Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
proposals led by the Systems Program and Faculty. Current Application Areas of Interest: Cyber-Human-Physical Systems: Human-System Interaction, Human-Centered Planning and Design. Smart, Connected, & Healthy
-
and society. The vision is to make Sweden a role model in secure trustworthy AI by pioneering cyber resilience across the AI lifecycle. The research program focuses on four key themes: Trustworthy and
-
for its rich, open, and interdisciplinary curriculum. Wesleyan University takes the security and privacy of information and resources seriously. Wesleyan University's Information Security program safeguards
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
the parameters of the Family Educational Rights and Privacy Act (FERPA), other applicable regulatory requirements, and professional standards. A qualified faculty member in Cyber Security/Information Assurance
-
knowledge in computer security will be considered an advantage. In addition to the above, there is also a mandatory requirement for English equivalent to English B/6. Specific Requirements Selection In order
-
Technology Services (ITS), providing strategic oversight of digital platforms, infrastructure, cyber security, data and emerging technologies that support teaching, research, staff and student experience and university
-
role model in secure trustworthy AI by pioneering cyber resilience across the AI lifecycle. The research program focuses on four key themes: Trustworthy and Verifiable AI, Runtime Security Assurance
-
/ training Seven (7) or more years of progressively responsible experience in cybersecurity, information security, or IT risk management, including at least three (3) years performing enterprise-level
-
by U.S. News and World. In addition to BS and MS programs, the department also participates in a BAS program in Cyber Security, MS program in Data Analytics Engineering, and a PhD program in