social engineering for system intrusion 3. Leading commercial firms in Melbourne sponsored a dedicated presentation by us of a technological solution to combat social engineering for system intrusion 4. We have consulted with the Office of the Children s e-safety Commissioner in Australia on developing a Cyber-Stalking Awareness Toolkit to protect Australian teens 5. Recognition of research excellence through invitations to two senior staff to join national level task forces (a chairing role in one task force convened by the Australian government and a professional peak body, and a membership role in another task force convened by private industry) 6. The U.S. Navy awarded a research grant to an ACCS researcher 7. Other business-in-confidence activities *Research impact is the demonstrable contribution--beyond academia--that research makes to the economy, society, culture, national security, public policy or services, health, the environment, or quality of life, beyond contributions to academia. 10. Visible and consistent profile in public debates on a high priority set of national cyber security issues: among policy constituencies, business communities, civil society and academic colleagues in Australia and internationally, many of whom respond directly to our specific research findings 6 The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 7
5 For More Information: Luke Garner (Centre Manager) E: T : Professor Jill Slay (Director, ACCS) E: j.slay@adfa.edu.au Cricos Provider Code: 00098G CMU The Australian Centre for Cyber Security
Redefining R&D Needs for Australian Cyber Security
Redefining R&D Needs for Australian Cyber Security Adams Auditorium, ADFA, 16 November 2015, Canberra Register at: https://goo.gl/g6qyfn This international conference is organized by the Australian Centre
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationSECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC
SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC CivSec 2018 CIVIL SECURITY CONGRESS AND EXPOSITION 1-3 MAY 2018 MELBOURNE AUSTRALIA MELBOURNE CONVENTION AND EXHIBITION CENTRE www.civsec.com.au
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationRESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016
RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationBachelor of Information Technology
Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure:
This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14553, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationBRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationCESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK
CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure
More informationDr. Imran Khan University of Nebraska-Lincoln Marketing (402)
Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics
More informationEnhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence
Enhancing Cooperative Energy Security NATO Energy Security Centre of Excellence NATO Hub on Energy Security Expertise The NATO Energy Security Centre of Excellence is an international hub on energy security
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationTERMS OF REFERENCE FOR INTERNSHIPS THE WHO INTERAGENCY COORDINATION GROUP ON ANTIMICROBIAL RESISTANCE FOR MEDICAL STUDENTS IN IFMSA
TERMS OF REFERENCE FOR INTERNSHIPS THE WHO INTERAGENCY COORDINATION GROUP ON ANTIMICROBIAL RESISTANCE FOR MEDICAL STUDENTS IN IFMSA Location: Geneva, Switzerland Duration: 2 months or longer (flexible)
More informationSEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.
SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationU.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E ,
U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E 2 3-2 6, 2 0 1 9 Cyber Week Tel Aviv, 2019 Now in its 9th year, Cyber Week is recognized as one of the top international cybersecurity conferences
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationDecember 5-6,
December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland
More informationThe need for developing a cyber security ecosystem of professionals
The need for developing a cyber security ecosystem of professionals 24 th March 2017 Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director shiva@pinaka.co.tt @PinakaTT www.pinaka.co.tt In
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationTURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN
DISASTER MANAGEMENT BUREAU STRATEGIC PLAN 2005-2006 PREFACE Historical statistics would suggest that Bangladesh is one of the most disaster prone countries in the world with the greatest negative consequences
More informationNational Business Crime Partnership Association
National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one
More informationRequest for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator
Request for Expression of Interest Consultant - Project Coordinator Project: I-CARE Global Imperative Indicator Unidentified Victims Portrayed on Child Abuse Images Organisational Background ECPAT International
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationIntroduction. January 1, 2015
Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high
More informationProfessor Robert Clark Chief Defence Scientist & Chief Executive Officer
Professor Robert Clark Chief Defence Scientist & Chief Executive Officer Defence Science & Technology Organisation Department of Defence Australia 10 th Annual SET Conference 21 April 2009 The Australian
More informationDefence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology
Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making
More informationNCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time
NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to
More informationMs. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations
Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative
More informationAbout Us. Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016
Supported by About Us Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016 Academia Vision: To set up a seamless platform for
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationRole Type Pay Band Location Duration Reports to: To manage, enhance and embed the British Council Nigeria Security Risk Management function.
Role Title Head of Security Nigeria Role Information Role Type Pay Band Location Duration Reports to: Advisory, policy and expertise 8 Lagos or Abuja Indefinite Director Operations Nigeria Role purpose
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationNATIONAL LAW UNIVERSITY, DELHI CENTRE FOR COMMUNICATION GOVERNANCE CALL FOR APPLICATIONS (CYBERSECURITY)
NATIONAL LAW UNIVERSITY, DELHI CENTRE FOR COMMUNICATION GOVERNANCE Sector-14, Dwarka, New Delhi (India) CALL FOR APPLICATIONS (CYBERSECURITY) The Centre for Communication Governance at the National Law
More informationIsrael and ICS Cyber Security
Israel and ICS Cyber Security Dr. Tal Steinherz Chief Technology Office Israel (INCB) 1 October 2015 The INCB The Israeli leads efforts and advises the government on: Cyber Ecosystem Establishing techno-scientific
More informationSubmission to AASB: Revised Conceptual Framework Phase 1
Submission to AASB: Revised Conceptual Framework Phase 1 August 2018 8 August 2018 The Chairperson Australian Accounting Standards Board PO Box 204 Collins Street West Victoria 8007 Australia Dear Kris
More informationPosition Title: IT Security Specialist
Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such
More informationThe Case for National CSIRTs
The Case for National CSIRTs ENOG 12 Yerevan 3-4 Oct 2016 What is a CERT (CSIRT)? A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationOptus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director
Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director Our Vision Support Australia's growth in a complex world via education and research excellence in cyber security
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationGovernment-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot
STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationBuilding Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018
Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral
More informationSOUTH DAKOTA BOARD OF REGENTS. Budget and Finance ******************************************************************************
SOUTH DAKOTA BOARD OF REGENTS Budget and Finance REVISED AGENDA ITEM: 7 I DATE: October 4-6, 2016 ****************************************************************************** SUBJECT: DSU Madison Cyber
More informationTRB WORKSHOP ON CRITICAL INFRASTRUCTURE PROTECTION: A NATIONAL PRIORITY
TRB WORKSHOP ON CRITICAL INFRASTRUCTURE PROTECTION: A NATIONAL PRIORITY Summary Report SUNDAY, JANUARY 13, 2002 1:30 5:00 P.M. OMNI SHOREHAM HOTEL WASHINGTON, D.C. W27 Critical Infrastructure Protection
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationBetween 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.
Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationUSE CASE STUDY. Leveraging Data Through Partnerships The United States Agency for International Development (USAID)
USE CASE STUDY Leveraging Data Through Partnerships The United States Agency for International Development (USAID) A Product of the Federal CIO Council Innovation Committee VERSION 1.0 / 2015 USE CASE
More informationNSW Collaboration for Defence Benjamin Hayes Assistant Secretary Defence Capability & Innovation. 15 February 2017
NSW Collaboration for Defence Benjamin Hayes Assistant Secretary Defence Capability & Innovation 15 February 2017 Developing the industry we need to achieve our strategic and capability goals The Defence
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationBI Building Integrity
BI Building Integrity Programme Transparency, Accountability and Integrity in the Defence and Security Sector About the NATO Building Integrity Programme THE BUILDING INTEGRITY PROGRAMME: AN OVERVIEW The
More informationNSPCC JOB DESCRIPTION
NSPCC JOB DESCRIPTION JOB TITLE: DIVISION: DEPARTMENT: LOCATION: Senior Information Specialist National Services Knowledge and Information London DATE APPROVED: January 2016 Context and Background The
More informationHow to supply to Defence (The 20 minute version)
How to supply to Defence (The 20 minute version) Defence Business Access Office Rod Kenafacke State Manager Victoria professionalise re-prioritise standardise benchmark improve industry relationships and
More informationDefence, Safety and Security
Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationChartered Membership: Professional Standards Framework
Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent
More informationDIT DSO Defence & Security Symposium 2017
DIT DSO Defence & Security Symposium 2017 The Department of International Trade s Defence & Security Organisation Symposium takes place in Central London on Tuesday 25 April 2017. This flyer encourages
More information2014 Annual Convention. Expert Witnesses
2014 Annual Convention Expert Witnesses 1.5 General CLE Hours April 30 May 2, 2014 Columbus Contributors Bartley J. Eckhardt Robson Forensic Inc. Lancaster, Pennsylvania Mr. Eckhardt is a Mechanical Marine
More informationSpace Generation Fusion Forum 2013 IN SUPPORT OF THE UNITED NATIONS PROGRAMME ON SPACE APPLICATIONS
Space Generation Fusion Forum 2013 IN SUPPORT OF THE UNITED NATIONS PROGRAMME ON SPACE APPLICATIONS Space Generation Fusion Forum 2013 6/19/13 Space Generation Advisory Council SGAC is a non-profit organisation
More informationASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT
ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT Adelina Kamal, Head of Disaster Management & Humanitarian Assistance Division, ASEAN Socio Cultural Community Department, ASEAN Secretariat 11 th ASEAN
More informationSchool of Information Studies (ischool)
School of Information Studies (ischool) About the ischool Be a Leader in Nearly Any Industry If you re interested in a career that connects ideas with practice and gives you the skills to solve problems,
More informationThe role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group
The role of COP/ITU on international level Dr Ibrahim Al dabal chair of child on line council working group I nformation & I nternational C ommunication T elecommunication T echnologies U nion WHO WE
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationStatement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism
Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Meeting of the United Nations Security Council Counter-Terrorism Committee Mr. Chairman, Excellencies,
More informationOverview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET
Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel
More informationDefence and Security. At a Glance
Defence and Security At a Glance Welcome to Cranfield University One of the world s largest providers of postgraduate education in defence and security technology and management, working on classified
More informationShared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay
Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet
More informationUNODC/CCPCJ/EG.4/2017/CRP.1
3 April 2017 English only Expert Group to Conduct a Comprehensive Study on Cybercrime Vienna, 10-13 April 2017 Information on the implementation of Crime Commission resolution 22/8 Note by the Secretariat
More informationIMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE
Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification
More informationCollege Of. Technological Innovation
College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction
More informationFOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013
Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION
More informationAn overview of the CERT/CC and CSIRT Community
An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion
More informationGlobal Wildlife Cybercrime Action Plan1
Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.
More informationBreaking Out the Cybersecurity Workforce Framework
Breaking Out the Cybersecurity Workforce Framework Ray Trygstad Industry Professor of Information Technology & Management; Associate Director, IIT Center for Cyber Security & Forensics Education The Framework:
More information