Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.

Slides:



Advertisements
Similar presentations
ENGAGING INDUSTRY: EMBEDDING PROFESSIONAL LEARNING IN THE BUSINESS CURRICULUM.
Advertisements

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
City University of Hong Kong Master of Science in Electronic Commerce Department of Computer Science Department of Information Systems Information Session:
Dr Jim Briggs Masterliness Not got an MSc myself; BA DPhil; been teaching masters students for 18 years.
Why Computing? Single most important skill for the 21 st century (and beyond) Computing ≠ Programming Skills for enabling technology Solving Problems!
Cyber Education Project Accreditation Committee November 2014.
© Copyright CSAB 2013 Future Directions for the Computing Accreditation Criteria Report from CAC and CSAB Joint Criteria Committee Gayle Yaverbaum Barbara.
Department of Computer Science and Engineering Dr. Khaled M. Elleithy Open House October 26, 2002 University of Bridgeport Computer Science & Engineering.
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
NTUST National Taiwan University of Science and Technology 2009 School of Management.
1 Indirect Assessment Dr. Mohammed H. Sqalli April 6 th, 2008.
Page 0 Optimization Uncertainty Decision Analysis Systems Economics Masters of Engineering With Concentration in Systems Engineering A 30 hour graduate.
1 Welcome & Overview 2 nd Annual Workshop “What are National Security Threats?” Kathleen D. Morrison Co-Director, JTAC Professor of Anthropology Director,
City University of Hong Kong Master of Science in Electronic Commerce Department of Computer Science Department of Information Systems Information Session:
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
IEEE JOINT TASK FORCE ON QUADRENNIAL ENERGY REVIEW Skilled Work Force Issues Presentation to the U.S. Department of Energy by the IEEE Joint Task Force.
Overview CSE 465 Information Assurance
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Industry Advisory Board Department of Computer Science.
Rutgers CIMIC 1 JOINT M. S. PROGRAM IN EC- UMBC/Rutgers Nabil R. Adam Rutgers University CIMIC Center for Information Management, Integration, and Connectivity.
Funded by a grant from the National Science Foundation. Any opinions, findings, conclusions or recommendations expressed are those of the authors and do.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
California State University East Bay
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Sindhuri Juturu Department of Computer Science Texas Tech University
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
© Heikki Topi Data Science and Computing Education ACM Education Council Portland, OR September 16-17, 2014 Heikki Topi, Bentley University.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
School of Management & Information Systems
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
New M&S Curriculum: The Emerging Strategy Dr. Wayne Summers TSYS Department of Computer Science Columbus State University.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Wayne Patterson Director of the Cybersecurity Research Center November 28, 2011 Howard University Cybersecurity Research Center.
Departmental Overview. History Interdisciplinary Roots Created from two historically successful programs –Applied Technology, Training and Development.
1 The proposed UK computing masters benchmark 5th TEMPUS JEP Meeting Belgrade April 26/27.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
The Operations Academy Senior Management Program.
Graduates for the 21 st Century - Perspective from Research Ian Diamond RCUK.
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
Center for Cybersecurity Research and Education (CCRE)
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
1 Research Centers in Computer Science: A New Way of Doing Science Fred Roberts, DIMACS, Rutgers University.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
The Hiring Process: A Student and Employer’s View Dr. Ann Beheler Collin College Frisco, TX STEMtech 2014 Supported by: The National Science Foundation.
Implementing E-Learning Solutions By, Linette Richie 2012.
HELP WANTED? Job prospects for CS Compensation (show me the money) Career networking.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Faculty of Applied Science and Technology /Applied Computing INDUSTRY AND EDUCATION A PRACTIONER’S VIEW OF INDUSTRY / RESEARCH DRIVEN.
Accreditation of study programs at the Faculty of information technologies Tempus SMGR BE ESABIH EU standards for accreditation of study.
State and Future of Computing Mary Lou Soffa
An Innovative Internship Model ( version 3 1/3/2012 )
Department of Computer and Information Sciences
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Department of Computer and Information Sciences
CIS 500 STUDY Education is Power/cis500study.com
Computer Science Department, University of Missouri, Columbia
Csilla Farkas Cybersecurity Csilla Farkas
World-Leading Research with Real-World Impact!
Cybersecurity Workforce Development for the Nation
Cyber Up! Digital Forensics & Incident Response Tobi West
Presentation transcript:

Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for this work was provided by the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) program under Award No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Reminder! Visit our web site: Send slides to

Education Panel -Need for cybersecurity degrees at the BS level -Need security for cyberphysical systems (different from traditional information systems security) -Students need to develop work ethic -New discipline: Complex Systems Security Engineering -Students need a mix of HW and SW background, but depth in at least one area -All graduates need increased awareness of security -Gestalt! -Scholarship support will help to guide students into security courses

Day 1 University Presentations -Alex Seazzu (University of New Mexico) - Security as a concentration in the MBA program; developing an MS in Information Systems and Assurance - Good collaboration with local law enforcement, FBI, and other agencies - Guide more technical types into managerial policy courses; guide lest technical students into more technical courses - Teach professional communications, contract/vendor work. - Outreach, cybersecurity competitions -Kevin Barton (Our Lady of the Lake University) - Graduate program in information systems; focus on management and leadership - Cybersecurity competitions (Cyber Patriots) - Moving away from textbooks and more to research literature - Teaching more analysis, evaluation, creation

Research Panel -Modeling and simulation; need to model the attacker -Integrate with human-decision making; visualization -Borrow techniques from gaming and integrate with science modeling for hi- fidelity simulations -Combine live games, constructive simulation, and virtual simulation with human interaction for realistic training environments -Students need more analytical thinking and quantitative analysis capabilities; tools need to support this -Federal agencies fund basic research; industry funds applied research. -Basic research obstacles need to be overcome to increase industry funding of university. Government funding needs to listen to industry long term needs. -Need to be concerned about cascading failures -Looking for a holistic approach; difficult from a research perspective

Research Panel (continued) -Texas Tech is focusing on the right thing -Need to learn industry needs -Reach out with programs such as I/UCRC -Difficult for industry to open up at conferences; external advisory meetings are better -Think out of the box – attend an Oil & Gas Conference! -Faculty internships with industry

Day 2 University Presentations -Luc Longpre (University of Texas El Paso) - Graduate level program in information technology - National Center for Border Security and Immigration; Intelligence and National Security Studies; Regional Cyber and Energy Security Center - Mix of CS and IT students in courses; High school outreach - Outlined research in privacy, self-organizing networks, formal methods, applications of game theory, security in software engineering -Sam Segram (Texas Tech University) - Prevalence of security violations and statistics related to security violations - Challenges of cloud computing, legal issues, aging infrastructure - Texas Cybersecurity Council findings and recommendations to improve cybersecurity in the state of Texas - Need for life-long cybersecurity awareness - Proposed Texas Cybersecurity Education Pipeline

Day 2 University Presentations -Lorena Gomez (Monterrey Tec) - Overview of Monterrey Tec - Security in the curriculum - Challenge: Getting the students to apply security concepts - Funding from Microsoft, joint with University of West Indies - Mobile phone security for money transactions - Secure Software Development research - End User Training Strategy, Threat Mitigation - Graduate program in software engineering - Conacyt accreditation, relationships with CMU and Oracle - Cybersecurity education a priority; social service

WCOE Panel -Qing Hui: Summary of ME Courses (Control of Dynamic Systems) -Jordan Berg: Summary of ME Courses (Control of Dynamic Systems Laboratory) -Sunho Lim: Summary of CS Courses (Opportunistic Mobile Networks, Embedded Systems) -Susan Urban: Summary of IE Courses (Cybersecurity for Information Systems, Software Security)

Recommendations and Action Items