bordersecuritysummit.dsigroup.org
|
|
- Chad Thompson
- 5 years ago
- Views:
Transcription
1 Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection Under Secretary for Intelligence and Analysis DHS Director, Joint Task Force-West DHS Director, El Paso Intelligence Center (EPIC) DEA Summit Agenda bordersecuritysummit.dsigroup.org
2 DSI s 2019 U.S. Border Security and Intelligence Summit will focus on ensuring the continued safety of the U.S. Homeland through the protection and security of its borders. Program Design & Goal: Securing the U.S. Border is a critical priority for Federal agencies, particularly as the current threat landscape continues to evolve at a rapid pace. DHS and accompanying critical agencies, including international partners, are working together to protect the United States against transnational criminal organizations, illicit trade and transport, and violent extremism. The 2019 Summit topics will include the development of advanced technologies and solutions to enhance border protection, improvements and challenges to intelligence-sharing, and on-going operations to disrupt and degrade criminal networks through targeted enforcement on the border. DSI s team specializes in the extensive research and development of our Summits content and focus areas, and we will assemble the most respected minds in border security as well as key-policy makers across military and civilian offices. Our non-partisan approach allows us to reach across all services and organizations to bring together a truly holistic group of decision makers and solution providers. DSI s Summit directly supports DHS, IC and Federal Government priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. Operating Guidelines: DSI s Summit will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * The Summit is open and complimentary to all DHS, IC, and Federal employees and is considered an educational and training forum. (Industry and academia members are charged a fee of attendance) Summit is CLOSED TO PRESS / NO RECORDINGS Personnel from DHS, DoD, IC, and Federal Agencies, International Border and National Service Partners, Industry, Academia, and nonprofit organizations with titles such as: General Target Audience: VP Homeland Security Programs, Director, National Security BD, Identity Applications, Advanced Programs Engineer, Intelligence Research Specialist, Analyst, Cross-border Networks Branch, MultiINT analyst, Open Sources analyst, Intelligence Analyst, Border Security Analyst, Emerging Technologies Branch, Supervisory Special Agent, Commander, Chief, Intelligence and Investigative Liaison -Enhancing Border Security Through International Cooperation and Intelligence Sharing -Tracking and Combatting TCOs Through International Cooperation on Data Collection and Analysis Specific topics to be discussed include: -Disrupting and Degrading TCOs Through Targeted Enforcement -Leveraging the U.S.-Mexico Relationship to Enhance Border Security -Facilitating Legitimate Trade and Travel while Maintaining Secure U.S. Borders -Biometrics and Border Security: How DHS Uses Newly-Developed Technology to Fortify U.S. Ports of Entry
3 April 10, :00-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks 9:00-9:45 Enhancing Border Security Through International Cooperation and Intelligence Sharing Intersection between Promoting Economic Prosperity and Preventing National Security Threats CBP and International Maritime Security: Overview of Container Security Initiative Viewpoint Towards Improving Partnership Between CBP and Private Sector Partners Kevin McAleenan, Commissioner, CBP (Confirmed) 9:45 10:30 Evolving Challenges on the U.S. Border: How DHS Ensures Continued Border Security through Adapting and Applying Intelligence Future of Intelligence Sharing Between DHS and U.S. Partners Where Can This Be Improved? New Challenges to U.S. Border Security, Including Drones, Tunnels, and Cybercrime Thoughts on Current State of Operational Effectiveness Against Threats to Border Security David Glawe, Under Secretary for Intelligence and Analysis, DHS (Confirmed) 10:30 11:00 Networking Break 11:00 11:45 Leveraging the U.S.-Mexico Relationship to Enhance Border Security Thoughts on Current and Future State of Partnership between U.S. and Mexico on Border Security Effectiveness of Bi-National Anti-Crime Collaborations (i.e. Security and Prosperity Campaign, Se Busca) and Areas to Improve Disrupting and Degrading Narco-Terrorist Organizations on the Southern Border Manuel Padilla, Jr., Director, Joint Task Force West (Confirmed) 11:45 12:30 ICE s Role in Predicting and Preventing International Crime Recent Developments and Initiatives to Counter Cyber Threats on the Darknet Analysis and Dissemination of Data Collected by ICE: Current Overview and Room for Improvement Terrorism and Regional Migration Flow: ICE s Role in Preventing Security Threats Created by Cross- Border Smuggling Operations Jeremy Baker, Deputy Assistant Director, Homeland Security Investigations, ICE (Tentatively confirmed) 12:30-1:30 Networking Lunch 1:30 2:15 DEA: EPIC s Role in Supporting Law Enforcement through Intelligence Collection, Analysis, and Dissemination Identifying National Security Threats on the Southwest Border: Ways to Advance the Mission Leveraging Authority, Expertise, and Information from U.S. and International Partners to Effectively Identify Threats to the Nation Data Collection and Analysis: How EPIC Turns Information Into Actionable Intelligence Jeffrey T. Walsh, Director/Special Agent in Charge, El Paso Intelligence Center, DEA (Confirmed) 2:15-3:00 Disrupting and Degrading TCOs Through Targeted Enforcement Current Challenges Faced by Border Patrol: Training, Maintaining, and Utilizing Agents on the Border Role of Border Patrol in Identifying and Stopping Threats to National Security Brian Hastings, Chief of Law Enforcement Operations, U.S. Border Patrol (Confirmed) 3:00-3:30 Networking Break
4 3:30 4:15 Researching, Developing, and Testing New Technologies for DHS Operations Collaborating with Industry through Programs Including the Silicon Valley Innovation Program (SVIP) How does Collaboration Increase DHS s Capabilities? Future Technologies: How will DHS S&T Implement Technologies like Blockchain, Biometrics, and Machine Learning for Border Security? William Bryan, Senior Official Performing the Duties of the Under Secretary for Science and Technology, DHS (Invited) 4:15-5:00 Predicting and Countering Threats to Aviation Security Overview of TSA s Role in Monitoring the Global Threat Landscape-How is TSA Expanding Intelligence Capabilities Beyond U.S. Border? Countering an Agile Enemy: Discuss the Three Types of Terrorist Attacks (Directed, Enabled, and Inspired) and How TSA Handles Each Type of Threat Looking to the Future: Thoughts on how TSA will Adapt to Handle Evolving Threats to Legal Transportation and Travel Nancy Nykamp, Deputy Assistant Administrator, Office of Intelligence and Analysis, TSA (Confirmed) 5:00-5:45 Disrupting Maritime TCO Activity Through Enhanced Counter-Network Operations and Cooperation with International Partners Overview of Western Hemisphere Illicit Pathways Initiative (WHIP) and JTF-E s relationship with partner agencies in Mexico, Central and South America, and the Caribbean DHS Maritime Migration Contingency Plan: JTF-E s role as the touchpoint in a mass migration scenario 5:45 VADM Scott Buschman, Director, Joint Task Force East, DHS (Invited) End of Day 1
5 April 11, :15-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks 9:00-9:45 Facilitating Legitimate Trade and Travel while Maintaining Secure U.S. Borders Balancing Border Security and Trade Efficiency: The Role of DHS in Preventing Threats to National Security without Impacting Global Supply Chain Effectively Providing Information and Analysis to NSC IPCs and Opportunities for Improvement Viewpoint Towards the Future of Relationship between Immigration Policy and Border Security Michael Dougherty, Assistant Secretary, Office of Policy (Border, Immigration and Trade Policy), DHS (Confirmed) 9:45-10:30 Biometrics and Border Security: How CBP Uses Newly-Developed Technology to Fortify U.S. Ports of Entry Partnership with DHS S&T on Biometric Entry/Exit Transformation Thoughts on Future Developments in Border Security Joint Facial Recognition Initiative with TSA: Growing Role of Biometrics in Securing Ports of Entry Navigating Privacy Issues and Public Acceptance of Biometric Identification Colleen Manaher, Executive Director, Planning, Program Analysis, and Evaluation, CBP (Invited) 10:30-11:00 Networking Break Panel Discussion: Developing New Biometric Identification Technologies for National Security Moderated by: Dr. Stephanie Schuckers (Confirmed) Panelists: Arun Vemury, Director, S&T Biometric and Identity Technology Center, DHS (Confirmed) Stephen Elliott, Director, Purdue University International Center for Biometric Research (Confirmed) Xiaoming Liu, Researcher, Computer Vision Lab at Michigan State University (Confirmed) John Boyd, Office of Biometric Identity Management, DHS (Confirmed) 12:30-1:30 Networking Lunch 1:30 2:15 Air and Marine Operations: Current Improvements to Joint Operational Capabilities and Intelligence Provide an Overview of AMOC s Threat Priorities: What is the Current, Near-Term, and Future Focus? Implementation of New Technologies like the Integrated Maritime Domain Enterprise-Coastal Surveillance System (IMDE-CSS) to Improve Information-Sharing Between Domestic Agencies Mike Pullman, Deputy Director, Air and Marine Operations Center, CBP (Confirmed)
6 2:15-3:00 Ensuring Cargo Security at Domestic and Foreign Ports Thoughts on How Cargo and Conveyance Security Fits into CBP s Layered and Comprehensive Strategy for National Security Working with Foreign Allies and Private Industry on CBP s Cargo Enforcement Strategy Case Studies from C-TPAT and the Container Security Initiative Predicting and Deterring Crimes through Intelligence Gathering and Analysis: National Targeting Center (NTC) Tom Overacker, Executive Director, Cargo and Conveyance Security, Office of Field Operations, CBP (Invited) 3:00-3:45 National Security and Health: The Role of the CDC in Preventing Migration-Related Illness Provide Overview of DGMQ s Role in Protecting the Health of America How Does DGMQ Predict, Prevent, and Respond to Cross-Border Disease Outbreaks US-Mexico Public Health How Do Programs Like BIDS Enable Intelligence Sharing and Response Coordination between the CDC and Partner Agencies in Mexico? Dr. Martin Cetron, Director, Division of Global Migration and Quarantine, National Center for Emerging and Zoonotic Diseases, CDC (Invited) 3:45-4:30 Canadian Perspective: Increasing Security Through Specialization Current Risk Assessment of Shared Ports of Entry from the RCMP Perspective Push Towards Agent Specialization to Effectively Respond to Cyber Threats Thoughts on Improving Intelligence Sharing and Cooperation with U.S. Partner Agencies 4:30 Eric Slinn, Assistant Commissioner, Federal Policing-Criminal Operations, Royal Canadian Mounted Police (Confirmed) End of Summit
6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More informationDefense Strategies Institute cordially invites you to an educational and training Summit:
Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More informationIdentity Management Symposium
Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria,
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information12 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationAmerican Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED
American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationAn Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS
An Overview of DHS s Role and Missions James McCament Chief of Legislative Affairs, USCIS DHS s Operational Components Customs and Border Protection (CBP) Immigration and Customs Enforcement (ICE) U.S.
More informationThe Beyond the Border Action Plan
The Beyond the Border Action Plan 1 Beyond the Border: A Shared Vision For Perimeter Security and Economic Competitiveness Part 1: Addressing Threats Early Part 2: Trade Facilitation, Economic Growth,
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More information13 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationOverview of Customs-Trade Partnership Against Terrorism (C-TPAT)
Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our
More informationSECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC
SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC CivSec 2018 CIVIL SECURITY CONGRESS AND EXPOSITION 1-3 MAY 2018 MELBOURNE AUSTRALIA MELBOURNE CONVENTION AND EXHIBITION CENTRE www.civsec.com.au
More informationSupply Chain Security Since 9/11
Supply Chain Security Since 9/11 2011 TRB SUMMIT 24 AUGUST 2011 SETH M.M. STODDER, Palindrome Strategies, LLC Agenda Introduction Supply Chain Security Since 9/11 Pre-9/11 View Post-9/11 Actions Where
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationDHS Science & Technology Directorate
DHS Science & Technology Directorate Maritime Security Science &Technology, Trends and Challenges AAPA Port Security Seminar and Exposition Miami, FL July 19, 2012 Anh Duong Director Borders & Maritime
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationBeyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness
Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationWhy C-TPAT? An Overview
Why C-TPAT? An Overview U.S. Customs Service Focus Prior to 9/11/01 Trade compliance Business Anti-Smuggling Coalition (BASC) Drug intervention Limited cargo security Security functions were uncoordinated
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 THE WHITE HOUSE WASHINGTON January 23, 2012 The United States and nations around the world depend upon the efficient and secure transit
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationTransportation Security Planning in British Columbia David Morhart, Deputy Solicitor General
Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s
More information2018 National Homeland Security Conference Preliminary Conference Agenda
The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security
More informationFive Country Ministerial 2018 Official Communiqué
Five Country Ministerial 2018 Official Communiqué 1. We, the Homeland Security, Public Safety, and Immigration Ministers of Australia, Canada, New Zealand, the United Kingdom, and the United States met
More informationDepartment of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise
Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More information14 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationInternational Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE
PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationCRS Report for Congress
Order Code RL32531 CRS Report for Congress Received through the CRS Web Critical Infrastructure Protections: The 9/11 Commission Report August 16, 2004 John Moteff Specialist in Science and Technology
More informationDepartment of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise
Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationDefence, Safety and Security
Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts
More informationThe Age of Heightened Security
The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationDHS Systems Engineering Acquisition Challenges and Issues
DHS SCIENCE AND TECHNOLOGY DHS Systems Engineering Acquisition Challenges and Issues NDIA 20 th Annual National SE Conference October 25, 2017 James D. Tuttle Chief Systems Engineer Science and Technology
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationLouisiana - State Analytical & Fusion Exchange (LA-SAFE)
Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationPROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security
DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationU.S. Customs and Border Protection Cybersecurity Strategy
42% U.S. Customs and Border Protection Cybersecurity Strategy Enabling the Mission Through Secure Technology 19% 42% 19% 42% 41% 9% 19% 1% Table of Contents Message from the Commissioner Executive Summary
More informationSharing of Information & Intelligence on the Importation & Transportation of Food
Sharing of Information & Intelligence on the Importation & Transportation of Food Dr. Sharon Thompson, Director Center for Agriculture & Food Security & Preparedness University of Tennessee College of
More informationCyber Threat Landscape April 2013
www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationResponding to Cybercrime:
Responding to Cybercrime: Preserving Crucial Evidence for Law Enforcement RCMP National Division Integrated Technological Crime Unit (ITCU) Presented by : Sgt. Stéphane Turgeon Cpl. David Connors 2 Goals
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationCyber Management for Ports Results of Small Port Cyber Security Workshops
AAPA Port Governing Boards Cyber Management for Ports Results of Small Port Cyber Security Workshops MARAD and the CHCP June 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Recent
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationKey United Nations counter-terrorism references & architecture: Impact on customs.
Key United Nations counter-terrorism references & architecture: Impact on customs. Counter-Terrorism Committee Executive Directorate (CTED) United Nations Brussels, 2-4 October 2018 United Nations counter-terrorism
More informationDomestic Nuclear Detection Office (DNDO) DNDO Overview
Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationUnderstanding how MRA works and realizing the benefits for both Customs and Trade
Understanding how MRA works and realizing the benefits for both Customs and Trade CTPAT Program Overview CTPAT is a voluntary public-private sector partnership program to strengthen the security of international
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationHomeland Security Information Sharing Architecture
Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationThirteenth Symposium on the ICAO Traveller Identification Programme
Thirteenth Symposium on the ICAO Traveller Identification Programme Counter-Terrorism Committee Executive Directorate (CTED) United Nations ICAO Headquarters, Montreal, 24-26 October 2017 Briefly about
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationApril 5, Subject: DHS Multi-Agency Operation Centers Would Benefit from Taking Further Steps to Enhance Collaboration and Coordination
United States Government Accountability Office Washington, DC 20548 April 5, 2007 The Honorable Robert C. Byrd Chairman The Honorable Thad Cochran Ranking Member Subcommittee on Homeland Security Committee
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More information