Security Technology October 31, Overview

Size: px
Start display at page:

Download "Security Technology October 31, Overview"

Transcription

1 Security Technology October 31, 2005 Overview Passenger Screening Current Passenger Screening Technology Improvement Goals Emerging Technologies Screening Current Screening Technology Improvement Goals Emerging Technologies Security Equipment Support Services 2 Tim Goin/DSCI for Andy Lee/TSA 1

2 Passenger Screening 3 Current Checkpoint Technology Passenger The following equipment is currently deployed to support checkpoint operations at airports throughout the country: 1910 Enhanced Walk Through Metal Detectors (EWTMD) (new standard set after 9/11) 1904 Threat Image Projection (TIP) ready X-ray machines (TRX) New TIP Library of 2400 images loaded on all currently deployed TRX units 1273 Explosive Trace Detection (ETD) units Resolution for suspect bags Random Sampling Selectee Screening 4 Tim Goin/DSCI for Andy Lee/TSA 2

3 Short Term Goals (0-2yrs) Passenger Improve the effectiveness and efficiency of passenger screening checkpoints and screening equipment deployed to airports, to include increasing explosives detection capability Respect passenger privacy and minimize the need for physical pat-down of passengers Increase system connectivity at local and regional levels Medium Term Goals (2-4yrs) Increase throughput, system capacity, and effectiveness Increase equipment availability, reliability, and effectiveness Improve performance management Allow for effective communication and metrics reporting through system wide network Reduce overall operating and labor support costs Long Term Goals (>4yrs) Maximize automation Minimize footprint requirement Integration of sensors Optimize passenger flow and minimize wait times 5 Passenger Emerging Technologies Explosives Trace Detection Portal (ETP) Automated Explosives Trace Detection Document Scanner (ETS) Whole Body Imaging (x-ray backscatter) planning to initiate pilot project at 4 airports Automated Carry-On Bag Explosives Detection System (EDS) Bottled Liquids Scanner Communications: VECTOR-NET (networking screening technologies) Automated Explosives Trace Detection Shoe Scanner Casts and Prostheses Scanner Multiplexed Carry-On Bag Screening 6 Tim Goin/DSCI for Andy Lee/TSA 3

4 Screening 7 Current Technology The following equipment is currently deployed to support checked baggage screening at airports throughout the country: 1397 Explosives Detection Systems (EDS) 6520 Explosive Trace Detection (ETD) units 8 Tim Goin/DSCI for Andy Lee/TSA 4

5 Current Technologies (Computerized Tomography (CT) CTX 2500 CTX 5500DS L3 examiner Current Technologies - Trace Detection 10 Tim Goin/DSCI for Andy Lee/TSA 5

6 Short Term Goals (0-5yrs) Deploy Screening Assets and Legacy Equipment Apply lessons learned, establish best practices, and make best-value decisions to optimize currently deployed systems. Future Deployment Needs Deploy the best available EDS technology in support of program goals and objectives. Operator Performance, Testing, and Evaluation Establish tools, procedures, as well as protocols to enhance operator performance, testing, and evaluation. Detection Effectiveness, Capabilities, and Standards Keep standards current with threat assessments, vulnerability studies, and technology capabilities. Long Term (5-10yrs) Support identification and the development of concepts and technologies that push the screening capabilities significantly beyond those currently available. 11 Emerging Technologies Phoenix Category I - enhancements to existing EDS systems work to develop enhancements to existing EDS. Category II - integrate and improve performance of existing EDS technologies; System of Systems (SOS) approach. Category III - develop systems with improved system performance characteristics beyond today's EDS. Manhattan II NexGen System Specification Development Proof-of-Concept EDS Certification/Standard Update NexGen EDS Threat Detection Experimental Study and Requirements Analysis NexGen Open Solicitation iscreen System Lobby Baggage Screening Suite Pilot 12 Tim Goin/DSCI for Andy Lee/TSA 6

7 Security Equipment Support Services 13 Security Equipment Support Services 24-hour maintenance coverage of screening equipment at all US airports 24-hour TSA Service Response Center hour maintenance technicians available Response procedures established: Minimize the adverse affects of weather conditions, power failures, and other disruptive events. Emergency security equipment available for immediate deployment to supplement or replace security equipment in case of an emergency (natural disaster, increased threat, special event, etc.) 14 Tim Goin/DSCI for Andy Lee/TSA 7

8 Security Equipment Support Services Examples of incidents/events TSA provided security equipment support: Winter Olympics Salt Lake City Republican National Convention Democratic National Convention Inauguration Summer Olympics Athens Super Bowl XXXIX Jacksonville 15 Tim Goin/DSCI for Andy Lee/TSA 8

Passenger Screening Program

Passenger Screening Program Passenger Screening Program Mario Wilson Division Director Airport Consultants Council July 20, 2017 Key Topics Passenger Screening Program Funding Priorities Planned Funding Activities Planned Funding

More information

Airport Consultants Council

Airport Consultants Council Airport Consultants Council Jose Bonilla Innovation Task Force: Future of Security Airport Consultants Council July 20, 2016 Innovating the Future of Aviation Security Cybersecurity Cybersecurity Requirements;

More information

Opening Remarks. Carolina Ramírez-Taborda Global Director, Aviation Security & Facilitation IATA

Opening Remarks. Carolina Ramírez-Taborda Global Director, Aviation Security & Facilitation IATA Opening Remarks Carolina Ramírez-Taborda Global Director, Aviation Security & Facilitation IATA Security on the Ground Moderator Kaarlo Karvonen Panelists Christopher Bidwell Richard Duncan Olafur Olafsson

More information

FTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA

FTE Asia. IATA Workshop. Vinoop Goel Regional Director, APCS IATA FTE Asia IATA Workshop Vinoop Goel Regional Director, APCS IATA Passenger satisfaction level at the different touchpoints 100% 80% 60% 40% 20% 0% -20% -40% -60% -80% -100% Satisfied Not Sastisfied Airport

More information

Checked Baggage. Mario Wilson Division Director. Airport Consultants Council July 20, 2016

Checked Baggage. Mario Wilson Division Director. Airport Consultants Council July 20, 2016 Checked Baggage Mario Wilson Division Director Airport Consultants Council July 20, 2016 Innovating the Future of Aviation Security Cybersecurity Cybersecurity s; Technical Solutions Innovation Operational

More information

QinetiQ demonstrates new privacy-protecting body scanner for crowded places

QinetiQ demonstrates new privacy-protecting body scanner for crowded places QinetiQ demonstrates new privacy-protecting body scanner for crowded places Published on 4 Mar 2017 Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed

More information

Airports Council International - North America (ACI-NA)

Airports Council International - North America (ACI-NA) Airports Council International - North America (ACI-NA) Public Safety & Security Fall Conference Mario Wilson Division Director, Checked Baggage Technologies Division October 21, 2015 Key Topics EBSP Program

More information

Risk-based security in practice Turning information into smart screening. October 2014

Risk-based security in practice Turning information into smart screening. October 2014 Risk-based security in practice Turning information into smart screening October 2014 Organizations charged with securing our society s vital functions transit, commerce, communication have expansive missions

More information

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of

More information

Security Checkpoints: Evolving Technology and Planning Considerations

Security Checkpoints: Evolving Technology and Planning Considerations Security Checkpoints: Evolving Technology and Planning Considerations 2018 Airports @ Work March 14, 2018 Agenda Yesterday / Today Ongoing / Near-Term Future Long-term Recommendations Yesterday / Today

More information

CRS Report for Congress

CRS Report for Congress Order Code RL32531 CRS Report for Congress Received through the CRS Web Critical Infrastructure Protections: The 9/11 Commission Report August 16, 2004 John Moteff Specialist in Science and Technology

More information

Strategic Five-Year Technology Investment Plan for Aviation Security

Strategic Five-Year Technology Investment Plan for Aviation Security Strategic Five-Year Technology Investment Plan for Aviation Security 2015 Report to Congress August 12, 2015 Transportation Security Administration Message from the Administrator August 12, 2015 I am pleased

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Duration: 5 Days Course Code: M20703-1 Version: A Overview: This five-day course describes how to use Configuration Manager and its associated site systems

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Advanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1

Advanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1 Advanced Net Technologies to Monitor Trusted Corridors 1 Tasks Intermodal Technology Proof of Concept and Integration of the SmartPort Trade Data Exchange Architecture and Net Technologies System modeling,

More information

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless

More information

Optimizing the Passenger Throughput at an Airport Security Checkpoint

Optimizing the Passenger Throughput at an Airport Security Checkpoint nd International Conference on Education, Sports, Arts and Management Engineering (ICESAME 017) Optimizing the Passenger Throughput at an Airport Security Checkpoint Jiaqi Chen1,a, Shengnan Xu,b Liangbi

More information

MEETING ISO STANDARDS

MEETING ISO STANDARDS WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced

More information

Administering System Center Configuration Manager ( )

Administering System Center Configuration Manager ( ) Administering System Center Configuration Manager (20703-1) Formato do curso: Presencial Localidade: Lisboa Data: 30 Set. 2019 a 04 Out. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Nível: Avançado

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site

More information

Aviation Security Committee

Aviation Security Committee Aviation Security Committee The Aviation Security Committee is responsible for the development and implementation of ACI EUROPE security policy position on issues such as landside security, insider threats,

More information

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

AVIATION. The leading provider of integrated security solutions in the field of aviation fjcsecurity.com/fjcaviation

AVIATION. The leading provider of integrated security solutions in the field of aviation fjcsecurity.com/fjcaviation AVIATION The leading provider of integrated security solutions in the field of aviation. 718-244-1400 fjcsecurity.com/fjcaviation 718-244-1400 fjcsecurity.com/fjcaviation HARDWORKING, RELIABLE EXPERTS

More information

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Varighet: 5 Days Kurskode: M20703 Beskrivelse: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Preparing for the Dynamic Grid of Future

Preparing for the Dynamic Grid of Future Preparing for the Dynamic Grid of Future Peter Hoffman, P.E. Duke Energy, Grid Solutions Engineering & Technology POWERING LIVES & COMMUNITIES Environmental Stewardship Reliable Service Affordable Rates

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY letl Office of Inspector General Information Technology Management Needs to Be Strengthened at the Transportation Security Administration OIG-08-07 October 2007 Office of

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

MOC 10748A: Deploying System Center 2012 Configuration Manager

MOC 10748A: Deploying System Center 2012 Configuration Manager MOC 10748A: Deploying System Center 2012 Configuration Manager Course Overview This course describes how to plan and deploy a Microsoft System Center 2012 Configuration Manager hierarchy, including the

More information

The Beyond the Border Action Plan

The Beyond the Border Action Plan The Beyond the Border Action Plan Updates on Key Initiatives Presentation at the Eastern Border Transportation Coalition (EBTC) Workshop April 19, 2016 The objective of this presentation is: To provide

More information

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT

PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT PREPARED STATEMENT OF ERNEST R. FRAZIER, SR., ESQ. AMTRAK, CHIEF OF POLICE AND SECURITY DEPARTMENT HOUSE TRANSPORTATION & INFRASTRUCTURE SUBCOMMITTEE ON RAILROADS Oversight Hearing on Railroad Security

More information

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014

Aviation Law Enforcement Officer Security Training Kansas City International Airport May 21 & 22, 2014 0900-1200 Welcome and Introductions Wednesday, May 21 Discussion of prerequisite online LEO modules DHS/Transportation Security Administration (TSA) Organization and Operations o Headquarters o Responsibilities

More information

Making airports safer and smarter

Making airports safer and smarter Making airports safer and smarter Transforming Situation Management into Actionable Intelligence Dharmesh Patel October 17 th, 2017 Technology & Theory Integration Workflow Automation Collaboration Airports

More information

Integrating Resilience into Transportation Planning

Integrating Resilience into Transportation Planning Integrating Resilience into Transportation Planning AMPO Annual Meeting September 28, 2018 San Antonio, TX Heather Holsinger Sustainable Transportation and Resilience Office of Natural Environment FHWA

More information

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details 2 FPM IT 420B: FAC P/PM IT Planning & Acquiring Operations of IT Systems FPM-IT-420B: FAC-P/PM-IT PLANNING & ACQUIRING

More information

Microsoft Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

CRITICAL INFRASTRUCTURE PROTECTION

CRITICAL INFRASTRUCTURE PROTECTION CRITICAL INFRASTRUCTURE PROTECTION Cosmos Business Systems COSMOS BUSINESS SYSTEMS SA established in Greek & Cypriot market for more than 25 years dealing in all IT related projects in both Governmental

More information

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards

More information

The UCSD Network Telescope

The UCSD Network Telescope The UCSD Network Telescope Colleen Shannon cshannon @ caida.org NSF CIED Site Visit November 22, 2004 UCSD CSE Motivation Blocking technologies for automated exploits is nascent and not widely deployed

More information

: 20696C: Administering System Center Configuration Manager and Intune

: 20696C: Administering System Center Configuration Manager and Intune Module Title Duration : 20696C: Administering System Center Configuration Manager and Intune : 5 days About this course Get expert instruction and hands-on practice configuring and managing clients and

More information

Biometric Entry-Exit. July 11, 2017

Biometric Entry-Exit. July 11, 2017 Biometric Entry-Exit July 11, 2017 CBP Assumes Biometric Exit Mission in 2013 1996 Congress passed legislation mandating the creation of a biographic entry and exit system 2001 Post 9/11 Congress passed

More information

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017 FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Miniaturized, Modular, High Resolution X-ray Backscatter Imaging as a Blue Force Enhancer

Miniaturized, Modular, High Resolution X-ray Backscatter Imaging as a Blue Force Enhancer Miniaturized, Modular, High Resolution X-ray Backscatter Imaging as a Blue Force Enhancer Bill Baukus Director, Technology Development October 14, 2009 6 th Annual Disruptive Technologies Conference Distribution

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

ACI-NA 2018 Risk Management Conference SAFETY Act. Washington, D.C

ACI-NA 2018 Risk Management Conference SAFETY Act.  Washington, D.C ACI-NA 2018 Risk Management Conference SAFETY Act Akmal Ali, J.D. akmal.ali@catalystdc.com Principal, Catalyst Partners 1250 Connecticut Ave. NW www.catalystdc.com Washington, D.C. 20036 Following the

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute

More information

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager NE-20703-1A Administering System Center Summary Duration Level Technology Delivery Method Training Credits 5 Days Advanced System Center Classroom ILT Virtual ILT On Demand SATV Introduction This 5-day

More information

Johnson City Regional ITS Architecture Update Review Workshop. March 12, 2015

Johnson City Regional ITS Architecture Update Review Workshop. March 12, 2015 Johnson City Regional ITS Architecture Update Review Workshop March 12, 2015 Introductions Workshop Overview Review of the Draft Regional ITS Architecture Document Discussion on Existing and Planned ITS

More information

Sul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone:

Sul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone: Spring 217 CS 331 Computer Communications Instructor: Thea Glenn M.S. Management Information Systems Office Location: ACR 19-B Office Phone: 432-837- 849 TEXT #: 931-237-3324 (No text after 11pm or before

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Office of Acquisition Program Management (OAPM)

Office of Acquisition Program Management (OAPM) Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Administering System Center Configuration Manager and Intune Course 20696C 5 Days Instructor-led, Hands-on Introduction Get expert instruction and hands-on practice configuring and managing clients and

More information

Improving Security in the Application Development Life-cycle

Improving Security in the Application Development Life-cycle Improving Security in the Application Development Life-cycle Migchiel de Jong Software Security Engineer mdejong@fortifysoftware.com March 9, 2006 General contact: Jurgen Teulings, 06-30072736 jteulings@fortifysoftware.com

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

#BERLIN5GWEEK. Truths and myths about the new super-technology

#BERLIN5GWEEK. Truths and myths about the new super-technology #BERLIN5GWEEK Truths and myths about the new super-technology Does 5G really exist? Yes, but we have to distinguish between the 5G standard and future 5G infrastructures. The mobile standard is the successor

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018

TRANSPORTATION SECURITY ADMINISTRATION. Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 TRANSPORTATION SECURITY ADMINISTRATION Insider Threat Awareness ICAO Global Aviation Security Symposium 2018 Overview Discuss the key elements of insider risk and how to mitigate the unique security risks

More information

R4-C.1: Advanced Multispectral Computed Tomography (CT) Algorithms

R4-C.1: Advanced Multispectral Computed Tomography (CT) Algorithms R4-C.1: Advanced Multispectral Computed Tomography (CT) Algorithms I. PARTICIPANTS Faculty/Staff Name Title Institution Email Clem Karl PI BU wckarl@bu.edu David Castañón Professor BU dac@bu.edu Limor

More information

Reliable Digital Signage in Unreliable Conditions

Reliable Digital Signage in Unreliable Conditions CASE STUDY Reliable Digital Signage in Unreliable Conditions A digital signage supplier partners with IBASE to deploy signage in harsh outdoor weather conditions. BACKGROUND In the middle of winter, the

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Your Student s Head Start on Career Goals and College Aspirations

Your Student s Head Start on Career Goals and College Aspirations Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Course 20696C: Administering System Center Configuration Manager and Intune Page 1 of 9 Administering System Center Configuration Manager and Intune Course 20696C: 4 days; Instructor-Led Introduction Get

More information

M E M O R A N D U M. Summary

M E M O R A N D U M. Summary M E M O R A N D U M EUGENE WATER & ELECTRIC BOARD TO: FROM: Commissioners Helgeson, Brown, Mital, Simpson and Carlson Rod Price, Chief Engineering & Operations Officer Rene González, Customer Solutions

More information

FHWA RESILIENCE PRIMER

FHWA RESILIENCE PRIMER FHWA Resilience Primer Wisconsin Annual Planning Conference October 30, 2017 Sustainable Transportation and Resilience Roadmap Resilience Definitions Regulations Guidance FHWA Resources and Tools INVEST

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Course Details Course Code: 20703-1A Duration: Notes: 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Below are a few questions you should be asking when planning your communication strategy for potential employee threats:

Below are a few questions you should be asking when planning your communication strategy for potential employee threats: Introduction As an organization, one of your major priorities is keeping the people you employ safe. This can be a difficult task, especially if you aren t prepared. In order to best protect your employees

More information

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

The Connected Water Plant. Immediate Value. Long-Term Flexibility. The Connected Water Plant Immediate Value. Long-Term Flexibility. The Water Industry is Evolving Reliable, safe and affordable access to water is not solely on the minds of water and wastewater managers.

More information

ISE Central Executive Forum and Awards 2012

ISE Central Executive Forum and Awards 2012 ISE Central Executive Forum and Awards 2012 Company Name: Project Name: Presenter: Presenter Title: Sallie Mae Enterprise-Wide Continuous Monitoring & Vulnerability Management Brian Brush Director Corporate

More information

AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey

AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey Texas Southern University Texas State University, San

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General

Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Planning in British Columbia David Morhart, Deputy Solicitor General Transportation Security Conference Calgary, October 2-4, 2 2006 B.C. s Unique Transportation Sector Canada s

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

Qualys Cloud Platform

Qualys Cloud Platform 18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

H2020 Programme. Guidance Guidelines for the classification of information in research projects

H2020 Programme. Guidance Guidelines for the classification of information in research projects EUROPEAN COMMISSION Directorate-General for Migration and Home Affairs H2020 Programme Guidance Guidelines for the classification of information in research projects Version 2.1 26 October 2016 IMPORTANT

More information

SCCM 2012 Course Details

SCCM 2012 Course Details SCCM 2012 Course Details By Besant Technologies Course Name SCCM 2012 Category Venue Microsoft Besant Technologies No.24, Nagendra Nagar, Velachery Main Road, Address Velachery, Chennai 600 042 Landmark

More information

Climate Change and Extreme Weather Vulnerability Assessments AASHTO Extreme Weather Events Symposium May 2013

Climate Change and Extreme Weather Vulnerability Assessments AASHTO Extreme Weather Events Symposium May 2013 Climate Change and Extreme Weather Vulnerability Assessments AASHTO Extreme Weather Events Symposium May 2013 Becky Lupes Sustainable Transport & Climate Change Team Office of Planning, Environment & Realty

More information

The Why, What, and How of Cisco Tetration

The Why, What, and How of Cisco Tetration The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is

More information

Arizona Emergency VII (E-VII) Program Overview and Focus Areas

Arizona Emergency VII (E-VII) Program Overview and Focus Areas Arizona Emergency VII (E-VII) Program Overview and Focus Areas February 2008 The Arizona E-VII Initiative is Underway The Arizona DOT, Maricopa County DOT, FHWA and partners from the academic and private

More information

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au

More information

APEX in Security. AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016

APEX in Security. AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016 APEX in Security AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016 Two different programmes with the common objective of improving security Airport Excellence (APEX) A peer review process

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Modern Vulnerability Management The IT landscape today is changing and because of that, vulnerability management needs to change too. IT environments today are filled with both

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Administering System Center Configuration Manager and Intune

Administering System Center Configuration Manager and Intune Course 20696: Administering System Center Configuration Manager and Intune Page 1 of 10 Administering System Center Configuration Manager and Intune Course 20696: 4 days; Instructor-Led Introduction Get

More information

EMERGENCY/DISASTER RESPONSE TEAM

EMERGENCY/DISASTER RESPONSE TEAM EMERGENCY/DISASTER RESPONSE TEAM For More Information Contact Us Toll-Free at: 1(888) 610-7769 at: (305) 670-6544 Security Alliance LLC. 8323 NW 12th Street, Suite# 218 Miami, Florida 33126 info@securityalliancegroup.com

More information

Data Lakes & Leaks Erno Doorenspleet. IBM Security

Data Lakes & Leaks Erno Doorenspleet. IBM Security Data Lakes & Leaks Erno Doorenspleet 1 Data Lakes Leaks 2 A Data Lake versus A Data Reservoir Data flows in naturally and just sits there Built to extract value from the data Data without Analytics is

More information

Redundancy for Corporate Broadband WHITE PAPER

Redundancy for Corporate Broadband WHITE PAPER Redundancy for Corporate Broadband WHITE PAPER Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless to wired (fiber,

More information

CIO Forum Maximize the value of IT in today s economy

CIO Forum Maximize the value of IT in today s economy CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed

More information