Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation
|
|
- John Barker
- 6 years ago
- Views:
Transcription
1 Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation Corey Lofdahl Frank Witmer Prepared for the conference on, Human Security in The New Information Age: How Social Media Impacts Military Missions, Government to Government Coordination, and International Relationships October 8-9, 2013 Renaissance Hotel Brussels, Belgium
2 Social Media The use of social media has exploded Facebook Twitter LinkedIn Etc. It s hard to access social media data due to privacy concerns Data is necessary for social media tool and analysis algorithm development Data is owned by private companies Naïve solution: anonymize datasets by removing personally identifiable information (PII) 2 of 15
3 Anonymized and Anonymous Datasets Some anonymized datasets have been made available Anonymized datasets have had their personal data removed De-anonymization attacks leverage similar structure from similar networks to re-instantiate anonymized data De-anonymization attacks make companies even more leery and cautious about sharing their data Generating anonymous networks would be useful Anonymous networks are impossible to de-anonymize Could generate networks of a certain size or type to test algorithms Research Question: How to generate anonymous networks? 3 of 15
4 Synthetic, Anonymous Network Challenge(s) The three main technical challenges to support the generation of synthetic, anonymous networks: 1. Must be rooted in complex human social behavior as represented by social and behavioral theories 2. Synthetic and real-world networks must be comparable 3. Significant differences will exist between real and synthetic networks Some form of guidance, process, or tool must be provided to improve the quality of generated synthetic networks 4 of 15
5 Development Goals 1. Generate synthetic anonymous networks Based on behavioral antecedents 2. Understand evolution of empirical networks Based on network comparisons 3. Use network simulation to inform GIS-based visualizations and operational support representations Enables strategic analysis Enables HA/DR analysis I.e., apply limited resources 5 of 15
6 Subject Matter: Methodology: Strategic Special Operations Dark Networks Strategic Special Operations Forces (SOF) are tactically excellent Achieving strategic effects remains an opportunity System dynamics (SD) simulation supports strategic analysis over time but not space Network models characterize space but not time Agent-Based (AB) simulations that incorporate social network (ABSN) representations can characterize system change over space and time Using dark (insurgent, criminal, terrorist) network disruption as a use case 6 of 15 Use dark networks to inform strategic analysis
7 Special Operations and Network Analysis Tactical Kinetic Based on centrality metrics Focused on changes to few nodes Short-term Strategic Non-kinetic Based on richer set of metrics and diffusion models Focused on changes to multiple links (influence) Long-term 7 of 15
8 Tactical Centrality and Node Removal Analysis 8 of 15 Methodology drives kinetic tactics (Everton 2013)
9 Strategic Methodology: AB and SD Model Specification Overview, Design concepts, & Details (ODD) Purpose Entities, states variables, and scales Process overview and scheduling Design concepts Basic principles Interaction Emergence Stochasticity Adaptation Collectives Objectives Observation Learning Prediction Sensing Initialization Input data Submodels SD Reference Mode State theory State ancillary theory Identify 7/-2 variables Graph them over time Postulate causality Create model Run, test, iterate 9 of 15 Specify hard AB models with simple SD models
10 Moving from SD to AB Model Specification SD: (1) causality and (2) meta-networks income resources expenditures legitimacy tech investment investment recruits technology infrastructure Member Networks Dark Network Capacity - tech depreciation - depreciation - attrition system shock Integrated AB: Member Networks Differentiated 10 of 15 Move from aggregate to disaggregated models
11 Macrodynamics from Microstructure Macrodynamics Microstructure Integrated Efficiency Member Networks Differentiated Robustness Structural disaggregation impacts dynamics 11 of 15
12 Aggregate Dark Network AB Analysis 3 insurgencies modeled with varying network distributions from integrated to differentiated: Integrated networks are efficient and nonresilient Differentiated networks are inefficient and robust Robust Rebounding Nonresilient 12 of 15 System structure drives dynamics
13 Next Steps: Implementing Strategic Network Analysis SD used to specify AB models Explicit causality Meta-networks (Carley) Social media one of many networks Aggregate system behavior AB used to disaggregate stocks and specify networks Characterize network shape Specify flows in terms of network growth and decay I.e., attachment & detachment income resources Integrated expenditures legitimacy tech investment investment recruits technology infrastructure Member Networks Dark Network Capacity - tech depreciation - depreciation - attrition system shock Differentiated AB results validated against, (1) Behavioral theory (2) Aggregate SD results (3) Empirical reference networks 13 of 15
14 Conclusions SD used to specify aggregate system behavior over time AB leverages networks to model systems over time and space 14 of 15 Anonymous network generation Network evolution Spatial visualization Resulting capability ultimately will enable, Strategic SOF analysis HA/DR analysis I.e., achieving strategic, geographically distributed effects with limited resources
15 Contact Information Charles River Analytics Inc. 625 Mount Auburn Street Cambridge, MA Voice: Fax: Dr. Corey Lofdahl x of 15
Enhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationDEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS
DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationThe New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC
The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new
More informationResilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate
Resilience at JRC Naouma Kourti Dep. Head of Unit Technology Innovation in security Security, Space and Migration Directorate The Joint Research Centre at a glance 3000 staff Almost 75% are scientists
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More informationReal estate predictions 2017 What changes lie ahead?
Real estate predictions 2017 What changes lie ahead? Cyber Risk 2017. For information, contact Deloitte Consultores, S.A. Real Estate Predictions 2017 2 Cyber Risk Rising cyber risk in real estate through
More informationTowards a Theory of Cyberpower
Towards a Theory of Cyberpower Franklin Kramer, Stuart Starr, Larry Wentz, Eli Zimet CTNSP, NDU Dan Kuehl IRMC, NDU June, 2007 Agenda Context Goal, Objectives Framework Selected Observations Summary For
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationMINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications Feb 21 th, 2017 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationRedmond Facilities Strategic Management Plan Overview
Redmond Facilities Strategic Management Plan Overview Project Purpose + Provide guidance on how to best operate, maintain, and upgrade facilities now and in the future + Optimize maintenance staffing and
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationCyber Threat Landscape April 2013
www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationThe CORD reference architecture addresses the needs of various communications access networks with a wide array of use cases including:
Introduction Today s Mobile Network Operator (MNO) infrastructure is built with proprietary vertically integrated Network Elements (NEs), leading to inefficient utilization of network resources. Further,
More informationAvailability in the Modern Datacenter
Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending
More informationHierarchy of knowledge BIG DATA 9/7/2017. Architecture
BIG DATA Architecture Hierarchy of knowledge Data: Element (fact, figure, etc.) which is basic information that can be to be based on decisions, reasoning, research and which is treated by the human or
More informationInternational Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE
PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector
More informationResearch & Innovation
Research & Innovation Dr. Jai Ganesh Principal Research Scientist Agenda Infosys overview Research @ Infosys Sample case study Evolution over the years Emerging models for R&D collaboration 2010 Infosys
More informationMulti-method modeling
Multi-method modeling Dr. Andrei Borshchev CEO, The AnyLogic Company andrei@anylogic.com UNSW Sydney, February 2013 The AnyLogic Company www.anylogic.com The three methods in simulation modeling The three
More informationPrivacy Policy KPMG Australia
December 2018 Introduction KPMG Australia is committed to treating the personal information we collect in accordance with the Australian Privacy Principles in the Privacy Act 1988 (Cth) (the Privacy Act).
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationTHE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY
SESSION ID: TV-T05 THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY Jason H. Rivera Manager Cyber Threat Intelligence Deloitte & Touche LLP Twitter Handle: @Jason_JHR How well do we understand the Dark Web?
More informationDynamic Context Maintenance in Human Terrain
Distribution A: Approved for public release; distribution is unlimited. Dynamic Context Maintenance in Human Terrain July 14, 2009 Nadya Belov, Jeff Patti, and Angela Pawlowski Lockheed Martin Advanced
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationSeven Decision Points When Considering Containers
Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,
More informationThe enabling role of geospatial information in the European energy policies
The European Commission s science and knowledge service Joint Research Centre The enabling role of geospatial information in the European energy policies Francesco Pignatelli Kehl (DE), 5 September 2017
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationDATA MINING AND WAREHOUSING
DATA MINING AND WAREHOUSING Qno Question Answer 1 Define data warehouse? Data warehouse is a subject oriented, integrated, time-variant, and nonvolatile collection of data that supports management's decision-making
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationThe Task of the Mapping of Privacy by Design (PbD) Principles to Software Engineering s UML Standard: A Starter Document Dawn N.
The Task of the Mapping of Privacy by Design (PbD) Principles to Software Engineering s UML Standard: A Starter Document Dawn N. Jutla Introduction The purpose of this task is to allow privacy policymakers,
More informationISF Threat Horizon: Cybercrime and the banking industry
ISF Threat Horizon: Cybercrime and the banking industry Dr Adrian Davis, PhD, MBA, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda: External threats Regulatory threats Internal
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationStudent Handbook Master of Information Systems Management (MISM)
Student Handbook 2018-2019 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of Information Systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Analytic
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationThe Power of the Crowd
WHITE PAPER The Power of the Crowd SUMMARY With the shift to Software-as-a-Service and Cloud nearly complete, organizations can optimize their end user experience and network operations with the power
More informationOTA Strategic Update Building & Amplifying April 5, 2017
OTA Strategic Update Building & Amplifying April 5, 2017 Reminders OTA Members Only Chatham House Rules Will be Recorded for Member Access Updated 4/7/17 OTA Strategic Update Building & Amplifying Craig
More informationData Mining: Approach Towards The Accuracy Using Teradata!
Data Mining: Approach Towards The Accuracy Using Teradata! Shubhangi Pharande Department of MCA NBNSSOCS,Sinhgad Institute Simantini Nalawade Department of MCA NBNSSOCS,Sinhgad Institute Ajay Nalawade
More informationDepartment of Defense. Installation Energy Resilience
Department of Defense Installation Energy Resilience Lisa A. Jung DASD (Installation Energy) OASD(Energy, Installations and Environment) 19 June 2018 Installation Energy is Energy that Powers Our Military
More informationReshaping the future, shifting business and operating models
Safe Harbor Certain statements mentioned in this presentation concerning our future growth prospects are forward-looking statements regarding our future business expectations intended to qualify for the
More informationThe Confounding Problem of Private Data Release
The Confounding Problem of Private Data Release Divesh Srivastava AT&T Labs-Research Acknowledgments: Ramón, Graham, Colin, Xi, Ashwin, Magda This material represents the views of the individual contributors
More informationThe Cyber Savvy CEO Getting to grips with today s growing cyber-threats
www.pwc.co.uk/informationsecurity The Cyber Savvy CEO Getting to grips with today s growing cyber-threats Unprecedented opportunities The cyber domain is a world of opportunity yet media coverage of attacks
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationIDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape
More informationProtecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 3 - Data Classification Processes and Models Readings In the News MIS5206 Week 3 Data Classification Processes and Models Test Taking Tip Quiz Readings Vacca Chapter
More informationNew Guidance on Privacy Controls for the Federal Government
New Guidance on Privacy Controls for the Federal Government IAPP Global Privacy Summit 2012 March 9, 2012 Dr. Ron Ross Computer Security Division, NIST Martha Landesberg, J.D., CIPP/US The Privacy Office,
More informationThe Windstream Enterprise Advantage for Banking
The Windstream Enterprise Advantage for Banking Creating trusted banking experiences with secure, cloud-optimized network and communications so you can focus on your customers. Customer centricity is a
More informationThe Definitive Guide to Preparing Your Data for Tableau
The Definitive Guide to Preparing Your Data for Tableau Speed Your Time to Visualization If you re like most data analysts today, creating rich visualizations of your data is a critical step in the analytic
More informationU.S. Department of Homeland Security Office of Cybersecurity & Communications
U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure
More informationOF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY
MEMORANDUM OF UNDERSTANDING between the MINISTERIO DE ELECTRICIDAD Y ENERGIA RENOVABLE DEL ECUADOR and the INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY This Memorandum of Understanding
More informationDoD Software Assurance (SwA) Update
DoD Software Assurance (SwA) Update Systems and Software Technology Conference May 2, 2006 Ms. Kristen Baldwin OUSD(AT&L)/Defense Systems kristen.baldwin@osd.mil Briefing Agenda Problem Definition Vision
More informationDigital Forensics as a Big Data Challenge
Digital Forensics as a Big Data Challenge Bruxelles, October 23rd 2013 Alessandro Guarino CEO, StudioAG Slide 1 of 20 Digital Forensics 1 DFRWS definition 2001 Digital Forensics is the use of scientifically
More informationAdversary Playbooks. An Approach to Disrupting Malicious Actors and Activity
Adversary Playbooks An Approach to Disrupting Malicious Actors and Activity Overview Applying consistent principles to Adversary Playbooks in order to disrupt malicious actors more systematically. Behind
More informationSOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines
SOFTWARE as a Service PLATFORM as a Service INFRASTRUCTURE as a Service Empower Users Develop Apps Manage Machines 2013 2009 $2.9B $5.7B $6.9B $13.3B $14.0B $17.6B By 2014, cloud computing services will
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationMediterranean Nautilus Greece S.A. Cloud Solutions
Mediterranean Nautilus Greece S.A. Cloud Solutions Arturo Danesi CEO MN Greece S.A. (Athens April 23, 2013) Agenda Cloud Computing: What does it really mean? Impacts on the Greek Economy MedNautilus Cloud
More informationINFRASTRUCTURE. A Smart Strategy Global Water Asset Management Lead, Ove Arup NYC FORUM -
SMART INFRASTRUCTURE A Smart Strategy Ian.gray@arup.com Global Water Asset Management Lead, Ove Arup FORUM - NYC What I ll Cover Context Developing a Smart Strategy Step 1 Develop a resilience strategy
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationThe Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.
The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,
More informationALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users
ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users For the past 30 years, enterprise communications have been built around the personal computer,
More information2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing
2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing Powered by the Retail ISAC, A Division of the R-CISC Overview Last October,
More informationThe J100 RAMCAP Method
The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health
More informationAC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead
AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:
More informationDell helps you to simplify IT
Dell helps you to simplify IT Workshops the first step Reduce desktop and data centre complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2010 Introduction How can you protect
More informationTracking 101 DISCOVER HOW TRACKING HELPS YOU UNDERSTAND AND TRULY ENGAGE YOUR AUDIENCES, TURNING INTO RESULTS
Email Tracking 101 DISCOVER HOW EMAIL TRACKING HELPS YOU UNDERSTAND AND TRULY ENGAGE YOUR AUDIENCES, TURNING EMAIL INTO RESULTS SUMMARY 2 INTRODUCTION TO EMAIL TRACKING 3 WHAT IS EMAIL TRACKING? 4 WHAT
More informationTransforming the Data Center Lenovo. All rights reserved.
Transforming the Data Center Lenovo Data Center Group A global technology company with 55,000 employees supporting customers in over 160 countries to deliver PC, Mobile, and Data Center solutions Data
More informationCONE 2019 Project Proposal on Cybersecurity
CONE 2019 Project Proposal on Cybersecurity Project title: Comprehensive Cybersecurity Platform for Bangladesh and its Corporate Environments Sector or area: Cybersecurity for IT, Communications, Transportation,
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationThe API Economy in a Mobile World What are we talking about?
IBM BusinessConnect A New Era of Thinking The API Economy in a Mobile World What are we talking about? Frank van der Wal Human Being Digital Transformation Specialist thewall@nl.ibm.com @thewalls 1 2016
More informationISG Provider Lens TM
ISG Provider Lens TM 2019 Definition Facebook s data leakage affair attracted the public s attraction to data security again. This is a very striking example for an unwanted use of data, but not comparable
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationInformation Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure
This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY
More informationCombining Multi-Agent System modeling and System Dynamics modeling
Combining Multi-Agent System modeling and System Dynamics modeling Ernst Gebetsroither - Austrian Institute of Technology Outline Different methodological approaches System Dynamics approach Multi-agent
More informationTackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief
Tackling Crime, Protecting Citizens and Assisting First Responders IN COLLABORATION WITH A Frost & Sullivan Executive Brief Information and Communications Technology 50 Years of Growth, Innovation and
More informationAcurian on. The Role of Technology in Patient Recruitment
Acurian on The Role of Technology in Patient Recruitment Wearables smartphones social networks the list of new technological tools available to patients and healthcare providers goes on and on. Many clinical
More informationThe Global Cybercrime Industry
Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and
More informationCloud Computing Overview. The Business and Technology Impact. October 2013
Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationPart of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge
Part of the complete suite of itracs award-winning DCIM capabilities DCIM Software itracs CPIM : Mastering the Connectivity Challenge itracs CPIM Intelligence. Automation. Insight. Impact! Business Value
More informationSmart Cities and Security. Security - 1
Smart Cities and Security Security - 1 Where are we in 2013? Security - 2 Where are we in 2050? Security - 3 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationLast updated January 29, Approved by ECC March 3, 2015
Last updated January 29, 2015 Approved by ECC March 3, 2015 ASHRAE Electronic Communications Strategic Plan Electronic Communications Committee (ECC) January 2015 Electronic Communications Committee Strategic
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationExamining Cooperative Strategies through Cyber Exercises
Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict
More informationPromoting Accuracy Through Data Quality: The UC Data Validation Framework
Promoting Accuracy Through Data Quality: The UC Data Validation Framework University of California Office of the President OFFICE OF INSTITUTIONAL RESEARCH & ACADEMIC PLANNING [IRAP] CAIR 2016 Conference
More informationA Systems Approach to Dimensional Modeling in Data Marts. Joseph M. Firestone, Ph.D. White Paper No. One. March 12, 1997
1 of 8 5/24/02 4:43 PM A Systems Approach to Dimensional Modeling in Data Marts By Joseph M. Firestone, Ph.D. White Paper No. One March 12, 1997 OLAP s Purposes And Dimensional Data Modeling Dimensional
More informationThe Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects
The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects Presentation to NMSG-143 20-21 October 2016 Bucharest, Romania Mark G Hazen, DRDC Jon P Lloyd, Dstl
More informationNew Pathways to Effective Communications: SEO, . IlluminAge Communication Partners
New Pathways to Effective Communications: SEO, Email Marketing and Social Media Connie Parsons, President & COO IlluminAge Communication Partners www.illuminage.com connie@illuminage.com Your Audience
More informationTransport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank
WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:
More informationCSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018
DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop
More informationCyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference
Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference Threat of Cyber- Terrorism to Critical Infrastructures Presented by Iyke Ezeugo Cyber-warfare Strategist Definitions
More informationSharing Knowledge for Green Growth
Sharing Knowledge for Green Growth April 7 th, 2014 Howard Bamsey Director-General, Global Green Growth Institute (GGGI) GGGI Who we are GGGI Vision Global Green Growth Institute is a multilateral international
More informationJanice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity
The U.S. Commercial Service Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity Los Angeles, CA October March 3-5, 14, 2009 2010 Why Canada? Largest
More information