Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation

Size: px
Start display at page:

Download "Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation"

Transcription

1 Command and Control for Security, Port Operations, and IT Considerations for Planning and Implementation Port Operations, Safety and Information Technology Seminar Gary Hicks, Science Applications International Corporation June 11, 2009

2 Presentation Summary Introduction Port Security C2 Requirements and Operational Considerations C2 Implementation Challenges and Standards Port C2 Example Architecture Application to Port Operations Summary 2 Energy Environment National Security Health Critical Infrastructure

3 Introduction Numerous ports and port regions are investigating and implementing COTS security C2 and Incident Management Systems Most major ports are moving to a new paradigm for security systems and domain awareness. The key requirements are: Integration of all sensor inputs Comprehensive situational awareness Integrated rules and tools for incident management More collaboration and coordination with stakeholders Integrating security C2 on IT networks introduces a new level of complexity Potential IT and Security turf war IT procedures, control, and security The network is the back bone of the security system There are standards and interfaces required Systems Engineering approach needed for implementation Growth from security only to operations is an emerging trend 3 Energy Environment National Security Health Critical Infrastructure

4 Overarching Goal To design and implement affordable C2 solutions that can provide total domain awareness and shape event response outcomes through better informed decisionmaking, coordinated response processes, and synchronized operations 4 Energy Environment National Security Health Critical Infrastructure

5 Notional Security / C2 System Diagram Waterside Surveillance and Facility Access Video Monitoring Wireless and Fiber Data Transcoding and Transport UPS Lighting Power Fixed Cameras Video F/O Encoder Field Cluster Data Next Level CC (POLA) WAN Cable Link SMP C2 Center F/O Encoder Thermal IR Cameras Back Up Generator Switch Router Data Support Dome PTZ Cameras Port Power F/O Encoder Inspection Badging Non Cable Link X-Ray Workstations Server(s) Intrusion Detection Video Control Panel Incident Management and Situational Awareness Radiation Computer Aided Dispatch Metal Biological Hand VACIS Facility Access Control VTS Interface Biometric Chemical Display Systems Advanced and R&D Control Panel Mobile Communications QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. Portable Video / Radar Gate Management Control Panel Field Cluster Waterside Security Automatic Location GPS Response LPR Radio Radar Radio Link RFID Portable Video Field Cluster Barrier Sonar AIS 5 Energy Environment National Security Health Critical Infrastructure Laser

6 What Can the C2 System Do? Provide domain awareness and incident management, support recovery with an easy to use system Provide and accept information and alerts from all port sensors and ultimately, stakeholders Implement security SOP & CONOPS as part of incident management Continuous operational improvement and training Replay incidents, identify lessons learned, update rules/workflows Support recovery and business continuity Comprehensive situation management system to optimize situation planning, response, and debriefing View and manage all alarms and incidents Open architecture Integrate seamlessly with any of the Port s edge devices and systems Unified operations console and practices Easy to customize, configure, and modify to meet changing operational needs Sustainable and upgradeable software Adaptable as CONOPS changes as threats change and regional collaboration expands Comprehensive situation management system to optimize situation planning, response, and debriefing 6 Energy Environment National Security Health Critical Infrastructure

7 Optimal Situational Awareness Approach Combines 24 Real-Time Command Center Situational Awareness Madden Telestrator Response Collaboration and Coordination 7 Energy Environment National Security Health Critical Infrastructure

8 Implementation Team and Responsibilities Port Command center facilities Budget Staffing SOP definition Location of field devices on GIS They have to collect (and keep updated) all the employee data for selecting the first responders Leverage vendors like CAD/RMS for interfaces Integrator Validate requirements Select best SW product and lab/field test ID system issues Work with port to implement SOP into rules including regional multi-jurisdictional collaboration of all hazards incident response Assist in developing plans for training and exercises (including regional) Work with CAD to insure appropriate information sharing and documentation Ensure that all pieces of the system are working together C2 SW Vendor New Gateway development Continual product improvement to support evolving paradigm Actively support compatibility with and conformance to emerging data models and standards related to information sharing, data exchange, sensor management, infrastructure protection, and emergency management including: NIMS, NIEM, GJXDM (Global Justice XML Data Model) CTISS, ISE, EDXL, CAP, IEEE-1512, ISO-28000, ISO-20858, FIPS, H.264, CUI, SSI, PCII, SGI, CVI, UICDS, and many others Maintenance 8 Energy Environment National Security Health Critical Infrastructure

9 COTS SW Integration Model COTS SW Analysis COTS Identification COTS Capability Analysis COTS Performance Analysis COTS Cost Analysis Candidate COTS Selection Initial System Objectives Definition (RFP) Requirements Analysis COTS Integration Installation Configuration Feature Validation Performance Validation Port Goals and Vision Key Requirements Legacy Applications Architecture Design COTS Selection Software and Hardware Design, Implementation, and Test Acceptance testing Candidate SW Lab Tested Interfaces-AC, Video analytics, CBRN, radar, sonar, dispatch, CAD Developed, Tested and Confirmed others defined RESULTS Candidates Selected Integration and Bench Testing Completed 9 Energy Environment National Security Health Critical Infrastructure

10 Example Integrated Command Center Interagency Other Agencies Public Internet Coordination Alarm Display ACAMS (Port) Mobile and Remote Command Data Weather, Threat Level, etc. Map Data ESRI Map Server (PORT) Collaboration Web-Portal C2 Platform Incident Response Planning, Incident Management, Geographic Mapping & Display, Incident Reporting & Analysis Video Video Feeds (Satellite, Cable, VHF/UHF) Data Query Requests and Results Data Query Requests and Results RiverGlass. Smart Search Auto Info Query RealityVideo AVL/BFT and Mobile Video Video Feed (push/pull) and Asset Location Verint Nextiva/ Object Video Video Analytics Video Feed and Camera Control Emergency Notification Requests Roam Secure. Emergency Notification NC4 Data AIS and Radar Data NC4 Data (City ). AIS & Radar (Marine Exchange) Search DB Mobile Video DB Video DB Contact DB Dispatch Status CAD/RMS (City) KEY Bidirectional Unidirectional Legacy Comms CAD/RMS DB New 10 Energy Environment National Security Health Critical Infrastructure

11 Port Security C2 User Interface Example Sample Incident Process Planning Screen Easy to create and change incident response checklists Geographic Information Mapping 11 Energy Environment National Security Health Critical Infrastructure

12 Typical Operator Station Relevant Video/Sensor Feeds Geo-Referenced Display Incident Management Display 12 Energy Environment National Security Health Critical Infrastructure

13 Application to Port Operations Situation Management tool has application to total port situational awareness Streamline other processes Compliance audits Non security applications Asset tracking Route Management SCADA functions Recovery operations Auditing and Automatic Report Generation The goal of Port Security C&C implementation should be: Transition Port Security from dispatching to full Security and Business Operations Center (i.e., Situation Management). 13 Energy Environment National Security Health Critical Infrastructure

14 C2 Systems Integration Take Aways Highly capable COTS systems exist which are being implemented now Implementation is a team effort and requires careful consideration of the network and legacy systems Emergence of standards and reference architectures for safety, security systems and incident management. These mandates are starting to be reflected in Grant language The proliferation of data sources and functional capabilities that are of interest to Ports demands that future C2 systems incorporate a loosely coupled,open architectural model Four cornerstone capabilities of a next gen open, standards-based C2 platform: 1. Information Sharing Environment 2. Situational Awareness 3. Collaboration 4. Coordination Trust but verify when selecting C2 SW and integrators 14 Energy Environment National Security Health Critical Infrastructure

15 Questions 15 Energy Environment National Security Health Critical Infrastructure

16 Backup 16 Energy Environment National Security Health Critical Infrastructure

17 Next Generation C2 Information Sharing Requirements Access and render data from virtually any legacy data repository Operate in an open-systems standards Internet Protocol (IP) environment User-friendly, Web-based environment at the end user level Access and display real-time data streams from current and emerging (technology) sources, i.e., data bases, voice interoperability gateway devices, AVL, RFID, GIS, GPS, video, cameras, CBRN, etc. Achieve interoperability of diverse Computer Aided Dispatch (CAD) and records management systems Apply simultaneous, user specific business processes to the data and event management Restrict access to and sharing of data based on pre-defined rules Comply with and support DHS guidelines/mandates for defined standards and protocols on an open platform (NIMS/NIEM, cap, etc.) Auditing and automatic report generation 17 Energy Environment National Security Health Critical Infrastructure

18 How We Think About C2 and Standards STANDARDS NIEM (National Information Exchange Model) NIMS/ICS (National Incident Management System/Incident Command System) UICDS (Unified Incident Command and Decision Support 18 Energy Environment National Security Health Critical Infrastructure

Cisco Open Platform for Safety and Security

Cisco Open Platform for Safety and Security Cisco Open Platform for Safety and Security 1 Agenda Market Overview Business Drivers Barriers and Risks Cisco Open Platform for Safety and Security Scenarios Ecosystem Partners Summary 2 Market Overview

More information

Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions

Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions Riyadh, Saudi Arabia Feb 4, 2013 Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions Hassan Ellaw - EMEAR Customer Solutions Manager Physical Safety and Security

More information

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition Chip Hines Director, Office

More information

Security and Process Monitoring at Your Fingertips

Security and Process Monitoring at Your Fingertips 2014 Honeywell Users Group Americas Security and Process Monitoring at Your Fingertips Adrian Fielding 1 Safety Moment 2 DON T BECOME A LEGEND FOR THE WRONG REASON! Agenda Experion Industrial Security

More information

Unified Incident Command and Decision Support (UICDS)

Unified Incident Command and Decision Support (UICDS) Unified Incident Command and Decision Support (UICDS) UICDS is the middleware foundation that enables information sharing and decision support among commercial and government incident management technologies

More information

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA

La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA La gestione di Security e Safety con un singolo sistema di supporto alle decisioni Baltimore/Washington Airport - USA Filippo Silvestri Sales Manager PS&S Intergraph Italia Security Government & Infrastructure

More information

Unified Incident Command and Decision Support (UICDS) Bridging the Gap with Common Operational Data Through the UICDS Information Exchange Middleware

Unified Incident Command and Decision Support (UICDS) Bridging the Gap with Common Operational Data Through the UICDS Information Exchange Middleware Unified Incident Command and Decision Support (UICDS) Bridging the Gap with Common Operational Data Through the UICDS Information Exchange Middleware James W. Morentz, Ph.D. UICDS Outreach Director The

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

Technological Advances In Emergency Management

Technological Advances In Emergency Management Technological Advances In Emergency Management Closing the gap between Preparation and Recovery Will Fontan, P.E. Regional Director, ONRG Americas Office Report Documentation Page Form Approved OMB No.

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks

POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under

More information

Halifax Regional Municipality

Halifax Regional Municipality Halifax Regional Municipality Challenge Leverage existing IT infrastructure to design a high-definition surveillance system that helps protect corporate assets across the Halifax Regional Municipality

More information

Trust Harris for LTE. Critical Conditions Require Critical Response

Trust Harris for LTE. Critical Conditions Require Critical Response Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public

More information

Your single source for a safe, secure, and sustainable airport

Your single source for a safe, secure, and sustainable airport Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Emergency Operations Center Management Exercise Evaluation Guide

Emergency Operations Center Management Exercise Evaluation Guide Emergency Operations Center Management Exercise Evaluation Guide I respectfully submit the completed Exercise Evaluation Guide for the Canopy Oaks Tabletop Exercise conducted March 25 2010 for the Leon

More information

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Understanding Holistic Effects of Cyber Events on Critical Infrastructure Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513

More information

Disaster Management (DM) Program Overview

Disaster Management (DM) Program Overview Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and

More information

Hitachi Visualization Suite

Hitachi Visualization Suite The Problem and Solution Your single pane of glass for the Smart City Over the past few years, the majority of public and private organizations have implemented a diverse set of systems to protect their

More information

Next Generation Emergency Communications Intelligent Migration

Next Generation Emergency Communications Intelligent Migration 2010 Texas NENA Conference Next Generation Emergency Communications Intelligent Migration A Well-Managed Path from Enhanced 9-1-1 to Integrated Next Generation 9-1-1 Services Mart D. Nelson Consulting

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

ESINets and Map Based Location Technology Use

ESINets and Map Based Location Technology Use WHITE PAPER DEFENDING WORLD SECURITY Emergency Services IP NetworkS ESINets and Map Based Location Technology Use Page 1 The reproduction, distribution and use of this document as well as the communication

More information

Cisco Wireless Video Surveillance: Improving Operations and Security

Cisco Wireless Video Surveillance: Improving Operations and Security Cisco Wireless Video Surveillance: Improving Operations and Security What You Will Learn Today s organizations need flexible, intelligent systems to help protect people and assets as well as streamline

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Cisco Connected Physical Security Solutions

Cisco Connected Physical Security Solutions Cisco Connected Physical Security Solutions Transforming the Way Organizations and Communities Protect People, Property, and Critical Infrastructure March 17, 2011 Gustavo Spinelli CHSE Argentina, Paraguay,

More information

Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System

Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System ESRI Homeland Security Conference Chris Couper 916 641 4492 ccouper@us.ibm.com IBM MICAS 9/13/2005 Challenges

More information

Next Generation Intelligent Migration SM. A Well-Managed Path from Enhanced to Next Generation Services

Next Generation Intelligent Migration SM. A Well-Managed Path from Enhanced to Next Generation Services Next Generation 9-1-1 Intelligent Migration SM A Well-Managed Path from Enhanced 9-1-1 to Next Generation 9-1-1 Services 1 How Do We Know When We Have Achieved NG9-1-1? From a NENA September, 2008 paper

More information

STREAMS Integrated Network Management Presented by: Matthew Cooper

STREAMS Integrated Network Management Presented by: Matthew Cooper STREAMS Integrated Network Management Presented by: Matthew Cooper Transmax helps customers realise the community benefits of optimising transport networks by providing smarter, more sustainable ITS solutions.

More information

Intelligent Transportation Systems (ITS)

Intelligent Transportation Systems (ITS) Intelligent Transportation Systems (ITS) Systems Engineering (SE) Requirement Intelligent Transportation Systems (ITS) means electronics, communications, or information processing used singly or in combination

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

UF CEMP Support Group Annex: Public Safety

UF CEMP Support Group Annex: Public Safety UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management

More information

Introduction to The Unified CAD (UCAD) Project A Public Safety Information Sharing & Interoperability Program

Introduction to The Unified CAD (UCAD) Project A Public Safety Information Sharing & Interoperability Program Introduction to The Unified CAD (UCAD) Project A Public Safety Information Sharing & Interoperability Program Bill Hobgood, Project Coordinator, APCO International Mike Roosa, Chief Information Officer,

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

Managing Security, Risk and Compliance for Critical Assets on the Smart Grid

Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Kshamit Dixit Toronto Hydro Toronto Hydro A snapshot Worldwide Employees: 1,700 Revenues: $2.3 Billion Headquarters: Toronto,

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information

VirtualAgility solutions for. Smarter Public Safety. Michael V Kay VP European Operations VirtualAgility Inc.

VirtualAgility solutions for. Smarter Public Safety. Michael V Kay VP European Operations VirtualAgility Inc. IBM Smarter Cities, Dublin 29th September 2010 Smarter Public Safety VirtualAgility solutions for Smarter Public Safety Michael V Kay VP European Operations VirtualAgility Inc. IBM is working across the

More information

Safe City & Crime Analytics for Smart Cities

Safe City & Crime Analytics for Smart Cities Safe City & Crime Analytics for Smart Cities Contents Safe City & Security Requirements Safe City Technology Stack Integrated Solutions for Safe City Command & Control system Emergency Response System

More information

Cedar Rapids ITS Deployment Project

Cedar Rapids ITS Deployment Project Cedar Rapids ITS Deployment Project Concept of Operations July 29, 2011 Table of Contents Section 1 Introduction Purpose Goal of ITS Deployments Section 2 Needs Assessment General Background Stakeholders

More information

Making airports safer and smarter

Making airports safer and smarter Making airports safer and smarter Transforming Situation Management into Actionable Intelligence Dharmesh Patel October 17 th, 2017 Technology & Theory Integration Workflow Automation Collaboration Airports

More information

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience

More information

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City

Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Geo-spatial technology enables & enhances the objectives of Safe City - Smart City Presented By: Mr. Shishir Verma Vice President MapmyIndia (CE Info Systems Pvt. Ltd.) About Us Making Our World Better

More information

Emergency Response Network Design & Deployment

Emergency Response Network Design & Deployment Emergency Response Network Design & Deployment Improving public service communication via a secure, standards-based network Case Study Edward W. Suor, Managing Director VPN Systems, Inc. 2008 100 Carlson

More information

A Perspective on Public Safety and Critical Infrastructure Protection

A Perspective on Public Safety and Critical Infrastructure Protection A Perspective on Public Safety and Critical Infrastructure Protection Vision and market trends for Homeland Security and role in Critical Infrastructure Protection in response to the new security situation

More information

Underground Communications Infrastructure Guidelines Workgroup

Underground Communications Infrastructure Guidelines Workgroup Underground Communications Infrastructure Guidelines Workgroup We are a partner to our customers by providing a complementary suite of advanced mining and industrial technologies with a focus on the design,

More information

Integrated Consortium of Laboratory Networks (ICLN)

Integrated Consortium of Laboratory Networks (ICLN) Integrated Consortium of Laboratory Networks (ICLN) Dr. S. Randolph Long Deputy Director Chem Bio Division, DHS S&T Directorate FERN National Training Conference June 2009 1 Outline ICLN Organization Steps

More information

Remote Operation Services

Remote Operation Services CHAPTER 7 Cisco Management Appliance Urban Security solutions require a mission-critical -centric network to be in place and functioning properly at all times. The network is made up of multiple pieces

More information

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs The role of ICT in managing the complex Smart Grid Infrastructure Nampuraja Enose Infosys Labs Smart Grid The Smart Grid isn t a thing, but rather a Vision for the power system of the future Its a mix

More information

Jay English Director Comm. Center & Services APCO International. 2013; all rights reserved

Jay English Director Comm. Center & Services APCO International. 2013; all rights reserved Jay English Director Comm. Center & 9-1-1 Services APCO International 2013; all rights reserved Topics to Cover NG9-1-1 What it means may vary Technical Basics New Terminology Issues that need to be on

More information

White paper June ARINC RailwayNet HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION

White paper June ARINC RailwayNet HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION White paper June 2016 ARINC RailwayNet SM HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION Background Improving rail safety The National Transportation Safety Board (NTSB) has attributed a number

More information

Convergence Everywhere

Convergence Everywhere Convergence Everywhere Gregory J Hill FEBRUARY 2016 PHOENIX, AZ Why Convergence? APPLICATIONS Rapid proliferation and demand data from many systems Supporting diverse range of technologies Streaming video,

More information

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials + NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National

More information

Green Treatment Center

Green Treatment Center Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

DATABASE ADMINISTRATOR

DATABASE ADMINISTRATOR DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is

More information

Value of Integration

Value of Integration Value of Integration What is a Smart or Integrated Building? Do we mean Smart Building? Safely Efficiently Cost effectively With minimal environment impact Building Information Modeling (BIM) System monitoring

More information

Mobile Computing Technology and Applications

Mobile Computing Technology and Applications Mobile Computing Technology and Applications Reed Pangborn December 3, 2008 Agenda Trends & Challenges Why Go Mobile? Public Safety Solutions Fleet & Asset Management Solutions Disaster Recovery/COOP Communications

More information

Matt Graham, Jenifer Piccioni Cisco Physical Security Business Unit, Enterprise Networking Group

Matt Graham, Jenifer Piccioni Cisco Physical Security Business Unit, Enterprise Networking Group Matt Graham, Jenifer Piccioni Cisco Physical Security Business Unit, Enterprise Networking Group 2012 Cisco and/or its affiliates. All rights reserved. Cisco: NDA only Material 1 1990 s 2000 Now 3 rd Gen

More information

TRANSFORM YOUR OPERATIONS WITH INTELLIGENCE

TRANSFORM YOUR OPERATIONS WITH INTELLIGENCE MOTOROLA SOLUTIONS TRANSFORM YOUR OPERATIONS WITH INTELLIGENCE Jerry Napolitano, Principal Architect Intelligence-Led Public Safety Solution s DATA IS PROLIFERATING THE WORLD INCLUDING PUBLIC SAFETY 80%

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

BROADBAND AND THE FUTURE USER S EXPERIENCE

BROADBAND AND THE FUTURE USER S EXPERIENCE Emerging Technologies Forum BROADBAND AND THE FUTURE USER S EXPERIENCE Richard Coupland Director, Public Safety Market Development, GDC4S 04 December 2013 Emerging Technologies in Public Safety Public

More information

ISE North America Leadership Summit and Awards

ISE North America Leadership Summit and Awards ISE North America Leadership Summit and Awards November 6-7, 2013 Presentation Title: Presenter: Presenter Title: Company Name: Embracing Cyber Security for Top-to-Bottom Results Larry Wilson Chief Information

More information

Introducing Unified Critical Communications

Introducing Unified Critical Communications Introducing Unified Critical Communications for Public Safety EXECUTIVE SUMMARY Public safety agencies already use a range of wireless communications networks, including Land Mobile Radio (LMR), public

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

The Windstream Enterprise Advantage for Healthcare

The Windstream Enterprise Advantage for Healthcare The Windstream Enterprise Advantage for Healthcare Creating personalized healthcare experiences with secure and reliable cloud-optimized IT communications so you can focus on providing a connected, interoperable

More information

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Section 1 Metrics: Community Adoption

Section 1 Metrics: Community Adoption FY07 NIMS Compliance Metrics: Local/Tribal Section 1 Metrics: Community Adoption Compliance Requirement: Adopt NIMS at the community level for all government departments and agencies; as well as promote

More information

Enabling Operational Innovation and Building Resilience

Enabling Operational Innovation and Building Resilience Enabling Operational Innovation and Building Resilience National Geospatial Preparedness Summit September 14, 2016 Dan Cotter Director First Responders Group Science and Technology Directorate S&T Visionary

More information

Homeland Security: Requirements for Installation Security Decision Support Systems. Battle Command Battle Lab Gordon

Homeland Security: Requirements for Installation Security Decision Support Systems. Battle Command Battle Lab Gordon Homeland Security: Requirements for Installation Security Decision Support Systems COE post 9 / 11 CONUS and OCONUS installations must be prepared for and capable of preventing terrorist, criminal and

More information

Electric Access System Enhancement (EASE)

Electric Access System Enhancement (EASE) Electric Access System Enhancement (EASE) Robert Sherick T-D Operations Interface Working Group More Than Smart August 2 nd, 2017 1 AGENDA ENERGISE Program EASE Project Objectives Approach Expected Outcomes

More information

Cisco IP Interoperability and Collaboration System (IPICS) Release 4.0

Cisco IP Interoperability and Collaboration System (IPICS) Release 4.0 Cisco IP Interoperability and Collaboration System (IPICS) Release 4.0 The Cisco IP Interoperability and Collaboration System (IPICS) solution streamlines radio dispatch operations and improves response

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting January 30, 2007 1 Agenda ICLN Background Information Network Coordinating Group Accomplishments Responsible Federal

More information

Company Builds Sustainable, Highly Efficient Headquarters Facility

Company Builds Sustainable, Highly Efficient Headquarters Facility Company Builds Sustainable, Highly Efficient Headquarters Facility Panduit used IP-based Physical Security, Connected Real Estate, and Collaboration solutions to reduce costs and energy consumption. EXECUTIVE

More information

<Insert Picture Here> Enterprise Data Management using Grid Technology

<Insert Picture Here> Enterprise Data Management using Grid Technology Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility

More information

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology VMware Technology Overview Leverage Nextiva Video Management Solution with VMware Virtualization Technology Table of Contents Overview... 2 Seamless Integration within the IT Infrastructure... 2 Support

More information

Evolving E9-1-1 Public Safety

Evolving E9-1-1 Public Safety Evolving E9-1-1 Public Safety AT&T Helping You Move Forward September 9, 2010 2008 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other marks contained herein are trademarks of

More information

Mission Critical MPLS in Utilities

Mission Critical MPLS in Utilities Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This

More information

Grid Modernization at the Department of Energy

Grid Modernization at the Department of Energy Grid Modernization at the Department of Energy Kevin Lynn, Director of the Grid Integration Initiative Office of Energy Efficiency and Renewable Energy November 17, 2014 Electricity Plays a Vital Role

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defense, and public safety agencies face challenges and threats that

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

A holistic approach towards the first responder of the future

A holistic approach towards the first responder of the future A holistic approach towards the first responder of the future Dr. Dimitris Vassilliadis and Dr. Alexandros Bartzas Project Coordinator EXUS S.A. E-SPONDER is funded from the European Community s Seventh

More information

Innovations & Technologies for Improving Throughput, Efficiency and Security. AAPA Marine Terminal Management Training Program

Innovations & Technologies for Improving Throughput, Efficiency and Security. AAPA Marine Terminal Management Training Program Innovations & Technologies for Improving Throughput, Efficiency and Security AAPA Marine Terminal Management Training Program October 2014 Topics of Discussion Redundancy Cyber Security Digital Dashboards

More information

LAWRENCE-DOUGLAS COUNTY INTELLIGENT JOURNEY

LAWRENCE-DOUGLAS COUNTY INTELLIGENT JOURNEY LAWRENCE-DOUGLAS COUNTY INTELLIGENT JOURNEY L-DC REGIONAL ITS ARCHITECTURE AND STRATEGIC DEPLOYMENT PLAN EXECUTIVE SUMMARY The Lawrence-Douglas County Metropolitan Planning Organization (L- DC MPO) has

More information

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless

More information

Cisco Physical Security Solutions

Cisco Physical Security Solutions Cisco Physical Security Solutions Transforming the Way Organizations and Communities Protect People, Property, and Critical Infrastructure Prezenter: Radenko Čitaković, CCIE #16488 com-4t doo Beograd Agenda

More information

GLOBAL COMMAND Security Anywhere MANAGEMENT SYSTEM

GLOBAL COMMAND Security Anywhere MANAGEMENT SYSTEM GLOBAL Security COMMAND Anywhere MANAGEMENT SYSTEM UNISIGHT Software SUMMARY SYSTEM FEATURES SYSTEM FUNCTIONS GCMS INTRODUCTION DVR SOFTWARE COMPONENTS Summary The Global Command Management System (GCMS)

More information

M-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1

M-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1 M-2-M-2-People How Mobility Enables Visibility Daniel Munyan Director, M2M Center of Excellence 6/1/2012 1 The Timeless Challenge of Logistics Achieving Enterprise Visibility / Situation Awareness Tracking

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response

More information

The SCADA Connection: Moving Beyond Auto Dialers

The SCADA Connection: Moving Beyond Auto Dialers C O N N E CT I N G T H E WORLD S ASSETS The SCADA Connection: Moving Beyond Auto Dialers Auto dialers have long been used to report alarms in SCADA installations. While they are useful for notifying users

More information

The SCADA Connection: Moving Beyond Auto Dialers

The SCADA Connection: Moving Beyond Auto Dialers WHITE PAPER The SCADA Connection: Moving Beyond Auto Dialers ABSTRACT: Auto dialers have long been used to report alarms in SCADA installations. While they are useful for notifying users of alarm states,

More information

Huawei Emergency Command Network Solution Brochure-Detailed

Huawei Emergency Command Network Solution Brochure-Detailed Doc. Code Huawei Emergency Command Solution Brochure-Detailed Issue V1.0 Date 2012-09-21 Huawei Technologies Co., Ltd. Huawei Emergency Command Solution 1 Background Emergency command is used to control

More information

Dear Sir/Madam: Submission Instructions:

Dear Sir/Madam: Submission Instructions: Dear Sir/Madam: The purpose of this request for information (RFI) is to survey the vendor community on behalf of the Commonwealth of Pennsylvania (Commonwealth) to gather information on Emergency Services

More information