Data-Driven Policing Summit

Size: px
Start display at page:

Download "Data-Driven Policing Summit"

Transcription

1 Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington, D.C. performanceinstitute.org Earn 14 CPEs by attending Predictive Policing to Analyze and Reduce Crime Use powerful data analytics methods to forecast where crime is coming from and where it is going next Reduce Risk and Evaluate Use of Force Evaluate data on traffic stops, use-of-force, and other isues to flag risks and problems. Deploy Data to Police Officers in the Field Equip police officers on the front line with data to improve field outcome Manage Data Integration While Ensuring Privacy Improve the sharing of data across government agencies while protecting privacy rights of citizens

2 WELCOME Why Attend Law enforcement agencies across the nation are unlocking the amazing potential of big data with spectacular results. That s why the Data-Driven Policing Summit is tackling the latest methodologies, best practices and technologies for using data analytics to reduce crime, manage risk, and improve internal operations of police departments. By attending the Data-Driven Policing Summit, you will emerge with practical and proven solutions for a number of key challenges facing police departments. Data Analytics for Police Departments: Best practices for collecting, analyzing and using data for modern-day policing integrating and synthesizing all your data from sources such as crime and arrest records, field interview cards, and new monitoring technologies (automatic license plate readers) Predictive Policing: Use predictive analytics to forecast where criminals are likely to strike next Data Sharing with Outside Sources: Identify data sets from other law enforcement and governmental agencies that could be harnessed to improve insight on crime trends in your community. Utilize New Technologies for Data Mining: Utilize data from automatic license plate readers, body cameras, private camera and video systems, and more! Risk Management: Utilize data analysis to create an early-warning system for problem officers on a wide range of issues from racial profiling to use-of-force Privacy Protection and Data Security: Stay up-to-date on the latest case law and compliance mandates for protecting privacy and securing access to data Performance Analysis and Reporting: Prepare and analyze critical data relating to a wide variety of operational matters including police calls and incidents, interactions with the public, use-of-force incidents, administrative processes, officer training and workforce management Field Deployment of Data: Utilize mobile computing and distributed analysis to equip front-line police officers with insight to do their jobs better and safer

3 MONDAY, SEP 18 SESSIONS Time 8-8:30 Registration and Breakfast 8:30-9:15 9:15-10:30 10:45-12:00 Keynote: How Big Data is Transforming Policing and Reducing Crime in Communities Across the Nation Leadership Panel: Best Practices for Running a Data Analytics Unit in your Police Department Predictive Policing: Analyzing Crime Data to Give Your Officers a Head Start on Criminal Behavior 12-1 Lunch on your own 1-2:00 Utilizing New Technologies for Data Collection in Law Enforcement 2-3:00 3:15-4:15 Connecting the Dots: Harnessing Data Across Agencies and from Third Parties CrimeStat: Conducting Data-Driven Performance Reviews in Your Department to Drive Change DATA-DRIVEN POLICING 2017 TUESDAY, SEP 19 SESSIONS 8-8:30 Registration and Breakfast 8:30-9:15 9:15-10:30 10:30-10:45 10:45-12:00 12:00-1:00 1:00-2:00 1:00-4:30 Deploying Your Data to Front Line Officers Using Data Analytics to Reduce Officer Complaints, Liabilities, and Mistakes Break Navigating Liabilities with Data Analytics: Avoid mislabling someone a criminal, maintain privacy, and security issues Lunch on your own Utilizing New Technologies for Data Collection in Law Enforcement Optional Workshop: Implementing a Predictive Policing Initiative What is predictive modeling its value and its limitations Identifying and harnessing data sets neede dfor a viable predictive policing initiative Understanding behavioral science and predictive analytics Testing your predictive policing theories to further refine your approach Deploying predictive policing into the field Assessing and imporiving predictive policing initaitives

4 NO MATTER your challenge or budget size, The Performance Institute has training programs and consulting services to help you maximize your performance, efficiency, and effectiveness. OUR AREAS OF EXPERTISE Strategic Planning and Performance Measurement Data Analysis and Performance Reviews Process Improvement and Customer Service Employee Engagement and Change Management Program Restructuring and Innovation Pilots Budget Justifications and Evidence-Based Analysis GET CERTIFIED as a Government Performance Manager (CGPM) Advance your career by completing The Performance Institute s certification program in government performance management. Take as few as five courses to complete your certification! Learn more about CGPM Certification and uncoming training forums at performanceinstitute.org

5 HOW TO REGISTER ONLINE Register online at performanceinstitute.org CALL Additional discounts may be available. Contact PI for more information. Registration Fees Registration Type Summit Location Conference Conference + Workshop Early Bird / Until Aug 18 $995 $1495 General Registration $1095 $1595 The Performance Institute / AdvanEdge Business Center 2101 L St. NW, Suite 400 Washington, DC 20037

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

THE BEST & MORE OCT , 2018 / LAS VEGAS, NV / REGISTER AT

THE BEST & MORE OCT , 2018 / LAS VEGAS, NV / REGISTER AT THE BEST & MORE OCT. 22 24, 2018 / LAS VEGAS, NV / REGISTER AT WWW.THEIIA.ORG/ALLSTAR 2018 ALL STAR Conference THE BEST & MORE Oct. 22 24, 2018 / Las Vegas, NV What You Will Gain: Tools for monitoring

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

Certificate in Security Management

Certificate in Security Management Certificate in Security Management Page 1 of 6 Why Attend This course will provide participants with an insight into the fundamentals of managing modern and effective security operations. It will address

More information

Cisco Smart+Connected Communities

Cisco Smart+Connected Communities Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

Washington State Emergency Management Association (WSEMA) Olympia, WA

Washington State Emergency Management Association (WSEMA) Olympia, WA Washington State Emergency Management Association (WSEMA) Olympia, WA Request for Proposals Website Redesign and Content Management and Maintenance System Proposal Submittal Deadline: I. Introduction and

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5 Dear Colleague, Unlike any other MAILCOM, the Annual Fall Convention puts you in touch with the leading executives and managers in the mail communication and distribution industry. For three days you will

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

Ringtail Certification Program Guide

Ringtail Certification Program Guide Ringtail Certification Program Guide Confidentiality This document was prepared by FTI Consulting Technology LLC ( FTI ). It contains proprietary information. We submit the enclosed with the express understanding

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015 VERSION 1.0 JANUARY 31, 2015 2015-2018 STRATEGIC PLAN NATIONAL ALLIANCE FOR PUBLIC SAFETY GIS FOUNDATION 1250 24TH STREET NW SUITE 300 WASHINGTON, DC 20037 2015-2018 STRATEGIC PLAN VISION A Nation of emergency

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration TOMORROW. TOGETHER. 2013 Governance, Risk, and Control Conference An IIA & ISACA Collaboration Join two highly respected associations at one world-class event August 19-21, 2013 Phoenix, Arizona Reserve

More information

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation SOLUTIONS CENTER SOLUTION SUMMARY From digitalization initiatives

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

IT Management Excellence. Contents are subject to change. For the latest updates visit Page 1 of 7

IT Management Excellence. Contents are subject to change. For the latest updates visit Page 1 of 7 IT Management Excellence Page 1 of 7 Why Attend Managing an IT function is very different from developing or supporting technical IT solutions. General management skills are helpful to the IT manager,

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013 Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION

More information

Survey Report Industry Survey. Data Governance, Technology & Analytics Trends Q1 2014

Survey Report Industry Survey. Data Governance, Technology & Analytics Trends Q1 2014 2018 Industry Survey Survey Report Q1 2014 Data Governance, Technology & Analytics Trends September 2018 About IDMA What we do The IDMA provides a forum for professionals engaged in enterprise data governance

More information

IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template)

IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template) IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template) Department of Evidence and Intelligence for Action in Health PAHO/WHO Workshop on Developing a National ehealth

More information

Integrating HIPAA into Your Managed Care Compliance Program

Integrating HIPAA into Your Managed Care Compliance Program Integrating HIPAA into Your Managed Care Compliance Program The First National HIPAA Summit October 16, 2000 Mark E. Lutes, Esq. Epstein Becker & Green, P.C. 1227 25th Street, N.W., Suite 700 Washington,

More information

PIONEER TRAINING INSTITUTE

PIONEER TRAINING INSTITUTE PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

Expand Your Cyber Expertise. Secure Your Future.

Expand Your Cyber Expertise. Secure Your Future. Expand Your Cyber Expertise. Secure Your Future. CSX 2018 North America will help you stay on top of the latest cybersecurity trends, broaden your cyber know-how and skills, and make new connections with

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

CyberSecurity Internships The Path to Meeting Industry Need

CyberSecurity Internships The Path to Meeting Industry Need CyberSecurity Internships The Path to Meeting Industry Need Room Seacliff A Tuesday October 17 Bruce Maas Emeritus Vice Provost for IT and CIO University of Wisconsin-Madison Innovation Fellow Internet2

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

The Role of IT in HIPAA Security & Compliance

The Role of IT in HIPAA Security & Compliance The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics SMART POLICING FOR SMALL AGENCIES Increase Community Safety with Intelligent Maps and Analytics Build a more efficient, productive agency using powerful map analytics. For more than 20 years, law enforcement

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Zubair A Rehman Bin Saeed

Zubair A Rehman Bin Saeed Zubair A Rehman Bin Saeed https://pk.linkedin.com/in/zubairabdulrehmanbinsaeed 0304-6090990 / 0324-500559 Pakistan Safety Security & Loss Prevention Management Protecting People Assets & Property I am

More information

Intelligence Led Policing: Enhancing Force Deployment in Law Enforcement and Counter-Terrorism Using Data & Visual Analytics

Intelligence Led Policing: Enhancing Force Deployment in Law Enforcement and Counter-Terrorism Using Data & Visual Analytics Intelligence Led Policing: Enhancing Force Deployment in Law Enforcement and Counter-Terrorism Using Data & Visual Analytics Joint Project of DHS, the Port Authority of NY and NJ, PNNL, Rutgers University

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication Oregon State Police Information Technology Pride Dedication Honor Loyalty Presented by: David Alamein, CIO & Tom M. Worthy, Captain Presentation Date: March 31, 2015 OSP I.T. Mission and Strategy Modernize

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

BUILT FOR THE STORM. AND THE NORM.

BUILT FOR THE STORM. AND THE NORM. BUILT FOR THE STORM. AND THE NORM. Data volumes are overwhelming. Stakes are sky-high. Time frames are shorter than ever. GET ANSWERS NOW. EM[URGENT]CY EXIT In a world where the routine can quickly become

More information

CenturyLink for Microsoft

CenturyLink for Microsoft Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

Memorandum of Agreement

Memorandum of Agreement Memorandum of Agreement I. Parties This agreement is entered into between the Disaster Management Electronic Government Initiative (DM Egov) in the Department of Homeland Security (DHS), and the Emergency

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

Dane County Criminal Justice Council Data-Sharing Project Progress Report

Dane County Criminal Justice Council Data-Sharing Project Progress Report Dane County Criminal Justice Council Data-Sharing Project Progress Report February 2018 Prepared for Dane County Criminal Justice Council Dane County, Wisconsin The Dane County Criminal Justice Council

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

Does More IT Utilization Improve Police Performance?

Does More IT Utilization Improve Police Performance? Does More IT Utilization Improve Police Performance? Mobark Q. Aldossari University of North Texas Mobark.Aldossari@unt.edu Emergent Research Forum Paper Dan J. Kim University of North Texas Dan.Kim@unt.edu

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

Data Systems for Policing in the 21 st Century:

Data Systems for Policing in the 21 st Century: Data Systems for Policing in the 21 st Century: Two Projects to Facilitate Local Law Enforcement Implementation and Use of Incident-Based Data Systems Compatible with the FBI s Reporting Requirements Project

More information

Strategic threat advisory services

Strategic threat advisory services Strategic threat advisory services Preparing you to be secure Physical security threats most often come without warning. Today, every growing organisation needs to be ready to combat such risks to stay

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global

More information

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV)

PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) PRIVACY IMPACT ASSESSMENT CONDUCTING A PRIVACY IMPACT ASSESSMENT ON SURVEILLANCE CAMERA SYSTEMS (CCTV) 1 Principle 2 of the surveillance camera code of practice states that the use of a surveillance camera

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

Corporate Governance and Internal Control

Corporate Governance and Internal Control 01 20 Lawson 93 Lawson strives to enhance Corporate Governance by improving the soundness and transparency of management, through ensuring compliance and affirmative disclosure. Overall view of Lawson

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

CA Services Partner. Implementation Enablement. Eugene Banks FY18

CA Services Partner. Implementation Enablement. Eugene Banks FY18 CA Services Partner Implementation Enablement Eugene Banks FY18 Without partners, CA Services and Education would be unable to scale to meet the growing demands of the business. If our strategy is effective,

More information

NOT PROTECTIVELY MARKED. Public SPA Board Meeting Date 15 December 2016 Assembly Room, Tulliallan, Alloa

NOT PROTECTIVELY MARKED. Public SPA Board Meeting Date 15 December 2016 Assembly Room, Tulliallan, Alloa Meeting Public SPA Board Meeting Date 15 December 2016 Location Assembly Room, Tulliallan, Alloa Title of Paper SPA Forensic Services Report Item Number 14 Presented By Tom Nelson, SPA Recommendation to

More information

Objective: Education:

Objective: Education: Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information