SlideShare a Scribd company logo
1 of 33
MASSACHUSETTS
Cyber Security
Global Leadership Through Talent,
Resources, Investment
2
The Cyber Security Opportunity
Cyber Security is the Fastest Growing Tech Sector Worldwide
The worldwide cyber security market will reach $170 Billion
by 2020; Overall security market will grow at a 7.8 % CAGR
through 2019*
$655 Billion will be spent on cyber security initiatives to
protect PCs, mobile devices, and IoT devices through 2020.**
Government spending on cybersecurity has increased at an
average annual rate of 14.5% between FY 2006 and FY
2017, outpacing procurement in every other type of major
government program.***
*Gartner: Forecast Analysis: Information Security, Worldwide, 4Q15 Update
** Markets and Markets: “Cyber Security Market by Solutions”
***Jones, Lang, Lasalle, IP
**** Transparency Market Research: Cloud Security Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014-2022
*****Grandview Research: Healthcare Cyber Security Market Size, Analysis Report, 2022
******"U.S. Financial Services: U.S. Financial Services: Cybersecurity Systems & Services Market – 2016-2020"
Cloud security market to be worth $12 billion by 2022****
The Healthcare Cyber
Security Market will hit
$10.85 Billion By 2022*****
The U.S. financial institutions
cybersecurity market is the
largest and fastest growing
private sector cyber security
market; cumulative 2016-2020
size is forecasted to exceed $68
Billion******
3
Why Massachusetts
Massachusetts provides
innovative, collaborative
support of cyber security
initiatives to businesses and
their customers:
• Unparalleled concentration of
talent, workforce, R&D centers,
universities, industry
• A cyber security ecosystem with
global sector leadership in
healthcare, financial services,
defense, manufacturing, life
sciences.
• Informed State governance
supporting cyber security policy
and programs.
Massachusetts Global Innovation Leadership
Drives the Cyber Security Ecosystem
2/2/2017
IndustryTalent
R&D
Customers
Investment
Boston
4
Cyber Security Leadership
 A vibrant industry cluster with 35 of the
top 500 Innovative US Cyber Security
Firms ; #3 in the US, following California
and Virginia (Cyber Ventures 500)
 70 Massachusetts Startups focused on
security products and services
Industry Cluster
 From 2010-2015, $1.25B raised by
25 of the top 35 cyber security firms
in MA
 In 2015, VC Investment in MA is
3rd largest in US including $1.8B in
Software & IT Services
Investment
 15,000+ STEM grads in 2014
#1 nationally
 In 2015, Massachusetts was 4th
among all states for the number of
new patents issued; 6th among
nations. (UMass Donahue Institute)
 30 degree programs in Cyber
Security at 18 universities, colleges
and community colleges
 4 NSA Centers of Academic
Excellence
Talent
Customers
R&D
 15 Dedicated Security Research
Centers at top 5 Universities
 13 Leading University/ Non Profit
Research Centers in Massachusetts
 10 of US largest Retail companies
HQ’d in MA
 12 Massachusetts companies in the
Fortune 500; Large Concentration
of Healthcare, Financial Services
sector leaders Universities
5
TALENT:
A smart and ready workforce,
Top colleges and universities
6
U.S. News & World Report Rankings
Ten Schools in the Top 100
National University Rankings:
Seven Schools in the Top 100
Liberal Arts College Rankings:
• Home to #1 Ranked School for Engineering (MIT)
• Home to #1 (Babson) and #2 (MIT) in the Undergrad Entrepreneurship Program
Rankings
• Home to #1 Ranked Business School (Harvard)
• Home to #1 Ranked School for Best Internship/Career Services (Northeastern)
7
Over 114 Colleges and Universities; with
over 400,000 students enrolled
There are 114 colleges and universities in Massachusetts enrolling over 400,000
students seeking bachelor's or associate degrees (Based on National Center for
Education Statistics, 2014).
Massachusetts is home to the most STEM Degrees in
the U.S. per million residents.
(source: Massachusetts Innovation Index)
Massachusetts has the Highest Percentage (46.1%) of Adults in US with a
Bachelor’s Degree or Higher.
(source: Massachusetts Innovation Index)
• Massachusetts is #1 in awarding
new college degrees per capita, with
over 117,000 higher education
graduates in 2014, inclusive of
community college, four year
degrees, and advanced degrees.
• 50 of these colleges and universities
are in the greater Boston
metropolitan area, which is home to
more than 250,000 students.
8
STEM (Science, Technology, Engineering & Math)
• MA is #1 nationally in STEM graduate and professional degrees granted per capita
• Two Massachusetts universities rank in the top five best graduate schools for math:
Massachusetts Institute of Technology (#1) and Harvard University (#3)
Science
• MA is #4 nationally in number of Science graduate and professional degrees granted
• Three Massachusetts universities rank in the top 25 of the best schools for computer
science: Massachusetts Institute of Technology (#1) , Harvard University (#18) and
University of Massachusetts Amherst #25).
Engineering
• MA is #5 nationally in number of Engineering graduate and professional degrees
granted
• Four Massachusetts universities rank in the top 50 engineering schools : Massachusetts
Institute of Technology (#1) , Harvard University (#20), Boston University (#37) and
Northeastern (#43).
STEM Grads
9
STEM Talent Density
0
50
100
150
200
250
300
350
400
450
Degrees Granted in Computer and
Information Sciences and Support
Services
per 1 Million Residents
Massachusetts, 2013-2014
Bachelors Masters
0
500
1000
1500
2000
2500
Degrees Granted in STEM Fields
per 1 Million Residents
Massachusetts, 2013-2014
Physical Sciences Mathetmatics & Statistics
Engineering Computer & Information Sciences
Biological & Biomedical Sciences
Source: The Index of the Massachusetts Innovation Economy 2015/16, MassTech Collaborative
10
Talent Pipeline
Talent Pipeline : Computer Science and Engineering
• MA produces Masters degrees at about the same rate the US produces bachelors,
and more than double the rate that the US produces masters degrees.
• MA produces 56% more bachelors degrees per capita than the US.
11
Public Universities
UMass Amherst (NSA CAE)
UMass Boston
UMass Lowell
Community Colleges
Bristol Community College
Bunker Hill Community College
MassBay Community College
Middlesex Community College
Mt. Wachusetts
Quinsigamond Community College
Springfield Technical Community College
Cyber Security Degree Programs
Current Colleges, Universities with Named Security Degree Programs
Private Colleges, Universities:
Bay Path University
Boston College
Boston University (NSA CAE )
Brandeis University
Clark University
Harvard University
Northeastern ( NSA CAE)
WPI ( NSA CAE)
Springfield Technical Community College
Associate Degree in Computer & IT Security
Bunker Hill Community College:
Associate in IT Security Option; Certificate in Technology Security
Boston College:
Master of Science in Cyber Security Policy and Governance
Boston University: NSA CAE
Graduate Certificate in Information Security
MS in Computer Information Systems with Concentration in Security
Northeastern: NSA CAE
Graduate Certificate in Information Security Management
M.S. in Information Assurance; PhD in Information Assurance
WPI: NSA CAE
MS in Computer Science – Specialization in Security
PhD in Electrical and Computer Engineering – Cyber Security Focus
UMass Amherst: NSA CAE
BS in Computer Science with Security & Privacy Track
Trust, Assurance and Cyber Security Certificate Program (TACC).
UMass Boston
BS in Information Technology – Computer Forensics
UMass Lowell:
Graduate Certificate in Network Security
Online Master of Science in Security Studies: Cyber Security Concentration
Sample Degree Programs:
12
Building Pathways
 DHE is working with Broadening Advanced Technological
Education Connections (BATEC) in the development and
implementation of Cyber Security Academic Pathways
on (5) public campuses.
 Program development includes Cyber Security industry
partners, Raytheon, Mitre, and MIT Lincoln Labs.
 Program Deliverables:
 Cyber Security Workforce Research Study;
 Establish (1) Bachelor of Science Degree at UMass
Boston;
 Establish (5) Associate in Science Degrees
 Establish (7) Stackable Certificates; Faculty
Professional Development
Mass. Department of Higher ED (DHE) is linking Cyber
Security program development efforts across campuses.
13
INDUSTRY:
A World-Leading Startup Ecosystem
Strong & Established Anchor Companies and over 70 startups
Many Innovation Programs and Accelerators
Highly Collaborative Community
14
#1 Innovation State
The Index factors R&D intensity,
productivity, high-tech density,
concentration of STEM
employment, science and
engineering degrees, and patent
activity.
Massachusetts has been #1 in
the Milken Institute’s annual
State Technology and
Science Index every year
since 2002.
Bloomberg’s 2016 U.S. Innovation
Index ranks Massachusetts as the
“Most Innovative State.”
15
Most Innovative Security
Companies in US
2/2/2017
*Cybersecurity Ventures Cybersecurity 500 2016
Massachusetts is home to 35 of the most innovative security companies
based on a 15-pt selection criteria by Cybersecurity Ventures.*
16
Successfully Scaling Companies
Name Location Founded Subsector and Applications Employees
Accelerator or
Other History
Startups
PiraShield Wellesley 2016 Anti-piracy application and monitoring. 1-10
MassChallenge
alumnus
Lexumo Cambridge 2015
Remediates software security vulnerabilities
in embedded, enterprise, and cloud products.
11-50
MIT STEX25
Accelerator 2016
mZeal Littleton 2000
Cyber/Network Security and analytics for
Enterprise, Mobile, Healthcare, and Financial
environments.
11-50
MassVentures
funding
Scaling Companies
Applause Framingham 2007
In-the-wild testing services, software tools,
and mobile sentiment analysis.
201-500
Cybric Boston 2015 Vulnerability assessment and remediation 11-50
Threat Stack Boston 2012
Cloud security, infrastructure monitoring, and
compliance
51-200
TechStars cloud
alumnus
Cybereason Boston 2012 Threat detection and response 51-200
Large Companies and Company Divisions
CyberArk Newton 1999 Privileged account security 500-1000
IBM Security Cambridge 2011 Threat protection and incident response 201-500
BAE Systems
Applied
Intelligence
Boston 1999
Cyber arm of global defense, aerospace and
security company
1001-5000
17
Robust Start Up Ecosystem
Incubators
Accelerators
hack/secure
Support
18
IBM X-Force Command Center
IBM X-Force Command Center Features:
• 24/7 Global Watch Floor
• Global incident response capabilities
• Seats for 36 Operators
• Data Center with a Petabyte of Data
• Simulates an actual cyber crisis
featuring audio, video, and typical
Fortune 500 company operations
IBM X-Force Command Center, Headquartered in Cambridge, Mass. brings
breakthrough technology and expertise to help clients mature their security
operations at the first-ever Commercial Cyber Range.
The X-Force Command Center immerses security professionals in a simulated
experience designed to test response readiness and leadership skills in crisis.
Offers actionable insights from some of the best incident responders in the world.
19
Massachusetts has a strong network of industry
and civic associations partnering with companies
and the state to support innovation and growth
Cyber Security Cluster: Associations
20
CUSTOMERS:
Global Industry Leaders in Healthcare,
Financial Services, Life Sciences
21
Critical Infrastructure Industries
Critical Infrastructure Sectors
Currently there are 16 U.S. Industry Sectors defined as critical infrastructure.
• 85% of critical infrastructure is in the private sector
• Trends exposing critical infrastructure to increased risk:
• Interconnectedness of sectors
• Proliferation of exposure points
• Concentration of Assets
22
Growth in Key Sectors
$-
$5,000.00
$10,000.00
$15,000.00
$20,000.00
$25,000.00
$30,000.00
$35,000.00
$40,000.00
$45,000.00
$50,000.00
Millions$
Growth in Key Sectors
Massachusetts, 2009 & 2015
2009 2015
Source: The Index of the Massachusetts Innovation Economy 2015/16, MassTech Collaborative
Growth in Key Customer Industry Sectors Drives Security Demand in Massachusetts
23
Spotlight: MassMutual
2016:
#76 FORTUNE 500
REVENUE ($M)$38,243
EMPLOYEES 11,593
SPRINGFIELD, MASS
FOUNDED 1851
“MassMutual takes cyber security seriously,
continuously investing in tools, resources and
personnel that help us keep that commitment.”
Protecting Life Insurance Policy Holders:
• Restricting Information Access
• Information Security Platform & Infrastructure
• Testing and Assessing Risk
• Regular Monitoring, Evaluation, Adjustment
• Protecting MassMutual Systems
• Cybersecurity Awareness
2016 World’s Most
Ethical Companies
____________________________
• MassMutual Foundation is providing UMass Amherst
$15M over 10 years to further strengthen its world-class
data science and cybersecurity research and education
programs in Western Massachusetts; State match
investment of $5M.
• Private-public collaboration that will uniquely benefit the
State, expand knowledge of data science and its uses
and develop new cybersecurity systems to protect
information networks.
• Supports new research and education activities at UMass
Cybersecurity Institute and the new Trust Assurance
Cybersecurity certificate offered at the MassMutual
Foundation/UMass Springfield Center for Training in
Cybersecurity.
• Provides significant economic development benefit to
downtown Springfield, drawing professionals from the
Springfield-Hartford, Conn., area.
Strong Public/Private Partnership in Cyber Security
24
INVESTMENT:Competitive Venture Capital Environment
Strong R&D Investments
25
Favorable M&A Environment
Recent Security Acquisitions in Massachusetts:
2016
2015
2015
2016
2015
2016
26
State’s Cyber Security Investment
The Commonwealth Fusion Center (CFC)
The Fusion Center provides 24 hours a day statewide information sharing among local, state and federal public safety agencies and
private sector organizations in order to facilitate the collection, analysis and dissemination of intelligence relevant to terrorism and public
safety. Managed by Executive Office of Public Safety and Security.
Hanscom Collaboration and Innovation Center (HCIC)
The HCIC is a Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and Cyber
collaborative environment to support: Research and Development, Test and Evaluation, modeling and simulation, acquisition
program/project development and direct warfighter support for Air Force programs.
MassVentures
Formed as a quasi-public corporation by the Commonwealth of Massachusetts to address the capital gap for start-up companies and to
encourage the growth of early-stage technology firms, MassVentures is a venture capital firm focused on fueling the Massachusetts
innovation economy by funding early-stage, high-growth Massachusetts startups as they move from concept to commercialization.
Data Science/Cybersecurity Collaborative Research and Education Center at UMass Amherst
Target industry clusters: Insurance Services, Financial Technology and Digital Health.. The State investment in this project is $5 million
with $15 million in matching funds from MassMutual Foundation.
Hanscom Air Force Base and Massachusetts Open Cloud (MOC) Security Test Environment
The hardware as a Service (HaaS) technology with contributions by the Air Force and MIT Lincoln Labs provides a test bed for security
in a public cloud. $3M Investment in Mass Open Cloud, .
George J. Kostas Institute for Homeland Security at Northeastern University
The Institute fosters a collaborative environment where multidisciplinary teams of academic
and industry researchers interact closely with private and public sector practitioners to
develop practical and scalable tools and applications to enable the capacity of communities,
critical systems, and infrastructure to withstand, respond to, recover from, and adapt to
disruptive events. $3M Investment
27
R&D:
An unparalleled concentration of research centers and universities
supporting the cyber security and technology enterprise.
28
Leadership in University R&D
 George J Kostas Research Institute for Homeland Security
 ALERT program – Awareness and Localization of Explosives-
related Threats
 Bernard M Gordon Center for Subsurface Sensing and Image
Systems
 Institute for Information Assurance
 Center for Data Science
 Cyber Security Institute – multidisciplinary education &
research across UMass Amherst schools
 Cyber Security@CSAIL, The Computer Science and
Artificial Intelligence Laboratory
 The MIT Cyber Security and Internet Policy Research Initiative
 MIT Sloan’s Interdisciplinary Consortium for Improving Critical
Infrastructure Cyber Security (IC)3
 Vernam Group – Encryption and data security research
 Applied Logic and Security Group
 Computer Science Department Research Facilitites
 Hariri Institute for Computing and Computational Science &
Engineering
 Center for Reliable Information Systems and Cyber
Security – multidisciplinary research across BU Schools
 BU Security Group – cryptographic and network security
research
Lincoln Laboratory
 Administrator: Massachusetts Institute of Technology
 Location: Lexington, MA
 Sponsor: Department of Defense, Office of the Under Secretary of
Defense for Acquisitions, Technology and Logistics
 National Security Engineering Center
 Administrator: MITRE Corp.
 Location: Bedford, MA, and McLean, VA
 Sponsor: Department of Defense, Office of the Under Secretary of
Defense for Acquisitions, Technology and Logistics
Federally Funded R&D Center (FFRDC)
29
High Performance Computing
Regional HPC data center for research
• Open to any research organization in the region
• Industry leading energy efficiency; tailored for high performance computing
• 90% carbon-free energy supply; LEED Platinum certification
Collaborative, computationally intensive research
• Ranging from theoretical physics to analysis of MBTA performance metrics
• Millions of virtual scientific experiments per month
• Complex simulations and analysis of massive data sets
Regional Economic Development
• Anchor tenant for Holyoke Innovation District ($90M development project)
• More than $200M private investment has followed
Stimulating Local Education partnerships
• Middle School High School, Community College
The MGHPCC (Mass Green High Performance
Computing Center) is jointly operated by Boston
University, Harvard, MIT, Northeastern, and UMass
30
Massachusetts Open Cloud (MOC)
MOC ECOSYSTEM
MOC Vision: Create a self-sustaining at-scale
public cloud based on the Open Cloud eXchange
model
• Enabling a marketplace for industry
• Enabling a place for researchers and industry
to innovate and expose innovation to real
users
The MOC is a state, academic and
industry partnership that connects
providers, innovators, and
consumers of cloud computing,
security and Big Data solutions.
• Preparing 100s of students for careers in
cloud computing through internships and
courses
• Resulted in federal research grants in
cloud cybersecurity, monitoring, and
infrastructure
• Forging new industry/
research/government collaborations in Big
Data, Cyber Security, and cloud
computing http:info.massopencloud.org
31
Advanced Cyber Security Center
A non-profit consortium the
Advanced Cyber Security
Center (ACSC) brings
together industry, university,
and government organizations
to address the most advanced
cyber threats, with a focus on
sharing cyber threat
information, engaging in next-
generation cybersecurity
research and development,
and creating education
programs that will address the
shortfall in cyber talent.
• Research & Education
• Threat Evaluation/Information
Sharing
• Policy
32
Why Massachusetts for Cyber
Security Collaboration & Growth
2/2/2017
Cyber Security
Global Leadership
fueled by extensive
ecosystem
Unparalleled
concentration of the
world’s leading
universities and
research centers
Skilled and
ready security
workforce
VC and
Investment
activity among
top in U.S.
Engaged
customer base in
critical industry
sectors
#
Robust, Start Up
Environment with
Strong support
The Place to Be
for Security M&A
#1 in U.S: STEM
Graduates and
Professional
Degrees per
Capita
33
Massachusetts is a top global destination for cyber
security growth, expansion, or strategic
partnerships. We want to work with you.
Connect with Us:
Partner with Us
Timothy J. Connelly
Executive Director/CEO,
Massachusetts Technology Collaborative
Connelly@masstech.org
(617) 371-3999
@Mass_Tech
Katie Stebbins
Assistant Secretary,
Innovation, Entrepreneurship, and Technology
Executive Office of Housing and Economic Development
katie.stebbins@state.ma.us
(617) 788-3616
@MassEOHED

More Related Content

What's hot

DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO IJDKP
 
How to find (and keep) STEM Talent
How to find (and keep) STEM TalentHow to find (and keep) STEM Talent
How to find (and keep) STEM TalentTodd Wheatland
 
Internet search btp_r[1].pptx edit
Internet search btp_r[1].pptx editInternet search btp_r[1].pptx edit
Internet search btp_r[1].pptx editkarlz016
 
DWBI_Project_Women_Empowerment_and_Gender_Gap
DWBI_Project_Women_Empowerment_and_Gender_GapDWBI_Project_Women_Empowerment_and_Gender_Gap
DWBI_Project_Women_Empowerment_and_Gender_GapAlekhya Bhupati
 
Transforming the Education of Future Generations
Transforming the Education of Future GenerationsTransforming the Education of Future Generations
Transforming the Education of Future Generationsfsaccess
 
Analysis of Rising Tutition Rates in The United States Based on Clustering An...
Analysis of Rising Tutition Rates in The United States Based on Clustering An...Analysis of Rising Tutition Rates in The United States Based on Clustering An...
Analysis of Rising Tutition Rates in The United States Based on Clustering An...csandit
 
E-Government Survey Waseda University japan 2016
E-Government Survey Waseda University japan 2016E-Government Survey Waseda University japan 2016
E-Government Survey Waseda University japan 2016Shahril Budiman Png
 
Assessment of current knowledge of e skills among students of b.ed. colleges
Assessment of current knowledge of e skills among students of b.ed. collegesAssessment of current knowledge of e skills among students of b.ed. colleges
Assessment of current knowledge of e skills among students of b.ed. collegesHamid Azimi
 
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS AT TURKISH...
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS  AT TURKISH...STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS  AT TURKISH...
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS AT TURKISH...Sport
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...eraser Juan José Calderón
 
WeTeach_CS and You Can Too! DFW CSTA
WeTeach_CS and You Can Too!  DFW CSTAWeTeach_CS and You Can Too!  DFW CSTA
WeTeach_CS and You Can Too! DFW CSTAWeTeach_CS
 
Countrywide similarity report
Countrywide similarity reportCountrywide similarity report
Countrywide similarity reportJeffrey Lorton
 

What's hot (15)

DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO
 
How to find (and keep) STEM Talent
How to find (and keep) STEM TalentHow to find (and keep) STEM Talent
How to find (and keep) STEM Talent
 
Internet search btp_r[1].pptx edit
Internet search btp_r[1].pptx editInternet search btp_r[1].pptx edit
Internet search btp_r[1].pptx edit
 
DWBI_Project_Women_Empowerment_and_Gender_Gap
DWBI_Project_Women_Empowerment_and_Gender_GapDWBI_Project_Women_Empowerment_and_Gender_Gap
DWBI_Project_Women_Empowerment_and_Gender_Gap
 
Transforming the Education of Future Generations
Transforming the Education of Future GenerationsTransforming the Education of Future Generations
Transforming the Education of Future Generations
 
Analysis of Rising Tutition Rates in The United States Based on Clustering An...
Analysis of Rising Tutition Rates in The United States Based on Clustering An...Analysis of Rising Tutition Rates in The United States Based on Clustering An...
Analysis of Rising Tutition Rates in The United States Based on Clustering An...
 
Education_Analytics
Education_AnalyticsEducation_Analytics
Education_Analytics
 
UIoT-SFI-Insight-Institute-Meeting-WritingSkills-2020-2021-MSERRANO-print
UIoT-SFI-Insight-Institute-Meeting-WritingSkills-2020-2021-MSERRANO-printUIoT-SFI-Insight-Institute-Meeting-WritingSkills-2020-2021-MSERRANO-print
UIoT-SFI-Insight-Institute-Meeting-WritingSkills-2020-2021-MSERRANO-print
 
E-Government Survey Waseda University japan 2016
E-Government Survey Waseda University japan 2016E-Government Survey Waseda University japan 2016
E-Government Survey Waseda University japan 2016
 
Assessment of current knowledge of e skills among students of b.ed. colleges
Assessment of current knowledge of e skills among students of b.ed. collegesAssessment of current knowledge of e skills among students of b.ed. colleges
Assessment of current knowledge of e skills among students of b.ed. colleges
 
Question8
Question8Question8
Question8
 
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS AT TURKISH...
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS  AT TURKISH...STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS  AT TURKISH...
STUDY ON WEB SITES OF PHYSICAL EDUCATION AND SPORT HIGHER SCHOOLS AT TURKISH...
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
 
WeTeach_CS and You Can Too! DFW CSTA
WeTeach_CS and You Can Too!  DFW CSTAWeTeach_CS and You Can Too!  DFW CSTA
WeTeach_CS and You Can Too! DFW CSTA
 
Countrywide similarity report
Countrywide similarity reportCountrywide similarity report
Countrywide similarity report
 

Similar to Massachusetts Cyber Security Ecosystem

WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013atmicrosoft
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITDavid Sweigert
 
16.1.7 campus technology news update - hackathon
16.1.7   campus technology news update - hackathon16.1.7   campus technology news update - hackathon
16.1.7 campus technology news update - hackathonhmhollingsworth
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1ISSIP
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapitolTechU
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data SciencePhilip Bourne
 
BrenSchoolofICSAnnualReport2015
BrenSchoolofICSAnnualReport2015BrenSchoolofICSAnnualReport2015
BrenSchoolofICSAnnualReport2015UC Irvine
 
Final hh - 17.3.3 - c bus hackathon kick-off release
Final   hh - 17.3.3 - c bus hackathon kick-off releaseFinal   hh - 17.3.3 - c bus hackathon kick-off release
Final hh - 17.3.3 - c bus hackathon kick-off releasehmhollingsworth
 
Latino Summit Presentation: Houston Community College Building a Pipeline of ...
Latino Summit Presentation: Houston Community College Building a Pipeline of ...Latino Summit Presentation: Houston Community College Building a Pipeline of ...
Latino Summit Presentation: Houston Community College Building a Pipeline of ...Houston Community College
 
Community College Presentation
Community College PresentationCommunity College Presentation
Community College PresentationRichard Bush
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
University of Virginia School of Data Science
University of Virginia School of Data ScienceUniversity of Virginia School of Data Science
University of Virginia School of Data SciencePhilip Bourne
 
How to Find (and Keep) STEM Talent
How to Find (and Keep) STEM TalentHow to Find (and Keep) STEM Talent
How to Find (and Keep) STEM TalentBill Smith
 

Similar to Massachusetts Cyber Security Ecosystem (20)

WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MIT
 
Overview - BDPA SITES Program
Overview - BDPA SITES ProgramOverview - BDPA SITES Program
Overview - BDPA SITES Program
 
16.1.7 campus technology news update - hackathon
16.1.7   campus technology news update - hackathon16.1.7   campus technology news update - hackathon
16.1.7 campus technology news update - hackathon
 
University of Illinois - Data Science
University of Illinois - Data ScienceUniversity of Illinois - Data Science
University of Illinois - Data Science
 
Bhef almaden 20131122 v1
Bhef almaden 20131122 v1Bhef almaden 20131122 v1
Bhef almaden 20131122 v1
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data Science
 
An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...An analysis framework of portable and measurable higher education for future ...
An analysis framework of portable and measurable higher education for future ...
 
BrenSchoolofICSAnnualReport2015
BrenSchoolofICSAnnualReport2015BrenSchoolofICSAnnualReport2015
BrenSchoolofICSAnnualReport2015
 
Final hh - 17.3.3 - c bus hackathon kick-off release
Final   hh - 17.3.3 - c bus hackathon kick-off releaseFinal   hh - 17.3.3 - c bus hackathon kick-off release
Final hh - 17.3.3 - c bus hackathon kick-off release
 
Latino Summit Presentation: Houston Community College Building a Pipeline of ...
Latino Summit Presentation: Houston Community College Building a Pipeline of ...Latino Summit Presentation: Houston Community College Building a Pipeline of ...
Latino Summit Presentation: Houston Community College Building a Pipeline of ...
 
A Presentation of the 2014 Massachusetts Big Data Report
A Presentation of the 2014 Massachusetts Big Data Report A Presentation of the 2014 Massachusetts Big Data Report
A Presentation of the 2014 Massachusetts Big Data Report
 
Community College Presentation
Community College PresentationCommunity College Presentation
Community College Presentation
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
COBNewsletterFeb15
COBNewsletterFeb15COBNewsletterFeb15
COBNewsletterFeb15
 
University of Virginia School of Data Science
University of Virginia School of Data ScienceUniversity of Virginia School of Data Science
University of Virginia School of Data Science
 
How to Find (and Keep) STEM Talent
How to Find (and Keep) STEM TalentHow to Find (and Keep) STEM Talent
How to Find (and Keep) STEM Talent
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Massachusetts Cyber Security Ecosystem

  • 1. MASSACHUSETTS Cyber Security Global Leadership Through Talent, Resources, Investment
  • 2. 2 The Cyber Security Opportunity Cyber Security is the Fastest Growing Tech Sector Worldwide The worldwide cyber security market will reach $170 Billion by 2020; Overall security market will grow at a 7.8 % CAGR through 2019* $655 Billion will be spent on cyber security initiatives to protect PCs, mobile devices, and IoT devices through 2020.** Government spending on cybersecurity has increased at an average annual rate of 14.5% between FY 2006 and FY 2017, outpacing procurement in every other type of major government program.*** *Gartner: Forecast Analysis: Information Security, Worldwide, 4Q15 Update ** Markets and Markets: “Cyber Security Market by Solutions” ***Jones, Lang, Lasalle, IP **** Transparency Market Research: Cloud Security Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014-2022 *****Grandview Research: Healthcare Cyber Security Market Size, Analysis Report, 2022 ******"U.S. Financial Services: U.S. Financial Services: Cybersecurity Systems & Services Market – 2016-2020" Cloud security market to be worth $12 billion by 2022**** The Healthcare Cyber Security Market will hit $10.85 Billion By 2022***** The U.S. financial institutions cybersecurity market is the largest and fastest growing private sector cyber security market; cumulative 2016-2020 size is forecasted to exceed $68 Billion******
  • 3. 3 Why Massachusetts Massachusetts provides innovative, collaborative support of cyber security initiatives to businesses and their customers: • Unparalleled concentration of talent, workforce, R&D centers, universities, industry • A cyber security ecosystem with global sector leadership in healthcare, financial services, defense, manufacturing, life sciences. • Informed State governance supporting cyber security policy and programs. Massachusetts Global Innovation Leadership Drives the Cyber Security Ecosystem 2/2/2017 IndustryTalent R&D Customers Investment Boston
  • 4. 4 Cyber Security Leadership  A vibrant industry cluster with 35 of the top 500 Innovative US Cyber Security Firms ; #3 in the US, following California and Virginia (Cyber Ventures 500)  70 Massachusetts Startups focused on security products and services Industry Cluster  From 2010-2015, $1.25B raised by 25 of the top 35 cyber security firms in MA  In 2015, VC Investment in MA is 3rd largest in US including $1.8B in Software & IT Services Investment  15,000+ STEM grads in 2014 #1 nationally  In 2015, Massachusetts was 4th among all states for the number of new patents issued; 6th among nations. (UMass Donahue Institute)  30 degree programs in Cyber Security at 18 universities, colleges and community colleges  4 NSA Centers of Academic Excellence Talent Customers R&D  15 Dedicated Security Research Centers at top 5 Universities  13 Leading University/ Non Profit Research Centers in Massachusetts  10 of US largest Retail companies HQ’d in MA  12 Massachusetts companies in the Fortune 500; Large Concentration of Healthcare, Financial Services sector leaders Universities
  • 5. 5 TALENT: A smart and ready workforce, Top colleges and universities
  • 6. 6 U.S. News & World Report Rankings Ten Schools in the Top 100 National University Rankings: Seven Schools in the Top 100 Liberal Arts College Rankings: • Home to #1 Ranked School for Engineering (MIT) • Home to #1 (Babson) and #2 (MIT) in the Undergrad Entrepreneurship Program Rankings • Home to #1 Ranked Business School (Harvard) • Home to #1 Ranked School for Best Internship/Career Services (Northeastern)
  • 7. 7 Over 114 Colleges and Universities; with over 400,000 students enrolled There are 114 colleges and universities in Massachusetts enrolling over 400,000 students seeking bachelor's or associate degrees (Based on National Center for Education Statistics, 2014). Massachusetts is home to the most STEM Degrees in the U.S. per million residents. (source: Massachusetts Innovation Index) Massachusetts has the Highest Percentage (46.1%) of Adults in US with a Bachelor’s Degree or Higher. (source: Massachusetts Innovation Index) • Massachusetts is #1 in awarding new college degrees per capita, with over 117,000 higher education graduates in 2014, inclusive of community college, four year degrees, and advanced degrees. • 50 of these colleges and universities are in the greater Boston metropolitan area, which is home to more than 250,000 students.
  • 8. 8 STEM (Science, Technology, Engineering & Math) • MA is #1 nationally in STEM graduate and professional degrees granted per capita • Two Massachusetts universities rank in the top five best graduate schools for math: Massachusetts Institute of Technology (#1) and Harvard University (#3) Science • MA is #4 nationally in number of Science graduate and professional degrees granted • Three Massachusetts universities rank in the top 25 of the best schools for computer science: Massachusetts Institute of Technology (#1) , Harvard University (#18) and University of Massachusetts Amherst #25). Engineering • MA is #5 nationally in number of Engineering graduate and professional degrees granted • Four Massachusetts universities rank in the top 50 engineering schools : Massachusetts Institute of Technology (#1) , Harvard University (#20), Boston University (#37) and Northeastern (#43). STEM Grads
  • 9. 9 STEM Talent Density 0 50 100 150 200 250 300 350 400 450 Degrees Granted in Computer and Information Sciences and Support Services per 1 Million Residents Massachusetts, 2013-2014 Bachelors Masters 0 500 1000 1500 2000 2500 Degrees Granted in STEM Fields per 1 Million Residents Massachusetts, 2013-2014 Physical Sciences Mathetmatics & Statistics Engineering Computer & Information Sciences Biological & Biomedical Sciences Source: The Index of the Massachusetts Innovation Economy 2015/16, MassTech Collaborative
  • 10. 10 Talent Pipeline Talent Pipeline : Computer Science and Engineering • MA produces Masters degrees at about the same rate the US produces bachelors, and more than double the rate that the US produces masters degrees. • MA produces 56% more bachelors degrees per capita than the US.
  • 11. 11 Public Universities UMass Amherst (NSA CAE) UMass Boston UMass Lowell Community Colleges Bristol Community College Bunker Hill Community College MassBay Community College Middlesex Community College Mt. Wachusetts Quinsigamond Community College Springfield Technical Community College Cyber Security Degree Programs Current Colleges, Universities with Named Security Degree Programs Private Colleges, Universities: Bay Path University Boston College Boston University (NSA CAE ) Brandeis University Clark University Harvard University Northeastern ( NSA CAE) WPI ( NSA CAE) Springfield Technical Community College Associate Degree in Computer & IT Security Bunker Hill Community College: Associate in IT Security Option; Certificate in Technology Security Boston College: Master of Science in Cyber Security Policy and Governance Boston University: NSA CAE Graduate Certificate in Information Security MS in Computer Information Systems with Concentration in Security Northeastern: NSA CAE Graduate Certificate in Information Security Management M.S. in Information Assurance; PhD in Information Assurance WPI: NSA CAE MS in Computer Science – Specialization in Security PhD in Electrical and Computer Engineering – Cyber Security Focus UMass Amherst: NSA CAE BS in Computer Science with Security & Privacy Track Trust, Assurance and Cyber Security Certificate Program (TACC). UMass Boston BS in Information Technology – Computer Forensics UMass Lowell: Graduate Certificate in Network Security Online Master of Science in Security Studies: Cyber Security Concentration Sample Degree Programs:
  • 12. 12 Building Pathways  DHE is working with Broadening Advanced Technological Education Connections (BATEC) in the development and implementation of Cyber Security Academic Pathways on (5) public campuses.  Program development includes Cyber Security industry partners, Raytheon, Mitre, and MIT Lincoln Labs.  Program Deliverables:  Cyber Security Workforce Research Study;  Establish (1) Bachelor of Science Degree at UMass Boston;  Establish (5) Associate in Science Degrees  Establish (7) Stackable Certificates; Faculty Professional Development Mass. Department of Higher ED (DHE) is linking Cyber Security program development efforts across campuses.
  • 13. 13 INDUSTRY: A World-Leading Startup Ecosystem Strong & Established Anchor Companies and over 70 startups Many Innovation Programs and Accelerators Highly Collaborative Community
  • 14. 14 #1 Innovation State The Index factors R&D intensity, productivity, high-tech density, concentration of STEM employment, science and engineering degrees, and patent activity. Massachusetts has been #1 in the Milken Institute’s annual State Technology and Science Index every year since 2002. Bloomberg’s 2016 U.S. Innovation Index ranks Massachusetts as the “Most Innovative State.”
  • 15. 15 Most Innovative Security Companies in US 2/2/2017 *Cybersecurity Ventures Cybersecurity 500 2016 Massachusetts is home to 35 of the most innovative security companies based on a 15-pt selection criteria by Cybersecurity Ventures.*
  • 16. 16 Successfully Scaling Companies Name Location Founded Subsector and Applications Employees Accelerator or Other History Startups PiraShield Wellesley 2016 Anti-piracy application and monitoring. 1-10 MassChallenge alumnus Lexumo Cambridge 2015 Remediates software security vulnerabilities in embedded, enterprise, and cloud products. 11-50 MIT STEX25 Accelerator 2016 mZeal Littleton 2000 Cyber/Network Security and analytics for Enterprise, Mobile, Healthcare, and Financial environments. 11-50 MassVentures funding Scaling Companies Applause Framingham 2007 In-the-wild testing services, software tools, and mobile sentiment analysis. 201-500 Cybric Boston 2015 Vulnerability assessment and remediation 11-50 Threat Stack Boston 2012 Cloud security, infrastructure monitoring, and compliance 51-200 TechStars cloud alumnus Cybereason Boston 2012 Threat detection and response 51-200 Large Companies and Company Divisions CyberArk Newton 1999 Privileged account security 500-1000 IBM Security Cambridge 2011 Threat protection and incident response 201-500 BAE Systems Applied Intelligence Boston 1999 Cyber arm of global defense, aerospace and security company 1001-5000
  • 17. 17 Robust Start Up Ecosystem Incubators Accelerators hack/secure Support
  • 18. 18 IBM X-Force Command Center IBM X-Force Command Center Features: • 24/7 Global Watch Floor • Global incident response capabilities • Seats for 36 Operators • Data Center with a Petabyte of Data • Simulates an actual cyber crisis featuring audio, video, and typical Fortune 500 company operations IBM X-Force Command Center, Headquartered in Cambridge, Mass. brings breakthrough technology and expertise to help clients mature their security operations at the first-ever Commercial Cyber Range. The X-Force Command Center immerses security professionals in a simulated experience designed to test response readiness and leadership skills in crisis. Offers actionable insights from some of the best incident responders in the world.
  • 19. 19 Massachusetts has a strong network of industry and civic associations partnering with companies and the state to support innovation and growth Cyber Security Cluster: Associations
  • 20. 20 CUSTOMERS: Global Industry Leaders in Healthcare, Financial Services, Life Sciences
  • 21. 21 Critical Infrastructure Industries Critical Infrastructure Sectors Currently there are 16 U.S. Industry Sectors defined as critical infrastructure. • 85% of critical infrastructure is in the private sector • Trends exposing critical infrastructure to increased risk: • Interconnectedness of sectors • Proliferation of exposure points • Concentration of Assets
  • 22. 22 Growth in Key Sectors $- $5,000.00 $10,000.00 $15,000.00 $20,000.00 $25,000.00 $30,000.00 $35,000.00 $40,000.00 $45,000.00 $50,000.00 Millions$ Growth in Key Sectors Massachusetts, 2009 & 2015 2009 2015 Source: The Index of the Massachusetts Innovation Economy 2015/16, MassTech Collaborative Growth in Key Customer Industry Sectors Drives Security Demand in Massachusetts
  • 23. 23 Spotlight: MassMutual 2016: #76 FORTUNE 500 REVENUE ($M)$38,243 EMPLOYEES 11,593 SPRINGFIELD, MASS FOUNDED 1851 “MassMutual takes cyber security seriously, continuously investing in tools, resources and personnel that help us keep that commitment.” Protecting Life Insurance Policy Holders: • Restricting Information Access • Information Security Platform & Infrastructure • Testing and Assessing Risk • Regular Monitoring, Evaluation, Adjustment • Protecting MassMutual Systems • Cybersecurity Awareness 2016 World’s Most Ethical Companies ____________________________ • MassMutual Foundation is providing UMass Amherst $15M over 10 years to further strengthen its world-class data science and cybersecurity research and education programs in Western Massachusetts; State match investment of $5M. • Private-public collaboration that will uniquely benefit the State, expand knowledge of data science and its uses and develop new cybersecurity systems to protect information networks. • Supports new research and education activities at UMass Cybersecurity Institute and the new Trust Assurance Cybersecurity certificate offered at the MassMutual Foundation/UMass Springfield Center for Training in Cybersecurity. • Provides significant economic development benefit to downtown Springfield, drawing professionals from the Springfield-Hartford, Conn., area. Strong Public/Private Partnership in Cyber Security
  • 24. 24 INVESTMENT:Competitive Venture Capital Environment Strong R&D Investments
  • 25. 25 Favorable M&A Environment Recent Security Acquisitions in Massachusetts: 2016 2015 2015 2016 2015 2016
  • 26. 26 State’s Cyber Security Investment The Commonwealth Fusion Center (CFC) The Fusion Center provides 24 hours a day statewide information sharing among local, state and federal public safety agencies and private sector organizations in order to facilitate the collection, analysis and dissemination of intelligence relevant to terrorism and public safety. Managed by Executive Office of Public Safety and Security. Hanscom Collaboration and Innovation Center (HCIC) The HCIC is a Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and Cyber collaborative environment to support: Research and Development, Test and Evaluation, modeling and simulation, acquisition program/project development and direct warfighter support for Air Force programs. MassVentures Formed as a quasi-public corporation by the Commonwealth of Massachusetts to address the capital gap for start-up companies and to encourage the growth of early-stage technology firms, MassVentures is a venture capital firm focused on fueling the Massachusetts innovation economy by funding early-stage, high-growth Massachusetts startups as they move from concept to commercialization. Data Science/Cybersecurity Collaborative Research and Education Center at UMass Amherst Target industry clusters: Insurance Services, Financial Technology and Digital Health.. The State investment in this project is $5 million with $15 million in matching funds from MassMutual Foundation. Hanscom Air Force Base and Massachusetts Open Cloud (MOC) Security Test Environment The hardware as a Service (HaaS) technology with contributions by the Air Force and MIT Lincoln Labs provides a test bed for security in a public cloud. $3M Investment in Mass Open Cloud, . George J. Kostas Institute for Homeland Security at Northeastern University The Institute fosters a collaborative environment where multidisciplinary teams of academic and industry researchers interact closely with private and public sector practitioners to develop practical and scalable tools and applications to enable the capacity of communities, critical systems, and infrastructure to withstand, respond to, recover from, and adapt to disruptive events. $3M Investment
  • 27. 27 R&D: An unparalleled concentration of research centers and universities supporting the cyber security and technology enterprise.
  • 28. 28 Leadership in University R&D  George J Kostas Research Institute for Homeland Security  ALERT program – Awareness and Localization of Explosives- related Threats  Bernard M Gordon Center for Subsurface Sensing and Image Systems  Institute for Information Assurance  Center for Data Science  Cyber Security Institute – multidisciplinary education & research across UMass Amherst schools  Cyber Security@CSAIL, The Computer Science and Artificial Intelligence Laboratory  The MIT Cyber Security and Internet Policy Research Initiative  MIT Sloan’s Interdisciplinary Consortium for Improving Critical Infrastructure Cyber Security (IC)3  Vernam Group – Encryption and data security research  Applied Logic and Security Group  Computer Science Department Research Facilitites  Hariri Institute for Computing and Computational Science & Engineering  Center for Reliable Information Systems and Cyber Security – multidisciplinary research across BU Schools  BU Security Group – cryptographic and network security research Lincoln Laboratory  Administrator: Massachusetts Institute of Technology  Location: Lexington, MA  Sponsor: Department of Defense, Office of the Under Secretary of Defense for Acquisitions, Technology and Logistics  National Security Engineering Center  Administrator: MITRE Corp.  Location: Bedford, MA, and McLean, VA  Sponsor: Department of Defense, Office of the Under Secretary of Defense for Acquisitions, Technology and Logistics Federally Funded R&D Center (FFRDC)
  • 29. 29 High Performance Computing Regional HPC data center for research • Open to any research organization in the region • Industry leading energy efficiency; tailored for high performance computing • 90% carbon-free energy supply; LEED Platinum certification Collaborative, computationally intensive research • Ranging from theoretical physics to analysis of MBTA performance metrics • Millions of virtual scientific experiments per month • Complex simulations and analysis of massive data sets Regional Economic Development • Anchor tenant for Holyoke Innovation District ($90M development project) • More than $200M private investment has followed Stimulating Local Education partnerships • Middle School High School, Community College The MGHPCC (Mass Green High Performance Computing Center) is jointly operated by Boston University, Harvard, MIT, Northeastern, and UMass
  • 30. 30 Massachusetts Open Cloud (MOC) MOC ECOSYSTEM MOC Vision: Create a self-sustaining at-scale public cloud based on the Open Cloud eXchange model • Enabling a marketplace for industry • Enabling a place for researchers and industry to innovate and expose innovation to real users The MOC is a state, academic and industry partnership that connects providers, innovators, and consumers of cloud computing, security and Big Data solutions. • Preparing 100s of students for careers in cloud computing through internships and courses • Resulted in federal research grants in cloud cybersecurity, monitoring, and infrastructure • Forging new industry/ research/government collaborations in Big Data, Cyber Security, and cloud computing http:info.massopencloud.org
  • 31. 31 Advanced Cyber Security Center A non-profit consortium the Advanced Cyber Security Center (ACSC) brings together industry, university, and government organizations to address the most advanced cyber threats, with a focus on sharing cyber threat information, engaging in next- generation cybersecurity research and development, and creating education programs that will address the shortfall in cyber talent. • Research & Education • Threat Evaluation/Information Sharing • Policy
  • 32. 32 Why Massachusetts for Cyber Security Collaboration & Growth 2/2/2017 Cyber Security Global Leadership fueled by extensive ecosystem Unparalleled concentration of the world’s leading universities and research centers Skilled and ready security workforce VC and Investment activity among top in U.S. Engaged customer base in critical industry sectors # Robust, Start Up Environment with Strong support The Place to Be for Security M&A #1 in U.S: STEM Graduates and Professional Degrees per Capita
  • 33. 33 Massachusetts is a top global destination for cyber security growth, expansion, or strategic partnerships. We want to work with you. Connect with Us: Partner with Us Timothy J. Connelly Executive Director/CEO, Massachusetts Technology Collaborative Connelly@masstech.org (617) 371-3999 @Mass_Tech Katie Stebbins Assistant Secretary, Innovation, Entrepreneurship, and Technology Executive Office of Housing and Economic Development katie.stebbins@state.ma.us (617) 788-3616 @MassEOHED

Editor's Notes

  1. Massachusetts Headquarters for U.S. Retail Chains Big Y Headquarters - Springfield, MA Bertucci's Headquarters - Northborough, M BJ's Wholesale Club Headquarters - Natick, MA Elephant & Castle Headquarters - Boston, MA Honey Dew Donuts Headquarters - Plainview, MA Market Basket Headquarters (Demoulas Super Markets) - Tewksbury, MA Not Your Average Joe's - Milton, MA Papa Gino's Headquarters - East Boston, MA Staples Headquarters - Framingham, MA TJX Headquarters - Framingham, MA Mass Companies in Fortune 500 73 78 Liberty Mutual Ins. Group (Boston) Insurance: P & C (stock) $39.4 76 94 Mass. Mutual Life Ins. (Springfield) Insurance: Life, Health (mutual) $38.2 89 103 TJX (Framingham) Specialty Retailers: Apparel $30.9 113 121 EMC (Hopkinton) Computer Peripherals $24.7 120 129 Raytheon (Waltham) Aerospace and Defense $23.2 132 133 Staples (Framingham) Specialty Retailers: Other $21.0 164 181 Thermo Fisher Scientific (Waltham) Scientific, Photo, Control Equipment $17.0 263 298 Biogen Idec (Weston) Pharmaceuticals $10.8 264 278 State St. Corp. (Boston) Commercial Banks $10.8 273 180 Global Partners (Waltham) Wholesalers: Diversified $10.3 343 367 Eversource (Springfield) Utilities: Gas and Electric $8.0 359 378 Boston Scientific (Natick) Medical Products & Equipment $7.5 M
  2. BEDFORD RSA (division of EMC), Intelligence Driven Security BOSTON AlgoSec, Security Policy Management Apperian, Mobile App Security, Bradford Networks, Network Security Automation Confer, Threat Prevention & Incident Response Core Security, Predictive Security Intelligence Fidelis Security Solutions, Threat Defense Onapsis, ERP Cyber Security Solutions Threat Stack, Cloud Security Monitoring Rapid7, Security Data & Analytics Solution Vaultive, Cloud Data Encryption BOXBOROUGH Allegro Software, Embedded Device Security BURLINGTON Arbor Networks, DDoS Attack & Threat Protection Veracode, Application Security Testing CAMBRIDGE Akamai Technologies, Secure Cloud & Mobile Computing IBM Security (ranked #3 overall) Sqrrl, Cyber Defense Analytics VisiTrend, Cyber Security Analytics FRAMINGHAM Prelert, Machine Learning Anomaly Detection HUDSON Corero, DDoS Defense & Security Solutions