SlideShare a Scribd company logo
1 of 16
© 2013 IBM Corporation
Cybersecurity education for the next generation
Advancing a collaborative approach
April 2013
© 2013 IBM Corporation2
In a world of increasing information security threats,
academic initiatives focused on cybersecurity are
proliferating – yet, there is still the danger of falling short
in addressing the long-term threat.
To avoid becoming too focused on near-term issues,
academic programs must be more collaborative across
their own institutions, with industry, government and
among the global academic community.
Only by working in concert can we meet today’s demand
while educating the next generation to create a more
secure future.
© 2013 IBM Corporation
Analysis approach
3
• IBM monitors over 200 cybersecurity academic programs as part of its
Cyber Security Innovation program
• From those 200+ institutions, we selected 15 programs in 6 different
countries
• The selections were made based on geographic location, program
maturity, and diversity of approaches
• We conducted 60 minute qualitative interviews with faculty members,
department chairs and others
• We augmented the research with data from IBM’s 2012 Tech Trends
which surveyed over 450 students and 250 educators from 13 countries
© 2013 IBM Corporation
Cybersecurity is top of mind for students, educators, industry and
government – there is a proliferation of programs and a very strong demand
for trained professionals
 Industry and government are currently
facing a significant skills gap
 There is an enormous focus from national
governments
 The academic programs we interviewed all
stated that the demand for their students
is extremely high
 In the future, our interviewees envisioned:
– A larger threat
– Increasing demand and more programs
– New skills needed and taught
– More rigor and a broader scope
4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13
“The DoHS can’t find
enough people to hire,
and there are not enough
people in the pipeline to
protect companies, critical
infrastructures and
governments in future…
Governments, business
and the IT security
industry need to work
together to make cyber
security more visible and
attractive as a career.”1
- Mark Weatherford, Deputy Under-secretary for
Cybersecurity at the US Department of Homeland
Security (DoHS)
© 2013 IBM Corporation
Students and educators see security as an important topic – they also see it
as a barrier to technology adoption and feel their institutions aren’t doing
enough
Less than 60% of students and educators believe their academic
programs address the creation and development of IT security
practices for these emerging technology areas
SOURCE: IBM 2012 Tech Trends5
With all of the progress being made by cybersecurity academic programs, there is
still work needed to fully embed information security practices and principles
Percentage of students and educators who see security
as a top barrier to technology adoption
© 2013 IBM Corporation
Programs are expected to provide more of everything – four common trends
were identified by the educators we interviewed
6
© 2013 IBM Corporation
There is a very strong demand for trained professionals which has caused
programs to face a number of challenges – straining organizational and
technology resources
7
© 2013 IBM Corporation
“Similar to the observation that security must be built
into systems from the start, security concepts also need
to be covered in the computer science curriculum from
the very beginning…this creates the challenge of
making room for these concepts in courses that already
have plenty of material in them.”
— Dr. Mustaque Ahamad
Professor, College of Computing, Georgia Institute of Technology
8
© 2013 IBM Corporation
Programs are addressing the challenges in different ways – taking different
approaches to cybersecurity education, but still sharing common principles
9
Specializing
early &
focused on
application
Fundamentals
early &
focused on
theory
Formal discipline
Theory and practice
Teach in an integrated fashion
Basic principles in all programs
Independent study and student
interest groups
Government and industry
collaboration
Strong faculty development
© 2013 IBM Corporation
These trends, challenges, issues and differing perspectives cannot be met
by each academic program on its own – a set of leading practices is needed
10
© 2013 IBM Corporation
Collaborate within your own institution
Holistic
• Programs provide a broad
spectrum of traditional and
emerging technical areas
• Covers security policy and
management
Inter-
disciplinary
• Requires an ethics course
• Offers courses in policy,
management, public policy,
international affairs, psychology,
law, and economics
• Joint programs with other schools
Diverse
programs
• Most programs are focused at the
graduate level, fewer have
dedicated undergraduate programs
• Concentrations or minors
11
“Interdisciplinary education
for cybersecurity is essential.
It is not only about computer
science and engineering. We
are working to bring together
multiple programs from our
university – criminology, brain
sciences, statistics, ethics,
healthcare, informatics,
economics and risk analysis –
to truly develop a
comprehensive approach to
security thinking.”
— Dr. Bhavani Thuraisingham
Louis A. Beecherl Jr. Distinguished Professor,
Department of Computer Science, Executive Director of
the Cyber Security Research and Education Institute,
The University of Texas at Dallas
© 2013 IBM Corporation
Co-evolve with industry and government
Hands-on
• Extensive laboratory work and
projects
• Special interest groups, “grey hat”
clubs and hacking competitions
• Students as tech support or
security operations for university
• Mandatory internships
Business
focused
• Formalized processes
• Industry advisory board
• Business partners provide inputs
on curriculum design
• Fellowships and scholarships
• Fund research, sponsor design
projects and research centers
• Send employees for training and
advanced degrees
12
“We take pride in our close
association with industry in
building our cybersecurity
research and education
programs. We can realign
our research and curricular
focus based on their
exposure to the latest
trends and needs in the
market.”
— Dr. Suku Nair
Professor and Chair, Department of Computer Science and
Engineering, Director of SMU HACNet Labs, Southern
Methodist University
© 2013 IBM Corporation
Connect across the global academic community
Research
oriented
• Formal research institute(s) that are
cross-department
• Single and multi university research
initiatives with national governments
• Students are the primary form of
technology transfer
Global
collabor-
ation
• Most global collaborations aren’t
formal
• A need for a common language
between scientists, industry and
policy makers
• Need the development of a
foundation for the “science of
security”
13
“There is a significant need
for a common language of
information security, not
within the technical
discipline, but between
government, academia and
different industries –
information security
specialists need to be
understood by engineers,
policy makers and business
leaders, and vice versa.”
— Prof. Dr. Michael Waidner
Chair Professor for Security in Information Technology,
Technical University of Darmstadt, Director of the Fraunhofer
Institute for Secure Information Technology
© 2013 IBM Corporation
Recommendations
14
Strive to balance the near-term requirements of industry and government while
educating future faculty members and making investments in research
1
2
3
4
5
Increase awareness and expertise
Treat security education as a global issue
Approach security comprehensively, linking technical to
nontechnical fields
Seek innovative ways to fund labs and pursue real-world
projects
Advance a “science of security”
© 2013 IBM Corporation
© 2013 IBM Corporation
For more information
Contact
David Jarvis
Client Insights, Senior Consultant, IBM Center for Applied Insights
http://www.ibm.com/ibmcai

More Related Content

What's hot

Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseShujun Li
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Computer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawarComputer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawarKing Parmeshwar Pawar :) Edu.Li
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
External memory
External memoryExternal memory
External memoryriddhishg
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overviewDr Neelesh Jain
 
A Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorA Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorEdureka!
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linuxNouman Baloch
 
Swap space management and protection in os
Swap space management and protection  in osSwap space management and protection  in os
Swap space management and protection in osrajshreemuthiah
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
IP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICTIP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICTLeonel Rivas
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 

What's hot (20)

Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
System Administration
System AdministrationSystem Administration
System Administration
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Computer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawarComputer hardware component Created by king parmeshwar pawar
Computer hardware component Created by king parmeshwar pawar
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
External memory
External memoryExternal memory
External memory
 
Linux security
Linux securityLinux security
Linux security
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 
A Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux AdministratorA Day In The Life Of A Linux Administrator
A Day In The Life Of A Linux Administrator
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linux
 
Swap space management and protection in os
Swap space management and protection  in osSwap space management and protection  in os
Swap space management and protection in os
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
IP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICTIP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICT
 
User management
User managementUser management
User management
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Security policies
Security policiesSecurity policies
Security policies
 

Similar to Cybersecurity education for the next generation

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityJulie Evans
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelJulie Evans
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Highervista
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeJulie Evans
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 

Similar to Cybersecurity education for the next generation (20)

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 Cybersecurity
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
CyberSecurity - Linda Sharp
CyberSecurity - Linda SharpCyberSecurity - Linda Sharp
CyberSecurity - Linda Sharp
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 
Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Cybersecurity education for the next generation

  • 1. © 2013 IBM Corporation Cybersecurity education for the next generation Advancing a collaborative approach April 2013
  • 2. © 2013 IBM Corporation2 In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat. To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community. Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
  • 3. © 2013 IBM Corporation Analysis approach 3 • IBM monitors over 200 cybersecurity academic programs as part of its Cyber Security Innovation program • From those 200+ institutions, we selected 15 programs in 6 different countries • The selections were made based on geographic location, program maturity, and diversity of approaches • We conducted 60 minute qualitative interviews with faculty members, department chairs and others • We augmented the research with data from IBM’s 2012 Tech Trends which surveyed over 450 students and 250 educators from 13 countries
  • 4. © 2013 IBM Corporation Cybersecurity is top of mind for students, educators, industry and government – there is a proliferation of programs and a very strong demand for trained professionals  Industry and government are currently facing a significant skills gap  There is an enormous focus from national governments  The academic programs we interviewed all stated that the demand for their students is extremely high  In the future, our interviewees envisioned: – A larger threat – Increasing demand and more programs – New skills needed and taught – More rigor and a broader scope 4 SOURCES: (1) “RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS”, ComputerWeekly.com, 2/26/13 “The DoHS can’t find enough people to hire, and there are not enough people in the pipeline to protect companies, critical infrastructures and governments in future… Governments, business and the IT security industry need to work together to make cyber security more visible and attractive as a career.”1 - Mark Weatherford, Deputy Under-secretary for Cybersecurity at the US Department of Homeland Security (DoHS)
  • 5. © 2013 IBM Corporation Students and educators see security as an important topic – they also see it as a barrier to technology adoption and feel their institutions aren’t doing enough Less than 60% of students and educators believe their academic programs address the creation and development of IT security practices for these emerging technology areas SOURCE: IBM 2012 Tech Trends5 With all of the progress being made by cybersecurity academic programs, there is still work needed to fully embed information security practices and principles Percentage of students and educators who see security as a top barrier to technology adoption
  • 6. © 2013 IBM Corporation Programs are expected to provide more of everything – four common trends were identified by the educators we interviewed 6
  • 7. © 2013 IBM Corporation There is a very strong demand for trained professionals which has caused programs to face a number of challenges – straining organizational and technology resources 7
  • 8. © 2013 IBM Corporation “Similar to the observation that security must be built into systems from the start, security concepts also need to be covered in the computer science curriculum from the very beginning…this creates the challenge of making room for these concepts in courses that already have plenty of material in them.” — Dr. Mustaque Ahamad Professor, College of Computing, Georgia Institute of Technology 8
  • 9. © 2013 IBM Corporation Programs are addressing the challenges in different ways – taking different approaches to cybersecurity education, but still sharing common principles 9 Specializing early & focused on application Fundamentals early & focused on theory Formal discipline Theory and practice Teach in an integrated fashion Basic principles in all programs Independent study and student interest groups Government and industry collaboration Strong faculty development
  • 10. © 2013 IBM Corporation These trends, challenges, issues and differing perspectives cannot be met by each academic program on its own – a set of leading practices is needed 10
  • 11. © 2013 IBM Corporation Collaborate within your own institution Holistic • Programs provide a broad spectrum of traditional and emerging technical areas • Covers security policy and management Inter- disciplinary • Requires an ethics course • Offers courses in policy, management, public policy, international affairs, psychology, law, and economics • Joint programs with other schools Diverse programs • Most programs are focused at the graduate level, fewer have dedicated undergraduate programs • Concentrations or minors 11 “Interdisciplinary education for cybersecurity is essential. It is not only about computer science and engineering. We are working to bring together multiple programs from our university – criminology, brain sciences, statistics, ethics, healthcare, informatics, economics and risk analysis – to truly develop a comprehensive approach to security thinking.” — Dr. Bhavani Thuraisingham Louis A. Beecherl Jr. Distinguished Professor, Department of Computer Science, Executive Director of the Cyber Security Research and Education Institute, The University of Texas at Dallas
  • 12. © 2013 IBM Corporation Co-evolve with industry and government Hands-on • Extensive laboratory work and projects • Special interest groups, “grey hat” clubs and hacking competitions • Students as tech support or security operations for university • Mandatory internships Business focused • Formalized processes • Industry advisory board • Business partners provide inputs on curriculum design • Fellowships and scholarships • Fund research, sponsor design projects and research centers • Send employees for training and advanced degrees 12 “We take pride in our close association with industry in building our cybersecurity research and education programs. We can realign our research and curricular focus based on their exposure to the latest trends and needs in the market.” — Dr. Suku Nair Professor and Chair, Department of Computer Science and Engineering, Director of SMU HACNet Labs, Southern Methodist University
  • 13. © 2013 IBM Corporation Connect across the global academic community Research oriented • Formal research institute(s) that are cross-department • Single and multi university research initiatives with national governments • Students are the primary form of technology transfer Global collabor- ation • Most global collaborations aren’t formal • A need for a common language between scientists, industry and policy makers • Need the development of a foundation for the “science of security” 13 “There is a significant need for a common language of information security, not within the technical discipline, but between government, academia and different industries – information security specialists need to be understood by engineers, policy makers and business leaders, and vice versa.” — Prof. Dr. Michael Waidner Chair Professor for Security in Information Technology, Technical University of Darmstadt, Director of the Fraunhofer Institute for Secure Information Technology
  • 14. © 2013 IBM Corporation Recommendations 14 Strive to balance the near-term requirements of industry and government while educating future faculty members and making investments in research 1 2 3 4 5 Increase awareness and expertise Treat security education as a global issue Approach security comprehensively, linking technical to nontechnical fields Seek innovative ways to fund labs and pursue real-world projects Advance a “science of security”
  • 15. © 2013 IBM Corporation
  • 16. © 2013 IBM Corporation For more information Contact David Jarvis Client Insights, Senior Consultant, IBM Center for Applied Insights http://www.ibm.com/ibmcai

Editor's Notes

  1. 2500 (10% setup, 5% answer, 85% why it is the right answer)