November 14, 2013 By Dr. Bhavani Thuraisingham 2 min read

The University of Texas at Dallas has identified the development of research and education programs to “make the nation secure” as one of its six strategic goals. In conjunction with the University’s initiative, the Computer Science Department at the University made significant investment in developing the research and education infrastructures for cyber security and information assurance. These include establishing multiple faculty lines as well as initiating efforts to become the NSA/DHS Centers of Excellence in both Information Assurance Education as well as Research. Over the past nine years we have established strong research and education programs in cyber security. Therefore we are most honored and pleased that IBM has recognized our work in awarding us with the 2013 IBM Faculty Award for Cyber Security.

With this IBM award, we will prepare courses in critical cyber security topics such as secure cloud computing and cyber operations. What will be unique about these courses is that we will develop them jointly with IBM. This way we will have access to the vast number of cyber security tools and technologies developed by IBM and our courses will contain not only sound theoretical results but they will also have a strong practical bent. Furthermore, our courses will include both a combination of lectures and laboratory exercises where our students will experiment with the various tools and develop innovative solutions as part of the curriculum. Such an approach will better prepare our students to face the cyber security challenges and develop insightful and practical solutions based on solid foundations.

We thank IBM for giving us this highly prestigious award and look forward to our collaboration.

 

 

 

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today