Presentation of AMBASEC A Model-Based Approach to SEcurityCulture

Size: px
Start display at page:

Download "Presentation of AMBASEC A Model-Based Approach to SEcurityCulture"

Transcription

1 Presentation of AMBASEC A Model-Based Approach to SEcurityCulture Prof. Jose J Gonzalez Dept. of ICT Security Group Research cell Security & Quality in Organizations IKTSoS WS March Dept. of ICT Position dr. techn. & dr. rer. nat. Professor II, Professor II, Dr. scient. Dr. rer. nat. Professor II, Dr. techn. & Dr. ing. habil. Name Jose J. Gonzalez Vladimir Oleshchuk B. John Oommen N.N. Rolf Nossum Andreas Prinz Christian S. Jensen Matthias Pätzold Frank Reichert Areas of expertise System dynamics methodology and modelling applied to 1) incident response & mngt in CERTs and CSIRTs; 2) vulnerabilities and code-driven attacks; 3) security data quality; 4) integration of technical, organizational and user aspects in security. Security & privacy frameworks, protocols and algorithms in mobile systems. Application formal methods to security related aspects of mobile systems. Ontology-based knowledge acquisition and retrieval, technologies for risk management and security. Learning automata and their applications within security and mobile communications. This includes routing, medium access control, capacity assignment, and network monitoring. Pattern recognition, adaptive data structures, and data compression. Packet switched networks, protocols (in particular Internet protocols) and security. Formal theories of context, context-sensitive knowledge processing & mgmt, mechan. reasoning by autonomous agents, ontology-based knowledge acquisition & retrieval. Software engineering, specification languages for mobile and distributed systems, communication protocols, compilers, operating systems. Multidimensional and spatio-temporal data management, data warehousing and locationbased services, aspects such as data modelling, database design, user-level languages, indexing and query processing. Propagation, mobile fading channels, multiple-input multiple-output systems, coding theory, system performance evaluation, error models for mobile communication systems Protocols for mobile systems, cellular system architectures mobile Internet applications, HW and SW communication system design. IKTSoS WS March

2 Security Group Two professors and two adjunct professors Two associated professors Three post-doctoral fellows Seven doctoral fellows One project secretary (M.Sc.) IKTSoS WS March Research Cell Security and Quality in Organizations Professor Jose J. Gonzalez Assist. Professor NN Postdoc Dr. Agata Sawicka Dr. Stefanie Hillen Ph. D. Students Magne Myrtveit Johannes Wiik Ying (Iris) Qian Yueping Chen secretary M. Sc. Maren S. Assev International (Albany, CERT/CC, Sandia Nat. Lab., European) & Norwegian (SINTEF, UiB, HiG?) collaboration *** Collaboration with & sponsing from industry IKTSoS WS March

3 ICT Research Portfolio (1) Mobile Student V. Oleshchuk 3Q01 4Q04 6,6, Ericsson, Telenor Security in Mobile Health Information Systems V. Oleshchuk 4Q03 1Q07 1,6 Mobile Communication Systems and Applications M. Pätzold 1Q03 4Q06 4,7 European Internet Accessibility Observatory M. Snaprud 3Q04 3Q07 26 EU New Generation of Dynamic Planning Tools 2Q03 1Q06 SCA Packaging Dynamics of CSIRTs 3Q03 2Q06 1,6 UFD Disseminating Insights from Complex Models to a Broader Audience Agata Sawicka (J.J. Gonzalez) 3Q04 2Q06 IKTSoS WS March ICT Research Portfolio (2) Mobile and Channel Integrating Electronic Commerce P. E. Pedersen 2Q02 1Q05 4,5 (total) Telenor, Ericsson, DnB, Easy Park, A-pressen, SNF, Consuming Adventure Oriented Digital Services P. E. Pedersen 2Q03 1Q06 4,0 (total) Telenor, NRK, Norsk Tipping, SNF, ROBACC M. Snaprud 3Q03 4Q04 0,47 IT Funk,, all partners AMBASEC (A Model- Based Approach to Security Culture) 1Q04 4Q07 3,1 Total project budget 56, AUC part of man-hours approximately 70 % IKTSoS WS March

4 New Generation of Dynamic Planning Tools New Generation of Dynamic Planning Tools 2Q03 1Q06 SCA Packaging Goals Objectives Develop a methodology encompassing the flexibility and userfriendliness of spreadsheets with dynamic simulation capabilities and enhanced data quality and security. Apply to SCA Packaging problem 1 short term, 2 more students long term PhD Students Magne Myrtveit Results Participants Papers published and submitted: Papers planned: 6 PhD theses : 1 Master theses: 3++ The project is embedded within the Research group Security and Quality in Organizations. Problem owner is SCA Packaging IKTSoS WS March Disseminating Insights from Complex Models to a Broader Audience Disseminating Insights from Complex Models to a Broader Audience Agata Sawicka (J.J. Gonzalez) 3Q04 2Q06 NFR Goals Objectives Postdoc Defining key design principles that should guide model communication. Develop methods and tools for model communication. Improve the applicability of model-based results, especially in information security. Enhance information security in organizations. Agata Sawicka Results Participants Papers published and submitted: 3 Papers planned: 4 (at least) Seminars: Master theses: 4 The project is embedded within the Research group Security and Quality in Organizations. IKTSoS WS March

5 Dynamics of CSIRTs Dynamics of CSIRTs 3Q03 2Q06 1,6 AUC Goals Objectives Modelling the factors influencing the effectiveness of Computer Security Incident Response Teams (CSIRTs) over time. Improve organizational security and survivability. PhD degree PhD Students Johannes Wiik Results Participants Papers published and submitted: 3 Papers planned: 6 PhD theses: 1 Master theses: 1++ The project is embedded within the Research group Security and Quality in Organizations. IKTSoS WS March AMBASEC (A Model-Based Approach to SEcurity Culture) Main Objective Advance the quality of reporting and use of ICT security incident data by extending and evaluating qualitative and quantitative data analysis methods in dual setting of Interactive Learning Environments (ILE s) and audit instruments applied to an IRMArelevant CSIRT (Computer Security Incident Response Team). IKTSoS WS March

6 AMBASEC Sub-goals Knowledge capture and qualitative modelling of a CSIRT WP1.1 Qualitative system dynamics (SD) map of a CSIRT (1 st group modelling workshop) WP1.2 Qualitative analysis (dynamic stories) of a CSIRT WP1.3 Improving SD map of CSIRT (2 nd group modelling workshop) WP1.4 Preliminary calibrated and validated quantitative SD model of a CSIRT WP1.5 First paper on SD modelling of a CSIRT WP1.6 First paper on model analysis and policy recommendations Model refinement of a CSIRT Model-based learning and reality feedback IKTSoS WS March AMBASEC First project year (2005): Group modelling workshops May and 5-9 September Extensive preparatory activities (planning & data mining before the workshops) Follow up activities (detail modelling, information exchange, reports and papers) Group modelling team: Prof. David Andersen, Prof. George Richardson and assoc. prof. Eliot Rich, Nelson Rockefeller Center for Policy Studies, University at Albany Prof. Jose J. Gonzalez, PhD fellows Iris Qian & Johannes Wiik, AUC The domain expert group: our IRMA partners Odd-Helge Longva, Stig O. Johnsen and Maria B. Dahl and OLF The group modelling WS will deliver AMBASEC WP For IRMA the group modelling WS will contribute to the intended survey of incident response management in ICT systems by helping create a coherent, model-based structure & establish specific links between the activities to improve security culture in both projects. IKTSoS WS March

7 AMBASEC Second project year (2006): The IRMA WP3 Implement IRMA at the industrial partners and AMBASEC work packages 2.3 & 2.4 (design, implementation & evaluation of ILE & audit instrument) will be coordinated for best implementation and deployment at OLF partners. Synergies between IRMA and AMBASEC will be fostered by regular collaboration. IKTSoS WS March AMBASEC Third project year (2007): The IRMA WP4 Strengthen the Security Awareness in the participating enterprises and AMBASEC work packages 3.1, 3.2, 3.3 (evaluation of improvement of security culture and cyber data) will be coordinated for best implementation and deployment at OLF partners. Synergies between IRMA and AMBASEC will be fostered by regular collaboration IKTSoS WS March

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT 2017-2 CEF Telecom Calls: CEF-TC-2017-2: Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT CEF-TC-2017-2: Cyber Security Funding under this call will allow the Member States to limit the economic

More information

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT

More information

Implementing a National Strategy : the case of the Tunisian CERT

Implementing a National Strategy : the case of the Tunisian CERT Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end

More information

The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of

The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of CERT@VDE The cybersecurity platform for industrial small and medium-sized enterprises (SME) Andreas Harner, Head of CERT@VDE What is a Computer Emergency Response Team (CERT)? A CERT (sometimes called

More information

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE Richard Kerkdijk December 7th 2017 A WORD ABOUT TNO Dutch innovation and advisory body, founded by law in 1932 and currently comprising some 2800

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

Ericsson R&D Hungary

Ericsson R&D Hungary Ericsson R&D Hungary 104 YEARS OF ERICSSON IN HUNGARY 1876 First factory in Sweden 1897 Saint Petersburg, Russia 1904 Beeston, England 1906 Buffalo, USA 1911 Budapest, Hungary 1912 Paris, France 1912 Vienna,

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

IST FP6 Co-ordination Action Project: CI 2 RCO

IST FP6 Co-ordination Action Project: CI 2 RCO IST FP6 Co-ordination Action Project: CI 2 RCO http://www.ci2rco.org Critical Information Infrastructure Research Co-ordination Conference on Network and Information Security Roma - November 04, 2005 Sandro

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access

More information

Exploitation Strategies - a Practice Case from Research. (aka from FP to IP to Marketable Products)

Exploitation Strategies - a Practice Case from Research. (aka from FP to IP to Marketable Products) Exploitation Strategies - a Practice Case from Research (aka from FP to IP to Marketable Products) Stratos Papadimitriou & Ioannis Koliousis TIPS Training Academy Lyon February 4 th 6 th, 2014 Topics of

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Secure Societies in 2015

Secure Societies in 2015 Secure Societies in 2015 In the Horizon 2020 work programme Nicole Wyss National Contact Point Security & Transport Euresearch Head Office Nicole.wyss@euresearch.ch +41 31 380 60 04 Agenda 1. Why participate

More information

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning

More information

IP Networking Fundamentals Theory and Practice

IP Networking Fundamentals Theory and Practice IP ing Fundamentals Theory and Practice Introductory course into computer networking Prof. Dr. Károly Farkas Guest Professor Department of Informatics, UZH farkas@ifi.uzh.ch Introduction Reader: Prof.

More information

LaCoMoCo Crossroads Copenhagen March 7, 2002

LaCoMoCo Crossroads Copenhagen March 7, 2002 LaCoMoCo Crossroads Copenhagen March 7, 2002 Lars Birkedal [birkedal@itu.dk] The IT University of Copenhagen LaCoMoCo March 20, 2002 p.1/22 My background Cand. Scient. from University of Copenhagen, 1994

More information

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon

More information

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013 Panel: Research on Complex Enterprise Systems of Systems Complex Adaptive Systems Conference 14-NOV-2013 Dan DeLaurentis School of Aeronautics & Astronautics and Center for Integrated Systems in Aerospace

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria

CERT.LV activities, role in Latvia and globally. Baiba Kaskina, CERT.LV , Sofia, Bulgaria CERT.LV activities, role in Latvia and globally Baiba Kaskina, CERT.LV 30.11.2016., Sofia, Bulgaria CERT.LV Overview CERT.LV Information Technology Security Incident Response Institution of the Republic

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert

More information

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Information Security Program Audit Introduction and Survival Guide

Information Security Program Audit Introduction and Survival Guide Information Security Program Audit Introduction and Survival Guide Cyber Security Symposium 2016, Sacramento Convention Center September 28, 2016 INTRODUCTION Welcome Presenters Background Carl Salmonsen,

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

1.What are critical infrastructures in Switzerland? CIP concept in Switzerland

1.What are critical infrastructures in Switzerland? CIP concept in Switzerland Session 4 Addressing new frontiers in CI resilience Cyber risks and beyond Swiss application and insights Joint OECD-JRC Workshop on Critical Infrastructure Resilience Paris, 25 September 2018 Dr. Stefan

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

ENISA S WORK ON ICS AND SMART GRID SECURITY

ENISA S WORK ON ICS AND SMART GRID SECURITY AMSTERDAM, OCTOBER 15, 2012 ENISA S WORK ON ICS AND SMART GRID SECURITY Dr. Evangelos OUZOUNIS Head of CIIP & Resilience Unit ENISA 1 Why is it important? Industrial networks is the CI for the SCADA and

More information

Building Global CSIRT Capabilities

Building Global CSIRT Capabilities Building Global CSIRT Capabilities Barbara Laswell, Ph.D. September 2003 CERT Centers Software Engineering Institute Carnegie Mellon Pittsburgh, PA 15213 Sponsored by the U.S. Department of Defense 1 2003

More information

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA

More information

M.S. in Information Systems

M.S. in Information Systems M.S. in Information Systems 1 M.S. in Information Systems (30 Credits) M.S. in Information Systems IS Core Courses IS 601 Web Systems Development 3 IS 663 System Analysis and Design 3 IS 631 Enterprise

More information

Accounting Ethics and Auditing

Accounting Ethics and Auditing Accounting Ethics and Auditing Only three percent of adults have career-boosting professional certifications you can be one of them. And you can earn while meeting Colorado CPA licensure requirements including

More information

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement

More information

After completing this course, participants will be able to:

After completing this course, participants will be able to: Designing a Business Intelligence Solution by Using Microsoft SQL Server 2008 T h i s f i v e - d a y i n s t r u c t o r - l e d c o u r s e p r o v i d e s i n - d e p t h k n o w l e d g e o n d e s

More information

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

ARRA State & Local Energy Assurance Planning & Implementation

ARRA State & Local Energy Assurance Planning & Implementation State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity

More information

Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country

Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Prof. Olfa ZERIBI-BEN SLIMANE DG & National NCP Coordinator Experience of the Tunisian Participation to the EU s Horizon 2020 Framework Programme as an Associated Country Dr. Yosr Z. HAFFANI Management

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Vasileios Gkioulos PostDoc, NTNU Nils Kalstad Svendsen Head of Department and Center Host

Vasileios Gkioulos PostDoc, NTNU Nils Kalstad Svendsen Head of Department and Center Host NTNU CCIS En resurs for energisektoren Vasileios Gkioulos (vasileios.gkioulos@ntnu.no) PostDoc, NTNU Nils Kalstad Svendsen (nils.svendsen@ntnu.no) Head of Department and Center Host Department of Information

More information

Birgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT)

Birgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT) Digital transformation of health and care in the Digital Single Market Harnessing the potential of data to empower citizens and build a healthier society DG Communications Networks, Content and Technology

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Delivering on the Web: The NYS Internet Services Testbed

Delivering on the Web: The NYS Internet Services Testbed Delivering on the Web: The NYS Internet Services Testbed Project Report 96-1 Center for Technology in Government University at Albany / SUNY ª 1996 Center for Technology in Government The Center grants

More information

Kaspersky Security Awareness

Kaspersky Security Awareness Kaspersky for Business Kaspersky Security Awareness Gamified training programs for all organizational levels www.kaspersky.com #truecybersecurity An effective way of building cybersafety across an organization

More information

Labs being conducted in CS dept.

Labs being conducted in CS dept. The Structure of the Curriculum: Science & Uttar Pradesh Technical University encapsulates Science and as an Undergraduate Programme program having tenure of VIII semesters and designed to have a total

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

MASTER OF INFORMATION TECHNOLOGY (Structure B)

MASTER OF INFORMATION TECHNOLOGY (Structure B) PROGRAM INFO The MIT (Master of Information Technology) program aims at providing Master s Degree holders with advanced knowledge and skills in dealing with an organization s computing requirements and

More information

Master & Doctor of Philosophy Programs in Computer Science

Master & Doctor of Philosophy Programs in Computer Science Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For

More information

Tourism applications of Artificial Intelligence techniques. Dr. Antonio Moreno, ITAKA research group, URV

Tourism applications of Artificial Intelligence techniques. Dr. Antonio Moreno, ITAKA research group, URV Tourism applications of Artificial Intelligence techniques Dr. Antonio Moreno, ITAKA research group, URV ITAKA Basic research lines Multi-agent systems Ontology Learning Information Extraction Automated

More information

Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP

Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP Advanced Grid Technologies, Services & Systems: Research Priorities and Objectives of WP 2005-06 06 IST Call 5 Preparatory Workshop Brussels, 31 Jan 1 Feb 2005 Enabling application Max Lemke Deputy Head

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

The ITIL Process Map for Microsoft Visio. Examples and Overview of Contents

The ITIL Process Map for Microsoft Visio. Examples and Overview of Contents The ITIL Process Map for Microsoft Visio Examples and Overview of Contents Contents Structure of the ITIL Process Map Page 3 ITIL Process Diagrams Examples Page 4 Index of Process Diagrams contained in

More information

KYPO Cyber Range Design and Use Cases

KYPO Cyber Range Design and Use Cases KYPO Cyber Range Design and Use Cases ICSOFT CONFERENCE 24.7.-26.7. 2017 Daniel Tovarňák Masaryk University (ICS) tovarnak@ics.muni.cz Cyber Ranges Cyber Range is a platform for cyber security research

More information

Graduate Student Orientation

Graduate Student Orientation Graduate Student Orientation Department of Computer Science The Volgenau School of Engineering Professor Sanjeev Setia, Chair Fall 2018 http://cs.gmu.edu Presented by: Professor Alex Brodsky Outline CS

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

World Meteorological Organization Working together in weather, climate and water

World Meteorological Organization Working together in weather, climate and water WMO World Meteorological Organization Working together in weather, climate and water Workshop on Multi-Hazard Early Warning Systems for Urban Areas Dr Maryam Golnaraghi Chief of Disaster Risk Reduction

More information

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Master of Computer Applications

Master of Computer Applications FIRST SEMESTER EXAMINATION ID 044101 MCA 101 Fundamentals of IT 3 1 4 044103 MCA 103 Programming in C 3 1 4 044105 MCA 105 Discrete Mathematics 3 1 4 044107 MCA 107 Computer Organization 3 1 4 044109 MCA

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Media (NEM) Initiative

Media (NEM) Initiative Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom

More information

Information Systems. Courses. Information Systems 1

Information Systems. Courses. Information Systems 1 Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use

More information

WP2 Metrics of Cyber Security

WP2 Metrics of Cyber Security WP2 Metrics of Cyber Security WP2 Athens March 2018 CYBE Presented by: Jart Armin This work is performed within the SAINT Project (Systemic Analyser in Network Threats), with the support of the European

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17)

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date:

More information

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information

More information

NASDAQ BWISE ACADEMY COURSE CATALOG

NASDAQ BWISE ACADEMY COURSE CATALOG NASDAQ BWISE ACADEMY COURSE CATALOG 1 MANUAL TITLE HERE Copyright 2014, The NASDAQ OMX Group, Inc. All Rights Reserved. Q14-NUMBER. DATE TABLE OF CONTENTS 1 NASDAQ BWISE ACADEMY COURSE CATALOG 4 1.1 Introduction

More information

An overview of the CERT/CC and CSIRT Community

An overview of the CERT/CC and CSIRT Community An overview of the CERT/CC and CSIRT Community Jason A. Rafail October 2007 2007 Carnegie Mellon University Overview CERT/CC CSIRTs with National Responsibility Partnerships and Trust Training Conclusion

More information

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable

More information

Survey of Research Data Management Practices at the University of Pretoria

Survey of Research Data Management Practices at the University of Pretoria Survey of Research Data Management Practices at the University of Pretoria Undertaken by the Department of Library Services in order to improve research practices at the University Unisa Library Open Access

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Way to new challenges

Way to new challenges Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law

More information

BIBL NEEDS REVISION INTRODUCTION

BIBL NEEDS REVISION INTRODUCTION BIBL NEEDS REVISION FCSM Statistical Policy Seminar Session Title: Integrating Electronic Systems for Disseminating Statistics Paper Title: Interacting with Tabular Data Through the World Wide Web Paper

More information