Capabilities Statement
|
|
- Harold McKenzie
- 5 years ago
- Views:
Transcription
1 GOVERNMENT INDUSTRY CORPORATE HEALTHCARE Capabilities Statement San Francisco Corporate HQ 419 Mason Street, Suite 207 Vacaville, CA Chicago 953 ½ Logan Avenue Belvidere, IL New York 42 Manor Lane Westbrookville, NY San Francisco Chicago New York
2 Lead The Journey NAICS Codes DUNS Services Minority and Veteran Business Overview A ("Aanko") is a safety and security solution provider focusing on antiterrorism, bioterrorism, and asset protection across the entire business enterprise to meet the needs of Government, Industrial, Corporate and Healthcare clients. The corporation was founded in 1997 as a California certified minority and veteran small business, with an experienced and successful management team. Senior management leadership has increased client safety and security while recovering over 50 million dollars in client corporate assets. Aanko is registered under the following NAICS Codes: Description of Products/Services Primary Security & Safety Consulting Services Engineering Consulting Services Computer Software Analysis And Design Services Computer Systems Design Services Computer Disaster Recovery Services Business Management Consulting Services Logistics Management Consulting Services Environmental Consulting Services R&D In Physical, Engineering, & Life Sciences Professional And Management Development Training Educational Support Services Aanko Technologies has in-depth experience in antiterrorism, bioterrorism, asset protection, physical and cyberthreat assessments, impact analysis and risk mitigation for the business enterprise. We work with clients to develop prevention strategies, response and recovery actions, information safeguards, security enhancements, and employee training to mitigate extreme natural, technical, or human events. Headed by CEO Steve Longoria, a highly decorated Department of Defense antiterrorism expert, and the only person in Department of Defense history officially recognized as the top expert in three different career fields (Antiterrorism, Security, and Safety), Aanko has successfully delivered safety and security projects for the public and private sector. Aanko's corporate office is located in the San Francisco Bay Area suburb of Vacaville, with satellite offices in Chicago and New York. The company is privately funded with ample access to capital on an as needed basis. Inquiries and questions should be addressed to either: Mr. Steve Maggi President steve.maggi@aanko.com Mr. Dean Reed COO dean.reed@aanko.com Steve Longoria s creativity and leadership have resulted in lasting innovations in the antiterrorism field. Lieutenant General Eugene D. Santarelli, United States Air Force (Ret)
3 Experienced Professionals Aanko s team includes over 100 years of combined antiterrorism, bioterrorism, intrusion detection, safety and security experience. They include industrial and information security, computer crime, and physical plant experts, including Microsoft Certified Systems Engineers, Certified Cisco Network Associates, e-commerce/e-business and web development abilities, and cyber crime identification and protection. Our team also includes healthcare infection control experts, engineering and logistics specialists, and intergovernmental affairs analysts to help integrate protective efforts with your business strategies. Aanko has assisted Fortune 500 companies, municipalities, healthcare facilities, police agencies, fire departments, and energy, chemical and aviation industries in cyberthreat and physical site assessments and analysis, emergency response and business continuity planning, process safety management, risk management plans, and employee training. Team members are part of corporate, county and healthcare antiterrorism, safety and security advisory groups throughout the USA. Projects include: Antiterrorism Consultation and Training Bioterrorism Consultation and Training Information Technology (IT) Strategy and Policy Development IT, SCADA & Network Architecture Assessment & Analysis Business Continuity Planning Curriculum Development & Training Research & Development Additional Services Aanko has the technological expertise needed to secure client assets, including people, processes, and data network systems and facilities. Aanko oversees the study, design, development, deployment and management of safety and security systems for a wide range of projects. Business Enterprise Safety & Security Aanko provides independent assessment, analysis, verification, recommendation, implementation and training of all dimensions of a customer's safety & security needs, assisting them to Turn Risk into Revenue. This process addresses the physical, technical and human infrastructure-from network operations centers and distributed network resources, to physical sites and the employees located therein. This seamless integration enables customers to strategically integrate safety & security for infrastructure protection and revenue enhancement. Security Vulnerability Assessments Aanko conducts cost-effective security vulnerability assessments (SVA) using performance-based criteria such as the Center for Chemical Process Safety (CCPS), the America Chemical Council (ACC) Responsible Care Security Code, the Fertilizer Institute Security Code, Sandia Labs methodologies, or our own proprietary Strategic Vulnerability and Productivity Assessment (SVPA). Aanko is certified in the Sandia Risk Assessment Methodology-Water, and team members have conducted private and public sector SVAs for over 22 years, including utilities, water systems, government and corporate facilities, healthcare agencies, chemical industries, airports and banking institutions. "To protect our people and facilities against biological threats, we needed a comprehensive solution. The consultation and training provided by Aanko was the breakthrough we needed. They were great." Del Richardson, Health and Safety Officer, California State Franchise Tax Board
4 Critical Infrastructure Protection Aanko s Supervisory Control and Data Acquisition (SCADA) Vulnerability Profiler (SVP) bridges the gap between cyber and physical security, providing strategies for vulnerability reduction. The SVP offers prioritized steps to cost-effective mitigation by analyzing potential vulnerabilities beyond the scope of a facility's existing assessment, particularly on infrastructure interdependencies (power grid, manufacturing, transportation, communication, water, etc.). Supply Chain Security Audits Our thorough, detailed review of provider-vendor-customer internal controls (all areas-all environments) keep assets from being part of the 30 billion in shrinkage lost annually. They also deter would-be terrorists from gaining access to your infrastructure, as recommended by the Customs Trade Partnership Against Terrorism (C-TPAT) Program. Networking Experience in network management and implementation includes: systems engineering, network management integration, installation, systems administration, training, and help desk support. Services include: configuration, installation, integration, and testing of network backbone elements such as gateways, routers, switches, hubs, bridges, etc., as well as integration of servers and system software. Knowledge Assurance And Security (KAS) Aanko's suite of information security solutions includes assessment and consulting, disaster recovery, intrusion detection, audit and investigation, firewalls, and encryption. All of Aanko s KAS projects comply with the National Institute of Standards and Technology s security programs. Community Outreach Aanko assists in designing, developing and implementing community outreach programs that result in meaningful actions by community members. We help coordinate community communication and training sessions, including large, small, or one-on-one venues. Communities need and want to be actively involved in identifying and solving problems that affect their families, businesses and neighborhoods. Our services help you achieve that goal. Projects Aanko management has extensive experience with safety and security asset protection projects for both private industry and the government. Projects demonstrating the company's capabilities are listed on our website from your computer, simply click on the link below. Aanko Associated Projects Additional information can be provided upon request, or alternatively, directly on the Aanko website located at "We chose Aanko Technologies because of their exceptional knowledge of healthcare issues, engineering systems and emergency planning. Through their in-depth consultation and training, our staff is prepared to respond to and recover from emerging threats." Deborah Sugiyama, President, NorthBay Healthcare Group, Fairfield, CA
5 75 Years of Combined Management Experience Aanko Senior Management Aanko s senior management is skilled in the protection of personnel, information and physical assets. They have worked in the military, public and private sectors, providing critical asset protection at every level of an organization. They include: Steve Longoria Steve is the founder and CEO of Aanko Technologies, Inc. He is a Certified Counterterrorism Planner and a Certified Project Manager. Steve founded the firm in 1997 after a 21 year career in the United States Air Force (USAF), where he gained worldwide recognition as the only person in Department of Defense history to be recognized as the top professional in three different career classifications: Antiterrorism, Security, and Safety. Steve has worked with British, German, Israeli, FBI and American military antiterrorism and counterterrorism experts on assignments throughout his military and private sector career. He has taught international law enforcement and antiterrorism experts as an adjunct instructor at the world-renowned National Crime Prevention Institute, University of Louisville, Louisville, Kentucky. Steve earned a Certificate in Industrial Safety Management from the College of Engineering, University of Washington; a Certificate in Hazardous Materials Management from the University of California, Davis and a Bachelor of Science in Education, Training and Development from Southern Illinois University. Steven Maggi is President of Aanko Technologies. Steve gained a national reputation of innovative environmental outreach projects while working for the City of Burbank, California. Through his leadership, the city was recognized with the 1994 United States Conference of Mayors Best Public Education Program Award. Steve has prepared and assisted in rolling out environment, safety, security and occupational health plans for federal and state governments, counties, municipalities and private sector clients. Steve has taught Media Relations, Public Policy Analysis, and Intergovernmental Relations for National University. Steve earned a MPA (Intergovernmental Affairs), from USC and holds a Juris Doctorate from McGeorge School of Law. Dean Reed is Aanko s Chief Operating Officer. He is a Certified Industrial Technologist and a Certified Internet Business Strategist. Dean was the Chief Executive Officer of Digital Business Solutions, a Business and Information Technology Integration company, prior to joining the firm. He has assisted clients in crafting and facilitating information systems strategies, biothreat management solutions, and industrial technology processes. Dean has taught E-Commerce, Business Information Systems, and other web technology courses for the University of Phoenix. Dean holds a MBA from the University of Phoenix and earned a Bachelor s of Science in Industrial Technology from the College of Engineering, Southern Illinois University. "We needed a high level of expertise to train our plant managers in emergency planning and community integration for our facilities nationwide, and turned to Aanko. Their knowledge and capabilities exceeded our expectations." Ralston Maloney, Engineering Manager, Pioneer Americas, LLC, Houston, TX
California Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationPartnered with API Q2 COMBINED ESSENTIALS AND AUDITING COURSE
Partnered with API Q2 COMBINED ESSENTIALS AND AUDITING COURSE Program Overview This 5-day course provides participants with an in-depth understanding, knowledge, and skills needed to carry out successful
More informationSECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011
American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationLaw Enforcement Commercial Price List ManTech International Corporation August 2017
Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description
More informationMaking plans. An integrated and holistic solution
SPECIAL EDITION INNOVATION+RESILIENCE Vulnerability to cyber hacking is exposing and expensive, and it also has the potential to be highly dangerous. In developing a cyber resilience plan, a collaborative
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationEffective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.
Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationFor providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients...
Resilience Resilience is the ability of a community to maintain its functions in the face of dramatically changed circumstances, including climate change, natural disasters, and aging infrastructure. Recent
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationThreat and Vulnerability Assessment Tool
TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationAdvanced Concepts & Technologies International, LLC
Advanced Concepts & Technologies International, LLC Advanced Concepts and Technologies International, L.L.C. (ACT I) has been providing solutions for high profile military programs such as the U.S. Navy
More informationAnnual Report for the Utility Savings Initiative
Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page
More informationSOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE
SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SECURE AIRBORNE CONNECTIVITY: OVERVIEW Gogo Business Aviation realizes the ever-pressing need to be vigilant in staying ahead of potential
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL
ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL ENGINEERING SYSTEMS INTEGRATION ELECTRONIC DATA MANAGEMENT PROJECT
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationEnergy Assurance Plans
Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationUnderstanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents
Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationQUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES
QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES WHO WE ARE Founded in 2014 Headquartered in Frederick County, MD Registered in the System for Award Management (SAM) Women's
More informationThe J100 RAMCAP Method
The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationRISK MANAGEMENT Education and Certification
RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities
More informationBusiness Continuity Planning
Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and
More informationCritical Infrastructure Assessment
Critical Infrastructure Assessment Everyday the products and services that support our standard of living flow, almost seamlessly, to and from our homes, communities, and government. Making this possible
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationIntroduction to the National Response Plan and National Incident Management System
Introduction to the National Response Plan and National Incident Management System This presentation will cover: Homeland Security Presidential Directive (HSPD)-5 National Incident Management System (NIMS)
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationDHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs
DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure
More informationCapabilities Statement W. Catawba Ave Cornelius NC (704) Phone (800) Fax
Capabilities Statement 18708 W. Catawba Ave Cornelius NC 28031 (704) 255-6145 Phone (800) 928-5430 Fax www.qtg-llc.com Company Overview Quantum Technology Group, LLC is a Service Disabled Veteran owned,
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationPersonnel Certification
Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationCorporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates
Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase
More informationThe Age of Heightened Security
The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering
More informationYour Trusted Advisors in the Oil and Gas Industry API Q2 SPECIFICATION & TECHNICAL APPLICATION FOR LEAD AUDITOR. Version 1.0
Your Trusted Advisors in the Oil and Gas Industry API Q2 SPECIFICATION & TECHNICAL APPLICATION FOR LEAD AUDITOR Version 1.0 Program Overview This course provides participants with an in-depth understanding,
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationHomeland Security and Geographic Information Systems
Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationYour Trusted Advisors in Oil and Gas Industry API Q1 ESSENTIALS & AUDITING COURSE
Your Trusted Advisors in Oil and Gas Industry API Q1 ESSENTIALS & AUDITING COURSE Program Overview This course provides participants with an in-depth understanding, knowledge, and skills needed to carry
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationAAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018
AAPA Smart Ports Cyber Management for Ports Panel Small Port Cyber Security Workshops March 6, 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Port Infrastructure Development More
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationYour Trusted Advisors in Oil and Gas Industry API Q1 TECHNICAL APPLICATION FOR LEAD AUDITOR
Your Trusted Advisors in Oil and Gas Industry API Q1 TECHNICAL APPLICATION FOR LEAD AUDITOR Program Overview This course provides participants with an in-depth understanding, knowledge, and skills needed
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationNCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time
NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationCYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM
CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationDefense in Depth Security in the Enterprise
Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationEmergency Management & Disaster Planning
Emergency Management & Disaster Planning What we re going to talk about What is Emergency Management and Disaster Planning? What are the key elements of an EM Plan? Where does the University Architect
More informationLeslie W. Hicks! 221 Pasture Lane! Winchester, VA 22602! (540) (540) !
Leslie W. Hicks 221 Pasture Lane Winchester, VA 22602 (540)-667-8404 (540)-336-8863 OBJECTIVE To continue a career in Information Technology that will allow me to use my experience, and expand on my professional
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of
More informationCritical Infrastructure
Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and
More informationFIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates
Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking
More informationAPICS Certified Supply Chain Professional (CSCP) Presented by Chicago Chapter of APICS 8/7/2012
APICS Certified Supply Chain Professional (CSCP) Presented by Chicago Chapter of APICS 8/7/2012 Agenda 1. Opening and introductions 2. What is CSCP 3. How will CSCP designation help you 4. Eligibility
More informationROJECT ANAGEMENT PROGRAM AND COURSE GUIDE
ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,
More informationThe U.S. Manufacturing Extension Partnership - MEP
The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/
More informationMDCSystems. MICHAEL A. BAKER, P.E., M.S.E.M. Consulting Engineer
MDCSystems Providing Expert Solutions for Projects Worldwide MICHAEL A. BAKER, P.E., M.S.E.M. Consulting Engineer Education Drexel University, M.S., Engineering Management, Technology Assessment Brown
More informationCould the BIGGEST Threat to Your Business be INSIDE Your Company?
Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationImpact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella
Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers J. Kelly Stewart Steve Oplinger James Marcella 1 Session Description What exactly does a risk assessment mean to the integrator
More informationCanada Green Building Council - Greater Toronto Chapter 3-Year Strategic Plan, BUILDING MOMENTUM 3-YEAR STRATEGIC PLAN ( )
Canada Green Building Council - Greater Toronto Chapter BUILDING MOMENTUM 3-YEAR STRATEGIC PLAN (2017-2019) Canada Green Building Council - Greater Toronto Chapter Preface About the Canada Green Building
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationCybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
More informationCenter for Audit Excellence Capability Statement
Center for Audit Excellence Capability Statement On October 1, 2015, the U.S. Government Accountability Office launched the Center for Audit Excellence. The Center s mission is to promote good governance
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationAddressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting
Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in
More information