Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.

Slides:



Advertisements
Similar presentations
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
Advertisements

Philippine Cybercrime Efforts
Steps towards E-Government in Syria
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
W ashington A rea T rustworthy C omputing H our
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Educational Technology Plan Del Mar Union School District.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Colombo, Sri Lanka, 7-10 April 2009 The National IPv6 Roadmap and its Regulatory Role Prof Dr Sureswaran Ramadass, National Advanced IPv6 Centre Of Excellence.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Contribution since August,2008 National MSME Conclave 19 November, 2014 Use of ICT to make MSME more competitive and sustainable Tapan K. Patra Director.
Patricia A. Muoio Chief National Information Assurance Research Lab.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
Sept 29-30, 2005 Cambridge, MA 1 Grand Challenges Workshop for Computer Systems Software Brett D. Fleisch Program Director National Science Foundation.
From Foresight to Innovation - An Approach from Australia in the Building Construction Industry From Foresight to Innovation – Bridging The Gap German.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
Strategic Directions of the National Science Foundation and the CISE Directorate Peter A. Freeman Assistant Director U.S. National Science Foundation for.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
U.S. Department of the Interior U.S. Geological Survey Accomplishments and New Horizons Council for Data Integration August 10, 2010 Linda C. Gundersen.
Peter B. Bloland, DVM, MPVM Director Division of Public Health Systems and Workforce Development Global Health Leadership Forum November 10, 2011 National.
Can there be privacy in networks ? Dr. Alexander Dix Berlin Commissioner for Data Protection and Freedom of Information Chairman of the International Working.
Secure and Trustworthy Cyberspace (SaTC) “Top 10” Tips for SaTC Proposals One program director’s observations Sol Greenspan.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
LAN of Milk and Honey: Ensuring safe networks through virtualisation Suné von Solms.
Strategies for making evaluations more influential in supporting program management and informing decision-making Australasian Evaluation Society 2011.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
February 28, 2012 Presented By: Eileen Rohan, Superintendent Sean Maher, Network Manager Katie Frank, White Hill Michael Bessonette, Brookside Upper Ron.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
HARARE INSTITUTE OF TECHNOLOGY HIT is Zimbabwe’s most energetic and responsive institute offering unparalleled educational opportunities for those seeking.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
ICT – SSI Smart System Integration Henri Rajbenbach European Commission DG CONNECT (Communications Networks, Content and Technology) ICT-03 -
Slide 1 National Bureau of Statistics Statistical Information Systems Architecture and Application in Nigeria: Continued… By Chuba Moneke Deputy Director.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cloud Computing: Legislative and Regulatory Frameworks Presentation to AREGNET Ria M. Thomas 29 April 2014 Occid-OrientStrategies.
Cyber Insurance Risk Transfer Alternatives
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Educause/Internet 2 Computer and Network Security Task Force
Cybersecurity in the ECOWAS region
Information Technology Sector
Associate Director for Research, Education and Marine Operations
Higher Education’s Role in the Identity Ecosystem
Adoption of Industry 4.0 in India – Opportunities & Challenges
Claudia Uribe Colombian ambassador to the WTO
“Engines of Global Connectivity and Development”
The National IPv6 Roadmap and its Regulatory Role
Presentation transcript:

Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003

2 Agenda The Problem National Initiatives NSF’s Cyber Trust Initiative Current activities Plans

3 Assumptions Insufficient investment in cybersecurity by public and private bodies Few top scholars and students in the field Approaches to cybersecurity unchanged for decades –From Congressman Boehlert’s speech to ITAA, 3/27/2003

4 Responses A few academic and industrial efforts prior to 2001 The National Strategy to Secure Cyberspace Cyber Security R&D Act of 2002 NSF’s Cyber Trust Initiative

5 Cyber Trust Vision A society in which: People can justifiably rely on computer-based systems to perform critical functions –national scale infrastructures: water, power, communication, transportation,... –localized systems: cars, homes,... People can justifiably rely on systems processing sensitive information about them to conform to public policy –health, banking, libraries, e-commerce, government records Without fear of sudden disruption by cyber attacks

6 Background NSF has been funding basic research on IT security for many years (about $11M in 1999) The need became more critical with the rapid growth in the use of the Internet Vulnerability of these systems was highlighted by several disastrous attacks on the Internet and e- commerce in Trusted systems program announced 9/05/2001

7 National Cybersecurity Needs (aka Cyber Trust) Awareness: inform the public and decision makers; general education Make the current systems less vulnerable/more resilient Increase supply of appropriate technical personnel Provide for stronger future infrastructure Change practice

8 NSF’s CyberTrust Initiative NSF’s coordinated effort for research and education in Security Reliability Privacy, etc. Essentially, all the attributes so that a computing, communication, or information system can be trusted.

9 Implementation Research and education programs established: –Trusted Computing, FY ‘02 –Data & Application Security, FY ‘03 –Network Security, FY ‘03 –Embedded and Hybrid Systems (Security of computing & control hardware), FY ‘02 ITR High Confidence Software & Systems component used for diversified modes of support for cybersecurity, FY ‘03 “Scholarship for Services” for traineeship, FY 01

10 Planned Actions Meeting of all relevant PI’s this summer (Aug 11-12) Adding to research funds Increasing dedicated internal resources Exploring best means to integrate technical, policy, and management efforts (tent. Sept) Exploring how to increase the supply of cybersecurity personnel (tent. Oct)

11 Conclusions Long-term research needed in addition to short-term fixes Top scholars and students are being increasingly attracted to the field Campus computing operations can be test- beds and early adopters Local action by you is essential National initiatives can only encourage and show the way; real progress can only be made locally.

Dr. Peter A. Freeman NSF Assistant Director for CISE Phone: Visit the NSF Web site at:

13