Click here to load reader
Upload
phamduong
View
212
Download
0
Embed Size (px)
Citation preview
Embedding Cyber Security in the Computer Science Curriculum
Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley
Objectives from Session
• To discuss the issue trying to be resolved
• Summary of work so far on integrating Cybersecurity into the Computer Science curriculum in Higher Education programmes
• Provide indication of the next steps in taking the agenda forward
• Engage with regional communities of practice
The Problem • Growing Cybersecurity threat
• Cybersecurity is an economic/societal priority
• Impact on business and industry
• Need for cybersecurity expertise and a skilled workforce to prevent and defend against threats and attacks
• Huge skills gap – 350,000 opening worldwide today
– 2 million posts to be filled by 2020
– 6% of cybersecurity workforce younger than 30
• Upcoming General Data Protection Regulation
Education is Key • Cybersecurity to be embedded in school curriculum • Cybersecurity offered as undergraduate specialism • Cybersecurity as a degree apprenticeship • Cybersecurity embedded in computer science
programmes – This project – Now a measured criteria in BCS accreditation
• Cybersecurity in the business curriculum – phase 2 of project
• Masters programmes in Cybersecurity • CPD for all – board room and all employees
Project CS in CS
• Objective to have cybersecurity as core activity in Computer Science programmes
• Stages – Review
• Look at current position
• Determine requirements – learning outcomes document
• Create materials for sharing
– Encourage • Disseminate
• Roadshows
• BCS criteria
– Support
Review • 2013 review set up by (ISC)2, CPHC and
Cabinet Office
• Number of sessions with range of participants
• Initial review outcomes – Experts/employers thought cybersecurity an obvious
priority
– Industry wanted usable cybersecurity skills but couldn’t articulate further
– Little thought on the security concepts computing science graduates needed
– Course designers and lecturers treated cybersecurity as an optional module
Review Identified Common Objectives
• Planning for the next generation workplace –experts, IT, business and employees
• Equipping upcoming graduates with skills for the digitally-dependent workplace
• Adding the strengths of the academic community to the process
• Focusing on Computing Science programmes
Professional bodies
Education/ Universities
Government
Determine Requirements Defining outcomes
Guidelines for : Curriculum, Apprenticeships, Occupational Standards
Workbased learning/Apprenticeships
Undergraduate University /Higher Learning Apprenticeships
Training
BigTent
BCS, IET, Comptia, Tech Partnership, CPHC – 40
universities
BIS, OCSIA (Cabinet Office) ; GCHQ
(ISC)2; IISP, ISACA, BCS, IET
The journey
2012
Core community of interest
2015/2016
Identified requirements
Motivated champions
Influenced change
2017 -
Resources investment & development
Happy to teach
Community of Practice
Dissemination – where we are • March / April 2016 University Roadshow motivated
strong community of champions – Nine workshops, 66 universities, 115 academics
• Identified importance, hurdles, what’s working (case studies)
• Willingness to get involved • Shared at CPHC Conference in 2016 and HEA STEM
Conference 2016 • “Why cybersecurity matters” webinar October 2016 • Launched “communities of practice” on a regional basis • Share materials – practicals, case studies • Phase 2 Cybersecurity in Business/Management
studies initiative
Support – objectives for 2017 and beyond
• Support the converted
• Win over the unconverted
• Create Community(ies) of Practice (CoP)
• Recruit cybersecurity and CoP champions and leaders
• Accumulate input – Resources, accreditation updates
• Current web resources available – http://cert.isc2.org/isc2-cphc-resources/
Next Steps - Outcomes from this Session
• Plan how you want to include cybersecurity in your Computer Science / Computing curriculum
• Identify what support required in terms of resources /activities would be helpful to you in implementation of cybersecurity
• Consider how you would like to engage with Community of Practice
Questions ?