Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation

Size: px
Start display at page:

Download "Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation"

Transcription

1 Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation Corey Lofdahl Frank Witmer Prepared for the conference on, Human Security in The New Information Age: How Social Media Impacts Military Missions, Government to Government Coordination, and International Relationships October 8-9, 2013 Renaissance Hotel Brussels, Belgium

2 Social Media The use of social media has exploded Facebook Twitter LinkedIn Etc. It s hard to access social media data due to privacy concerns Data is necessary for social media tool and analysis algorithm development Data is owned by private companies Naïve solution: anonymize datasets by removing personally identifiable information (PII) 2 of 15

3 Anonymized and Anonymous Datasets Some anonymized datasets have been made available Anonymized datasets have had their personal data removed De-anonymization attacks leverage similar structure from similar networks to re-instantiate anonymized data De-anonymization attacks make companies even more leery and cautious about sharing their data Generating anonymous networks would be useful Anonymous networks are impossible to de-anonymize Could generate networks of a certain size or type to test algorithms Research Question: How to generate anonymous networks? 3 of 15

4 Synthetic, Anonymous Network Challenge(s) The three main technical challenges to support the generation of synthetic, anonymous networks: 1. Must be rooted in complex human social behavior as represented by social and behavioral theories 2. Synthetic and real-world networks must be comparable 3. Significant differences will exist between real and synthetic networks Some form of guidance, process, or tool must be provided to improve the quality of generated synthetic networks 4 of 15

5 Development Goals 1. Generate synthetic anonymous networks Based on behavioral antecedents 2. Understand evolution of empirical networks Based on network comparisons 3. Use network simulation to inform GIS-based visualizations and operational support representations Enables strategic analysis Enables HA/DR analysis I.e., apply limited resources 5 of 15

6 Subject Matter: Methodology: Strategic Special Operations Dark Networks Strategic Special Operations Forces (SOF) are tactically excellent Achieving strategic effects remains an opportunity System dynamics (SD) simulation supports strategic analysis over time but not space Network models characterize space but not time Agent-Based (AB) simulations that incorporate social network (ABSN) representations can characterize system change over space and time Using dark (insurgent, criminal, terrorist) network disruption as a use case 6 of 15 Use dark networks to inform strategic analysis

7 Special Operations and Network Analysis Tactical Kinetic Based on centrality metrics Focused on changes to few nodes Short-term Strategic Non-kinetic Based on richer set of metrics and diffusion models Focused on changes to multiple links (influence) Long-term 7 of 15

8 Tactical Centrality and Node Removal Analysis 8 of 15 Methodology drives kinetic tactics (Everton 2013)

9 Strategic Methodology: AB and SD Model Specification Overview, Design concepts, & Details (ODD) Purpose Entities, states variables, and scales Process overview and scheduling Design concepts Basic principles Interaction Emergence Stochasticity Adaptation Collectives Objectives Observation Learning Prediction Sensing Initialization Input data Submodels SD Reference Mode State theory State ancillary theory Identify 7/-2 variables Graph them over time Postulate causality Create model Run, test, iterate 9 of 15 Specify hard AB models with simple SD models

10 Moving from SD to AB Model Specification SD: (1) causality and (2) meta-networks income resources expenditures legitimacy tech investment investment recruits technology infrastructure Member Networks Dark Network Capacity - tech depreciation - depreciation - attrition system shock Integrated AB: Member Networks Differentiated 10 of 15 Move from aggregate to disaggregated models

11 Macrodynamics from Microstructure Macrodynamics Microstructure Integrated Efficiency Member Networks Differentiated Robustness Structural disaggregation impacts dynamics 11 of 15

12 Aggregate Dark Network AB Analysis 3 insurgencies modeled with varying network distributions from integrated to differentiated: Integrated networks are efficient and nonresilient Differentiated networks are inefficient and robust Robust Rebounding Nonresilient 12 of 15 System structure drives dynamics

13 Next Steps: Implementing Strategic Network Analysis SD used to specify AB models Explicit causality Meta-networks (Carley) Social media one of many networks Aggregate system behavior AB used to disaggregate stocks and specify networks Characterize network shape Specify flows in terms of network growth and decay I.e., attachment & detachment income resources Integrated expenditures legitimacy tech investment investment recruits technology infrastructure Member Networks Dark Network Capacity - tech depreciation - depreciation - attrition system shock Differentiated AB results validated against, (1) Behavioral theory (2) Aggregate SD results (3) Empirical reference networks 13 of 15

14 Conclusions SD used to specify aggregate system behavior over time AB leverages networks to model systems over time and space 14 of 15 Anonymous network generation Network evolution Spatial visualization Resulting capability ultimately will enable, Strategic SOF analysis HA/DR analysis I.e., achieving strategic, geographically distributed effects with limited resources

15 Contact Information Charles River Analytics Inc. 625 Mount Auburn Street Cambridge, MA Voice: Fax: Dr. Corey Lofdahl x of 15

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new

More information

Resilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate

Resilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate Resilience at JRC Naouma Kourti Dep. Head of Unit Technology Innovation in security Security, Space and Migration Directorate The Joint Research Centre at a glance 3000 staff Almost 75% are scientists

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

Real estate predictions 2017 What changes lie ahead?

Real estate predictions 2017 What changes lie ahead? Real estate predictions 2017 What changes lie ahead? Cyber Risk 2017. For information, contact Deloitte Consultores, S.A. Real Estate Predictions 2017 2 Cyber Risk Rising cyber risk in real estate through

More information

Towards a Theory of Cyberpower

Towards a Theory of Cyberpower Towards a Theory of Cyberpower Franklin Kramer, Stuart Starr, Larry Wentz, Eli Zimet CTNSP, NDU Dan Kuehl IRMC, NDU June, 2007 Agenda Context Goal, Objectives Framework Selected Observations Summary For

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications MINFS544: Business Network Data Analytics and Applications Feb 21 th, 2017 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Redmond Facilities Strategic Management Plan Overview

Redmond Facilities Strategic Management Plan Overview Redmond Facilities Strategic Management Plan Overview Project Purpose + Provide guidance on how to best operate, maintain, and upgrade facilities now and in the future + Optimize maintenance staffing and

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Cyber Threat Landscape April 2013

Cyber Threat Landscape April 2013 www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve

More information

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices

More information

The CORD reference architecture addresses the needs of various communications access networks with a wide array of use cases including:

The CORD reference architecture addresses the needs of various communications access networks with a wide array of use cases including: Introduction Today s Mobile Network Operator (MNO) infrastructure is built with proprietary vertically integrated Network Elements (NEs), leading to inefficient utilization of network resources. Further,

More information

Availability in the Modern Datacenter

Availability in the Modern Datacenter Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending

More information

Hierarchy of knowledge BIG DATA 9/7/2017. Architecture

Hierarchy of knowledge BIG DATA 9/7/2017. Architecture BIG DATA Architecture Hierarchy of knowledge Data: Element (fact, figure, etc.) which is basic information that can be to be based on decisions, reasoning, research and which is treated by the human or

More information

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector

More information

Research & Innovation

Research & Innovation Research & Innovation Dr. Jai Ganesh Principal Research Scientist Agenda Infosys overview Research @ Infosys Sample case study Evolution over the years Emerging models for R&D collaboration 2010 Infosys

More information

Multi-method modeling

Multi-method modeling Multi-method modeling Dr. Andrei Borshchev CEO, The AnyLogic Company andrei@anylogic.com UNSW Sydney, February 2013 The AnyLogic Company www.anylogic.com The three methods in simulation modeling The three

More information

Privacy Policy KPMG Australia

Privacy Policy KPMG Australia December 2018 Introduction KPMG Australia is committed to treating the personal information we collect in accordance with the Australian Privacy Principles in the Privacy Act 1988 (Cth) (the Privacy Act).

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY

THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY SESSION ID: TV-T05 THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY Jason H. Rivera Manager Cyber Threat Intelligence Deloitte & Touche LLP Twitter Handle: @Jason_JHR How well do we understand the Dark Web?

More information

Dynamic Context Maintenance in Human Terrain

Dynamic Context Maintenance in Human Terrain Distribution A: Approved for public release; distribution is unlimited. Dynamic Context Maintenance in Human Terrain July 14, 2009 Nadya Belov, Jeff Patti, and Angela Pawlowski Lockheed Martin Advanced

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,

More information

The enabling role of geospatial information in the European energy policies

The enabling role of geospatial information in the European energy policies The European Commission s science and knowledge service Joint Research Centre The enabling role of geospatial information in the European energy policies Francesco Pignatelli Kehl (DE), 5 September 2017

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

DATA MINING AND WAREHOUSING

DATA MINING AND WAREHOUSING DATA MINING AND WAREHOUSING Qno Question Answer 1 Define data warehouse? Data warehouse is a subject oriented, integrated, time-variant, and nonvolatile collection of data that supports management's decision-making

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

The Task of the Mapping of Privacy by Design (PbD) Principles to Software Engineering s UML Standard: A Starter Document Dawn N.

The Task of the Mapping of Privacy by Design (PbD) Principles to Software Engineering s UML Standard: A Starter Document Dawn N. The Task of the Mapping of Privacy by Design (PbD) Principles to Software Engineering s UML Standard: A Starter Document Dawn N. Jutla Introduction The purpose of this task is to allow privacy policymakers,

More information

ISF Threat Horizon: Cybercrime and the banking industry

ISF Threat Horizon: Cybercrime and the banking industry ISF Threat Horizon: Cybercrime and the banking industry Dr Adrian Davis, PhD, MBA, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda: External threats Regulatory threats Internal

More information

How to Select the Right Marketing Cloud Edition

How to Select the Right Marketing Cloud Edition How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire

More information

Student Handbook Master of Information Systems Management (MISM)

Student Handbook Master of Information Systems Management (MISM) Student Handbook 2018-2019 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of Information Systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Analytic

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

The Power of the Crowd

The Power of the Crowd WHITE PAPER The Power of the Crowd SUMMARY With the shift to Software-as-a-Service and Cloud nearly complete, organizations can optimize their end user experience and network operations with the power

More information

OTA Strategic Update Building & Amplifying April 5, 2017

OTA Strategic Update Building & Amplifying April 5, 2017 OTA Strategic Update Building & Amplifying April 5, 2017 Reminders OTA Members Only Chatham House Rules Will be Recorded for Member Access Updated 4/7/17 OTA Strategic Update Building & Amplifying Craig

More information

Data Mining: Approach Towards The Accuracy Using Teradata!

Data Mining: Approach Towards The Accuracy Using Teradata! Data Mining: Approach Towards The Accuracy Using Teradata! Shubhangi Pharande Department of MCA NBNSSOCS,Sinhgad Institute Simantini Nalawade Department of MCA NBNSSOCS,Sinhgad Institute Ajay Nalawade

More information

Department of Defense. Installation Energy Resilience

Department of Defense. Installation Energy Resilience Department of Defense Installation Energy Resilience Lisa A. Jung DASD (Installation Energy) OASD(Energy, Installations and Environment) 19 June 2018 Installation Energy is Energy that Powers Our Military

More information

Reshaping the future, shifting business and operating models

Reshaping the future, shifting business and operating models Safe Harbor Certain statements mentioned in this presentation concerning our future growth prospects are forward-looking statements regarding our future business expectations intended to qualify for the

More information

The Confounding Problem of Private Data Release

The Confounding Problem of Private Data Release The Confounding Problem of Private Data Release Divesh Srivastava AT&T Labs-Research Acknowledgments: Ramón, Graham, Colin, Xi, Ashwin, Magda This material represents the views of the individual contributors

More information

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats www.pwc.co.uk/informationsecurity The Cyber Savvy CEO Getting to grips with today s growing cyber-threats Unprecedented opportunities The cyber domain is a world of opportunity yet media coverage of attacks

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 3 - Data Classification Processes and Models Readings In the News MIS5206 Week 3 Data Classification Processes and Models Test Taking Tip Quiz Readings Vacca Chapter

More information

New Guidance on Privacy Controls for the Federal Government

New Guidance on Privacy Controls for the Federal Government New Guidance on Privacy Controls for the Federal Government IAPP Global Privacy Summit 2012 March 9, 2012 Dr. Ron Ross Computer Security Division, NIST Martha Landesberg, J.D., CIPP/US The Privacy Office,

More information

The Windstream Enterprise Advantage for Banking

The Windstream Enterprise Advantage for Banking The Windstream Enterprise Advantage for Banking Creating trusted banking experiences with secure, cloud-optimized network and communications so you can focus on your customers. Customer centricity is a

More information

The Definitive Guide to Preparing Your Data for Tableau

The Definitive Guide to Preparing Your Data for Tableau The Definitive Guide to Preparing Your Data for Tableau Speed Your Time to Visualization If you re like most data analysts today, creating rich visualizations of your data is a critical step in the analytic

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY MEMORANDUM OF UNDERSTANDING between the MINISTERIO DE ELECTRICIDAD Y ENERGIA RENOVABLE DEL ECUADOR and the INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY This Memorandum of Understanding

More information

DoD Software Assurance (SwA) Update

DoD Software Assurance (SwA) Update DoD Software Assurance (SwA) Update Systems and Software Technology Conference May 2, 2006 Ms. Kristen Baldwin OUSD(AT&L)/Defense Systems kristen.baldwin@osd.mil Briefing Agenda Problem Definition Vision

More information

Digital Forensics as a Big Data Challenge

Digital Forensics as a Big Data Challenge Digital Forensics as a Big Data Challenge Bruxelles, October 23rd 2013 Alessandro Guarino CEO, StudioAG Slide 1 of 20 Digital Forensics 1 DFRWS definition 2001 Digital Forensics is the use of scientifically

More information

Adversary Playbooks. An Approach to Disrupting Malicious Actors and Activity

Adversary Playbooks. An Approach to Disrupting Malicious Actors and Activity Adversary Playbooks An Approach to Disrupting Malicious Actors and Activity Overview Applying consistent principles to Adversary Playbooks in order to disrupt malicious actors more systematically. Behind

More information

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines SOFTWARE as a Service PLATFORM as a Service INFRASTRUCTURE as a Service Empower Users Develop Apps Manage Machines 2013 2009 $2.9B $5.7B $6.9B $13.3B $14.0B $17.6B By 2014, cloud computing services will

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Mediterranean Nautilus Greece S.A. Cloud Solutions

Mediterranean Nautilus Greece S.A. Cloud Solutions Mediterranean Nautilus Greece S.A. Cloud Solutions Arturo Danesi CEO MN Greece S.A. (Athens April 23, 2013) Agenda Cloud Computing: What does it really mean? Impacts on the Greek Economy MedNautilus Cloud

More information

INFRASTRUCTURE. A Smart Strategy Global Water Asset Management Lead, Ove Arup NYC FORUM -

INFRASTRUCTURE. A Smart Strategy Global Water Asset Management Lead, Ove Arup NYC FORUM - SMART INFRASTRUCTURE A Smart Strategy Ian.gray@arup.com Global Water Asset Management Lead, Ove Arup FORUM - NYC What I ll Cover Context Developing a Smart Strategy Step 1 Develop a resilience strategy

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved. The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,

More information

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users For the past 30 years, enterprise communications have been built around the personal computer,

More information

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing 2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing Powered by the Retail ISAC, A Division of the R-CISC Overview Last October,

More information

The J100 RAMCAP Method

The J100 RAMCAP Method The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health

More information

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:

More information

Dell helps you to simplify IT

Dell helps you to simplify IT Dell helps you to simplify IT Workshops the first step Reduce desktop and data centre complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2010 Introduction How can you protect

More information

Tracking 101 DISCOVER HOW TRACKING HELPS YOU UNDERSTAND AND TRULY ENGAGE YOUR AUDIENCES, TURNING INTO RESULTS

Tracking 101 DISCOVER HOW  TRACKING HELPS YOU UNDERSTAND AND TRULY ENGAGE YOUR AUDIENCES, TURNING  INTO RESULTS Email Tracking 101 DISCOVER HOW EMAIL TRACKING HELPS YOU UNDERSTAND AND TRULY ENGAGE YOUR AUDIENCES, TURNING EMAIL INTO RESULTS SUMMARY 2 INTRODUCTION TO EMAIL TRACKING 3 WHAT IS EMAIL TRACKING? 4 WHAT

More information

Transforming the Data Center Lenovo. All rights reserved.

Transforming the Data Center Lenovo. All rights reserved. Transforming the Data Center Lenovo Data Center Group A global technology company with 55,000 employees supporting customers in over 160 countries to deliver PC, Mobile, and Data Center solutions Data

More information

CONE 2019 Project Proposal on Cybersecurity

CONE 2019 Project Proposal on Cybersecurity CONE 2019 Project Proposal on Cybersecurity Project title: Comprehensive Cybersecurity Platform for Bangladesh and its Corporate Environments Sector or area: Cybersecurity for IT, Communications, Transportation,

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

The API Economy in a Mobile World What are we talking about?

The API Economy in a Mobile World What are we talking about? IBM BusinessConnect A New Era of Thinking The API Economy in a Mobile World What are we talking about? Frank van der Wal Human Being Digital Transformation Specialist thewall@nl.ibm.com @thewalls 1 2016

More information

ISG Provider Lens TM

ISG Provider Lens TM ISG Provider Lens TM 2019 Definition Facebook s data leakage affair attracted the public s attraction to data security again. This is a very striking example for an unwanted use of data, but not comparable

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY

More information

Combining Multi-Agent System modeling and System Dynamics modeling

Combining Multi-Agent System modeling and System Dynamics modeling Combining Multi-Agent System modeling and System Dynamics modeling Ernst Gebetsroither - Austrian Institute of Technology Outline Different methodological approaches System Dynamics approach Multi-agent

More information

Tackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief

Tackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief Tackling Crime, Protecting Citizens and Assisting First Responders IN COLLABORATION WITH A Frost & Sullivan Executive Brief Information and Communications Technology 50 Years of Growth, Innovation and

More information

Acurian on. The Role of Technology in Patient Recruitment

Acurian on. The Role of Technology in Patient Recruitment Acurian on The Role of Technology in Patient Recruitment Wearables smartphones social networks the list of new technological tools available to patients and healthcare providers goes on and on. Many clinical

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Part of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge

Part of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge Part of the complete suite of itracs award-winning DCIM capabilities DCIM Software itracs CPIM : Mastering the Connectivity Challenge itracs CPIM Intelligence. Automation. Insight. Impact! Business Value

More information

Smart Cities and Security. Security - 1

Smart Cities and Security. Security - 1 Smart Cities and Security Security - 1 Where are we in 2013? Security - 2 Where are we in 2050? Security - 3 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security

More information

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the

More information

Last updated January 29, Approved by ECC March 3, 2015

Last updated January 29, Approved by ECC March 3, 2015 Last updated January 29, 2015 Approved by ECC March 3, 2015 ASHRAE Electronic Communications Strategic Plan Electronic Communications Committee (ECC) January 2015 Electronic Communications Committee Strategic

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

Examining Cooperative Strategies through Cyber Exercises

Examining Cooperative Strategies through Cyber Exercises Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict

More information

Promoting Accuracy Through Data Quality: The UC Data Validation Framework

Promoting Accuracy Through Data Quality: The UC Data Validation Framework Promoting Accuracy Through Data Quality: The UC Data Validation Framework University of California Office of the President OFFICE OF INSTITUTIONAL RESEARCH & ACADEMIC PLANNING [IRAP] CAIR 2016 Conference

More information

A Systems Approach to Dimensional Modeling in Data Marts. Joseph M. Firestone, Ph.D. White Paper No. One. March 12, 1997

A Systems Approach to Dimensional Modeling in Data Marts. Joseph M. Firestone, Ph.D. White Paper No. One. March 12, 1997 1 of 8 5/24/02 4:43 PM A Systems Approach to Dimensional Modeling in Data Marts By Joseph M. Firestone, Ph.D. White Paper No. One March 12, 1997 OLAP s Purposes And Dimensional Data Modeling Dimensional

More information

The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects

The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects Presentation to NMSG-143 20-21 October 2016 Bucharest, Romania Mark G Hazen, DRDC Jon P Lloyd, Dstl

More information

New Pathways to Effective Communications: SEO, . IlluminAge Communication Partners

New Pathways to Effective Communications: SEO,  . IlluminAge Communication Partners New Pathways to Effective Communications: SEO, Email Marketing and Social Media Connie Parsons, President & COO IlluminAge Communication Partners www.illuminage.com connie@illuminage.com Your Audience

More information

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:

More information

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018 DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop

More information

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference Threat of Cyber- Terrorism to Critical Infrastructures Presented by Iyke Ezeugo Cyber-warfare Strategist Definitions

More information

Sharing Knowledge for Green Growth

Sharing Knowledge for Green Growth Sharing Knowledge for Green Growth April 7 th, 2014 Howard Bamsey Director-General, Global Green Growth Institute (GGGI) GGGI Who we are GGGI Vision Global Green Growth Institute is a multilateral international

More information

Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity

Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity The U.S. Commercial Service Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity Los Angeles, CA October March 3-5, 14, 2009 2010 Why Canada? Largest

More information