SlideShare ist ein Scribd-Unternehmen logo
1 von 16
© 2013 IBM Corporation
Cybersecurity education for the next generation
Advancing a collaborative approach
April 2013
© 2013 IBM Corporation2
In a world of increasing information security threats,
academic initiatives focused on cybersecurity are
proliferating – yet, there is still the danger of falling short
in addressing the long-term threat.
To avoid becoming too focused on near-term issues,
academic programs must be more collaborative across
their own institutions, with industry, government and
among the global academic community.
Only by working in concert can we meet today’s demand
while educating the next generation to create a more
secure future.
© 2013 IBM Corporation
Analysis approach
3
• IBM monitors over 200 cybersecurity academic programs as part of its
Cyber Security Innovation program
• From those 200+ institutions, we selected 15 programs in 6 different
countries
• The selections were made based on geographic location, program
maturity, and diversity of approaches
• We conducted 60 minute qualitative interviews with faculty members,
department chairs and others
• We augmented the research with data from IBM’s 2012 Tech Trends
which surveyed over 450 students and 250 educators from 13 countries
© 2013 IBM Corporation
Cybersecurity is top of mind for students, educators, industry and
government – there is a proliferation of programs and a very strong demand
for trained professionals
 Industry and government are currently
facing a significant skills gap
 There is an enormous focus from national
governments
 The academic programs we interviewed all
stated that the demand for their students
is extremely high
 In the future, our interviewees envisioned:
– A larger threat
– Increasing demand and more programs
– New skills needed and taught
– More rigor and a broader scope
4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13
“The DoHS can’t find
enough people to hire,
and there are not enough
people in the pipeline to
protect companies, critical
infrastructures and
governments in future…
Governments, business
and the IT security
industry need to work
together to make cyber
security more visible and
attractive as a career.”1
- Mark Weatherford, Deputy Under-secretary for
Cybersecurity at the US Department of Homeland
Security (DoHS)
© 2013 IBM Corporation
Students and educators see security as an important topic – they also see it
as a barrier to technology adoption and feel their institutions aren’t doing
enough
Less than 60% of students and educators believe their academic
programs address the creation and development of IT security
practices for these emerging technology areas
SOURCE: IBM 2012 Tech Trends5
With all of the progress being made by cybersecurity academic programs, there is
still work needed to fully embed information security practices and principles
Percentage of students and educators who see security
as a top barrier to technology adoption
© 2013 IBM Corporation
Programs are expected to provide more of everything – four common trends
were identified by the educators we interviewed
6
© 2013 IBM Corporation
There is a very strong demand for trained professionals which has caused
programs to face a number of challenges – straining organizational and
technology resources
7
© 2013 IBM Corporation
“Similar to the observation that security must be built
into systems from the start, security concepts also need
to be covered in the computer science curriculum from
the very beginning…this creates the challenge of
making room for these concepts in courses that already
have plenty of material in them.”
— Dr. Mustaque Ahamad
Professor, College of Computing, Georgia Institute of Technology
8
© 2013 IBM Corporation
Programs are addressing the challenges in different ways – taking different
approaches to cybersecurity education, but still sharing common principles
9
Specializing
early &
focused on
application
Fundamentals
early &
focused on
theory
Formal discipline
Theory and practice
Teach in an integrated fashion
Basic principles in all programs
Independent study and student
interest groups
Government and industry
collaboration
Strong faculty development
© 2013 IBM Corporation
These trends, challenges, issues and differing perspectives cannot be met
by each academic program on its own – a set of leading practices is needed
10
© 2013 IBM Corporation
Collaborate within your own institution
Holistic
• Programs provide a broad
spectrum of traditional and
emerging technical areas
• Covers security policy and
management
Inter-
disciplinary
• Requires an ethics course
• Offers courses in policy,
management, public policy,
international affairs, psychology,
law, and economics
• Joint programs with other schools
Diverse
programs
• Most programs are focused at the
graduate level, fewer have
dedicated undergraduate programs
• Concentrations or minors
11
“Interdisciplinary education
for cybersecurity is essential.
It is not only about computer
science and engineering. We
are working to bring together
multiple programs from our
university – criminology, brain
sciences, statistics, ethics,
healthcare, informatics,
economics and risk analysis –
to truly develop a
comprehensive approach to
security thinking.”
— Dr. Bhavani Thuraisingham
Louis A. Beecherl Jr. Distinguished Professor,
Department of Computer Science, Executive Director of
the Cyber Security Research and Education Institute,
The University of Texas at Dallas
© 2013 IBM Corporation
Co-evolve with industry and government
Hands-on
• Extensive laboratory work and
projects
• Special interest groups, “grey hat”
clubs and hacking competitions
• Students as tech support or
security operations for university
• Mandatory internships
Business
focused
• Formalized processes
• Industry advisory board
• Business partners provide inputs
on curriculum design
• Fellowships and scholarships
• Fund research, sponsor design
projects and research centers
• Send employees for training and
advanced degrees
12
“We take pride in our close
association with industry in
building our cybersecurity
research and education
programs. We can realign
our research and curricular
focus based on their
exposure to the latest
trends and needs in the
market.”
— Dr. Suku Nair
Professor and Chair, Department of Computer Science and
Engineering, Director of SMU HACNet Labs, Southern
Methodist University
© 2013 IBM Corporation
Connect across the global academic community
Research
oriented
• Formal research institute(s) that are
cross-department
• Single and multi university research
initiatives with national governments
• Students are the primary form of
technology transfer
Global
collabor-
ation
• Most global collaborations aren’t
formal
• A need for a common language
between scientists, industry and
policy makers
• Need the development of a
foundation for the “science of
security”
13
“There is a significant need
for a common language of
information security, not
within the technical
discipline, but between
government, academia and
different industries –
information security
specialists need to be
understood by engineers,
policy makers and business
leaders, and vice versa.”
— Prof. Dr. Michael Waidner
Chair Professor for Security in Information Technology,
Technical University of Darmstadt, Director of the Fraunhofer
Institute for Secure Information Technology
© 2013 IBM Corporation
Recommendations
14
Strive to balance the near-term requirements of industry and government while
educating future faculty members and making investments in research
1
2
3
4
5
Increase awareness and expertise
Treat security education as a global issue
Approach security comprehensively, linking technical to
nontechnical fields
Seek innovative ways to fund labs and pursue real-world
projects
Advance a “science of security”
© 2013 IBM Corporation
© 2013 IBM Corporation
For more information
Contact
David Jarvis
Client Insights, Senior Consultant, IBM Center for Applied Insights
http://www.ibm.com/ibmcai

Weitere ähnliche Inhalte

Was ist angesagt?

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 

Was ist angesagt? (20)

Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
NIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram PosterNIST Cyber Security Framework V1.1 - Infogram Poster
NIST Cyber Security Framework V1.1 - Infogram Poster
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
Security and management
Security and managementSecurity and management
Security and management
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
information security technology
information security technologyinformation security technology
information security technology
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Physical security
Physical securityPhysical security
Physical security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 

Ähnlich wie Cybersecurity education for the next generation

A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
CSCJournals
 

Ähnlich wie Cybersecurity education for the next generation (20)

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 Cybersecurity
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
CyberSecurity - Linda Sharp
CyberSecurity - Linda SharpCyberSecurity - Linda Sharp
CyberSecurity - Linda Sharp
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 
Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 

Mehr von IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Mehr von IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Cybersecurity education for the next generation

  • 1. © 2013 IBM Corporation Cybersecurity education for the next generation Advancing a collaborative approach April 2013
  • 2. © 2013 IBM Corporation2 In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat. To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community. Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
  • 3. © 2013 IBM Corporation Analysis approach 3 • IBM monitors over 200 cybersecurity academic programs as part of its Cyber Security Innovation program • From those 200+ institutions, we selected 15 programs in 6 different countries • The selections were made based on geographic location, program maturity, and diversity of approaches • We conducted 60 minute qualitative interviews with faculty members, department chairs and others • We augmented the research with data from IBM’s 2012 Tech Trends which surveyed over 450 students and 250 educators from 13 countries
  • 4. © 2013 IBM Corporation Cybersecurity is top of mind for students, educators, industry and government – there is a proliferation of programs and a very strong demand for trained professionals  Industry and government are currently facing a significant skills gap  There is an enormous focus from national governments  The academic programs we interviewed all stated that the demand for their students is extremely high  In the future, our interviewees envisioned: – A larger threat – Increasing demand and more programs – New skills needed and taught – More rigor and a broader scope 4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13 “The DoHS can’t find enough people to hire, and there are not enough people in the pipeline to protect companies, critical infrastructures and governments in future… Governments, business and the IT security industry need to work together to make cyber security more visible and attractive as a career.”1 - Mark Weatherford, Deputy Under-secretary for Cybersecurity at the US Department of Homeland Security (DoHS)
  • 5. © 2013 IBM Corporation Students and educators see security as an important topic – they also see it as a barrier to technology adoption and feel their institutions aren’t doing enough Less than 60% of students and educators believe their academic programs address the creation and development of IT security practices for these emerging technology areas SOURCE: IBM 2012 Tech Trends5 With all of the progress being made by cybersecurity academic programs, there is still work needed to fully embed information security practices and principles Percentage of students and educators who see security as a top barrier to technology adoption
  • 6. © 2013 IBM Corporation Programs are expected to provide more of everything – four common trends were identified by the educators we interviewed 6
  • 7. © 2013 IBM Corporation There is a very strong demand for trained professionals which has caused programs to face a number of challenges – straining organizational and technology resources 7
  • 8. © 2013 IBM Corporation “Similar to the observation that security must be built into systems from the start, security concepts also need to be covered in the computer science curriculum from the very beginning…this creates the challenge of making room for these concepts in courses that already have plenty of material in them.” — Dr. Mustaque Ahamad Professor, College of Computing, Georgia Institute of Technology 8
  • 9. © 2013 IBM Corporation Programs are addressing the challenges in different ways – taking different approaches to cybersecurity education, but still sharing common principles 9 Specializing early & focused on application Fundamentals early & focused on theory Formal discipline Theory and practice Teach in an integrated fashion Basic principles in all programs Independent study and student interest groups Government and industry collaboration Strong faculty development
  • 10. © 2013 IBM Corporation These trends, challenges, issues and differing perspectives cannot be met by each academic program on its own – a set of leading practices is needed 10
  • 11. © 2013 IBM Corporation Collaborate within your own institution Holistic • Programs provide a broad spectrum of traditional and emerging technical areas • Covers security policy and management Inter- disciplinary • Requires an ethics course • Offers courses in policy, management, public policy, international affairs, psychology, law, and economics • Joint programs with other schools Diverse programs • Most programs are focused at the graduate level, fewer have dedicated undergraduate programs • Concentrations or minors 11 “Interdisciplinary education for cybersecurity is essential. It is not only about computer science and engineering. We are working to bring together multiple programs from our university – criminology, brain sciences, statistics, ethics, healthcare, informatics, economics and risk analysis – to truly develop a comprehensive approach to security thinking.” — Dr. Bhavani Thuraisingham Louis A. Beecherl Jr. Distinguished Professor, Department of Computer Science, Executive Director of the Cyber Security Research and Education Institute, The University of Texas at Dallas
  • 12. © 2013 IBM Corporation Co-evolve with industry and government Hands-on • Extensive laboratory work and projects • Special interest groups, “grey hat” clubs and hacking competitions • Students as tech support or security operations for university • Mandatory internships Business focused • Formalized processes • Industry advisory board • Business partners provide inputs on curriculum design • Fellowships and scholarships • Fund research, sponsor design projects and research centers • Send employees for training and advanced degrees 12 “We take pride in our close association with industry in building our cybersecurity research and education programs. We can realign our research and curricular focus based on their exposure to the latest trends and needs in the market.” — Dr. Suku Nair Professor and Chair, Department of Computer Science and Engineering, Director of SMU HACNet Labs, Southern Methodist University
  • 13. © 2013 IBM Corporation Connect across the global academic community Research oriented • Formal research institute(s) that are cross-department • Single and multi university research initiatives with national governments • Students are the primary form of technology transfer Global collabor- ation • Most global collaborations aren’t formal • A need for a common language between scientists, industry and policy makers • Need the development of a foundation for the “science of security” 13 “There is a significant need for a common language of information security, not within the technical discipline, but between government, academia and different industries – information security specialists need to be understood by engineers, policy makers and business leaders, and vice versa.” — Prof. Dr. Michael Waidner Chair Professor for Security in Information Technology, Technical University of Darmstadt, Director of the Fraunhofer Institute for Secure Information Technology
  • 14. © 2013 IBM Corporation Recommendations 14 Strive to balance the near-term requirements of industry and government while educating future faculty members and making investments in research 1 2 3 4 5 Increase awareness and expertise Treat security education as a global issue Approach security comprehensively, linking technical to nontechnical fields Seek innovative ways to fund labs and pursue real-world projects Advance a “science of security”
  • 15. © 2013 IBM Corporation
  • 16. © 2013 IBM Corporation For more information Contact David Jarvis Client Insights, Senior Consultant, IBM Center for Applied Insights http://www.ibm.com/ibmcai

Hinweis der Redaktion

  1. 2500 (10% setup, 5% answer, 85% why it is the right answer)