ÁñÁ«ÊÓƵ

School for spooks: Gloucestershire taps into cyber expertise

<ÁñÁ«ÊÓƵ class="standfirst">Business school¡¯s work with GCHQ and defence employers makes security vigilance a top priority
December 11, 2018
hacker-using-two-screens
Source: Getty
Watching like a hawk: universities must be extra vigilant about cyber security when working with sensitive organisations

Cyber security is a growing concern for universities around the world. But when your partners include some of the UK¡¯s most secretive organisations, it suddenly becomes a top priority.

This leaves the University of Gloucestershire¡¯s School of Business and Technology facing an interesting dilemma: how does it maintain an open academic environment while having to give part of its campus to secure areas?that?only a handful of staff have access to?

Searching for an answer to this conundrum is Kamal Bechkoum, head of the school, which has built strong links with private security firms and government agencies in recent years.

Professor Bechkoum, previously executive dean of the School of Science and Technology at the University of Northampton, was hired in 2015 to improve the prospects of what was then an underperforming business school.

ÁñÁ«ÊÓƵ

ADVERTISEMENT

He did so by tapping into cyber security, a local strength. Cheltenham, where two of the university¡¯s campuses are based, is a focal point in the UK¡¯s cyber security effort. It is the home of GCHQ, the UK¡¯s main surveillance agency, and a major site of activity for the National Cyber Security Centre. Soon it will be home to the government-backed Cheltenham Cyber Park, a ?650 million business development set to create 7,000 jobs.

Professor Bechkoum said that, prior to his arrival, Gloucestershire had struggled to tap into its neighbours¡¯ expertise.

ÁñÁ«ÊÓƵ

ADVERTISEMENT

¡°When I arrived we had?only one cyber security course called forensic computing, which was not very good in terms of its content, designed by academics and delivered by academics with no industry experience,¡± he told?Times Higher Education.

His response was to ask managers from GCHQ and major defence technologies ¨C including Raytheon and Northrup Grumman ¨C for guidance in designing curricula for new undergraduate courses in cyber and computer security, and computer and cyber forensics.

¡°They need the right kind of graduates and we want to produce them. We want the curriculum and study content to be flexible and up-to-date,¡± Professor Beckhoum explained. ¡°Raytheon and Northrup Grumman were absolutely committed to that process and spent weeks with us designing the curriculum and supporting its delivery, while GCHQ had lots of advice about what the curriculum should contain.¡±

Professor Beckhoum now leads a ?3 million cyber security project at Gloucestershire, working with GCHQ, the National Cyber Skills Centre and other organisations to produce highly skilled cyber professionals in Gloucestershire and beyond.

The project is already paying dividends, but the sensitivity of the work involved means that it is not always easy for the school to trumpet its successes.

ÁñÁ«ÊÓƵ

ADVERTISEMENT

¡°Three years ago if you had one student working in a network security company we would be smiling. Today, we have 100 per cent of graduates [from cyber security courses] employed by cyber security firms and around 65 per cent of those were in Gloucestershire,¡± Professor Bechkoum said.

¡°I can mention a few of those companies ¨C such as Northrup Grumman and Raytheon ¨C but some don¡¯t want to be named [because of the work they do]. It can be frustrating. I want to say our courses are so good that x or y employed them, [but] we can only talk about some, not all.¡±

Partnerships with these sorts of organisations also mean that the university¡¯s own security has to be strong.

ÁñÁ«ÊÓƵ

ADVERTISEMENT

¡°As soon as you say ¡®we¡¯re good in cyber security and doing great stuff¡¯ you become a target [for cyberattacks],¡± Professor Bechkoum explained. ¡°The university absolutely has to maintain an open academic environment because that¡¯s how universities should be, that¡¯s at the core of how they work, but at the same time we also have to be very vigilant about the fact that we work with sensitive organisations.¡±

There are two ways that the institution balances these responsibilities: the first is through the use of graded security clearance. At the Cyber Security and Digital Centre, ¡°you can move from zone 1, for everyone, to zone 6, which is for high security clearance¡±, Professor Bechkoum said. There are certain activities that only two or three staff have clearance in.

The second is the human element. ¡°Everyone in the organisation has to be trained, and by that I mean everyone, from the IT department to the executive team to academics working in the history department,¡± he said. Staff have to be vigilant for fraudulent emails that could result in a malware attack on the university system and even students get guest lectures on the topic.

Professor Beckhoum added: ¡°The citizen is the first line of our defence.¡±

ÁñÁ«ÊÓƵ

ADVERTISEMENT

anna.mckie@timeshighereducation.com

<ÁñÁ«ÊÓƵ class="pane-title"> POSTSCRIPT:

Print headline: School for spooks: Gloucestershire taps neighbours for cyber courses

Register to continue

Why register?

  • Registration is free and only takes a moment
  • Once registered, you can read 3 articles a month
  • Sign up for our newsletter
Register
Please Login or Register to read this article.
<ÁñÁ«ÊÓƵ class="pane-title"> Related articles
<ÁñÁ«ÊÓƵ class="pane-title"> Related universities
<ÁñÁ«ÊÓƵ class="pane-title"> Reader's comments (1)
Tor is the first line of our defence.
<ÁñÁ«ÊÓƵ class="pane-title"> Sponsored
<ÁñÁ«ÊÓƵ class="pane-title"> Featured jobs
ADVERTISEMENT