Minding the Gap for
Computational Sovereignty in
Computational Sovereignty in
Norway and the Nordic’s
Professor Dr. Stewart Kowalski Information Security
Vice Dean of Education
Faculty of Computer and Media Technology Norwegian Information Security Lab (NISlab) Center for Cyber and Information Security
2
Education your Stairway to Heavenly Security
(2016/2017)
PhD in Information Security Cisco Lab &
Cyber range
Information Security Management Group
Bachelor in IT-Operations and Information Security (BITSEC) Master in Information Security (MIS) - Cybersecurity - Forensics - Information Security Management
Experienced Based Master in Information Security (MISEB)
Forensic Lab Biometris Lab
NISLAB STUDY PROGRAMS
100 120 140 160 142 108 Bachelor IT-Operations and Security (BISTSEC – merged Program 2016/17)*
Master Information Security (MIS) *
Experienced Based Master Information Security (MISEB) **
PhD Information Security (PhD-IS)*
0 20 40 60 80 100
BITSEC MIS MISEB PIS
16 22 Number of Students * Status intake 2015 ** 1st /2nd year only (PhD-IS (PhD-IS
Find HIG, NISlab, MTL, CCIS in the School of Athens https://www.youtube.com/watch?v=uOrG6jfBzEU
WHY IS THERE SUCH A GAP
“AS CHANGE IN QUANTITY = CHANGE IN KIND” “COMPUTATION AS A COMMODITY” A NEW GAP
8
PROBLEM 1 CYBER SECURITY AND
COMPUTATIONAL SOVEREIGNTY
Computation and IT Technology research and
development, adoption and implementation is driven to
a large extent by
“hype”
and security and privacy issues
and legal constraints are neither thought about or taught
correctly!
10
PROBLEM 1 CYBER SECURITY AND
COMPUTATIONAL SOVEREIGNTY
Computation and IT Technology research and
development, adoption and implementation is driven to a
large extent by
“hype”
and security and privacy issues and
legal constraints are neither thought about or taught
correctly!
Do you want to buy a parachute? What ??????? We need to make this thing a light asPROBLEM 1
Computer and Media Technology research and development,
adoption and implementation is driven to a large extent by
“hype” and security issue and other constraints are neither
thought about or taught correctly correctly!
http://ca.news.yahoo.com/blogs/good-news/airplane-recovery-parachute-saves-three-lives-connecticut-crash-171749029.html
:
Problem: A GAP in our Society between
Hypothesis: It is Systemic
Security & Privacy Technology and Law?
14
The idea of these lunch seminars is to create an informal setting, where a
topic is presented during the first 15-20 minutes, and where the remaining time is set aside for discussion.
Conceptual Socio-Technical Model of Nordic Executive MBA in
Swedish information security university education begain with the forming of IFIP TC 11 in 1983.
16
DETAILS OF THE FRAMEWORK
Context, geographical/space and time bound "system point" Design/architecture
Theory/model
Process-Store- Communicate- Collect-Display
Technical Aspects Non-Technical Aspects Theory/model
Physical construction
Operational Administrative
Managerial Legal Ethical
Content subject areas
Systemic module
- an epistemological device, - meta-science, and
- criteria for control
20
EXECUTIVE MBA
SECURITY & PRIVACY TECHNOLOGY AND LAW
Business
Technologies and Innovation Legal Informatics
Security and Privacy Management Governance
Public & Private Sectors
24
FUTURE COMMON PROJECTS: EDUCATION
NordSecMob: Dual Degree with Concordia University, Canada (Autumn Bachelor in IT-Operations and Security PhD in Information Security Norwegian MOOC Common Body of Knowledge Cyber Security and
Privacy Nordic Master: InfoSec Mgmt & Privacy (Spring 2017) NordSecMob: Nordic Master in Security & Mobile Computing (Autumn 2016) Master in Information Security Bachelor/Master Information Security Introduction Courses Experience Based Masters Police/Cyber Defense
Security PhD Student Network
– Networking (Security Divas, SWITS, NordSec, NISK) Support students with travel grants
– Finse winter school (FRISC/COINS); Metochi summer school – Ph.D. student seminar (autumn): Ca. 30%-40% of students
plus Swedish/European partner network and invited speaker – Capture the flag team: International visibility of Norwegian
applied IT security
– Increased visibility: Attract more and better candidates for – Increased visibility: Attract more and better candidates for
26
END-TO-END SECURITY RESEARCH AND EDUCATION
Di v isi o ns /Di vis io ns /Sci en c eAn dEn gi ne eri ng T ech no lo g y /D ocu me nts /Co y l
NTNU NISlab CCIS NORSIS http://
w w w .ndia.org /Di v isi o ns eAn dEn gi ne eri ng T ech no lo g y e% 20 ND IA. pd f NORSIS
28