Cooperative Traffic Management

Size: px
Start display at page:

Download "Cooperative Traffic Management"

Transcription

1 European ATFCM towards Enhanced Time-based Operations Pascal Hop Project Leader CTM March 2016

2 Network Strategic Developments

3 Network Strategy Plan, RP2 target focus Efficiently exploit available network capacity Introduction of Target Times Operations for ATFCM* purposes Planning Execution CTM: towards Time Based Operations predictability, cooperation * For ATFCM purposes means better managed delivery of traffic into congested sectors (could also be arrival sectors)

4 (ATFCM) time based operations Now New CTOT Entry Time Time-based ATFCM measure CTOT Target Time Time-based ATFCM measure congestion congestion Issues Assumed profile not always the actual profile Objective of CTOT not managed after take-off Actual trajectory and sector entry time can significantly deviate from intended ATFCM measure Areas for development Cooperation within executive phase Measuring / monitoring effectiveness Flight planning and implementation predictability Link to other time-based functionalities (e.g. AMAN)

5 Target times Publication of Target Times Over (TTO) creating awareness of the real target times for congested airspace Initial procedures for TTO implementing TTO for selected flights through Mandatory Cherry Picking principles Enhanced procedures for TTO - implementing TTO for all flight in Regulations - responding to tactical operations

6 Predictability Traffic predictability accuracy Required flexibility + Non-adherence Campaign Required flexibility Predictability addressing trajectory prediction improvements for new cooperative traffic management functionalities (i.e. ddcb, E-AMAN) Predictability TODAY Improve Flight Planning Reduce tactical deviation Manage Tactical deviation Monitor performance FUTURE New Traffic predictability processes addressing flight planning improvements including predictability requirements in the executive phase

7 Cooperation ddcb/stam! New ATFCM cooperative processes addressing local and network imbalances, interface with executive phase New User Driven Prioritization processes addressing Airspace User s preferences in cooperative processes

8 Link to E-AMAN ATFCM developments and E-AMAN developments share the Timeelement and can support each other NM Support to Extended AMAN - Early NM trajectory predictions (including network intelligence) - Pre-sequence based on E-AMAN criteria - Monitoring and Coordination operational requirements wrt Network Capacity vs Arrival sequencing - Data sharing (receive, process and relay from/to downstream/upstream ATSUs)

9 Link to E-AMAN Initial experiences with ATFCM and E-AMAN Target Time for arrival regulation (sometimes referred to as TTA) requires coordination between (E-)AMAN and ATFCM: - TTA input to (E-)AMAN - Fine-tuning of TTA by (E-)AMAN - (E-)AMAN within ATFCM tolerances (e.g. AMAN requires accuracy of seconds) - More work needed to clarify overall operational concept NM data useful as input to (E-)AMAN. Requirements for accuracy improvements and improved distribution requirements for EFD (B2B requirements!) Need to align trajectory predictions between ATFCM and (E-)AMAN functionality. Otherwise risk of divergence and degradation of network coordination

10 What changes? Real time network traffic management + + Increased Cooperative predictability + + processes Target Times Local ATC E-AMAN support Operational stakeholders more in control to balance preferences with network situation Transparent interface with NM, FMP s, AU s. Better oversight of network coordination Need to develop procedural arrangements between all users

11 Network Manager adds value to network performance! NM connecting you to the network! 11

Datalink performances

Datalink performances Datalink performances Outcome of the Datalink Performance Monitoring activities Jacky Pouzet Head of Communication and Frequency Coordination Unit WAC Madrid, March 2018 The Big Picture EC EASA Reminder:

More information

System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012

System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 THIS PRESENTATION IS ABOUT Introduction Principles & Definition Governance Logical models Technical infrastructure Open

More information

ICB Industry Consultation Body

ICB Industry Consultation Body ICB Industry Consultation Body Evolution of network management 17/11/2016 Issue Position Paper Long-term evolution of Network Management This position paper is intended to form the basis of advice to the

More information

Aerospace Technology Congress 2016 Stockholm, Sweden

Aerospace Technology Congress 2016 Stockholm, Sweden SESAR Aerospace Technology Congress 2016 Stockholm, Sweden Michael Standar, SESAR Joint Undertaking 2 ICAO projected global traffic scenario - 2040 The European ATM Master Plan SESAR - addressing global

More information

ATFM. Planning in Complex Operations. Stu McBride Future ATM and Network Services Manager. ICAO ATFM GLOBAL SYMPOSIUM 20 TH November 2017.

ATFM. Planning in Complex Operations. Stu McBride Future ATM and Network Services Manager. ICAO ATFM GLOBAL SYMPOSIUM 20 TH November 2017. ATFM Planning in Complex Operations ICAO ATFM GLOBAL SYMPOSIUM 20 TH November 2017 Stu McBride Future ATM and Network Services Manager NATS Protected/NATS Private Future ATM Content Overview of UK Airspace

More information

Predicting flight routes with a deep neural network in the Air Traffic Flow and Capacity Management system. Herbert Naessens, 11 October 2018

Predicting flight routes with a deep neural network in the Air Traffic Flow and Capacity Management system. Herbert Naessens, 11 October 2018 Predicting flight routes with a deep neural network in the Air Traffic Flow and Capacity Management system Herbert Naessens, 11 October 2018 In this presentation Who is EUROCONTROL Maastricht UAC ATC to

More information

Data update on the Public Portal by mid-2016

Data update on the Public Portal by mid-2016 Data update on the Public Portal by mid-2016 Document information Project Title Project Number Project Manager Deliverable Name Administrate ATM Master Plan Updates C.01. Edition 00.00.01 Task contributors

More information

Improving airports throughput

Improving airports throughput Improving airports throughput RECAT EU and Approach Time-Based Vincent TREVE Introduction Analysing summer period 2012, 6 airports were congested in the sense of operating at 80% or more of their capacity

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

WHO-ITU National ehealth Strategy Toolkit

WHO-ITU National ehealth Strategy Toolkit WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information

More information

JARUS RECOMMENDATIONS ON THE USE OF CONTROLLER PILOT DATA LINK COMMUNICATIONS (CPDLC) IN THE RPAS COMMUNICATIONS CONTEXT

JARUS RECOMMENDATIONS ON THE USE OF CONTROLLER PILOT DATA LINK COMMUNICATIONS (CPDLC) IN THE RPAS COMMUNICATIONS CONTEXT Joint Authorities for Rulemaking of Unmanned Systems JARUS RECOMMENDATIONS ON THE USE OF CONTROLLER PILOT DATA LINK COMMUNICATIONS (CPDLC) IN THE RPAS COMMUNICATIONS CONTEXT DOCUMENT IDENTIFIER : JAR_DEL_WG5_D.04

More information

Air Traffic Control System Command Center. Presenter: Greg Byus CDM/International Manager

Air Traffic Control System Command Center. Presenter: Greg Byus CDM/International Manager Air Traffic Control System Command Center Presenter: Greg Byus CDM/International Manager Air Traffic Control System Command Center Overview The U.S. National Airspace System 4 Air Traffic Management Hierarchy

More information

National Preparedness System. Update for EMForum June 11, 2014

National Preparedness System. Update for EMForum June 11, 2014 National Preparedness System Update for EMForum June 11, 2014 Approach to National Preparedness Whole community integration Risk-driven Capability-based DRAFT 2 Presidential Policy Directive 8 (PPD) 8

More information

Starting from the basics: cybersecurity awareness campaigns in the electricity and energy sector

Starting from the basics: cybersecurity awareness campaigns in the electricity and energy sector Session: Digital security risks to the energy infrastructure: electricity Starting from the basics: cybersecurity awareness campaigns in the electricity and energy sector Stefano Bracco Stefano.BRACCO@acer.europa.eu

More information

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

Next Generation Policy & Compliance

Next Generation Policy & Compliance Next Generation Policy & Compliance Mason Karrer, CISSP, CISA GRC Strategist - Policy and Compliance, RSA Core Competencies C33 2013 Fall Conference Sail to Success CRISC CGEIT CISM CISA Introductions...

More information

COBIT 5 With COSO 2013

COBIT 5 With COSO 2013 Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

Memorandum of Understanding

Memorandum of Understanding Memorandum of Understanding between the European Commission, the European Union Agency for Railways and the European rail sector associations (CER, EIM, EPTTOLA, ERFA, the ERTMS Users Group, GSM-R Industry

More information

Improving Cybersecurity through the use of the Cybersecurity Framework

Improving Cybersecurity through the use of the Cybersecurity Framework Improving Cybersecurity through the use of the Cybersecurity Framework March 11, 2015 Tom Conkle G2, Inc. Agenda Cybersecurity Framework Why it was created What is it Why it matters How do you use it 2

More information

OPERATIONAL PROBLEM REPORTING. Network Operations Handbook

OPERATIONAL PROBLEM REPORTING. Network Operations Handbook Edition Number : 18.0 Edition Validity Date : 19/02/2016 DOCUMENT CHARACTERISTICS Document Title Document Subtitle (optional) Edition Number Edition Validity Date OPERATIONAL PROBLEM REPORTING Network

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Analytics Fundamentals by Mark Peco

Analytics Fundamentals by Mark Peco Analytics Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their respective

More information

The Importance of Tracking Internal Communications HOW ORGANIZATIONS BENEFIT FROM ANALYTICS

The Importance of Tracking Internal  Communications HOW ORGANIZATIONS BENEFIT FROM  ANALYTICS The Importance of Tracking Internal Email Communications HOW ORGANIZATIONS BENEFIT FROM EMAIL ANALYTICS Why is it important to measure internal emails in large companies? Although internal communicators

More information

The SPARKS Project Motivation, Objectives and Results

The SPARKS Project Motivation, Objectives and Results The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project

More information

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory

More information

FAA/Industry Collaborative Weather Rerouting Workshop. ATC Focus Area Discussion Summaries April 10-11, 2001

FAA/Industry Collaborative Weather Rerouting Workshop. ATC Focus Area Discussion Summaries April 10-11, 2001 FAA/Industry Collaborative Weather Rerouting Workshop ATC Focus Area Discussion Summaries April 10-11, 2001 Topic 1: Data Acquisition & Dissemination ATC Team Weather Most reliable source/ More accurate

More information

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy. DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY

More information

TWELFTH AIR NAVIGATION CONFERENCE

TWELFTH AIR NAVIGATION CONFERENCE International Civil Aviation Organization 7/5/12 WORKING PAPER ANConf.12.WP.007.en.docx TWELFTH AIR NAVIGATION CONFERENCE Montréal, 19 to 30 November 2012 Agenda Item 3: Interoperability and data through

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

INTERNATIONAL ASSISTANCE AND CAPACITY BUILDING IN AVIATION SECURITY Briefing for AVSEC/FAL/RG-PA May, 2011

INTERNATIONAL ASSISTANCE AND CAPACITY BUILDING IN AVIATION SECURITY Briefing for AVSEC/FAL/RG-PA May, 2011 INTERNATIONAL ASSISTANCE AND CAPACITY BUILDING IN AVIATION SECURITY Briefing for AVSEC/FAL/RG-PA May, 2011 Implementation Support and Development (ISD) Security 1 Purpose of Presentation Review background

More information

Presentation of NM 22.0

Presentation of NM 22.0 Presentation of NM 22.0 FB924: Rerouting Improvements - CHMI v1.0 1- Background Why this FB is being developed? To support users of NM rerouting services What is the main business objective? Improve the

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

Updates to the NIST Cybersecurity Framework

Updates to the NIST Cybersecurity Framework Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Development of the SPI Regulation

Development of the SPI Regulation Development of the SPI Regulation EC Workshop on the implementation of SPI Luc TYTGAT Director Pan-European Single Sky 07 March 2014 Introduction The SPI regulation was developed in close collaboration

More information

SESAR Deployment and upcoming CEF Transport Calls ANS Consultative Board. Helsinki, 12 October 2015

SESAR Deployment and upcoming CEF Transport Calls ANS Consultative Board. Helsinki, 12 October 2015 SESAR Deployment and upcoming CEF Transport Calls Presentation @NEFAB ANS Consultative Board Helsinki, 12 October 2015 SESAR JU SESAR DM 2 entities, 1 project European ATM Master Plan R&D INDUSTRIALISATION

More information

SpecPaxos. James Connolly && Harrison Davis

SpecPaxos. James Connolly && Harrison Davis SpecPaxos James Connolly && Harrison Davis Overview Background Fast Paxos Traditional Paxos Implementations Data Centers Mostly-Ordered-Multicast Network layer Speculative Paxos Protocol Application layer

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

CTI Capability Maturity Model Marco Lourenco

CTI Capability Maturity Model Marco Lourenco 1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information

More information

Opportunistic Web Access via WLAN Hotspots

Opportunistic Web Access via WLAN Hotspots Opportunistic Web Access via WLAN Hotspots Mikko Pitkänen, Teemu Kärkkäinen, and Jörg Ott DTNRG, 2010-07-30 Agenda Introduction: Urban Pedestrians and Hotspot Access Opportunistic Web Access DTN-based

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

ACARE WG 4 Security Overview

ACARE WG 4 Security Overview ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/

More information

Test Architect A Key Role defined by Siemens

Test Architect A Key Role defined by Siemens Test Architect A Key Role defined by Siemens Siemens Munich, Germany January 30 February 3, 2017 http://www.oop-konferenz.de Agenda Why do we need a Test Architect? What are the responsibilities and tasks

More information

Relative Significance of Trajectory Prediction Errors on an Automated Separation Assurance Algorithm

Relative Significance of Trajectory Prediction Errors on an Automated Separation Assurance Algorithm Relative Significance of Trajectory Prediction Errors on an Automated Separation Assurance Algorithm Todd Lauderdale Andrew Cone Aisha Bowe NASA Ames Research Center Separation Assurance Automation Should

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

Examining Cooperative Strategies through Cyber Exercises

Examining Cooperative Strategies through Cyber Exercises Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SER1815BU DRS Advancements: What's New and What Is Being Cooked Up in Resource Management Land VMworld 2017 Thomas Bryant, VMware, Inc - @kix1979 Maarten Wiggers, VMware, Inc Content: Not for publication

More information

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client

More information

Cooperation with other Certification Systems

Cooperation with other Certification Systems ISCC 254 Cooperation with other Certification Systems Cooperation with other Certification Systems ISCC 11-01-14 V 1.16 11-01-14 Copyright notice ISCC 2010 This ISCC document is protected by copyright.

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Base of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model

Base of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model Base of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model 1 What is BADA? BADA - Base of Aircraft DAta is an Aircraft Performance Model (APM) developed and maintained by EUROCONTROL through

More information

Rethinking Cybersecurity from the Inside Out

Rethinking Cybersecurity from the Inside Out Rethinking Cybersecurity from the Inside Out An Engineering and Life Cycle-Based Approach for Building Trustworthy Resilient Systems Dr. Ron Ross Computer Security Division Information Technology Laboratory

More information

ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME

ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME Jan Van Doorn EUROCONTROL Experimental Centre, France Director European 1 Organisation for the Safety of Air Navigation Demand

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Roadmap for Reducing Carbon Emissions. Beth Kujan Account Manager, Supply Chain Americas Speaking to inemi Sustainability Session

Roadmap for Reducing Carbon Emissions. Beth Kujan Account Manager, Supply Chain Americas Speaking to inemi Sustainability Session Roadmap for Reducing Carbon Emissions Beth Kujan Account Manager, Supply Chain Americas Speaking to inemi Sustainability Session Outline Operational vs. Product and Out-Sourced Function emissions ICT footprint

More information

BEREC Public debriefing

BEREC Public debriefing BEREC Public debriefing from the 31th BEREC plenary meetings Sébastien Soriano, BEREC Chair 2017 Elisabeth Dornetshumer, Co-Chair of the Roaming Expert Group Michiel van Dijk, Co-Chair of the Net Neutrality

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

TCT Detailed Design Document

TCT Detailed Design Document Detailed Design Document TCT Detailed Design Document Issue: Draft 1.1 Author: Mike Vere Date: 3 January 2008 Company: Graffica Ltd Page 1 of 16 Table Of Contents 1 Introduction...3 1.1 OVERVIEW...3 1.2

More information

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Understanding Holistic Effects of Cyber Events on Critical Infrastructure Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009 Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service

More information

Quality Assurance and IT Risk Management

Quality Assurance and IT Risk Management Quality Assurance and IT Risk Deutsche Bank s QA and Testing Transformation Journey Michael Venditti Head of Enterprise Testing Services, Deutsche Bank IT RISK - REGULATORY GOVERNANCE Major shifts in the

More information

Architecting the ArcGIS Platform: Best Practices. Brian R. Embley and Brian J. Baldwin

Architecting the ArcGIS Platform: Best Practices. Brian R. Embley and Brian J. Baldwin Architecting the ArcGIS Platform: Best Practices Brian R. Embley and Brian J. Baldwin Patterns & Practices Solution Architects Amplify customer success by offering strategic guidance, communicating best

More information

Standardization and Regulations in the EU/EFTA

Standardization and Regulations in the EU/EFTA Standardization and Regulations in the EU/EFTA UNECE Working Party on Regulatory Cooperation and Standardization Policies Geneva, 26 November 2014 CEN-CENELEC Content Basic facts about CEN and CENELEC

More information

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with

More information

HE/FE Collaboration Catalyst / IS Shared Services

HE/FE Collaboration Catalyst / IS Shared Services HE/FE Collaboration Catalyst / IS Shared Services SCURL Shared Services in Scotland, 23 rd Nov 2018 Angus Warren, Chief Executive, UCSS & APUC, Norice Bain, Collaboration Manager, UCSS & APUC, & Brian

More information

DIRECTORATE GENERAL MOBILITY AND TRANSPORT Units MOVE-E3 & SRD2. User Manual. Single European Sky Performance website

DIRECTORATE GENERAL MOBILITY AND TRANSPORT Units MOVE-E3 & SRD2. User Manual. Single European Sky Performance website DIRECTORATE GENERAL MOBILITY AND TRANSPORT Units MOVE-E3 & SRD2 User Manual Single European Sky Performance website Date: 24/05/2017 Doc. Version: V0.12 Date: 24/05/2017 1 / 32 Doc. Version: V0.12 TABLE

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Using Metrics to Gain Management Support for Cyber Security Initiatives

Using Metrics to Gain Management Support for Cyber Security Initiatives Using Metrics to Gain Management Support for Cyber Security Initiatives Craig Schumacher Chief Information Security Officer Idaho Transportation Dept. January 2016 Why Metrics Based on NIST Framework?

More information

U.S. Coast Guard Auxiliary Performance Measurement Directorate

U.S. Coast Guard Auxiliary Performance Measurement Directorate U.S. Coast Guard Auxiliary Performance Measurement Directorate WHO WE ARE, AND WHAT WE DO The Performance Measurement Directorate analyzes and visualizes performance and resource data for the U.S. Coast

More information

Cybersecurity and Commercial Aviation

Cybersecurity and Commercial Aviation Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers

More information

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE Rebekah Brown @PDXBek Threat Intelligence Lead at Rapid7 But before that Gunnery Sergeant United State Marine Corps Chinese Crypto linguist and Network Warfare

More information

Colorado Digital Government Summit & Cyber Security Summit. September 18, 2007

Colorado Digital Government Summit & Cyber Security Summit. September 18, 2007 Colorado Digital Government Summit & Cyber Security Summit September 18, 2007 Aligning IT Strategy with Business Processes / Objectives Paul M Engelbert Global Practice Manager September 18, 2007 Aligning

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Cybersecurity eit. Software. Certification. Industrial Security Embedded System Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded

More information

Communications Management Plan Template

Communications Management Plan Template Communications Management Plan Template Project Name: U.S. Department of Housing and Urban Development October, 2010 Communications Management Plan Template (V1.0) VERSION HISTORY [Provide information

More information

Choosing a Transport Protocol for Real-time Data across complex networks

Choosing a Transport Protocol for Real-time Data across complex networks Choosing a Transport Protocol for Real-time Data across complex networks Choosing a Transport Protocol for Real-time Data 1 Choosing a Transport Protocol for Real-time Data 1 Introduction Choosing the

More information

Lift Internal Revitalizing B2E Communication. LiftInternal.com

Lift Internal Revitalizing B2E Communication. LiftInternal.com Lift Internal Revitalizing B2E Communication LiftInternal.com Use this document to help you plan and execute B2E communication. Even if the topic seems simple, taking the time to think through the fundamentals

More information

Data Governance Data Usage Labeling and Enforcement in Adobe Experience Platform

Data Governance Data Usage Labeling and Enforcement in Adobe Experience Platform Contents What is data governance? Why data governance? Data governance roles The Adobe Experience Platform advantage A framework for data governance Data usage patterns Data governance in action Conclusion

More information

Enterprise GRC Implementation

Enterprise GRC Implementation Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest

More information

How Optimizely Dramatically Improved Response Times with CDN Balancing

How Optimizely Dramatically Improved Response Times with CDN Balancing The Most Misleading Measure of Response Time How Optimizely Dramatically Improved Response Times with CDN Balancing 01 02 Introduction Understanding CDN Balancing What is a CDN? Response Time Improvement

More information

Architecting the ArcGIS Platform: Best Practices. Dave Wrazien Ray Bunn

Architecting the ArcGIS Platform: Best Practices. Dave Wrazien Ray Bunn Architecting the ArcGIS Platform: Best Practices Dave Wrazien Ray Bunn Patterns & Practices Solution Architects Amplify customer success by offering strategic guidance, communicating best practices, and

More information

Information and Communication Networks. Communication

Information and Communication Networks. Communication Information Technology Communication Information and Communication Networks Integrating IP and : Delivering QoS in an IP Environment Multiservice Platforms G One infrastructure supporting voice, video

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

ARE YOU ADAPTIVE? (From a Traffic Signal Perspective)

ARE YOU ADAPTIVE? (From a Traffic Signal Perspective) ARE YOU ADAPTIVE? (From a Traffic Signal Perspective) 2.24.2011 ADAPTIVE TRAFFIC CONTROL SYSTEMS (ATCS) What are they? How are they different from other ATMS (especially traffic responsive)? Is it right

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Reference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07.

Reference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07. Reference Architecture for the Operationalization of a BCMS Boban Kršić, Chief Information Security Officer verinice.xp - Berlin, 07. February 2017 DENIC Mission Founded in 1996 as a cooperative in Frankfurt

More information

Cyber Threat Intelligence Debbie Janeczek May 24, 2017

Cyber Threat Intelligence Debbie Janeczek May 24, 2017 Cyber Threat Intelligence Debbie Janeczek May 24, 2017 AGENDA Today s Cybersecurity Challenges What is Threat Intelligence? Data, Information, Intelligence Strategic, Operational and Tactical Threat Intelligence

More information

March 6, Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices

March 6, Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices March 6, 2019 Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices On July 21, 2016, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability

More information