2011 lecture ia orientation


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Expect to see a similar evolution within Virtual Worlds to that on the rest of the internet – attacks will become monetized
  • Evolution of threats on the Internet – we can expect to see the same evolution in Virtual worlds.
  • The nutshell: a fake pastor from Nigeria tries to con a stranger out of money only to end up with a horrific tattoo instead. In a supposed bid for financial assistance to help Pakistani earthquake survivors this scammer tried to trick the wrong individual. The scambusters write back that he could have up to $150,000 if only he were a member of the church. The scammer bites, of course, and is told that he’ll simply have to get a tattoo showing his devotion to the church. Sure enough, he gets the tattoo and sends pictures! At this point things get strange: the scambusters fake being another scammer who has hacked into the good church’s email system. They finally get the scammer to “work for them” and admit what he is doing. Before it is finished, the scambusters have the name and address of the scammer and leave him waiting (forever) for his funds).
  • 2011 lecture ia orientation

    1. 1. 4/11/2011 Information Security and Risk Management in Context The Context Dr. Barbara Endicott-Popovsky
    2. 2. Center for Information Assurance and Cybersecurity (NSA/DHS CAE-R) CIAC The Center for Information Assurance and Cybersecurity at the University of Washington   <ul><li>Promotes multi-disciplined, regional collaboration </li></ul><ul><li>Produces innovative research </li></ul><ul><li>Provides CNSS-accredited educational programs </li></ul><ul><li>Develops well-prepared information assurance professionals </li></ul>http://ciac.ischool.washington.edu/
    3. 3. <ul><li>Barbara Endicott-Popovsky, Director Center for Information Assurance and Cybersecurity Faculty, Information School and CS UW Institute of Technology Tacoma Email: endicott@u.washington.edu Office: Suite 400 RCB Phone: 206-284-6123 Website: http://faculty.washington.edu/endicott </li></ul><ul><li>Barbara Endicott-Popovsky (Pittsburgh, Pennsylvania) is the Director of the Center for Information Assurance and Cybersecurity at the University of Washington, Seattle, WA, USA, with a joint faculty appointment in the Information School and the Computer Science Department at the UW Institute of Technology Tacoma. She previously held executive positions with The Boeing Company, Seattle, WA. Her current research interests into the Unintended Consequences of the Information Age includes impacts of technology on the legal structure include the calibration of low layer network devices, network forensic readiness methodologies, security vulnerabilities in critical infrastructure. </li></ul><ul><li> She earned her Ph.D. in computer science at U. Idaho, Moscow, ID, USA, (2007); She has an MS in information systems engineering from Seattle Pacific University, Seattle, WA, USA (1987); and an MBA from the University of Washington, Seattle, WA, USA (1985), and a BA in Liberal Arts from the University of Pittsburgh, Pittsburgh, PA, USA (1967). Ms. Endicott-Popovsky is a member of the IEEE, a founding member of the NW Regional Computer Forensics Cooperative, Principal Investigator on numerous grants, producer of the televised Unintended Consequences of the Information Age Lecture series. She has served on organizing committees for the Information Security Compliance and Risk Management Institute, the International Workshop on Systematic Approaches to Digital Forensic Engineering and the Recent Advances in Intrusion Detection (RAID) conference and is on the editorial board of a Special Edition of the Journal on Educational Resources in Computing. </li></ul>
    4. 4. NSA/DHS NIETP Program: “ Growing” information security professionals in our universities
    5. 5. UW/West Coast opportunity
    6. 6. Center for Information Assurance and Cybersecurity NSA-CAE-R
    7. 7. Multi-Disciplined IA Approach Goal of System Policy Security Awareness Training Procedures & Practices Mechanisms Secure System IA Audit Feedback Business School—IT iSchool Evans School—Internet Center Law School—Shidler Center Business School—IT iSchool Evans School Law School Tech Comm-Eng iSchool Computer Science Elect Engr Business School—IT iSchool Tech Comm-Eng
    8. 8. Academics <ul><li>As an NSA-designated Center, the CIAC offers certificates, courses workshops in Information Assurance </li></ul><ul><ul><li>UW Certificates </li></ul></ul><ul><ul><ul><li>Information Assurance & Cybersecurity h ttp://www.extension.washington.edu/ext/certificates/inf/inf_gen.asp </li></ul></ul></ul><ul><ul><ul><li>IT Security http://www.extension.washington.edu/ext/certificates/iss/iss_gen.asp </li></ul></ul></ul><ul><ul><ul><li>Network Engineering http://www.extension.washington.edu/ext/certificates/dac/dac_crs.asp </li></ul></ul></ul><ul><ul><li>Classes </li></ul></ul><ul><ul><ul><li>Information Ethics, Security, and Privacy </li></ul></ul></ul><ul><ul><li>Workshops </li></ul></ul><ul><ul><ul><li>ISCRMI </li></ul></ul></ul><ul><ul><ul><li>IP3 Seminars </li></ul></ul></ul><ul><ul><ul><li>CISSP Bootcamps </li></ul></ul></ul>
    9. 9. Research <ul><li>The CIAC partners with industry and government: </li></ul><ul><li>Theory, Conceptual Models </li></ul><ul><ul><li>Adding the 4 th R </li></ul></ul><ul><ul><li>Theoretical Framework for Organizational Network Forensic Readiness </li></ul></ul><ul><li>Projects and Grants </li></ul><ul><ul><li>PNNL: Next Generation Honeypots </li></ul></ul><ul><ul><li>China/Microsoft: IA Compliance Framework </li></ul></ul><ul><li>Publications </li></ul><ul><ul><li>Deception Taxonomy (for honeypots) </li></ul></ul><ul><ul><li>Drive-by Downloads </li></ul></ul><ul><li>Directed research, IP, Consulting </li></ul><ul><ul><li>WSDOT </li></ul></ul><ul><ul><li>Compliance-Ready Networks </li></ul></ul>
    10. 10. Pacific Northwest National Laboratory <ul><li>As the Center’s research partner, the PNNL expands the capacity and capabilities of the University of Washington to do classified and sensitive research and provides a foundation for a regional research center in information assurance. </li></ul><ul><li>Deborah Frincke , Initiative Lead for the Information and Infrastructure Integrity Initiative (I4), and Chief Scientist (Cyber Security capability ), Computational & Statistical Analytics Division </li></ul><ul><li>Nat’l Security Directorate </li></ul><ul><li>Troy Thompson, Research Engineer </li></ul><ul><li>Frank Greitzer , Chief Scientist (Cognitive Informatics R & D Area) , Computational and Information Sciences Directorate. </li></ul><ul><li>Glenn Fink , Senior Research Scientist , Information and Infrastructure Integrity Initiative (I4), Computational & Statistical Analytics Division, National Security Directorate </li></ul>
    11. 11. Center Contributors <ul><li>Mike Simon : CTO, Creation Logic, Asso Dir. Applied Research CIAC, Pres. Infragard Seattle Chapter </li></ul><ul><li>Kirk Bailey , UW CISO, CISSP, Agora Leader, CISO UW, Security 7 Award </li></ul><ul><li>John Christiansen , Christiansen IT Law< HIPPA, legal and regulatory compliance </li></ul><ul><li>David Dittrich , Sr Security Engineer Researcher, Applied Physics , research on Distributed Denial of Service attack tools </li></ul><ul><li>Ernie Hayden , CISSP, CEH, CISO pioneering CISO positions, previously with the Port of Seattle </li></ul><ul><li>Seth Shapiro , CPCU, ARM, AIS, Are , Enterprise risk management and information security management </li></ul><ul><li>Joe Simpson , IA Consultant , systems engineering and the application of systems engineering to IA. </li></ul><ul><li>Merike Kaeo , Double Shot Security, Internet governance and protocol expertise </li></ul>Academic Researchers Practitioner Researchers <ul><li>Electrical Engineering </li></ul><ul><li>Radha Poovendran , Asso. Dir. Research, CIAC, Asso. Prof. Comm. & Networking, Dir. UW Network Security Lab </li></ul><ul><li>Ming-Ting Sun , Prof, EE, Machine learning, video processing </li></ul><ul><li>Information School </li></ul><ul><li>Barbara Endicott-Popovsky, Dir. Ctr for IA & cybersecurity, Res.Asso. Prof., digital forensics, secure code, enterprise IA </li></ul><ul><li>Computer Science and Engineering </li></ul><ul><li>Henry M. Levy , Wissner-Slivka Chair, Spyware/Security, OS </li></ul><ul><li>Steve Gribble , Torode Family Endowed Career Dev.Prof CS, Spyware/Security projects, OS </li></ul><ul><li>Tadayoshi Kohno , Asst. Prof. CSE, Security in pervasive computing; electronic voting, wireless security and privacy UWIT Tacoma </li></ul><ul><li>Sam Chung , Asso. Professor, secure code </li></ul><ul><li>Mathematics </li></ul><ul><li>Neal Koblitz , Prof. Mathematics, Cryptography, theory of numbers, security issues in genus-2 hyperelliptic cryptography, co-inventor elliptic curve cryptography </li></ul><ul><li>Law </li></ul><ul><li>Jane Winn , Charles I. Stone Prof of Law, Electronic commerce law developments in the US, EU, China </li></ul>
    12. 12. Current Center Activities Funded Projects White Papers <ul><li>Next Generation Honeypots </li></ul><ul><ul><li>An assessment of using virtualization for network instrumentation, deception and measurement will be incorporated into recommendations for next generation honeypot design. </li></ul></ul><ul><li>Secure Coding Project </li></ul><ul><ul><li>Recognizing the need for college-level, secure coding curriculum, the CIAC is piloting a program that will train Puget Sound faculty for two years, reaching over 1200 students. Success will be determined by internal and external evaluation. Once externally evaluated, curriculum modules will be disseminated inside and outside the region. </li></ul></ul><ul><li>IA Compliance Framework </li></ul><ul><ul><li>A lack of regulatory controls and subsequent enforcement in China has focused outsourcing discussions on this growing challenge. An IA governance framework, adapted from industry, is proposed as a control to mitigate. </li></ul></ul><ul><li>Cyber Warrior </li></ul><ul><ul><li>Defining recruiting profiles, mentoring and management strategies for the cyber defenders </li></ul></ul><ul><li>Virtual World Security </li></ul><ul><ul><li>Defining and developing unique aspects of Virtual World security </li></ul></ul><ul><li>Systems Engineering in IA </li></ul><ul><ul><li>Developing implementation models for allocating systems engineering goals throughout an organization. </li></ul></ul><ul><li>IPSEC Interoperability </li></ul><ul><ul><li>Defining IPSEC terminology, reconciling IETF RFC’s, implementing IPSEC procedures, recommending best practices </li></ul></ul><ul><li>Trust along the Supply Chain </li></ul><ul><ul><li>Defining role of trust and IA in building supply chain relationships </li></ul></ul>
    13. 13. Cyber Warrior: Effectively Defending Cyberspace <ul><li>Motivation </li></ul><ul><ul><li>Dearth of cyber defenders </li></ul></ul><ul><ul><li>New MOS’s under development </li></ul></ul><ul><ul><li>Industry-expressed frustrations: </li></ul></ul><ul><ul><ul><ul><li>Identification and recruiting challenges </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Training out-of-the-box thinking </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Stress burnout to incident response </li></ul></ul></ul></ul><ul><li>Need for “cockpit” studies </li></ul><ul><li>Preliminary work begun </li></ul>
    14. 14. Welcome to Cybersecurity Island http://www.youtube.com/watch?v=fvYOaf-9n-o
    15. 15. Asset Protection Model <ul><li>Incorporates threat and systems perspective with target [CMISS] </li></ul><ul><li>Establishes standard organizational basis for learning and analysis </li></ul><ul><li>Provides cognitive support as well as a static and dynamic view of the model information </li></ul>
    16. 16. IPSec Interoperability for Boeing-led Working Group <ul><li>Project Overview : Testing interoperability issues during IPSec VPN configuration on different vendors’ products. </li></ul><ul><ul><li>Begun last year closely analyzing products of different vendors(Sonicwall, Fortigate, StoneSoft). </li></ul></ul><ul><ul><li>Identified /compared parameters each vendor uses for hashing, encryption and authentication during IPSec VPN configuration. </li></ul></ul><ul><ul><li>Reviewed unique approach for configuring IPSec VPN proposed by ICSA lab </li></ul></ul><ul><ul><li>Compared this approach with default method available in each vendors product for configuring IPSec. </li></ul></ul><ul><li>Research divided into two phases: </li></ul><ul><li>Homogenous Environment : </li></ul><ul><ul><li>Configured and tested IPSec configuration between two same-vendor devices (e.g ., Sonicwall device at both endsof IPsec tunnel). </li></ul></ul><ul><ul><li>Used common method of configuring IPSec Vpn  developed by ICSA lab . </li></ul></ul><ul><ul><li>Verified that one unique method doesn’t work for all vendors. </li></ul></ul><ul><li>Heterogeneous Environment:   </li></ul><ul><ul><li>Proposing to configure / test the IPSec VPN tunnel between different vendors' product (e.g., Sonicwall at one end and Fortigate at other end). </li></ul></ul><ul><ul><li>Matrix of options developed and method to configure IPSec VPN tunnel. </li></ul></ul><ul><ul><li>Will begin testing shortly. </li></ul></ul>
    17. 17. Trust along Supply Chain <ul><li>Application: Drug trial outsourcing to China </li></ul><ul><li>Microsoft / UW governance model developed </li></ul><ul><li>Collaborations: </li></ul><ul><ul><ul><li>Interdisciplinary: Law / medical school </li></ul></ul></ul><ul><ul><ul><li>Cross cultural: UW / China </li></ul></ul></ul><ul><ul><ul><li>Industry partner: Microsoft </li></ul></ul></ul>APEA 2010
    18. 18. Securing the Future Innovative Integration <ul><li>Key Collaborations </li></ul><ul><li>Diverse Disciplines </li></ul><ul><li>Emerging Technologies </li></ul><ul><li>Organizational & Technical Management </li></ul><ul><li>Technical Approaches </li></ul><ul><li>Information Assurance Processes </li></ul>
    19. 19. Outreach <ul><li>The CIAC sponsors community lectures and workshops. </li></ul><ul><ul><li>The Unintended Consequences of the Information Age Lecture Series http://www.uwtv.org/programs/displayseries.aspx?fid=2121 </li></ul></ul><ul><ul><li>Pacific Rim Collegiate Cyber Defense Contest (PRCCDC) http://ciac.ischool.washington.edu/?page_id=234 </li></ul></ul><ul><ul><li>The Annual Information Security Compliance and Risk Management Institute http://www.engr.washington.edu/epp/infosec/index.html </li></ul></ul><ul><ul><li>NWSec – Tacoma http://students.washington.edu/greyhat/NWSec_at_UWT_Website_v1.5/FEB_15-16_2007_NWSec_at_UWT_Website_v1.5/nwsecPresenters.html </li></ul></ul>
    20. 20. Unintended Consequences of the Information Age <ul><li>A lecture series exploring controversial issues emerging in our &quot;point and click” world </li></ul><ul><li>Privacy: Reconciling Reality </li></ul><ul><li>Privacy vs. Free Speech </li></ul><ul><li>Our Infrastucture: Online and Vulnerable? </li></ul>http://www.uwtv.org/programs/displayseries.aspx?fid=2121
    21. 21. Pacific Rim Collegiate Cyber Defense Contest (PRCCDC)
    22. 22. Information Security Compliance and Risk Management Institute: Where Information Technology, Law and Risk Management Converge September 16-17, 2009 University of Washington UW Tower Auditorium Seattle, Washington http://www.engr.washington.edu/epp/infosec/index.php
    23. 23. CONTEXT: UNINTENDED CONSEQUENCES OF THE INFORMATION AGE <ul><li>Transition from the Industrial Age to the Information Age is creating massive, upending, untended consequences in spite of our best efforts to think through change. As we contemplate the ICANN transition from management by the US/DOC to independence, we should consider this context. </li></ul>
    24. 24. Context Evolution Agricultural Age Industrial Age Information Age
    25. 25. Attribute Agricultural Age Industrial Age Information Age Wealth Land Capital Knowledge Advancement Conquest Invention Paradigm Shifts Time Sun/Seasons Factory Whistle Time Zones Workplace Farm Capital equipment Networks Organization Structure Family Corporation Collaborations Tools Plow Machines Computers Problem-solving Self Delegation Integration Knowledge Generalized Specialized Interdisciplinary Learning Self-taught Classroom Online
    26. 26. Smashing Industrial Age Infrastructure!
    27. 27. And just whom do you think is going to clean up this mess, Noah?
    28. 28. THE PROBLEM <ul><li>Can’t get enough technology </li></ul>
    29. 29. Our Love Affair with the Internet Shoppers embrace the online model POSTED: 0727 GMT (1527 HKT), December 20, 2006 Embracing Internet Technologies Baby Boomers Embracing Mobile Technology US Internet Users Embrace Digital Imaging Docs Embracing Internet
    30. 30. WORLD INTERNET USAGE AND POPULATION STATISTICS Internet Users Dec. 31, 2000 Internet Users Latest Data Penetration (% Population) Growth 2000-2010 Users % of Table Internet Users Dec. 31, 2000 4,514,400 110,931,700 10.9 % 2,357.3 % 5.6 % 4,514,400 114,304,000 825,094,396 21.5 % 621.8 % 42.0 % 114,304,000 105,096,093 475,069,448 58.4 % 352.0 % 24.2 % 105,096,093 3,284,800 63,240,946 29.8 % 1,825.3 % 3.2 % 3,284,800 108,096,800 266,224,500 77.4 % 146.3 % 13.5 % 108,096,800 18,068,919 204,689,836 34.5 % 1,032.8 % 10.4 % 18,068,919 7,620,480 21,263,990 61.3 % 179.0 % 1.1 % 7,620,480 360,985,492 1,966,514,816 28.7 % 444.8 % 100.0 % 360,985,492
    31. 33.                                                            
    32. 34. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RESISTANCE IS FUTILE. PREPARE TO BE ASSIMULATED? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Species 8472 Courtesy: K. Bailey/E. Hayden, CISOs
    33. 35. Duality in Cyberspace Benign Malignant New Opportunities Efficiencies Convenience New Crimes Privacy Loss Threat Intrusion
    34. 36. http://www.engadget.com/2009/04/28/electronic-voting-outlawed-in-ireland-michael-flatley-dvds-okay/
    35. 37. http://artsbeat.blogs.nytimes.com/2009/07/31/judge-rules-student-is-liable-in-music-download-case/
    36. 38. http://www.scmagazineus.com/Majority-think-outsourcing-threatens-network-security/article/150955/
    37. 39. http://blogs.courant.com/rick_green/2008/11/connecticut-drops-felony-charg.html
    38. 40. Growing Threat Spectrum
    39. 41. “ If the Internet were a street, I wouldn’t walk it in daytime…” <ul><li>75% of traffic is malicious </li></ul><ul><li>Unprotected computer infected in < 2 minutes </li></ul><ul><li>Organized crime makes more money on the Internet than through drugs </li></ul><ul><li>The ‘take’ from the Internet almost doubled e-commerce </li></ul>Courtesy: FBI, LE
    40. 42. Interdependence of Critical Infrastructure
    41. 43. We’re overwhelmed! Society is not keeping up!
    42. 45. A Metaphor…..
    43. 46. Fantasia
    44. 47.                                                                                                                                                  
    45. 48.                                                        
    46. 49. The Unintended Consequences
    47. 50. Security and Trust in VWs
    48. 51. Trouble in Paradise?
    49. 52. Evolution of Internet Threats
    50. 53. Griefers, Phishing, Hackers, oh my!
    51. 54. Set Your “Evil Bit”* to 1 <ul><li>Would you have thought of these attacks? </li></ul><ul><li>Facebook “get rich quick” scams </li></ul><ul><ul><ul><li>… .. only $1 down – how can you lose? </li></ul></ul></ul><ul><li>Driveby downloads </li></ul><ul><li>Would you like Bots with that? </li></ul><ul><li>* See RFC3514 –The Security Flag in the IPv4 Header </li></ul>
    52. 55. What is at risk? <ul><li>Time </li></ul><ul><li>Effort </li></ul><ul><ul><ul><li>Repair damage </li></ul></ul></ul><ul><ul><ul><li>Deal with consequences </li></ul></ul></ul><ul><ul><ul><li>Prevent re-occurrence </li></ul></ul></ul><ul><li>In-game resources </li></ul><ul><li>Computing resources </li></ul><ul><ul><ul><li>Bandwidth </li></ul></ul></ul><ul><ul><ul><li>CPU </li></ul></ul></ul><ul><ul><ul><li>Storage </li></ul></ul></ul><ul><li>Real world resources </li></ul><ul><ul><ul><li>Money </li></ul></ul></ul><ul><ul><ul><li>Sensitive data </li></ul></ul></ul><ul><ul><ul><li>Identity </li></ul></ul></ul>
    53. 56. Do you trust me? Why?
    54. 57. Security and Trust in Virtual Worlds <ul><li>Some ways to attempt to maintain trust </li></ul><ul><ul><ul><li>eBay ratings </li></ul></ul></ul><ul><ul><ul><li>Craigslist community flagging </li></ul></ul></ul><ul><ul><ul><li>Second Life Abuse </li></ul></ul></ul><ul><li>How to manage identity in virtual worlds </li></ul><ul><ul><ul><li>User agreement </li></ul></ul></ul><ul><ul><ul><li>Side channels </li></ul></ul></ul><ul><ul><ul><li>Security zones </li></ul></ul></ul><ul><ul><ul><li>Verifying avatars </li></ul></ul></ul>
    55. 58. User Agreements <ul><li>VW End User License Agreements (EULAs) ‏ </li></ul><ul><ul><ul><li>Degrees of Protection </li></ul></ul></ul><ul><ul><ul><li>Alternatives to the EULA Scheme </li></ul></ul></ul><ul><ul><ul><li>General EULA Awareness </li></ul></ul></ul><ul><li>Issues: </li></ul><ul><ul><ul><li>Who reads them? </li></ul></ul></ul><ul><ul><ul><li>What are they? </li></ul></ul></ul>
    56. 59. Side Channels: Processes Outside of VW <ul><li>Provide “trusted path” to exchange info </li></ul><ul><li>Help achieve authentication goals </li></ul><ul><li>Two main types: </li></ul><ul><ul><ul><li>Prior to Virtual World interaction </li></ul></ul></ul><ul><ul><ul><li>During Virtual World interaction </li></ul></ul></ul>
    57. 60. Security Zones <ul><li>Segregated areas within VW </li></ul><ul><ul><ul><li>Training/Education </li></ul></ul></ul><ul><ul><ul><li>Corporate clients </li></ul></ul></ul><ul><ul><ul><li>Highly valued services </li></ul></ul></ul><ul><li>Issues </li></ul><ul><ul><ul><li>Cost: Second Life Private Regions (2009) : </li></ul></ul></ul><ul><ul><ul><ul><ul><li>$1,000 purchase </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>$295/mo maintenance </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Restricted or open </li></ul></ul></ul>
    58. 61. VW Authentication <ul><li>SSL-like authentication for the Avatar </li></ul><ul><li>Accreditation handled by 3 rd party </li></ul><ul><li>Issues: </li></ul><ul><ul><ul><li>How does VW display accreditation flag? </li></ul></ul></ul><ul><ul><ul><li>Potential pitfalls? </li></ul></ul></ul>
    59. 62. <ul><li>Don’t trust anyone! </li></ul><ul><li>What starts off in VW can have consequences in real world. </li></ul>http://oddorama.com/2008/02/11/scamming-the-scammers-5-brilliant-419-reverse-scams/
    60. 63. What else?….
    61. 64. <ul><li>Questions? </li></ul>
    62. 65. Where are the cybersecurity professionals?
    63. 66. If government predictions are right, health IT will create 50,000 new jobs in the future. The new jobs will be needed at all levels, from engineers to IT workers. People who have experience in the computer science and informatics fields will be especially attractive to potential employers, but the federal government will put some money toward training employees. Nurses could have the hardest time transitioning from paper to digital, but the training will help to close the informatics gap 50,000 Health IT Jobs Expected October 28, 2009 - 5:53pm
    64. 67. U.S. Faces Cyber Security Gap Without Training, Education March 24, 2010 By Kenneth Corbin WASHINGTON -- As discussions about the federal approach to cyber security continue to percolate across the highest levels of government , one of the most important steps policymakers can take is to nourish the education and training of a new crop of security experts, a senior administration official said here at the FOSE government IT show . Working in concert with the government, the private sector has made significant strides in improving software security and ferreting out vulnerabilities in the supply chain, but the flow of cyber security experts graduating from the nation's universities with advanced degrees remains anemic , according to Richard Marshall, the director of global cyber security management at the Department of Homeland Security.
    65. 68. Homeland Security to hire 1,000 cybersecurity experts By Michael Cooney October 1, 2009 01:42 PM ET Network World - The Department of Homeland Security wants to hire 1,000 cybersecurity professionals in the next three years, according to agency Secretary Janet Napolitano. The department has the authority to recruit and hire cybersecurity professionals across DHS over the next three years in order to help fulfill its mission to protect the nation’s cyber infrastructure, systems and networks , she said.
    66. 69. <ul><li>“ OJT” – Primary source </li></ul><ul><li>Certifications – Emergent source </li></ul><ul><ul><ul><li>Growing numbers </li></ul></ul></ul><ul><ul><ul><li>But which ones? </li></ul></ul></ul><ul><li>Education – Little to nothing </li></ul><ul><ul><ul><li>Lack of trained faculty </li></ul></ul></ul><ul><ul><ul><li>Little research funding </li></ul></ul></ul><ul><ul><ul><li>Few university programs </li></ul></ul></ul>The Options …
    67. 70. Not scalable! How do we accelerate preparation of professionals?
    68. 71. THE SOLUTION <ul><li>Growing Information Security Professionals: Pedagogical Institute Model </li></ul>
    69. 72. Global Competition Technologies & Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political Environment Economy Outcomes: Professionals New Knowledge New Technology Ed. Products Ideology Culture Pedagogical institute Model
    70. 73. Emerging Job Market <ul><li>Certified Information Systems Security Professional (CISSP) SANS/GIAC </li></ul><ul><li>Certified Information Systems Auditor(CISA) </li></ul><ul><li>Certified Intrusion Analyst SANS/GIAC </li></ul><ul><li>Certified Firewall Analyst SANS/GIAC </li></ul><ul><li>Certified Unix Security Admin SANS/GIAC </li></ul><ul><li>Certified Windows Security Admin SANS/GIAC </li></ul><ul><li>Certified Incident Handler SANS/GIAC </li></ul><ul><li>Certified Network Auditor SANS/GIAC </li></ul><ul><li>Certified Security Essentials </li></ul><ul><li>Job Titles </li></ul><ul><ul><li>Director, Security </li></ul></ul><ul><ul><li>Manager, Security </li></ul></ul><ul><ul><li>Sr. Security Analyst </li></ul></ul><ul><ul><li>Security Administrator </li></ul></ul><ul><ul><li>Web Security Manager </li></ul></ul><ul><ul><li>Data Warehouse Security Manager </li></ul></ul><ul><ul><li>Network Administrator </li></ul></ul>Source: Foote Partners http://www.footepartners.com/SSCP.htm
    71. 74. Global Competition Technologies & Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political Environment Economy Outcomes: Professionals New Knowledge New Technology Ed. Products Ideology Culture Pedagogical institute Model
    72. 75. Goals <ul><li>ISRM Certificate </li></ul><ul><ul><ul><li>Efficient preparation for job market </li></ul></ul></ul><ul><ul><ul><li>From literacy to problem solving </li></ul></ul></ul><ul><ul><ul><li>Communication skills </li></ul></ul></ul><ul><ul><ul><li>Academic and Training credentials </li></ul></ul></ul><ul><li>Course 1: Information Security and Risk Management in Context </li></ul><ul><li>Course 2: Building a Risk Management Toolkit </li></ul><ul><li>Course 3: Designing and Executing Information Security Strategies </li></ul>
    73. 76. Content <ul><li>No BOK for IA/IS </li></ul><ul><li>CISO : ISRM as CEO : MBA </li></ul><ul><li>Framework </li></ul>Module 1 Module 2 Module 3 Module 4 Module 5
    74. 77. Teachers <ul><li>Academic: </li></ul><ul><ul><li>Barbara Endicott-Popovsky , PhD, Information School faculty member and Director, UW Center for Information Assurance & Cybersecurity </li></ul></ul><ul><li>Practitioners: </li></ul><ul><ul><li>Mike Simon , CTO, Creation Logic, and UW Information School affiliate faculty member </li></ul></ul><ul><ul><li>Seth Shapiro , Senior VP & Risk Strategist, Kibble & Prentice </li></ul></ul><ul><ul><li>Ilanko Subramanian , GRM, Trustworthy Computing, Microsoft </li></ul></ul><ul><li>John Stephens , Director, UW Professional & Continuing Education </li></ul>
    75. 78. Teachers (Cont’d.) <ul><li>Guest Lecturers </li></ul><ul><li>Kirk Bailey, CISO UW, Agora </li></ul><ul><li>John Christiansen, Principal Legal Counsel, Chistiansen IT Law </li></ul><ul><li>Aaron Weller, Managing Director, The Concise Group </li></ul><ul><li>Bob Clark, PRESENTATION: ISSA </li></ul><ul><li>Dennis Opacki Senior Security Consultant, Covestic </li></ul><ul><li>Ernie Hayden, Smart Grid Security, Verizon Business </li></ul><ul><li>Todd Plesco, CISO, Chapman University </li></ul><ul><li>Michael Ness, CEO Ness Group </li></ul><ul><li>Brian Haller, CISSP, Associate/FSO, Booz Allen Hamilton </li></ul><ul><li>Jim Poland, FSO, University of Washington </li></ul><ul><li>Christian Seifert, Honeynet Alliance and Microsoft Corp. </li></ul><ul><li>Ivan Orton, King County Senior Deputy Prosecutor </li></ul><ul><li>Joe Simpson, Systems Engineer , Systems Concepts </li></ul><ul><li>Ryan Heffernan, Security Analyst, Trustworthy Computing, Microsoft Corp. </li></ul><ul><li>Neil Koblitz, Professor Mathematics, University of Washington </li></ul><ul><li>Mike Howard, Security PM, Microsoft Corporation </li></ul><ul><li>George Graves, IA Advisory, KPMG </li></ul><ul><li>Peter Gregory, CISA, CISSP Senior Security Analyst, Concur Technologies </li></ul><ul><li>Randy Hinrichs, CEO, 2b3d </li></ul><ul><li>Ming-Yuh Huang, Technical Fellow, The Boeing Company </li></ul><ul><li>Ashish Malviya, MSIM intern PNNL </li></ul><ul><li>NOTE: These are your network </li></ul>
    76. 79. RESULTS <ul><li>Well placed graduates </li></ul>
    77. 80. Sample success stories <ul><li>Asst. Dep Secy DHS – Mike Roskind </li></ul><ul><li>CISO – Todd Plesco </li></ul><ul><li>FSO BAH – Brian Haller </li></ul><ul><li>Tech Dir NSA – Darren King </li></ul><ul><li>IA Entrepreneur – Aaron Weller </li></ul><ul><li>IA audit, system and risk analysts </li></ul><ul><li>Research scientists </li></ul>
    78. 81. Unintended Consequences of Embracing the Internet…..