Dekaan professor Jaan Ginter Õppeprodekaan professor Merle Muda IT õiguse õppejõud Tõnu Runnel IT õiguse programmi juht Dr. Helen Eenmaa-Dimitrieva
|
|
- Primrose Banks
- 6 years ago
- Views:
Transcription
1
2 Dekaan professor Jaan Ginter Õppeprodekaan professor Merle Muda IT õiguse õppejõud Tõnu Runnel IT õiguse programmi juht Dr. Helen Eenmaa-Dimitrieva
3 IT õiguse 1-aastane õppekava (60 EAP) IT õiguse eriala 2-aastase õigusteaduse magistriõppekava raames (120 EAP) Mõlemal juhul sama IT õiguse programm Mõlemal juhul sama kraad: õigusteaduse magister (IT õigus)
4 IT ÕIGUSE PROGRAMM Tehnilised õppeained: 15 EAP IKT alused (3 EAP) Informatsiooni infrastruktuur ja arhitektuur (3 EAP) Programmeerimise alused (3 EAP) ID, infoturve ja krüptograafia (3 EAP) Avalikud e-teenused (3 EAP)
5 IT ÕIGUSE PROGRAMM Õiguslikud õppeained: 21 EAP Privaatsus, andmekaitse ja riskijuhtimine (3 EAP) E-kaubandus ja IT lepingud (3 EAP) Intellektuaalsel omandil baseeruva ettevõtte elutsükli õiguslikud aspektid (6 EAP) Intellektuaalomandi kaitse IT valdkonnas (3 EAP) Küberkaitse ja rahvusvaheline küberjulgeolek (3 EAP) Kohtumenetlus IT valdkonnas, digitaalsed tõendid, küberkriminalistika ja küberkuritegevus (3 EAP)
6 IT ÕIGUSE PROGRAMM Vabaained: 6 EAP Praktika: 3 EAP Magistrieksam: 15 EAP KOKKU: 60 EAP
7 IT ÕIGUSE PROGRAMM IT õiguse eriala: 120 EAP Üldained 57 EAP IT õiguse eriala Tehnilised õppeained 15 EAP Õiguslikud õppeained 21 EAP Valikained 6 EAP Vabaained 6 EAP Magistrieksam 15 EAP
8 IT ÕIGUSE PROGRAMM 2014/2015: võimalik läbida kõik tehnilised ja õiguslikud ained 2015/2016: käivitub täismahus
9 2014/2015 Sügisel 2014 IKT alused (3 EAP) Informatsiooni infrastruktuur ja arhitektuur (3 EAP) Programmeerimise alused (3 EAP) Avalikud e-teenused (3 EAP) Intellektuaalomandi kaitse IT valdkonnas (3 EAP) Küberkaitse ja rahvusvaheline küberjulgeolek (3 EAP) Kokku: 18 EAP
10 2014/2015 Kevadel 2015 ID, infoturve ja krüptograafia (3 EAP) Privaatsus, andmekaitse ja riskijuhtimine (3 EAP) E-kaubandus ja IT lepingud (3 EAP) Intellektuaalsel omandil baseeruva ettevõtte elutsükli õiguslikud aspektid (6 EAP) Kohtumenetlus IT valdkonnas, digitaalsed tõendid, küberkriminalistika ja küberkuritegevus (3 EAP) Kokku: 18 EAP
11 Põhimõte: Suur osa programmi raames toimuvast õppetegevusest peaks jäljendama elulisi olukordi
12 Andreas Kangur, Tartu Ülikooli kriminaalprotsessi lektor (LLM., George Washington University) Christopher Spirito, International Cyber Lead, MITRE Corporation, USA Catherine Lotrionte, Director of the Institute for Law, Science and Global Security and Visiting Assistant Professor of Government and Foreign Service at Georgetown University (PhD, International Relations, Georgetown University) Eneken Tikk-Ringas, International Institute for Strategic Studies (IISS) küberjulgeoleku vanemteadur, Lähis-Ida kontor Manama, Bahrein (PhD, õigus, Tartu Ülikool) Eric Talbot Jensen, Brigham Young University, USA, dotsent (LLM., Yale Law School; JD, University of Notre Dame) Helen Eenmaa-Dimitrieva, TÜ õigusteaduskonna IT õiguse programmi juht (JSD, LLM, Yale Law School)
13 Karmen Turk, advokaadibüroo Tamme Otsmann Ruus Vabamets vandeadvokaat, väljapaistvate teadmistega intellektuaalomandi-, meedia-, tarbija-, rahvusvahelises ja EL kaubandusõiguses (õigusteaduse magister, Tartu Ülikool) Martin Öövel, Justiitsministeeriumi infosüsteemide ja tööprotsesside talituse direktor (sotsiaalteaduste bakalaureus, õigusteadus, Tartu Ülikool) Mati Kaalep, advokaadibüroo VARUL jurist, spetsialiseerumisvaldkonnad: andmekaitse, intellektuaalomandi ja infotehnoloogiaga seotud õigusprobleemid (LLM, Law and Technology, Tilburg Law School)
14 Michael N. Schmitt, United States Naval War College rahvusvahelise õiguse osakonna juhataja, Ühendkuningriigi Durham University rahvusvahelise humanitaarõiguse auprofessor, Saksamaal asuva George C. Marshall European Center for Security Studies dekaan ning NATO Küberkaitsekoostöö Keskuse Eesti kontingendi vanemteadur (D.Litt, Durham University; LL.M, Yale Law School; JD, University of Texas) Peeter Mõtsküla, IT spetsialist ja jurist (õigusteaduse magister, Tartu Ülikool)
15 Silja Elunurm, advokaadibüroo Indela & Elunurm partner, spetsialiseerumisvaldkonnad: intellektuaalomandi/ ITga seotud õigusnõustamine, intellektuaalse omandi strateegia, litsentsiläbirääkimised, e-teenuste alane õigusnõustamine, intellektuaalomandi ja e-teenustega seotud vaidluste lahendamine ning meedia- ja reklaamiõigus (LLM, European Business Law, University of Amsterdam) Tiit Paananen, Skype Eesti endine juht, Eesti Infotehnoloogia ja Telekommunikatsiooni Liidu juhatuse liige (õigusteaduse magister, Rahvusvaheline Ülikool Audentes) Tõnu Runnel, Edicy tegevjuht ja peadisainer, Fraktali disainer (sotsiaalteaduste bakalaureus, õigusteadus, Tartu Ülikool) Ülle Madise, Tartu Ülikooli riigiõiguse professor, Eesti Vabariigi presidendi õigusnõunik (PhD, haldusjuhtimine, Tallinna Tehnikaülikool)
16
Eesti riikliku kliimamuutuste mõjuga kohanemise strateegia ja rakenduskava ettepaneku väljatöötamine
Eesti Keskkonnauuringute Keskus Eesti riikliku kliimamuutuste mõjuga kohanemise strateegia ja rakenduskava ettepaneku väljatöötamine Timo Uustal 27-04-2015 Muutuv kliima Muutuv kliima... inimeste kätetöö?
More informationEesti infoturbepoliitika aluspõhimõtted. Jaak Tepandi Kontakt 2005,
Eesti infoturbepoliitika aluspõhimõtted Jaak Tepandi Kontakt 2005, 7.04.2005 Kava Milleks Eesti infoturbe poliitika/strateegia? Eesmärgid, ulatus Valdkonnad Koostöö ja koordineerimine Kriisijuhtimine ja
More informationLETTER TRACKER: REQUEST A PACKET
LETTER TRACKER: REQUEST A PACKET HOW TO REQUEST A PACKET 1. Click on the Packets tab. The packet of letters created will be sent to all of the schools that you are applying to, within that application
More informationLETTER TRACKER: REQUEST A PACKET
LETTER TRACKER: REQUEST A PACKET HOW TO REQUEST A PACKET 1. Click on the Packets tab. The packet of letters created will be sent to all of the schools that you are applying to, within that application
More informationThis document is a preview generated by EVS
EESTI STANDARD EVS-ISO/IEC 27033-3:2013 INFOTEHNOLOOGIA Turbemeetodid Võrguturve Osa 3: Tüüpsed võrgustsenaariumid Riskid, kavandamismeetodid ja reguleerimisküsimused Information technology Security techniques
More informationHorisont 2020 IKT Aavo Kaine
Horisont 2020 IKT 2016 2017 Aavo Kaine 21. nov 2016. a. Horisont 2020 infopäev Konkursikutsed IKT 2016-2017 1. Kutse oli 20. okt 2015, tähtaeg 19. jaan 2016 Rahvusvaheline koostöö: Hiina, Mehhiko Kutse
More information2017 Employment Questionnaire Instructions (For 2016 Graduates)
2017 Employment Questionnaire Instructions (For 2016 Graduates) DATA ENTRY INSTRUCTIONS Copyright 2017 American Bar Association 2017 Employment Questionnaire (For 2016 Graduates) Data Entry Instructions
More informationGovernment-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot
STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help
More informationIKT õppekavade arendusmetoodika tutvustus
IKT õppekavade arendusmetoodika tutvustus (1/12) Metoodika koostamise taust Metoodika koostamist juhtis, Leego Hansson HITSA tellimusel IT Akadeemia programmi raames 2017. a. mai - september Töö käigus
More informationHorisont 2020 IKT tööprogramm Aavo Kaine
Horisont 2020 IKT tööprogramm 2018 2020 Aavo Kaine 21. nov 2017. a. IKT tööprogramm 2018-2020 Kogu eelarve kolme aasta peale 2,69 miljardit eurot 2018 806,02 m 2019 932,82 m 2020 955,32 m KOKKU 2694,16
More informationRebel Rulers: Insurgent Governance And Civilian Life During War. By Zachariah Cherian Mampilly READ ONLINE
Rebel Rulers: Insurgent Governance And Civilian Life During War By Zachariah Cherian Mampilly READ ONLINE Rebel Rulers, Insurgent Governance and Civilian - Rebel Rulers. When insurgents take Cherian Mampilly's
More informationE-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME
E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE 7-8 September 2017, Tartu PROGRAMME Wednesday, 6 september 2017 Arrival of delegations at Tallinn Airport Independent
More informationCommonwealth Cyber Initiative Letters of Support
James Madison University Norfolk State University University of Mary Washington Virginia Commonwealth University Virginia Community College System Virginia State University Commonwealth Cyber Initiative
More informationEurope and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY
Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main
More information10 years young Total: 28 missions, > personnel Wide variety of mandates, but often incl. Security Sector Reform Launchable in 3-6 weeks (EUMM)
European Council on Defence 2013 Priorities and Perspectives Brigadier General Walter Huhn walter.huhn@eeas.europa.eu 10 years of CSDP achievements CSDP missions & operations 10 years young Total: 28 missions,
More informationBisk CPA Review: Financial Accounting & Reporting - 43rd Edition 2014 (Comprehensive CPA Exam Review Financial Accounting & Reporting) (Cpa Review...
Bisk CPA Review: Financial Accounting & Reporting - 43rd Edition 2014 (Comprehensive CPA Exam Review Financial Accounting & Reporting) (Cpa Review... And Reporting Business Enterprises) PDF America's
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationReducing Risk and Building Capacity
Reducing Risk and Building Capacity The Cybersecurity Capacity Maturity Model (CMM) for Nations Prof Michael Goldsmith Global Cyber Security Capacity Centre (GCSCC) April 2017 Delivering Effective Cybersecurity
More informationTEOREETILISE VÄLJÕPPE TEEMA
Majandus- ja kommunikatsiooniministri 03.07.014. a määrus nr 49 Mootorsõiduki ja selle haagise tehnonõuetele vastavuse kontrollija atesteerimise nõuded ja kord Lisa 3 ÜLEVAATAJA VÄLJAÕPPE, PRAKTIKA JA
More informationENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes:
Become Certified in Government Technology Leadership ENROLL NOW CERTIFIED GOVERNMENT C H I E F I N F O R M AT I O N O F F I C E R for 2017-18 classes! FIRST COME FIRST SERVED SEATING IS LIMITED CERTIFIED
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationA Glimpse into the Future
Post-Trade Forum A Glimpse into the Future Thursday, 6 December 2018, 12:00 16:30 The Gibson Hall, 13 Bishopsgate, London EC2N 3BA Program Thursday, 6 December 2018 Your host: Brendon Bambury, Head Post-Trade
More informationObjective: Education:
Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process
More informationThirtieth Annual. Electrical & Computer Engineering Day
\ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day
More informationCyber and Supply Chain Policy Issues
Manufacturing Division Meeting Cyber and Supply Chain Policy Issues Eisenhower School for National Security and Resource Strategy National Defense University Fort McNair, Washington, DC February 21, 2013
More informationCenter for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS
Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information
More informationBig Data Meets High-Performance Reconfigurable Computing
Big Data Meets High-Performance Reconfigurable Computing UF Workshop on Dense, Intense, and Complex Data Alan George CHREC Center Director Herman Lam CHREC Center Associate Director June 19, 2013 What
More informationThis document is a preview generated by EVS
EESTI STANDARD EVS-EN ISP 10612-9:2000 INFOTEHNOLOOGIA. RAHVUSVAHELINE STANDARDPROFIIL RD. MEEDIUMIPÖÖRDUSE JUHTIMISE (MAC) TEENUSE TRANSLATSIOON TRANSPARENTSE SILDAMISEGA. OSA 9: STANDARD RD53.54 (LUBARING-KOHTVÕRK
More informationInfoturbe koolitus otsustajatele. CV -Rünno Reinu. CV Aare Reintam Rünno Reinu/Aare Reintam
Riigi Infosüsteemi Amet/ Tallinna Tehnikaülikool/ SecTeam OÜ Infoturbe koolitus otsustajatele Rünno Reinu/Aare Reintam 24.03.2017 CV -Rünno Reinu Praegu: EU SecTeam OÜ asutaja, infoturbe konsultant, koolitaja
More informationPanel on Cloud Services Security and Safety in Cloud-based Systems and Services
Panel on Cloud Services Security and Safety in Cloud-based Systems and Services Moderator Dr Bob Duncan Business School/Computing Science/Geology & Petroleum Geology University of Aberdeen Aberdeen, UK
More informationIndustry Perspectives on Active and Expected Regulatory Actions
July 15, 2016 Industry Perspectives on Active and Expected Regulatory Actions Alan Chvotkin Executive Vice President and Counsel, Professional Services Council chvotkin@pscouncil.org Trey Hodgkins Senior
More informationNational CIRT - Montenegro. Ministry for Information Society and Telecommunications
National CIRT - Montenegro Ministry for Information Society and Telecommunications Regional Cybersecurity Forum Sofia, November 2016 CIRT ESTABLISHMENT Key Organizations in establishing Montenegro CIRT:
More informationX-road v6 monitoring. Toomas Mölder May 4, 2017 X-Road Community Spring 17
X-road v6 monitoring Toomas Mölder May 4, 2017 X-Road Community Spring 17 Contents Benefits, why? X-Road monitoring options Environmental Operational Usage statistics Monitoring in general Ensures that
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationNetworking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud
Networking Session - A trusted cloud ecosystem How to help SMEs innovate in the Cloud ICT2015, 21 October 2015 Lisbon, Portugal Dr. Paolo Balboni, Partner at ICT Legal Consulting & Scientific Director
More informationCurrent and Emerging Trends in Cyber Operations
Current and Emerging Trends in Cyber Operations Palgrave Macmillan s Studies in Cybercrime and Cybersecurity This book series addresses the urgent need to advance knowledge in the fields of cybercrime
More informationE-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE. 7-8 September 2017, Tartu PROGRAMME
E-VOLUTION OF DATA PROTECTION (IMPLEMENTATION OF DATA PROTECTION REFORM) CONFERENCE 7-8 September 2017, Tartu PROGRAMME Wednesday, 6 september 2017 Arrival of delegations at Tallinn Airport Independent
More informationTexas Education Data Standards (TEDS) Public Education Information Management System (PEIMS) Section 8 PEIMS Introduction to TEDS
Texas Education Data Standards (TEDS) Public Education Information Management System (PEIMS) Section 8 PEIMS Introduction to TEDS March 31, 2015 Prepared by: State Education Data Systems (SEDS) Team This
More informationIntroduction to BSafe.Network
Introduction to BSafe.Network Shigeya Suzuki, Ph.D Associate Director, Technology Officer, Blockchain Laboratory, Keio Research Institute at SFC Project Associate Professor, Graduate School of Media and
More informationThe Big Data Debate 2016 Cybersecurity & health information
The Big Data Debate 2016 Cybersecurity & health information Big Data Conference Sydney 11 October 2016 4711194 Sponsored by Debate proposition There is nothing wrong with maintaining the status quo i.e.
More informationGTA West Corridor Review
Newsroom : GTA West Corridor Review Search News $ Search Français Newsroom Bulletin GTA West Corridor Review October 7, 2016 11:30 A.M. Ministry of Transportation In December 2015 the Ministry of Transportation
More informationOther reports in this series. National Cyber Security Organisation in Czech Republic. National Cyber Security Organisation in France
This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre, NATO, any agency or any government.
More informationARCHITECTURE-BASED NETWORK SIMULATION FOR CYBER SECURITY. John A. Hamilton, Jr.
Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, eds. ARCHITECTURE-BASED NETWORK SIMULATION FOR CYBER SECURITY John A. Hamilton, Jr. Office
More informationHOW TO CREATE, EDIT, AND TAG YOUR EVENT 1
HOW TO CREATE, EDIT, AND TAG YOUR EVENT 1 Table of Contents HOW TO LOGIN 2 ADDING A NEW EVENT 3 EVENT INFORMATION: 3 EVENT URL 4 EVENT CONTACT 4 EVENT GROUP 4 LOCATION 6 ADDITIONAL INFORMATION (EVENT REGISTRATION/RSVP)
More informationOctober 15, Ferst Center for the Arts Georgia Institute of Technology
October 15, 2008 Ferst Center for the Arts Georgia Institute of Technology About the Summit The 2008 GTISC Security Summit on Emerging Cyber Security Threats is the sixth security summit hosted at Georgia
More informationIntroduction of Security Study in Tokyo Denki University
Conference for INCS-CoE Nov. 1st, 2016 Introduction of Security Study in Tokyo Denki University Professor, Tokyo Denki University Ryoichi Sasaki sasaki@im.dendai.ac.jp 1 University Overview Tokyo Denki
More informationHeadteacher Mrs D Gould, NPQH, BA Hons (Birmingham), PGCE (Birmingham), (SLT)
Headteacher Mrs D Gould, NPQH, BA Hons (Birmingham), PGCE (Birmingham), (SLT) Deputy Head Mrs A Chapman, MA (Open University), BA Hons (Nottingham), PGCE (Warwick), Business, EPQ (SLT) Chaplain Ms J Whitehead,
More informationIEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018
IEEE Ghana Section NEW OFFICERS- January 2017 to December 2018 IEEE National Chair He is IEEE senior member. He received his PhD degree in Information Technology in 2014 from Aalborg University, Denmark.
More informationLeAnn Estep Director, Career & Technology Amarillo ISD
PROGRAM COMMITTEE NAME: ADVISORY COMMITTEE NETWORKING & CYBER SECURITY CHAIRPERSON: Heath Patterson MEETING DATE: 11/21/14 MEETING TIME: 12:05 P.M. MEETING PLACE: Lynne Library 207 The Forum RECORDER:
More informationBeyond Academia: Cyber Security Research Impacts. January Beyond Academia: Cyber Security Research Impacts
Beyond Academia: Cyber Security Research Impacts January 2017 Never Stand Still The Australian Centre for Cyber Security Beyond Academia: Cyber Security Research Impacts 1 ACCS INCUBATOR IMPACT #1: MILITARY
More informationCOMMUNICATIONS & SIGNAL PROCESSING. Dr. Cihan Tepedelenlioglu
COMMUNICATIONS & SIGNAL PROCESSING Dr. Cihan Tepedelenlioglu Area Chair: Dr. Andreas Spanias Professor and Director NSF SenSIP I/UCRC February 21, 2013 What is Signal Processing? Video Compression Audio
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability
ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability Prof. Dr. Paolo Balboni Founding Partner Professor of Privacy, Cybersecurity, and IT Contract
More informationINTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue
BISHOP COTTON WOMEN S CHRISTIAN LAW COLLEGE, BENGALURU IN COLLABORATION WITH ADVANCED CENTRE ON RESEARCH, DEVELOPMENT & TRAINING IN CYBER LAWS & FORENSICS [ACRDTCLF], NATIONAL LAW SCHOOL OF INDIA UNIVERSITY,
More informationCyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days
About Cyber Dialogue The Cyber Dialogue conference convenes an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated
More informationDoes the cloud require a new privacy framework? The European perspective. Thomas Fetzer
Does the cloud require a new privacy framework? The European perspective Thomas Fetzer 1 1. The foundations of privacy rights in Europe 1. The theoretical foundations 2. The Data Protection Directives
More informationMeeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University
Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University Twenty years ago it was reasonable to think that the demand for computer security would crest as technological
More informationImproving the Resilience of Critical Infrastructure from Natural Hazards
Improving the Resilience of Critical Infrastructure from Natural Hazards David Murphy Assistant Director Natural Hazards Team Civil Contingencies Secretariat Outline Civil Contingencies Secretariat Vulnerability
More informationSpring Seminar April 7 th & 8 th, 2016
Spring Seminar April 7 th & 8 th, 2016 Join the Montgomery Chapter for 16 hours of CPE! 1 Date: Thursday April 7, 2016 and Friday, April 8, 2016 Time: Registration/breakfast at 7:30 am with class beginning
More informationFederal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair
CENDI Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS 2008-10 CENDI Chair January 29, 2009 1 What is CENDI? Interagency group of senior federal
More informationINTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015
INTERNET GOVERNANCE LAW & POLICY LAW-811A (9:00 am - 10:50 am) El Escorial, Spain Summer 2015 Professor Roy Balleste, J.S.D. rballeste@stu.edu Course Description: This course analyzes the legal and technological
More informationIntroduction to Chapter 55
Introduction to Chapter 55 Thomas Land, PhD Director, Special Analytic Projects Office of Population Health Massachusetts Department of Public Health November 6, 2017 State of DPH Data in January 2015
More informationThe Policy Forum at AT&T
Tuesday, November 7, 2017 Speaker Biographies Len Cali Senior Vice President, Global Public Policy, AT&T Services, Inc. About Cali Len Cali serves in the AT&T External and Legislative Affairs organization
More informationProposed NSF Engineering Research Center for Smart Network Infrastructure for Fire Resilience SNIFFR
Proposed NSF Engineering Research Center for Smart Network Infrastructure for Fire Resilience November 13, 2013 Prof. Andre Marshall UMD PI Prof. Jay Gore Purdue Co-PI Pres. Gilbert Rochon Tuskegee Co-PI
More informationThis document is a preview generated by EVS
EESTI STANDARD EVS-EN ISP 10608-4:2000 INFOTEHNOLOOGIA. RAHVUSVAHELINE STANDARDPROFIIL TANNNN. ÜHENDUSEGA TRANSPORDITEENUS (COTS) ÜHENDUSETA VÕRGUTEENUSE (CLNS) KAUDU - OSA 4: PROFIILI TA53 MÄÄRATLUS,
More informationCenter for Secure Information Systems: An Overview Professor Sushil Jajodia
Center for Secure Information Systems: An Overview Professor Sushil Jajodia Center for Secure Information Systems jajodia@gmu.edu http://csis.gmu.edu/jajodia Outline Program history Current status Recognition
More informationorganised by: sponsored by:
Programme for Researchers 1-5 September 2008 Venue: Mediterranean Agronomic Institute of Chania Chania, Crete, Greece Understanding and thereby manipulating multimedia content at the semantic level is
More informationIntelligent Systems, Control and Automation: Science and Engineering
Intelligent Systems, Control and Automation: Science and Engineering Volume 93 Series editor Professor S. G. Tzafestas, National Technical University of Athens, Greece Editorial Advisory Board Professor
More informationEESTI STANDARD EVS-ISO/IEC 27003:2011
EESTI STANDARD EVS-ISO/IEC 27003:2011 INFOTEHNOLOOGIA Turbemeetodid Infoturbe halduse süsteemi teostusjuhis Information technology Security techniques Information security management system Implementation
More informationINTERNATIONAL ACADEMY FOR THE STUDY OF THE JURISPRUDENCE OF THE FAMILY OFFICERS AND MEMBERS, 2015
INTERNATIONAL ACADEMY FOR THE STUDY OF THE JURISPRUDENCE OF THE FAMILY President: OFFICERS AND MEMBERS, 2015 Professor Carlos Martínez de Aguirre University of Zaragoza. Spain Email: aguirre@unizar.es
More informationRDA: Where We Are and
RDA: Where We Are and Where We Need to Go Good Practices for Great Outcomes: Cataloging Efficiencies that Make a Difference Harvard University 30 November 2011 Christopher Cronin Christopher Cronin Director,
More informationCybersecurity: Federalism as Defense-in-Depth
SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:
More informationICTLC Paolo Balboni, Ph.D.
Managing personal data protection compliance: Privacy Level Agreements (PLA V3 CoC) for cloud service providers CSA NL Summit Leiden, The Netherlands, 13 April2017 Paolo Balboni, Ph.D. - @balbonipaolo
More informationEESTI STANDARD EVS-ISO/IEC :2011
EESTI STANDARD EVS-ISO/IEC 15408-1:2011 INFOTEHNOLOOGIA Turbemeetodid Infoturbe hindamise kriteeriumid Osa 1: Sissejuhatus ja üldmudel Information technology Security techniques Evaluation criteria for
More informationUpdated with information about the new certificate programs THE KU MSIT HANDBOOK 1
2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According
More informationStatisticians in the Federal Government: Producing Data on the Criminal Justice System
Statisticians in the Federal Government: Producing Data on the Criminal Justice System Washington Statistical Society Gonzaga College High School Washington, DC February 5, 2019 Jeri M. Mulrow Vice President
More informationMoving Your Business Forward
Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER
More informationSee dokument on EVS-i poolt loodud eelvaade
EVS-ISO 1087-2 EESTI STANDARD EVS-ISO 1087-2:2002 TERMINOLOOGIATÖÖ. SÕNASTIK Osa 2: Arvutirakendused Terminology work. Vocabulary Part 2: Computer applications EESTI STANDARDIKESKUS AMETLIK VÄLJAANNE III
More informationProgramme for Researchers
Programme for Researchers 1-5 September 2008 Venue: Mediterranean Agronomic Institute of Chania Chania, Crete, Greece Understanding and thereby manipulating multimedia content at the semantic level is
More informationFederal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks
Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices
More informationTransforming the Data Center Lenovo. All rights reserved.
Transforming the Data Center Lenovo Data Center Group A global technology company with 55,000 employees supporting customers in over 160 countries to deliver PC, Mobile, and Data Center solutions Data
More informationSECURITY MANAGEMENT FOR SE LINUX
AFRL-IF-RS-TR-2003-22 Final Technical Report February 2003 SECURITY MANAGEMENT FOR SE LINUX George Washington University Sponsored by Defense Advanced Research Projects Agency DARPA Order No. N624/00 APPROVED
More informationGo West! Political, legal and operational aspects of cooperation between Europol and the United States
Go West! Political, legal and operational aspects of cooperation between Europol and the United States Alexandra De Moor IRCP - Ghent University, Belgium 1 Introduction PhD in Law Europol, quo vadis? Critical
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationIT Risk Management and Cybersecurity Summit
IT Risk Management and Cybersecurity Summit Dr. Bill Curtis Executive Director John Weiler Vice Chair 1 Seminar Objectives Latest developments in measurement standards: Software security IT software risk
More informationDigitalization the Way to Survive for Energy Sector. Hando Sutter CEO of Enefit / Eesti Energia Manufuture2017
Digitalization the Way to Survive for Energy Sector Hando Sutter CEO of Enefit / Eesti Energia 24.10.2017 Manufuture2017 Established in 1939 5800 employees 25 subsidiaries and related companies 2.500 mln
More informationRegional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia
Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia This workshop has been organized by the Secretariat of the Inter- American Committee against Terrorism
More informationCreating a Cybersecurity Culture: (ISC)2 Survey Responses
10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles
More informationWIRAB Report to the Peak RC Board of Directors
WIRAB Report to the Peak RC Board of Directors Eric Baran & Holly Taylor WIRAB Staff December 14, 2017 1 WIRAB Activities Peak RC Activities Outline 2 WIRAB Activities Fall 2017 Leadership Delegation to
More informationHomeland Security 1 1
1 Foster effective cybersecurity education and workforce by facilitating the availability of qualified It security professionals to support the Nation s cyber security needs Improve cyber security education/training
More informationGhufran Hijawi. Personal Profile
Executive Summary Achieved my MBA degree on Jan 2010 Excellent with Honor and PhD Program (Business Administration) in progress, while I am a full-time lecturer in WISE university, teaching undergraduate
More informationMinutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG
Minutes of the Individual Meeting between GCSEC and IMTM; GCSEC, IMTM and UDG Tempus project: Enhancement of cyber educational system of Montenegro (ECESM) Participants: EU Partners Massimo Cappelli, GCSEC
More informationChristopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal
Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Years with FEA: 20 Total Years Experience: 30+ Education: Master of Science, Materials Science & Engineering, Johns Hopkins University
More informationA Brief Introduction to CFINS
A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students
More informationMass Mailings Made Simple
Brigham Young University BYU ScholarsArchive All Faculty Publications 2005-04-01 Bonnie B. Anderson bonnie_anderson@byu.edu Larysa V. Oprya See next page for additional authors Follow this and additional
More informationDAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT
P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT APRIL 7, 2019 David Behinfar, Chief Privacy Officer University of North Carolina Health Katherine Georger, Associate
More informationTechnology Forecast 2018: What State and Local Government Technology Officials Can Expect
Technology Forecast 2018: What State and Local Government Technology Officials Can Expect Doug Robinson Executive Director NASCIO Alan Shark Executive Director PTI State-of-the-States 2018: IT Trends and
More informationHouse Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:
House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: Challenges of Recruiting and Retaining a Cybersecurity Workforce 2pm, September 7, 2017 Prepared Statement for
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationIT Governance and emerging trends
IT Governance and emerging trends Athens, 4 November 2013 Professor Georges Ataya Academic Director, Solvay Brussels School (solvay.edu/it) Past International Vice President, ISACA (isaca.org) Managing
More information