Cooperative Traffic Management
|
|
- Geraldine Goodwin
- 6 years ago
- Views:
Transcription
1 European ATFCM towards Enhanced Time-based Operations Pascal Hop Project Leader CTM March 2016
2 Network Strategic Developments
3 Network Strategy Plan, RP2 target focus Efficiently exploit available network capacity Introduction of Target Times Operations for ATFCM* purposes Planning Execution CTM: towards Time Based Operations predictability, cooperation * For ATFCM purposes means better managed delivery of traffic into congested sectors (could also be arrival sectors)
4 (ATFCM) time based operations Now New CTOT Entry Time Time-based ATFCM measure CTOT Target Time Time-based ATFCM measure congestion congestion Issues Assumed profile not always the actual profile Objective of CTOT not managed after take-off Actual trajectory and sector entry time can significantly deviate from intended ATFCM measure Areas for development Cooperation within executive phase Measuring / monitoring effectiveness Flight planning and implementation predictability Link to other time-based functionalities (e.g. AMAN)
5 Target times Publication of Target Times Over (TTO) creating awareness of the real target times for congested airspace Initial procedures for TTO implementing TTO for selected flights through Mandatory Cherry Picking principles Enhanced procedures for TTO - implementing TTO for all flight in Regulations - responding to tactical operations
6 Predictability Traffic predictability accuracy Required flexibility + Non-adherence Campaign Required flexibility Predictability addressing trajectory prediction improvements for new cooperative traffic management functionalities (i.e. ddcb, E-AMAN) Predictability TODAY Improve Flight Planning Reduce tactical deviation Manage Tactical deviation Monitor performance FUTURE New Traffic predictability processes addressing flight planning improvements including predictability requirements in the executive phase
7 Cooperation ddcb/stam! New ATFCM cooperative processes addressing local and network imbalances, interface with executive phase New User Driven Prioritization processes addressing Airspace User s preferences in cooperative processes
8 Link to E-AMAN ATFCM developments and E-AMAN developments share the Timeelement and can support each other NM Support to Extended AMAN - Early NM trajectory predictions (including network intelligence) - Pre-sequence based on E-AMAN criteria - Monitoring and Coordination operational requirements wrt Network Capacity vs Arrival sequencing - Data sharing (receive, process and relay from/to downstream/upstream ATSUs)
9 Link to E-AMAN Initial experiences with ATFCM and E-AMAN Target Time for arrival regulation (sometimes referred to as TTA) requires coordination between (E-)AMAN and ATFCM: - TTA input to (E-)AMAN - Fine-tuning of TTA by (E-)AMAN - (E-)AMAN within ATFCM tolerances (e.g. AMAN requires accuracy of seconds) - More work needed to clarify overall operational concept NM data useful as input to (E-)AMAN. Requirements for accuracy improvements and improved distribution requirements for EFD (B2B requirements!) Need to align trajectory predictions between ATFCM and (E-)AMAN functionality. Otherwise risk of divergence and degradation of network coordination
10 What changes? Real time network traffic management + + Increased Cooperative predictability + + processes Target Times Local ATC E-AMAN support Operational stakeholders more in control to balance preferences with network situation Transparent interface with NM, FMP s, AU s. Better oversight of network coordination Need to develop procedural arrangements between all users
11 Network Manager adds value to network performance! NM connecting you to the network! 11
Datalink performances
Datalink performances Outcome of the Datalink Performance Monitoring activities Jacky Pouzet Head of Communication and Frequency Coordination Unit WAC Madrid, March 2018 The Big Picture EC EASA Reminder:
More informationSystem Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012
System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 THIS PRESENTATION IS ABOUT Introduction Principles & Definition Governance Logical models Technical infrastructure Open
More informationICB Industry Consultation Body
ICB Industry Consultation Body Evolution of network management 17/11/2016 Issue Position Paper Long-term evolution of Network Management This position paper is intended to form the basis of advice to the
More informationAerospace Technology Congress 2016 Stockholm, Sweden
SESAR Aerospace Technology Congress 2016 Stockholm, Sweden Michael Standar, SESAR Joint Undertaking 2 ICAO projected global traffic scenario - 2040 The European ATM Master Plan SESAR - addressing global
More informationATFM. Planning in Complex Operations. Stu McBride Future ATM and Network Services Manager. ICAO ATFM GLOBAL SYMPOSIUM 20 TH November 2017.
ATFM Planning in Complex Operations ICAO ATFM GLOBAL SYMPOSIUM 20 TH November 2017 Stu McBride Future ATM and Network Services Manager NATS Protected/NATS Private Future ATM Content Overview of UK Airspace
More informationPredicting flight routes with a deep neural network in the Air Traffic Flow and Capacity Management system. Herbert Naessens, 11 October 2018
Predicting flight routes with a deep neural network in the Air Traffic Flow and Capacity Management system Herbert Naessens, 11 October 2018 In this presentation Who is EUROCONTROL Maastricht UAC ATC to
More informationData update on the Public Portal by mid-2016
Data update on the Public Portal by mid-2016 Document information Project Title Project Number Project Manager Deliverable Name Administrate ATM Master Plan Updates C.01. Edition 00.00.01 Task contributors
More informationImproving airports throughput
Improving airports throughput RECAT EU and Approach Time-Based Vincent TREVE Introduction Analysing summer period 2012, 6 airports were congested in the sense of operating at 80% or more of their capacity
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationWHO-ITU National ehealth Strategy Toolkit
WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information
More informationJARUS RECOMMENDATIONS ON THE USE OF CONTROLLER PILOT DATA LINK COMMUNICATIONS (CPDLC) IN THE RPAS COMMUNICATIONS CONTEXT
Joint Authorities for Rulemaking of Unmanned Systems JARUS RECOMMENDATIONS ON THE USE OF CONTROLLER PILOT DATA LINK COMMUNICATIONS (CPDLC) IN THE RPAS COMMUNICATIONS CONTEXT DOCUMENT IDENTIFIER : JAR_DEL_WG5_D.04
More informationAir Traffic Control System Command Center. Presenter: Greg Byus CDM/International Manager
Air Traffic Control System Command Center Presenter: Greg Byus CDM/International Manager Air Traffic Control System Command Center Overview The U.S. National Airspace System 4 Air Traffic Management Hierarchy
More informationNational Preparedness System. Update for EMForum June 11, 2014
National Preparedness System Update for EMForum June 11, 2014 Approach to National Preparedness Whole community integration Risk-driven Capability-based DRAFT 2 Presidential Policy Directive 8 (PPD) 8
More informationStarting from the basics: cybersecurity awareness campaigns in the electricity and energy sector
Session: Digital security risks to the energy infrastructure: electricity Starting from the basics: cybersecurity awareness campaigns in the electricity and energy sector Stefano Bracco Stefano.BRACCO@acer.europa.eu
More informationThe Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017
The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA
More informationFDA & Medical Device Cybersecurity
FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US
More informationNext Generation Policy & Compliance
Next Generation Policy & Compliance Mason Karrer, CISSP, CISA GRC Strategist - Policy and Compliance, RSA Core Competencies C33 2013 Fall Conference Sail to Success CRISC CGEIT CISM CISA Introductions...
More informationCOBIT 5 With COSO 2013
Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationMemorandum of Understanding
Memorandum of Understanding between the European Commission, the European Union Agency for Railways and the European rail sector associations (CER, EIM, EPTTOLA, ERFA, the ERTMS Users Group, GSM-R Industry
More informationImproving Cybersecurity through the use of the Cybersecurity Framework
Improving Cybersecurity through the use of the Cybersecurity Framework March 11, 2015 Tom Conkle G2, Inc. Agenda Cybersecurity Framework Why it was created What is it Why it matters How do you use it 2
More informationOPERATIONAL PROBLEM REPORTING. Network Operations Handbook
Edition Number : 18.0 Edition Validity Date : 19/02/2016 DOCUMENT CHARACTERISTICS Document Title Document Subtitle (optional) Edition Number Edition Validity Date OPERATIONAL PROBLEM REPORTING Network
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationAnalytics Fundamentals by Mark Peco
Analytics Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their respective
More informationThe Importance of Tracking Internal Communications HOW ORGANIZATIONS BENEFIT FROM ANALYTICS
The Importance of Tracking Internal Email Communications HOW ORGANIZATIONS BENEFIT FROM EMAIL ANALYTICS Why is it important to measure internal emails in large companies? Although internal communicators
More informationThe SPARKS Project Motivation, Objectives and Results
The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project
More informationCreating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular
Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory
More informationFAA/Industry Collaborative Weather Rerouting Workshop. ATC Focus Area Discussion Summaries April 10-11, 2001
FAA/Industry Collaborative Weather Rerouting Workshop ATC Focus Area Discussion Summaries April 10-11, 2001 Topic 1: Data Acquisition & Dissemination ATC Team Weather Most reliable source/ More accurate
More informationDEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.
DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY
More informationTWELFTH AIR NAVIGATION CONFERENCE
International Civil Aviation Organization 7/5/12 WORKING PAPER ANConf.12.WP.007.en.docx TWELFTH AIR NAVIGATION CONFERENCE Montréal, 19 to 30 November 2012 Agenda Item 3: Interoperability and data through
More informationAccelerating Cloud Adoption
Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive
More informationINTERNATIONAL ASSISTANCE AND CAPACITY BUILDING IN AVIATION SECURITY Briefing for AVSEC/FAL/RG-PA May, 2011
INTERNATIONAL ASSISTANCE AND CAPACITY BUILDING IN AVIATION SECURITY Briefing for AVSEC/FAL/RG-PA May, 2011 Implementation Support and Development (ISD) Security 1 Purpose of Presentation Review background
More informationPresentation of NM 22.0
Presentation of NM 22.0 FB924: Rerouting Improvements - CHMI v1.0 1- Background Why this FB is being developed? To support users of NM rerouting services What is the main business objective? Improve the
More informationPromoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda
2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,
More informationUpdates to the NIST Cybersecurity Framework
Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationDevelopment of the SPI Regulation
Development of the SPI Regulation EC Workshop on the implementation of SPI Luc TYTGAT Director Pan-European Single Sky 07 March 2014 Introduction The SPI regulation was developed in close collaboration
More informationSESAR Deployment and upcoming CEF Transport Calls ANS Consultative Board. Helsinki, 12 October 2015
SESAR Deployment and upcoming CEF Transport Calls Presentation @NEFAB ANS Consultative Board Helsinki, 12 October 2015 SESAR JU SESAR DM 2 entities, 1 project European ATM Master Plan R&D INDUSTRIALISATION
More informationSpecPaxos. James Connolly && Harrison Davis
SpecPaxos James Connolly && Harrison Davis Overview Background Fast Paxos Traditional Paxos Implementations Data Centers Mostly-Ordered-Multicast Network layer Speculative Paxos Protocol Application layer
More informationCybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus
Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationCTI Capability Maturity Model Marco Lourenco
1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information
More informationOpportunistic Web Access via WLAN Hotspots
Opportunistic Web Access via WLAN Hotspots Mikko Pitkänen, Teemu Kärkkäinen, and Jörg Ott DTNRG, 2010-07-30 Agenda Introduction: Urban Pedestrians and Hotspot Access Opportunistic Web Access DTN-based
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationTest Architect A Key Role defined by Siemens
Test Architect A Key Role defined by Siemens Siemens Munich, Germany January 30 February 3, 2017 http://www.oop-konferenz.de Agenda Why do we need a Test Architect? What are the responsibilities and tasks
More informationRelative Significance of Trajectory Prediction Errors on an Automated Separation Assurance Algorithm
Relative Significance of Trajectory Prediction Errors on an Automated Separation Assurance Algorithm Todd Lauderdale Andrew Cone Aisha Bowe NASA Ames Research Center Separation Assurance Automation Should
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationExamining Cooperative Strategies through Cyber Exercises
Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER1815BU DRS Advancements: What's New and What Is Being Cooked Up in Resource Management Land VMworld 2017 Thomas Bryant, VMware, Inc - @kix1979 Maarten Wiggers, VMware, Inc Content: Not for publication
More informationDELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS
DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS Building digital trust and cyber security resilience is no longer just an IT issue, it s a business mandate. Fusion brings a simplified approach to our client
More informationCooperation with other Certification Systems
ISCC 254 Cooperation with other Certification Systems Cooperation with other Certification Systems ISCC 11-01-14 V 1.16 11-01-14 Copyright notice ISCC 2010 This ISCC document is protected by copyright.
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationBase of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model
Base of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model 1 What is BADA? BADA - Base of Aircraft DAta is an Aircraft Performance Model (APM) developed and maintained by EUROCONTROL through
More informationRethinking Cybersecurity from the Inside Out
Rethinking Cybersecurity from the Inside Out An Engineering and Life Cycle-Based Approach for Building Trustworthy Resilient Systems Dr. Ron Ross Computer Security Division Information Technology Laboratory
More informationICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME
ICAS Workshop 3rd October 2005 Single European Sky Implementation Plan - SESAME Jan Van Doorn EUROCONTROL Experimental Centre, France Director European 1 Organisation for the Safety of Air Navigation Demand
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationRoadmap for Reducing Carbon Emissions. Beth Kujan Account Manager, Supply Chain Americas Speaking to inemi Sustainability Session
Roadmap for Reducing Carbon Emissions Beth Kujan Account Manager, Supply Chain Americas Speaking to inemi Sustainability Session Outline Operational vs. Product and Out-Sourced Function emissions ICT footprint
More informationBEREC Public debriefing
BEREC Public debriefing from the 31th BEREC plenary meetings Sébastien Soriano, BEREC Chair 2017 Elisabeth Dornetshumer, Co-Chair of the Roaming Expert Group Michiel van Dijk, Co-Chair of the Net Neutrality
More informationJuly 13, Via to RE: International Internet Policy Priorities [Docket No ]
July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,
More informationTCT Detailed Design Document
Detailed Design Document TCT Detailed Design Document Issue: Draft 1.1 Author: Mike Vere Date: 3 January 2008 Company: Graffica Ltd Page 1 of 16 Table Of Contents 1 Introduction...3 1.1 OVERVIEW...3 1.2
More informationUnderstanding Holistic Effects of Cyber Events on Critical Infrastructure
Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513
More informationBusiness Continuity Management
Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationRejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009
Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service
More informationQuality Assurance and IT Risk Management
Quality Assurance and IT Risk Deutsche Bank s QA and Testing Transformation Journey Michael Venditti Head of Enterprise Testing Services, Deutsche Bank IT RISK - REGULATORY GOVERNANCE Major shifts in the
More informationArchitecting the ArcGIS Platform: Best Practices. Brian R. Embley and Brian J. Baldwin
Architecting the ArcGIS Platform: Best Practices Brian R. Embley and Brian J. Baldwin Patterns & Practices Solution Architects Amplify customer success by offering strategic guidance, communicating best
More informationStandardization and Regulations in the EU/EFTA
Standardization and Regulations in the EU/EFTA UNECE Working Party on Regulatory Cooperation and Standardization Policies Geneva, 26 November 2014 CEN-CENELEC Content Basic facts about CEN and CENELEC
More informationPresented by the Federal Interagency Elder Justice Working Group May 13, 2013
Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with
More informationHE/FE Collaboration Catalyst / IS Shared Services
HE/FE Collaboration Catalyst / IS Shared Services SCURL Shared Services in Scotland, 23 rd Nov 2018 Angus Warren, Chief Executive, UCSS & APUC, Norice Bain, Collaboration Manager, UCSS & APUC, & Brian
More informationDIRECTORATE GENERAL MOBILITY AND TRANSPORT Units MOVE-E3 & SRD2. User Manual. Single European Sky Performance website
DIRECTORATE GENERAL MOBILITY AND TRANSPORT Units MOVE-E3 & SRD2 User Manual Single European Sky Performance website Date: 24/05/2017 Doc. Version: V0.12 Date: 24/05/2017 1 / 32 Doc. Version: V0.12 TABLE
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationUsing Metrics to Gain Management Support for Cyber Security Initiatives
Using Metrics to Gain Management Support for Cyber Security Initiatives Craig Schumacher Chief Information Security Officer Idaho Transportation Dept. January 2016 Why Metrics Based on NIST Framework?
More informationU.S. Coast Guard Auxiliary Performance Measurement Directorate
U.S. Coast Guard Auxiliary Performance Measurement Directorate WHO WE ARE, AND WHAT WE DO The Performance Measurement Directorate analyzes and visualizes performance and resource data for the U.S. Coast
More informationCybersecurity and Commercial Aviation
Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers
More informationYOU VE GOT 99 PROBLEMS AND A BUDGET S ONE
YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE Rebekah Brown @PDXBek Threat Intelligence Lead at Rapid7 But before that Gunnery Sergeant United State Marine Corps Chinese Crypto linguist and Network Warfare
More informationColorado Digital Government Summit & Cyber Security Summit. September 18, 2007
Colorado Digital Government Summit & Cyber Security Summit September 18, 2007 Aligning IT Strategy with Business Processes / Objectives Paul M Engelbert Global Practice Manager September 18, 2007 Aligning
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationCybersecurity eit. Software. Certification. Industrial Security Embedded System
Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded
More informationCommunications Management Plan Template
Communications Management Plan Template Project Name: U.S. Department of Housing and Urban Development October, 2010 Communications Management Plan Template (V1.0) VERSION HISTORY [Provide information
More informationChoosing a Transport Protocol for Real-time Data across complex networks
Choosing a Transport Protocol for Real-time Data across complex networks Choosing a Transport Protocol for Real-time Data 1 Choosing a Transport Protocol for Real-time Data 1 Introduction Choosing the
More informationLift Internal Revitalizing B2E Communication. LiftInternal.com
Lift Internal Revitalizing B2E Communication LiftInternal.com Use this document to help you plan and execute B2E communication. Even if the topic seems simple, taking the time to think through the fundamentals
More informationData Governance Data Usage Labeling and Enforcement in Adobe Experience Platform
Contents What is data governance? Why data governance? Data governance roles The Adobe Experience Platform advantage A framework for data governance Data usage patterns Data governance in action Conclusion
More informationEnterprise GRC Implementation
Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest
More informationHow Optimizely Dramatically Improved Response Times with CDN Balancing
The Most Misleading Measure of Response Time How Optimizely Dramatically Improved Response Times with CDN Balancing 01 02 Introduction Understanding CDN Balancing What is a CDN? Response Time Improvement
More informationArchitecting the ArcGIS Platform: Best Practices. Dave Wrazien Ray Bunn
Architecting the ArcGIS Platform: Best Practices Dave Wrazien Ray Bunn Patterns & Practices Solution Architects Amplify customer success by offering strategic guidance, communicating best practices, and
More informationInformation and Communication Networks. Communication
Information Technology Communication Information and Communication Networks Integrating IP and : Delivering QoS in an IP Environment Multiservice Platforms G One infrastructure supporting voice, video
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationARE YOU ADAPTIVE? (From a Traffic Signal Perspective)
ARE YOU ADAPTIVE? (From a Traffic Signal Perspective) 2.24.2011 ADAPTIVE TRAFFIC CONTROL SYSTEMS (ATCS) What are they? How are they different from other ATMS (especially traffic responsive)? Is it right
More informationOverlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology
CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer
More informationReference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07.
Reference Architecture for the Operationalization of a BCMS Boban Kršić, Chief Information Security Officer verinice.xp - Berlin, 07. February 2017 DENIC Mission Founded in 1996 as a cooperative in Frankfurt
More informationCyber Threat Intelligence Debbie Janeczek May 24, 2017
Cyber Threat Intelligence Debbie Janeczek May 24, 2017 AGENDA Today s Cybersecurity Challenges What is Threat Intelligence? Data, Information, Intelligence Strategic, Operational and Tactical Threat Intelligence
More informationMarch 6, Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices
March 6, 2019 Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices On July 21, 2016, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability
More information