CO-CREATIVE INTELLIGENCE MITÄ IHMETTÄ SE MERKITSEE? Pauli Kuosmanen CTO DIGILE
|
|
- Lizbeth Wilkins
- 6 years ago
- Views:
Transcription
1 CO-CREATIVE INTELLIGENCE MITÄ IHMETTÄ SE MERKITSEE? Pauli Kuosmanen CTO DIGILE
2 Next Media Services program Internet of Things From Data to Intelligence Cloud Software STRATEGIC COMPETENCE FOCUS DEVELOPMENT Digital services in Internet economy Digital media Service design Big and open 2 data Internet of things Cloud computing Co-creative intelligence State of the art Computational and human intelligence & innovation with business development Telecom including mobile communication competences and business Challenger Computational including cloud computing and big data competences and business 1. From old paradigm to digital service paradigm ( ) 2. Accelerated business growth! (2012 ) 3. Definition of the new paradigm as one of the leaders! ( ) 2
3 Internet economy structure DIGILE RESEARCH PROGRAM PORTFOLIO 2Q/2015 Need for Speed (2/4) Mercury business F-Secure Speedy recovery (1/4) Seamless Healthcare GE + Local Tapiola Digital Services (4/4) Web of services Nokia Data to Intelligence (4/4) Acting on data Tieto Cyber Trust (1/4) Internet of Things (4/4) Trust infrastructure Internet everywhere EB Ericsson Networks Building blocks Services and solutions Business models Ecosystems New Paradigms 3
4 Internet economy structure DIGILE RESEARCH PROGRAM PORTFOLIO 2Q/2016 Innovation Automation Augmented Human Need for Speed (3/4) Mercury business F-Secure Speedy recovery (2/4) Seamless Healthcare GE + Local Tapiola Healthy urban living (1/4) Resilient City?? Service Co-creation (1/4) Co-creative computing?? Cyber Trust (2/4) Trust infrastructure EB Networks Building blocks Services and solutions Business models Ecosystems New Paradigms
5 CONTENT Ongoing funding activities N4S Cyber Trust Starting activities (Tampere leading) Visual and Decision Informatics (With NSF USA) New paradigm: Co-Creative Intelligence
6 N4S
7
8 ROUTE TOWARDS CONTINUOUS DEPLOYMENT IS JUST THE BEGINNING Fast Cycle time CI CD IID Iterative and Incremental Development 1960-> Agile Individuals and interactions over processes and tools. Working software over comprehensive documentation. Customer collaboration over contract negotiation. Responding to change over following a plan > Continuous Integration In RD, merging all developer workspaces with a shared mainline several times a day. It was first named and proposed as part of extreme programming (XP) > Continuous Deployment In company level, software developed to a high standard and easily packaged and deployed to test environments, resulting in the ability to rapidly, reliably and repeatedly push out enhancements and bug fixes to customers at low risk and with minimal manual overhead > Integration level in the Company Vast
9 Cycle time Fast PARADIGM CHANGE REAL-TIME VALUE DELIVERY Real-time IID Agile CI CD Real-time Value Delivery Provide the technical infrastructure and capabilities to allow organizations to deliver new features and new minimum viable products and services significantly faster Deep Customer Insight Significantly improved business hit-rate by linking deep customer insight to the development. Systematic use of real-time feedback, market trends and behavior, analytics & visualization technologies. Develop a tool-based infrastructure for continuous experimentation and live customer feedback Mercury Business Defining and implementing active and continuous strategy and business models in pursuit of new emergent opportunities. Active portfolio and corporate business strategy management, continuous creation of strategic options, fast decision making. Redefinition of competences and capabilities how to move to business areas not currently company s core business. Integration level in the Company Vast
10 WORK PACKAGE STRUCTURE WP1: Delivering Value in Real Time Jari Partanen, Elektrobit WP2: Deep Customer Insight Joonas Lyytinen, Reaktor WP3: Mercury Business Ilona Nevalainen, Ericsson WP0: Program Coordination Tua Huomo, VTT WP4: Dissemination, Deployment & International Collaboration Ari Turunen, SA 10 10
11 NUMERICAL PLAN Budget plan TOTAL Industry Research TOTAL Partner plan Industry SME Research TOTAL
12 Cyber Trust
13 SRA VISION Finland will be a globally recognized hub for trusted and trust enhancing digital services based on top level cyber security solutions and services actively developed and maintained in international cooperation by leading experts and companies
14 PARADIGM CHANGE Cyber security as an Enabler rather than a barrier for trust Proactive model for security through enhanced design Gain new business through solid cooperation with stakeholders
15 RESEARCH THEMES Theme 1: Security technology Security technologies are technical means for fulfilling the recognized security requirements of the system, and for building resilient systems with dependable hardware and software that can also meet future security challenges Security technologies enable the technical protection of infrastructure, platforms, devices, services, and data The expected research results in this area include design patterns for secure system architectures, protocols and implementation as well as tools and platforms for secure system development and deployment Focus areas: Securing new network infrastructures Embedded, mobile and ubiquitous platform security Identification and privacy protection
16 RESEARCH THEMES Theme 2: Security management and governance The goal of this theme is to enable organizations to address both human and organizational aspects of information security These aspects include for example: Change of mentality (or culture) towards information security among all stakeholders, and especially in management level Provide methods and tools to understand and assist information security investments Focus areas: Security policy development and implementation Information security investment, incentives, and trade-offs
17 RESEARCH THEMES Theme 3: Situation awareness Cyber situation awareness is a key factor to prevent, identify and protect from the cyber incidents In a proactive operating mode, we seek to find the vulnerabilities before the attacker The target of the focus areas lie in understanding of the prevailing situation in networks, such as: unwanted data transfers anomaly detection for identifying and protecting against APTs and the development of early warning framework to count real time threat s risk probabilities and to enable sophisticated nation-wide defense against security breaches and threats Focus areas: Observations Analysis Visualization
18 RESEARCH THEMES Theme 4: Resiliency Resilience is about adapting to changing conditions, in the case of information security, based on run-time situation awareness and a prior risk analysis Novel resiliency techniques are needed to protect critical systems from APTs. Initially, six potential component techniques were identified: active and passive countermeasures managing the explosion of traffic techniques to improve resiliency of industrial control systems self-protection recovery dynamic policies that automatically ramp up security protections Focus areas: Active and passive countermeasures Unwanted content Improved resiliency of industrial control systems Self-protection and -healing
19 PROGRAM STRUCTURE Focus Area Director: Markku Korkiakoski, Elektrobit Academic Coordinator: Juha Röning, University of Oulu Program Coordinator: Tapio Frantti, University of Oulu WP1: Secure Services WP lead: Markus Sihvonen, MPY Academic coordinator: Martti Lehto, University of Jyväskylä WP4: Advanced Threats and Security Assurance WP lead: Alexey Kirichenko, F-Secure Academic Coordinator: Ville Leppänen, University of Turku WP5: H2020 Project and Co-operation Preparations WP lead: Jani Kaarlejärvi, Digile WP2: Secure Platforms WP lead: Raino Lintulampi, Elektrobit Academic Coordinator: Billy Brumley, Tampere University of Technology WP3: Security in New Network Technologies WP lead: Bengt Sahlin, Ericsson Academic Coordinator: Tuomas Aura, Aalto
20 NUMERICAL PLAN Budget plan Phase 1 Phase 2 Phase 3 Phase 4 TOTAL Industry Research TOTAL
21 Visual and Decision Informatics (With NSF USA)
22
23
24 Co-Creative Intelligence
25 INTELLIGENCE Intelligence is the ability to learn about to learn from to understand about, and to interact with one s environment Intelligence is the faculty of understanding
26 HISTORY OF INTELLIGENCE Human intelligence - Developing - Slow improvements Human intelligence - Developing - Slow improvements Human intelligence - Developed - Slow improvements Crowd intelligence - Developing Machine intelligence - Raw - Slow improvements Machine intelligence - Developing - Slow improvements Now Time 26
27 FUTURE OF INTELLIGENCE Co-Creative Intelligence Human intelligence - Developed - Slow improvements Crowd intelligence - Developing Machine intelligence - Developing with high speed Co-Creative Intelligence Human intelligence - Developed - Slow improvements Crowd intelligence - Developed - Slow improvements Machine intelligence - Developing with extreme speed Now 2040?? Strong artificial intelligence - Developing with noncontrollable speed Time 27
28 ROLE OF MACHINE Tool Assistant Collaborator? Potential: huge Fear: overlord Design goal: moral entity
29 CO-CREATIVE INTELLIGENCE Mixture of intelligence categories in one way or other Dominant category of intelligence in the next 10- years DIGILE s question: What are the needed competencies to build growth and new jobs based on this development 29
30 CO-CREATIVE INTELLIGENCE Co-Creative Intelligence is about accessing the best intelligences of two worlds: Machines for speed and productivity Human For emotional intelligence, intuition, creativity, and handling-the-unknown
31 Value delivery BETTER TOGETHER Comp + human Comp alone Time
32 RELEVANT TECHONOGIES INCLUDE Artificial intelligence Machine learning Deep learning Cognitive computing Neuroscience Human-computer interaction Future computing platforms
33 Human Machine Humans and machines will work together to produce better results Each bringing their own superior skills to the partnership The machines will be more rational more analytic encyclopedic memories tremendous computational abilities understanding human behaviours, intents, and needs better People will provide judgment and morality intuition empathy human creativity sense of togetherness
34 MAIN RESEARCH QUESTIONS How to create optimal complementarity and efficiency in human-human and human-machine collaboration? What are the best combinations, markers and enablers of fruitful human and machine potential? What enabling technologies are needed for addressing the question?
35 MORE INFORMATION
36 Web -list Send your contact details to
PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationSECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices
More informationTowards secure Internet. TIVIT results and business forum, Prof. Mika Rautila VTT Technical Research Centre of Finland
Towards secure Internet TIVIT results and business forum, 12.4.2011 Prof. Mika Rautila VTT Technical Research Centre of Finland 2 Tivit Future Internet Program 2008-2013 Vision: Future Internet = a mission
More informationCREATE INNOVATION AT THE CORE
CREATE INNOVATION AT THE CORE Introduction From smart railway stations and connected lighting to high-speed train carriage WiFi and data security frameworks, Cisco CREATE (Collaborative Research and Emerging
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationIEEE CSCN Genesis Taking the first steps towards 6G. Prof. Ari Pouttu. Centre for Wireless Communications. University of Oulu
31.10.2018 IEEE CSCN 2018 Prof. Ari Pouttu Centre for Wireless Communications 6Genesis Taking the first steps towards 6G University of Oulu 5G Modes The view on 5G modes by Nokia 5G Key Elements Nokia
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationCyber Resilience: Developing a Shared Culture. Sponsor Guide
Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show
More informationThe Center for Internet Security
The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationSpace Cyber: An Aerospace Perspective
Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationDEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.
DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY
More informationVMworld 2015 Track Names and Descriptions
Software- Defined Data Center Software- Defined Data Center General VMworld 2015 Track Names and Descriptions Pioneered by VMware and recognized as groundbreaking by the industry and analysts, the VMware
More informationR&D to shape the networks and services of the future
R&D to shape the networks and services of the future IEEE-ICC'13 Budapest, 12 th June 2013 Panel: Horizon 2020 Europe's major new collaborative R&D Programme Luis Rodríguez-Roselló European Commission
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationModernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure
Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationTechValidate Survey Report: SaaS Application Trends and Challenges
TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationSMART. Investing in urban innovation
SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationdeep (i) the most advanced solution for managed security services
deep (i) the most advanced solution for managed security services TM deep (i) suite provides unparalleled threat intelligence and incident response through cutting edge Managed Security Services Cybersecurity
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationCyber Threat Landscape April 2013
www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationAccelerating the Business Value of Virtualization
Accelerating the Business Value of Virtualization Maximizing virtualization is one of the important steps in the journey towards delivering dynamic, cloud-based services. By leveraging the partnership
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationOptus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director
Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director Our Vision Support Australia's growth in a complex world via education and research excellence in cyber security
More informationDanish Cloud Maturity Survey 2018
Danish Cloud Maturity Survey 2018 Current and planned adoption of cloud services Danish Cloud Maturity Survey 2018 1 Early days for cloud adoption with concerns for security and expertise, and complexity
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin
ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationHandling Economic Uncertainty While moving forward to a Smarter Planet
David Simms - Director, Integrated Technology Services, CEE, May/2009 Handling Economic Uncertainty While moving forward to a Smarter Planet Agenda Smarter Planet Economic Crisis Dynamic Infrastructure
More informationFDA & Medical Device Cybersecurity
FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US
More informationPowering Resilience. Keep your business on 24/7. Proposition series September 2017
Powering Resilience Keep your business on 24/7 Proposition series September 2017 Centrica Business Solutions Powering Resilience Reliable power is mission-critical As more businesses become digital, the
More informationCase Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform
Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationCyber Security Beyond 2020
Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationTransport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank
WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationDisaster Management and Security Solutions to Usher in the IoT Era
Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationWhy Converged Infrastructure?
Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. According to a recent survey
More informationehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration
ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13
More informationThe Connected Water Plant. Immediate Value. Long-Term Flexibility.
The Connected Water Plant Immediate Value. Long-Term Flexibility. The Water Industry is Evolving Reliable, safe and affordable access to water is not solely on the minds of water and wastewater managers.
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationCybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment
Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair
More informationEY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge
2018 Ernst & Young Advisory. All rights reserved. Graphics studio France 1802SG1267. ED 04082018 EY Consulting Is your strategy planning for the future or creating it? #TransformativeAge The better the
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationHorizon 2020 Security
Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationTEL2813/IS2621 Security Management
TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationA new approach to Cyber Security
A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.
More information