Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.

Slides:



Advertisements
Similar presentations
Local Immigration Partnerships: Systems Planning to Help People.
Advertisements

2012 Review Growing Up Great Network February 2013.
Essentials of Enrolment Management and Planned Organizational Change Presentation to the National Conference of the RCCFC November 3, 2006 Victoria J.
Student Development The Gateway to … Opportunity Accomplishment Financial Solution Student Success Achievement Student Life.
The Evolving Landscape of Irish Graduate Education IUA Fourth Level Network Annual Conference, 10 th November, 2009 Trinity College Dublin Development.
Measuring Comprehensive Internationalization in U.S.
1 Vision Area of Focus Success Metrics* * All success metrics to be completed by Spring ’08. Commitments to ActionStatus Provide access to quality and.
POLICY REFORM OPTIONS FOR COMMUNITY ORGANIZATIONS TO CONSIDER PRESENTATION TO A PUBLIC FORUM OTTAWA, DECEMBER 2, 2014.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
T-527 Fall 2009 How to Teach for Understanding 19 November 2009.
OPTIONS AND REQUIREMENTS FOR ENGAGEMENT OF CIVIL SOCIETY IN GEF PROJECTS AND PROGRAMMES presented by Faizal Parish Regional/Central Focal Point GEF NGO.
HDA’s revised strategic direction and Annual Performance Plan 2013/14 March 2013.
Making an Impact: the Youth Jobs Strategy Funding Programs OLA Superconference: January 29 th 2014 Bill Mantel, Assistant Deputy Minister Research, Commercialization.
Making the Services Directive Work: UK experience Kerry Jones, Head of the UK Single Market Centre European Reform Team, Department for Business Innovation.
Effectiveness Day : Multi-professional vision and action planning Friday 29 th November 2013 Where People Matter Most.
Greater Arizona eLearning Association GAZEL Overview February 2011 Steve Peters
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BCNET Security Policies Jens Haeusser Information Security Officer, UBC and Chair, Security Working Group, BCNET Internet2 Joint Techs Vancouver, BC July.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
How Bournemouth 2026 is changing. Bob Boulton Chair of Bournemouth 2026 Partnership Debbie Clifton Bournemouth 2026 Development Manager.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College.
Our three year strategy >Our vision >Children and young people in families and communities where they can be safe, strong and thrive. >Our mission >Embed.
DEPARTMENT OF STUDENT, FAMILY AND COMMUNITY SERVICES Leadership I and II February, 2011 Providing Services to Students, Families and Community through.
Multi-faceted Cyber Security Research Group edited strategy.
Heads of Departments of Mathematical Sciences Conference The HEA and Future Development in Learning and Teaching Professor Craig Mahoney Chief Executive,
Top Level Structure of WaTech OCIO Operations Security & Privacy.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Nova Scotia Falls Prevention Update Preventing Falls Together Conference October 29, 2009 Suzanne Baker.
Best Practice in HN/degree Articulation Caroline MacDonald PVC Student and Community Engagement.
Department of Education Justice & Constitutional Development Portfolio Committee March 2008.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
STEM support project in London Update Adrian Fenton STEM Partnership Manager for London
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
PAYMENT CARD INDUSTRY REMEDIATION PROJECT Cheryl Wenezenki-Yolland, PCI Project Owner Nicholas Krischanowsky, PCI Project Director Public Sector Payment.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
OPTIONS AND REQUIREMENTS FOR ENGAGEMENT OF CIVIL SOCIETY IN GEF PROJECTS presented by Ermath Harrington GEF Regional Focal Point.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Research Workshop ‘Research Funding’ Dave Bustard 12 September 2001.
Science to Policy Workshop 20 June 2015 Julius Francis WIOMSA.
Islamic studies: the way forward in the UK Queen Elizabeth II Conference Centre, London 17 April 2008 Professor David Eastwood, HEFCE Chief Executive.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
Advancing Government through Collaboration, Education and Action Priority Area Leaders Community Accomplishments Preview May 7, 2015.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Faculty Councils Brad Whittaker Director, Research Services and Industry Liaison Strategic Research Plan.
European Structural and Investment Funding (ESIF) AHSN ESIF/ LEP knowledge sharing webinar 24 February 2016.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Collaborative Working & Best Practice A Seminar by the Public Services Ombudsman for Wales.
Flood Forum Victoria 14 November 2014 Presented by: Joe Buffone Deputy Commissioner Director Risk & Resilience.
PAS Peer Day 10 th February 2015 Zoe Willcox Service Director Planning Place Directorate Positive Planning: Delivering Housing Unblocking stalled sites.
NATIONAL FLOOD FORUM PROJECT OFFICER Warwickshire Flood Resilience Community Pathfinder.
INTERNATIONAL SKILLS PARTNERSHIPS
Scales Technology FZCO
Capabilities Matrix Access and Authentication
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Collaborative Working & Best Practice
National Farmworker Jobs Program
Information Assurance & Network Security Certificate
DSD Third Quarter Performance and Expenditure Report (1 October 2017 – 31 December 2017) Narratives on targets not achieved and overachievements 30.
Collaborative Working & Best Practice
Information Technology Organization Overview RFP #220-05
Presentation transcript:

Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007

Information Security Branch Security Strategies Security architecture, Policy and standards, Research, Application security Compliance Mgmt. Compliance management, Audit, Compliance reporting Chief Info. Security Officer Governance for Information Security Advisory Services Security consulting, Specialist Services, Awareness Investigations and Response Investigations, Forensics, Response, Tracking and reporting

Information Security Research Program Part of Information Security Program Developed in 2006; Approved in 2007 Goal Promote information security research Build security research network to facilitate research activities in the province Enhance info. sharing with research community

Areas of Interest Enterprise architecture and security management Trust and identity Security properties and vulnerabilities Incident response and recovery Forensics, trace-back and identification Application security Metrics and models Governance, social and economic issues

Activities Issue information security research grants Engage in post-secondary curriculum development Organize conferences and workshops Perform internal research Build research centres of excellence

Outcomes in 2007 Information Security Research Grants –Issued $2.5 million for 30+ projects of 9 universities and colleges in the Province –Research focus: Cyber Crime (e.g., child pornography, image detection) Network Security (e.g., network pattern/traffic analysis, etc.) Identity Management

Outcomes in 2007 Post-secondary curriculum development –Collaboration with University of Victoria (Departments of CS and ECE) –Developed two new courses and revised three existing courses –Created Security Option within Bachelor of Software Engineering program –New course will be delivered in Fall 2008

Outcomes in 2007 Conferences and workshops –Organize two annual conferences: Privacy and Security (February) West Coast Security Forum (November) –Periodic events within the public sector Security Day (Semi-annual) Protection of Information Awareness (As requested)

Outcomes in 2007 Internal research –Over ten research papers –Guidance for senior management decision making and policy development –Survey from IM/IT leaders in the public and private sectors to seek best practices –Collaborate with consulting networks (e.g., ISF, CEB, NCSIP)

Outcomes in 2007 Research centre of excellence –Under planning –Centres specialized in specific security issues –Provide an interdisciplinary forum to bring collaboration between security researchers

Future Plan Extend research areas Support more projects Engage more researchers and bring more active collaboration locally and internationally Invite more security talent to the Province Create a research ecosystem

Thank you! Information Security Branch