SlideShare uma empresa Scribd logo
1 de 16
© 2013 IBM Corporation
Cybersecurity education for the next generation
Advancing a collaborative approach
April 2013
© 2013 IBM Corporation2
In a world of increasing information security threats,
academic initiatives focused on cybersecurity are
proliferating – yet, there is still the danger of falling short
in addressing the long-term threat.
To avoid becoming too focused on near-term issues,
academic programs must be more collaborative across
their own institutions, with industry, government and
among the global academic community.
Only by working in concert can we meet today’s demand
while educating the next generation to create a more
secure future.
© 2013 IBM Corporation
Analysis approach
3
• IBM monitors over 200 cybersecurity academic programs as part of its
Cyber Security Innovation program
• From those 200+ institutions, we selected 15 programs in 6 different
countries
• The selections were made based on geographic location, program
maturity, and diversity of approaches
• We conducted 60 minute qualitative interviews with faculty members,
department chairs and others
• We augmented the research with data from IBM’s 2012 Tech Trends
which surveyed over 450 students and 250 educators from 13 countries
© 2013 IBM Corporation
Cybersecurity is top of mind for students, educators, industry and
government – there is a proliferation of programs and a very strong demand
for trained professionals
 Industry and government are currently
facing a significant skills gap
 There is an enormous focus from national
governments
 The academic programs we interviewed all
stated that the demand for their students
is extremely high
 In the future, our interviewees envisioned:
– A larger threat
– Increasing demand and more programs
– New skills needed and taught
– More rigor and a broader scope
4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13
“The DoHS can’t find
enough people to hire,
and there are not enough
people in the pipeline to
protect companies, critical
infrastructures and
governments in future…
Governments, business
and the IT security
industry need to work
together to make cyber
security more visible and
attractive as a career.”1
- Mark Weatherford, Deputy Under-secretary for
Cybersecurity at the US Department of Homeland
Security (DoHS)
© 2013 IBM Corporation
Students and educators see security as an important topic – they also see it
as a barrier to technology adoption and feel their institutions aren’t doing
enough
Less than 60% of students and educators believe their academic
programs address the creation and development of IT security
practices for these emerging technology areas
SOURCE: IBM 2012 Tech Trends5
With all of the progress being made by cybersecurity academic programs, there is
still work needed to fully embed information security practices and principles
Percentage of students and educators who see security
as a top barrier to technology adoption
© 2013 IBM Corporation
Programs are expected to provide more of everything – four common trends
were identified by the educators we interviewed
6
© 2013 IBM Corporation
There is a very strong demand for trained professionals which has caused
programs to face a number of challenges – straining organizational and
technology resources
7
© 2013 IBM Corporation
“Similar to the observation that security must be built
into systems from the start, security concepts also need
to be covered in the computer science curriculum from
the very beginning…this creates the challenge of
making room for these concepts in courses that already
have plenty of material in them.”
— Dr. Mustaque Ahamad
Professor, College of Computing, Georgia Institute of Technology
8
© 2013 IBM Corporation
Programs are addressing the challenges in different ways – taking different
approaches to cybersecurity education, but still sharing common principles
9
Specializing
early &
focused on
application
Fundamentals
early &
focused on
theory
Formal discipline
Theory and practice
Teach in an integrated fashion
Basic principles in all programs
Independent study and student
interest groups
Government and industry
collaboration
Strong faculty development
© 2013 IBM Corporation
These trends, challenges, issues and differing perspectives cannot be met
by each academic program on its own – a set of leading practices is needed
10
© 2013 IBM Corporation
Collaborate within your own institution
Holistic
• Programs provide a broad
spectrum of traditional and
emerging technical areas
• Covers security policy and
management
Inter-
disciplinary
• Requires an ethics course
• Offers courses in policy,
management, public policy,
international affairs, psychology,
law, and economics
• Joint programs with other schools
Diverse
programs
• Most programs are focused at the
graduate level, fewer have
dedicated undergraduate programs
• Concentrations or minors
11
“Interdisciplinary education
for cybersecurity is essential.
It is not only about computer
science and engineering. We
are working to bring together
multiple programs from our
university – criminology, brain
sciences, statistics, ethics,
healthcare, informatics,
economics and risk analysis –
to truly develop a
comprehensive approach to
security thinking.”
— Dr. Bhavani Thuraisingham
Louis A. Beecherl Jr. Distinguished Professor,
Department of Computer Science, Executive Director of
the Cyber Security Research and Education Institute,
The University of Texas at Dallas
© 2013 IBM Corporation
Co-evolve with industry and government
Hands-on
• Extensive laboratory work and
projects
• Special interest groups, “grey hat”
clubs and hacking competitions
• Students as tech support or
security operations for university
• Mandatory internships
Business
focused
• Formalized processes
• Industry advisory board
• Business partners provide inputs
on curriculum design
• Fellowships and scholarships
• Fund research, sponsor design
projects and research centers
• Send employees for training and
advanced degrees
12
“We take pride in our close
association with industry in
building our cybersecurity
research and education
programs. We can realign
our research and curricular
focus based on their
exposure to the latest
trends and needs in the
market.”
— Dr. Suku Nair
Professor and Chair, Department of Computer Science and
Engineering, Director of SMU HACNet Labs, Southern
Methodist University
© 2013 IBM Corporation
Connect across the global academic community
Research
oriented
• Formal research institute(s) that are
cross-department
• Single and multi university research
initiatives with national governments
• Students are the primary form of
technology transfer
Global
collabor-
ation
• Most global collaborations aren’t
formal
• A need for a common language
between scientists, industry and
policy makers
• Need the development of a
foundation for the “science of
security”
13
“There is a significant need
for a common language of
information security, not
within the technical
discipline, but between
government, academia and
different industries –
information security
specialists need to be
understood by engineers,
policy makers and business
leaders, and vice versa.”
— Prof. Dr. Michael Waidner
Chair Professor for Security in Information Technology,
Technical University of Darmstadt, Director of the Fraunhofer
Institute for Secure Information Technology
© 2013 IBM Corporation
Recommendations
14
Strive to balance the near-term requirements of industry and government while
educating future faculty members and making investments in research
1
2
3
4
5
Increase awareness and expertise
Treat security education as a global issue
Approach security comprehensively, linking technical to
nontechnical fields
Seek innovative ways to fund labs and pursue real-world
projects
Advance a “science of security”
© 2013 IBM Corporation
© 2013 IBM Corporation
For more information
Contact
David Jarvis
Client Insights, Senior Consultant, IBM Center for Applied Insights
http://www.ibm.com/ibmcai

Mais conteúdo relacionado

Semelhante a Cybersecurity education for the next generation

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityJulie Evans
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelJulie Evans
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Highervista
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeJulie Evans
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 

Semelhante a Cybersecurity education for the next generation (20)

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 Cybersecurity
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
CyberSecurity - Linda Sharp
CyberSecurity - Linda SharpCyberSecurity - Linda Sharp
CyberSecurity - Linda Sharp
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 
Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 

Mais de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Mais de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Cybersecurity education for the next generation

  • 1. © 2013 IBM Corporation Cybersecurity education for the next generation Advancing a collaborative approach April 2013
  • 2. © 2013 IBM Corporation2 In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat. To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community. Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
  • 3. © 2013 IBM Corporation Analysis approach 3 • IBM monitors over 200 cybersecurity academic programs as part of its Cyber Security Innovation program • From those 200+ institutions, we selected 15 programs in 6 different countries • The selections were made based on geographic location, program maturity, and diversity of approaches • We conducted 60 minute qualitative interviews with faculty members, department chairs and others • We augmented the research with data from IBM’s 2012 Tech Trends which surveyed over 450 students and 250 educators from 13 countries
  • 4. © 2013 IBM Corporation Cybersecurity is top of mind for students, educators, industry and government – there is a proliferation of programs and a very strong demand for trained professionals  Industry and government are currently facing a significant skills gap  There is an enormous focus from national governments  The academic programs we interviewed all stated that the demand for their students is extremely high  In the future, our interviewees envisioned: – A larger threat – Increasing demand and more programs – New skills needed and taught – More rigor and a broader scope 4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13 “The DoHS can’t find enough people to hire, and there are not enough people in the pipeline to protect companies, critical infrastructures and governments in future… Governments, business and the IT security industry need to work together to make cyber security more visible and attractive as a career.”1 - Mark Weatherford, Deputy Under-secretary for Cybersecurity at the US Department of Homeland Security (DoHS)
  • 5. © 2013 IBM Corporation Students and educators see security as an important topic – they also see it as a barrier to technology adoption and feel their institutions aren’t doing enough Less than 60% of students and educators believe their academic programs address the creation and development of IT security practices for these emerging technology areas SOURCE: IBM 2012 Tech Trends5 With all of the progress being made by cybersecurity academic programs, there is still work needed to fully embed information security practices and principles Percentage of students and educators who see security as a top barrier to technology adoption
  • 6. © 2013 IBM Corporation Programs are expected to provide more of everything – four common trends were identified by the educators we interviewed 6
  • 7. © 2013 IBM Corporation There is a very strong demand for trained professionals which has caused programs to face a number of challenges – straining organizational and technology resources 7
  • 8. © 2013 IBM Corporation “Similar to the observation that security must be built into systems from the start, security concepts also need to be covered in the computer science curriculum from the very beginning…this creates the challenge of making room for these concepts in courses that already have plenty of material in them.” — Dr. Mustaque Ahamad Professor, College of Computing, Georgia Institute of Technology 8
  • 9. © 2013 IBM Corporation Programs are addressing the challenges in different ways – taking different approaches to cybersecurity education, but still sharing common principles 9 Specializing early & focused on application Fundamentals early & focused on theory Formal discipline Theory and practice Teach in an integrated fashion Basic principles in all programs Independent study and student interest groups Government and industry collaboration Strong faculty development
  • 10. © 2013 IBM Corporation These trends, challenges, issues and differing perspectives cannot be met by each academic program on its own – a set of leading practices is needed 10
  • 11. © 2013 IBM Corporation Collaborate within your own institution Holistic • Programs provide a broad spectrum of traditional and emerging technical areas • Covers security policy and management Inter- disciplinary • Requires an ethics course • Offers courses in policy, management, public policy, international affairs, psychology, law, and economics • Joint programs with other schools Diverse programs • Most programs are focused at the graduate level, fewer have dedicated undergraduate programs • Concentrations or minors 11 “Interdisciplinary education for cybersecurity is essential. It is not only about computer science and engineering. We are working to bring together multiple programs from our university – criminology, brain sciences, statistics, ethics, healthcare, informatics, economics and risk analysis – to truly develop a comprehensive approach to security thinking.” — Dr. Bhavani Thuraisingham Louis A. Beecherl Jr. Distinguished Professor, Department of Computer Science, Executive Director of the Cyber Security Research and Education Institute, The University of Texas at Dallas
  • 12. © 2013 IBM Corporation Co-evolve with industry and government Hands-on • Extensive laboratory work and projects • Special interest groups, “grey hat” clubs and hacking competitions • Students as tech support or security operations for university • Mandatory internships Business focused • Formalized processes • Industry advisory board • Business partners provide inputs on curriculum design • Fellowships and scholarships • Fund research, sponsor design projects and research centers • Send employees for training and advanced degrees 12 “We take pride in our close association with industry in building our cybersecurity research and education programs. We can realign our research and curricular focus based on their exposure to the latest trends and needs in the market.” — Dr. Suku Nair Professor and Chair, Department of Computer Science and Engineering, Director of SMU HACNet Labs, Southern Methodist University
  • 13. © 2013 IBM Corporation Connect across the global academic community Research oriented • Formal research institute(s) that are cross-department • Single and multi university research initiatives with national governments • Students are the primary form of technology transfer Global collabor- ation • Most global collaborations aren’t formal • A need for a common language between scientists, industry and policy makers • Need the development of a foundation for the “science of security” 13 “There is a significant need for a common language of information security, not within the technical discipline, but between government, academia and different industries – information security specialists need to be understood by engineers, policy makers and business leaders, and vice versa.” — Prof. Dr. Michael Waidner Chair Professor for Security in Information Technology, Technical University of Darmstadt, Director of the Fraunhofer Institute for Secure Information Technology
  • 14. © 2013 IBM Corporation Recommendations 14 Strive to balance the near-term requirements of industry and government while educating future faculty members and making investments in research 1 2 3 4 5 Increase awareness and expertise Treat security education as a global issue Approach security comprehensively, linking technical to nontechnical fields Seek innovative ways to fund labs and pursue real-world projects Advance a “science of security”
  • 15. © 2013 IBM Corporation
  • 16. © 2013 IBM Corporation For more information Contact David Jarvis Client Insights, Senior Consultant, IBM Center for Applied Insights http://www.ibm.com/ibmcai

Notas do Editor

  1. 2500 (10% setup, 5% answer, 85% why it is the right answer)