Smart Buildings, Towns and Cities: Part 1 #NG07

Size: px
Start display at page:

Download "Smart Buildings, Towns and Cities: Part 1 #NG07"

Transcription

1 Smart Buildings, Towns and Cities: Part 1 #NG07 Chris Gandy, Las Vegas Metro Police Dept. Ed English, CEO, ELERTS Corp. Kent Browne, Senior Security Engineer, Dell SecureWorks Steve Surfaro, Industry Liaison, Axis Communications Learning Objectives 1. Understand how an integrated cyberinfrastructure secures assets 2. Apply lessons learned from case studies for cyber and infrastructure assurance 3. Build tactical, corporate infrastructures, supporting strategic goals 1

2 AIA Provider Statement Reed Construction Data is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this program will be reported to AIA/CESfor AIA members. Certificates of Completion for both AIA members and non-aia members are available upon request. This program is registered with AIA/CESfor continuing professional education. As such, it does not include content that may be deemed or construed to be an approval or endorsement by the AIA of any material of construction or any method or manner of handling, using, distributing, or dealing in any material or product. Questions related to specific materials, methods, and services will be addressed at the conclusion of this presentation. Smart Buildings, Towns and Cities 2

3 Eight key steps to protect buildings towns cities Eight key steps to protect buildings towns cities Asset Protection Mining 3

4 Eight key steps to protect buildings towns cities Asset Protection Mine Network Strength and resilience of the network: power, transmission, interoperability The ability to network and share intelligence Consistent delivery of accurate and timely information 1 1 Delivery of useful theaterwide, system and crisis management information could be near real time and still sustain cycle 4

5 Smart Buildings Building Integration with Smart Grid Distributed Demand Response Building Automation and Control Fault Detection and Diagnostics First Responder Communications Ad Hoc Networks for First Responders 1 Without Architects, Smart Cities Just Aren t Smart 1 The communication range in a commercial building corridor is vastly different from that of a factory floor, which is unlike a coal mine. Smart Buildings Building Integration with Smart Grid Distributed Demand Response Building Automation and Control Fault Detection and Diagnostics First Responder Communications Ad Hoc Networks for First Responders 1 Without Architects, Smart Cities Just Aren t Smart 1 The communication range in a commercial building corridor is vastly different from that of a factory floor, which is unlike a coal mine. Images courtesy 5

6 Redundancy What s the first concern of today s Central Station Service Providers? Network availability and redundancy. Knowing your infrastructure provider. Delivering data from multiple paths and understanding the rate of network collapse and restoral. Analysis Just that analyzing data: Time, geo-location and object characteristics Threat behavior Attack distribution pattern disp ersion 6

7 Distribution Distribution of information to multiple consumers and platforms By form factor and network availability By priority Detection Behavior threat object detection Advanced Targeted Persistent Threats Multi and single vector DDoS Insider Threats Physical perimeter attacks Explosive, Contamination and Intruder Threats 7

8 Mining the data Analyzing from different perspectives and summarizing it into useful information Categorize and summarize relationships identified Finding correlations or patterns Operational transactionaldata (sales, cost, inventory, payroll, and accounting) Nonoperational forecast data Meta data -data about the data itself: Min Max size of a moving object Maximum size of a moving object Color of a moving object Minimum speed of an object Maximum object speed Response Preventative moving data from intrusion site Actionable sharing critical emergency response data Protect fortify perimeter and virtual boundaries Strategic weaponized response to suspend threat 8

9 Recovery 1 Response team 2 Response recovery plan 3 Review events to date 4 Determine response level 5 Speed of response 6 Multiply communications 7 Communicate facts 8 Solicit diversify intel 9 Update team and community 10 Update plan Assets Personnel Information Physical-structural Virtual Digital Infrastructure: systems electrical teleph ony data virtually anything of value Assets 9

10 Network Redundancy Analysis Distribution Detection Assets Mining Response Recovery Mining Assets Smart Buildings, Towns and Cities: Part 1 #NG07 Ed English, CEO, ELERTS Corp. 10

11 Smartphones enable smarter Cities Smartphones (SP) have raised the bar for safety and security in cities & towns The popularity of SP has empowered average citizens armed with powerful multimedia communication tools. Problems can be communicated with: Photos, Incident Descriptions, Maps Community sourcing of incident reports allows people to participate in the well-being of their city, town or organization Incident Reporting is easy with SP The ease of use of smartphones and apps allows quick incident reporting The widespread cellular and WIFI connectivity of SP makes high speed 2 way commpossible Boston was a pioneer city that embraced using smartphones to report potholes, graffiti and other city problems. 11

12 Spreading Safety with SP Now all sorts of organizations, hospitals, schools and transit systems, are using SP to improve safety through community sourcing First Responders are rarely 1 st to see a problem. People have become the eyes and ears of the police or security op center. Citizens and staff act like early warning radar for trouble. Transportation Systems Transit systems are the definition of mobile. Transits are keeping riders safer, by using mobile technology. 2-way communication to SP breaks the old model of 1-way command & control messaging BOLOscan be broadcast to SP to enlist the publics help in locating Persons of Interest. 12

13 Transit Example Beat down In Boston at midnight, a gang of 5 severely beat a disabled man in a subway station. A rider saw and reported the crime to transit police, using an app on his smartphone. Other tips have come in via Twitter. Surveillance cameras were present, but it was human involvement that focused attention on the crime incident first. Police issued a BOLO via Twitter, FB and SP app. All 5 suspects were arrested within 24 hours. Previously unreported crimes are being reported and solved with SmartPhones 13

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc. Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Practical Cyber Security for Architects of Small Firms (1 AIA CEU)

Practical Cyber Security for Architects of Small Firms (1 AIA CEU) Practical Cyber Security for Architects of Small Firms (1 AIA CEU) with Angela Render Thunderpaw.com 571-331-5941 Transforming Architecture LLC is a Registered Provider with The American Institute of Architects

More information

Interfacing with Packaged Equipment

Interfacing with Packaged Equipment Interfacing with Packaged Equipment Cory Knopp, MBA Vice President, Business Development Setpoint Systems Corporation 720-545-4528 cknopp@setpointsystems.com Opportunities and Risks of Systems Integration

More information

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Business Continuity and Disaster Recovery Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Executive Summary Too often emergency management communication

More information

Making Schools Smarter and Safer Using Geographic Information Systems

Making Schools Smarter and Safer Using Geographic Information Systems Making Schools Smarter and Safer Using Geographic Information Systems Presented By Albert Koenigsberg President of GEOcommand, INC. Florida Educational Facilities Planners Association 07/10/2018 Old School

More information

SOLUTIONS BRIEF PUBLIC SAFETY LTE SOLUTIONS

SOLUTIONS BRIEF PUBLIC SAFETY LTE SOLUTIONS SOLUTIONS BRIEF PUBLIC SAFETY LTE SOLUTIONS PUBLIC SAFETY LTE PORTABLE INFRASTRUCTURE FROM MOTOROLA SOLUTIONS Our world becomes more complex with every passing moment. Community expectations are rising

More information

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS 2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS SURVEY OVERVIEW The 2016 Motorola Commercial Survey offers revealing insights into team communication trends in a variety of industries across the

More information

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design Professional Certification in the Commissioning Industry Mike Eardley, PE, CCP Director of Commissioning services Cannon Design AIA Quality Assurance The Building Commissioning Association is a Registered

More information

Scope Cyber Attack Task Force (CATF)

Scope Cyber Attack Task Force (CATF) Scope Cyber Attack Task Force (CATF) PART A: Required for Committee Approval Purpose This document defines the scope, objectives, organization, deliverables, and overall approach for the Cyber Attack Task

More information

Broadband Summit. Public Safety LTE Lessons Learned from the Las Vegas Metro Police Department Band 14 Trial David Fein Systems Engineer

Broadband Summit. Public Safety LTE Lessons Learned from the Las Vegas Metro Police Department Band 14 Trial David Fein Systems Engineer Broadband Summit Public Safety LTE Lessons Learned from the Las Vegas Metro Police Department Band 14 Trial David Fein Systems Engineer May 5, 2014 A Little History Nevada has a close knit communications

More information

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 Grid Security & NERC Council of State Governments The Future of American Electricity Policy Academy Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 1965 Northeast blackout

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

REMOTE MONITORING. Why Your Security Force Needs Support

REMOTE MONITORING. Why Your Security Force Needs Support REMOTE MONITORING Why Your Security Force Needs Support In today s security industry, emerging technologies and an increased level of connectedness are creating opportunities for facility managers, IT

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

URBAN SECURITY. Protecting urban citizens

URBAN SECURITY. Protecting urban citizens w w w. t h a l e s g r o u p. c o m 2 Growing urbanisation is a distinctive trait of the 21 st century: half of the Earth s current population of 7 billion lives in towns and cities; according to UN forecasts,

More information

TX360 Use Cases And Case Studies

TX360 Use Cases And Case Studies SWAN ISLAND NETWORKS EXAMPLES TX60 Use Cases And Case Studies 205 Swan Island Networks, Inc. Introduction For over a decade, Swan Island Networks has been providing innovative threat intelligence and situational

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

ESInet Building Blocks for NG Mark Titus Lead Product Marketing Manager AT&T Public Safety

ESInet Building Blocks for NG Mark Titus Lead Product Marketing Manager AT&T Public Safety Mark Titus Lead Product Marketing Manager AT&T Public Safety Agenda Agenda slide Why NG9-1-1 is Important ESInet Functional Benefits Is the time right for ESInet? Summary 2 ESInet Building Blocks for Why

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Electron Progress EAD

Electron Progress EAD Electron Progress EAD Systems for early warning of the population with end - acoustic devices Sofia 2011 1 Who we are A Bulgarian company established in 1976 as Institute for Defense Electronics, which

More information

Commissioning In Healthcare

Commissioning In Healthcare Commissioning In Healthcare Joseph Lorino, PE, LEED AP, NewYork-Presbyterian Hospital Evan Wyner, PE, CCP, Strategic Building Solutions 21 st National Conference on Building Commissioning AIA Quality Assurance

More information

Multi-Sector Urban System Initiatives

Multi-Sector Urban System Initiatives Multi-Sector Urban System Initiatives Colin Harrison IBM Distinguished Engineer Emeritus colinh@us.ibm.com Regional Approaches to Urban Sustainability A National Academies Workshop Portland, OR May 28-29,

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defense, and public safety agencies face challenges and threats that

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

City of Stamford OFFICE OF PUBLIC SAFETY. Public Safety Administration. FY Budget Presentation

City of Stamford OFFICE OF PUBLIC SAFETY. Public Safety Administration. FY Budget Presentation City of Stamford OFFICE OF PUBLIC SAFETY Public Safety Administration FY 2016-17 Budget Presentation Office of Public Safety Services Provided & Mission Statement The Office of Public Safety, Health and

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Cloud Security Alliance, 2015 Agenda 1. Defining the IoT 2. New Challenges introduced by the IoT 3. IoT Privacy Threats

More information

Convergence Everywhere

Convergence Everywhere Convergence Everywhere Gregory J Hill FEBRUARY 2016 PHOENIX, AZ Why Convergence? APPLICATIONS Rapid proliferation and demand data from many systems Supporting diverse range of technologies Streaming video,

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

2 ESF 2 Communications

2 ESF 2 Communications 2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Doing More with Less: Maintaining, Operating, and Improving your BMS. Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers

Doing More with Less: Maintaining, Operating, and Improving your BMS. Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers Doing More with Less: Maintaining, Operating, and Improving your BMS Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers AIA Quality Assurance Learning Objectives 1. Develop

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defence, and public safety agencies face challenges and threats that

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

AZTech Capability Maturity Model

AZTech Capability Maturity Model AZTech Capability Maturity Model Faisal Saleem ITS Branch Manager & MCDOT SMARTDrive Program Manager Maricopa County Department of Transportation National Operations Center of Excellence August 9, 2017

More information

Breaking down information silos to improve GSOC efficiency and effectiveness

Breaking down information silos to improve GSOC efficiency and effectiveness Breaking down information silos to improve GSOC efficiency and effectiveness Microsoft s Global Security Operations teams adopted Visual Command Center from IDV Solutions, an Everbridge company, to reduce

More information

Support cloud-based integration

Support cloud-based integration M2M series Driving the Future of Mission-Critical and M2M Innovation Support cloud-based integration M2 M Transport & Telematics Fleet Management We provide a total monitoring solution with On-Board Diagnostics

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards

More information

City surveillance. Creating safer cities. Network video surveillance with excellent image quality. Every time.

City surveillance. Creating safer cities. Network video surveillance with excellent image quality. Every time. City surveillance Creating safer cities. Network video surveillance with excellent image quality. Every time. It s about caring for your city and its people. The right to feel safe and secure is a fundamental

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

REDTONE IOT AND UNIFIED INBOX PARTNER TO INTEGRATE IOT DEVICES WITH SOCIAL MEDIA

REDTONE IOT AND UNIFIED INBOX PARTNER TO INTEGRATE IOT DEVICES WITH SOCIAL MEDIA REDTONE IOT AND UNIFIED INBOX PARTNER TO INTEGRATE IOT DEVICES WITH SOCIAL MEDIA Unified Inbox s IoT Messaging capabilities to be integrated into REDtone IOT s CitiSense Smart City IoT platform to increase

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

PUBLIC SAFETY FY BID PROCESS

PUBLIC SAFETY FY BID PROCESS PUBLIC SAFETY FY 11-12 BID PROCESS Presented to the Dallas City Council January 19, 2011 Public Safety Team Members Andy Acord, Dallas Police Department Cassandra Wallace, Office of Emergency Management

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation CYBERSMART BUILDINGS Securing Your Investments in Connectivity and Automation JANUARY 2018 WELCOME STEVE BRUKBACHER Application Security Manager Global Product Security Johnson Controls 1 WHY ARE WE HERE

More information

How to adjust and improve the security level of infrastructure

How to adjust and improve the security level of infrastructure How to adjust and improve the security level of infrastructure Andrea Demadonna UNIFE Luigi Rucher ThalesGroup Andrea Bastianelli ThalesGroup UNIFE Florence, 25 November 2016 About UNIFE UNIFE represents

More information

Public Safety, Customer Service & Operations May 2016

Public Safety, Customer Service & Operations May 2016 Public Safety, Customer Service & Operations May 2016 Begins June 1st and ends November 30th METRO Employees are provided a Hurricane Preparedness Booklet that covers: Individual/Family Readiness Make

More information

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World CYBER CAMPUS THE CYBER SCHOOL FOR THE REAL WORLD. KPMG BUSINESS SCHOOL The Business School for the Real World In the real world, cyber security applies to all: large firms and small companies, tech experts,

More information

Level Access Information Security Policy

Level Access Information Security Policy Level Access Information Security Policy INFOSEC@LEVELACCESS.COM Table of Contents Version Control... 3 Policy... 3 Commitment... 3 Scope... 4 Information Security Objectives... 4 + 1.800.889.9659 INFOSEC@LEVELACCESS.COM

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Building Simulation Modelers Are we big data ready? Jibonananda Sanyal and Joshua New Oak Ridge National Laboratory

Building Simulation Modelers Are we big data ready? Jibonananda Sanyal and Joshua New Oak Ridge National Laboratory Building Simulation Modelers Are we big data ready? Jibonananda Sanyal and Joshua New Oak Ridge National Laboratory Learning Objectives Appreciate emerging big-data needs in building sciences Identify

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Emergency Management & Disaster Planning

Emergency Management & Disaster Planning Emergency Management & Disaster Planning What we re going to talk about What is Emergency Management and Disaster Planning? What are the key elements of an EM Plan? Where does the University Architect

More information

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,

More information

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics SMART POLICING FOR SMALL AGENCIES Increase Community Safety with Intelligent Maps and Analytics Build a more efficient, productive agency using powerful map analytics. For more than 20 years, law enforcement

More information

Incident Response. Is Your CSIRT Program Ready for the 21 st Century?

Incident Response. Is Your CSIRT Program Ready for the 21 st Century? Incident Response Is Your CSIRT Program Ready for the 21 st Century? Speaker Bio Traditional Response Concepts Technical Incidents Requiring Technical Responses Virus/ Malware Network Intrusion Disaster

More information

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI)

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI) icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 A Growing, Global Company Since 1969 Global professional, technology and marketing services

More information

NG9-1-1: Implementation and FirstNet Deployment Kyle Connor Director, Sales and LTE 5/13/2013

NG9-1-1: Implementation and FirstNet Deployment Kyle Connor Director, Sales and LTE 5/13/2013 NG9-1-1: Implementation and FirstNet Deployment Kyle Connor Director, Sales and LTE 5/13/2013 Page 1 Overview We will explore the ways in which NG9-1-1 and LTE as well as P25 and converged voice/data/multimedia

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The Age of Heightened Security

The Age of Heightened Security The Age of Heightened Security Critical Asset Inventory and Protection Plan Electronic Intrusion and Attack Prevention Iowa Homeland Security Initiative 1 The Age of Heightened Security Intelligence Gathering

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Smart City IoT Solution Brings Data Insight to Transportation

Smart City IoT Solution Brings Data Insight to Transportation Smart City IoT Solution Brings Data Insight to Transportation The customer summary Customer name San Diego Metropolitan Transit System Industry Transportation Location San Diego Cisco, Davra Networks,

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Florida Power & Light Company Hurricane Response Update. Eric Silagy President and CEO Florida Power & Light Company

Florida Power & Light Company Hurricane Response Update. Eric Silagy President and CEO Florida Power & Light Company Florida Power & Light Company Hurricane Response Update Eric Silagy President and CEO Florida Power & Light Company 35 counties Serving more than half of Florida 4.9 million customer accounts Majority

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Cloud and Cyber Security Expo 2019

Cloud and Cyber Security Expo 2019 Cloud and Cyber Security Expo 2019 The Terrain to Actionable Intelligence Azeem Aleem, VP Consulting, NTT Security Actionable Intelligence Actionable intelligence through Cyber Intelligence Embedding intelligence

More information

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA Arbor Networks Spectrum Wim De Niel Consulting Engineer EMEA wdeniel@arbor.net Arbor Spectrum for Advanced Threats Spectrum Finds Advanced Threats with Network Traffic Unlocks Efficiency to Detect, Investigate,

More information

Safe City & Crime Analytics for Smart Cities

Safe City & Crime Analytics for Smart Cities Safe City & Crime Analytics for Smart Cities Contents Safe City & Security Requirements Safe City Technology Stack Integrated Solutions for Safe City Command & Control system Emergency Response System

More information

Emergency Operations Center Management Exercise Evaluation Guide

Emergency Operations Center Management Exercise Evaluation Guide Emergency Operations Center Management Exercise Evaluation Guide I respectfully submit the completed Exercise Evaluation Guide for the Canopy Oaks Tabletop Exercise conducted March 25 2010 for the Leon

More information

Making airports safer and smarter

Making airports safer and smarter Making airports safer and smarter Transforming Situation Management into Actionable Intelligence Dharmesh Patel October 17 th, 2017 Technology & Theory Integration Workflow Automation Collaboration Airports

More information

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

BUSINESS CONTINUITY TOOLKIT

BUSINESS CONTINUITY TOOLKIT BUSINESS CONTINUITY TOOLKIT 8. BUSINESS CONTINUITY EXERCISES SAMPLE SCENARIOS Page 1 of 9 1 LOSS OF WORKPLACE BUILDING DEFECT A structural defect has been found in your building. BBC Workplace advise that

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

5-1McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

5-1McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. 5-1McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. 5 hapter Data Resource Management Data Concepts Database Management Types of Databases McGraw-Hill/Irwin Copyright

More information

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Presented By: Mr. Shishir Verma Vice President MapmyIndia (CE Info Systems Pvt. Ltd.) About Us Making Our World Better

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

DISTRACTED DRIVING. The Biggest Issue in Driving Today

DISTRACTED DRIVING. The Biggest Issue in Driving Today DISTRACTED DRIVING The Biggest Issue in Driving Today RLI Design Professionals Design Professionals Learning Event DPLE 167 February 17, 2016 RLI Design Professionals RLI Design Professionals is a Registered

More information