1 / 21

Bill Newhouse

Bill Newhouse. Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology. Advancement of innovation within the Cybersecurity domain National Initiative for Cybersecurity Education (NICE )

geoff
Download Presentation

Bill Newhouse

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology

  2. Advancement of innovation within the Cybersecurity domain • National Initiative for Cybersecurity Education (NICE) • National Strategy for Trusted Identities in Cyberspace (NSTIC) • National Cybersecurity Center of Excellence (NCCOE)

  3. National Initiative for Cybersecurity Education (NICE) Background • 2008 - Comprehensive National Cybersecurity Initiative #8 • “…we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees.” • 2009 - 60-Day Cyber Review • Promote cybersecurity risk awareness for all citizens; • Build an education system that will enhance understanding of cybersecurity and allow the United States to retain and expand upon its scientific, engineering, and market leadership in information technology; • Expand and train the workforce to protect the Nation’s competitive advantage;

  4. NICE Goals • Raise national awareness about risks in cyberspace. • Broaden the pool of individuals prepared to enter the cybersecurity workforce. • Cultivate a globally competitive cybersecurity workforce.

  5. Raise national awareness about risks in cyberspace. • Improve knowledge of risks and vulnerabilities in cyberspace. • Promote the use of cybersecurity resources and tools.

  6. Broaden the pool of individuals prepared to enter the cybersecurity workforce • Increase exposure to cybersecurity in PreK-12 education by emphasizing connections to Science, Technology, Engineering, and Mathematics (STEM) education and the role of mathematics and computational thinking in cybersecurity. • Promote interest in computer science and cybersecurity by increasing the diversity and quantity of course offerings and research opportunities.

  7. Cultivate a globally competitive cybersecurity workforce. • Encourage the development and adoption of the National Cybersecurity Workforce Framework. • Develop cybersecurity workforce forecasting tools. • Establish standards and guidelines for cybersecurity training and professional development. • Analyze and identify best practices to help organizations recruit and retain cybersecurity professionals. • Evaluate the professionalization of the cybersecurity workforce.

  8. Keeping Track of NICE • NICE Website • http://csrc.nist.gov/nice/ • Stop.Think.Connect • http://staysafeonline.org/stop-think-connect/ • CyberCorps® – Scholarship for Service (SFS)  Solicitation • http://www.nsf.gov/pubs/2012/nsf12585/nsf12585.pdf • Professionalizing the Nation's Cybersecurity Workforce: Criteria for Future Decision-Making • http://sites.nationalacademies.org/CSTB/CurrentProjects/CSTB_070783 • National Institute for Cybersecurity Studies (NICS) • Coming Soon (2013)

  9. National Strategy for Trusted Identities in Cyberspace (NSTIC) • Technologies exist now to make online transactions more secure, private, and more convenient. • A vision of the future where the private sector, civil societies, and the public sector collaborate to create the standards and policies needed for interoperable trusted credentials that would dramatically reduce ID theft and fraud online. • By acting now and creating a more trusted environment for online transactions, we will ensure that the Internet continues to support innovation and the creation of new jobs.

  10. NSTIC in the Near Future • Formation of the Identity Ecosystem Steering Group (IESG) August 15-16 in Chicago.  www.idecosystem.org • Award of $9m+ in pilots in early September • http://www.nist.gov/nstic/2012-NSTIC-Pilot-Grant-FFO-Amendment3.pdf

  11. Following NSTIC on Twitter • NSTIC NPO   • @NSTICNPO • The official handle of the National Program Office of the National Strategy for Trusted Identities in Cyberspace • http://www.nist.gov/nstic/

  12. Following NSTIC on Twitter • Identity Ecosystem • @id_eco_system • NSTIC Identity Ecosystem Steering Group Secretariat • · http://idecosystem.org

  13. Public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. • Bringing together experts from industry, government and academia to address present-day cybersecurity challenges, test emerging technologies, and deliver quick and cost-effective solutions. • Hosted by NIST in collaboration with the State of Maryland Department of Economic Development and Montgomery County, Maryland. 

  14. Vision: Provide a world class, collaborative environment for integrating cybersecurity solutions that stimulate e-commerce and national economic growth. • Mission: Foster the rapid adoption and broad deployment of integrated cybersecurity tools and techniques that enhance consumer confidence in U.S. information systems.

  15. Key Center Goals: • Disseminate new principles and mechanics underlying security standards, metrics, and best practices for secure and privacy-preserving information technologies • Develop and test methods for composing, monitoring, and measuring the security posture of computer and enterprise systems • Achieve broad adoption of practical, affordable, and useful cybersecurity capabilities across the full range of commercial and government sectors

  16. Use Case Initial Selections • Health Care IT Use Case: Information Exchange – Q4FY12 • Cloud IT Use Case: Policy Enforcement – Q1FY13 • Federal Use Case: Continuous Monitoring – Q1FY13 • Foster an Environment to Exchange Knowledge • Host a focused technology session centered around protected and signed BIOS – Q4FY12

  17. • Initial work space • • University of MD, Rockville • • 6,092 sq. ft,. 4 labs, 8 offices, collaboration spaces • • IT infrastructure selected and purchased • • Furniture selected and purchased

  18. Expected NCCoE Benefits • Accelerated adoption of practical, affordable, and usable cybersecurity solutions • Increased opportunities for innovation • Trusted environment for interaction among businesses and solution providers • Innovation resulting in possible new cybersecurity products, services, and businesses • Further the understanding of current cybersecurity technology capabilities and costs

  19. Keeping Track of NCCOE Planning and Activities • http://csrc.nist.gov/nccoe/index.html

  20. NIST Information Technology Labhttp://www.nist.gov/itl/Computer Security Divisionhttp://csrc.nist.gov/Bill Newhousewilliam.newhouse@nist.gov

More Related