Promoting Research and Application of Information Assurance and Cybersecurity 6th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information Security Officer, State of California Stephanie Dietrich, Manager of Industry Partnerships, CallT2, University of California, San Diego Murray Jennex, Ph.D., Associate Professor, Information and Decision Systems, SDSU Gordon Romney, Ph.D., Professor, Computer Science and Information Technology, National University Cyber Security Research and Education at SDSU Murray E. Jennex, Ph.D., P.E., CISSP, CSSLP San Diego State University 6th Annual The Security Summit Who Am I? Ph.D. from the Claremont Graduate University 20 years experience in commercial nuclear power Professional Engineer, Mechanical Engineering, California Certified Information Systems Security Professional Certified Secure Software Lifecycle Professional Former Navy Nuclear Power Officer Editor in Chief, International Journal of Knowledge Management Co-editor in Chief, International Journal of Information Systems for Crisis Response and Management Risk Assessment Principle Investigator, National Center for Border Security and Immigration Author of over 100 articles, papers, books MBA, MS in Software Engineering, MS in Telecommunications Management, BA in Chemistry and Physics “Cases in Knowledge Management” 2005 “Knowledge Management in Modern Organizations” 2007 “Knowledge Management: Concepts, Methodologies, Tools, and Applications, Volumes I-VI,” 2008 “Current Issues in Knowledge Management,” 2008. “Knowledge Management, Organizational Memory and Transfer Behavior: Global Approaches and Advancements,” 2009 Center for Commercialization of Advanced Technology San Diego State University Security is Part of Several Programs Masters of IS Masters in Accounting Information Systems MBA Masters in Homeland Security Masters of CS IS and CS under graduates have the opportunity to take graduate level security courses IS Courses Supporting Security IDS755, Information Security Management IDS695, Systems Analysis and Design I Covers process analysis Analyzes Systems for security requirements IDS697, Systems Analysis and Design II Covers how to setup a security program Can’t tell the difference between hackers, terrorists, or warfare Covers systems design Covers secure programming and system security design IDS687, Data Communications Network security Future IS Security Curricula Planning on a management specialty in IS Would add 2 more specific IS Security Courses: IS Security Technologies IS Security Operations These would be used with the previous courses Additionally looking at adding a undergraduate security course HS Security Curricula Has a specialty in Information Security using the IS courses Also has courses in: Vulnerability and Threat Assessment Intelligence and Homeland Security Internet Mapping and Distributed GIServices Facilities/Partnerships/Issues Visualization Laboratory Part of the DHS National Center for Border Security Issues Several grants/partnerships with government and industry partners They can work with us and of course own what is produced No real budget (given the budget situation not likely to have any soon) Need more expertise Cyber Security Research Graduate students working with faculty Some grant support, mostly in the HS Program Some areas of research: Risk Monitor Facial Recognition/Biometrics Critical Infrastructure Threat assessment Security Architecture Design and Evaluation Data Fusion for Intelligence Crisis Response Identity Theft/Management Physical security What We Would Do/Like Willing to work on grant proposals with interested partners Willing to partner with anyone who can bring something to the table (we have the students wanting to work) In particular looking for Border Security technologies/partners