Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.

Slides:



Advertisements
Similar presentations
Maryse Robert, Director Department of Economic and Social Development Executive Secretariat for Integral Development San Pedro Sula, Honduras, September.
Advertisements

Steps towards E-Government in Syria
Innovate Now: Overview and Next Steps February 2007.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
EAC HIGHER EDUCATION POLICY
The Newton Fund Research and Innovation for Growth and Prosperity.
UNCLASSIFIED December 2010 Is N.I.C.E.. UNCLASSIFIED THE PRESENT Comprehensive National Cybersecurity Initiative Initiative #8, Expand Cyber Education.
Advancing Alternative Energy Technologies Glenn MacDonell Director, Energy Industry Canada Workshop on Alternatives to Conventional Generation Technologies.
The Newton Fund Research and Innovation for Growth and Prosperity.
Tony Davis CEO of Medilink WMAHSN Working With Industry and Wealth Creation.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Bill Newhouse Two Government Cybersecurity Initiatives NIST.
BELMONT FORUM E-INFRASTRUCTURES AND DATA MANAGEMENT PROJECT Updates and Next Steps to Deliver the final Community Strategy and Implementation Plan Maria.
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
LOCAL SYSTEM OF INNOVATION CENTERED ON AUDIOVISUAL PRODUCTION Marcelo Matos Fluminense Federal University and RedeSist - IE/UFRJ.
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
1 Strategic Planning: An Update March 13, Outline What we have done so far? Where do we stand now? Next steps?
Advanced Security Technology Research Alliance (ASTRA) Co-Chairs –Craig Solem –Jack Moore USC IA Workshop January 8, 2010.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Diversity and Inclusion at NASA: A Strategic Integrated Approach
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
Outcomes of Public Health
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
EMU Strategic Planning Strategic Planning Material Mission/Vision/Values Goals and Objectives January 10, 2014.
Health Care Reform and Adolescent Health Service Delivery: Principles and Principals Richard E. Kreipe MD, FAAP, FSAM Society for Adolescent Medicine (SAM)
SHAAMS Next steps in Lebanon Policy Accelerator Policy Accelerator Activities Activity 1 Participant stakeholders identification Activity 2 Implementation.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
AIAA’s Publications Business Publications New Initiatives Subcommittee Wednesday, 9 January 2008 Rodger Williams.
National Science Foundation 1 Evaluating the EHR Portfolio Judith A. Ramaley Assistant Director Education and Human Resources.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Convocation Week 2008 Strategic & Academic Action Planning Update.
A new start for the Lisbon Strategy Knowledge and innovation for growth.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Information Security Research and Education Network INSuRE Dr. Melissa Dark Purdue University Award #
Griffiss Institute Center for Information Assurance.
ESIP Federation Air Quality Cluster Partner Agencies.
Greenville Technical Charter High School Strategic Plan Developed October 2014.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
| Collaboration at Rural Business Approach.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
University of Minnesota Metrics Framework Working Document: 3/18/2010 Extraordinary Education – Recruit, educate, challenge, and graduate outstanding students.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
The OCIO/PSCD, in collaboration with the Advisory Board’s Long Range Planning Committee, developed this Strategic Plan to foster the leadership and.
Sample Codes of Ethics in Adventure Tourism
1 Policy Frameworks for the Knowledge-based Economy ICTs, Innovation and Human Resources Brasilia September 2002 Session 2.2. ICTs and e-business.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Establishing National Technology Development and Transfer Systems
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
The U. S. Health Care System Challenges, Opportunities and Solutions Fifth National HIPAA Summit Clinical Data Standards and the Creation of an Interconnected,
National Geospatial Advisory Committee State of the Committee National Geospatial Advisory Committee May 2009.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
PLYMOUTH STEM STRATEGY DRAFT Vision To unify and monitor the positive momentum in STEM to ensure its leadership across Plymouth is aligned to.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
June 23, 2016 Organizational Overview. 2 Automation Federation Background A fragmented community of automation professional associations and societies.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies NIST Industry Day February 10, 2016.
CARIBBEAN WORKSHOP ON E-GOVERNMENT BEST PRACTICES Port of Spain, Trinidad & Tobago, July 26-28, 2005.
Introduction 0 The purpose of Student Affairs is to provide a solid foundation for knowledge, skills, and student development in higher education. Advisors.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
UNCLASSIFIED Lift the living standards and wellbeing of all Victorians by sustainably growing Victoria’s economy and employment and by working with the.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Update from the Faster Payments Task Force
New Faculty Orientation Provost’s Report August 22, 2016
Higher Education’s Role in the Identity Ecosystem
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
8 Building Blocks of National Cyber Strategies
Digital Policy -Transformation Towards Society 5.0-
Brian Robinson, Deputy HR Director
Presentation transcript:

Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology

Advancement of innovation within the Cybersecurity domain 1.National Initiative for Cybersecurity Education (NICE) 2.National Strategy for Trusted Identities in Cyberspace (NSTIC) 3.National Cybersecurity Center of Excellence (NCCOE)

Comprehensive National Cybersecurity Initiative #8 “…we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees.” Day Cyber Review Promote cybersecurity risk awareness for all citizens; Build an education system that will enhance understanding of cybersecurity and allow the United States to retain and expand upon its scientific, engineering, and market leadership in information technology; Expand and train the workforce to protect the Nation’s competitive advantage; National Initiative for Cybersecurity Education (NICE) Background

5 Raise national awareness about risks in cyberspace. Broaden the pool of individuals prepared to enter the cybersecurity workforce. Cultivate a globally competitive cybersecurity workforce. NICE Goals

6 Improve knowledge of risks and vulnerabilities in cyberspace. Promote the use of cybersecurity resources and tools. Raise national awareness about risks in cyberspace.

7 Increase exposure to cybersecurity in PreK-12 education by emphasizing connections to Science, Technology, Engineering, and Mathematics (STEM) education and the role of mathematics and computational thinking in cybersecurity. Promote interest in computer science and cybersecurity by increasing the diversity and quantity of course offerings and research opportunities. Broaden the pool of individuals prepared to enter the cybersecurity workforce

8 Encourage the development and adoption of the National Cybersecurity Workforce Framework. Develop cybersecurity workforce forecasting tools. Establish standards and guidelines for cybersecurity training and professional development. Analyze and identify best practices to help organizations recruit and retain cybersecurity professionals. Evaluate the professionalization of the cybersecurity workforce. Cultivate a globally competitive cybersecurity workforce.

9 NICE Website Stop.Think.Connect CyberCorps® – Scholarship for Service (SFS) Solicitation dfhttp:// df Professionalizing the Nation's Cybersecurity Workforce: Criteria for Future Decision-Making jects/CSTB_070783http://sites.nationalacademies.org/CSTB/CurrentPro jects/CSTB_ National Institute for Cybersecurity Studies (NICS) Coming Soon (2013) Keeping Track of NICE

Technologies exist now to make online transactions more secure, private, and more convenient. A vision of the future where the private sector, civil societies, and the public sector collaborate to create the standards and policies needed for interoperable trusted credentials that would dramatically reduce ID theft and fraud online. By acting now and creating a more trusted environment for online transactions, we will ensure that the Internet continues to support innovation and the creation of new jobs. National Strategy for Trusted Identities in Cyberspace (NSTIC)

NSTIC in the Near Future Formation of the Identity Ecosystem Steering Group (IESG) August in Chicago. Award of $9m+ in pilots in early September FFO-Amendment3.pdfhttp:// FFO-Amendment3.pdf

Following NSTIC on Twitter NSTIC The official handle of the National Program Office of the National Strategy for Trusted Identities in Cyberspace

Following NSTIC on Twitter Identity NSTIC Identity Ecosystem Steering Group Secretariat ·

Public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. Bringing together experts from industry, government and academia to address present-day cybersecurity challenges, test emerging technologies, and deliver quick and cost-effective solutions. Hosted by NIST in collaboration with the State of Maryland Department of Economic Development and Montgomery County, Maryland.

Vision: Provide a world class, collaborative environment for integrating cybersecurity solutions that stimulate e-commerce and national economic growth. Mission: Foster the rapid adoption and broad deployment of integrated cybersecurity tools and techniques that enhance consumer confidence in U.S. information systems.

Key Center Goals: Disseminate new principles and mechanics underlying security standards, metrics, and best practices for secure and privacy-preserving information technologies Develop and test methods for composing, monitoring, and measuring the security posture of computer and enterprise systems Achieve broad adoption of practical, affordable, and useful cybersecurity capabilities across the full range of commercial and government sectors

Use Case Initial Selections Health Care IT Use Case: Information Exchange – Q4FY12 Cloud IT Use Case: Policy Enforcement – Q1FY13 Federal Use Case: Continuous Monitoring – Q1FY13 Foster an Environment to Exchange Knowledge Host a focused technology session centered around protected and signed BIOS – Q4FY12

Initial work space University of MD, Rockville 6,092 sq. ft,. 4 labs, 8 offices, collaboration spaces IT infrastructure selected and purchased Furniture selected and purchased

Expected NCCoE Benefits Accelerated adoption of practical, affordable, and usable cybersecurity solutions Increased opportunities for innovation Trusted environment for interaction among businesses and solution providers Innovation resulting in possible new cybersecurity products, services, and businesses Further the understanding of current cybersecurity technology capabilities and costs

Keeping Track of NCCOE Planning and Activities

NIST Information Technology Lab Computer Security Division NIST Information Technology Lab Computer Security Division Bill Newhouse NIST Information Technology Lab Computer Security Division NIST Information Technology Lab Computer Security Division Bill Newhouse