Dekaan professor Jaan Ginter Õppeprodekaan professor Merle Muda IT õiguse õppejõud Tõnu Runnel IT õiguse programmi juht Dr. Helen Eenmaa-Dimitrieva

Size: px
Start display at page:

Download "Dekaan professor Jaan Ginter Õppeprodekaan professor Merle Muda IT õiguse õppejõud Tõnu Runnel IT õiguse programmi juht Dr. Helen Eenmaa-Dimitrieva"

Transcription

1

2 Dekaan professor Jaan Ginter Õppeprodekaan professor Merle Muda IT õiguse õppejõud Tõnu Runnel IT õiguse programmi juht Dr. Helen Eenmaa-Dimitrieva

3 IT õiguse 1-aastane õppekava (60 EAP) IT õiguse eriala 2-aastase õigusteaduse magistriõppekava raames (120 EAP) Mõlemal juhul sama IT õiguse programm Mõlemal juhul sama kraad: õigusteaduse magister (IT õigus)

4 IT ÕIGUSE PROGRAMM Tehnilised õppeained: 15 EAP IKT alused (3 EAP) Informatsiooni infrastruktuur ja arhitektuur (3 EAP) Programmeerimise alused (3 EAP) ID, infoturve ja krüptograafia (3 EAP) Avalikud e-teenused (3 EAP)

5 IT ÕIGUSE PROGRAMM Õiguslikud õppeained: 21 EAP Privaatsus, andmekaitse ja riskijuhtimine (3 EAP) E-kaubandus ja IT lepingud (3 EAP) Intellektuaalsel omandil baseeruva ettevõtte elutsükli õiguslikud aspektid (6 EAP) Intellektuaalomandi kaitse IT valdkonnas (3 EAP) Küberkaitse ja rahvusvaheline küberjulgeolek (3 EAP) Kohtumenetlus IT valdkonnas, digitaalsed tõendid, küberkriminalistika ja küberkuritegevus (3 EAP)

6 IT ÕIGUSE PROGRAMM Vabaained: 6 EAP Praktika: 3 EAP Magistrieksam: 15 EAP KOKKU: 60 EAP

7 IT ÕIGUSE PROGRAMM IT õiguse eriala: 120 EAP Üldained 57 EAP IT õiguse eriala Tehnilised õppeained 15 EAP Õiguslikud õppeained 21 EAP Valikained 6 EAP Vabaained 6 EAP Magistrieksam 15 EAP

8 IT ÕIGUSE PROGRAMM 2014/2015: võimalik läbida kõik tehnilised ja õiguslikud ained 2015/2016: käivitub täismahus

9 2014/2015 Sügisel 2014 IKT alused (3 EAP) Informatsiooni infrastruktuur ja arhitektuur (3 EAP) Programmeerimise alused (3 EAP) Avalikud e-teenused (3 EAP) Intellektuaalomandi kaitse IT valdkonnas (3 EAP) Küberkaitse ja rahvusvaheline küberjulgeolek (3 EAP) Kokku: 18 EAP

10 2014/2015 Kevadel 2015 ID, infoturve ja krüptograafia (3 EAP) Privaatsus, andmekaitse ja riskijuhtimine (3 EAP) E-kaubandus ja IT lepingud (3 EAP) Intellektuaalsel omandil baseeruva ettevõtte elutsükli õiguslikud aspektid (6 EAP) Kohtumenetlus IT valdkonnas, digitaalsed tõendid, küberkriminalistika ja küberkuritegevus (3 EAP) Kokku: 18 EAP

11 Põhimõte: Suur osa programmi raames toimuvast õppetegevusest peaks jäljendama elulisi olukordi

12 Andreas Kangur, Tartu Ülikooli kriminaalprotsessi lektor (LLM., George Washington University) Christopher Spirito, International Cyber Lead, MITRE Corporation, USA Catherine Lotrionte, Director of the Institute for Law, Science and Global Security and Visiting Assistant Professor of Government and Foreign Service at Georgetown University (PhD, International Relations, Georgetown University) Eneken Tikk-Ringas, International Institute for Strategic Studies (IISS) küberjulgeoleku vanemteadur, Lähis-Ida kontor Manama, Bahrein (PhD, õigus, Tartu Ülikool) Eric Talbot Jensen, Brigham Young University, USA, dotsent (LLM., Yale Law School; JD, University of Notre Dame) Helen Eenmaa-Dimitrieva, TÜ õigusteaduskonna IT õiguse programmi juht (JSD, LLM, Yale Law School)

13 Karmen Turk, advokaadibüroo Tamme Otsmann Ruus Vabamets vandeadvokaat, väljapaistvate teadmistega intellektuaalomandi-, meedia-, tarbija-, rahvusvahelises ja EL kaubandusõiguses (õigusteaduse magister, Tartu Ülikool) Martin Öövel, Justiitsministeeriumi infosüsteemide ja tööprotsesside talituse direktor (sotsiaalteaduste bakalaureus, õigusteadus, Tartu Ülikool) Mati Kaalep, advokaadibüroo VARUL jurist, spetsialiseerumisvaldkonnad: andmekaitse, intellektuaalomandi ja infotehnoloogiaga seotud õigusprobleemid (LLM, Law and Technology, Tilburg Law School)

14 Michael N. Schmitt, United States Naval War College rahvusvahelise õiguse osakonna juhataja, Ühendkuningriigi Durham University rahvusvahelise humanitaarõiguse auprofessor, Saksamaal asuva George C. Marshall European Center for Security Studies dekaan ning NATO Küberkaitsekoostöö Keskuse Eesti kontingendi vanemteadur (D.Litt, Durham University; LL.M, Yale Law School; JD, University of Texas) Peeter Mõtsküla, IT spetsialist ja jurist (õigusteaduse magister, Tartu Ülikool)

15 Silja Elunurm, advokaadibüroo Indela & Elunurm partner, spetsialiseerumisvaldkonnad: intellektuaalomandi/ ITga seotud õigusnõustamine, intellektuaalse omandi strateegia, litsentsiläbirääkimised, e-teenuste alane õigusnõustamine, intellektuaalomandi ja e-teenustega seotud vaidluste lahendamine ning meedia- ja reklaamiõigus (LLM, European Business Law, University of Amsterdam) Tiit Paananen, Skype Eesti endine juht, Eesti Infotehnoloogia ja Telekommunikatsiooni Liidu juhatuse liige (õigusteaduse magister, Rahvusvaheline Ülikool Audentes) Tõnu Runnel, Edicy tegevjuht ja peadisainer, Fraktali disainer (sotsiaalteaduste bakalaureus, õigusteadus, Tartu Ülikool) Ülle Madise, Tartu Ülikooli riigiõiguse professor, Eesti Vabariigi presidendi õigusnõunik (PhD, haldusjuhtimine, Tallinna Tehnikaülikool)

16

Eesti riikliku kliimamuutuste mõjuga kohanemise strateegia ja rakenduskava ettepaneku väljatöötamine

Eesti riikliku kliimamuutuste mõjuga kohanemise strateegia ja rakenduskava ettepaneku väljatöötamine Eesti Keskkonnauuringute Keskus Eesti riikliku kliimamuutuste mõjuga kohanemise strateegia ja rakenduskava ettepaneku väljatöötamine Timo Uustal 27-04-2015 Muutuv kliima Muutuv kliima... inimeste kätetöö?

More information

Eesti infoturbepoliitika aluspõhimõtted. Jaak Tepandi Kontakt 2005,

Eesti infoturbepoliitika aluspõhimõtted. Jaak Tepandi Kontakt 2005, Eesti infoturbepoliitika aluspõhimõtted Jaak Tepandi Kontakt 2005, 7.04.2005 Kava Milleks Eesti infoturbe poliitika/strateegia? Eesmärgid, ulatus Valdkonnad Koostöö ja koordineerimine Kriisijuhtimine ja

More information

LETTER TRACKER: REQUEST A PACKET

LETTER TRACKER: REQUEST A PACKET LETTER TRACKER: REQUEST A PACKET HOW TO REQUEST A PACKET 1. Click on the Packets tab. The packet of letters created will be sent to all of the schools that you are applying to, within that application

More information

LETTER TRACKER: REQUEST A PACKET

LETTER TRACKER: REQUEST A PACKET LETTER TRACKER: REQUEST A PACKET HOW TO REQUEST A PACKET 1. Click on the Packets tab. The packet of letters created will be sent to all of the schools that you are applying to, within that application

More information

This document is a preview generated by EVS

This document is a preview generated by EVS EESTI STANDARD EVS-ISO/IEC 27033-3:2013 INFOTEHNOLOOGIA Turbemeetodid Võrguturve Osa 3: Tüüpsed võrgustsenaariumid Riskid, kavandamismeetodid ja reguleerimisküsimused Information technology Security techniques

More information

Horisont 2020 IKT Aavo Kaine

Horisont 2020 IKT Aavo Kaine Horisont 2020 IKT 2016 2017 Aavo Kaine 21. nov 2016. a. Horisont 2020 infopäev Konkursikutsed IKT 2016-2017 1. Kutse oli 20. okt 2015, tähtaeg 19. jaan 2016 Rahvusvaheline koostöö: Hiina, Mehhiko Kutse

More information

2017 Employment Questionnaire Instructions (For 2016 Graduates)

2017 Employment Questionnaire Instructions (For 2016 Graduates) 2017 Employment Questionnaire Instructions (For 2016 Graduates) DATA ENTRY INSTRUCTIONS Copyright 2017 American Bar Association 2017 Employment Questionnaire (For 2016 Graduates) Data Entry Instructions

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

IKT õppekavade arendusmetoodika tutvustus

IKT õppekavade arendusmetoodika tutvustus IKT õppekavade arendusmetoodika tutvustus (1/12) Metoodika koostamise taust Metoodika koostamist juhtis, Leego Hansson HITSA tellimusel IT Akadeemia programmi raames 2017. a. mai - september Töö käigus

More information

Horisont 2020 IKT tööprogramm Aavo Kaine

Horisont 2020 IKT tööprogramm Aavo Kaine Horisont 2020 IKT tööprogramm 2018 2020 Aavo Kaine 21. nov 2017. a. IKT tööprogramm 2018-2020 Kogu eelarve kolme aasta peale 2,69 miljardit eurot 2018 806,02 m 2019 932,82 m 2020 955,32 m KOKKU 2694,16

More information

Rebel Rulers: Insurgent Governance And Civilian Life During War. By Zachariah Cherian Mampilly READ ONLINE

Rebel Rulers: Insurgent Governance And Civilian Life During War. By Zachariah Cherian Mampilly READ ONLINE Rebel Rulers: Insurgent Governance And Civilian Life During War By Zachariah Cherian Mampilly READ ONLINE Rebel Rulers, Insurgent Governance and Civilian - Rebel Rulers. When insurgents take Cherian Mampilly's

More information

E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME

E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE 7-8 September 2017, Tartu PROGRAMME Wednesday, 6 september 2017 Arrival of delegations at Tallinn Airport Independent

More information

Commonwealth Cyber Initiative Letters of Support

Commonwealth Cyber Initiative Letters of Support James Madison University Norfolk State University University of Mary Washington Virginia Commonwealth University Virginia Community College System Virginia State University Commonwealth Cyber Initiative

More information

Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY

Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main

More information

10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM)

10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM) European Council on Defence 2013 Priorities and Perspectives Brigadier General Walter Huhn walter.huhn@eeas.europa.eu 10 years of CSDP achievements CSDP missions & operations 10 years young Total: 28 missions,

More information

Bisk CPA Review: Financial Accounting & Reporting - 43rd Edition 2014 (Comprehensive CPA Exam Review Financial Accounting & Reporting) (Cpa Review...

Bisk CPA Review: Financial Accounting & Reporting - 43rd Edition 2014 (Comprehensive CPA Exam Review Financial Accounting & Reporting) (Cpa Review... Bisk CPA Review: Financial Accounting & Reporting - 43rd Edition 2014 (Comprehensive CPA Exam Review Financial Accounting & Reporting) (Cpa Review... And Reporting Business Enterprises) PDF America's

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

Reducing Risk and Building Capacity

Reducing Risk and Building Capacity Reducing Risk and Building Capacity The Cybersecurity Capacity Maturity Model (CMM) for Nations Prof Michael Goldsmith Global Cyber Security Capacity Centre (GCSCC) April 2017 Delivering Effective Cybersecurity

More information

TEOREETILISE VÄLJÕPPE TEEMA

TEOREETILISE VÄLJÕPPE TEEMA Majandus- ja kommunikatsiooniministri 03.07.014. a määrus nr 49 Mootorsõiduki ja selle haagise tehnonõuetele vastavuse kontrollija atesteerimise nõuded ja kord Lisa 3 ÜLEVAATAJA VÄLJAÕPPE, PRAKTIKA JA

More information

ENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes:

ENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes: Become Certified in Government Technology Leadership ENROLL NOW CERTIFIED GOVERNMENT C H I E F I N F O R M AT I O N O F F I C E R for 2017-18 classes! FIRST COME FIRST SERVED SEATING IS LIMITED CERTIFIED

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

A Glimpse into the Future

A Glimpse into the Future Post-Trade Forum A Glimpse into the Future Thursday, 6 December 2018, 12:00 16:30 The Gibson Hall, 13 Bishopsgate, London EC2N 3BA Program Thursday, 6 December 2018 Your host: Brendon Bambury, Head Post-Trade

More information

Objective: Education:

Objective: Education: Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process

More information

Thirtieth Annual. Electrical & Computer Engineering Day

Thirtieth Annual. Electrical & Computer Engineering Day \ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day

More information

Cyber and Supply Chain Policy Issues

Cyber and Supply Chain Policy Issues Manufacturing Division Meeting Cyber and Supply Chain Policy Issues Eisenhower School for National Security and Resource Strategy National Defense University Fort McNair, Washington, DC February 21, 2013

More information

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information

More information

Big Data Meets High-Performance Reconfigurable Computing

Big Data Meets High-Performance Reconfigurable Computing Big Data Meets High-Performance Reconfigurable Computing UF Workshop on Dense, Intense, and Complex Data Alan George CHREC Center Director Herman Lam CHREC Center Associate Director June 19, 2013 What

More information

This document is a preview generated by EVS

This document is a preview generated by EVS EESTI STANDARD EVS-EN ISP 10612-9:2000 INFOTEHNOLOOGIA. RAHVUSVAHELINE STANDARDPROFIIL RD. MEEDIUMIPÖÖRDUSE JUHTIMISE (MAC) TEENUSE TRANSLATSIOON TRANSPARENTSE SILDAMISEGA. OSA 9: STANDARD RD53.54 (LUBARING-KOHTVÕRK

More information

Infoturbe koolitus otsustajatele. CV -Rünno Reinu. CV Aare Reintam Rünno Reinu/Aare Reintam

Infoturbe koolitus otsustajatele. CV -Rünno Reinu. CV Aare Reintam Rünno Reinu/Aare Reintam Riigi Infosüsteemi Amet/ Tallinna Tehnikaülikool/ SecTeam OÜ Infoturbe koolitus otsustajatele Rünno Reinu/Aare Reintam 24.03.2017 CV -Rünno Reinu Praegu: EU SecTeam OÜ asutaja, infoturbe konsultant, koolitaja

More information

Panel on Cloud Services Security and Safety in Cloud-based Systems and Services

Panel on Cloud Services Security and Safety in Cloud-based Systems and Services Panel on Cloud Services Security and Safety in Cloud-based Systems and Services Moderator Dr Bob Duncan Business School/Computing Science/Geology & Petroleum Geology University of Aberdeen Aberdeen, UK

More information

Industry Perspectives on Active and Expected Regulatory Actions

Industry Perspectives on Active and Expected Regulatory Actions July 15, 2016 Industry Perspectives on Active and Expected Regulatory Actions Alan Chvotkin Executive Vice President and Counsel, Professional Services Council chvotkin@pscouncil.org Trey Hodgkins Senior

More information

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

National CIRT - Montenegro. Ministry for Information Society and Telecommunications National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:

More information

X-road v6 monitoring. Toomas Mölder May 4, 2017 X-Road Community Spring 17

X-road v6 monitoring. Toomas Mölder May 4, 2017 X-Road Community Spring 17 X-road v6 monitoring Toomas Mölder May 4, 2017 X-Road Community Spring 17 Contents Benefits, why? X-Road monitoring options Environmental Operational Usage statistics Monitoring in general Ensures that

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud

Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud ICT2015, 21 October 2015 Lisbon, Portugal Dr. Paolo Balboni, Partner at ICT Legal Consulting & Scientific Director

More information

Current and Emerging Trends in Cyber Operations

Current and Emerging Trends in Cyber Operations Current and Emerging Trends in Cyber Operations Palgrave Macmillan s Studies in Cybercrime and Cybersecurity This book series addresses the urgent need to advance knowledge in the fields of cybercrime

More information

E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME

E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE 7-8 September 2017, Tartu PROGRAMME Wednesday, 6 september 2017 Arrival of delegations at Tallinn Airport Independent

More information

Texas Education Data Standards (TEDS) Public Education Information Management System (PEIMS) Section 8 PEIMS Introduction to TEDS

Texas Education Data Standards (TEDS) Public Education Information Management System (PEIMS) Section 8 PEIMS Introduction to TEDS Texas Education Data Standards (TEDS) Public Education Information Management System (PEIMS) Section 8 PEIMS Introduction to TEDS March 31, 2015 Prepared by: State Education Data Systems (SEDS) Team This

More information

Introduction to BSafe.Network

Introduction to BSafe.Network Introduction to BSafe.Network Shigeya Suzuki, Ph.D Associate Director, Technology Officer, Blockchain Laboratory, Keio Research Institute at SFC Project Associate Professor, Graduate School of Media and

More information

The Big Data Debate 2016 Cybersecurity & health information

The Big Data Debate 2016 Cybersecurity & health information The Big Data Debate 2016 Cybersecurity & health information Big Data Conference Sydney 11 October 2016 4711194 Sponsored by Debate proposition There is nothing wrong with maintaining the status quo i.e.

More information

GTA West Corridor Review

GTA West Corridor Review Newsroom : GTA West Corridor Review Search News $ Search Français Newsroom Bulletin GTA West Corridor Review October 7, 2016 11:30 A.M. Ministry of Transportation In December 2015 the Ministry of Transportation

More information

Other reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in France

Other reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in France This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre, NATO, any agency or any government.

More information

ARCHITECTURE-BASED NETWORK SIMULATION FOR CYBER SECURITY. John A. Hamilton, Jr.

ARCHITECTURE-BASED NETWORK SIMULATION FOR CYBER SECURITY. John A. Hamilton, Jr. Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, eds. ARCHITECTURE-BASED NETWORK SIMULATION FOR CYBER SECURITY John A. Hamilton, Jr. Office

More information

HOW TO CREATE, EDIT, AND TAG YOUR EVENT 1

HOW TO CREATE, EDIT, AND TAG YOUR EVENT 1 HOW TO CREATE, EDIT, AND TAG YOUR EVENT 1 Table of Contents HOW TO LOGIN 2 ADDING A NEW EVENT 3 EVENT INFORMATION: 3 EVENT URL 4 EVENT CONTACT 4 EVENT GROUP 4 LOCATION 6 ADDITIONAL INFORMATION (EVENT REGISTRATION/RSVP)

More information

October 15, Ferst Center for the Arts Georgia Institute of Technology

October 15, Ferst Center for the Arts Georgia Institute of Technology October 15, 2008 Ferst Center for the Arts Georgia Institute of Technology About the Summit The 2008 GTISC Security Summit on Emerging Cyber Security Threats is the sixth security summit hosted at Georgia

More information

Introduction of Security Study in Tokyo Denki University

Introduction of Security Study in Tokyo Denki University Conference for INCS-CoE Nov. 1st, 2016 Introduction of Security Study in Tokyo Denki University Professor, Tokyo Denki University Ryoichi Sasaki sasaki@im.dendai.ac.jp 1 University Overview Tokyo Denki

More information

Headteacher Mrs D Gould, NPQH, BA Hons (Birmingham), PGCE (Birmingham), (SLT)

Headteacher Mrs D Gould, NPQH, BA Hons (Birmingham), PGCE (Birmingham), (SLT) Headteacher Mrs D Gould, NPQH, BA Hons (Birmingham), PGCE (Birmingham), (SLT) Deputy Head Mrs A Chapman, MA (Open University), BA Hons (Nottingham), PGCE (Warwick), Business, EPQ (SLT) Chaplain Ms J Whitehead,

More information

IEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018

IEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018 IEEE Ghana Section NEW OFFICERS- January 2017 to December 2018 IEEE National Chair He is IEEE senior member. He received his PhD degree in Information Technology in 2014 from Aalborg University, Denmark.

More information

LeAnn Estep Director, Career & Technology Amarillo ISD

LeAnn Estep Director, Career & Technology Amarillo ISD PROGRAM COMMITTEE NAME: ADVISORY COMMITTEE NETWORKING & CYBER SECURITY CHAIRPERSON: Heath Patterson MEETING DATE: 11/21/14 MEETING TIME: 12:05 P.M. MEETING PLACE: Lynne Library 207 The Forum RECORDER:

More information

Beyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts

Beyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts Beyond Academia: Cyber Security Research Impacts January 2017 Never Stand Still The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 1 ACCS INCUBATOR IMPACT #1: MILITARY

More information

COMMUNICATIONS & SIGNAL PROCESSING. Dr. Cihan Tepedelenlioglu

COMMUNICATIONS & SIGNAL PROCESSING. Dr. Cihan Tepedelenlioglu COMMUNICATIONS & SIGNAL PROCESSING Dr. Cihan Tepedelenlioglu Area Chair: Dr. Andreas Spanias Professor and Director NSF SenSIP I/UCRC February 21, 2013 What is Signal Processing? Video Compression Audio

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability

ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability Prof. Dr. Paolo Balboni Founding Partner Professor of Privacy, Cybersecurity, and IT Contract

More information

INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue

INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue BISHOP COTTON WOMEN S CHRISTIAN LAW COLLEGE, BENGALURU IN COLLABORATION WITH ADVANCED CENTRE ON RESEARCH, DEVELOPMENT & TRAINING IN CYBER LAWS & FORENSICS [ACRDTCLF], NATIONAL LAW SCHOOL OF INDIA UNIVERSITY,

More information

Cyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days

Cyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days About Cyber Dialogue The Cyber Dialogue conference convenes an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated

More information

Does the cloud require a new privacy framework? The European perspective. Thomas Fetzer

Does the cloud require a new privacy framework? The European perspective. Thomas Fetzer Does the cloud require a new privacy framework? The European perspective Thomas Fetzer 1 1. The foundations of privacy rights in Europe 1. The theoretical foundations 2. The Data Protection Directives

More information

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University Twenty years ago it was reasonable to think that the demand for computer security would crest as technological

More information

Improving the Resilience of Critical Infrastructure from Natural Hazards

Improving the Resilience of Critical Infrastructure from Natural Hazards Improving the Resilience of Critical Infrastructure from Natural Hazards David Murphy Assistant Director Natural Hazards Team Civil Contingencies Secretariat Outline Civil Contingencies Secretariat Vulnerability

More information

Spring Seminar April 7 th & 8 th, 2016

Spring Seminar April 7 th & 8 th, 2016 Spring Seminar April 7 th & 8 th, 2016 Join the Montgomery Chapter for 16 hours of CPE! 1 Date: Thursday April 7, 2016 and Friday, April 8, 2016 Time: Registration/breakfast at 7:30 am with class beginning

More information

Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair

Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair CENDI Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS 2008-10 CENDI Chair January 29, 2009 1 What is CENDI? Interagency group of senior federal

More information

INTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015

INTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015 INTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015 Professor Roy Balleste, J.S.D. rballeste@stu.edu Course Description: This course analyzes the legal and technological

More information

Introduction to Chapter 55

Introduction to Chapter 55 Introduction to Chapter 55 Thomas Land, PhD Director, Special Analytic Projects Office of Population Health Massachusetts Department of Public Health November 6, 2017 State of DPH Data in January 2015

More information

The Policy Forum at AT&T

The Policy Forum at AT&T Tuesday, November 7, 2017 Speaker Biographies Len Cali Senior Vice President, Global Public Policy, AT&T Services, Inc. About Cali Len Cali serves in the AT&T External and Legislative Affairs organization

More information

Proposed NSF Engineering Research Center for Smart Network Infrastructure for Fire Resilience SNIFFR

Proposed NSF Engineering Research Center for Smart Network Infrastructure for Fire Resilience SNIFFR Proposed NSF Engineering Research Center for Smart Network Infrastructure for Fire Resilience November 13, 2013 Prof. Andre Marshall UMD PI Prof. Jay Gore Purdue Co-PI Pres. Gilbert Rochon Tuskegee Co-PI

More information

This document is a preview generated by EVS

This document is a preview generated by EVS EESTI STANDARD EVS-EN ISP 10608-4:2000 INFOTEHNOLOOGIA. RAHVUSVAHELINE STANDARDPROFIIL TANNNN. ÜHENDUSEGA TRANSPORDITEENUS (COTS) ÜHENDUSETA VÕRGUTEENUSE (CLNS) KAUDU - OSA 4: PROFIILI TA53 MÄÄRATLUS,

More information

Center for Secure Information Systems: An Overview Professor Sushil Jajodia

Center for Secure Information Systems: An Overview Professor Sushil Jajodia Center for Secure Information Systems: An Overview Professor Sushil Jajodia Center for Secure Information Systems jajodia@gmu.edu http://csis.gmu.edu/jajodia Outline Program history Current status Recognition

More information

organised by: sponsored by:

organised by: sponsored by: Programme for Researchers 1-5 September 2008 Venue: Mediterranean Agronomic Institute of Chania Chania, Crete, Greece Understanding and thereby manipulating multimedia content at the semantic level is

More information

Intelligent Systems, Control and Automation: Science and Engineering

Intelligent Systems, Control and Automation: Science and Engineering Intelligent Systems, Control and Automation: Science and Engineering Volume 93 Series editor Professor S. G. Tzafestas, National Technical University of Athens, Greece Editorial Advisory Board Professor

More information

EESTI STANDARD EVS-ISO/IEC 27003:2011

EESTI STANDARD EVS-ISO/IEC 27003:2011 EESTI STANDARD EVS-ISO/IEC 27003:2011 INFOTEHNOLOOGIA Turbemeetodid Infoturbe halduse süsteemi teostusjuhis Information technology Security techniques Information security management system Implementation

More information

INTERNATIONAL ACADEMY FOR THE STUDY OF THE JURISPRUDENCE OF THE FAMILY OFFICERS AND MEMBERS, 2015

INTERNATIONAL ACADEMY FOR THE STUDY OF THE JURISPRUDENCE OF THE FAMILY OFFICERS AND MEMBERS, 2015 INTERNATIONAL ACADEMY FOR THE STUDY OF THE JURISPRUDENCE OF THE FAMILY President: OFFICERS AND MEMBERS, 2015 Professor Carlos Martínez de Aguirre University of Zaragoza. Spain Email: aguirre@unizar.es

More information

RDA: Where We Are and

RDA: Where We Are and RDA: Where We Are and Where We Need to Go Good Practices for Great Outcomes: Cataloging Efficiencies that Make a Difference Harvard University 30 November 2011 Christopher Cronin Christopher Cronin Director,

More information

Cybersecurity: Federalism as Defense-in-Depth

Cybersecurity: Federalism as Defense-in-Depth SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:

More information

ICTLC Paolo Balboni, Ph.D.

ICTLC  Paolo Balboni, Ph.D. Managing personal data protection compliance: Privacy Level Agreements (PLA V3 CoC) for cloud service providers CSA NL Summit Leiden, The Netherlands, 13 April2017 Paolo Balboni, Ph.D. - @balbonipaolo

More information

EESTI STANDARD EVS-ISO/IEC :2011

EESTI STANDARD EVS-ISO/IEC :2011 EESTI STANDARD EVS-ISO/IEC 15408-1:2011 INFOTEHNOLOOGIA Turbemeetodid Infoturbe hindamise kriteeriumid Osa 1: Sissejuhatus ja üldmudel Information technology Security techniques Evaluation criteria for

More information

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According

More information

Statisticians in the Federal Government: Producing Data on the Criminal Justice System

Statisticians in the Federal Government: Producing Data on the Criminal Justice System Statisticians in the Federal Government: Producing Data on the Criminal Justice System Washington Statistical Society Gonzaga College High School Washington, DC February 5, 2019 Jeri M. Mulrow Vice President

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

See dokument on EVS-i poolt loodud eelvaade

See dokument on EVS-i poolt loodud eelvaade EVS-ISO 1087-2 EESTI STANDARD EVS-ISO 1087-2:2002 TERMINOLOOGIATÖÖ. SÕNASTIK Osa 2: Arvutirakendused Terminology work. Vocabulary Part 2: Computer applications EESTI STANDARDIKESKUS AMETLIK VÄLJAANNE III

More information

Programme for Researchers

Programme for Researchers Programme for Researchers 1-5 September 2008 Venue: Mediterranean Agronomic Institute of Chania Chania, Crete, Greece Understanding and thereby manipulating multimedia content at the semantic level is

More information

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices

More information

Transforming the Data Center Lenovo. All rights reserved.

Transforming the Data Center Lenovo. All rights reserved. Transforming the Data Center Lenovo Data Center Group A global technology company with 55,000 employees supporting customers in over 160 countries to deliver PC, Mobile, and Data Center solutions Data

More information

SECURITY MANAGEMENT FOR SE LINUX

SECURITY MANAGEMENT FOR SE LINUX AFRL-IF-RS-TR-2003-22 Final Technical Report February 2003 SECURITY MANAGEMENT FOR SE LINUX George Washington University Sponsored by Defense Advanced Research Projects Agency DARPA Order No. N624/00 APPROVED

More information

Go West! Political, legal and operational aspects of cooperation between Europol and the United States

Go West! Political, legal and operational aspects of cooperation between Europol and the United States Go West! Political, legal and operational aspects of cooperation between Europol and the United States Alexandra De Moor IRCP - Ghent University, Belgium 1 Introduction PhD in Law Europol, quo vadis? Critical

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

IT Risk Management and Cybersecurity Summit

IT Risk Management and Cybersecurity Summit IT Risk Management and Cybersecurity Summit Dr. Bill Curtis Executive Director John Weiler Vice Chair 1 Seminar Objectives Latest developments in measurement standards: Software security IT software risk

More information

Digitalization the Way to Survive for Energy Sector. Hando Sutter CEO of Enefit / Eesti Energia Manufuture2017

Digitalization the Way to Survive for Energy Sector. Hando Sutter CEO of Enefit / Eesti Energia Manufuture2017 Digitalization the Way to Survive for Energy Sector Hando Sutter CEO of Enefit / Eesti Energia 24.10.2017 Manufuture2017 Established in 1939 5800 employees 25 subsidiaries and related companies 2.500 mln

More information

Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia

Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia This workshop has been organized by the Secretariat of the Inter- American Committee against Terrorism

More information

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Creating a Cybersecurity Culture: (ISC)2 Survey Responses 10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles

More information

WIRAB Report to the Peak RC Board of Directors

WIRAB Report to the Peak RC Board of Directors WIRAB Report to the Peak RC Board of Directors Eric Baran & Holly Taylor WIRAB Staff December 14, 2017 1 WIRAB Activities Peak RC Activities Outline 2 WIRAB Activities Fall 2017 Leadership Delegation to

More information

Homeland Security 1 1

Homeland Security 1 1 1 Foster effective cybersecurity education and workforce by facilitating the availability of qualified It security professionals to support the Nation s cyber security needs Improve cyber security education/training

More information

Ghufran Hijawi. Personal Profile

Ghufran Hijawi. Personal Profile Executive Summary Achieved my MBA degree on Jan 2010 Excellent with Honor and PhD Program (Business Administration) in progress, while I am a full-time lecturer in WISE university, teaching undergraduate

More information

Minutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG

Minutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG Minutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG Tempus project: Enhancement of cyber educational system of Montenegro (ECESM) Participants: EU Partners Massimo Cappelli, GCSEC

More information

Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal

Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Years with FEA: 20 Total Years Experience: 30+ Education: Master of Science, Materials Science & Engineering, Johns Hopkins University

More information

A Brief Introduction to CFINS

A Brief Introduction to CFINS A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students

More information

Mass Mailings Made Simple

Mass Mailings Made Simple Brigham Young University BYU ScholarsArchive All Faculty Publications 2005-04-01 Bonnie B. Anderson bonnie_anderson@byu.edu Larysa V. Oprya See next page for additional authors Follow this and additional

More information

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT APRIL 7, 2019 David Behinfar, Chief Privacy Officer University of North Carolina Health Katherine Georger, Associate

More information

Technology Forecast 2018: What State and Local Government Technology Officials Can Expect

Technology Forecast 2018: What State and Local Government Technology Officials Can Expect Technology Forecast 2018: What State and Local Government Technology Officials Can Expect Doug Robinson Executive Director NASCIO Alan Shark Executive Director PTI State-of-the-States 2018: IT Trends and

More information

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:

House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: Challenges of Recruiting and Retaining a Cybersecurity Workforce 2pm, September 7, 2017 Prepared Statement for

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

IT Governance and emerging trends

IT Governance and emerging trends IT Governance and emerging trends Athens, 4 November 2013 Professor Georges Ataya Academic Director, Solvay Brussels School (solvay.edu/it) Past International Vice President, ISACA (isaca.org) Managing

More information