Texas Association of
State Systems for
Computing and
Communications
The Future is Here: IT Prime Time
Jim Brazell, Venture...
Twitter
#radicalplatypus
@radicalplatypus
In 1965, 49 years ago, Gordon Moore
of Intel famously proclaimed that
silicon density, the number of
transistors on comput...
http://www.arraycomm.com/pcct/coopers_law.htm
The number of conversations (voice and data)
conducted over a given area, in...
http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2014/01/79493994-786x305.jpg
http://bilder2.n-tv.de/img/incoming/origs12096381/1162732377-w1000-
h960/Hand-holding-zoomed-in.jpg
Antenna
Sensor
Control...
http://media.tested.com/uploads/0/5/5698-augmented_reality_wired_super.jpg
http://nikeinc.com/news/nike-unveils-revolutionary-nike-experience-for-basketball-and-training-athletes#/inline/8054
VIDEO...
9
http://research.gigaom.com/report/the-quantified-self-hacking-the-body-for-better-health-and-
performance/
http://www.industrytap.com/robotic-red-blood-cells-to-vastly-expand-human-capabilities/3656
Robotic Red Blood
Cells To Vas...
11
http://news.yahoo.com/human-cyborg-mcdonald-employees-assaulted-wearing-gear-210139320.html
August 4, 2014 -- “Revolution in
computing driven by Del Tesar at UT
Austin shifts focus from Cloud to Cloud
2.0: critical...
“The last economic
technology wave, the post-
industrial era, marked by
the computer, network,
and information
technology ...
Cyber
Physical
Systems
Cyber
Systems
Technology
Transformation
http://www.gadgetspage.com/wp-
http://img9.joyreactor.com/pics/post/gif-cats-iRobot-vacuum-cleaner-278519.gif
http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew
RobotBeerfromPicoView
http://www.tek-lado.com/wp-content/uploads/Necomimi-on-Sale-600x393.jpg
Shippo’s Neurowear
http://neurogadget.com/wp-content/uploads/2012/09/Necomimi-successor-Shippo-brain-controlled-tail-Neurowear-e1348342289528...
www.tstc.edu
(Harbor Research, 2003)
(Harbor Research, 2003)
1994 - 2004
(Harbor Research, 2003)
(Harbor Research, 2003)
2004 - 2014
(Harbor Research, 2003)
Cloud 2.0: Cyber Physical Systems
Cyber physical systems are at the heart of
the design, manufacture, installation,
operat...
April 15, 2015 – “Similar to the need of the United States’
computing industry to collaborate in the 1980’s to enhance
sem...
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
Cyber Physical Critical Infrastructure
Emergency services, telecom, energy,
law enforcement, fire departments,
utilities, ...
Source: Harbor
Research, 2003
Cyber Physical Systems
Utilities
A California study indicates that peak-rate usage can be shaved by 20 percent if utilities
used Automated Meter ...
SwRI, Patent thin-nickel-strip magneto-strictive sensor (MsS™).
Applicable to airplanes, ships, plants, pipelines and brid...
Telematics
http://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html
http://www.teradyne-ds.com/telematics/telematics01a...
ttp://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html
ttp://www.roadtraffic-technology.com/contractors/traffic_man/el...
August 5, 2014 – “Reminiscent of 911 attacks, fires blaze
in Texas cyber attack. Emergency operations are underway
as two ...
Apple Insider, Saturday, August
02, 2014, 08:42 pm PT (11:42
pm ET)
Al-Qaeda prefers
Android over
Apple's iOS
By Daniel Er...
/robonaut.jsc.nasa.gov/iss/#issmission
Think beyond walking, talking robots.
http://ces.cnet.com/2300-31045_1-10002192-9.html?s=0&o=10002192
Chevy Volt
http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew
RobotBeerfromPicoView
http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew
Beeriscriticalinfrastructure,
right?
Cloud 2.0:
Cyber
Control of
Operational
Technology
SystemsCloud:
Cyber Systems
Technology
Transformation
April 15, 2015 – The purpose of the Texas Cybersecurity Institute is to: (1)
enable cyber physical systems security and co...
– Southern Methodist University
– University of Texas, Dallas
– University of Texas San Antonio
– Our Lady of the Lake Uni...
December 10, 2017 -- “Cyber is a domain of
warfare, terrorism, and crime, while
simultaneously being the platform and engi...
• Minimal cyber
awareness
• Minimal cyber info
sharing
• Minimal cyber
assessments and
policy & procedure
evaluations
• Li...
January 24, 2018 – “…by focusing on
situational awareness, Texas
Cybersecurity Institute turns data into
actionable knowle...
http://www.tradingmarkets.com/featured_contributors/how-to-manage-investment-information-overload-
1583594.html
January 24, 2018 – “Texas Cyber-
security Institute partners with TSTC in
2014 and now offers near real-time
supply and de...
Contact: Michael A. Bettersworth
Associate Vice Chancellor, Senior Advisor
Texas State Technical College
512-647-8790
http...
January 24, 2018 – “Texas Cyber-security
Institute is funded by Texas State Agencies new
calculus for IT lifecycle managem...
1. Practice for Measuring Life-Cycle Costs for Network, Security, and
Information Technology
2. Practice for Measuring Ben...
January 24, 2018 – “Texas Cyber-
security Institute works at the
intersection of education, workforce,
and economic develo...
George Kozmetsky, IC2.org
photo courtesy of the University of Texas
Education
Economic
Development
Industry
Workforce
Cyber Innovation
Laboratories
Texas Agency
Leadership
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
August 4, 2014 -- “TASSCC first group in the nation
to lead education reform based on the
fundamental notion that cyber is...
STEM JOBS
STEM JOBS
Audience Survey
What percentage of jobs in
the U.S. in 2010 are
classified as STEM jobs by
the U.S. Department o...
STEM JOBS
60% or
more
STEM JOBS
59%-
25%
STEM JOBS
25%-
6%
STEM JOBS
Less than
6%
5.5% STEM JOBS
5.5% of U.S. Workforce,
7.6MM STEM Jobs in 2010
David Langdon, George McKittrick, David Beede, Beethika Kha...
½ of STEM Jobs are
Network and
Information Tech
David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Dom...
Is there a labor market
shortage of STEM workers?
The STEM Crisis Is a Myth
By Robert N. Charette
Posted 30 Aug 2013
http://spectrum.ieee.org/at-work/education/the-stem-cri...
http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
According to the Bureau of Labor Statistics,
NIT is projected to account for between
52% and 58% of all STEM occupations
b...
The truth behind the curtain
ANTHONY P. CARNEVALE NICOLE SMITH MICHELLE MELTON, “Science,
Technology, Engineering & Mathematics”, Georgetown University...
The Hidden STEM Economy,
Brookings Institute, 6.10.2013
http://www.brookings.edu/research/reports/2013/06/10-stem-economy-...
Special emphasis
should be placed on the
intersection of network
and information
technology (NIT) with
the arts, cyber sec...
November 14, 2014 -- “TASSCC teams with UT
System and Texas State Technical College to
offer Cyber-STEM Rigorous Programs ...
U.S. percentage of CTE
students in 2004, 17-38%, in
2004, qualifying 3 levels of
CTE participation.
National Assessment of...
“Those who complete both a strong
academic curriculum and a
vocational program of study (dual
concentrators) may have bett...
http://www.dentonrc.com/sharedcontent/utilities/clickedimage/index.html
Health
Arts
CTE
Academics
Student
Leadership
Character
Citizenship
Classical Contemporary
Education
March 15, 2015 -- “San Antonio all female
cybersecuity team from Southside ISD wins
Cyber Patriot national competition
ill...
The Public
The most unique
combination of
Cyber related
elements outside
the National Capital
Region
The United States
Air Force Security
Service invents the
field of cyber-
security in 1949 in
the Alamo City.
http://www.thenewnewinternet.com/wp-content/uploads/24th-air-force.jpg
2009 – Activation of 24th Air Force
Home of Air For...
91
San Antonio’s high-growth employment sectors –
Projected Fastest Growing Occupations in Bexar County
through 2014
Texas...
San Antonio has placed one team team to national each of the past 4
years including willing 3rd (2011) and 1st (2012).
htt...
John Jay
High School (2)
Roosevelt High School
Engineering and Technology Academy (3)
O’Connor
High School
East Central
Hi...
Alamo Cybersecurity Pipeline
Ph.D. in Security
Related Field
High School Jr./Sr or
Graduate
or lower division BS
BS Degree...
St. Phillip’s
Computer Science
Network Administrator
Network Security Administrator
Biomedical Equip Technician
Computer M...
University of Texas at San Antonio
Texas State University
St Mary’s University
Our Lady of the Lake University
Wayland Bap...
S.A. higher ed
partners offer $9,672
bachelor's degreeBy Jennifer R. Lloyd
Wednesday, March 7, 2012
• A bachelor's in info...
nationalccdc.org
Dr. Gregory White accepts
Educator of the Year Award
from Colloquium for
Information System Security
Education. White is a...
SURVIVAL
OF
SPECIES
GOVERNANCE
SECURITY &
SAFETY
QUALITY
OF CIVIL
LIFE
WEALTH
JOBS
MARKETS
Cyber-
STEM
What is STEM? Why i...
What is STEM in the context of P-20 Education Practice?
STEM is transformation by design. STEM is transformation of social...
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
January 19, 2014 -- “Mirroring the White
House, Office of Science and Technology
Policy, the 84th Texas Legislature has
ag...
OSTP ARPA Education
P-20 Education
Transformation
Education
Economic
Development
Industry
Workforce
Cyber Innovation
Laboratories
Texas Agency
Leadership
Education
Economic
Development
Industry
Workforce
Cyber Innovation
Laboratories
TASSCC
Education
Economic
Development
Industry
Workforce
Cyber Innovation
Laboratories
You
Twitter
#radicalplatypus
@radicalplatypus
Texas Association of
State Systems for
Computing and
Communications
The Future is Here: IT Prime Time
Jim Brazell, Venture...
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
The Future is Here: IT Prime Time
Upcoming SlideShare
Loading in …5
×

The Future is Here: IT Prime Time

3,617
-1

Published on

Texas Association of State Systems for Computing and Communications , The Future is Here: IT Prime Time , Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria, Final Speech

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,617
On Slideshare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
4
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

The Future is Here: IT Prime Time

  1. 1. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com jim@ventureramp.com @RadicalPlatypus, Twitter
  2. 2. Twitter #radicalplatypus @radicalplatypus
  3. 3. In 1965, 49 years ago, Gordon Moore of Intel famously proclaimed that silicon density, the number of transistors on computer chips, would double approximately every two years. In effect, “Moore’s Law” is the platform upon which U.S. and global wealth creation has been built since the Apollo program. A new technology wave has emerged that is changing everything we know, or think we know about business and technology in the world driven by the intersection of [operational technology and cyberspace]. Forthcoming, Connected World Magazine, October 2014 Apollo Image Source: NASA
  4. 4. http://www.arraycomm.com/pcct/coopers_law.htm The number of conversations (voice and data) conducted over a given area, in all of the useful radio spectrum has doubled every 2.5 years for the last 110 years since Marconi, 1895. Martin Cooper’s Law
  5. 5. http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2014/01/79493994-786x305.jpg
  6. 6. http://bilder2.n-tv.de/img/incoming/origs12096381/1162732377-w1000- h960/Hand-holding-zoomed-in.jpg Antenna Sensor Controller Capacitor
  7. 7. http://media.tested.com/uploads/0/5/5698-augmented_reality_wired_super.jpg
  8. 8. http://nikeinc.com/news/nike-unveils-revolutionary-nike-experience-for-basketball-and-training-athletes#/inline/8054 VIDEO - http://www.youtube.com/watch?v=SCJNPd-HYiM#t=19
  9. 9. 9 http://research.gigaom.com/report/the-quantified-self-hacking-the-body-for-better-health-and- performance/
  10. 10. http://www.industrytap.com/robotic-red-blood-cells-to-vastly-expand-human-capabilities/3656 Robotic Red Blood Cells To Vastly Expand Human Capabilities By: David Russell Schilling | July 20th, 2013 Abbott Laboratories in North Chicago is currently testing robotic red blood cells or respirocytes in rats. According to a CNN report respirocytes or mechanical red blood cells will augment or replace human red blood cells carrying oxygen to the body and enhancing mental and physical performance. Respirocytes will be built using “molecular assemblers”, a kind of molecular printing process, in nano-factories.
  11. 11. 11 http://news.yahoo.com/human-cyborg-mcdonald-employees-assaulted-wearing-gear-210139320.html
  12. 12. August 4, 2014 -- “Revolution in computing driven by Del Tesar at UT Austin shifts focus from Cloud to Cloud 2.0: critical infrastructure and security as a service.”
  13. 13. “The last economic technology wave, the post- industrial era, marked by the computer, network, and information technology revolution has now crested and a new economic wave is rising fueled by intelligent machines.” MOORE’S LAW IS TO COMPUTING AS TESAR’S LAW IS TO CYBER PHYSICAL SYSTEMS. Forthcoming, Connected World Magazine, October/November 2014 by Jim Brazell and in the American Society for Mechanical Engineers Journal of Robotics and Mechanisms, The Next Wave of Technology, forthcoming 2014-2015.
  14. 14. Cyber Physical Systems Cyber Systems Technology Transformation
  15. 15. http://www.gadgetspage.com/wp-
  16. 16. http://img9.joyreactor.com/pics/post/gif-cats-iRobot-vacuum-cleaner-278519.gif
  17. 17. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView
  18. 18. http://www.tek-lado.com/wp-content/uploads/Necomimi-on-Sale-600x393.jpg Shippo’s Neurowear
  19. 19. http://neurogadget.com/wp-content/uploads/2012/09/Necomimi-successor-Shippo-brain-controlled-tail-Neurowear-e1348342289528.jpg Shippo brain-controlled tail Neurowear
  20. 20. www.tstc.edu
  21. 21. (Harbor Research, 2003)
  22. 22. (Harbor Research, 2003) 1994 - 2004
  23. 23. (Harbor Research, 2003)
  24. 24. (Harbor Research, 2003) 2004 - 2014
  25. 25. (Harbor Research, 2003)
  26. 26. Cloud 2.0: Cyber Physical Systems Cyber physical systems are at the heart of the design, manufacture, installation, operation, and sustainability of private corporate, state, and national infrastructure across the U.S., yet these systems are highly vulnerable to cyber exploitation. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell
  27. 27. April 15, 2015 – “Similar to the need of the United States’ computing industry to collaborate in the 1980’s to enhance semiconductor manufacturing efficiency, fulfilled by Sematech in Austin, the Department of Information Resources Cybersecurity Council is instrumental in forming the Texas Cybersecurity Institute. Programs are designed to leverage the State’s network of State Agencies, Designated Centers of Academic Excellence in Information Assurance, and the industrial sector with a special emphasis on energy CIP.”
  28. 28. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  29. 29. Cyber Physical Critical Infrastructure Emergency services, telecom, energy, law enforcement, fire departments, utilities, public works, medical, industrial facilities, banking and finance, transportation and tourism, federal and municipal services, agriculture and food, and national monuments and icons. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell
  30. 30. Source: Harbor Research, 2003 Cyber Physical Systems
  31. 31. Utilities A California study indicates that peak-rate usage can be shaved by 20 percent if utilities used Automated Meter Reading (ARM) for accurate pricing information--each megawatt of reduction can equate to $400,000 in savings per year (Jackson, p. 1) saving California utilities and consumers at least $5 billion a year. http://www.utilitiesproject.com/documents.asp?grID=85&d_ID=2402 More than 25 million AMR units installed on gas (21 percent), water (11 percent), and electric utility (16 percent) meters. 200 million units yet to be changed out to AMR (Jackson).
  32. 32. SwRI, Patent thin-nickel-strip magneto-strictive sensor (MsS™). Applicable to airplanes, ships, plants, pipelines and bridges. US 80 billion square feet of commercial and government facilities and buildings, and more than 100 billion square feet of dams and bridges (Sensametrics). One trillion dollar market (Elgamal). http://www.swri.org/3pubs/ttoday/fall03/Future.htm SwRI MsS™ http://www.swri.edu/3pubs/IRD2002/14-9285.htm Critical Infrastructure Protection (CIP) Market Worth $105.95 Billion by 2018 according to a new Report from Markets and Markets. http://www.marketsandmarkets.com/Market-Reports/critical-infrastructure-protection-cip-market-988.html
  33. 33. Telematics http://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html http://www.teradyne-ds.com/telematics/telematics01a.htm SwRI Transguide Telematics market to grow at a CAGR of 22.67 percent CAGR percent over the period 2012- 2016 (ResearchandMarkets.com). TELEMATICS http://www.researchandmarkets.com/research/tpscpq/global_telematicsGlobal
  34. 34. ttp://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html ttp://www.roadtraffic-technology.com/contractors/traffic_man/electrosonic/electrosonic1.html Operations Centers Air Land Sea Space Cyber Since 1998, Transguide has 15 percent reduction of accidents and has cut emergency response time by 20 percent. (Texas DOT). .S. ITS to exceed $450 billion by 2015 (Hagler Bailly Services).
  35. 35. August 5, 2014 – “Reminiscent of 911 attacks, fires blaze in Texas cyber attack. Emergency operations are underway as two of Texas’ largest oil and gas processing plants were turned into megaton bombs near city centers Houston and Corpus Christi. The Cyber Red Guard from Iran has taken responsibility for the event reportedly stealing data from Texas Railroad Commission and the energy companies to trigger the kinetic attack through cyberspace. Property and casualty claims are expected to skyrocket...”
  36. 36. Apple Insider, Saturday, August 02, 2014, 08:42 pm PT (11:42 pm ET) Al-Qaeda prefers Android over Apple's iOS By Daniel Eran Dilger Apple's iOS has taken majority market share in education, government and the enterprise, but Google's Android has become the favored mobile platform among Al-Qaeda operatives. http://appleinsider.com/articles/14/08/02/al-qaeda-prefers-android-over-apples-ios
  37. 37. /robonaut.jsc.nasa.gov/iss/#issmission Think beyond walking, talking robots.
  38. 38. http://ces.cnet.com/2300-31045_1-10002192-9.html?s=0&o=10002192 Chevy Volt
  39. 39. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView
  40. 40. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew Beeriscriticalinfrastructure, right?
  41. 41. Cloud 2.0: Cyber Control of Operational Technology SystemsCloud: Cyber Systems Technology Transformation
  42. 42. April 15, 2015 – The purpose of the Texas Cybersecurity Institute is to: (1) enable cyber physical systems security and cooperative incident management services for information sharing, collaboration, and coordination in multi-sector environments; (2) promote public-private partnerships for policy and programs related to the development of human and intellectual capital for education, workforce, economic development systems relevant to cyber physical systems; (3) create collaborative multi-stakeholder laboratories and research, development, and commercialization initiatives to promote public welfare and the security of critical infrastructure systems and processes; and (4) design necessary approaches to science, technology and public policy that effect public safety and cybersecurity critical infrastructure as a service.
  43. 43. – Southern Methodist University – University of Texas, Dallas – University of Texas San Antonio – Our Lady of the Lake University – Texas A&M University San Antonio – St Philip’s College – San Antonio College – Texas A&M University – Texas A&M University Corpus Christi – University of Dallas – University of North Texas – University of Texas, Austin – University of Houston – University of Texas, El Paso – Rice University – Richland College (Dallas CCCD) The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance (IA), and producing a growing number of professionals with IA expertise in various disciplines. NSA/CSS Texas’ Nationally Designated Centers of Academic Excellence in Information Assurance Source: Chris Cook, Cyber City USA, San Antonio Texas, Cyber Since 1949
  44. 44. December 10, 2017 -- “Cyber is a domain of warfare, terrorism, and crime, while simultaneously being the platform and engine for economic, civil, and democratic development in the 21st century. Texas now leads the nation at the intersection of public safety, cybersecurity and operational technology with all State Agencies at Cybersecurity Maturity Level 4 or 5 rating.”
  45. 45. • Minimal cyber awareness • Minimal cyber info sharing • Minimal cyber assessments and policy & procedure evaluations • Little inclusion of cyber into Continuity of Operations Plan (COOP) • Leadership aware of cyber threats, issues and imperatives for cyber security and community cooperative cyber training • Informal info sharing/ communication in community; working groups established; ad- hoc analysis, little fusion or metrics; professional orgs established or engaged • No assessments, but aware of requirement; initial evaluation of policies & procedures • Aware of need to integrate cyber security into COOP • Leaders promote org security awareness; formal community cooperative training • Formal local info sharing/cyber analysis. initial cyber-physical fusion; informal external info sharing/ cyber analysis and metrics gathering • Autonomous tabletop cyber exercises with assessments of info sharing, policies & procedures, and fusion; routine audit program; mentor externals on policies & procedures, auditing and training • Include cyber in COOP; formal cyber incident response/recovery • Leaders and orgs promote awareness; citizens aware of cyber security issues • Formal info sharing/ analysis, internal and external to community; formal local fusion and metrics, initial external efforts • Autonomous cyber exercises with assessments of formal info sharing/local fusion; exercises involve live play/metrics assessments • Integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery • Awareness a business imperative • Fully integrated fusion /analysis center, combining all-source physical and cyber info; create and disseminate near real world picture • Accomplish full-scale blended exercises and assess complete fusion capability; involve/ mentor other communities/entities • Continue to integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery LEVEL 1 Initial LEVEL 2 Advanced LEVEL 3 Self-Assessed LEVEL 4 Integrated LEVEL 5 Vanguard Cybersecurity Maturity Level of Texas State Agencies Source: Greg White, Ph.D., UTSA, CIAS, 2014
  46. 46. January 24, 2018 – “…by focusing on situational awareness, Texas Cybersecurity Institute turns data into actionable knowledge using A.I. 2.0 techniques from new field labeled ‘Artificial Psychology’”.
  47. 47. http://www.tradingmarkets.com/featured_contributors/how-to-manage-investment-information-overload- 1583594.html
  48. 48. January 24, 2018 – “Texas Cyber- security Institute partners with TSTC in 2014 and now offers near real-time supply and demand management tools for IT and cybersecurity workforce.”
  49. 49. Contact: Michael A. Bettersworth Associate Vice Chancellor, Senior Advisor Texas State Technical College 512-647-8790 https://www.texastribune.org/2014/07/29/tstc-launches-center-employability-outcomes/
  50. 50. January 24, 2018 – “Texas Cyber-security Institute is funded by Texas State Agencies new calculus for IT lifecycle management pioneered by the Comptroller and DIR. The new method of calculating the value of IT assets over the lifecycle of their use increases IT effectiveness by weighing the real value of operational technology and cyber assets over time.”
  51. 51. 1. Practice for Measuring Life-Cycle Costs for Network, Security, and Information Technology 2. Practice for Measuring Benefit-to-Cost and Savings-to-Investment Ratios for Network, Security, and Information Technology 3. Practice for Measuring Internal Rate of Return and Adjusted Rate of Return for Network, Security, and Information Technology 4. Practice for Measuring Net Benefits for Investments in Network, Security, and Information Technology 5. Practice for Measuring Payback for investments in Network, Security, and Information Technology 6. Standard Guide for Selecting Economic Methods for Evaluating Investments in Network, Security, and Information Technology IT life-cycle management is the effective and efficient management of IT assets from the identification of requirements to the disposal of the assets. Texas’ New IT life-Cycle Management Calculus
  52. 52. January 24, 2018 – “Texas Cyber- security Institute works at the intersection of education, workforce, and economic development to enhance the State’ and Nation’s competitiveness.”
  53. 53. George Kozmetsky, IC2.org photo courtesy of the University of Texas
  54. 54. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership
  55. 55. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  56. 56. August 4, 2014 -- “TASSCC first group in the nation to lead education reform based on the fundamental notion that cyber is the key transformative force in the STEM workforce across sectors. THECB and TEA to offer Computer Science and Computational Thinking curricula throughout the core for P-20 education using TASSCC programs of study as a model for CTE and academic students.”
  57. 57. STEM JOBS
  58. 58. STEM JOBS Audience Survey What percentage of jobs in the U.S. in 2010 are classified as STEM jobs by the U.S. Department of Commerce?
  59. 59. STEM JOBS 60% or more
  60. 60. STEM JOBS 59%- 25%
  61. 61. STEM JOBS 25%- 6%
  62. 62. STEM JOBS Less than 6%
  63. 63. 5.5% STEM JOBS 5.5% of U.S. Workforce, 7.6MM STEM Jobs in 2010 David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf
  64. 64. ½ of STEM Jobs are Network and Information Tech David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf 5.5% STEM JOBS
  65. 65. Is there a labor market shortage of STEM workers?
  66. 66. The STEM Crisis Is a Myth By Robert N. Charette Posted 30 Aug 2013 http://spectrum.ieee.org/at-work/education/the-stem-crisis-is-a-myth STEM attrition goes 10 yrs into the workforce, as 46% of #workers with a Bachelor’s degree in STEM have left the field. —Georgetown University Center on Education and the Workforce
  67. 67. http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
  68. 68. According to the Bureau of Labor Statistics, NIT is projected to account for between 52% and 58% of all STEM occupations between 2008-2018 with projected NIT employment resulting in 762,700 jobs, growing more than twice as fast as the average for all occupations in the economy.[15] In “The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure”, Springer, Book Chapter, 2013, Brazell
  69. 69. The truth behind the curtain
  70. 70. ANTHONY P. CARNEVALE NICOLE SMITH MICHELLE MELTON, “Science, Technology, Engineering & Mathematics”, Georgetown University, Center on Education and the Workforce, October 20, 2012 last accessed October 28, 2012 at http://cew.georgetown.edu/stem/. Forecast of STEM Occupational Growth Georgetown University, Center for Education and the Workforce Job Shortages: We face a chronic shortage in STEM competencies as the demand for STEM talents grows outside traditional STEM jobs.
  71. 71. The Hidden STEM Economy, Brookings Institute, 6.10.2013 http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
  72. 72. Special emphasis should be placed on the intersection of network and information technology (NIT) with the arts, cyber security, games and simulations, health, energy, transportation, environmental science, physical science and health science. http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf
  73. 73. November 14, 2014 -- “TASSCC teams with UT System and Texas State Technical College to offer Cyber-STEM Rigorous Programs of Study for all high school, community and technical college, and university students in the State.”
  74. 74. U.S. percentage of CTE students in 2004, 17-38%, in 2004, qualifying 3 levels of CTE participation. National Assessment of CTE, Interim Report, 2013, https://www2.ed.gov/rschstat/eval/sectech/nacte/caree r-technical-education/interim-report.pdf Learning for Jobs, OECD, 2010, http://www.adheperkins.com/resources/Learning%20for%20Jobs.pdf
  75. 75. “Those who complete both a strong academic curriculum and a vocational program of study (dual concentrators) may have better outcomes than those who pursue one or the other” Source: Silverberg, Warner, Fong, & Goodwin, 2004; Plank, 2001; Stone & Aliaga, 2003)” (National Alliance for Secondary Education and Transition, 2005, Career Preparatory Experiences, ¶ 3).
  76. 76. http://www.dentonrc.com/sharedcontent/utilities/clickedimage/index.html
  77. 77. Health Arts CTE Academics Student Leadership Character Citizenship Classical Contemporary Education
  78. 78. March 15, 2015 -- “San Antonio all female cybersecuity team from Southside ISD wins Cyber Patriot national competition illustrating the strength of the city’s approach to diversifying the IT pipeline.”
  79. 79. The Public The most unique combination of Cyber related elements outside the National Capital Region
  80. 80. The United States Air Force Security Service invents the field of cyber- security in 1949 in the Alamo City.
  81. 81. http://www.thenewnewinternet.com/wp-content/uploads/24th-air-force.jpg 2009 – Activation of 24th Air Force Home of Air Force Cyber
  82. 82. 91 San Antonio’s high-growth employment sectors – Projected Fastest Growing Occupations in Bexar County through 2014 Texas Workforce Commission and US Department of Labor San Antonio Business Journal by James Aldridge, Web Editor Date: Wednesday, September 26, 2012
  83. 83. San Antonio has placed one team team to national each of the past 4 years including willing 3rd (2011) and 1st (2012). https://www.uscyberpatriot.org
  84. 84. John Jay High School (2) Roosevelt High School Engineering and Technology Academy (3) O’Connor High School East Central High School (3) Medina Valley High School (3) 5 miles Smithson Valley High School (2) Boerne High School Seguin High School Holmes High School (4) Brandeis High School MacArthur High School (2) New Life Christian Academy (2) Alamo City CyberPatriot 1556 total patriot teams in 2014. 85 teams from Alamo City including 12 middle schools. Expect 100 teams in 2015. Taft High School (2) San Antonio Christian Academy Information Technology Security Academy New Braunfels (3) Stevens High School San Marcos High School Canyon Lake CAP Squadron Randolph High School La Vernia High School (3) Stacey Junior/High School Information Technology Security Academy San Antonio (3) Lackland CAP Squadron Harmony Science Academy (2) Harlandale High School Microsoft Academy Boerne Area Home Schoolers Churchill High School (2) Clark High School McCollum High School Microsoft Academy Scobee Middle School (2) McAuliffe Middle School Lee High School STEM Academy (2) Kennedy High School KIPP University Prep High School Lutheran High School McNair Middle School (3) Southwest High School (7) Krueger Middle School St. Anthony High School Brennan High School Marshall High School Nimitz Middle School (2) Alamo Heights High School (4) Hobby Middle School Canyon Lake High SchoolNew Braunfels High School Church Hill Middle School Young Women’s Leadership Academy Milton Lee T- STEM Academy Sam Houston New Tech Academy School of Science and Technology Texas Military Institute Bracken Christian School Judson High School Madison High School Steele High School Memorial Toltech T-STEM Academy Brooks Academy
  85. 85. Alamo Cybersecurity Pipeline Ph.D. in Security Related Field High School Jr./Sr or Graduate or lower division BS BS Degree seeking advanced Degree High School Graduate with basic security training BS Degree in Security Field MS Degree in Security Field Assoc. Degree in Security Field Assoc. Degree seeking Bachelor’s
  86. 86. St. Phillip’s Computer Science Network Administrator Network Security Administrator Biomedical Equip Technician Computer Maintenance Technician Computer Network Specialization E-Business Computer Support Specialist Web Developer NW Vista Computer Forensics Computer Science Digital Gaming, Simulation and Cinematics for Artists Multimedia Specialists Programming & Visualization Systems Administration New Media Communications Music Technology Palo Alto Computer Information Systems Computer Science Information Systems Systems Advanced Web Program. Network Admin CISCO Network Technology Security Academy Network Administration Network Security Personal Computer Support Administrative Comp. Tech. San Antonio College Computer Science Computer Security Geographic Information Systems Network Administrator Geographic Information Science Network Routing Accounting Technology Computer Programming Computer Help Desk Specialist Cisco Administrator Database Specialist Cisco Routing Associate Degrees and Certifications Cyber City USA San Antonio, Texas Northeast Lakeview Computer Science Mathematics Physics Criminal Justice
  87. 87. University of Texas at San Antonio Texas State University St Mary’s University Our Lady of the Lake University Wayland Baptist University Trinity University University of the Incarnate Word Texas A&M University, San Antonio Alamo Colleges San Antonio College Palo Alto College St Phillip’s College Northwest Vista College Northeast Lakeview College Alamo Academies - Information Technology and Security Academy Holmes High School Southwest High School Harlandale High School Microsoft Academy Roosevelt High School Engineering and Technology Academy Lee High School STEM RAM Academy John Jay High School Science and Engineering Academy Sam Houston New Tech Academy Harmony Science Academy Memorial High School Toltech T-STEM Academy Milton B. Lee Academy of Science and Engineering Security Hill 24th AF AF ISR Agency NSA/CSS Texas Rackspace USAA AT&T Valero CoSA/Bexar County IT University Health System Baptist Health System HEB Frost Bank UTSA Others 97 SACUCCA Monster.com IT-ology Bestica Cyber Workforce Placement
  88. 88. S.A. higher ed partners offer $9,672 bachelor's degreeBy Jennifer R. Lloyd Wednesday, March 7, 2012 • A bachelor's in information technology with information security emphasis. • Two years college-level work in high school, a year at Alamo Colleges and finish at A&M San Antonio. • Total cost: $9,672. Photo: Ralph Barrera, Austin American-Statesman / SA Governor Perry challenged universities to craft a $10,000 bachelor’s degree, though not all in higher education were fans of the idea…
  89. 89. nationalccdc.org
  90. 90. Dr. Gregory White accepts Educator of the Year Award from Colloquium for Information System Security Education. White is a computer science associate professor and director of the Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio. http://utsa-sciences.tumblr.com/post/7344218754/gregwhiteaward#sthash.BPNGGyvW.dpuf
  91. 91. SURVIVAL OF SPECIES GOVERNANCE SECURITY & SAFETY QUALITY OF CIVIL LIFE WEALTH JOBS MARKETS Cyber- STEM What is STEM? Why is STEM important?
  92. 92. What is STEM in the context of P-20 Education Practice? STEM is transformation by design. STEM is transformation of social, human, and environmental systems by human design and the unintended consequences of human design choices. STEM is a technological force changing society and social institutions. STEM is changing the structure, flow, and composition of social institutions and personal identity: family, education, work, economy, law, government, etc. From an identity perspective technology and more broadly STEM effects our worldview, our concepts of: self-efficacy, subjectivity, objectivity, privacy, time, space (place), geography, cosmology, individuality, identity, values, beliefs and culture. STEM is a process of collaboration connecting institutional silos (education, government, industry, and civil society) to satisfy community and global needs. STEM is confronting the local challenges in your community and school through the process of inquiry, design, and innovation. STEM is turning a community inward on itself to form learning communities and laboratories designed to effect local and global opportunities and challenges through collaboration and cooperation. STEM is a moral imperative to prepare all students for their future, rather than our past. STEM educational practices, ideally, today open access and opportunity in education through a balanced approach to learning that retains the important fundamentals of classical education while integrating contemporary knowledge, processes, and tools.
  93. 93. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  94. 94. January 19, 2014 -- “Mirroring the White House, Office of Science and Technology Policy, the 84th Texas Legislature has aggregated Texas State Agency funding for education among non-education agencies to pool investment in Cyber-STEM programs.”
  95. 95. OSTP ARPA Education P-20 Education Transformation
  96. 96. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership
  97. 97. Education Economic Development Industry Workforce Cyber Innovation Laboratories TASSCC
  98. 98. Education Economic Development Industry Workforce Cyber Innovation Laboratories You
  99. 99. Twitter #radicalplatypus @radicalplatypus
  100. 100. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com jim@ventureramp.com @RadicalPlatypus, Twitter
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×