SlideShare a Scribd company logo
Why is it getting harder to train
the cybersecurity workforce?
(Extended Version)
Prof. Seungjoo (Gabriel) Kim / Korea University
Seungjoo Kim
Professor of the School of Cybersecurity of
Korea University, Head of the Department
of Cyber Defense of Korea University, and
a Member of the Presidential Committee
on the 4th Industrial Revolution.
From 2018 to 2019, he was a visiting
professor of Korea Military Academy.
He served as a Black Hat Asia review board
member from 2019, a team leader of
Korea Internet & Security Agency (KISA)
from 1998 to 2004, and an associate
professor of Sungkyunkwan University,
Korea.
(As of November 2020)
Cyber Threats in South Korea
South Korean government groups and agencies experience
more than 1.62 million hacking attempts a day according to
South Korean National Intelligence Service (NIS, Korean
CIA).
⇒ From North Korea 》 China 〉 Russia 〉 Iran & Pakistan ↑
Cyber Threats in South Korea
Also, in recent years, there have been more attacks mainly
targeting private companies rather than public institutions.
The hacking damage is estimated at 86% and 14% for the
private and public, respectively.
North Korean Hacking Workforce
Korean government believes that North Korean General
Bureau of Reconnaissance (偵察總局), specifically Unit 121,
dedicates 6,000+ (exactly 6,800) full-time hackers who
create malicious computer codes.
⇒ 1,700 are experts and 5,100 are supportive members.
NK's hacking skills are really that good?
⇒ Evidence ⑴) Foreign IT expert evaluated that NK has a
potential to replace Indian S/W outsourcing market.
NK's hacking skills are really that good?
⇒ Evidence ⑵) North Korean students have a good
foundation for computer science itself.
North Korean Hacking Workforce
As seen before, North Korean hackers have good hacking
skills and good base in computer science.
But above all, they have very strong motivation such as Kim
Jung-un’s encouragements.
Furthermore, North Korean hackers are state-sponsored
soldiers. Thus they have the solid knowledge of (military)
operation. As we can see in SWIFT hacking, they can carry
out very well organized operation.
Dept. of Cyber Defense @ Korea Univ.
Established in 2012 to prepare for North Korea's hacking
attack (Inspired by Israel's Talpiot program)
⇒ We produced 30 first graduates in 2016.
Joint educational programs with Korea Army (Cyber
Command)
Full Scholarship over Guaranteed Employment
Dept. of Cyber Defense @ Korea Univ.
Upon graduation, they are to be commissioned as second
lieutenants and must serve in the military for seven years.
Accept top 0.4%~0.6% of students in the national college
entrance exam.
The team led by graduates of our dept. got 2nd place in the CYBERNET 2021 CTF (Netherland,
Nov. 15~19)! (1st : Netherland, 2nd : Korea, 3rd : EU combined team, 4th : Norway, 5th : Japan)
Other Education Programs
NSR’s CSTEC(Cyber Security Training and Exercise Center)
KISA’s K-Shield
KITRI’s BoB(Best of the Best) Program : Running strong
peer-to-peer mentoring style of education. And so far, it
has made so may pretty good results.
Changes in the Security Environment Ⅰ
Entering the era of the 4th Industrial Revolution, cyber
security began to be demanded in all areas connected to
the Internet.
As the importance of cybersecurity spreads across all areas,
security experts are forced to have more in-depth domain
knowledge than ever before.
Changes in the Security Environment Ⅰ
For example, in the European Union, the regulations on
automotive cybersecurity will be mandatory for all new
vehicles produced from July 2024.
⇒ UNECE WP.29 & ISO/SAE 21434
Changes in the Security Environment Ⅰ
UNECE regulations consist of ⑴ R155 for cyber security and
⑵ R156 for software update.
UNECE regulation 155 (Cyber Security) introduce a
Cybersecurity Management System (CSMS) in automotive
on organization level. :
√ Risk management across the entire company and the entire life cycle of
each individual vehicle
√ Analysis of weak points during the entire development and production
process
√ Cyber ​​security monitoring and incident response to existing vehicle types
Changes in the Security Environment Ⅰ
UNECE regulations consist of ⑴ R155 for cyber security and
⑵ R156 for software update.
UNECE regulation 156 (SW Updates) introduce a framework
for remote updates (over-the-air) with a Software Update
Management System (SUMS). :
√ Systematic control and compliance with government guidelines
√ Establish Software identification management
√ Assessment whether a software update (SU) affects type approval and
security of vehicle
MS-SDL
Similar!
Changes in the Security Environment Ⅰ
Also, on April 11th~12th, 2019 International Air Transport
Association (IATA) held for the first time, at its Regional
Office in Singapore, an Aviation Cyber Security Roundtable
(ACSR).
Through this, they concluded that it was necessary to
cultivate a new generation of individuals and organizations
that are able to support in answering the aviation cyber
security challenge.
Changes in the Security Environment Ⅰ
As another example, the U.S. DoD has been developing
various policies aimed at hardening the cybersecurity for its
weapon systems.
⇒ RMF A&A
Changes in the Security Environment Ⅰ
(e.g.) Lockheed Martin's CRL Framework for Weapon,
Mission, and Training Systems
Changes in the Security Environment Ⅱ
As cybersecurity is highlighted in all fields, the recruitment
of cyber security experts by large companies (such as
Samsung, LG, Hyundai/KIA, etc.) is increasing rapidly.
As a result, SMEs(Small and Medium-sized Enterprises) are
having difficulty in hiring security experts.
How to Educate Them?
In order to train security experts specialized in each
industrial sector, real data in the field is required to grow
in-depth domain-knowledge.
However, it is difficult for universities to obtain the data
generated in the real world.
This is particularly serious in the fields of automobiles,
aircraft, and weapon systems, etc.
How to Educate Them?
Need very strong public-private partnership!
Universities should teach students to have solid basic
knowledge, so that they can quickly acquire practical
domain-knowledge taught in the company(or government)
after joining that company(or government).
In addition, as in Cyber Grand Challenge of DARPA in the
United States, efforts should be made to provide a high-
quality research platform to academia.
Meet Real Patients!
(Practical Domain-Knowledge)
How to Educate Them?
In fact, in the case of our Department of Cyber Defense, we
are focusing on preventing students from studying only
specific security skills, such as vulnerability analysis.
Our curriculum includes the basic and essential major
subjects required by the Department of Computer Science.
Moreover, cyber security-related subjects are not only
focused on hacking, but also cover all subjects necessary
for cyber security experts such as cryptography, digital
forensics, data security and privacy law, etc.
How to Educate Them?
However, due to the nature of the department that should
not expose students' identities as much as possible, there
are limitations in running various internship programs.
Moreover, in this pandemic situation, it is more difficult to
promote internship programs.
How to Motivate Them?
Good salary. (-:
Even if the current salary is small, it needs to have a clear
future vision.
In the case of military or government institutions, it is
necessary to assign them tasks that are difficult to
experience in private companies or tasks that can make
them feel patriotic.
Thank you for giving me the opportunity to talk at a really fun conference! Let's meet offline at HITCON next year!!
Seungjoo Kim
Head of Department of Cyber Defense
skim71@korea.ac.kr
www.KimLab.net
www.HackProof.systems
Twitter : @skim71

More Related Content

What's hot

Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
Nathan Desfontaines
 
Cyber security
Cyber securityCyber security
Cyber security
Vaibhav Jain
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
Nathan Desfontaines
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
NTT Innovation Institute Inc.
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
William Beer
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
Mohamed Amine Belarbi
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
Omlis
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
AbhilashYadav14
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
Aanchal579958
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
Anna Landolfi
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 

What's hot (20)

Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 

Similar to Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)

2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
CODE BLUE
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Maurice Dawson
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Highervista
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
TakishaPeck109
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
ariysn
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
ETDAofficialRegist
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementAmitabh Sen Gupta
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
Humphrey Humphrey
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
Settapong_CyberSecurity
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Global Knowledge Training
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
ucisa
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
Seungjoo Kim
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
Seungjoo Kim
 
How South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-SecurityHow South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-Security
Seungjoo Kim
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
ijfcstjournal
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
ijfcstjournal
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
ThowfeekFayees
 

Similar to Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion) (20)

2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018Cyber security training using virtual labs 3 cs umuc presentation august 2018
Cyber security training using virtual labs 3 cs umuc presentation august 2018
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence Management
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
 
How South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-SecurityHow South Korea Invests in Human Capital for Cyber-Security
How South Korea Invests in Human Capital for Cyber-Security
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 

More from Seungjoo Kim

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
Seungjoo Kim
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
Seungjoo Kim
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Seungjoo Kim
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
Seungjoo Kim
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Seungjoo Kim
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
Seungjoo Kim
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Seungjoo Kim
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
Seungjoo Kim
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
Seungjoo Kim
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
Seungjoo Kim
 

More from Seungjoo Kim (20)

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)

  • 1. Why is it getting harder to train the cybersecurity workforce? (Extended Version) Prof. Seungjoo (Gabriel) Kim / Korea University
  • 2. Seungjoo Kim Professor of the School of Cybersecurity of Korea University, Head of the Department of Cyber Defense of Korea University, and a Member of the Presidential Committee on the 4th Industrial Revolution. From 2018 to 2019, he was a visiting professor of Korea Military Academy. He served as a Black Hat Asia review board member from 2019, a team leader of Korea Internet & Security Agency (KISA) from 1998 to 2004, and an associate professor of Sungkyunkwan University, Korea.
  • 4. Cyber Threats in South Korea South Korean government groups and agencies experience more than 1.62 million hacking attempts a day according to South Korean National Intelligence Service (NIS, Korean CIA). ⇒ From North Korea 》 China 〉 Russia 〉 Iran & Pakistan ↑
  • 5. Cyber Threats in South Korea Also, in recent years, there have been more attacks mainly targeting private companies rather than public institutions. The hacking damage is estimated at 86% and 14% for the private and public, respectively.
  • 6. North Korean Hacking Workforce Korean government believes that North Korean General Bureau of Reconnaissance (偵察總局), specifically Unit 121, dedicates 6,000+ (exactly 6,800) full-time hackers who create malicious computer codes. ⇒ 1,700 are experts and 5,100 are supportive members.
  • 7.
  • 8. NK's hacking skills are really that good? ⇒ Evidence ⑴) Foreign IT expert evaluated that NK has a potential to replace Indian S/W outsourcing market.
  • 9. NK's hacking skills are really that good? ⇒ Evidence ⑵) North Korean students have a good foundation for computer science itself.
  • 10.
  • 11.
  • 12.
  • 13. North Korean Hacking Workforce As seen before, North Korean hackers have good hacking skills and good base in computer science. But above all, they have very strong motivation such as Kim Jung-un’s encouragements. Furthermore, North Korean hackers are state-sponsored soldiers. Thus they have the solid knowledge of (military) operation. As we can see in SWIFT hacking, they can carry out very well organized operation.
  • 14. Dept. of Cyber Defense @ Korea Univ. Established in 2012 to prepare for North Korea's hacking attack (Inspired by Israel's Talpiot program) ⇒ We produced 30 first graduates in 2016. Joint educational programs with Korea Army (Cyber Command) Full Scholarship over Guaranteed Employment
  • 15. Dept. of Cyber Defense @ Korea Univ. Upon graduation, they are to be commissioned as second lieutenants and must serve in the military for seven years. Accept top 0.4%~0.6% of students in the national college entrance exam.
  • 16. The team led by graduates of our dept. got 2nd place in the CYBERNET 2021 CTF (Netherland, Nov. 15~19)! (1st : Netherland, 2nd : Korea, 3rd : EU combined team, 4th : Norway, 5th : Japan)
  • 17. Other Education Programs NSR’s CSTEC(Cyber Security Training and Exercise Center) KISA’s K-Shield KITRI’s BoB(Best of the Best) Program : Running strong peer-to-peer mentoring style of education. And so far, it has made so may pretty good results.
  • 18. Changes in the Security Environment Ⅰ Entering the era of the 4th Industrial Revolution, cyber security began to be demanded in all areas connected to the Internet. As the importance of cybersecurity spreads across all areas, security experts are forced to have more in-depth domain knowledge than ever before.
  • 19. Changes in the Security Environment Ⅰ For example, in the European Union, the regulations on automotive cybersecurity will be mandatory for all new vehicles produced from July 2024. ⇒ UNECE WP.29 & ISO/SAE 21434
  • 20. Changes in the Security Environment Ⅰ UNECE regulations consist of ⑴ R155 for cyber security and ⑵ R156 for software update. UNECE regulation 155 (Cyber Security) introduce a Cybersecurity Management System (CSMS) in automotive on organization level. : √ Risk management across the entire company and the entire life cycle of each individual vehicle √ Analysis of weak points during the entire development and production process √ Cyber ​​security monitoring and incident response to existing vehicle types
  • 21. Changes in the Security Environment Ⅰ UNECE regulations consist of ⑴ R155 for cyber security and ⑵ R156 for software update. UNECE regulation 156 (SW Updates) introduce a framework for remote updates (over-the-air) with a Software Update Management System (SUMS). : √ Systematic control and compliance with government guidelines √ Establish Software identification management √ Assessment whether a software update (SU) affects type approval and security of vehicle
  • 22.
  • 24.
  • 25. Changes in the Security Environment Ⅰ Also, on April 11th~12th, 2019 International Air Transport Association (IATA) held for the first time, at its Regional Office in Singapore, an Aviation Cyber Security Roundtable (ACSR). Through this, they concluded that it was necessary to cultivate a new generation of individuals and organizations that are able to support in answering the aviation cyber security challenge.
  • 26. Changes in the Security Environment Ⅰ As another example, the U.S. DoD has been developing various policies aimed at hardening the cybersecurity for its weapon systems. ⇒ RMF A&A
  • 27. Changes in the Security Environment Ⅰ (e.g.) Lockheed Martin's CRL Framework for Weapon, Mission, and Training Systems
  • 28. Changes in the Security Environment Ⅱ As cybersecurity is highlighted in all fields, the recruitment of cyber security experts by large companies (such as Samsung, LG, Hyundai/KIA, etc.) is increasing rapidly. As a result, SMEs(Small and Medium-sized Enterprises) are having difficulty in hiring security experts.
  • 29. How to Educate Them? In order to train security experts specialized in each industrial sector, real data in the field is required to grow in-depth domain-knowledge. However, it is difficult for universities to obtain the data generated in the real world. This is particularly serious in the fields of automobiles, aircraft, and weapon systems, etc.
  • 30. How to Educate Them? Need very strong public-private partnership! Universities should teach students to have solid basic knowledge, so that they can quickly acquire practical domain-knowledge taught in the company(or government) after joining that company(or government). In addition, as in Cyber Grand Challenge of DARPA in the United States, efforts should be made to provide a high- quality research platform to academia.
  • 31. Meet Real Patients! (Practical Domain-Knowledge)
  • 32. How to Educate Them? In fact, in the case of our Department of Cyber Defense, we are focusing on preventing students from studying only specific security skills, such as vulnerability analysis. Our curriculum includes the basic and essential major subjects required by the Department of Computer Science. Moreover, cyber security-related subjects are not only focused on hacking, but also cover all subjects necessary for cyber security experts such as cryptography, digital forensics, data security and privacy law, etc.
  • 33. How to Educate Them? However, due to the nature of the department that should not expose students' identities as much as possible, there are limitations in running various internship programs. Moreover, in this pandemic situation, it is more difficult to promote internship programs.
  • 34. How to Motivate Them? Good salary. (-: Even if the current salary is small, it needs to have a clear future vision. In the case of military or government institutions, it is necessary to assign them tasks that are difficult to experience in private companies or tasks that can make them feel patriotic.
  • 35. Thank you for giving me the opportunity to talk at a really fun conference! Let's meet offline at HITCON next year!!
  • 36. Seungjoo Kim Head of Department of Cyber Defense skim71@korea.ac.kr www.KimLab.net www.HackProof.systems Twitter : @skim71