Starlight. Downstream intelligence sharing Integrated Cloud Based Solution. Customized Budget Friendly Solution

Size: px
Start display at page:

Download "Starlight. Downstream intelligence sharing Integrated Cloud Based Solution. Customized Budget Friendly Solution"

Transcription

1 Modules Situational Awareness Solutions Software SAMS Cloud Based Real-Time Situational Awareness For Effective Intelligence Sharing and Incident Tracking Components: is a cloud based affordable solution that has five main features to address the specific threat elements that the police faces. Each feature works independently yet seamlessly to integrate into the overall program to maximize crime awareness and prevention. Incident Mapping/ Analysis Provides improved automation to perform trend analysis rapidly, thus facilitating real-time intelligence sharing via exchange of electronic maps, markups, and drawings across the chain of command. Electronic Watch Board (Force Multiplier) Provides commanders with unprecedented crime visibility and combines with the call for service monitor to improve rapid deployment of field personnel. Plan of Operation Management This removes the need for user intervention and economizes staffing requirements. Also, analysts are able to devote more time to incident analysis compared to data gathering. Real-Time Incident Monitoring Incoming call for service incidents are regularly monitored automatically every 5, 10,or 15 minute intervals. Proximity Analysis and Target Acquisition Provides proximity searches on suspects or known persons of interest, incidents, and field assets. Reporting of Statistics and Trend Analysis Provides proximity searches on suspects or known persons of interest, incidents, and field assets. Downstream intelligence sharing Integrated Cloud Based Solution. Customized Budget Friendly Solution Rapid Assimilation: Hot Spots Incident Analysis Statistical Reports Situational Awareness Plotted Incident Call For Service Monitor Proximity Operations Proximity Analyzer Virtual Facility Building blueprints 3-D models Incident Capture and Historical Data Incident Management Module Run historical incident reports in minutes www. transglobalbiz.com.com

2 Situational Awareness Solutions Software was implemented for Prince Georges County Police Department This successful implementation of an early intervention personnel management system has influenced the attitude of police personnel regarding the excessive use of force. Local Government and Law Enforcement Prince George s County Police Department How It Works: takes direct information from each users data input from a vehicle computer, handheld, desktop or central dispatch operations centers. Flexibility to subscribe to different modules that best fit each users requirements System provides real-time status updates and historical data that can be detailed based on 100 s of different criteria Track trends and access past incidents in minutes rather than manually researching and compiling the data Restricted usage based on authorization levels. Access to different modules and information Share the data you want with other agencies and law enforcement agencies Increase collaboration with all participating agencies System is flexible to be customized to each individual customer needs Web based or private dedicated server options Situational Awareness Solutions Inc. Modules Downstream intelligence sharing Integrated Cloud Based Solution. Customized Budget Friendly Software as Service First Responder Support: Access real-time and historical beat incident information Field Observations Scoreboards Suspicious Activity Reporting Coordinate Intelligence Management Vulnerability Assessment Allow different teams to analyze and share information Virtual FUSION CENTERS Easily collaborate and share data with a common integrated system for Federal, State and Local Authorities Multi-Jurisdictional functionality Precision Performance and reporting Commercial model is a fully inclusive managed solution. Software as Service model Monthly license user fees and one time set up charge SAS is responsible for updates, core equipment and customization changes Stop relying on old, slow, time consuming, antiquated situational awareness systems that are not effective in preventing and solving crimes. www. situational-systems.com

3 Rapid assimilation No matter the size of the threat, police officers have a lot of information to assimilate and process. Rapid access to incident records, maps, hot spots, statistics, persons of interests and more can all be accessed from a single solution within. Do more with less Limited budgets often translate to staffing challenges. Longtime seasoned officers retiring only exacerbate the problem. That is why automated tools such as was intentionally designed to help police departments offset the shortage in skilled officers. In essence, allows police officers to do more with less. Incident Analysis With, no longer do you need to retain highly experienced GIS analysts to perform data extraction, manipulation, and supplementation of satellite images and imaging data. You and your employees can access and distribute important incident analysis findings anytime and anywhere. Industrystandard platforms such as Microsoft Excel and Microsoft Outlook are compatible with, effectively uniting professionals of all backgrounds and skill sets. Hot Spots Developed for commanders, offers intuitive and easyto-use features. Areas of incident concentration (hot spots) are easily accessible. Search for specific hot spots by threat level (i.e., critical, high, medium, low, emerging), and then select and view vital threat data with just a few clicks. Statistical Reports Generate actionable reports, track incident trends assisted by bar charts, and even have employees distribute reports to commanders electronically. Watch Board It would be nice to be informed every time there is an important notification of imminent threat. A reduced staff can make this a challenge. The Watch Board is an electronic notification system that is designed to alert commanders to actionable decisions. Be alerted to new hot spots and worsening crime conditions on the ground automatically. Plan of Operation Management What was once performed by highly skilled engineers and analysts to decipher crime, using electroni maps, is now performed automatically. And mo than ever before, automation means the differe between winning and losing. enables commanders to develop plan of operations ove precise geographic area or hot spot. Resource assigned and the number of personnel deploye and shift time are recorded with the operation, then you are finished. will timely inform command staff about daily incident events with the designated hot spot. Upon completion of th operations, commanders (301) can replay the entire operation from beginning (301) to end. (fax) 1801 McCormick Dr. Suite 350 Largo, MD 20774

4 Situational awareness Situational Awareness is the ability to generate actionable knowledge through the use of timely and accurate information about the operational environment. delivers on this front by monitoring call for service incidents in real-time, thereby providing timely and accurate information for commanders to make better informed decisions. Proximity operations Proximity operations move traditional policing away from generic, broadbrush strategies that over-rely on heavy enforcement strategies and saturation patrols, towards highly specific, tailored strategies that offer manageable, consistent, and measurable crime reduction. Plotted Incident Call For Service Monitor Incidents plotted on the map by the call Incoming for call for service incidents are service monitor yield tremendous command automatically monitored every 5, 10, or 15 and control intelligence. Analysts can perform minute intervals by the call for service monitor. real-time incident analysis. In turn, High priority incidents such as shootings and commanders can acquire better operational homicide incidents are separately monitored awareness during real-time operations. from non-priority incidents. By double clicking on any one incident in the list, the system can plot the incident in the correct location on the map. Proximity Analyzer The Proximity Analyzer allows users to locate the closest incidents to any address. Beat officers can use this tool in the field, anytime and anywhere to stay ahead of the crime curve. If the results of the proximity search returns clusters of crime incidents, then chances are high that the area deserves attention Mercantile Lane Suite 115A Largo, MD 20774

5 Virtual facility With astonishing realism, virtual 3-D models of neighborhoods can be constructed in Google Earth. But more astonishing is that Transglobal has connected the visualization models to their software. This unprecented level of integration allows officers to intuitively visualize incident trends in the 3-D environment. Timely incident capture The incident management module plays a large part in reporting incidents in a timely manner. Since incidents are electronically recorded in a database, reports are available 24X7. The incident review process is much streamlined due to ease of use. 3-D Models Push Pins Hot Spots As one can easily imagine, having Incidents a can be plotted in Google Hot spots rendered in the virtual model of a facility that connects Earth. This capability offers the virtual benefit model represent an to such data as locations of water of visualizing incident patterns unparalleled against achievement in pumps, fire hydrants and other field the backdrop of the natural environment software integration. assets is very handy. Virtual models including hills, natural landmarks, have proved valuable in the training buildings, of etc. security personnel, evacuations, natural disasters, and rescue efforts. Incident Management Module The automation inherent in the Incident Management Module leaves little room for mistakes. Incident codes are selected from a list of pre-populated choices. Each submitted incident is automatically tagged with a system generated incident number. Incidents pending approval are easily accessible since they are listed separately from the list of approved incidents.

6 Empower beat officers Beat officers who are on the front lines have little, and sometimes no feedback on which to judge whether crime activity is rising or falling in their patrol sectors, let alone emerging threats. Feedback frequently arrives late, perhaps a few days or even weeks. Scoreboard changes all that by automatically channeling crime intelligence quickly downstream to the people that need it the most - the beat officers. Precision performance Police have relied heavily on computer analysis to focus attention on crime hot spots, achieving a level of precision and quality previously unavailable. Building on this success, Transglobal, using the same computer analysis techniques that have worked so well up to the present time, has achieved precision performance. Precision performance is based on observing hot spots, crime statistics, police resources/tasks/shift schedules in combination to determine police effectiveness. In the final analysis, precision performance answers the difficult question, What combination of factors influenced crime reduction? Precision performance equation + + Hot Spot Crime Statistics Resources/Tasks/Schedules Scoreboard The Scoreboard provides a running total of the number of incidents reported in a designated hot spot on a daily basis. Each hot spot is then automatically prioritized based on the highest to the lowest total incidents scored. Equipped with such intelligence, beat officers are able to effectively stay ahead of the crime. Incidents Beat officers can view incidents (opposition move) on the map recorded in the Scoreboard. Field Observations Beat officers can view field observations (police move) on the map recorded in the Scoreboard.

7 Intelligence Management: Vulnerability Assessment Since the formation of the Department of Homeland Security (DHS), the technological challenge of achieving department-wide intelligence sharing has been elusive. Attempts to integrate disparate intelligence data, dispersed across multiple systems and jurisdictions, continues to be an ongoing challenge. Thus, it has been necessary to establish fusion centers nationwide to encourage state and local authorities to work collaboratively, side by side, to conduct vulnerability assessments and exchange threat information more efficiently. Building on these valuable institutions and further strengthening them is critical in moving towards better intelligence management. was designed for this very purpose. Vulnerability Assessment allows multi-disciplinary teams of intelligence professionals to independently analyze and share threat information (expressed geospatially), rate vulnerability (i.e., SEVERE, HIGH, ELEVATED, GUARDED, LOW), and perform probability of occurrence ratings (i.e., 70% probability of attack within 1 month). Since all threat and vulnerability assessments are stored in a secure central database repository, information can be easily retrieved in the field or in the office.

8 Intelligence Management: Vulnerability Assessment Vulnerability Assessment allows multi-disciplinary teams of intelligence professionals to independently analyze and share threat information (expressed geospatially), rate vulnerability (i.e., SEVERE, HIGH, ELEVATED, GUARDED, LOW), and perform probability of occurrence ratings (i.e., 70% probability of attack within 1 month). Since all threat and vulnerability assessments are stored in a secure central database repository, information can be easily retrieved in the field or in the office.

9 Intelligence Management: Virtual Fusion Center Federal Authority State Authority Central Intelligence Repository Local Authority

10 Jurisdiction #1 Database Customer Computer Center Jurisdiction #2 Multi-Jurisdictional Architecture offers lower TCO and faster payback. Jurisdiction #3

11 Multi-Jurisdictional Architecture In an effort to control total cost of ownership (TCO) for our customers, Transglobal s software is based on a multi-jurisdictional architecture developed for organizations with multiple departments and units that need to manage their crime operations centrally within a single database. What this means is that as a department grows and acquires additional units, the ability to leverage a single software license across a department s multiple branches can significantly cut IT and operational costs. Thus, having a true multi-jurisdictional system that can provide for centralized or decentralized use offers tremendous cost savings. Jurisdiction #1 Database Customer Computer Center Jurisdiction #2 Multi-Jurisdictional Architecture offers lower TCO and faster payback. Jurisdiction #3

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Building strong relationships within a jurisdiction by utilizing Geographic Information

Building strong relationships within a jurisdiction by utilizing Geographic Information Page 1 1. Program Overview Building strong relationships within a jurisdiction by utilizing Geographic Information Systems (GIS) resources is of obvious importance and essential. Relying upon those resources

More information

Kentucky Wireless Information Network Service (Ky-WINS)

Kentucky Wireless Information Network Service (Ky-WINS) 2006 NASCIO Recognition Awards Nomination Category: Information Communications Technology (ICT) Innovations Kentucky Wireless Information Network Service (Ky-WINS) Kentucky State Police Kentucky has implemented

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Emergency Operations Center Management Exercise Evaluation Guide

Emergency Operations Center Management Exercise Evaluation Guide Emergency Operations Center Management Exercise Evaluation Guide I respectfully submit the completed Exercise Evaluation Guide for the Canopy Oaks Tabletop Exercise conducted March 25 2010 for the Leon

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS 2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS SURVEY OVERVIEW The 2016 Motorola Commercial Survey offers revealing insights into team communication trends in a variety of industries across the

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information

Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations

Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Initial Panel Charge August 2009 To review existing policies and

More information

Solution: Business Analytics and Optimization (BAO), Business Continuity, Business Analytics and Optimization (BAO), ROI Study

Solution: Business Analytics and Optimization (BAO), Business Continuity, Business Analytics and Optimization (BAO), ROI Study IBM SPSS: Memphis Police Department A detailed ROI case study Published on 27-Jan-2011 Customer: Memphis Police Department Industry: Government Deployment country: United States Solution: Business Analytics

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS. TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.

More information

FEMA Region IX. RRCC Watch Center. August 2009

FEMA Region IX. RRCC Watch Center. August 2009 FEMA Region IX RRCC Watch Center August 2009 Mission The Regional Response Coordination Center (RRCC) Watch Center is a 24-Hour, 7-Day-Per-Week Function that maintains Regional Situational Awareness of

More information

GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field

GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field GIS in Situational and Operational Awareness: Supporting Public Safety from the Operations Center to the Field Glasgow Bombings- June 2007 Law Enforcement, Public Safety and Homeland Security Organizations

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

Sacramento Regional Crime Analysis Program

Sacramento Regional Crime Analysis Program Sacramento Regional Crime Analysis Program Progress Report 2017 Ruth M. Padilla Regional Crime Analyst Embedded at Sacramento Police Department Introduction The Community Corrections Partnership (CCP)

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government

Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Introduction State and local governments and their supporting agencies encounter emergency situations

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

SOLUTION BRIEF. Video Changes the Future of Policing

SOLUTION BRIEF. Video Changes the Future of Policing SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Mobile Computing Technology and Applications

Mobile Computing Technology and Applications Mobile Computing Technology and Applications Reed Pangborn December 3, 2008 Agenda Trends & Challenges Why Go Mobile? Public Safety Solutions Fleet & Asset Management Solutions Disaster Recovery/COOP Communications

More information

Cisco Smart+Connected Communities

Cisco Smart+Connected Communities Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES A Guide to Making Your Security Team Successful with Automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough Nut to Crack

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

National Guard GIS and Related Technologies for Counterdrug Law Enforcement

National Guard GIS and Related Technologies for Counterdrug Law Enforcement Page 1 of 6 Maj Michael Thomas Lt Col Billy Asbell Dr. Melinda Higgins Mr. Nick Faust National Guard GIS and Related Technologies for Counterdrug Law Enforcement The National Guard Bureau Counterdrug Office

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Security Automation Best Practices

Security Automation Best Practices WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough

More information

Connecting the State: Colorado Case Studies

Connecting the State: Colorado Case Studies Connecting the State: Colorado Case Studies Bill Ferguson Deputy Director Enterprise Application Services Office of Information Technology State of Colorado Agenda Overview - State of Colorado Challenge

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

Oregon Department of Justice

Oregon Department of Justice Oregon Department of Justice Created in response to the 9/11 Commission Report Currently 78 Fusion Centers in the US Fusion Centers are unique in design, but the operation mission is the same nationally

More information

Making Data and Mapping Platforms More Relevant and Useful During Decision Support

Making Data and Mapping Platforms More Relevant and Useful During Decision Support Making Data and Mapping Platforms More Relevant and Useful During Decision Support GeoCollaborate - Rafael de Ameller - rafael@stormcenter.com - (202) 494-3477 Abstract Geographic Information Systems (GIS)

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs

DHS Overview of Sustainability and Environmental Programs. Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Overview of Sustainability and Environmental Programs Dr. Teresa R. Pohlman Executive Director, Sustainability and Environmental Programs DHS Mission DHS Organization Getting to Know DHS Mission: Secure

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

Hazard Management Cayman Islands

Hazard Management Cayman Islands Hazard Management Cayman Islands Strategic Plan 2012 2016 Executive Summary HMCI strategic plan outlines the agency s outlook in the next five years and illustrates the main strategies as goals that will

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

Geographical Information Systems Assessment

Geographical Information Systems Assessment The University of Manchester / Lakeland Police Department Geographical Information Systems Assessment Theories of Crime and GIS-Critical Analysis of CAPS and Compstat by Noelle Matthews November 2003 GIS

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

International D&I Programs SUMMER OLYMPICS SECURITY PACKAGE

International D&I Programs SUMMER OLYMPICS SECURITY PACKAGE PPRROOM MOO International D&I Programs SUMMER OLYMPICS SECURITY PACKAGE BARRA OLYMPIC PARK CONSTRUCTION RIO DE JANEIRO PROMO OLYMPIC SECURITY PACKAGE 2016 Olympic security package Since the 2009 announcement

More information

Intelligence-Led Policing. Executive Summary

Intelligence-Led Policing. Executive Summary Intelligence-Led Policing Executive Summary Five Trends to Help You See Ahead & Create Safer Communities Chicago debuted the first police call boxes in 1877, allowing citizens and police to report threats

More information

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 SECURITY AUTOMATION BEST PRACTICES A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 Introduction The best security postures are those that are built

More information

Housekeeping Tips. Access a PDF of the slides, access the speakers bios. Participate in polls

Housekeeping Tips. Access a PDF of the slides, access the speakers bios. Participate in polls Housekeeping Tips Access a PDF of the slides, access the speakers bios Participate in polls Ask a question! or send a Tweet at @directionsmag, and include #GoogleWebinar An on-demand recording of today

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

The main website for Henrico County, henrico.us, received a complete visual and structural

The main website for Henrico County, henrico.us, received a complete visual and structural Page 1 1. Program Overview The main website for Henrico County, henrico.us, received a complete visual and structural overhaul, which was completed in May of 2016. The goal of the project was to update

More information

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition Chip Hines Director, Office

More information

SD-WAN: A Simplified Network for Distributed Enterprises

SD-WAN: A Simplified Network for Distributed Enterprises 1 SD-WAN: A Simplified Network for Distributed Enterprises 2 Table of Contents 3 Keeping up with changing technology 4 The problem with traditional MPLS networks 5 New networks must meet growing business

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

Connected & Automated Vehicle Activities

Connected & Automated Vehicle Activities MDOT State Highway Administration Connected & Automated Vehicle Activities National Rural ITS Conference October 2018 MDOT s CAV Working Group MDOT s CAV Working Group Open discussions on CAV with TBUs,

More information

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

THINK RESILIENCY 2.0 WITH VIZONOMY

THINK RESILIENCY 2.0 WITH VIZONOMY VIZONOMY // 01 ABOUT US The greatest advances in climate risk awareness will be those that merge, harness, and properly communicate big data sources to drive meaningful action and response. Vizonomy s

More information

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients...

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients... Resilience Resilience is the ability of a community to maintain its functions in the face of dramatically changed circumstances, including climate change, natural disasters, and aging infrastructure. Recent

More information

THE AUTOMATED TEST FRAMEWORK

THE AUTOMATED TEST FRAMEWORK 2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO

More information

South Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises

South Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region VIII The State,

More information

Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District

Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District Spotlight on Public/Private Initiatives The Atlanta Downtown Improvement District Member: Dave Wardell, VP Operations & Public Safety, Central Atlanta Progress Inc. 1. Security Executive Council Public/Private

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY ACROSS GOVERNMENT BOUNDARIES

BUSINESS CONTINUITY AND DISASTER RECOVERY ACROSS GOVERNMENT BOUNDARIES BUSINESS CONTINUITY AND DISASTER RECOVERY ACROSS GOVERNMENT BOUNDARIES Business Continuity and Disaster Recovery State of Utah NASCIO Awards 2009 1 BUSINESS CONTINUITY AND DISASTER RECOVERY ACROSS GOVERNMENT

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Put Time Back on your Side

Put Time Back on your Side Access Control Put Time Back on your Side When it comes to ensuring safety, preparing for emergencies and protecting your people and assets, time is of the essence. Avigilon Access Control Manager (ACM)

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

PUBLIC SAFETY FY BID PROCESS

PUBLIC SAFETY FY BID PROCESS PUBLIC SAFETY FY 11-12 BID PROCESS Presented to the Dallas City Council January 19, 2011 Public Safety Team Members Andy Acord, Dallas Police Department Cassandra Wallace, Office of Emergency Management

More information

Community Development Commission of the County of Los Angeles

Community Development Commission of the County of Los Angeles VDI (Virtual Desktop Infrastructure) Implementation 2018 NACo Achievement Awards 1. Abstract of the Program. (~200 words or less). Summarize the program include the program description, the purpose, and

More information

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Business Continuity and Disaster Recovery Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Executive Summary Too often emergency management communication

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Disaster Management (DM) Program Overview

Disaster Management (DM) Program Overview Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

Emergency Management BCERMS Orientation

Emergency Management BCERMS Orientation Emergency Management BCERMS Orientation May 2008 Orientation Objectives Describe the primary responsibilities of emergency management programs for all levels of government in BC Explain BCERMS British

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Below are a few questions you should be asking when planning your communication strategy for potential employee threats:

Below are a few questions you should be asking when planning your communication strategy for potential employee threats: Introduction As an organization, one of your major priorities is keeping the people you employ safe. This can be a difficult task, especially if you aren t prepared. In order to best protect your employees

More information

Louisiana - State Analytical & Fusion Exchange (LA-SAFE)

Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information