Center of Excellence in Cyber Security

Slides:



Advertisements
Similar presentations
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University.
Advertisements

1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
Virtual National Training and Exercise Symposium April 17, 2013
Yuval Elovici, Prof. Director of Telekom Innovation Laboratories Head of BGU Cyber Security Labs June, 2014 The Role of the Academia in Promoting Cyber.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
Cyber Principles November 2010 Bob Gourley. The 12 Principles of Cyber Conflict 1. Know the enemy: Bad actors in the world are bad actors in cyberspace.
1 Welcome & Overview 2 nd Annual Workshop “What are National Security Threats?” Kathleen D. Morrison Co-Director, JTAC Professor of Anthropology Director,
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
CS&T Strategy Articulation Project Results Summary June 2006 “CS&T will be the recognized leader for high quality and innovative Enterprise Information.
Capabilities Briefing
The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
EMarketPlace: Advanced Service Delivery Solutions Stephanie Woolson Lockheed Martin.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Pascucci-1 Valerio Pascucci Director, CEDMAV Professor, SCI Institute & School of Computing Laboratory Fellow, PNNL Massive Data Management, Analysis,
Hassan A. Karimi Geoinformatics Laboratory School of Information Sciences University of Pittsburgh 3/27/20121.
Network security Product Group 2 McAfee Network Security Platform.
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Cyberinfrastructure: An investment worth making Joe Breen University of Utah Center for High Performance Computing.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
February 19, 2015 Learning & Research NSU Dr. George Hsieh Department of Computer Science.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
United States Army Combined Arms Center A next generation simulation architecture supporting both Computer Generated Forces (CGF) and SAF operations Provides.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
11/03/2016.
Proactive Incident Response
VCL Virtual Computing Laboratory An Opportunity to Lead
Penn State Center for e-Design Site Vision and Capabilities
Big Data Panel Discussion
Apache Spot (Incubating)
Naval Opportunity Awareness Workshop
Information Technology Sector
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
DISA Global Operations
UNCLASSIFIED Department of Defense, Advanced Distributive Learning Initiative iFest 2017, Alexandria, Virginia 02 August 2017 Education for Leaders in.
Detection and Analysis of Threats to the Energy Sector (DATES)
Intelligent Large Scale Sensing Systems (ILS3) initiative
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Dr. David “Fuzzy” Wells U.S. Pacific Command's Cyber War Innovation Center Introducing the Cyber War Innovation Center (CWIC) ** GE-104, 15:00 – 16:00,
RESEARCH, EDUCATION, AND TRAINING FOR THE SMART GRID
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Exploring Application Lifecycle Management and Its Role in PLM
13 November 2018.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Four Generations of Security Devices Putting IDS in Context
UTSA Cyber Security Ecosystem
Smart Learning concepts to enhance SMART Universities in Africa
UW System Information Security
Coordinated Security Response
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
World-Leading Research with Real-World Impact!
Computer Science and Engineering
Institute for Cyber Security Overview
Final Conference 18 Set 2018.
Sachiko A. Kuwabara, PhD, MA
Mitre Att&ck Matrix RA PS...Trebuchet Font makes crazy ampersands but I was to lazy to change it.
Dr. Kathleen Liang Kellogg Distinguished Professor of Sustainable Agriculture Director of Center for Environmental Farming Systems North Carolina A&T State.
Cyber Security R&D: A Personal Perspective
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
IT Management Services Infrastructure Services
Cloud Computing for Wireless Networks
Presentation transcript:

Center of Excellence in Cyber Security Dr. George Hsieh Professor of Computer Science PI of COE in Cyber Security Norfolk State University June 8, 2017

Cyberpsychology 2017 - COE in Cyber Security COE Overview Scope: $4.98M (04/14/2015 - 04/14/2020) Mission Increase knowledge and application of cyber security based on multidisciplinary and collaborative research Increase capacity in research, education, and professional development for faculty and students Objectives Conduct basic research to develop a cloud-enabled, big-data- analytics-capable Cyber Analysis, Simulation and Experimentation Environment (CASE-V) for enhancing situational awareness and decision support for cyber defense and cyber training Perform research-related education and outreach activities Be a valuable resource for cyber security research, education, outreach, and practices for HBCU/MSI community and nation June 8, 2017 Cyberpsychology 2017 - COE in Cyber Security

Cyberpsychology 2017 - COE in Cyber Security Research Program June 8, 2017 Cyberpsychology 2017 - COE in Cyber Security

Cyberpsychology 2017 - COE in Cyber Security Research Thrusts Cyber intelligence and cyber defense Explore innovative theories, methodologies and techniques in cyber intelligence and cyber defense, and leverage big data analytics Cyber modeling, simulation, analysis & decision support Develop foundational modeling, simulation, analysis, intelligent systems and decision support capabilities, with a focus on human behavior modeling, simulation scalability, and on live-virtual-constructive simulation and kinetic simulation system interoperability Cyber training, and intrusion detection and response Develop intrusion detection, mitigation and forensic analysis capabilities to defend against future advanced threats, and develop integrated training capabilities for cyber defense and response CASE-V framework and testbeds Develop a synthetic framework and test beds with a distributed, virtual and big data-enabled infrastructure capable of interoperability with selected existing large-scale cyber security testbeds June 8, 2017 Cyberpsychology 2017 - COE in Cyber Security

Sample Research Activities Human behavior modeling and simulation Cyberpsychology Integrated APT training and experimentation environments: cyber kill chain Red team emulation Incident response, malware classification, cyber intelligence Large-scale simulation and emulation platforms and technologies Cloud platforms: OpenStack, XenServer, VMware Big data platforms and data analytics: Hadoop, Spark, deep learning Moving target defense, cloud security Blockchain June 8, 2017 Cyberpsychology 2017 - COE in Cyber Security