Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology.

Slides:



Advertisements
Similar presentations
International Collaboration Opportunities Through E-Learning: Practices at Atatürk University Dr.Selçuk KARAMAN Distance Education Practice and Research.
Advertisements

The American Distance Education Consortium 65 U.S. State Universities and Land Grant Colleges.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Building pertinent relationships to move innovation out of Midwest Federal labs for private commercialization.
Technology Plan EDLD 5362 Casey Smith.
The U.S. Coast Guard’s Role in Cybersecurity
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
1 July 08, 2010 Information Security Officer Meeting.
15/24/06 Insightful Understanding of China's Higher Education and Research in Computer Science and Information Technology Fred Roberts Co-Organizer US.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
October 17, 2002University Services to Corporations - Joint Advisory Boards Meetings 1 The University of Science and Technology. And Life. Arlene Lowenstein.
Overview CSE 465 Information Assurance
Federal Business Alliance Texas Small Business Procurement Fair - What It Takes to be My Partner - Lee Ann Standish, PMP Vice President / Small Business.
Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator.
Providing Practical Solutions Winning the Talent Wars for Recruiting and Retaining 21 st Century Cyber Engineers Jeff Kubik, PMP, CISSP Sr PM, Praxis Engineering.
FACULTY OF ELECTRICAL ENGINEERING DEPT. OF TELECOMMUNICATION ENGINEERING CZECH TECHNICAL UNIVERSITY IN PRAGUE ITU Centre of the Czech Technical.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
ICT in Education Global IT Forum Coordinated Science Laboratory, UIUC 6 th September, 2007 Rajeeva Ratna Shah Member Secretary Planning Commission
Alabama Institute for Manufacturing Excellence INNOVATIVE TECHNOLOGY AND RESEARCH AT WORK.
Aihua WU Division of Science and Engineering Higher education Department of MOE May , Overview of China’s IT Education.
Tata Technologies and Dassault Systemes at TIETECH for collaboration on innovative research, technology or Design solutions.
Cybersecurity nexus (CSX)
National Seminar on Intellectual Property and its Impact on Economic Development Human Resource Development in the Field of Intellectual Property for Scientific,
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
+. Background Design & Structure Motives & FitsPerformance Problems & Success Factors Microsoft: leading software companies – developing, manufacturing.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
What is CANARIE? CANARIE runs Canada’s only national high-bandwidth network for research & education Connects one million users at 1,100 institutions.
Weekend Program MS in Computer Science with Specialization in Internet and Web Technologies.
New M&S Curriculum: The Emerging Strategy Dr. Wayne Summers TSYS Department of Computer Science Columbus State University.
Computer Networks Working Group Prof. Dr. E. Milovanović.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
Information Technology Programs. Why major in IT? “...Total US IT employment is predicted to double in this decade. Similarly, the security of computer.
CCISD TECHNOLOGY PLAN by Patti Shields Cohort 10 EDLD 5362 Information Systems Management.
Internet2 Health Sciences Security Jere Retzer, OHSU March 7, 2001.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
SSC Pacific – A Strong Community Partner And Economic Engine… Yesterday, Today and Tomorrow CAPT Mark Kohlheim, Commanding Officer 17 NOV 09 SSC Pacific.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
School of Engineering. Y.U. School of Engineering Founded in Departments Computer Engineering (2001) Industrial Engineering (2001) Electronics.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Center for Advanced Energy Studies Harold S. Blackman Interim Director, CAES July 18, 2007.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Enterprise Cybersecurity Strategy
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Building the Future Cisco Networking Academy Program.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
Cengage Learning. Who we are LIFELONG LEARNING  Elementary and high school  2- and 4-year colleges and universities  Private/For Profit Colleges 
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Courses & Certifications Networking Academy courses are designed to help students prepare for career opportunities, continuing education, and globally.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
Department of Mathematics and Computer Science
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
University of Piraeus Research Centre (UPRC) Assistant Professor Nineta Polemi “PREVENTION, PREPAREDENESS AND CONSEQUENCE MANAGEMENT OF.
Department of Computer and Information Sciences
Information Security Officer Meeting
Department of Computer and Information Sciences
International Journal of Sensor Networks and Data Communications
The Applied Research Center at Florida International University
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
The City College MESA Program
Csilla Farkas Cybersecurity Csilla Farkas
Computer Science Section
MAZARS’ CONSULTING PRACTICE
IT Applications with Emerging Techniques: Security Solutions
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology Departments of Computer Science and Information Systems and Applied Engineering 6th Annual Security Summit May 20, 2009

National University Strengths Course-per-month teaching model Ability to deliver customized teaching and training Instructors are current, professional practitioners of advanced and leading-edge CSIA technologies In process of creating a Center of Excellence in IAS Collaborates with San Diego area IA-focused entities Collaborates with other global entities in common research Faculty with expertise and industry experience in CSIA both nationally and internationally: HHS, DHS, DoD, EU and OECD Data Privacy, Certification Authorities and PKI, Protecting Digital Assets, Smart Card Forum, Social Networking, Cell and Wireless Security

Kearny Mesa Technology Facility Location: Serra Mesa on Aero at 3678 Aero Court Across from Sheraton Four Points Resort Communication “Pipe” capability (Gigabit+) Two secure research laboratories created Network Lab with Cisco CCNA/CCSP Academies Cyber Security Lab Sandbox and Honey Net IA and Security Best Practices Collaboration with iMrkr Secure Social Networking Iris Scan Biometric Research Dead Sea Scroll Image Digital Signature Project Anonymization of Confidential Data Project Cell and Wireless Security

U.S. Navy and DoD IA Students

Afghan Refugee Girl Hamming Distance:.24 L,.31 R; Unbelievably dissimilar eyes Odds:10 ** 15 L, 6 million to 1 R

National University CSIA Needs Industry partners that will collaborate and -- Provide advisory resources to remain current in CyberSecurity and IA (CSIA) -- Assist in defining needed CSIA courseware for their employees -- Utilize laboratory facilities -- Contribute hardware and software -- Identify needed research topics for class and Capstone projects -- Partner in Centers of Excellence in CSIA -- Partner in federal research grants for CSIA -- Provide technical resources for research and publications Other universities that will complement joint research

CyberSecurity and IA Issues Maintaining IA as a Business Enabler -- securely and affordably letting the right people gain access to the right information Mitigate theft of confidential information -- personal and enterprise Provide a safe “right to privacy” social networking environment Concern about “letting down our security ‘guard’” during the economic crisis How do we best fit into the national CyberSecurity Initiative? Properly vetting Internet content -- the provenance challenge