KEYNOTE: NNSA S STRATEGIES FOR ENHANCING NATIONAL SECURITY AND REDUCING THE GLOBAL DANGER FROM WEAPONS OF MASS DESTRUCTION

Size: px
Start display at page:

Download "KEYNOTE: NNSA S STRATEGIES FOR ENHANCING NATIONAL SECURITY AND REDUCING THE GLOBAL DANGER FROM WEAPONS OF MASS DESTRUCTION"

Transcription

1 FOCUS DAY OCTOBER 22, :45 CHAIRPERSON S WELCOMING REMARK 9:00 9:30 KEYNOTE: NNSA S STRATEGIES FOR ENHANCING NATIONAL SECURITY AND REDUCING THE GLOBAL DANGER FROM WEAPONS OF MASS DESTRUCTION The Honorable Lisa Gordon Hagerty, Under Secretary for Nuclear Security, U.S. Department of Energy MORNING REFRESHMENT BREAK Take a few minutes to recharge yourself before we jump into the next set of information packed sessions 9:45 10:15 TRACK A: BORDER SECURITY Michael Fisher, Former Chief of U.S. Border Patrol, U.S. Customs and Border Protection KEYNOTE: INL S PRIORITIES FOR COUNTERING TRANSNATIONAL CRIME AND PREVENTING THE TRAFFICKING OF ILLICIT DRUGS Fulfilling Executive Order Advancing border security with land and aerial technology Updates on progress of installing a physical barrier The Honorable Kirsten D. Madison Assistant Secretary (INL) Bureau of International Narcotics and Law Enforcement Affairs U.S. Department of State UAS AND AERIAL SYSTEMS TO STRENGTHEN FORCE PROTECTION Deploying technology to enhance Border Patrol s domain awareness capabilities Leveraging UAS to enhance capabilities and efficiencies at the borders Remote Piloted Aircraft training and development TRACK B: CYBER SECURITY & CRITICAL INFRASTRUCTURE Stewart Baker, Former General Counsel for the National Security Agency and Former Assistant Secretary for Policy at the Department of Homeland Security ARE CYBER SECURITY AND INTEROPERABILITY THE MISSING LINKS IN THE BLOCKCHAIN? Determining if Blockchain is the right technology for a high value applications Security and Interoperability lessons from DHS Blockchain R&D and Implementations Preventing walled gardens to ensure a secure, competitive and interoperable marketplace Antonio Villifana, Chief Information Officer, Office of Health Affairs / Countering Weapons of Mass Destruction (CWMD) Anil John, Cybersecurity R&D Program Manager, U.S. Department of Homeland Security PREVENTING AND COMBATING EVOLVING FUTURE CYBER ATTACKS WITH BLOCKCHAIN Decentralizing a system and being proactive in cyber security defenses Distributing databases and making it harder for a hacker to attack Preventing information security breaches by having information stored on the front end 10:45 MORNING REFRESHMENT BREAK Take a few minutes to recharge yourself before we jump into the next set of information packed sessions

2 FOCUS DAY 11:00 11:45 PRIORITIES FOR EQUIPPING THE FRONTLINE AND MISSION SUPPORT WITH THE OPERATIONAL CAPABILITIES REQUIRED TO HANDLE THE INCREASED WORKLOAD Overview on HSI s priorities and future planning Training a ready workforce to combat criminal organizations illegally exploiting America s travel, trade financial and immigration systems Investing in technology and equipment that supports the mission and enhances efficiencies Derek Benner, (A) Executive Associate Director, Homeland Security Investigations Immigration and Customs Enforcement PRIORITIES FOR EXPANDING THE NATIONAL TARGETING CENTER Identifying cargo that poses a high risk to U.S. security Partnering with USPS and commercial express carriers to target possible contraband coming into the country Strategies and future plans to prevent drug smuggling and illegal migration Tom Overacker, Executive Director for Cargo and Conveyance Security (CCS), National Targeting Center CIO PANEL: PRIORITIES FOR PROTECTING OUR NATION S INFRASTRUCTURE Understanding cybersecurity framework and plans for managing cybersecurity risks to systems, assets, data and capabilities Assessing risks, formulating a risk management strategy and identifying solutions Training, developing and retaining a talented workforce Kevin Nally, Chief Information Officer, U.S. Secret Service Max Everett, Chief Information Officer, U.S. Department Energy IMPLEMENTING THE APPROPRIATE SAFEGUARDS TO ENSURE DELIVERY OF CRITICAL INFRASTRUCTURE SERVICES Policy that supports a proactive vs reactive approach to cybersecurity threats Developing private public partnerships that support the cyber intelligence sharing and cooperation Understanding the unique challenges and threat landscape at each level of government Lieutenant General Daniel Hokanson, Vice Chief, National Guard 12:30 NETWORKING LUNCHEON All the morning hustle and bustle has probably made for a much- needed lunch break! Join us for a delicious lunch and make new friends at your table. 1:15 DETERRING, DETECTING AND INTERDICTING SMUGGLING ALONG THE TEXAS/MEXICO BORDER Deploying technology to detect and deter transnational crime networks Increasing personnel to deter operations of smuggling and illegal trafficking of drugs Sustaining border security operations and provide support to federal agencies and partners Colonel Steven C. McCraw, Executive Director & Director of Texas Homeland Security, Texas Department of Public Safety BRIDGING THE GAP BETWEEN RESEARCH AND THE MARKET PLACE Identifying and investing in technology to support cyber security S&T Strategies on accelerating technology maturity and creating partnerships with the private sector and venture community Dr. Nadia Carlsten, Program Manager, Transition to Practice (TTP) Science & Technology Branch, U.S. Department of Homeland Security

3 FOCUS DAY 2:00 PREVENTING THE TRAFFICKING OF ILLICIT DRUGS AND PRECURSOR CHEMICALS INTO THE US Joint task force s AOR and US and international partners Disrupting transnational criminal organizations and defending the homeland Detecting, identifying and tracking smuggling operations Mark Stainbrook, Chief, San Diego Harbor Police ENTERPRISE RISK MANAGEMENT (ERM) PROVIDES A SIGNIFICANT BENEFIT TO THE TRANSPORTATION SECURITY Administration by allowing us the opportunity to: Routinely review risk mitigation progress Determine whether to mitigate or accept specific risks Provide senior leadership informed decision making Respond to risk more quickly Recover from manifested risks more rapidly Jerry Booker, Director, Risk Management Division, Office of the Chief Risk Officer, TSA 2:30 AFTERNOON REFRESHMENT BREAK Take a few minutes to recharge yourself before we jump into the next set of information packed sessions 3:00 3:45 ENFORCEMENT S ROLE IN COUNTERING OUR NATION S LATEST DRUG THREAT The impact of prescription opiods and the illicit manufactures of synthetic opiods like Fetanyl Controlling the supply chain and preventing drug smuggling Identifying illicit finance links to other Transnational Organized Crime Networks SSA Milton A. Tyrrell, Supervisory Special Agent Synthetic Drugs & Chemicals Section, Diversion Control Divisions, DEA INCREASING OPERATIONAL SUSTAINMENT AT THE NORTHERN AND SOUTHERN BORDERS Tackling visa fraud, human smuggling and terrorist threats Understanding the tools and resources needed to increase operational sustainment Tracking and detecting threats with different environmental landscapes MAINTAINING RESILIENCY BY RECRUITING TOP TALENT How is the federal government incentivizing and recruiting the next generation of cyber security professional? What on the job training and professional development is being offered to retain top talent? Meeting the increasing demand and opportunities for IT when their is a limited number professionals in the space ADDRESSING CYBER THREATS TO THE FINANCIAL SECTOR TO PROTECT AGAINST ECONOMIC UNREST Identifying and locating international cyber criminals Strengthening infrastructure to deter and protect against bank fraud, data breaches, and financial district intrusion Sharing information and cyber intelligence to prevent cybercrimes 4:30 CLOSING REMARKS 4:45 END OF FOCUS DAY

4 MAIN SUMMIT DAY ONE OCTOBER 23, :00 REGISTRATION & COFFEE 8:30 CHAIRPERSON S OPENING REMARKS 8:45 9:15 KEYNOTE PRESENTATION: SECURING AMERICA IN TIMES OF GLOBAL INSTABILITY Delivering actionable intelligence Countering attacks of terrorism nationally and abroad Priorities for combating future advanced threats DATA COLLABORATION AT THE ENTERPRISE LEVEL WITHOUT COMPROMISING GOVERNANCE Team driven analytics and data socialization Delivering an enterprise that enhances information sharing across agencies Strengthening operations to rapidly generate intelligence Major General Leroy R. Goff III (R), U.S. Army 9:45 KEYNOTE: DHS S PRIORITIES FOR COUNTERING WEAPONS OF MASS DESTRUCTION BY ENHANCING DETECTION CAPABILITIES The Honorable James McDonnell, Assistant Secretary, Countering Weapons of Mass Destruction Office, U.S. Department of Homeland Security 10:15 MORNING NETWORKING BREAK IN OUR CAPABILITIES CENTER Your time is valuable so we have streamlined the process identifying new technologies that will help your organization take resiliency to the next level. During this break, attendees will meet our select industry partners in 5-7 minute intervals. You never know, you may find an industry partner solution you never knew you needed! TRACK A TRACK B TRACK C 11:00 LEADING THE IC S EFFORTS TO INTEGRATE ACQUISITION AND PROCUREMENT INITIATIVES Providing oversight to our National Intelligence Programs (NIP) Measuring the ROI on innovative technologies to support missions Strategies and plans to enhance information sharing across the IC The Honorable Everette Jordan, Deputy Assistant Secretary, For Intelligence Community Integration, U.S. Department of Treasury PRIORITIES FOR ADVANCING NATIONAL SECURITY Leveraging AI and applications to combat terrorism Understanding how behavioral patterns supports law enforcement agencies Identifying patterns and taking preventative measures Charles H. Kable IV, Executive Assistant Director Terrorist Screening Center, Federal Bureau of Investigation FUTURE PLANNING FOR THE UNPREDICTABLE Understanding what resources agencies will need to provide support in the wake of a natural disaster Developing scalable, flexible, and adaptable concepts in recovery operations Planning for the disasters when it is a cycle of natural disaster like what we experienced last Fall Daniel Kaniewski, Phd, Deputy Administrator, FEMA

5 MAIN SUMMIT DAY ONE DRIVING INTELLIGENCE TO MEET FUTURE PRIORITIES OF THE NATION S DECISION MAKERS LAW ENFORCEMENT IN URBAN ENVIRONMENTS AND ENSURING PUBLIC SAFETY SHIELDING THE FINANCIAL SECTOR FROM ATTACKS TO PROTECT AGAINST ECONOMIC UNREST 11:45 The role of IoT in layering open sources to generate actionable intelligence Identifying tools and applications to enhance filtering through large data sets Assessing and evaluating data s reliability, validity and relevance Large crowd gatherings and how video surveillance can keep cities safe Developing safe cities and the evolving role of AI and machine learning Physical security tools and equipment to support operations Identifying and locating international cyber criminals Protecting against bank fraud, data breaches, and financial district intrusion Partnering with other agencies to achieve cyber crime prevention 12:15 NETWORKING LUNCHEON Hungry? So are we! Sit down to a tasty meal while discussing the topics so far and what s to come in the day. INTERACTIVE DISCUSSION GROUPS During this part of the conference, delegates will have the opportunity to take part in interactive discussions around the topics below. Each Attendee will have the opportunity to select three topics and will rotate between their choices every 30 minutes. Discussion groups are kept small to ensure all attendees get the opportunity to ask their most pressing questions, ensuring a perfectly tailored experience. Intelligence Group 1: Cyber & Transformation Group 2: Emergency Response Group 3: Critical Infrastructure Group 4: Countering UAS & Automation Group 5: 1:15 Effectively Utilizing Open Source Intelligence and Social Media to Protect Nation s Infrastructure Scott Mathews, Senior Privacy Advisor for Intelligence Office of Privacy, DHS Cloud Adoption and Understanding the Metrics Standardizing and Synchronizing Command, Control and Coordination Efforts Across Emergency Management Clint Osborn, Assistant Director for Preparedness, District of Columbia Homeland Security and Emergency Management Agency Developing Effective Response Plans to CBRN Attacks that Minimize Risk Countering Threats Posed by UAS Used by Transitional Crime and Terrorist Organizations 1:45 Public Access to Government Services and Preventing Identity Fraud Scott Straub, Vice President Federal Risk Markets Neustar Securing Sensitive Information in the The Cloud from Potential Breaches Akami Identifying Technology to Support First Responders Preparing for a WMD Attack Through Careful Coordination and Organization Advancing Automation and Unmanned Systems to Support Field Operations

6 MAIN SUMMIT DAY ONE 2:15 Leveraging Fraud Detection Methods & Immigration Intelligence to Maintain National Security Matthew Emrich, Associate Director, Fraud Detection and National Security Directorate, U.S. Citizenship and Immigration Services Update on Continuous Diagnostics and Mitigation (CDM) Program Real Time Analytics to Get the Information You Need Quickly Carolyn M. Montagna Operations Manager Joint Strategic & Tactical Analysis Command Center, Homeland Security Bureau Metropolitan Police Department Program Update of CFATS and Securing High-Risk Chemical Facilities Donald Keen, Chief of Regulatory Compliance, Region III, Office of Infrastructure Protection Testing and Evaluating Critical Learning and Autonomous Technologies to Support Homeland Security Operations 2:45 3:30 AFTERNOON NETWORKING & REFRESHMENT BREAK Join us in our Capabilities Center as we host our first Hackathon! If you would like to be part of the What a day so far! While it s not quite over yet, take a few minutes to discuss your insights with fellow attendees. Get ready for our Hackathon Kick Off! PREDICTING AND PREVENTING TERRORIST ATTACKS WITH ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING- STAYING AHEAD OF THREATS Driving AI at the enterprise level to deploy accurate predictive modeling Examining use cases of combating cybersecurity threats, detecting fraud and countering terrorism with predictive modeling Developing models that enhances analysts insights and speed to generates intelligence that supports the IC and keeps up with threat analysis 4:00 PANEL DISCUSSION: S&T DEVELOPMENTS AND LANDSCAPE OF THE FUTURE THREAT ENVIRONMENT Understanding future threats and plans to combat threats 5, 10 and 15 years out Silicon Valley and streamlining access to emerging technolog Dr. Jason Matheny, Director, Intelligence Advanced Research, Project Activity IARPA 4:45 5:15 START UP ROUND TABLE: START UP S DEMONSTRATION OF EMERGING TECHNOLOGY Each start up will get 5 minutes to demonstrate their capabilities to keep our nation secure. Paul Scharre, Senior Fellow and Director, Technology and National Security Program, Center for American Security EVENING RECEPTION AND RECOGNITION Take the time to join us as we recognize an exemplary individual who has gone above and beyond in providing support and help in protecting our nation when it is needed the most! Continue the networking and enjoy the entertainment we have provided.

7 MAIN SUMMIT DAY TWO OCTOBER 24, :00 REGISTRATION & COFFEE 8:45 CHAIRPERSON S OPENING REMARKS 9:00 KEYNOTE PRESENTATION: PLANNING FOR TOMORROW TODAY Transitioning from reactive approach to proactively planning on combating threats Priorities to enhance information sharing and interagency collaboration Developing new methods to combat terrorism both at home and abroad 9:45 HOW CAN GOVERNMENT AGENCIES ADOPT BLOCKCHAIN FRAMEWORK TO KEEP CITIES SAFE Understanding blockchain and defining the framework What are the use cases in commercial sector that can be relatable to enhance government and defense operations 10:15 DEMO DRIVE AND MORNING NETWORKING BREAK Your time is valuable so we have streamlined the process identifying new technologies that will help your organization take resiliency to the next level. During this break, attendees will meet our select industry partners in 5-7 minute intervals. You never know, you may find an industry partner solution you never knew you needed! 10:45 TRACK A KEYNOTE: E-GOVERNMENT S DIGITAL TRANSFORMATION AND TRAINING FEDERAL IT LEADERS Priorities on digital transformation efforts and the way business and civilians interact with the Federal Government Streamlining and investing in IT technology to revolutionize efficiency, effectiveness and convenience Training the next generation of Homeland Security IT professionals Suzette Kuhlow Kent, Federal Chief Information Officer & Administrator for E-Government & IT, Office of Electronic Government, Executive Office of the President TRACK B PANEL DISCUSSION: THE FUTURE OF TRUSTED TRAVELER PROGRAMS Understanding how trusted traveler programs can be integrated with other agencies How can it be expanded and continue to grow? How can it be improved and deliver for customers as well as meet the demands of future operations Simone Davis, TSA Pre Executive Lead, DHS JRC Screening Mission Portfolio Lead, Office of Chief of Operations, TSA

8 MAIN SUMMIT DAY TWO 11:15 11:45 CREATIVELY RECRUITING TOP TALENT TO MEET THE DEMAND OF MORE ANALYSTS AND AGENTS How to recruit talented individuals to work for government agencies when you have a limited budget How can you remain competitive and draw potential candidates away from your competition Understanding how to tap in to the untapped market of talent KEYNOTE: PREPARING AND MITIGATING THE CONSEQUENCES OF CRITICAL INFRASTRUCTURE DISRUPTIONS TO PREVENT NATIONAL DEBILITATION The Honorable Bob Kolasky, Assistant Secretary for Infrastructure and Protection, NPPD STREAMLINING THE SECURITY PROCESS WITH CT (COMPUTED TOMOGRAPHY) SCANNERS Case study, what is being done at the borders and at airports to enhance security? What are the challenges and implications for adopting CT scanners to fit the needs of TSA and other agencies Leveraging 3D imaging to enhance the inspection process HOW DOES THE NATIONAL VETTING CENTER MITIGATE RISK What are the travel implications for the national targeting center Improving capabilities to identify high-risk individuals and cargo from entering the US How can Ai and predictive analytics support the NTC s operations Monte Hawkins, Director of the National Vetting Center, U.S. Customs and Border Protection 12:15 1:00 1:30 NETWORKING LUNCHEON Hungry? So are we! Sit down to a tasty meal while discussing the topics so far and what s to come in the day. SOLVING COORDINATION AND LOGISTICAL CHALLENGES WITH STATE AND LOCAL AGENCIES IN TIMES OF CRISIS MaryAnn Tierney, Regional Administrator, FEMA Region III PANEL DISCUSSION: ACQUISITIONS AND THE FUTURE ROADMAP TO SECURING OUR NATION Where are R&D investments being made? What divergent ground breaking technologies are being explored? What are the plans and strategies to implement technology 5, 10 and 30 years out? Soraya Correa, Chief Procurement Officer U.S., Department of Homeland Security 2:30 PANEL DISCUSSION: PROVIDING FUTURE RESOURCES AND TECHNOLOGIES TO COMBAT ADVANCED AND FUTURE THREATS Streamlining the acquisition process to meet the demands of national security Building on private public partnerships to meet budget resources and deliver solutions Working with small business, venture capital, startups and entrepreneurial communities and start ups to strengthen national security efforts Jonathan McEntee, Director (Acting), Borders and Maritime Security Division, Science and Technology Directorate, Department of Homeland Security Melissa Ho, SVIP Managing Director, U.S. Department of Homeland Security Ari Schuler, Advisor, Office of the Commissioner, U.S. Customs and Border Protection 3:30 CHAIRPERSONS CLOSING REMARKS 4:00 END OF MAIN DAY TWO! SEE YOU NEXT YEAR!

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

An Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS

An Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS An Overview of DHS s Role and Missions James McCament Chief of Legislative Affairs, USCIS DHS s Operational Components Customs and Border Protection (CBP) Immigration and Customs Enforcement (ICE) U.S.

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

bordersecuritysummit.dsigroup.org

bordersecuritysummit.dsigroup.org Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection

More information

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

U.S. Customs and Border Protection Cybersecurity Strategy

U.S. Customs and Border Protection Cybersecurity Strategy 42% U.S. Customs and Border Protection Cybersecurity Strategy Enabling the Mission Through Secure Technology 19% 42% 19% 42% 41% 9% 19% 1% Table of Contents Message from the Commissioner Executive Summary

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

Homeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002

Homeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002 Homeland Security Institute Annual Report pursuant to Homeland Security Act of 2002 July 1, 2005 Homeland Security Institute ANNUAL REPORT Introduction Established in April 2004, the Homeland Security

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Defense Engineering Excellence

Defense Engineering Excellence Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Department of Homeland Security Science and Technology Directorate

Department of Homeland Security Science and Technology Directorate Department of Homeland Security Science and Technology Directorate Overview Presented to the Transportation Research Board Infrastructure and Geophysical Division Science and Technology Directorate Department

More information

Department of Homeland Security Science & Technology

Department of Homeland Security Science & Technology Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

Critical Infrastructure Resilience

Critical Infrastructure Resilience Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

Secure Societies Work Programme Call

Secure Societies Work Programme Call Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context

More information

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017 FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary

More information

FEMA Region III Cyber Security Program

FEMA Region III Cyber Security Program FEMA Region III Cyber Security Program Maryland Cyber Security Workshop (January 16, 2019) (Presented again at the October 16, 2018, meeting of the Maryland Cybersecurity Council and published with permission.)

More information

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER

EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER Mark R. Miller Regional Vice President, COTECNA Inspection S.A. Vice Chairman, European Organisation for Security Coordinator, EOS Supply

More information

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground

More information

Defense Strategies Institute cordially invites you to an educational and training Summit:

Defense Strategies Institute cordially invites you to an educational and training Summit: Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of

More information

2018 National Homeland Security Conference Preliminary Conference Agenda

2018 National Homeland Security Conference Preliminary Conference Agenda The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Critical Infrastructure Sectors and DHS ICS CERT Overview

Critical Infrastructure Sectors and DHS ICS CERT Overview Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Office of Acquisition Program Management (OAPM)

Office of Acquisition Program Management (OAPM) Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Cyber Threat Landscape April 2013

Cyber Threat Landscape April 2013 www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

The Beyond the Border Action Plan

The Beyond the Border Action Plan The Beyond the Border Action Plan 1 Beyond the Border: A Shared Vision For Perimeter Security and Economic Competitiveness Part 1: Addressing Threats Early Part 2: Trade Facilitation, Economic Growth,

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

EU Research for Secure Societies

EU Research for Secure Societies EU Research for Secure Societies Paolo Salieri European Commission DG Migration Home Affairs Innovation and Industry for Security Rotterdam October 9 th 20182013 Content EU Security Research "Secure Societies

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc. RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value

More information

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 THE WHITE HOUSE WASHINGTON January 23, 2012 The United States and nations around the world depend upon the efficient and secure transit

More information

Test and Evaluation in the Department of Homeland Security

Test and Evaluation in the Department of Homeland Security Test and Evaluation in the Department of Homeland Security 7 October 2014 Dr. Steven J Hutchison Director, Test and Evaluation Acting Director, Acquisition Support and Operations Analysis Department of

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

USE CASE STUDY. Connecting Data Through Mission. Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee

USE CASE STUDY. Connecting Data Through Mission. Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee USE CASE STUDY Connecting Data Through Mission Department of Transportation (DOT) A Product of the Federal CIO Council Innovation Committee USE CASE STUDY: Department of VERSION Transportation 1.0 / 2015

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR C R O W D S T R I K E P U B L I C S E C T O R S O L U T I O N S CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR SECURE YOUR ENTERPRISE WITH A THAT PROVIDES UNRIVALED PROTECTION, SECURITY EXPERTISE, AND OPTIMAL

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

The U.S. Manufacturing Extension Partnership - MEP

The U.S. Manufacturing Extension Partnership - MEP The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/

More information