Abdulmohsin Al Omran and The Family Office

Size: px
Start display at page:

Download "Abdulmohsin Al Omran and The Family Office"

Transcription

1 Presented by: Syracuse University Syracuse University s College of Engineering and Computer Science The Maxwell School of Citizenship and Public Affairs at Syracuse University The Institute for National Security and Counterterrorism Abdulmohsin Al Omran and The Family Office Monday, 16 December, 2013 In partnership with King Fahd University of Petroleum and Minerals Dammam, Saudi Arabia Wednesday, 18 December, 2013 Ritz Carlton Jumeriah Beach Dubai, UAE Event Synopsis: Securing the Cybersphere will spotlight recent and emerging research, strategies and best practices in systems assurance and mobile and web security from an academic point of view combined with industry and government presenters. The event will cover new ground for cybersecurity needs and resources as faculty present their research with unique experience such as the JPMC (corporate) partnership and the AFRL (government) partnership. Invited guests will discover uncommon hidden risks present in commercial systems and be prepared to request the utmost in cyber protection from their current data suppliers. Proven insights, methods and cutting-edge research will address: Systems assurance in financial sectors using examples from SU s partnership with JPMC Key principles for design and implementation of cybersecurity on mobile platforms Assurance and security modules for critical data transfers Malware analysis for prevention and defense of data attacks Addressing issues of cyber law and policy to design and prove systems assurance Syracuse University faculty researchers are particularly active in application areas in which there is a need for high confidence that a system behaves correctly and securely. Examples of systems of this kind include defense and national security operations, medical record systems, banking and financial institutions, and critical infrastructure. Symposium guests will have an opportunity to access the expertise of SU s faculty by presenting challenges and concerns unique to their industry or organization for problem-solving consideration by academic and industry experts. Invited Guests: Invitations are available for a limited number of guests in anticipation of a maximum of 100 attendees at the event.

2 Proposed Schedule Dammam, Saudi Arabia Hosted by the and with the support of King Fahd University of Petroleum and Minerals Sunday, December 15 Monday, December 16 (Symposium) 8 9 a.m. Breakfast/Networking/Registration (75 guests) 9 10 a.m. Plenary Session (75 guests) Site visit to KFUPM Visit with faculty & tour campus a.m. Case Studies and Applications (75 guests) 11 a.m. Site visit to ARAMCO Noon Visit with faculty & tour campus 12 1 p.m. Lunch (75 guests) 1 2 p.m. Keynote speaker: Dean Jim Steinberg Room Setup: Round Tables 2 3 p.m. 3 4 p.m. KFUPM/SU Faculty Roundtable Track 1 One Session (Assurance) (30-40 guests) Room Setup: Classroom Track 2 One Session (Mobile Security & Cyber (30-40 guests) Room setup: Classroom 4 5 p.m. Tour of the SU delegation to leave for airport by 4 p.m. at the latest Evening KFUPM & SU Dinner (50 guests) Keynote speaker: KFUPM Delegate For invited guests, select alumni and participants associated with the Symposium.

3 Proposed Schedule Dubai, UAE Tuesday, December 17 Wednesday, December 18 (Symposium) 8 9 a.m. Breakfast/Networking/Registration (150 guests) 9 10 a.m. Plenary Session (150 guests) Academic Visitation and Site Visits a.m. Case Studies and Applications (150 guests) 11 a.m. Corporate Relations Meetings Upon Request Noon 12 1 p.m. Lunch (150 guests) 1 2 p.m. Room Setup: Round Tables 2 3 p.m. 3 4 p.m. Keynote speaker Honored Guest (to be announced) Track 1 Two Sessions (Assurance & Cyber (40-60 guests) Room Setup: Classroom Track 2 Two Sessions (Mobile Security & Cyber (40-60 guests) Room setup: Classroom 4 5 p.m. Closing Reception ( guests) Room Setup: Flexible High Tables & Standing? Evening VIP Dinner ( guests) Keynote speaker: Dean Jim Steinberg For invited guests, select alumni and participants associated with the Symposium.

4 Symposium Presentation Themes and Presenters (tentative pending development by faculty and presenters) Time Session Title Topic Presenter 9 10 a.m. Plenary Session Securing the Cybersphere The state of cybersecurity issues for emerging economies o Tentative schedule of keynote speakers: Dean Jim Steinberg Dean Laura Steinberg Bill Banks, Director Institute for National Security and Counterterrosim Jeff Saltz, JPMC KFUPM Delegates (Dammam Only) Tentative: Local dignitary addressing the critical nature of cybersecurity specific to either Saudi Arabia or the GCC region a.m. Case Study/ Critical Financial Infrastructure 11 a.m. 12 p.m. Case Study/ Assured Command & Control 2 3 p.m. Track One/ Session One: Industry Responses to Regulatory Cybersecurity Challenges Cybersecurity for Financial Company Operations (SU-JPMC partnership) Can Isik Mission Assurance in Cyberspace Shiu-Kai Chin Regulatory Challenges to Cyber Security Presented by Bill Banks, Director, Institute for National Security and Counterterrorism (INSCT) This session presents the overall framework for the JPMC-SU Collaboration (a public/private model), and examples of JPMC's applied research projects on which SU faculty have worked on, over the past five years. Mission assurance is the assurance of the correctness, integrity, security, and availability of critical capabilities necessary to complete a mission successfully. National security depends on the integrity of command and control for military systems, the power grid, and financial systems. We present projects whose objectives include equipping engineers and computer scientists with the theory, methods, and tools necessary for formal specification and verification of mission-essential functions in cyberspace. Most critical infrastructure is privately owned and remains vulnerable to even catastrophic cyber attacks. Private firms tend to underinvest in cyber defense for a variety of reasons, and many are incapable of effectively protecting their networks. Governments have traditionally treated cyber security as a national security problem or a criminal law problem, applying the laws of war to justify countermeasures, or domestic criminal laws to prosecute perpetrators, when they can be found. Neither approach provides adequate protection for privately held critical infrastructure. Instead, industry should partner with CI firms (supported by government regulation, if necessary). The industry/ci firm partners should engage in monitoring and surveillance, develop programs to harden vulnerable targets and build resilient and recoverable systems. The new relationships will require unprecedented levels of trust and information sharing between industry, CI firms, and government.

5 3 4 p.m. Track One/ Session Two: Systems Assurance Assuring Security and Integrity Shiu-Kai Chin The so-called Internet of Things (IoT), where physical object have embedded intelligence and are networked, is growing daily. Within this context, command and control over critical infrastructure, such as financial networks, must be assured to have integrity and security. The purpose of this workshop is to give an overview of a rigorous set of methods and tools that address the assurance of command and control of mission-critical systems. 2 3 p.m. Track Two/ Session One: Mobile Security 3 4 p.m. Track Two/ Session Two: Industry Responses to Regulatory Cybersecurity Challenges Security considerations for smartphones Kevin Du Regulatory Challenges to Cyber Security Presented by Bill Banks, Director, Institute for National Security and Counterterrorism (INSCT) As more and more business and people are depending on smartphones and other mobile devices, the security of such a platform becomes very important. In this presentation, we will discuss the emerging risks faced by these platforms, and then give an overview of what the industry and academia are working on in dealing with these risks. We will also provide a brief overview of our own research projects, which are sponsored by NSF and Google. Most critical infrastructure is privately owned and remains vulnerable to even catastrophic cyber attacks. Private firms tend to underinvest in cyber defense for a variety of reasons, and many are incapable of effectively protecting their networks. Governments have traditionally treated cyber security as a national security problem or a criminal law problem, applying the laws of war to justify countermeasures, or domestic criminal laws to prosecute perpetrators, when they can be found. Neither approach provides adequate protection for privately held critical infrastructure. Instead, industry should partner with CI firms (supported by government regulation, if necessary). The industry/ci firm partners should engage in monitoring and surveillance, develop programs to harden vulnerable targets and build resilient and recoverable systems. The new relationships will require unprecedented levels of trust and information sharing between industry, CI firms, and government.

U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E ,

U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E , U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E 2 3-2 6, 2 0 1 9 Cyber Week Tel Aviv, 2019 Now in its 9th year, Cyber Week is recognized as one of the top international cybersecurity conferences

More information

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE. INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017

More information

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website:

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website: Venue Sheraton Oman Hotel Sheraton Oman Hotel P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: +968 2237 7777 Website: http://www.sheratonoman.com For reservations, please contact: Ms. Mary Antonette

More information

EXHIBITING IS MORE THAN JUST A STAND

EXHIBITING IS MORE THAN JUST A STAND EXHIBITING IS MORE THAN JUST A STAND EXPAND YOUR BUSINESS SKYLINE WITH ISNR Italian Roadshow 4 th & 5 th December 2017 AGENDA 1. Introduction 2. What happened in the last edition 3. ISNR Abu Dhabi 2018

More information

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

NCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time

NCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

gridconnext provides an unprecedented

gridconnext provides an unprecedented Where Policy & Business Leaders Meet to Build the Next-Generation Grid 2017 gridconnext provides an unprecedented opportunity for diverse industry stakeholders to discuss evolving policies and share best

More information

Telecommunication Development Bureau (BDT)

Telecommunication Development Bureau (BDT) Telecommunication Development Bureau (BDT) Ref.: BDT/IEE/RME/DM/006 Geneva, 18 December 2017 To: -ITU-D Sector Members -Administrations of ITU Member States -National Regulatory Authorities -Regional and

More information

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY. EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities Event brochure Introduction ISNR Abu Dhabi 2020 Program Participation & Partnership Opportunities ISNR ABU DHABI 2018 was under the Patronage of H.H Sheikh Hazza bin Zayed Al Nahyan, Deputy Chairman of

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

2018 VENUE: ABIDJAN, COTE D IVOIRE SOFITEL IVOIRE DATE: 24TH -26TH 2018 AFRICA CYBER SECURITY CONFERENCE

2018 VENUE: ABIDJAN, COTE D IVOIRE SOFITEL IVOIRE DATE: 24TH -26TH 2018 AFRICA CYBER SECURITY CONFERENCE AFRICA CYBER SECURITY CONFERENCE 2018 VENUE: ABIDJAN, COTE D IVOIRE SOFITEL IVOIRE DATE: 24TH -26TH 2018 THEME: CYBER SECURITY; The Engine of African Digital Transformation ABOUT ACSC VENUE: ABIDJAN, COTE

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

Accelerating CCUS: A Global Conference to Progress CCUS

Accelerating CCUS: A Global Conference to Progress CCUS Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

Media Kit. California Cybersecurity Institute

Media Kit. California Cybersecurity Institute Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information

CHAIRMAN S STATEMENT. ADAS & Autonomous Vehicles. Automotive Security. Alan Banks, AESIN Chairman

CHAIRMAN S STATEMENT. ADAS & Autonomous Vehicles. Automotive Security. Alan Banks, AESIN Chairman CHAIRMAN S STATEMENT Alan Banks, AESIN Chairman AESIN is the catalyst that enables rapid innovation in Automotive Electronic Systems in a collaborative and non-competitive environment Welcome to the Automotive

More information

Global Security Exchange (GSX) 2019

Global Security Exchange (GSX) 2019 Global Security Exchange (GSX) 2019 InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, organizations, state

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

NIS Directive : Call for Proposals

NIS Directive : Call for Proposals National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

CYBERSECURITY. The Intersection of Policy and Technology   YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

CRCC Information for Distinguished Regional Guests. Updated 4/13/15

CRCC Information for Distinguished Regional Guests. Updated 4/13/15 CRCC 2015 Information for Distinguished Regional Guests Updated 4/13/15 Central Region Communications Conference (CRCC) Summary 12 Partner Nations Invited 2 Recurring U.S. Central Command (USCENTCOM)-led

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA)

SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA) DRAFT Hosted by: TENTATIVE PROGRAMME SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA) Bucharest, Romania 7 to 9 May 2018 as of 19 March 2018 OPENING SESSION Welcome remarks

More information

Homeland Security Graduate Programs

Homeland Security Graduate Programs Homeland Security Graduate Programs TA B L E O F C O N T E N T S Online Homeland Security Graduate Programs 3 Cyber Threat Analytics and Prevention 10 Homeland Security Base Program 4 5 Information Security

More information

Cyber Secure Pakistan Report

Cyber Secure Pakistan Report Cyber Secure Pakistan Project by Pakistan Information Security Association (PISA) Cyber Secure Pakistan Report We Thank You! World around us is changing fast we need to align accordingly. Traditional ways

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Mobile Money Takes Centrestage at UWI s Fourth National Cyber Security Conference

Mobile Money Takes Centrestage at UWI s Fourth National Cyber Security Conference MONA ICT POLICY CENTRE (MICT) Caribbean Institute of Media and Communication The University of the West Indies 3 Sherlock Drive, Mona Campus, Kingston 7 Jamaica, W.I. Tel. (876) 927-1481, 977-2111, 977-0898,

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

WELCOME TO THE. WSIS Forum 2012: Final Briefing 16th April 2012 Geneva, Switzerland.

WELCOME TO THE. WSIS Forum 2012: Final Briefing   16th April 2012 Geneva, Switzerland. WELCOME TO THE WSIS Forum 2012: Final Briefing /forum 16th April 2012 Geneva, Switzerland WSIS FORUM 2012 14-18 May 2012, Geneva Unique global platform to discuss, coordinate and facilitate implementation

More information

3 4 OCTOBER 2013 MOSCOW, RUSSIA

3 4 OCTOBER 2013 MOSCOW, RUSSIA 3 4 OCTOBER 2013 MOSCOW, RUSSIA Created and developed by: Supported by: WWW.PMR-CONF.RU #1 in Russia for PMR professionals * * by number of PMR end user attendees The Forum has become a traditional event

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015 A MALTA COMMONWEALTH THIRD COUNTRY TRAINING PROGRAMME Programme Legal Instruments for the Internet Economy Building Capacity and Implementing Regulation Malta, 14 th to 19 th September, 2015 www.diplomacy.edu/courses/legalinstruments2015

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

ITU Telecom World 2017 Smart ABC

ITU Telecom World 2017 Smart ABC ITU Telecom World 2017 Smart ABC Artificial Intelligence Banking Cities Organized by ITU-T 1 Smart ITU Smart is the future: in all industry sectors, in all societies, in the way we live, work and do business.

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

2013 HONEYNET PROJECT WORKSHOP SPONSORSHIP OPPORTUNITIES

2013 HONEYNET PROJECT WORKSHOP SPONSORSHIP OPPORTUNITIES 2013 HONEYNET PROJECT WORKSHOP SPONSORSHIP OPPORTUNITIES 10-12 FEBRUARY 2013 DUBAI The Honeynet Project is a diverse, talented, and engaged group of international computer security experts who conduct

More information

DHS Election Task Force Updates. Geoff Hale, Elections Task Force

DHS Election Task Force Updates. Geoff Hale, Elections Task Force 1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve

More information

2 nd Annual Meeting for Abacus North America Members

2 nd Annual Meeting for Abacus North America Members 2 nd Annual Meeting for Abacus North America Members April 30 May 1, 2019 The Ritz-Carlton Atlanta Atlanta, Georgia USA The Meeting Abacus Worldwide brings firms together on a global scale but our Regional

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

K-12 CYBERSECURITY EDUCATION CONFERENCE

K-12 CYBERSECURITY EDUCATION CONFERENCE NICE K-12 CYBERSECURITY EDUCATION CONFERENCE OMNI NASHVILLE HOTEL - NASHVILLE, TN DECEMBER 4 & 5, 2017 HOSTED BY 2017 SPONSORSHIP PROSPECTUS K-12 CONFERENCE 2017 SPONSORSHIP PROSPECTUS Why be a sponsor

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information

Illini Union Online Space Request Form Tutorial

Illini Union Online Space Request Form Tutorial Illini Union Online Space Request Form Tutorial A few things to help you along your way This tutorial will serve as your go-to resource for navigating the Online Space Request Form. Please go through this

More information

SAFER DIGITAL BRITAIN

SAFER DIGITAL BRITAIN SAFER DIGITAL BRITAIN The Government s Cyber Security Event 10 12 April 2018 Manchester Central Convention Complex EXHIBITION & SPONSORSHIP OPPORTUNITIES 1 ,..,:::::;;;;,:.,.:,:,,:.. :::::,,.,:...,,,,..,,:,:::;;;',::;;'''';+

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017

CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF # ) April 26, 2017 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP) WORKSHOP AND SHOWCASE (NSF #1650445) April 26, 2017 1 CINC UP: CYBERSECURITY RESEARCH ACCELERATION TRANSITION TO PRACTICE (TTP)

More information

The International Symposium on Wearable Robotics (WeRob2019)

The International Symposium on Wearable Robotics (WeRob2019) Re: The International Symposium on Wearable Robotics (WeRob2019) Location: Biosciences Research Collaborative, RICE 6100 Main St., Houston, TX 77005-1892, USA Dear Colleague, We are pleased to announce

More information

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse

More information

Federal Information Sharing Resources for Small and Midsize Businesses

Federal Information Sharing Resources for Small and Midsize Businesses Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017

More information

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION

IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION Briefing for OFPP Working Group 19 Feb 2015 Emile Monette GSA Office of Governmentwide Policy emile.monette@gsa.gov Cybersecurity Threats are

More information

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection L. Laile Di Silvestro Senior Strategist Worldwide Public Sector Microsoft Government Industry Collaboration

More information

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

CYXTERACON Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA

CYXTERACON Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA 2019 Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA ACON Infrastructure Cybersecurity Channel Partners CyxteraCon provides a unique opportunity for our users, partners and customers to network while meeting

More information

International Cybersecurity and Intelligence Conference 2018

International Cybersecurity and Intelligence Conference 2018 International Cybersecurity and Intelligence Conference 2018 SPONSORSHIP PACKAGE icsic.ocmtontario.ca What is ICSIC? The 2017 International Cyber Security and Intelligence Conference (ICSIC) provides a

More information

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity Why is the NIST framework important? GOH Seow Hiong Executive Director, Global Policy & Government Affairs, Asia Pacific

More information

CONNECT ARAB STATES SUMMIT

CONNECT ARAB STATES SUMMIT CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with

More information

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management Joe Jarzombek, PMP, CSSLP Director for Software & Supply

More information

The President s National Security Telecommunications. AGENCY: National Protection and Programs Directorate,

The President s National Security Telecommunications. AGENCY: National Protection and Programs Directorate, This document is scheduled to be published in the Federal Register on 05/01/2018 and available online at https://federalregister.gov/d/2018-09234, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University

Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University Meeting the Cyber Security Workforce Demand By Drew Hamilton Mississippi State University Twenty years ago it was reasonable to think that the demand for computer security would crest as technological

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

HIMSS18 Exhibition Opportunities

HIMSS18 Exhibition Opportunities HIMSS18 Exhibition Opportunities HIMSS18 Exhibit Opportunities Thank You for Joining! You have been muted when you joined this call If you have any questions throughout the presentation, please type them

More information