The University of Texas System, in support of its member institutions, is pursuing a strategic initiative focusing on the future needs of cybersecurity organizations and workforce. The initiative is a convergence of core competencies and capabilities across the UT System's member institutions to build an ecosystem integrating areas of education and training, industry outreach, research, applied technologies, and academic activities mapped to specific economic and educational needs of Texas (public and private sectors). This initiative will be a sustainable, competitive, and transformative force with national and global impact.
Each UT institution is contributing to this field in unique ways. Read more below about their specific activities.
UT Arlington has recently developed a new strategic plan that leverages its expertise and presents opportunities to benefit society in meaningful ways. The "Bold Solutions, Global Impact" strategic plan identifies over-arching themes in the areas of health and the human condition, sustainable urban communities, global environmental impact, and data-driven discovery and knowledge enhancement. As part of the data-driven discovery and knowledge enhancement theme, cybersecurity plays an important role. UT Arlington is poised to grow in this area as cybersecurity has been identified for a strategic hire in the Computer Science and Engineering departments.
The University of Texas at Austin is committed to supporting cybersecurity and identity management education and research.
In 2004, UT Dallas became proactive in cybersecurity education and research by establishing the Cyber Security Research and Education Institute (CSI). Since then, it has grown into one of the leading research organizations in cybersecurity in the world with approximately $26 million in research grants from a variety of federal agencies, as well as about $7 million in grants to create education programs in cybersecurity. Institute members consist of 10 core faculty in the Erik Jonsson School of Engineering and Computer Science and affiliated faculty members from the Naveen Jindal School of Management, the School of Economics, Political and Policy Sciences, the School of Behavioral and Brain Sciences, and the School of Arts and Humanities.
In addition to research in core areas such as data security and privacy, active malware defense, secure cloud computing and security analytics, research is being conducted in risk-based security, economic aspects of security, and cognitive neuroscience aspects of security.
Through the Colleges of Liberal Arts and Engineering, UTEP supports a number of undergraduate and graduate certificates in cyber-security, secure software systems, intelligence, and national security.
In spring 2014, UT San Antonio (UTSA) was named #1 nationally for Cyber Security Programs according to a national survey of certified information technology security professionals conducted for Hewlett-Packard. To further grow these research areas, UTSA has constructed a brand new, state-of-the-art facility that will dedicate nearly 28,000 square feet of space to merge research expertise, joint resources, and equipment in an effort to enhance this portfolio at UTSA, while increasing interdisciplinary collaborations. UTSA is home to the Institute for Cyber Security (ICS), whose researchers bring exceptional expertise in cybersecurity models, architectures, protocols and technologies, and world-class laboratories. The Center for Infrastructure Assurance and Security (CIAS), also located at UTSA, has developed the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.
In complement to the ICS and CIAS, the Center for Education and Research in Information and Infrastructure Security (CERI2S) conducts high impact research in information assurance and security, as well as educates the cybersecurity workforce within the San Antonio area and beyond.
In partnership with industry leaders, UTSA has rapidly established the largest open cloud infrastructure in academia, having recently launched the Open Cloud Institute, an initiative to develop degree programs in cloud computing and big data and foster collaboration with industry, positioning UTSA and San Antonio as world leaders in open cloud technology. By first having built a solid foundation in cybersecurity and then in cloud computing, UTSA has the capability to handle and process large amounts of data in a secure fashion and is now poised to launch into big data analytics, which will be the final component of UTSA's research strength in C3A. Research in data analytics will create paradigms to identify trends and best practices and can bring enormous value to fields such as healthcare, engineering, and finance.
Cybersecurity is a primary strategic objective of the University of Texas at Tyler. Its Department of Computer Science has been approved by the Committee on National Security Systems (CNSS) as meeting the requirements of the CNSS 4011 and CNSS 4012 security standards.
UT Tyler's primary goal is to become the East Texas leader in cybersecurity and information assurance education and research. The main focus will be to help organizations, including healthcare and retail organizations, to protect consumer information. Among the strategic goals are: 1) to become a DHS/NSA National Center of Excellence in Information Assurance Education (CAE); 2) to develop cybersecurity training programs for East Texas businesses; and 3) to develop a funded cybersecurity research center.
The table below shows a snapshot of offerings and competencies at each UT institution in the areas of cyber and cloud security. For more detail on these areas please see the entire Cyber and Cloud Security Catalog. The institution links will take you to the Influuent sites for these initiatives where you can find out more information about featured experts and their research.
|Dedicated Resources||Research Areas||Courses and Programs for Students|
|UT El Paso||✔||✔||✔||✔||✔||✔||✔||✔||✔||✔|
|UT San Antonio||✔||✔||✔||✔||✔||✔||✔||✔||✔||✔|