Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

RECOMMENDATIONS OF THE STATE TASK FORCE FOR THE PREVENTION OF HUMAN TRAFFICKING RECOMMENDATIONS OF THE STATE TASK FORCE FOR THE PREVENTION OF HUMAN TRAFFICKING.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
2  Established by the Florida Legislature in 1941  Funded by the Insurance Commissioner’s Regulatory Trust Fund  Chief Financial Officer Jeff Atwater.
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Who We Are… The Foundation is a 501(c)(3) non-profit research organization that owns and operates the Morrelly Homeland Security Center which is the first.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
PREPARE AMERICA for a Unified Response to Terrorism A NATIONAL HOMELAND SECURITY PREPAREDNESS TRAINING SOLUTION OFFERED BY AMERICA’S COMMUNITY COLLEGES.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Job Searching for Chemical Professional – Pittsburgh Specific Information Presented by: Joseph D. Jolson, Ph.D. ACS Pittsburgh Section
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
2015 OUTSTANDING ALUMNI AWARDS TOP 10 IN 10. LAURA “MOLLY” BICKERTON ‘09 RADIOLOGIC TECHNOLOGY DIPLOMA 2008 TCSG STATE GOAL WINNER MBA IN HEALTH CARE.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Association of University Research Parks, 2012 © Creating and Retaining Start-up Companies Association of University Research Parks, 2012 ©
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Georgia Institute of Technology. Georgia Tech is an innovative intellectual environment with more than 900 full-time instructional faculty and more than.
Global JXDM Executive Briefing February 28, 2005 Arlington, Virginia.
Lithuania Protection of Intellectual Property Rights Protection of Intellectual Property Rights Belgrad 2011.
Cyber Security Nevada Businesses Overview June, 2014.
The U.S. Secret Service Shhhhhh!
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Lauren Olin Eastern Regional Mgr. Public Sector Government Solutions cell phone
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
The National Center for School- Based Law Enforcement and Campus Safety Raising the Bar.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Health IT Initiatives Lakeshore Technical College.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
By: Amanda Breazeale Mrs.Moravits Period 6 9/23/14.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
New A.M. Best Cyber Questionnaire
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Sharjah Higher Colleges of Technology Women’s Campus Program of Studies.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Melanie McNeil, Esq. State Long-Term Care Ombudsman Office of the State Long-Term Care Ombudsman
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
MS in IT Auditing, Cyber Security, and Risk Assessment
Educause/Internet 2 Computer and Network Security Task Force
Cyber attacks are increasing in number and severity every day…
California Cybersecurity Integration Center (Cal-CSIC)
MN School Safety Center
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
North Port Police Department Organizational Chart
Security week 1 Introductions Class website Syllabus review
Labour Market Information (LMI) What does it tell us?
Introduction to Digital Forensics
Information Technology Organization Overview RFP #220-05
Chancellor Glen D. Johnson
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Presentation transcript:

Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003

Ray Greenlaw, School of Computing Armstrong Atlantic State University 2 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 3 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 4 Collaborators William Baugh Savannah Technology Group Jeff Buerstatte U.S. Attorney’s Office, Southern District of Georgia Demery Bishop Savannah Crime Stoppers Michael Donahue Regional Educational Services, Armstrong Atlantic State University Dan Drake U.S. Attorney’s Office, Southern District of Georgia Jon Feldman Chatham County Jim Goodlett VeriSign Stephen Jodis School of Computing, Armstrong Atlantic State University Nathan Katzif Katzif Consulting Michael Lee Memorial Health University, Medical Center Letty Shearer Economic Development, Armstrong Atlantic State University Walter Silverman Micrographic Sciences Mark Woodruff Hancock, Askew & Co.

Ray Greenlaw, School of Computing Armstrong Atlantic State University 5 Collaborators Bluewater Technologies Chatham County Chatham County District Attorney’s Office Chatham County Police Department City of Savannah Entre Solutions Federal Bureau of Investigation George Washington University Georgia Bureau of Investigation Georgia Ports Authority

Ray Greenlaw, School of Computing Armstrong Atlantic State University 6 Collaborators Georgia Public Safety Training Center GO Software Gulfstream Hancock, Askew & Co. Memorial Health University Medical Center Micrographic Sciences Ogeechee Technical College Savannah Crime Stoppers Savannah Police Department

Ray Greenlaw, School of Computing Armstrong Atlantic State University 7 Collaborators Savannah Technology Group Southeastern Law Enforcement Training Center The Southern Company (Savannah Electric and Power) VeriSign

Ray Greenlaw, School of Computing Armstrong Atlantic State University 8 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 9 Why Develop a Cyber Security Center? Cyber Crimes Types of computer-related crimes. Percentages of surveyed prosecutor offices with at least one conviction.

Ray Greenlaw, School of Computing Armstrong Atlantic State University 10 Why Develop a Cyber Security Center? Cyber Crimes 32% 74% 80% 90% Percentage of users surveyed. Reported intrusions to law enforcement Internet connection cited as point of attack more frequently than internal systems Acknowledged financial losses due to computer breaches Detected computer security breaches within the last 12 months

Ray Greenlaw, School of Computing Armstrong Atlantic State University 11 Why Develop a Cyber Security Center? Criminal Watch United States Internet Crime Task Force Computer Crime and Intellectual Property Section (CCIPS) McAfee Anti-Virus Emergency Response Team (AVERT) Carnegie Mellon CERT Coordinator Center

Ray Greenlaw, School of Computing Armstrong Atlantic State University 12 Why Develop a Cyber Security Center? Target Audiences –Person Specific Corporate User Consumer User –Device Specific Telephones Wireless Cell Devices Personal Digital Assistants (PDAs) –Network Specific Wireless Carrier’s Transport Local Area, Metropolitan Area, and Wireless Area Networks Internet

Ray Greenlaw, School of Computing Armstrong Atlantic State University 13 Why Develop a Cyber Security Center? National Strategy to Secure Cyberspace –Level 1: Home User and Small Business –Level 2: Large Enterprises –Level 3: Critical Sectors –Level 4: National Priorities Military Bases Coast Guard Facilities Ports of Embarkation/Debarkation Vulnerable and Potentially Exploitable Coastal Area –Level 5: Global

Ray Greenlaw, School of Computing Armstrong Atlantic State University 14 Regional Needs –Law Enforcement Cyber Forensic Training Litigation Support Analyst Training Electronic Evidence and Internet Law Expertise Real-Time Search and Seizure Authentication Center Link Analysis Encrypted Vault –Financial/Banking Institutions –Health Care Industry Health Insurance Portability and Accountability Act of 1996 (HIPAA) Electronic Patient Record Why Develop a Cyber Security Center?

Ray Greenlaw, School of Computing Armstrong Atlantic State University 15 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 16 Cyber Security Center Overview Background –September th Science Symposium in Savannah –National Initiatives President’s Critical Infrastructure Board The National Strategy to Secure Cyberspace Cyber Security Research and Development Act Location –Armstrong Atlantic State University –Department of Information Security

Ray Greenlaw, School of Computing Armstrong Atlantic State University 17 Cyber Security Center Overview Cyber Security Training and Education –Pre- and In-Service Professionals –Public and Private Sectors Offerings –Continuing and Professional Education Courses –Certified Training –Academic Degree Preparation –Applied Research –Brokering

Ray Greenlaw, School of Computing Armstrong Atlantic State University 18 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 19 Objectives Sponsor, Coordinate, and Provide Cyber Security Training to Private and Public Sector Serve as Cyber Security Hub, Broker, and Resource Center Provide Cyber Security Education for Certification and Academic Degrees Conduct and Foster Cyber Security Research

Ray Greenlaw, School of Computing Armstrong Atlantic State University 20 Outline Collaborators Why Develop a Cyber Security Center? Cyber Security Center Overview Objectives Budget

Ray Greenlaw, School of Computing Armstrong Atlantic State University 21 Budget (5 Years) Personnel –Faculty –Graduate Research Assistants –Instructors –$11 Million Equipment –Network Infrastructure –Smart Classrooms –$10 Million Construction –Analysis Laboratories (2) –Classrooms (3) –Office Space –$6 Million Operating Expenses –Events Money –Visitor’s Fund –$3 Million Total $30 Million