Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Similar documents
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Digital Forensics. Graduate Certificate

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

CyberSecurity Internships The Path to Meeting Industry Need

The Widening Talent Gap: The greatest security challenge of our time

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2017

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Immersion Academy Annual Report 2017

Department of Homeland Security Updates

NERC Staff Organization Chart

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

PROFESSIONAL MASTER S IN

CYBERSECURITY: Scholarship and Job Opportunities

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

The fast track to top skills and top jobs in cyber. Guaranteed.

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

Information Technology

Opening Doors to Cyber and Homeland Security Careers

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Legal and Regulatory Developments for Privacy and Security

SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Collaboration on Cybersecurity program between California University and Shippensburg University

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Immersion Academy Annual Report 2018

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Media Kit. California Cybersecurity Institute

Cyber Security School

Commonwealth Cyber Initiative Blueprint Development

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Building the Cybersecurity Workforce. November 2017

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Network Technology: Microsoft. Undergraduate Certificate

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Barbara Ciaramitaro, lead professor of IT and cyber security at Walsh College in Troy

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

CYLAB PARTNERS CONFERENCE Information Networking Institute

Cyber Security and Cyber Fraud

Les joies et les peines de la transformation numérique

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

CISCO NETWORKING ACADEMY CASE STUDY

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Aligning Academic Supply and Industry Demand

NERC Staff Organization Chart 2015 Budget

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Investigating Insider Threats

Incorporating Hunt Teams To Defend Your Enterprise

A United States Cyber Academy Program

STRATEGIC PLAN

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

Network Technology: Cisco. Undergraduate Certificate

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

POSITION DESCRIPTION

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

CYBER SECURITY TRAINING

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Bachelor of Applied Science Degree IT NETWORKING

Which Side Are You On?

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Cybersecurity & Privacy Enhancements

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

IT Governance Framework at KIT

Cyber Security is it a boardroom issue?

Consulting Services Overview

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

NERC Staff Organization Chart Budget

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Gujarat Forensic Sciences University

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

Data Governance Framework

Homeland Security Graduate Programs

Cybersecurity Risk Management Guide for Voluntary Use of the NIST Cybersecurity Framework

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

HPH SCC CYBERSECURITY WORKING GROUP

Commonwealth Cyber Initiative Letters of Support

Transcription:

STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help address the regional and national shortage in cybersecurity professionals, UW Bothell launched an innovative university-industry partnership to enable UW Bothell students to gain intensive and immersive real-world work experience during their final years of study, along with professional development to be successful in the workplace. The initial Co-Op/Internship pilot program, launched with T-Mobile, benefits industry as well, enabling industry partners to recruit UW Bothell talent to contribute to new or existing projects and initiatives, as well as potentially creating a pipeline for training and full-time employment with their organization. Key to UW Bothell s commitment is the leadership from the Center for Information Assurance and Cybersecurity (CIAC). Led by Dr. Barbara Endicott- Popovsky and based at UW Bothell, CIAC is designated by the National Security Agency as a Center for Academic Excellence in Research and Cyber Defense Education. CIAC supports preparation of students for careers protecting computer systems from accidents, hackers, viruses and other security threats by integrating materials from technology, business operations, policy, communications, psychology, and most importantly problem solving. UW Bothell s Cybersecurity Initiative enhances the campus s commitment to being a regionally accountable public university that is committed to building and sustaining institutional and community partnerships designed to enhance student success and the well-being and prosperity of Washington State and of our region. Attachments 1. UWB Collaboration Strategies to Achieve National Cyber Security Solutions 2. Presenters Biographical Information A 1/203-18

UWB Collaboration Strategies to Achieve National CYBER SECURITY SOLUTIONS // Tanya Kumar ATTACHMENT 1 Page 1 of 15

TECH HUmanity Page 2 of 15

PERSONAL EXPERIENCE Page 3 of 15

Product Managers: Organize, hit deadlines, & strategy. Cyber Strategy: Cyber Architecture, security forecasting Legal: Cyber Law and Information Risk Management Finance & Business: Procurement and Third Party Management EIT & Engineering: Coding and programming scope CYBERSECURITY Policy and Governance: Federal and state regulatory, and legislative work Education: Certification updating, corporate training, security integration CYBERSECURITY AND ITS Interdisciplinarity Page 4 of 15

1 2 4 Goals Teaching criticality and scope of cybersecurity to the student body 3 Recruitment and UWB taskforce development Expansion of Cybersecurity Campus Collaborations 4 Consistent trend mapping and metric analysis Page 5 of 15

WHAT WE CAN DEVELOP THROUGH UWB W/ THE PROPOSED CYBERSECURITY INITIATIVES. LEADERSHIP DIVERSITY TECHNOLOGY Page 6 of 15

LEADERSHIP Page 7 of 15

Philanthropy Next Generation Networking Implementing NICE/CIAC Initiatives Speaker Series Page 8 of 15

CIAC Initiatives Page 9 of 15

TECHNOLOGY Page 10 of 15

Design Sprints & Hackathons Tech Workshops Professionalism Series Page 11 of 15

Personal Experiences Trend Mapping How this all fits in... Moving Forward Instead of simply Bringing Tech to our Students becoming a pilot school that begins Bringing Students to Tech. Page 12 of 15

DIVERSITY Page 13 of 15

Page 14 of 15

Q&A + Discussion Page 15 of 15

Government-Industry-Academic Partnerships: UW Bothell Cybersecurity Pilot: Presenters Biographical Information William C. Boni Vice President Information Security at T-Mobile USA Bill Boni has spent his entire professional career as an information protection specialist and has assisted major organization s in both the public and private sectors. For 40+ years, Bill has assisted clients in safeguarding their digital assets, against the many threats arising from malicious adversaries. Bill is the Senior Vice President and Digital Security Officer of T-Mobile. He is responsible for the company's overall program to protect T-Mobile s brand by protecting sensitive customer and company information. He also directs the people, processes and technology programs that safeguard the company's network, products systems and business initiatives. Other assignments in his distinguished career include work as a U.S. Army counter-intelligence officer; Federal agent and investigator; Vice President of Information Security for First Interstate Bank; and project security officer for Star Wars programs and other defense work with Hughes Aircraft Company and Rockwell. Barbara Endicott-Popovsky Director at Center for Information Assurance and Cybersecurity at the University of Washington Barbara Endicott-Popovsky, Ph.D., is Executive Director for the Center of Information Assurance and Cybersecurity at the University of Washington, designated by NSA/DHS as a Center of Academic Excellence in Information Assurance Education and Research, Academic Director for the Masters in Infrastructure Planning and Management in the Urban Planning Department of the School of Built Environments, holds an appointment as Professor with the Institute of Technology in Tacoma, and was named Department Fellow at Aberyswyth University Wales (2012). Her academic career follows a 20-year career in industry marked by executive and consulting positions in IT architecture and project management. A-1.2/203-18 ATTACHMENT 2 Page 1 of 2

Her research interests include enterprise-wide information systems security and compliance management, forensic-readiness, the science of security, digital forensics and secure coding practices. For her work in the relevance of archival sciences to digital forensics, she is a member of the American Academy of Forensic Scientists. Barbara earned her Ph.D. in Computer Science/Computer Security from the University of Idaho (2007), and holds a Master of Science in Information Systems Engineering from Seattle Pacific University (1987), a Master in Business Administration from the University of Washington (1985) and a Bachelor of Arts from the University of Pittsburgh. Caitlin Cunningham Enterprise Information Security Analyst at T-Mobile University of Washington alumna Tanya Kumar Corporate Information Security and Cyber Risk Management Intern at T-Mobile University of Washington Bothell student Aparna Suntosh Cybersecurity Analyst at T-Mobile University of Washington Bothell alumna A-1.2/203-18 Page 2 of 2