Description of the video:
WEBVTT 1 00:00:00.000 --> 00:00:01.100 2 00:00:01.100 --> 00:00:02.760 Welcome, everybody. 3 00:00:02.760 --> 00:00:04.400 Thanks so much for joining. 4 00:00:04.400 --> 00:00:08.060 Today we're going to be talking about the Space Cybersecurity 5 00:00:08.060 --> 00:00:11.220 Digital Badge program here at the Kelley School of Business. 6 00:00:11.220 --> 00:00:12.290 I'm Scott Shackelford. 7 00:00:12.290 --> 00:00:14.930 I'm a professor here at Kelley, where I also 8 00:00:14.930 --> 00:00:17.000 have the honor of serving in several other roles 9 00:00:17.000 --> 00:00:18.750 that I'll say more about in just a moment. 10 00:00:18.750 --> 00:00:22.130 And I'm joined today by Eytan Tepper. 11 00:00:22.130 --> 00:00:23.420 Hello. 12 00:00:23.420 --> 00:00:25.340 I'm Eytan Tepper. 13 00:00:25.340 --> 00:00:28.520 I'm a director of the Space Governance 14 00:00:28.520 --> 00:00:32.540 Lab at Indiana University. 15 00:00:32.540 --> 00:00:36.060 And together we have facilitated this program. 16 00:00:36.060 --> 00:00:38.640 So we'll talk a little bit about the program itself, 17 00:00:38.640 --> 00:00:41.630 fill in some of the blank spaces around who we are 18 00:00:41.630 --> 00:00:43.483 and what got us interested in these topics, 19 00:00:43.483 --> 00:00:44.900 and then give you more information 20 00:00:44.900 --> 00:00:46.330 about the program from there. 21 00:00:46.330 --> 00:01:00.260 22 00:01:00.260 --> 00:01:01.020 Excellent. 23 00:01:01.020 --> 00:01:03.210 Can we advance the slide, Eytan? 24 00:01:03.210 --> 00:01:03.910 There we go. 25 00:01:03.910 --> 00:01:04.410 Excellent. 26 00:01:04.410 --> 00:01:06.210 Thank you so much. 27 00:01:06.210 --> 00:01:11.700 So space governance is a really interesting 28 00:01:11.700 --> 00:01:14.130 and quickly developing field, and there's 29 00:01:14.130 --> 00:01:15.580 a lot going on in it. 30 00:01:15.580 --> 00:01:18.390 So I'm not going to attempt to do justice to all facets 31 00:01:18.390 --> 00:01:22.170 right now, but I wanted to give just a really brief once-over 32 00:01:22.170 --> 00:01:24.010 of how we got to this point. 33 00:01:24.010 --> 00:01:27.870 Space governance has been an interest of mine 34 00:01:27.870 --> 00:01:29.380 now for more than 20 years. 35 00:01:29.380 --> 00:01:33.580 I got interested way back when I was in undergrad here at IU, 36 00:01:33.580 --> 00:01:35.910 when the NASA Vision for Space Exploration 37 00:01:35.910 --> 00:01:39.600 was being developed after the Columbia space shuttle disaster. 38 00:01:39.600 --> 00:01:42.322 At the Ostrom Workshop, which has been around now 39 00:01:42.322 --> 00:01:44.280 for more than 50 years, and I'll say more about 40 00:01:44.280 --> 00:01:48.240 that in just a moment, space governance is a newer interest. 41 00:01:48.240 --> 00:01:50.730 But in a lot of ways, there's parallels 42 00:01:50.730 --> 00:01:53.710 with other aspects of our work on the commons, 43 00:01:53.710 --> 00:01:55.500 including the global commons, thinking 44 00:01:55.500 --> 00:01:59.700 about the atmosphere, the deep sea bed, Antarctica climate, 45 00:01:59.700 --> 00:02:03.170 cybersecurity, and now, of course, space as well. 46 00:02:03.170 --> 00:02:06.020 We launched the Space Governance Lab-- 47 00:02:06.020 --> 00:02:07.990 again, lots of bad puns throughout this, 48 00:02:07.990 --> 00:02:11.440 with apologies-- with support from the Carnegie Corporation, 49 00:02:11.440 --> 00:02:14.045 a number of years ago now, in 2022, 50 00:02:14.045 --> 00:02:15.670 and we thank Carnegie for their support 51 00:02:15.670 --> 00:02:19.810 to make that happen, with a number of pioneering projects, 52 00:02:19.810 --> 00:02:23.530 tracking the growth of different institutions 53 00:02:23.530 --> 00:02:26.080 related to space governance, mapping out 54 00:02:26.080 --> 00:02:28.570 some of the major epicenters, some of those norm 55 00:02:28.570 --> 00:02:32.680 entrepreneurs, and trying to establish some best 56 00:02:32.680 --> 00:02:37.060 practices for governance of this new and final frontier. 57 00:02:37.060 --> 00:02:39.830 That has led to a variety of publications, 58 00:02:39.830 --> 00:02:43.600 as you can see there, including a brand-new project that we're 59 00:02:43.600 --> 00:02:48.160 doing with the US Air Force Office of Scientific Research, 60 00:02:48.160 --> 00:02:51.020 on an integrated theory of space-cyber power. 61 00:02:51.020 --> 00:02:54.520 This is going to be ultimately leading to a book 62 00:02:54.520 --> 00:02:57.220 that we hope is going to be published-- it looks looking 63 00:02:57.220 --> 00:02:59.290 quite good so far-- with Cambridge University 64 00:02:59.290 --> 00:03:01.670 Press a little over a year and a half from now, 65 00:03:01.670 --> 00:03:04.090 and it will be the first book to really weave together 66 00:03:04.090 --> 00:03:07.000 these fields of space, cybersecurity, 67 00:03:07.000 --> 00:03:10.120 and, frankly, grand strategy, since national security is 68 00:03:10.120 --> 00:03:12.700 at the forefront for how we're thinking 69 00:03:12.700 --> 00:03:15.910 about the development of this frontier and, frankly, the role 70 00:03:15.910 --> 00:03:18.610 of the private sector within it, since oftentimes 71 00:03:18.610 --> 00:03:21.550 that infrastructure is in the crosshairs of foreign nation 72 00:03:21.550 --> 00:03:22.625 states. 73 00:03:22.625 --> 00:03:25.000 Anything else you'd like to say about that so far, Eytan? 74 00:03:25.000 --> 00:03:26.320 Is that OK? 75 00:03:26.320 --> 00:03:27.120 No, that's OK. 76 00:03:27.120 --> 00:03:27.890 [INAUDIBLE] 77 00:03:27.890 --> 00:03:28.390 Excellent. 78 00:03:28.390 --> 00:03:29.740 OK, great. 79 00:03:29.740 --> 00:03:33.590 Just a little bit more about why we're here and what we do. 80 00:03:33.590 --> 00:03:35.890 So one of the hats that I currently wear 81 00:03:35.890 --> 00:03:39.440 is I'm the executive director of the Ostrom Workshop here at IU. 82 00:03:39.440 --> 00:03:42.010 It's been around for more than 50 years now 83 00:03:42.010 --> 00:03:45.370 and has been an epicenter of governance research 84 00:03:45.370 --> 00:03:46.400 for that time. 85 00:03:46.400 --> 00:03:49.360 Lin Ostrom, the first woman to win the Nobel Prize in economics 86 00:03:49.360 --> 00:03:52.630 back in 2009, is famous for her work 87 00:03:52.630 --> 00:03:55.690 on how we can do a better job of managing 88 00:03:55.690 --> 00:03:58.090 global collective action challenges really 89 00:03:58.090 --> 00:03:59.600 from the ground up. 90 00:03:59.600 --> 00:04:04.000 She began her work focused primarily on local common pool 91 00:04:04.000 --> 00:04:06.980 resources, things like fisheries and forests, 92 00:04:06.980 --> 00:04:10.180 and found, among other things, ways in which these communities 93 00:04:10.180 --> 00:04:12.220 can come together and self-organize 94 00:04:12.220 --> 00:04:15.580 to address their challenges without the need to necessarily 95 00:04:15.580 --> 00:04:19.940 privatize a resource or have big brother in the form of the state 96 00:04:19.940 --> 00:04:21.850 stepping in to nationalize it. 97 00:04:21.850 --> 00:04:23.060 Doesn't always work. 98 00:04:23.060 --> 00:04:24.680 Certain conditions have to be met. 99 00:04:24.680 --> 00:04:27.650 But we're applying some of those insights, 100 00:04:27.650 --> 00:04:31.450 along with the bigger literature on what's called polycentric 101 00:04:31.450 --> 00:04:33.940 governance-- so that's broadly how you get different levels 102 00:04:33.940 --> 00:04:36.940 of authority to work well together on a common topic-- 103 00:04:36.940 --> 00:04:39.330 to this new field of space, though we 104 00:04:39.330 --> 00:04:41.930 have a lot of other tech governance work going on, 105 00:04:41.930 --> 00:04:45.020 including in cybersecurity and internet governance, 106 00:04:45.020 --> 00:04:48.250 as well as managing misinformation, disinformation, 107 00:04:48.250 --> 00:04:49.940 AI governance, more broadly. 108 00:04:49.940 --> 00:04:52.060 So if you're interested in getting more involved 109 00:04:52.060 --> 00:04:53.560 in the Ostrom Workshop, we encourage 110 00:04:53.560 --> 00:04:56.470 you to join our space governance working group or other working 111 00:04:56.470 --> 00:04:58.270 groups that might be of interest by going 112 00:04:58.270 --> 00:05:02.000 to OstromWorkshop.Indiana or just sending Eytan 113 00:05:02.000 --> 00:05:06.470 or I a note after you view this recording. 114 00:05:06.470 --> 00:05:10.250 I am also the director of IU's Center for Applied Cybersecurity 115 00:05:10.250 --> 00:05:10.980 Research. 116 00:05:10.980 --> 00:05:13.400 This is a center that's been around for more than 20 years 117 00:05:13.400 --> 00:05:16.760 now and is focused on the issue of securing 118 00:05:16.760 --> 00:05:18.300 critical infrastructure. 119 00:05:18.300 --> 00:05:21.680 And like the workshop, it does that in a very interdisciplinary 120 00:05:21.680 --> 00:05:25.400 fashion, where we bring together researchers and practitioners 121 00:05:25.400 --> 00:05:27.920 and staff from a variety of disciplines 122 00:05:27.920 --> 00:05:31.310 and try to find novel ways for dealing 123 00:05:31.310 --> 00:05:33.290 with some of the most vexing challenges 124 00:05:33.290 --> 00:05:34.320 that we're all facing. 125 00:05:34.320 --> 00:05:36.920 That's applied in the research infrastructure context 126 00:05:36.920 --> 00:05:39.200 with the big National Science Foundation program 127 00:05:39.200 --> 00:05:40.500 called Trusted CI. 128 00:05:40.500 --> 00:05:43.050 But we also do a lot of work really from the ground up, 129 00:05:43.050 --> 00:05:46.380 helping local governments with their cybersecurity challenges, 130 00:05:46.380 --> 00:05:49.520 such as a project called Cybertrack with Purdue 131 00:05:49.520 --> 00:05:51.570 and the Indiana Office of Technology. 132 00:05:51.570 --> 00:05:54.140 And we're working a lot right now as well with the Department 133 00:05:54.140 --> 00:05:56.340 of Defense and the Army Cyber Institute 134 00:05:56.340 --> 00:05:58.700 on the issue of securing smart cities 135 00:05:58.700 --> 00:06:02.100 and how we can do a better job of securing vulnerable, critical 136 00:06:02.100 --> 00:06:05.400 infrastructure on the civilian side, especially when it's being 137 00:06:05.400 --> 00:06:07.360 fed into defense networks. 138 00:06:07.360 --> 00:06:09.540 So we have a monthly speaker series and lots of ways 139 00:06:09.540 --> 00:06:11.283 to get involved with CACR. 140 00:06:11.283 --> 00:06:15.270 141 00:06:15.270 --> 00:06:17.375 Yeah, maybe I can say a couple of notes-- 142 00:06:17.375 --> 00:06:19.950 [INAUDIBLE] 143 00:06:19.950 --> 00:06:22.710 --about space and cybersecurity. 144 00:06:22.710 --> 00:06:28.500 So generally, by now, we are very much reliant 145 00:06:28.500 --> 00:06:35.790 on space-based infrastructure, and the reliance 146 00:06:35.790 --> 00:06:39.180 is both from the military aspects 147 00:06:39.180 --> 00:06:43.230 and from civilian aspects. 148 00:06:43.230 --> 00:06:45.540 There are satellites, communications 149 00:06:45.540 --> 00:06:53.100 that provide us all sorts of services, notably communication 150 00:06:53.100 --> 00:06:58.410 and positioning, navigation and timing, et cetera. 151 00:06:58.410 --> 00:07:04.950 And the military is very much reliant 152 00:07:04.950 --> 00:07:08.860 on the satellites for intelligence, for navigation, 153 00:07:08.860 --> 00:07:14.850 but also for the many guided weapon systems. 154 00:07:14.850 --> 00:07:21.570 Our economy is dependent on the satellites 155 00:07:21.570 --> 00:07:25.470 that are used by the banking, all the payment systems. 156 00:07:25.470 --> 00:07:29.610 And also each one of us personally 157 00:07:29.610 --> 00:07:32.490 are using satellites every day when 158 00:07:32.490 --> 00:07:38.040 we are navigating to the cinema or even 159 00:07:38.040 --> 00:07:42.000 every time that we are paying with a credit card. 160 00:07:42.000 --> 00:07:46.140 So the result is that space-based infrastructure 161 00:07:46.140 --> 00:07:51.120 is now a critical infrastructure for us. 162 00:07:51.120 --> 00:07:58.950 And the scenarios of a day without space, 163 00:07:58.950 --> 00:08:03.250 and you can google that, are not so good. 164 00:08:03.250 --> 00:08:06.380 The economy can come to a standstill. 165 00:08:06.380 --> 00:08:09.230 The military will be crippled. 166 00:08:09.230 --> 00:08:15.850 There is a quotation here about how the Marines are addicted 167 00:08:15.850 --> 00:08:17.913 to their space-based systems. 168 00:08:17.913 --> 00:08:22.000 169 00:08:22.000 --> 00:08:27.790 So if it is a critical systems for us, 170 00:08:27.790 --> 00:08:32.306 it also means that it is a prime target for our adversaries. 171 00:08:32.306 --> 00:08:35.080 172 00:08:35.080 --> 00:08:44.380 Now, there are two main ways to disrupt or even destroy 173 00:08:44.380 --> 00:08:45.700 our satellites. 174 00:08:45.700 --> 00:08:47.510 One is a kinetic attack. 175 00:08:47.510 --> 00:08:52.780 It's basically to launch an anti-satellite missile 176 00:08:52.780 --> 00:08:57.040 and blow up the satellite. 177 00:08:57.040 --> 00:09:02.480 So far, we have seen four countries that successfully test 178 00:09:02.480 --> 00:09:04.850 anti-satellite missiles-- 179 00:09:04.850 --> 00:09:07.560 US, Russia, China, and India. 180 00:09:07.560 --> 00:09:12.480 Each time they demonstrated, you launch a missile from Earth, 181 00:09:12.480 --> 00:09:16.290 it completely obliterates the satellite. 182 00:09:16.290 --> 00:09:20.330 But this method is problematic. 183 00:09:20.330 --> 00:09:24.420 There is a high technological and financial barrier. 184 00:09:24.420 --> 00:09:31.610 This is why only the very few leading powers can do that. 185 00:09:31.610 --> 00:09:38.420 It also exposes the attacker and escalates the hostilities. 186 00:09:38.420 --> 00:09:44.990 Another option to disrupt the adversary's satellite 187 00:09:44.990 --> 00:09:46.890 is by a cyberattack. 188 00:09:46.890 --> 00:09:52.340 And it is so much more efficient in many ways. 189 00:09:52.340 --> 00:09:59.390 It is an asymmetric weapon, low technological and financial 190 00:09:59.390 --> 00:10:03.500 barrier, which means that it is the weapon of the weak 191 00:10:03.500 --> 00:10:08.010 and the poor-- not just, but also of the weak and the poor. 192 00:10:08.010 --> 00:10:11.790 So you don't need to be a superpower in order to do that. 193 00:10:11.790 --> 00:10:15.840 It causes maximum damage with minimal cost. 194 00:10:15.840 --> 00:10:21.090 And you can also cover your track and deny culpability, 195 00:10:21.090 --> 00:10:23.670 and it is less escalatory. 196 00:10:23.670 --> 00:10:30.150 And the best example of that is that Russia, 197 00:10:30.150 --> 00:10:34.250 on the eve of its invasion to Ukraine, 198 00:10:34.250 --> 00:10:37.190 launched a cyberattack to disrupt 199 00:10:37.190 --> 00:10:40.070 the services of the Viasat, which 200 00:10:40.070 --> 00:10:45.200 is an American commercial space company that provided services 201 00:10:45.200 --> 00:10:48.600 to Ukraine government and military. 202 00:10:48.600 --> 00:10:52.140 Russia could have done it by an anti-satellite missile. 203 00:10:52.140 --> 00:10:57.080 They have the capability, but they chose a cyberattack. 204 00:10:57.080 --> 00:11:00.170 They didn't take responsibility for the attack, 205 00:11:00.170 --> 00:11:05.310 and the US didn't respond directly. 206 00:11:05.310 --> 00:11:11.620 This just demonstrates the advantages of a cyberattack, 207 00:11:11.620 --> 00:11:18.780 and that this is going to be the main mode of space warfare. 208 00:11:18.780 --> 00:11:26.040 More generally, we can say that a combined space cyber warfare 209 00:11:26.040 --> 00:11:29.370 theatre is emerging to become the primary battlefield 210 00:11:29.370 --> 00:11:37.860 in the 21st century and the main mode of a space warfare. 211 00:11:37.860 --> 00:11:47.940 So why choose the field of space cybersecurity? 212 00:11:47.940 --> 00:11:54.570 So as we mentioned before, space-based infrastructure 213 00:11:54.570 --> 00:11:58.020 is now critical. 214 00:11:58.020 --> 00:12:07.860 It is vulnerable to cyberattack, which already happened. 215 00:12:07.860 --> 00:12:14.940 And as a result of this attack, all the companies 216 00:12:14.940 --> 00:12:19.290 are by now aware of the risk, but they 217 00:12:19.290 --> 00:12:24.240 are lacking skilled personnel to address it. 218 00:12:24.240 --> 00:12:28.830 Moreover, there are not even a training program 219 00:12:28.830 --> 00:12:31.990 to train personnel for this field, 220 00:12:31.990 --> 00:12:38.760 and this is why IU launched this pioneering program 221 00:12:38.760 --> 00:12:43.470 about space cybersecurity. 222 00:12:43.470 --> 00:12:46.410 Scott, do you want to take it from here? 223 00:12:46.410 --> 00:12:47.140 Oh, sure. 224 00:12:47.140 --> 00:12:48.780 No, happy to. 225 00:12:48.780 --> 00:12:52.380 So this is a quickly developing field 226 00:12:52.380 --> 00:12:54.610 with just a tremendous amount of opportunity 227 00:12:54.610 --> 00:12:58.560 and, as Eytan was saying, very, very few skilled folks who 228 00:12:58.560 --> 00:13:02.650 are able to navigate at that intersection of cybersecurity 229 00:13:02.650 --> 00:13:05.620 and space situational awareness. 230 00:13:05.620 --> 00:13:09.520 So because of that lack of, frankly, talent, 231 00:13:09.520 --> 00:13:12.130 that is making it quite challenging for firms 232 00:13:12.130 --> 00:13:15.730 to both fill existing roles and to think more strategically 233 00:13:15.730 --> 00:13:18.640 about, frankly, the opportunities and the costs 234 00:13:18.640 --> 00:13:22.940 of functioning in this domain as well as, frankly, 235 00:13:22.940 --> 00:13:24.260 in the M&A context. 236 00:13:24.260 --> 00:13:28.580 So geopolitically, this is also a challenging moment. 237 00:13:28.580 --> 00:13:30.400 There's a lot going on, which means 238 00:13:30.400 --> 00:13:33.290 there's a lot of adversaries, both nation states 239 00:13:33.290 --> 00:13:36.250 as well as cybercrime and terrorist organizations, 240 00:13:36.250 --> 00:13:38.370 that are interested in targeting these assets, 241 00:13:38.370 --> 00:13:39.495 as Eytan mentioned as well. 242 00:13:39.495 --> 00:13:41.870 243 00:13:41.870 --> 00:13:42.370 Yeah. 244 00:13:42.370 --> 00:13:48.460 And we can say that now there is already 245 00:13:48.460 --> 00:13:56.560 a market for space cybersecurity firms and experts. 246 00:13:56.560 --> 00:14:02.810 The market is relatively new, which means that possibly there 247 00:14:02.810 --> 00:14:08.060 is more demand and supply. 248 00:14:08.060 --> 00:14:13.690 And the figures that you see here are probably bigger now. 249 00:14:13.690 --> 00:14:14.190 Mhm. 250 00:14:14.190 --> 00:14:21.860 251 00:14:21.860 --> 00:14:29.240 So the program leads are Scott and myself. 252 00:14:29.240 --> 00:14:33.620 We already introduced ourselves, but we can also 253 00:14:33.620 --> 00:14:40.460 say a few words about guest lecturers. 254 00:14:40.460 --> 00:14:49.430 So our aim is to bring to the participants the best knowledge 255 00:14:49.430 --> 00:14:53.300 and also to expose them to perspective of all the sectors, 256 00:14:53.300 --> 00:14:57.680 from the government, from the military, commercial companies, 257 00:14:57.680 --> 00:15:00.300 and also nonprofit. 258 00:15:00.300 --> 00:15:06.710 So we brought together an excellent team 259 00:15:06.710 --> 00:15:16.130 that includes Scott Nelson from the US Cyber Command, Michael 260 00:15:16.130 --> 00:15:24.770 Campanelli, who is the lead on space cybersecurity with Amazon. 261 00:15:24.770 --> 00:15:30.860 We have Nick Saunders, which is the chief cybersecurity 262 00:15:30.860 --> 00:15:35.090 officer at Viasat, the same company 263 00:15:35.090 --> 00:15:39.900 that I mentioned before who was attacked by Russia. 264 00:15:39.900 --> 00:15:45.830 We also have Erin Miller, the executive director of the Space 265 00:15:45.830 --> 00:15:49.340 ISAC, which is a key organization that 266 00:15:49.340 --> 00:15:52.500 connects all the actors in the government, 267 00:15:52.500 --> 00:15:58.620 in the private sector, and in the defense establishment. 268 00:15:58.620 --> 00:16:01.470 We have also Brandon Bailey, which 269 00:16:01.470 --> 00:16:07.360 is one of the nation's best experts on space cybersecurity. 270 00:16:07.360 --> 00:16:13.230 He is doing it for many years, and he is really a go-to person 271 00:16:13.230 --> 00:16:16.200 on anything in this topic. 272 00:16:16.200 --> 00:16:22.030 We have also Henry Danielson, who is, on the one hand, 273 00:16:22.030 --> 00:16:25.080 a professor at Cal Poly, but he also 274 00:16:25.080 --> 00:16:28.200 leads the Aerospace Village at DEFCON, 275 00:16:28.200 --> 00:16:35.640 for those of you who know DEFCON, and also Professor 276 00:16:35.640 --> 00:16:39.246 Falco from Cornell University. 277 00:16:39.246 --> 00:16:41.940 278 00:16:41.940 --> 00:16:42.480 Scott? 279 00:16:42.480 --> 00:16:44.340 Mhm. 280 00:16:44.340 --> 00:16:45.190 Absolutely. 281 00:16:45.190 --> 00:16:49.180 So we've had three cohorts of this program so far. 282 00:16:49.180 --> 00:16:52.770 And thanks especially to Microsoft for helping us 283 00:16:52.770 --> 00:16:56.130 get this off the ground with some seed funding, which 284 00:16:56.130 --> 00:16:59.010 has also allowed us to offer scholarships to students not 285 00:16:59.010 --> 00:17:01.200 only here at IU to participate, but also 286 00:17:01.200 --> 00:17:03.340 at other community colleges. 287 00:17:03.340 --> 00:17:06.010 Since then, we've been honored to receive additional support 288 00:17:06.010 --> 00:17:08.349 from the National Science Foundation and then 289 00:17:08.349 --> 00:17:11.750 most recently, as we said, the US Air Force. 290 00:17:11.750 --> 00:17:15.099 The program itself builds from the expertise 291 00:17:15.099 --> 00:17:20.650 of not only Eytan and myself but these amazing cadre of industry 292 00:17:20.650 --> 00:17:23.260 guest speakers who can really dig 293 00:17:23.260 --> 00:17:26.810 into the front lines, cutting-edge issues of space 294 00:17:26.810 --> 00:17:29.193 cybersecurity, and, frankly, bring war stories to bear. 295 00:17:29.193 --> 00:17:30.610 Because in a lot of cases, they've 296 00:17:30.610 --> 00:17:33.560 had to deal with them, whether it's Viasat or you name it. 297 00:17:33.560 --> 00:17:36.260 The mix we try to strike, as you see up there, 298 00:17:36.260 --> 00:17:39.050 is not too dominant in one field or another. 299 00:17:39.050 --> 00:17:41.710 Certainly law, policy, discussions 300 00:17:41.710 --> 00:17:44.440 of governance kind of pervade a lot of these topics 301 00:17:44.440 --> 00:17:47.170 because they're quite thorny, especially right now, given 302 00:17:47.170 --> 00:17:49.570 how fractured things are geopolitically. 303 00:17:49.570 --> 00:17:53.440 But also, we really try to frame that out by advertising 304 00:17:53.440 --> 00:17:55.750 and really trying to dig into some of the advances 305 00:17:55.750 --> 00:17:58.510 we've seen on the technical side of the ledger. 306 00:17:58.510 --> 00:18:00.850 And that, of course, includes some work 307 00:18:00.850 --> 00:18:04.420 on space cybersecurity-specific standards and frameworks 308 00:18:04.420 --> 00:18:06.910 that we highlight throughout the course, too. 309 00:18:06.910 --> 00:18:08.000 It's online. 310 00:18:08.000 --> 00:18:10.550 We meet once a week, synchronously. 311 00:18:10.550 --> 00:18:15.610 And from there, we have tried to build out 312 00:18:15.610 --> 00:18:18.950 this program with these other institutions in mind. 313 00:18:18.950 --> 00:18:21.290 So it's a very dynamic process. 314 00:18:21.290 --> 00:18:23.620 There's going to be new topics, such as in supply chain 315 00:18:23.620 --> 00:18:25.610 security, happening all the time. 316 00:18:25.610 --> 00:18:30.160 Successful adherence to this program, 317 00:18:30.160 --> 00:18:32.080 will make it all the way through to the end, 318 00:18:32.080 --> 00:18:34.300 are able then to earn a badge, which 319 00:18:34.300 --> 00:18:39.100 they can add into a certificate program, such as the certificate 320 00:18:39.100 --> 00:18:41.510 in cybersecurity management here at Kelley 321 00:18:41.510 --> 00:18:44.170 and then, ultimately, the master's degree 322 00:18:44.170 --> 00:18:47.590 as well in cybersecurity risk management. 323 00:18:47.590 --> 00:18:49.840 We do provide students with an opportunity 324 00:18:49.840 --> 00:18:53.890 either to show what they have learned through completion 325 00:18:53.890 --> 00:18:59.840 of a quiz or an aerospace-themed cyberattack postmortem, 326 00:18:59.840 --> 00:19:02.700 where you can dig into an actual breach at an aerospace 327 00:19:02.700 --> 00:19:05.370 organization, public or private sector, 328 00:19:05.370 --> 00:19:08.638 and in particular focus on what happened: 329 00:19:08.638 --> 00:19:10.680 How did the organization respond, what could they 330 00:19:10.680 --> 00:19:13.290 have done better, and what were the lasting results 331 00:19:13.290 --> 00:19:16.980 of regulation or litigation or other actions in the aftermath 332 00:19:16.980 --> 00:19:17.560 of that? 333 00:19:17.560 --> 00:19:19.480 And as I mentioned, you see the results. 334 00:19:19.480 --> 00:19:22.440 You get a digital badge that you can put on LinkedIn 335 00:19:22.440 --> 00:19:26.740 and otherwise earn academic credit toward our certificate 336 00:19:26.740 --> 00:19:29.790 and, if you're interested, the full MS in cybersecurity 337 00:19:29.790 --> 00:19:33.820 and have access to a number of internship opportunities, 338 00:19:33.820 --> 00:19:36.030 including with the organizations that we 339 00:19:36.030 --> 00:19:38.612 partner with in this offering. 340 00:19:38.612 --> 00:19:39.570 What did I miss, Eytan? 341 00:19:39.570 --> 00:19:43.860 342 00:19:43.860 --> 00:19:45.990 I think we can share with them. 343 00:19:45.990 --> 00:19:50.580 So you already mentioned that there 344 00:19:50.580 --> 00:19:55.120 are parts about law, policy, and compliance, 345 00:19:55.120 --> 00:19:59.220 and there is the more technical part or the parts 346 00:19:59.220 --> 00:20:03.000 about cybersecurity risk management 347 00:20:03.000 --> 00:20:11.150 and maybe it is worth sharing one of the testimonials 348 00:20:11.150 --> 00:20:14.310 from Mahesa from the Space Force. 349 00:20:14.310 --> 00:20:15.172 Mhm. 350 00:20:15.172 --> 00:20:17.330 Mhm. 351 00:20:17.330 --> 00:20:24.260 But generally, I think we covered it all. 352 00:20:24.260 --> 00:20:25.130 Absolutely. 353 00:20:25.130 --> 00:20:28.310 And we've been really, really appreciative of that partnership 354 00:20:28.310 --> 00:20:31.940 with the US Space Force has had a number of those folks come 355 00:20:31.940 --> 00:20:33.090 through now as well. 356 00:20:33.090 --> 00:20:37.610 So as you see, please do get in touch with any questions 357 00:20:37.610 --> 00:20:40.010 that you might have as you consider whether to sign up 358 00:20:40.010 --> 00:20:40.787 for this program. 359 00:20:40.787 --> 00:20:41.870 We're happy to field them. 360 00:20:41.870 --> 00:20:44.140 And we hope you join us in the next cohort. 361 00:20:44.140 --> 00:20:47.660 362 00:20:47.660 --> 00:20:52.700 So we'll see you in the next cohort or in outer space. 363 00:20:52.700 --> 00:20:54.950 Whichever comes first. 364 00:20:54.950 --> 00:20:57.860 Thank you. 365 00:20:57.860 --> 00:20:59.880 It would be fun to do this from outer space. 366 00:20:59.880 --> 00:21:01.810 I completely agree. 367 00:21:01.810 --> 00:21:03.000