Origins of LDE Center Safety & Security and the Value of Multidisciplinary Education Jan van den Berg.

Slides:



Advertisements
Similar presentations
Lesson Learned from AUDMP/ NSET-Nepal NSET-Nepal AUDMP Working Group Meeting, Bandung Shiva Bahadur Pradhanang Ramesh Guragain 21 March.
Advertisements

United Nations Security Council Resolution 1624 (2005) Countering Incitement to Commit Terrorist Acts.
Inter-disciplinary innovations & transformative learning.
Steps towards E-Government in Syria
Land Grant and Minority Serving Institutions: Their Role in Food Aid, Development and Capacity Building Jeffrey D. Armstrong Michigan State University.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
LTC Steven D. Hart, Ph.D., P.E. Civil Design Group Director Department of Civil and Mechanical Engineering West Point.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
History, Theory, and Philosophy of Science (In SMAC + RT) 7th smester -Fall 2005 Institute of Media Technology and Engineering Science Aalborg University.
The College of Information Sciences and Technology ist.psu.edu.
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
James Brehm Senior Strategist Compass Intelligence.
WELCOME to UCPH. Welcome to Copenhagen Faculty of Theology Faculty of Law Faculty of Social Sciences Faculty of Science Faculty of Health Sciences Faculty.
Georgia Institute of Technology. Georgia Tech is an innovative intellectual environment with more than 900 full-time instructional faculty and more than.
IT Education in Serbia Prof. Dr. Ivan Milentiejvic
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
(Regulatory) Impact Assessment Introduction Zsombor Kovacsy, Ministry of Justice Hungary Regional Strategic Workshop on Impact Assessment Riga, Latvia.
Faculty of Technology, Policy and Management. 2 TPM’S MISSION: COMPREHENSIVE ENGINEERING The Faculty of Technology, Policy and Management combines insights.
Placing Information Security within an Organization
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Sustainability – why is it way beyond the Triple Bottom Line ?
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
University education Center affiliated to the University of Barcelona.
IMPLEMENTING THE SALVADOR DECLARATION The United Nations Programme Network of Crime Prevention and Criminal Justice Institutes (PNI)
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
For more course tutorials visit SEC 480 Entire Course For more course tutorials visit SEC 480 Week 1 DQs SEC 480 Week.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Surveillance and Security Systems Cyber Security Integration.
Presentation at NorDoc Meeting
Required Restricted elective (400 level)
Information Security Program
Master in City Sciences at UPM A practical case of an interdisciplinary educational program in the field of urban studies Dr. Sergio Ramos Associate Lecturer.
Crisis management related research at
Master of Science Electrical and Computer Engineering
Mechanical & Manufacturing Engineering Program
Faculty of Technology, Policy and Management
Julia Lane New York University
Paolo Budroni, University of Vienna
A Higher Education Model
Re-inventing Safety and Security – A Symposium of the Leiden-Delft-Erasmus Centre for Safety and Security, 23 January 2017.
California Cybersecurity Integration Center (Cal-CSIC)
CIRAS FINAL CONFERENCE
Smart Grid Developments in Alberta
UQ Resources Forum University of Queensland’s Sustainable Minerals Institute Professor Neville Plint Director.
SEC 400 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 RANK Perfect Education/ cis333rank.com.
SEC 400 Education for Service-- snaptutorial.com.
CIS 333 Education for Service-- tutorialrank.com.
CMGT 582 STUDY Education for Service--cmgt582study.com.
8 Building Blocks of National Cyber Strategies
Centre for intelligent electricity distribution
Computers and Homeland Security
IS4550 Security Policies and Implementation
Specification of Countermeasures for CYRAIL
Mason Energy-Water Research Opportunities
Cyber Security Ecosystem of Georgia. Experience and Challenges
Faculty of Technology, Policy and Management
Data-Driven Decision-Making
SOS 510 Perspectives on Sustainability Chuck Redman Oct. 29, 2018
Albeado - Enabling Smart Energy
Deborah Housen-Couriel, ADV.
Energy Systems Catapult
CESP Overview VISION: Translate innovations in energy science into policy recommendations regarding energy security, sustainability and resilience.. Explore.
NACE International Update
Office of Health, Safety and Security
Presentation transcript:

Origins of LDE Center Safety & Security and the Value of Multidisciplinary Education Jan van den Berg

Origins of the Centre Complex Society: system of systems smart city smart grid cyberspace Inherent & Emerging Risks Science may help: Safety & Security Science (monodisciplinary, multidisciplinarity, interdisciplinarity, transdisciplinarity)

LDE Safety & Security Participating faculties + departments Research Exec. Ed: Cyber Security Academy Minor + MSc Safety Security & Justice LDE Safety & Security Interfaculty initiatives Campus The Hague Technology, Policy, Management School of Law Law Electrical Engineering, Matehematics, Computer Science Civil engineering, Geosciences School of Economics Interdepartemental initiatives Institute for Criminal Law and Crimonology Hydraulic Engineering Architecture-OTB Public Law Institute for Public Law Centre for terrorism and counterterrorism Infrastructure Systems & Services Micro-electronics Values & Technology Econometric Institute Rotterdam Institute of Law and Economics

Key Challenges It is all about managing S&S risks Risk Assessment (Likelihoods & Impacts) Risk Mitigation approaches (Measures) Developing Safety & Security Science Methodologies (mono- up to trans-disciplinary) Applying them in all kinds of subdomains to create new (science-based) insights

Towards transdisciplinarity Option 1: doing research in teams (co-creation) Option 2: developing/co-creating a MSc program (like at the CSA The Hague)

Creating a vision, a conditio sine que non (!!) Cyberspace decomposed: Technical layer (enables) IT services ~ information security ~ CIA(A) Socio-tech layer cyber activities (key assets) ~ cyber security ~ personal/business/societal goals Governance layer (restricts) governance & management ~ rules & regulations (for other layers) ~ cyber risk appetite (~ acceptable risk levels), ethics & compliance 6

Cyber Security = risk management challenge

Elaborating transdisciplinarity: first step

GENUINE TRANSDISCIPLINARITY DESIRE DESIRE GENUINE TRANSDISCIPLINARITY

Elaborating transdisciplinarity Current practice: individual courses often still use mostly mono-disciplinary approaches assignments & MSc thesis research show integration attempts (including selection of right disciplinary models, methods and tools) so, still limited integration moments!! Challenge for the future developing basic set of mono-disciplinary, …, trans-disciplinary building blocks (models, methods and tools) in concrete cases, learning to select & apply them

Targeted Attacks and Human Vulnerability SWIFT banking system (a.o.) ( ‘crown juwels’ ) Use of ‘kill chain’ concept and (preventive) modeling of human vulnerabilities using attack trees

12