SE Linux University Consortium

Slides:



Advertisements
Similar presentations
Dr. Shawn Mackey Associate Executive Director
Advertisements

Increase Information Assurance Awareness through Secure Operations/Management Training and Certification Percent Trained & Certified Goal = 100% Percentage.
International conference INNOVATIVE INFORMATION TECHNOLOGIES - IIT – 2007.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
The Disability Empowerment Center 5025 E Washington Street Phoenix, AZ / Tony DiRienzi, Executive Director
Alabama Institute for Manufacturing Excellence INNOVATIVE TECHNOLOGY AND RESEARCH AT WORK.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
USING TECHNOLOGY TO BE SUCCESSFUL IN REMOTE ENVIRONMENTS REDEYE WAYNE GERARD, CEO & CO-FOUNDER AT REDEYE APPS Just RedEye it.
“History is a set of lies agreed upon.” Napoleon Bonaparte.
Performance Management by Non-Governmental Organizations or Governmental Networks 2009 National Conference on Innovations in Government Accountability.
The State of the Information Sharing Union The State of the Information Sharing Union Paul Wormeli Executive Director IJIS Institute
1 產業電子化卓越中心 Electronic Business Excellency Center 清華大學工業工程與工程管理學系 張瑞芬 教授.
CSCI 6231 – Final Lecture Additional Resources and Topics.
Thinking about Change Levels 1, 2, & 3 © Support Development Associates1.
U.S. Department of Energy National Nuclear Security Administration N ONPROLIFERATION G RADUATE F ELLOWSHIP P ROGRAM Office of Defense Nuclear Nonproliferation.
S AN D IEGO AND I MPERIAL V ALLEY B ASIC S KILLS N ETWORK Dr. Lisa Brewster.
Center for Cybersecurity Research and Education (CCRE)
What and Why Open Source Tony Stanco, Esq. Director The Center of Open Source & Government Associate Director Cyberspace.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Food Safety, Work Place Safety, and Emergency Preparedness National Food Service Management Institute The University of Mississippi 1.
Cloud security
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
ITS Professional Capacity Building Program ITS Advisory Council Presentation Mac Lister Program Manager, ITS PCB ITS Joint Program Office April 7, 2010.
2016 Supplier Diversity Campus Conversation INSPIRE. INNOVATE. IMPACT. Darryl A. Peal, Executive Director Office for Business and Community Economic Development.
GAIA’s Living Labs BIRD LL, SPORTIS LL, MOBILITY FOR SUSTAINABLE TERRITORIES, ERGO LAB, NClic Idoia Muñoz Pitch: 10 min Q&A: 5 min.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
Presented by Sri Sridharan, Managing Director & Chief Operating Officer.
LESSONS LEARNED FROM EVALUATING A COMPLEX, MULTI- PARTNER, MULTI-YEAR, MULTI-SITE K- 12 EDUCATION INTERVENTION EDC’s Center for Children & Technology Elizabeth.
Evaluation Methods for FOSS: the Business Readiness Rating Tony Wasserman Carnegie Mellon Silicon Valley Center for Open Source Investigation.
Virgil Dupuis, George Godfrey, John Phillips and Susan Ratcliffe
Performing Arts and advanced networking
New Faculty Orientation Provost’s Report August 22, 2016
Romanian National Qualifications Authority
Francis Bordeleau Chairman, Papyrus IC May 11th, 2016
Training and Learning Together
Procuring Accessible IT at the University of Washington: Background, Policy, Guidelines, Checklist, Resources Sheryl Burgstahler, Director Accessible Technology.
V6.2 Draft uWaterloo IT Community Together, we Enable
Workplace Safety and Emergency Preparedness
MCCVLC – Providing Educational Access, Anytime, Anywhere
Protecting the Enterprise while lowering the bottom line.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Docks & Harbors Staff Strategic Planning Overview
Inaugural Meeting of the Executive Committee of the Southern Plains Transportation Center (SPTC) 30 August 2016.
The Brookings Institution
North Dakota Cybersecurity Conference Cybersecurity Education
Information Technology (IT)
“Determining Eligibility And Enrollment for Low-Income Beneficiaries”
Partnering with Your Institution to Increase TRIO Student Success
One Veteran’s Journey Veterans journey (30-year AF senior engineer )
Johns Hopkins Medicine Innovation 2023 Strategic Plan
“We don’t have enough staff assigned to making IT accessible!”
UTSA Cyber Security Ecosystem
‘Without education, there is no development’
Database Administration
To build human capacity by creating awareness of the opportunities afforded through Cyberinfrastructure and by educating and training a diverse group of.
“We don’t have enough staff assigned to making IT accessible!”
Steve Denniss Technical Director. Steve Denniss Technical Director.
Welcome to Cyber Recruiter – Administration Training
FAA Center of Excellence for Technical Training and Human Performance
Working Together for Healthier Communities: A Framework for Collaboration among Community Partnerships, Support Organizations, and Funders.
Johns Hopkins Medicine Innovation 2023 Strategic Plan
INTERMEDIATE OUTCOMES ACTIVE, ENGAGED CITIZENS
Mandatory Access Control and the Real World
John Latham, PhD Director, The Monfort Institute
World-Leading Research with Real-World Impact!
Afternoon Agenda Space Community Overview Constellation Overview
Humboldt Space Research Mission America. Humboldt Space Co. adopts a forward thinking stance in scientific research and technical development. Our policy.
Presentation transcript:

SE Linux University Consortium Cyber Security Policy and Reseach Institute George Washington University Tony Stanco, Associate Director stanco@gwu.edu 202-994-5513

Consortium Goals “To successfully create a complete, usable, state of the art secure open source operating system based on SELinux, and Through education and outreach create a vibrant community of researchers, developers, educators, users and administrators actively participating in and using the secure open source operating systems and software”

Impact and Expected Outcomes Produce innovative research results that transfer into excellent security products, ready for easy installation and use Work closely with commercial companies to commercialize results Results and education usable for all companies, including proprietary products

Impact and Expected Outcomes Educational mission will provide both education and training in secure software development Train the next generation IT professionals in secure software development

Consortium: Key Components Inclusive Consortium Universities from all 50 states All 50 NSA Centers of Excellence Keep America first Educate next generation of IT professionals Maintain US leadership Minority schools included

Current Consortium Partners George Washington University, CSPRI Johns Hopkins George Mason Idaho State University National Information Assurance Training and Education Center (NIATEC) National Institute of Standards (NIST) Air Force Institute of Technology University of Tulsa, Center for Information Security Purdue University Towson State University Polytechnic University, ISIS

SE Linux University Consortium Cyber Security Policy and Reseach Institute George Washington University Tony Stanco, Associate Director stanco@gwu.edu 202-994-5513