Presentation is loading. Please wait.

Presentation is loading. Please wait.

Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.

Similar presentations


Presentation on theme: "Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information."— Presentation transcript:

1 Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information Security Officer, State of California Stephanie Dietrich, Manager of Industry Partnerships, CallT2, University of California, San Diego Murray Jennex, Ph.D., Associate Professor, Information and Decision Systems, SDSU Gordon Romney, Ph.D., Professor, Computer Science and Information Technology, National University

2 Cyber Security Research and Education at SDSU Murray E. Jennex, Ph.D., P.E., CISSP, CSSLP San Diego State University 6 th Annual The Security Summit

3 Who Am I? Ph.D. from the Claremont Graduate University MBA, MS in Software Engineering, MS in Telecommunications Management, BA in Chemistry and Physics 20 years experience in commercial nuclear power Professional Engineer, Mechanical Engineering, California Certified Information Systems Security Professional Certified Secure Software Lifecycle Professional Former Navy Nuclear Power Officer Editor in Chief, International Journal of Knowledge Management Co-editor in Chief, International Journal of Information Systems for Crisis Response and Management Risk Assessment Principle Investigator, National Center for Border Security and Immigration Author of over 100 articles, papers, books “Cases in Knowledge Management” 2005 “Knowledge Management in Modern Organizations” 2007 “Knowledge Management: Concepts, Methodologies, Tools, and Applications, Volumes I-VI,” 2008 “Current Issues in Knowledge Management,” 2008. “Knowledge Management, Organizational Memory and Transfer Behavior: Global Approaches and Advancements,” 2009 Center for Commercialization of Advanced Technology San Diego State University

4 Security is Part of Several Programs Masters of IS Masters in Accounting Information Systems MBA Masters in Homeland Security Masters of CS IS and CS under graduates have the opportunity to take graduate level security courses

5 IS Courses Supporting Security IDS755, Information Security Management Covers how to setup a security program Can’t tell the difference between hackers, terrorists, or warfare IDS695, Systems Analysis and Design I Covers process analysis Analyzes Systems for security requirements IDS697, Systems Analysis and Design II Covers systems design Covers secure programming and system security design IDS687, Data Communications Network security

6 Future IS Security Curricula Planning on a management specialty in IS Would add 2 more specific IS Security Courses: IS Security Technologies IS Security Operations These would be used with the previous courses Additionally looking at adding a undergraduate security course

7 HS Security Curricula Has a specialty in Information Security using the IS courses Also has courses in: Vulnerability and Threat Assessment Intelligence and Homeland Security Internet Mapping and Distributed GIServices

8 Facilities/Partnerships/Issues Visualization Laboratory Part of the DHS National Center for Border Security Issues Several grants/partnerships with government and industry partners They can work with us and of course own what is produced No real budget (given the budget situation not likely to have any soon) Need more expertise

9 Cyber Security Research Graduate students working with faculty Some grant support, mostly in the HS Program Some areas of research: Risk Monitor Facial Recognition/Biometrics Critical Infrastructure Threat assessment Security Architecture Design and Evaluation Data Fusion for Intelligence Crisis Response Identity Theft/Management Physical security

10 What We Would Do/Like Willing to work on grant proposals with interested partners Willing to partner with anyone who can bring something to the table (we have the students wanting to work) In particular looking for Border Security technologies/partners


Download ppt "Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information."

Similar presentations


Ads by Google