1 / 10

Promoting Research and Application of Information Assurance and Cybersecurity

Promoting Research and Application of Information Assurance and Cybersecurity. 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information Security Officer, State of California Stephanie Dietrich, Manager of Industry Partnerships, CallT2, University of California, San Diego

golda
Download Presentation

Promoting Research and Application of Information Assurance and Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Promoting Research and Applicationof Information Assurance and Cybersecurity 6th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information Security Officer, State of California Stephanie Dietrich, Manager of Industry Partnerships, CallT2, University of California, San Diego Murray Jennex, Ph.D., Associate Professor, Information and Decision Systems, SDSU Gordon Romney, Ph.D., Professor, Computer Science and Information Technology, National University

  2. Cyber Security Research and Education at SDSU Murray E. Jennex, Ph.D., P.E., CISSP, CSSLP San Diego State University 6th Annual The Security Summit

  3. Who Am I? • Ph.D. from the Claremont Graduate University • MBA, MS in Software Engineering, MS in Telecommunications Management, BA in Chemistry and Physics • 20 years experience in commercial nuclear power • Professional Engineer, Mechanical Engineering, California • Certified Information Systems Security Professional • Certified Secure Software Lifecycle Professional • Former Navy Nuclear Power Officer • Editor in Chief, International Journal of Knowledge Management • Co-editor in Chief, International Journal of Information Systems for Crisis Response and Management • Risk Assessment Principle Investigator, National Center for Border Security and Immigration • Author of over 100 articles, papers, books • “Cases in Knowledge Management” 2005 • “Knowledge Management in Modern Organizations” 2007 • “Knowledge Management: Concepts, Methodologies, Tools, and Applications, Volumes I-VI,” 2008 • “Current Issues in Knowledge Management,” 2008. • “Knowledge Management, Organizational Memory and Transfer Behavior: Global Approaches and Advancements,” 2009 • Center for Commercialization of Advanced Technology San Diego State University

  4. Security is Part of Several Programs • Masters of IS • Masters in Accounting Information Systems • MBA • Masters in Homeland Security • Masters of CS • IS and CS under graduates have the opportunity to take graduate level security courses

  5. IS Courses Supporting Security • IDS755, Information Security Management • Covers how to setup a security program • Can’t tell the difference between hackers, terrorists, or warfare • IDS695, Systems Analysis and Design I • Covers process analysis • Analyzes Systems for security requirements • IDS697, Systems Analysis and Design II • Covers systems design • Covers secure programming and system security design • IDS687, Data Communications • Network security

  6. Future IS Security Curricula • Planning on a management specialty in IS • Would add 2 more specific IS Security Courses: • IS Security Technologies • IS Security Operations • These would be used with the previous courses • Additionally looking at adding a undergraduate security course

  7. HS Security Curricula • Has a specialty in Information Security using the IS courses • Also has courses in: • Vulnerability and Threat Assessment • Intelligence and Homeland Security • Internet Mapping and Distributed GIServices

  8. Facilities/Partnerships/Issues • Visualization Laboratory • Part of the DHS National Center for Border Security Issues • Several grants/partnerships with government and industry partners • They can work with us and of course own what is produced • No real budget (given the budget situation not likely to have any soon) • Need more expertise

  9. Cyber Security Research • Graduate students working with faculty • Some grant support, mostly in the HS Program • Some areas of research: • Risk Monitor • Facial Recognition/Biometrics • Critical Infrastructure • Threat assessment • Security Architecture Design and Evaluation • Data Fusion for Intelligence • Crisis Response • Identity Theft/Management • Physical security

  10. What We Would Do/Like • Willing to work on grant proposals with interested partners • Willing to partner with anyone who can bring something to the table (we have the students wanting to work) • In particular looking for Border Security technologies/partners

More Related