Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
CYBER SECURITY ARCHITECTURES AND
Friday, November 7, 2014CenterPoint Energy
Why are a cybersecurity architecture & a security control framework critical components in securing an organization’s information systems?
“It is deeply concerning that major academic, cyber security companies, trade magazines, and journals do not place a greater emphasis on the absolute value of Cyber Security Architectures. A comprehensive and well-structured security architecture that is business requirements focused and tightly integrated into an organization’s Enterprise Architecture will provide the essential technical solution needed to prevent and detect cyber-attacks." -BILL ROSS
Sponsored by:
The Cybersecurity Industry Advisory Seminars are funded in part by the Wagner-Peyser Workforce Development grant led by the BayTech; all sponsors are listed below.
Hosted By:
UHCL- Cyber Security Institute
The Mission of CSI
To raise cybersecurity awareness and to strengthen mitigation against cyber attacks, by engaging in the following activities:
Research and DevelopmentEducationServices
Why is Cybersecurity critical for the Houston region?
The Houston region, a population, manufacturing, transportation and economy center, is among the most vulnerable regions that are prime targets of cyber and other attacks. A successful attack will cause unimaginable disruption and damages to not only the city but also the nation’s and the world’s economy. In order to provide research and education services to strengthen the region's efforts of securing the cyberspace and cyber systems, faculty researchers in the University of Houston - Clear Lake (UHCL) have engaged in educational and research activities related to Cybersecurity for the past decades. UHCL Cyber Security Institute (UHCL-CSI) was established in February 2013. With support from nearby governmental agencies and organizations, the UHCL-CSI is expected to contribute to the positive change of the cyber security landscape in the region.
8:30 to 9:00 AM – Check In and Coffee
9:00AM – Welcome from CenterPoint, Michael W. Phillips, IT Corp. Technology Security Director – CenterPoint Energy
9:10AM - Introduction, Kim Morris, BayTech
9:20AM – “The NIST Cyber Security Framework”, Dr. Andrew Yang – Cyber Security Institute, UHCL
10:10AM – Break
10:30AM – “The Information Security Architect- the Invisible Person”, Bill Ross
11:20AM – Wrap-Up Ernesto F. Rojas, Associate Director of Services – Cyber Security Institute, UHCL
Cyber Security Architectures and Frameworks
Biographies
Andrew Yang: Dr. Yang has served as a college professor in Computer Science since 1993, after earning his Ph.D. in Computer & Information Science from the University of Minnesota. His specialty areas include fundamental computer security, web security, network security, wireless and sensor networks, and computer science education. An experienced curricular developer, he has developed new curricula in cybersecurity and related subject areas. His research work has been sponsored by various agencies, including the National Science Foundation, the Texas Higher Education Coordinating Board, and the Institute of Space Systems Operations.
Bill Ross: Mr. Ross is a retired Air Force Intelligence Officer having served 21 years on active duty. His last job in the Air Force was serving as the Air Force Systems Integration Management Officer for global Air Force Intelligence and Joint interface Systems. Bill transitioned into the private sector in 1997 and has held security architecture, security engineering leadership, and security operations leadership positions in a variety of private and public sector jobs. Highlights of his work in the private sector include managing the effort to deploy the first global security architecture for JP Morgan, building the first operational security program for Barnes and Noble.com, serving as the Federal Reserve Information Technology Vice President for Security Operations, and serving as the Program Security Officer/Senior Security Consultant for building the integrated security program for the State of Virginia.
Follow-up Seminars in the Series
Topic: Cyber Security and Health CareSpeakers: Ross A. Leo, Allison Miller
Date: January 16, 2015, 8:30-11:30AM
Venue: MD Anderson, Fannin Bank Bldg (1020 Holcombe Blvd, Houston, TX)
Nowadays, Health care industry is using mobile devices and applications to record, store and share patient information. Consequently, cyber security professionals have to enhance their protective and defensive approaches to guard this body of information. The speakers will discuss architectural and defensive strategies for effective cyber security and compliance in the Health Care Sector.
Registration link: https://www.eventbrite.com/e/cybersecurity-industry-advisory-seminars-cyber-security-and-health-care-complimentary-registration-tickets-12026085345
Upcoming Certifications
Topic: Network Management and SecurityDate: Feb 6, 2015 to May 30, 2015(Friday & Saturday classes)
Venue: University of Houston-Clear Lake
The Network Management & Security (NMS) certificate is composed of a series of four classes, and each class prepares the trainee for passing an industry-recognized and demanded certification exam. The phased approach covers a single topic group each 4 weeks, respectively: Fundamentals of Information Security, Introduction to Networking Technologies, Cisco Routing and Switching, and Network.
Registration link: http://www.uhcl.edu/sce/csi/nms
Notes
Notes
Notes
Contact
- Visit CSI website at http://www.uhcl.edu/CyberSecurityInstitute to find more
information or to join the CSI Mailing List.
- Join the CSI LinkedIn group at
http://www.linkedin.com/groups/UHCL-Cyber-Security-Institute-CSI-6563184.
- Interested in sponsoring the events? Contact Dr. Andrew Yang ([email protected],
281-283-3835).
UHCL- Cyber Security Institute