Collaboration on Cybersecurity program between California University and Shippensburg University
|
|
- Brendan Wells
- 5 years ago
- Views:
Transcription
1 Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California, PA Jeonghwa Lee Department of Computer Science and Engineering Shippensburg University, Shippensburg, PA 2014 Academic Innovation Conference: Learning Communities in the Disciplines Shippensburg, PA
2 Outline Collaboration background Definition of cybersecurity Economics of cybersecurity Demands on cybersecurity work field Employment outlook Cal U proposed master on cybersecurity
3 Collaboration background Program proposal for Cybersecurity from Cal U Initiated in 2012 Targeted as a Professional Science Master degree in 2013 Letter of intent submitted to PASSHE in May 2013 Full proposal submitted in June 2014 Ship CS MS revision was approved in spring 2014 Approved by Cal U Council of Trustee on 09/23/14 Approved by PASSHE Board of Governors on 10/9/14
4 Collaboration between Cal U & Ship U Proposed cybersecurity program is pure online 30 credits: 24 required + 6 elective Principle courses: PSC 600: Operating Systems (3 credits) PSC 640: Computer Networking (3 credits) PSC 755: Wireless Network and Security (3 credits) PSM 645: Applied Cryptography (3 credits) PSC 735: Biometrics (3 credits) PSC 745: Cybersecurity Risk Management and Assessment (3 credits)
5 Cyber Security Concentration at Ship CSC534 Computer Security PSC735 Biometrics PSC745 Cybersecurity Risk Management and Assessment PSC755 Wireless Network and Security
6 What is Cybersecurity? Cyberspace: A global domain consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks.
7 What is Cybersecurity? Cybersecurity is for protecting information such as computers, programs, and data from unintended access, change, and damage, and implementing policies and procedures for recovery from breaches and data losses
8 Economics of Cybersecurity The global cybersecurity market is expected to reach $120.1 billion by 2017 and grow at a Compound Annual Growth Rate (CAGR) of 11.3% from 2012 to In 2011, North America accounted for about 40.1% of the global revenue in the field, and is expected to grow at a CAGR of 9.2% from 2012 to 2017.
9 Cyber attack accidents Number of cyber attack incidents reported by federal agencies
10 Annualized cost of cybercrime Median is is $9.1 million an increase from last year s median value of $6.2. Mean value is $11.6 million, an increase of $2.6 million
11 Funding and deals on cybersecurity
12 Demands President Obama in 2012 urged the Congress to pass cyber security legislation, which according to him is a key step forward in securing the country against increased cyber threat. The government needs to hire at least 10,000 experts in the near future and the private sector needs four times that number. [1] Pittsburgh area is the second most difficult region in Mid- East to find cybersecurity workers Washington, D.C. region has the greatest job growth with five year gains of more than 250% in Richmond, VA [1]. Cybersecurity experts needed to meet growing demand, by Alexander Fitzpatrick, May 29, 2012
13 Employment outlook National employment projection
14 Employment outlook (cont.) Mid-east employment projection
15 Employment outlook (cont.) PA employment projection
16 Professional Science of Master (PSM) Demands of PSM, celebrating 300 in Oct 2013
17 Professional Science of Master (PSM) Demands of PSM, celebrating 300 in Oct 2013 One of the most important innovations in graduate science education [2] Graduates of PSM programs are in demand by banks, insurance and financial companies needing financial mathematicians; [3] [2]. Needed: Support for Professional Science Master's Degrees by Michael Teitelbaum and Carol Lynch, published in August 2010 for the Chronicle of Higher Education [3]. Science Professionals: Master's Education for a Competitive World (2008) published by National Research Council
18 Uniqueness of the Program no cybersecurity program had been affiliated with PSM no PASSHE universities currently offer a master s degree (PSM or other) in cybersecurity Information Security master s offered by East Stroudsburg University
19 Program outcomes PEO1: Possess a depth of knowledge in current cybersecurity practices PEO2: Apply critical thinking and problem-solving skills in preventing and responding to cybersecurity incidents; PEO3: Utilize business and management competence to excel in employment in a specialized field of information security PEO4: Demonstrate the knowledge and skills necessary to specify, design, implement, and/or communicate solutions to cybersecurity challenges PEO5: Work effectively in individual and group oriented settings PEO6: Communicate effectively in the professional environment in individual and group situations PEO7: Participate in lifelong learning to remain current with trends in the profession
20 Student Learning Outcomes SO1: Demonstrate advanced knowledge in computer networking, security and cryptography for industry, SO2: Integrate principles and techniques of risk analysis, project planning and change management in the development of information security strategies, SO3: Describe how to provide message privacy, integrity, authentication and non-repudiation using network security practices and infrastructure hardening techniques, SO4: Integrate project development skills in producing a security system, SO5: Function effectively as a member or a leader on a technical team, SO6: Address professional and ethical responsibilities including a respect for diversity, and SO7: Commitment to lifelong learning in the cybersecurity environment.
21 Curriculum
22 Curriculum Required Courses (18 credits): PSC 600: Operating Systems (3 credits) PSC 640: Computer Networking (3 credits) PSC 755: Wireless Network and Security (3 credits) PSM 645: Applied Cryptography (3 credits) PSM 799: PSM Capstone Course (6 credits) Professional Skills (6 credits): PSM 675: Project Management (3 credits) PRF 760: Leadership and Professional Development (3 credits) Elective Courses (6 credits): Choose 2 courses from the following PSC 735: Biometrics (3 credits) PSM 721: Database Management (3 credits) PSC 745: Cybersecurity Risk Management and Assessment (3 credits)
NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationCALIFORNIA CYBERSECURITY TASK FORCE
CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity
More informationCollege Of. Technological Innovation
College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction
More informationCybersecurity: Federalism as Defense-in-Depth
SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationComputer Information Science xxx
1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationAcademic Program Review Cyber Security College of Southern Nevada 2017
Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationUTCS Scholarships for Service
Preparing for a Career in Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Fall, 2018 Slideset 1: 1 We Need Cyber Warriors: Recent News Items The Cybersecurity Talent
More informationCandidate Profile for the Position of Vice President, Education and Certification
Candidate Profile for the Position of Vice President, Education and Certification * * * * This profile provides information about the National Automatic Merchandising Association and the position requirements
More informationMedia Kit. California Cybersecurity Institute
Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government
More informationCOUNTRY PROFILE. Mexico
COUNTRY PROFILE Mexico Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationGRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT
GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with
More informationBSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.
Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationCOUNTRY PROFILE. Croatia
COUNTRY PROFILE Croatia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationCOUNTRY PROFILE. Bulgaria
COUNTRY PROFILE Bulgaria Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationGive Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business
Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business Women Impacting Public Policy (WIPP) is a nonprofit, membership organization working to increase the economic
More informationCOUNTRY PROFILE. Colombia
COUNTRY PROFILE Colombia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE AUSTRALIA
COUNTRY PROFILE Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS TRENDS
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationIT Specialist Program Format 5, page
FORMAT 5 Submit originals and one copy and electronic copy to Governance/Faculty Senate Office (email electronic copy to fysenat@uaf.edu) SUBMITTED BY: PROGRAM/DEGREE REQUIREMENT CHANGE (MAJOR/MINOR) Department
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationCOUNTRY PROFILE. Estonia
COUNTRY PROFILE Estonia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationCOUNTRY PROFILE. Ireland
COUNTRY PROFILE Ireland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 18 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationCOUNTRY PROFILE. Italy
COUNTRY PROFILE Italy Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationCOUNTRY PROFILE. Qatar
COUNTRY PROFILE Qatar Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationDrive standards, performance and organizational value
Drive standards, performance and organizational value Facility Management Professional FMP Profile Students entering profession from universities, certificate or technical programs FM practitioners with
More informationCOUNTRY PROFILE. Russia
COUNTRY PROFILE Russia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationCATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission
Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security
More informationGovernor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report
Friday, April 25, 2014 Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report State s first big data industry status report finds
More informationElectric Power Industry s Approach to Grid Security
Electric Power Industry s Approach to Grid Security Richard Ward, Director, National Security Policy Edison Electric Institute (EEI) Cybersecurity & Privacy Policy Academy November 2, 2017 San Francisco,
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationCOUNTRY PROFILE. Malaysia
COUNTRY PROFILE Malaysia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationPROFESSIONAL MASTER S IN
I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY
More informationACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.4 DATE: February 25, 2010 ****************************************************************************** SUBJECT: Intent to Plan Joint Proposal, DSU & SDSU MS
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationCOUNTRY PROFILE. Korea Republic
COUNTRY PROFILE Korea Republic Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure:
This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14553, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationOptus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director
Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director Our Vision Support Australia's growth in a complex world via education and research excellence in cyber security
More informationa PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.
A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world
More informationFrom the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina
From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations Gabriel Accascina gabriel@it4dev.net Contents The E-readiness Assessment (ERA) process and analysis The components
More informationMASTER OF INFORMATION TECHNOLOGY AND MANAGEMENT
Master of Information Technology and Management 1 MASTER OF INFORMATION TECHNOLOGY AND MANAGEMENT At the conclusion of their studies, graduates of this degree should be able to: Deliver optimal technical
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationCOUNTRY PROFILE. Iceland
COUNTRY PROFILE Iceland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationSeneca. August 26,20II
FROM THE OFFICE OF THE PRESIDENT llavid.&$n$w, tlr*sitiqnt Seneca Seneca College Df Applied Arts and Technology $ Ih{ *$ilii*ii Wr,l_! i\"liirt{hsilr. il \l 1..}[r *Y I f 411'l 4ll li{lif ri"llfri $j t,r,
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationCOUNTRY PROFILE. Taiwan
COUNTRY PROFILE Taiwan Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationUNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554
UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD
More informationCOUNTRY PROFILE. Brazil
COUNTRY PROFILE Brazil Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationCOUNTRY PROFILE. Ukraine
COUNTRY PROFILE Ukraine Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationInnovative Public/Private Partnership Approaches for Cybersecurity Workforce Development
Innovative Public/Private Partnership Approaches for Cybersecurity Workforce Development Eman El-Sheikh, Ph.D. Rajni Goel, Ph.D. Lori Gordon, MPA, PMP Kevin Hofstra, Chief Technology Officer 1 Why an Expanding
More informationPROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM
PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationAcademic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program
Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2
More informationISE Cyber Security UCITS Index (HUR)
ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,
More informationCOUNTRY PROFILE. Philippines
COUNTRY PROFILE Philippines Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationNational Defense University and IRMC. National Defense University
The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and
More informationAligning Academic Supply and Industry Demand
Aligning Academic Supply and Industry Demand Presented by: RADM (ret) Ken Slaght, Co-Chair & President, San Diego Cyber Center of Excellence (CCOE) 1 Cyber Center of Excellence (CCOE) CCOE is a non-profit
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationResearching New Ways to Build a Cybersecurity Workforce
THE CISO ACADEMY Researching New Ways to Build a Cybersecurity Workforce Pamela D. Curtis, Summer Craze Fowler, David Tobar, and David Ulicne December 2016 Organizations across the world face the increasing
More informationBSc (Honours) Computer Science Curriculum Outline
BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationCERTIFICATION vs. CERTIFICATE
CERTIFICATION vs. CERTIFICATE Certification Training Certificate Focus Assessing current knowledge and skills usually broad in scope Training individuals to achieve knowledge and skills (usually focused
More informationLeadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually
1 Leadership SANS is the most trusted, and the largest source for information security training and security certification in the world. No one is more trusted in cyber 25 years leading in cyber 165,000
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationAssociate in Science and Bachelor of Science in Information Technology
Associate in Science and Bachelor of Science in Information MISSION STATEMENT The Peirce Information program prepares graduates to be successful information technology professionals by providing them crucial
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationSTUDENT AND ACADEMIC SERVICES
PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationAnatomy of a Data Breach: A Practical Guide for Small Law Departments
Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed
More informationFundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More information