• Skip to Content

Kelley School of Business Indiana University
  • Undergraduate
    • Why Kelley?
    • Admissions
    • Academics
    • Scholarships
    • Student Life
    • Pre-College
    • Current Students
    • Parents
  • Graduate
    • Full-Time +Flex MBA
    • Kelley Direct Online MBA
    • Online Master's Degrees & Certificates
    • Specialized Masters
    • 3/2 MBA
    • MS in Accounting with Data and Analytics
    • MS in Finance
    • MS in Healthcare Management
    • MS in Information Systems
    • MS in Management
    • Kelley Direct Online EDBA
    • Indianapolis Programs
    • International Programs
  • Faculty, Research & PhD
    • Research & Publications
    • Faculty Directory
    • Departments & Majors
    • Centers & Institutes
    • Courses
    • PhD
  • Executive Education
    • Custom Programs
    • Degree Partnerships
    • Student Resources
    • Case Studies
    • Professional Development
    • Meet Us
  • Recruiters
    • Graduate Career Services
    • Undergraduate Career Services
    • Indianapolis Career Services
    • Alumni Career Resources
    • Corporate & Foundation Relations
    • Indianapolis Corporate & Foundation Relations
  • Alumni
    • Who We Are
    • Get Involved
    • Career & Professional Development
    • Awards
    • Alumni Legacies
    • Events
    • Giving
    • Contact Us
  • About
    • Dean's Welcome
    • Administration
    • Kelley Women
    • School Profile
    • History
    • Visit Bloomington
    • Visit Kelley Indianapolis
    • Contact
    • Directory
    • Social Media Directory
    • Rankings
  • More
    • Centers & Institutes
    • Directory
    • News & Events
    • Give
    • Kelley Store
Professional Development
  • Leadership
    • Developing the Effective Technical Leader
    • Emerging Leadership
    • Executive Communications
    • Frontline Leadership
    • New Manager's Toolkit
    • Organizational Change
  • Management
    • Business Essentials
    • Business of Life Sciences
    • Design Thinking for Business Innovation
    • Digital Teamwork And Business Skills
    • Negotiation Fundamentals
  • AI & Tech
    • AI Agents
    • AI Applications in Marketing
    • AI Project Management
    • AI Strategy for Executives
    • Data Driven Decision-Making
    • Space Cybersecurity
  • Operations
    • Lean Six Sigma Green Belt
    • PMP Exam Prep
    • Project Management
  • Finance
    • Finance for Non-Financial Managers
    • Personal Finance
  • FAQ

Space Cybersecurity Digital Badge

Cybersecurity literacy is becoming increasingly vital to leaders across an array of industries, sectors, and nations. The Kelley Space Cybersecurity Digital Badge is the first program in the United States, and globally, to offer specialized focus on protecting space assets from cyberattacks. Show mastery of space cybersecurity basics and best practices with this 5-week, online space cybersecurity course.

Register now

Why space cybersecurity?

Cyberattacks, ranging from hacktivists to organized crime networks and even nation states, are targeting vulnerable networks and are frequently successful in stealing funds as well as valuable intellectual property.

At the same time, there is a booming demand across both the public and private sectors for practitioners with this training, with more than 700,000 openings nationwide for cybersecurity professionals. There is a particular need for those with an expertise in space cybersecurity given the reliance on space-based infrastructure for everything from weather forecasting and satellite telecommunications to broadband internet.

Since Russia’s cyberattacks on space-based services provided by commercial US space companies during its war on Ukraine, the cybersecurity of space systems has become high on the agenda, spurring discussions at the White House and in Congress, and a $700 million budget request by the Space Force for this purpose alone. At the same time, a fast-growing market has emerged, with demand for professionals and firms.

Participants in the Space Cybersecurity Digital Badge program will gain in-depth understanding of the various cyber threats to space systems as well as techniques, tools, and best practices to address those threats. At the end of the program, participants will have the capability to develop and implement effective strategies for managing cyber risks to space systems.

Upcoming dates

Date: February 10
Price: $3,995
Duration: 5 week course
Delivery: Online sessions Tuesdays from 5 to 7 p.m. ET

Register

Want to learn more?

Fill out the form below to request more information.

Instructors discuss their pioneering space cybersecurity program

In this first-of-its-kind digital badge program for security professionals, you’ll improve your understanding of space-based infrastructure and gain an in-depth understanding of space cybersecurity roles.

Description of the video:

WEBVTT 1 00:00:00.000 --> 00:00:01.100 2 00:00:01.100 --> 00:00:02.760 Welcome, everybody. 3 00:00:02.760 --> 00:00:04.400 Thanks so much for joining. 4 00:00:04.400 --> 00:00:08.060 Today we're going to be talking about the Space Cybersecurity 5 00:00:08.060 --> 00:00:11.220 Digital Badge program here at the Kelley School of Business. 6 00:00:11.220 --> 00:00:12.290 I'm Scott Shackelford. 7 00:00:12.290 --> 00:00:14.930 I'm a professor here at Kelley, where I also 8 00:00:14.930 --> 00:00:17.000 have the honor of serving in several other roles 9 00:00:17.000 --> 00:00:18.750 that I'll say more about in just a moment. 10 00:00:18.750 --> 00:00:22.130 And I'm joined today by Eytan Tepper. 11 00:00:22.130 --> 00:00:23.420 Hello. 12 00:00:23.420 --> 00:00:25.340 I'm Eytan Tepper. 13 00:00:25.340 --> 00:00:28.520 I'm a director of the Space Governance 14 00:00:28.520 --> 00:00:32.540 Lab at Indiana University. 15 00:00:32.540 --> 00:00:36.060 And together we have facilitated this program. 16 00:00:36.060 --> 00:00:38.640 So we'll talk a little bit about the program itself, 17 00:00:38.640 --> 00:00:41.630 fill in some of the blank spaces around who we are 18 00:00:41.630 --> 00:00:43.483 and what got us interested in these topics, 19 00:00:43.483 --> 00:00:44.900 and then give you more information 20 00:00:44.900 --> 00:00:46.330 about the program from there. 21 00:00:46.330 --> 00:01:00.260 22 00:01:00.260 --> 00:01:01.020 Excellent. 23 00:01:01.020 --> 00:01:03.210 Can we advance the slide, Eytan? 24 00:01:03.210 --> 00:01:03.910 There we go. 25 00:01:03.910 --> 00:01:04.410 Excellent. 26 00:01:04.410 --> 00:01:06.210 Thank you so much. 27 00:01:06.210 --> 00:01:11.700 So space governance is a really interesting 28 00:01:11.700 --> 00:01:14.130 and quickly developing field, and there's 29 00:01:14.130 --> 00:01:15.580 a lot going on in it. 30 00:01:15.580 --> 00:01:18.390 So I'm not going to attempt to do justice to all facets 31 00:01:18.390 --> 00:01:22.170 right now, but I wanted to give just a really brief once-over 32 00:01:22.170 --> 00:01:24.010 of how we got to this point. 33 00:01:24.010 --> 00:01:27.870 Space governance has been an interest of mine 34 00:01:27.870 --> 00:01:29.380 now for more than 20 years. 35 00:01:29.380 --> 00:01:33.580 I got interested way back when I was in undergrad here at IU, 36 00:01:33.580 --> 00:01:35.910 when the NASA Vision for Space Exploration 37 00:01:35.910 --> 00:01:39.600 was being developed after the Columbia space shuttle disaster. 38 00:01:39.600 --> 00:01:42.322 At the Ostrom Workshop, which has been around now 39 00:01:42.322 --> 00:01:44.280 for more than 50 years, and I'll say more about 40 00:01:44.280 --> 00:01:48.240 that in just a moment, space governance is a newer interest. 41 00:01:48.240 --> 00:01:50.730 But in a lot of ways, there's parallels 42 00:01:50.730 --> 00:01:53.710 with other aspects of our work on the commons, 43 00:01:53.710 --> 00:01:55.500 including the global commons, thinking 44 00:01:55.500 --> 00:01:59.700 about the atmosphere, the deep sea bed, Antarctica climate, 45 00:01:59.700 --> 00:02:03.170 cybersecurity, and now, of course, space as well. 46 00:02:03.170 --> 00:02:06.020 We launched the Space Governance Lab-- 47 00:02:06.020 --> 00:02:07.990 again, lots of bad puns throughout this, 48 00:02:07.990 --> 00:02:11.440 with apologies-- with support from the Carnegie Corporation, 49 00:02:11.440 --> 00:02:14.045 a number of years ago now, in 2022, 50 00:02:14.045 --> 00:02:15.670 and we thank Carnegie for their support 51 00:02:15.670 --> 00:02:19.810 to make that happen, with a number of pioneering projects, 52 00:02:19.810 --> 00:02:23.530 tracking the growth of different institutions 53 00:02:23.530 --> 00:02:26.080 related to space governance, mapping out 54 00:02:26.080 --> 00:02:28.570 some of the major epicenters, some of those norm 55 00:02:28.570 --> 00:02:32.680 entrepreneurs, and trying to establish some best 56 00:02:32.680 --> 00:02:37.060 practices for governance of this new and final frontier. 57 00:02:37.060 --> 00:02:39.830 That has led to a variety of publications, 58 00:02:39.830 --> 00:02:43.600 as you can see there, including a brand-new project that we're 59 00:02:43.600 --> 00:02:48.160 doing with the US Air Force Office of Scientific Research, 60 00:02:48.160 --> 00:02:51.020 on an integrated theory of space-cyber power. 61 00:02:51.020 --> 00:02:54.520 This is going to be ultimately leading to a book 62 00:02:54.520 --> 00:02:57.220 that we hope is going to be published-- it looks looking 63 00:02:57.220 --> 00:02:59.290 quite good so far-- with Cambridge University 64 00:02:59.290 --> 00:03:01.670 Press a little over a year and a half from now, 65 00:03:01.670 --> 00:03:04.090 and it will be the first book to really weave together 66 00:03:04.090 --> 00:03:07.000 these fields of space, cybersecurity, 67 00:03:07.000 --> 00:03:10.120 and, frankly, grand strategy, since national security is 68 00:03:10.120 --> 00:03:12.700 at the forefront for how we're thinking 69 00:03:12.700 --> 00:03:15.910 about the development of this frontier and, frankly, the role 70 00:03:15.910 --> 00:03:18.610 of the private sector within it, since oftentimes 71 00:03:18.610 --> 00:03:21.550 that infrastructure is in the crosshairs of foreign nation 72 00:03:21.550 --> 00:03:22.625 states. 73 00:03:22.625 --> 00:03:25.000 Anything else you'd like to say about that so far, Eytan? 74 00:03:25.000 --> 00:03:26.320 Is that OK? 75 00:03:26.320 --> 00:03:27.120 No, that's OK. 76 00:03:27.120 --> 00:03:27.890 [INAUDIBLE] 77 00:03:27.890 --> 00:03:28.390 Excellent. 78 00:03:28.390 --> 00:03:29.740 OK, great. 79 00:03:29.740 --> 00:03:33.590 Just a little bit more about why we're here and what we do. 80 00:03:33.590 --> 00:03:35.890 So one of the hats that I currently wear 81 00:03:35.890 --> 00:03:39.440 is I'm the executive director of the Ostrom Workshop here at IU. 82 00:03:39.440 --> 00:03:42.010 It's been around for more than 50 years now 83 00:03:42.010 --> 00:03:45.370 and has been an epicenter of governance research 84 00:03:45.370 --> 00:03:46.400 for that time. 85 00:03:46.400 --> 00:03:49.360 Lin Ostrom, the first woman to win the Nobel Prize in economics 86 00:03:49.360 --> 00:03:52.630 back in 2009, is famous for her work 87 00:03:52.630 --> 00:03:55.690 on how we can do a better job of managing 88 00:03:55.690 --> 00:03:58.090 global collective action challenges really 89 00:03:58.090 --> 00:03:59.600 from the ground up. 90 00:03:59.600 --> 00:04:04.000 She began her work focused primarily on local common pool 91 00:04:04.000 --> 00:04:06.980 resources, things like fisheries and forests, 92 00:04:06.980 --> 00:04:10.180 and found, among other things, ways in which these communities 93 00:04:10.180 --> 00:04:12.220 can come together and self-organize 94 00:04:12.220 --> 00:04:15.580 to address their challenges without the need to necessarily 95 00:04:15.580 --> 00:04:19.940 privatize a resource or have big brother in the form of the state 96 00:04:19.940 --> 00:04:21.850 stepping in to nationalize it. 97 00:04:21.850 --> 00:04:23.060 Doesn't always work. 98 00:04:23.060 --> 00:04:24.680 Certain conditions have to be met. 99 00:04:24.680 --> 00:04:27.650 But we're applying some of those insights, 100 00:04:27.650 --> 00:04:31.450 along with the bigger literature on what's called polycentric 101 00:04:31.450 --> 00:04:33.940 governance-- so that's broadly how you get different levels 102 00:04:33.940 --> 00:04:36.940 of authority to work well together on a common topic-- 103 00:04:36.940 --> 00:04:39.330 to this new field of space, though we 104 00:04:39.330 --> 00:04:41.930 have a lot of other tech governance work going on, 105 00:04:41.930 --> 00:04:45.020 including in cybersecurity and internet governance, 106 00:04:45.020 --> 00:04:48.250 as well as managing misinformation, disinformation, 107 00:04:48.250 --> 00:04:49.940 AI governance, more broadly. 108 00:04:49.940 --> 00:04:52.060 So if you're interested in getting more involved 109 00:04:52.060 --> 00:04:53.560 in the Ostrom Workshop, we encourage 110 00:04:53.560 --> 00:04:56.470 you to join our space governance working group or other working 111 00:04:56.470 --> 00:04:58.270 groups that might be of interest by going 112 00:04:58.270 --> 00:05:02.000 to OstromWorkshop.Indiana or just sending Eytan 113 00:05:02.000 --> 00:05:06.470 or I a note after you view this recording. 114 00:05:06.470 --> 00:05:10.250 I am also the director of IU's Center for Applied Cybersecurity 115 00:05:10.250 --> 00:05:10.980 Research. 116 00:05:10.980 --> 00:05:13.400 This is a center that's been around for more than 20 years 117 00:05:13.400 --> 00:05:16.760 now and is focused on the issue of securing 118 00:05:16.760 --> 00:05:18.300 critical infrastructure. 119 00:05:18.300 --> 00:05:21.680 And like the workshop, it does that in a very interdisciplinary 120 00:05:21.680 --> 00:05:25.400 fashion, where we bring together researchers and practitioners 121 00:05:25.400 --> 00:05:27.920 and staff from a variety of disciplines 122 00:05:27.920 --> 00:05:31.310 and try to find novel ways for dealing 123 00:05:31.310 --> 00:05:33.290 with some of the most vexing challenges 124 00:05:33.290 --> 00:05:34.320 that we're all facing. 125 00:05:34.320 --> 00:05:36.920 That's applied in the research infrastructure context 126 00:05:36.920 --> 00:05:39.200 with the big National Science Foundation program 127 00:05:39.200 --> 00:05:40.500 called Trusted CI. 128 00:05:40.500 --> 00:05:43.050 But we also do a lot of work really from the ground up, 129 00:05:43.050 --> 00:05:46.380 helping local governments with their cybersecurity challenges, 130 00:05:46.380 --> 00:05:49.520 such as a project called Cybertrack with Purdue 131 00:05:49.520 --> 00:05:51.570 and the Indiana Office of Technology. 132 00:05:51.570 --> 00:05:54.140 And we're working a lot right now as well with the Department 133 00:05:54.140 --> 00:05:56.340 of Defense and the Army Cyber Institute 134 00:05:56.340 --> 00:05:58.700 on the issue of securing smart cities 135 00:05:58.700 --> 00:06:02.100 and how we can do a better job of securing vulnerable, critical 136 00:06:02.100 --> 00:06:05.400 infrastructure on the civilian side, especially when it's being 137 00:06:05.400 --> 00:06:07.360 fed into defense networks. 138 00:06:07.360 --> 00:06:09.540 So we have a monthly speaker series and lots of ways 139 00:06:09.540 --> 00:06:11.283 to get involved with CACR. 140 00:06:11.283 --> 00:06:15.270 141 00:06:15.270 --> 00:06:17.375 Yeah, maybe I can say a couple of notes-- 142 00:06:17.375 --> 00:06:19.950 [INAUDIBLE] 143 00:06:19.950 --> 00:06:22.710 --about space and cybersecurity. 144 00:06:22.710 --> 00:06:28.500 So generally, by now, we are very much reliant 145 00:06:28.500 --> 00:06:35.790 on space-based infrastructure, and the reliance 146 00:06:35.790 --> 00:06:39.180 is both from the military aspects 147 00:06:39.180 --> 00:06:43.230 and from civilian aspects. 148 00:06:43.230 --> 00:06:45.540 There are satellites, communications 149 00:06:45.540 --> 00:06:53.100 that provide us all sorts of services, notably communication 150 00:06:53.100 --> 00:06:58.410 and positioning, navigation and timing, et cetera. 151 00:06:58.410 --> 00:07:04.950 And the military is very much reliant 152 00:07:04.950 --> 00:07:08.860 on the satellites for intelligence, for navigation, 153 00:07:08.860 --> 00:07:14.850 but also for the many guided weapon systems. 154 00:07:14.850 --> 00:07:21.570 Our economy is dependent on the satellites 155 00:07:21.570 --> 00:07:25.470 that are used by the banking, all the payment systems. 156 00:07:25.470 --> 00:07:29.610 And also each one of us personally 157 00:07:29.610 --> 00:07:32.490 are using satellites every day when 158 00:07:32.490 --> 00:07:38.040 we are navigating to the cinema or even 159 00:07:38.040 --> 00:07:42.000 every time that we are paying with a credit card. 160 00:07:42.000 --> 00:07:46.140 So the result is that space-based infrastructure 161 00:07:46.140 --> 00:07:51.120 is now a critical infrastructure for us. 162 00:07:51.120 --> 00:07:58.950 And the scenarios of a day without space, 163 00:07:58.950 --> 00:08:03.250 and you can google that, are not so good. 164 00:08:03.250 --> 00:08:06.380 The economy can come to a standstill. 165 00:08:06.380 --> 00:08:09.230 The military will be crippled. 166 00:08:09.230 --> 00:08:15.850 There is a quotation here about how the Marines are addicted 167 00:08:15.850 --> 00:08:17.913 to their space-based systems. 168 00:08:17.913 --> 00:08:22.000 169 00:08:22.000 --> 00:08:27.790 So if it is a critical systems for us, 170 00:08:27.790 --> 00:08:32.306 it also means that it is a prime target for our adversaries. 171 00:08:32.306 --> 00:08:35.080 172 00:08:35.080 --> 00:08:44.380 Now, there are two main ways to disrupt or even destroy 173 00:08:44.380 --> 00:08:45.700 our satellites. 174 00:08:45.700 --> 00:08:47.510 One is a kinetic attack. 175 00:08:47.510 --> 00:08:52.780 It's basically to launch an anti-satellite missile 176 00:08:52.780 --> 00:08:57.040 and blow up the satellite. 177 00:08:57.040 --> 00:09:02.480 So far, we have seen four countries that successfully test 178 00:09:02.480 --> 00:09:04.850 anti-satellite missiles-- 179 00:09:04.850 --> 00:09:07.560 US, Russia, China, and India. 180 00:09:07.560 --> 00:09:12.480 Each time they demonstrated, you launch a missile from Earth, 181 00:09:12.480 --> 00:09:16.290 it completely obliterates the satellite. 182 00:09:16.290 --> 00:09:20.330 But this method is problematic. 183 00:09:20.330 --> 00:09:24.420 There is a high technological and financial barrier. 184 00:09:24.420 --> 00:09:31.610 This is why only the very few leading powers can do that. 185 00:09:31.610 --> 00:09:38.420 It also exposes the attacker and escalates the hostilities. 186 00:09:38.420 --> 00:09:44.990 Another option to disrupt the adversary's satellite 187 00:09:44.990 --> 00:09:46.890 is by a cyberattack. 188 00:09:46.890 --> 00:09:52.340 And it is so much more efficient in many ways. 189 00:09:52.340 --> 00:09:59.390 It is an asymmetric weapon, low technological and financial 190 00:09:59.390 --> 00:10:03.500 barrier, which means that it is the weapon of the weak 191 00:10:03.500 --> 00:10:08.010 and the poor-- not just, but also of the weak and the poor. 192 00:10:08.010 --> 00:10:11.790 So you don't need to be a superpower in order to do that. 193 00:10:11.790 --> 00:10:15.840 It causes maximum damage with minimal cost. 194 00:10:15.840 --> 00:10:21.090 And you can also cover your track and deny culpability, 195 00:10:21.090 --> 00:10:23.670 and it is less escalatory. 196 00:10:23.670 --> 00:10:30.150 And the best example of that is that Russia, 197 00:10:30.150 --> 00:10:34.250 on the eve of its invasion to Ukraine, 198 00:10:34.250 --> 00:10:37.190 launched a cyberattack to disrupt 199 00:10:37.190 --> 00:10:40.070 the services of the Viasat, which 200 00:10:40.070 --> 00:10:45.200 is an American commercial space company that provided services 201 00:10:45.200 --> 00:10:48.600 to Ukraine government and military. 202 00:10:48.600 --> 00:10:52.140 Russia could have done it by an anti-satellite missile. 203 00:10:52.140 --> 00:10:57.080 They have the capability, but they chose a cyberattack. 204 00:10:57.080 --> 00:11:00.170 They didn't take responsibility for the attack, 205 00:11:00.170 --> 00:11:05.310 and the US didn't respond directly. 206 00:11:05.310 --> 00:11:11.620 This just demonstrates the advantages of a cyberattack, 207 00:11:11.620 --> 00:11:18.780 and that this is going to be the main mode of space warfare. 208 00:11:18.780 --> 00:11:26.040 More generally, we can say that a combined space cyber warfare 209 00:11:26.040 --> 00:11:29.370 theatre is emerging to become the primary battlefield 210 00:11:29.370 --> 00:11:37.860 in the 21st century and the main mode of a space warfare. 211 00:11:37.860 --> 00:11:47.940 So why choose the field of space cybersecurity? 212 00:11:47.940 --> 00:11:54.570 So as we mentioned before, space-based infrastructure 213 00:11:54.570 --> 00:11:58.020 is now critical. 214 00:11:58.020 --> 00:12:07.860 It is vulnerable to cyberattack, which already happened. 215 00:12:07.860 --> 00:12:14.940 And as a result of this attack, all the companies 216 00:12:14.940 --> 00:12:19.290 are by now aware of the risk, but they 217 00:12:19.290 --> 00:12:24.240 are lacking skilled personnel to address it. 218 00:12:24.240 --> 00:12:28.830 Moreover, there are not even a training program 219 00:12:28.830 --> 00:12:31.990 to train personnel for this field, 220 00:12:31.990 --> 00:12:38.760 and this is why IU launched this pioneering program 221 00:12:38.760 --> 00:12:43.470 about space cybersecurity. 222 00:12:43.470 --> 00:12:46.410 Scott, do you want to take it from here? 223 00:12:46.410 --> 00:12:47.140 Oh, sure. 224 00:12:47.140 --> 00:12:48.780 No, happy to. 225 00:12:48.780 --> 00:12:52.380 So this is a quickly developing field 226 00:12:52.380 --> 00:12:54.610 with just a tremendous amount of opportunity 227 00:12:54.610 --> 00:12:58.560 and, as Eytan was saying, very, very few skilled folks who 228 00:12:58.560 --> 00:13:02.650 are able to navigate at that intersection of cybersecurity 229 00:13:02.650 --> 00:13:05.620 and space situational awareness. 230 00:13:05.620 --> 00:13:09.520 So because of that lack of, frankly, talent, 231 00:13:09.520 --> 00:13:12.130 that is making it quite challenging for firms 232 00:13:12.130 --> 00:13:15.730 to both fill existing roles and to think more strategically 233 00:13:15.730 --> 00:13:18.640 about, frankly, the opportunities and the costs 234 00:13:18.640 --> 00:13:22.940 of functioning in this domain as well as, frankly, 235 00:13:22.940 --> 00:13:24.260 in the M&A context. 236 00:13:24.260 --> 00:13:28.580 So geopolitically, this is also a challenging moment. 237 00:13:28.580 --> 00:13:30.400 There's a lot going on, which means 238 00:13:30.400 --> 00:13:33.290 there's a lot of adversaries, both nation states 239 00:13:33.290 --> 00:13:36.250 as well as cybercrime and terrorist organizations, 240 00:13:36.250 --> 00:13:38.370 that are interested in targeting these assets, 241 00:13:38.370 --> 00:13:39.495 as Eytan mentioned as well. 242 00:13:39.495 --> 00:13:41.870 243 00:13:41.870 --> 00:13:42.370 Yeah. 244 00:13:42.370 --> 00:13:48.460 And we can say that now there is already 245 00:13:48.460 --> 00:13:56.560 a market for space cybersecurity firms and experts. 246 00:13:56.560 --> 00:14:02.810 The market is relatively new, which means that possibly there 247 00:14:02.810 --> 00:14:08.060 is more demand and supply. 248 00:14:08.060 --> 00:14:13.690 And the figures that you see here are probably bigger now. 249 00:14:13.690 --> 00:14:14.190 Mhm. 250 00:14:14.190 --> 00:14:21.860 251 00:14:21.860 --> 00:14:29.240 So the program leads are Scott and myself. 252 00:14:29.240 --> 00:14:33.620 We already introduced ourselves, but we can also 253 00:14:33.620 --> 00:14:40.460 say a few words about guest lecturers. 254 00:14:40.460 --> 00:14:49.430 So our aim is to bring to the participants the best knowledge 255 00:14:49.430 --> 00:14:53.300 and also to expose them to perspective of all the sectors, 256 00:14:53.300 --> 00:14:57.680 from the government, from the military, commercial companies, 257 00:14:57.680 --> 00:15:00.300 and also nonprofit. 258 00:15:00.300 --> 00:15:06.710 So we brought together an excellent team 259 00:15:06.710 --> 00:15:16.130 that includes Scott Nelson from the US Cyber Command, Michael 260 00:15:16.130 --> 00:15:24.770 Campanelli, who is the lead on space cybersecurity with Amazon. 261 00:15:24.770 --> 00:15:30.860 We have Nick Saunders, which is the chief cybersecurity 262 00:15:30.860 --> 00:15:35.090 officer at Viasat, the same company 263 00:15:35.090 --> 00:15:39.900 that I mentioned before who was attacked by Russia. 264 00:15:39.900 --> 00:15:45.830 We also have Erin Miller, the executive director of the Space 265 00:15:45.830 --> 00:15:49.340 ISAC, which is a key organization that 266 00:15:49.340 --> 00:15:52.500 connects all the actors in the government, 267 00:15:52.500 --> 00:15:58.620 in the private sector, and in the defense establishment. 268 00:15:58.620 --> 00:16:01.470 We have also Brandon Bailey, which 269 00:16:01.470 --> 00:16:07.360 is one of the nation's best experts on space cybersecurity. 270 00:16:07.360 --> 00:16:13.230 He is doing it for many years, and he is really a go-to person 271 00:16:13.230 --> 00:16:16.200 on anything in this topic. 272 00:16:16.200 --> 00:16:22.030 We have also Henry Danielson, who is, on the one hand, 273 00:16:22.030 --> 00:16:25.080 a professor at Cal Poly, but he also 274 00:16:25.080 --> 00:16:28.200 leads the Aerospace Village at DEFCON, 275 00:16:28.200 --> 00:16:35.640 for those of you who know DEFCON, and also Professor 276 00:16:35.640 --> 00:16:39.246 Falco from Cornell University. 277 00:16:39.246 --> 00:16:41.940 278 00:16:41.940 --> 00:16:42.480 Scott? 279 00:16:42.480 --> 00:16:44.340 Mhm. 280 00:16:44.340 --> 00:16:45.190 Absolutely. 281 00:16:45.190 --> 00:16:49.180 So we've had three cohorts of this program so far. 282 00:16:49.180 --> 00:16:52.770 And thanks especially to Microsoft for helping us 283 00:16:52.770 --> 00:16:56.130 get this off the ground with some seed funding, which 284 00:16:56.130 --> 00:16:59.010 has also allowed us to offer scholarships to students not 285 00:16:59.010 --> 00:17:01.200 only here at IU to participate, but also 286 00:17:01.200 --> 00:17:03.340 at other community colleges. 287 00:17:03.340 --> 00:17:06.010 Since then, we've been honored to receive additional support 288 00:17:06.010 --> 00:17:08.349 from the National Science Foundation and then 289 00:17:08.349 --> 00:17:11.750 most recently, as we said, the US Air Force. 290 00:17:11.750 --> 00:17:15.099 The program itself builds from the expertise 291 00:17:15.099 --> 00:17:20.650 of not only Eytan and myself but these amazing cadre of industry 292 00:17:20.650 --> 00:17:23.260 guest speakers who can really dig 293 00:17:23.260 --> 00:17:26.810 into the front lines, cutting-edge issues of space 294 00:17:26.810 --> 00:17:29.193 cybersecurity, and, frankly, bring war stories to bear. 295 00:17:29.193 --> 00:17:30.610 Because in a lot of cases, they've 296 00:17:30.610 --> 00:17:33.560 had to deal with them, whether it's Viasat or you name it. 297 00:17:33.560 --> 00:17:36.260 The mix we try to strike, as you see up there, 298 00:17:36.260 --> 00:17:39.050 is not too dominant in one field or another. 299 00:17:39.050 --> 00:17:41.710 Certainly law, policy, discussions 300 00:17:41.710 --> 00:17:44.440 of governance kind of pervade a lot of these topics 301 00:17:44.440 --> 00:17:47.170 because they're quite thorny, especially right now, given 302 00:17:47.170 --> 00:17:49.570 how fractured things are geopolitically. 303 00:17:49.570 --> 00:17:53.440 But also, we really try to frame that out by advertising 304 00:17:53.440 --> 00:17:55.750 and really trying to dig into some of the advances 305 00:17:55.750 --> 00:17:58.510 we've seen on the technical side of the ledger. 306 00:17:58.510 --> 00:18:00.850 And that, of course, includes some work 307 00:18:00.850 --> 00:18:04.420 on space cybersecurity-specific standards and frameworks 308 00:18:04.420 --> 00:18:06.910 that we highlight throughout the course, too. 309 00:18:06.910 --> 00:18:08.000 It's online. 310 00:18:08.000 --> 00:18:10.550 We meet once a week, synchronously. 311 00:18:10.550 --> 00:18:15.610 And from there, we have tried to build out 312 00:18:15.610 --> 00:18:18.950 this program with these other institutions in mind. 313 00:18:18.950 --> 00:18:21.290 So it's a very dynamic process. 314 00:18:21.290 --> 00:18:23.620 There's going to be new topics, such as in supply chain 315 00:18:23.620 --> 00:18:25.610 security, happening all the time. 316 00:18:25.610 --> 00:18:30.160 Successful adherence to this program, 317 00:18:30.160 --> 00:18:32.080 will make it all the way through to the end, 318 00:18:32.080 --> 00:18:34.300 are able then to earn a badge, which 319 00:18:34.300 --> 00:18:39.100 they can add into a certificate program, such as the certificate 320 00:18:39.100 --> 00:18:41.510 in cybersecurity management here at Kelley 321 00:18:41.510 --> 00:18:44.170 and then, ultimately, the master's degree 322 00:18:44.170 --> 00:18:47.590 as well in cybersecurity risk management. 323 00:18:47.590 --> 00:18:49.840 We do provide students with an opportunity 324 00:18:49.840 --> 00:18:53.890 either to show what they have learned through completion 325 00:18:53.890 --> 00:18:59.840 of a quiz or an aerospace-themed cyberattack postmortem, 326 00:18:59.840 --> 00:19:02.700 where you can dig into an actual breach at an aerospace 327 00:19:02.700 --> 00:19:05.370 organization, public or private sector, 328 00:19:05.370 --> 00:19:08.638 and in particular focus on what happened: 329 00:19:08.638 --> 00:19:10.680 How did the organization respond, what could they 330 00:19:10.680 --> 00:19:13.290 have done better, and what were the lasting results 331 00:19:13.290 --> 00:19:16.980 of regulation or litigation or other actions in the aftermath 332 00:19:16.980 --> 00:19:17.560 of that? 333 00:19:17.560 --> 00:19:19.480 And as I mentioned, you see the results. 334 00:19:19.480 --> 00:19:22.440 You get a digital badge that you can put on LinkedIn 335 00:19:22.440 --> 00:19:26.740 and otherwise earn academic credit toward our certificate 336 00:19:26.740 --> 00:19:29.790 and, if you're interested, the full MS in cybersecurity 337 00:19:29.790 --> 00:19:33.820 and have access to a number of internship opportunities, 338 00:19:33.820 --> 00:19:36.030 including with the organizations that we 339 00:19:36.030 --> 00:19:38.612 partner with in this offering. 340 00:19:38.612 --> 00:19:39.570 What did I miss, Eytan? 341 00:19:39.570 --> 00:19:43.860 342 00:19:43.860 --> 00:19:45.990 I think we can share with them. 343 00:19:45.990 --> 00:19:50.580 So you already mentioned that there 344 00:19:50.580 --> 00:19:55.120 are parts about law, policy, and compliance, 345 00:19:55.120 --> 00:19:59.220 and there is the more technical part or the parts 346 00:19:59.220 --> 00:20:03.000 about cybersecurity risk management 347 00:20:03.000 --> 00:20:11.150 and maybe it is worth sharing one of the testimonials 348 00:20:11.150 --> 00:20:14.310 from Mahesa from the Space Force. 349 00:20:14.310 --> 00:20:15.172 Mhm. 350 00:20:15.172 --> 00:20:17.330 Mhm. 351 00:20:17.330 --> 00:20:24.260 But generally, I think we covered it all. 352 00:20:24.260 --> 00:20:25.130 Absolutely. 353 00:20:25.130 --> 00:20:28.310 And we've been really, really appreciative of that partnership 354 00:20:28.310 --> 00:20:31.940 with the US Space Force has had a number of those folks come 355 00:20:31.940 --> 00:20:33.090 through now as well. 356 00:20:33.090 --> 00:20:37.610 So as you see, please do get in touch with any questions 357 00:20:37.610 --> 00:20:40.010 that you might have as you consider whether to sign up 358 00:20:40.010 --> 00:20:40.787 for this program. 359 00:20:40.787 --> 00:20:41.870 We're happy to field them. 360 00:20:41.870 --> 00:20:44.140 And we hope you join us in the next cohort. 361 00:20:44.140 --> 00:20:47.660 362 00:20:47.660 --> 00:20:52.700 So we'll see you in the next cohort or in outer space. 363 00:20:52.700 --> 00:20:54.950 Whichever comes first. 364 00:20:54.950 --> 00:20:57.860 Thank you. 365 00:20:57.860 --> 00:20:59.880 It would be fun to do this from outer space. 366 00:20:59.880 --> 00:21:01.810 I completely agree. 367 00:21:01.810 --> 00:21:03.000

Showcase your new skills

space-cybersecurity-badge

Upon completing this program, you will earn a digital badge to showcase your skills on your resume, LinkedIn profile, and other sites as verifiable evidence to your network of the concrete and in-demand skills you gained from participating in this Kelley program.

“As an active-duty service member, I found this course to be critical in understanding the cybersecurity challenges that we face with our space systems. I gained a deeper understanding of the space-cyber nexus and was able to immediately apply the skills I learned at work.”

Major Mahesa B. SuproboCyber Test Project Officer, United States Space Force

Learning objectives

After successfully completing this digital badge program, participants will:

    • Understand the unique cybersecurity challenges of space systems
    • Know the various types of cyber vulnerabilities of space systems
    • Be acquainted with the various policies, standards, and best practices for cybersecurity of space systems
    • Be prepared to manage the multifaceted cyber threats facing space organizations
    • Have a firm introduction to international and US space cybersecurity law and policy
    • Realize the contours of important cybersecurity debates, such as cyberattacks as a casus bello (justification for war), and the appropriate role of government in safeguarding space as critical infrastructure
    • Understand the technical, supply chain, and geopolitical challenges associated with space cybersecurity
    • Develop the confidence necessary to work collaboratively on interdisciplinary space cybersecurity solutions

Curriculum

This 5-week program consists of a 60-minute live virtual session and one to two hours of asynchronous work each week. Each course will be independently taught by an expert on the topic coming from the industry, government, military, or nonprofit sector in conjunction with program leads. Topics include:

  1. Introduction to Space Cybersecurity
  2. Law and Policy of Space Cybersecurity
  3. Compliance: Frameworks and Standards
  4. Designing and Implementing a Mitigation Strategy & Secure by Design
  5. Threat Identification
  6. Space Attack Research and Tactic Analysis (SPARTA)
  7. Verification & Validation (including Risk Analysis)
  8. Business Continuity, Mission Assurance, and Redundancy
  9. Space Systems Security & SOC
  10. Cross-Sector Collaboration on Space Cybersecurity: Government, Military, Industry, Academia

After successful completion of an assurance of learning (assessment) at the conclusion of the program, participants may earn 3 credit hours toward the 12 credit hour Kelley School of Business Cybersecurity Management Graduate Certificate. The Cybersecurity Management Graduate Certificate may, in turn, be applied to the IU MS in Cybersecurity Risk Management.

Pencil and paper icon

Access a customizable supervisor request letter to support your case for attending a Kelley professional development course.

Expectations

Participants are expected to participate in a 60-minute live virtual session and complete one to two hours of asynchronous work each week. To earn the Space Cybersecurity Digital Badge, participants must attend 80% of the sessions and take either the Space Cybersecurity Quiz or the Space Cyberattack Postmortem and pass with a score of 80% or better.

To earn academic credit for completing the series, a student must participate in 80% of the sessions and take both the Space Cybersecurity Quiz and the Space Cyberattack Postmortem assignments, passing with a score of 80%.

Format

The weekly live virtual sessions will be recorded and made available to participants throughout the program. In addition to the live sessions, supplemental content will be provided in the form of short, targeted weekly readings and supplemental readings and asynchronous discussion forums.

Alternative ways to earn the badge will be made available upon request to accommodate, for example, professional and personal conflicts. These will include developing a cyberattack postmortem that investigates how an organization responded to a real-world data breach and what they could have done better.

Meet the instructors

Courses will be delivered by Professor Scott Shackelford, executive director of the Center for Applied Cybersecurity Research at Indiana University, and Eytan Tepper, PhD, director of the Space Governance Lab at IU Bloomington, as well as guest lecturers from the U.S. Cyber Command, The Aerospace Corporation, commercial space companies, Amazon Aerospace and Satellite professional services, and the Space ISAC.

Scott J. Shackelford, PhD, JD

Scott J. Shackelford, PhD, JD, is the provost professor of Business Law & Ethics at the Kelley School of Business and the executive director of both the Ostrom Workshop and the Center for Applied Cybersecurity Research. He is also an affiliated scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society.

Some of Scott’s many publications include Forks in the Digital Road: Key Decisions that Gave Us the Internet We Have (Oxford University Press, 2023), Cyber Peace: Charting a Path Toward a Sustainable, Stable, and Secure Cyberspace (Cambridge University Press, 2022), The Internet of Things: What Everyone Needs to Know (Oxford University Press, 2020), and Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Cambridge University Press, 2014). Scott has written more than 100 articles, book chapters, essays, and op-eds for diverse outlets ranging from the University of Illinois Law Review and the American Business Law Journal to the Christian Science Monitor and HuffPost. His research has been covered by diverse outlets, including Politico, NPR, Forbes, Time, Forensic Magazine, Law360, Washington Post, and the L.A. Times.

Both his academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.

Dr. Eytan Tepper

Eytan Tepper, PhD, is a research professor of Space Governance & Security, and director of the Space Governance Lab at IU Bloomington, where he is affiliated with the Ostrom Workshop established by Nobel Laureate Elinor Ostrom. He teaches courses on space governance, space-cyber governance, and space cybersecurity and serves as program director of the new Space Cybersecurity Digital Badge program at Indiana University’s Kelley School of Business.

Eytan earned his doctorate from the McGill University Institute of Air and Space Law and subsequently pursued a postdoctoral fellowship at the New York University (NYU) School of Law. A renowned expert on space law, governance, and security, he leads research projects on global space governance, the laws of space warfare, space-cyber power, and the commercial space revolution. Eytan’s approach is transdisciplinary, employing cutting-edge literature from international law, international relations, political economy, and strategic studies.

Eytan has published in journals like the Maryland Law Review, the Georgia Law Review, NYU Journal of International Law and Politics, Constitutional Political Economy, Global Studies Quarterly, the Annals of Air and Space Law, Georgetown Journal of International Affairs, Journal of Space Law, Space Policy, and New Space journal. In addition, he has presented his work in key venues in academia and beyond, including Harvard, Yale, Cambridge, the American Society of International Law, the Academy of Legal Studies in Business, the International Astronautical Congress (IAC), the International Civil Aviation Organization (ICAO), IEEE, DEFCON, and the UN Committee on the Peaceful Uses of Outer Space.

Prior to returning to academia, he was a practicing lawyer with a career spanning the public and private sectors, representing government ministries and Fortune 500 companies.

Questions? We're here to help.

Email us at kelleypd@iu.edu with any questions you may have, and a member of our team will be happy to assist you.

Social media

  • Linkedin for the Kelley School of Business Executive Education Program
  • Blog for the Kelley School of Business Executive Education Program
  • Accessibility
  • College Scorecard
  • Privacy Notice
  • Copyright © 2025 The Trustees of Indiana University