Embedding Cyber Security in the Computer Science Curriculum · Embedding Cyber Security in the...

Preview:

Citation preview

Embedding Cyber Security in the Computer Science Curriculum

Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley

Objectives from Session

• To discuss the issue trying to be resolved

• Summary of work so far on integrating Cybersecurity into the Computer Science curriculum in Higher Education programmes

• Provide indication of the next steps in taking the agenda forward

• Engage with regional communities of practice

The Problem • Growing Cybersecurity threat

• Cybersecurity is an economic/societal priority

• Impact on business and industry

• Need for cybersecurity expertise and a skilled workforce to prevent and defend against threats and attacks

• Huge skills gap – 350,000 opening worldwide today

– 2 million posts to be filled by 2020

– 6% of cybersecurity workforce younger than 30

• Upcoming General Data Protection Regulation

Education is Key • Cybersecurity to be embedded in school curriculum • Cybersecurity offered as undergraduate specialism • Cybersecurity as a degree apprenticeship • Cybersecurity embedded in computer science

programmes – This project – Now a measured criteria in BCS accreditation

• Cybersecurity in the business curriculum – phase 2 of project

• Masters programmes in Cybersecurity • CPD for all – board room and all employees

Project CS in CS

• Objective to have cybersecurity as core activity in Computer Science programmes

• Stages – Review

• Look at current position

• Determine requirements – learning outcomes document

• Create materials for sharing

– Encourage • Disseminate

• Roadshows

• BCS criteria

– Support

Review • 2013 review set up by (ISC)2, CPHC and

Cabinet Office

• Number of sessions with range of participants

• Initial review outcomes – Experts/employers thought cybersecurity an obvious

priority

– Industry wanted usable cybersecurity skills but couldn’t articulate further

– Little thought on the security concepts computing science graduates needed

– Course designers and lecturers treated cybersecurity as an optional module

Review Identified Common Objectives

• Planning for the next generation workplace –experts, IT, business and employees

• Equipping upcoming graduates with skills for the digitally-dependent workplace

• Adding the strengths of the academic community to the process

• Focusing on Computing Science programmes

Professional bodies

Education/ Universities

Government

Determine Requirements Defining outcomes

Guidelines for : Curriculum, Apprenticeships, Occupational Standards

Workbased learning/Apprenticeships

Undergraduate University /Higher Learning Apprenticeships

Training

BigTent

BCS, IET, Comptia, Tech Partnership, CPHC – 40

universities

BIS, OCSIA (Cabinet Office) ; GCHQ

(ISC)2; IISP, ISACA, BCS, IET

The journey

2012

Core community of interest

2015/2016

Identified requirements

Motivated champions

Influenced change

2017 -

Resources investment & development

Happy to teach

Community of Practice

Dissemination – where we are • March / April 2016 University Roadshow motivated

strong community of champions – Nine workshops, 66 universities, 115 academics

• Identified importance, hurdles, what’s working (case studies)

• Willingness to get involved • Shared at CPHC Conference in 2016 and HEA STEM

Conference 2016 • “Why cybersecurity matters” webinar October 2016 • Launched “communities of practice” on a regional basis • Share materials – practicals, case studies • Phase 2 Cybersecurity in Business/Management

studies initiative

Support – objectives for 2017 and beyond

• Support the converted

• Win over the unconverted

• Create Community(ies) of Practice (CoP)

• Recruit cybersecurity and CoP champions and leaders

• Accumulate input – Resources, accreditation updates

• Current web resources available – http://cert.isc2.org/isc2-cphc-resources/

Next Steps - Outcomes from this Session

• Plan how you want to include cybersecurity in your Computer Science / Computing curriculum

• Identify what support required in terms of resources /activities would be helpful to you in implementation of cybersecurity

• Consider how you would like to engage with Community of Practice

Questions ?

Recommended