Lessons Learned from Implementing Large-Scale Biometrics Identity Programs

Size: px
Start display at page:

Download "Lessons Learned from Implementing Large-Scale Biometrics Identity Programs"

Transcription

1 Lessons Learned from Implementing Large-Scale Biometrics Identity Programs CTST 2008 May 13, 2008 Copyright 2008 International Biometric Group

2 International Biometric Group Leading biometric research and testing, consulting and integration firm since 1996 Over 250 biometrics engagements conducted Combine technical and business expertise Technology-neutral, vendor-independent experts 90% employees have secret/top secret clearances Lower Manhattan Headquarters with Demonstration Facility Geographic Diversity: Washington, DC; London; San Francisco Copyright 2008 International Biometric Group Page 2

3 Representative IBG Clients Technology & Transportation Government Agencies Financial Services American Airlines AAMVA AIG Diebold California DMV Charles Schwab EDS White House OSTP Chase Manhattan Bank Ingersoll-Rand Department of Homeland Security Citibank Intel Ontario, Canada MBS Dresdner Bank JFK Airport National Institute of Justice Fidelity Investments Lockheed Martin NYPD FSTC Microsoft Transport Canada Visa Raytheon U.S. Navy/SPAWAR World Bank Honeywell EU Commission Capital One Marconi Comm. European Biometric Forum MasterCard Siemens HKSAR Booz Allen Hamilton Copyright 2008 International Biometric Group Page 3

4 World of Biometrics Copyright 2008 International Biometric Group Page 4

5 Lessons from Large-Scale Integration Projects Copyright 2008 International Biometric Group Page 5

6 Lesson 1 Security Planning Involve security early in project planning stages Develop relationships with key decision makers Provide enough time for security gates and approvals Discover requirements early auditing, data retention, access control, network characteristics Copyright 2008 International Biometric Group Page 6

7 Lesson 2 Performance Requirements Push end customer for processing and response time requirements need to be as accurate as possible Dramatically affects sizing as system capacity increases Agree on definitions and importance of performance result metrics FMR, FNMR, FTE, FTA, etc. Initial deployment, bulk ingestion, duplicate checking, steady state processing, peak and average loads Copyright 2008 International Biometric Group Page 7

8 Lesson 3 Cost Estimation Hardware: acquisition devices (if needed), matching servers, redundant storage, database replication, disaster recovery, anticipated scalability Software: front end and administrative tools, custom auditing/reporting functionality, queuing systems, transaction managers, licensing Central and distributed system maintenance Performance requirements (e.g. response time) Testing and piloting requirements Training: initial and ongoing Copyright 2008 International Biometric Group Page 8

9 Lesson 4 End User Interaction How much information do End Users have access to? want? need? understand? Handling of error cases troubleshooting capability, expert analysis availability Are users or analysts able or required to collaborate? In the end what matters is actionable results for decisions Copyright 2008 International Biometric Group Page 9

10 Lesson 5 Black Box Matchers Matchers are optimized to work as designed violating that will only decrease performance Concentrate on input/output optimize other parts of the system to work with matchers How much development/integration is required? Work with vendors to understand all configurable parameter options, especially enrollment quality and matching thresholds Develop strategy to throttle and load balance across multiple modalities and algorithms where applicable Copyright 2008 International Biometric Group Page 10

11 Lesson 6 Virtualization Some matchers react badly to virtualization, making a single physical resource function as multiple virtual resources Inquire with vendor during initial research and information sessions Option 1: Work within matchers constraints Option 2: Test out creative ideas with pilots or research projects in early stages Some customers require virtualized servers in data centers Copyright 2008 International Biometric Group Page 11

12 Lesson 7 Binning and Filtering Binning: pre-sorting a biometric database based on categories of biometric characteristics Filtering: classifying biometric data based on metadata (i.e. gender, age, height, weight) Improves performance if implemented correctly Requires customized, intelligent central processing engine COTS middleware often difficult to use in conjunction with these rules Complicates match threshold management need different thresholds for different types of targeted search requests Copyright 2008 International Biometric Group Page 12

13 Lesson 8 Quality Assessment and Enhancement Requires detailed logical workflows Coordination with matcher processes Quality thresholds require study to identify and tune over time for system optimization Increases storage requirement to accommodate processed images Only highly trained users should have access to manual QA or enhancement tools depending on the modality Copyright 2008 International Biometric Group Page 13

14 Questions Thank You Peter VanBuskirk International Biometric Group One Battery Park Plaza, 29 th Floor New York, NY Copyright 2008 International Biometric Group Page 14

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

Greater Toronto Area

Greater Toronto Area Greater Toronto Area Transit Fare System Smart Card Alliance Transportation Council Salt Lake City, March 2007 David McIlwraith Ontario Topics GTA Fare System Overview Project Preparation Current Status

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

European Code of Conduct on Data Centre Energy Efficiency

European Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JOINT RESEARCH CENTRE Institute for Energy and Transport Renewable Energy Unit European Code of Conduct on Data Centre Energy Efficiency Introductory guide for applicants

More information

Airport Consultants Council

Airport Consultants Council Airport Consultants Council Jose Bonilla Innovation Task Force: Future of Security Airport Consultants Council July 20, 2016 Innovating the Future of Aviation Security Cybersecurity Cybersecurity Requirements;

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer

Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer 2007 SoundBite Communications, Inc. All Rights Reserved. Agenda Scalability Capacity

More information

Biometric Standards for DoD Operational Requirements

Biometric Standards for DoD Operational Requirements Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric

More information

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of

More information

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients...

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients... Resilience Resilience is the ability of a community to maintain its functions in the face of dramatically changed circumstances, including climate change, natural disasters, and aging infrastructure. Recent

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Core Services for ediscovery Perfection

Core Services for ediscovery Perfection BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist

More information

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS)

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS) APPENDI 2 ommendation () () 1. The City Manager in consultation with the Chief Information Officer give consideration to the establishment of an IBMS governance model which provides for senior management

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Dream Catchers, Inc. Profile

Dream Catchers, Inc. Profile Dream Catchers, Inc. Profile Executive Summary Dream Catchers is a U.S. Corporation providing ITIL Certification training and consulting services, ITIL Books and related Publications, and Workshops to

More information

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos

More information

How Cisco IT Deployed Enterprise Messaging on Cisco UCS

How Cisco IT Deployed Enterprise Messaging on Cisco UCS Cisco IT Case Study July 2012 Enterprise Messaging on Cisco UCS How Cisco IT Deployed Enterprise Messaging on Cisco UCS Messaging platform upgrade and new servers reduce costs and improve management, availability,

More information

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant Our Contact Details IT-SCAN GMBH c/o: DOCK3 Hafenstrasse 25-27 68159 Mannheim E: info@it-scan.de W: www.it-scan.de Nationalität Berufserfahrung C U R R I C U L U M V I T A E Diplom-Betriebswirt (FH) Peter

More information

Your single source for a safe, secure, and sustainable airport

Your single source for a safe, secure, and sustainable airport Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every

More information

Performance Measurement, Data and Decision Making: A Matter of Alignment. Mark F. Muriello Assistant Director Tunnels, Bridges & Terminals

Performance Measurement, Data and Decision Making: A Matter of Alignment. Mark F. Muriello Assistant Director Tunnels, Bridges & Terminals Performance Measurement, Data and Decision Making: A Matter of Mark F. Muriello Assistant Director Tunnels, Bridges & Terminals The Port Authority of NY & NJ: Delivering Vital Connections Tunnels and Bridges

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline Resiliency Model A Holistic Approach to Risk Management Discussion Outline Defining the Challenges and Solutions The Underlying Concepts of Our Approach Outlining the Resiliency Model (RM) Next Steps The

More information

Smart Systems, Resilient Regions

Smart Systems, Resilient Regions Smart Systems, Resilient Regions Tuesday, May 20, 2014 #smartsystems Wi-Fi: MPC Guest Password: mpcwireless metroplanning.org @metroplanners Siemens Building Technologies Division MATTHIAS REBELLIUS metroplanning.org

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE)

COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE) COMPLIANCE BRIEF: VARONIS AND THE US SECURITY AND EXCHANGE COMMISSION S OFFICE OF COMPLIANCE INSPECTIONS AND EXAMINATIONS (SEC OCIE) OVERVIEW The SEC s Office of Compliance Inspections and Examinations

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Progress Report National Information Assurance Partnership

Progress Report National Information Assurance Partnership Progress Report 2012-2015 National Information Assurance Partnership Executive Summary The National Information Assurance Partnership (NIAP) has made significant progress in three primary mission areas:

More information

Competency Definition

Competency Definition Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended

Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended Chapter 3 Section 3.05 Metrolinx Regional Transportation Planning Standing Committee on Public Accounts Follow-Up on Section 4.08, 2014 Annual Report In November 2015, the Standing Committee on Public

More information

Cyber Risks, Coverage, and the Board of Directors.

Cyber Risks, Coverage, and the Board of Directors. Cyber Risks, Coverage, and the Board of Directors PCI Northeastern General Counsel Seminar September 19-20, 2016 Vincent J. Vitkowsky Seiger Gfeller Laurie LLP vvitkowsky@sgllawgroup.com CYBER RISKS and

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Memorandum APPENDIX 2. April 3, Audit Committee

Memorandum APPENDIX 2. April 3, Audit Committee APPENDI 2 Information & Technology Dave Wallace, Chief Information Officer Metro Hall 55 John Street 15th Floor Toronto, Ontario M5V 3C6 Memorandum Tel: 416 392-8421 Fax: 416 696-4244 dwwallace@toronto.ca

More information

Design Build Services - Service Description-v7

Design Build Services - Service Description-v7 Design Build Services - Service Description Hyper-scale clouds, such as Microsoft s Azure platform, allow organizations to take advantage of flexible, cost-effective cloud solutions that have the power

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

NYC Facilities Explorer Interactive Planning Tool. Session will begin at 1:00pm

NYC Facilities Explorer Interactive Planning Tool. Session will begin at 1:00pm NYC Innovation & Emerging Technologies Workgroup Presents: Culture of Innovation in NYC Government Series NYC Facilities Explorer Interactive Planning Tool Hannah Kates, Product Manager, NYC Department

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September

More information

RFP Questions Guideline For Data Center Buyers

RFP Questions Guideline For Data Center Buyers RFP Questions Guideline For Data Center Buyers Rev: 00W0052015 1 P a g e This guideline document is a supporting download for our webinar titled 5 RFP Questions Data Center Buyers Must Ask a Provider and

More information

Executive Summary and Overview

Executive Summary and Overview A Cross-Sector Capabilities, Resources, and Needs Assessment: Research to Support the Drafting of the Oregon Cybersecurity Center of Excellence Proposal Executive Summary and Overview Updated April 2018

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY

More information

The Promise of Biometric Technologies. The Promise of Biometric Technologies. Kush Wadhwa, Director EMEA. International Biometric Group.

The Promise of Biometric Technologies. The Promise of Biometric Technologies. Kush Wadhwa, Director EMEA. International Biometric Group. The Promise of Biometric Technologies The Promise of Biometric Technologies Kush Wadhwa, Director EMEA International Biometric Group kwadhwa@biometricgroup.com 27 March 2004 BioAsia Biometrics in Security

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Shared Web Services: The New Frontier in Government

Shared Web Services: The New Frontier in Government Shared Web Services: The New Frontier in Government TASSCC Technology Education Conference Austin, Texas March 26, 2009 Bill Chambers VP, Government Consulting Services Objectives The primary objective

More information

Convergence of BCM and Information Security at Direct Energy

Convergence of BCM and Information Security at Direct Energy Convergence of BCM and Information Security at Direct Energy Karen Kemp Direct Energy Session ID: GRC-403 Session Classification: Advanced About Direct Energy Direct Energy was acquired by Centrica Plc

More information

On the Radar: Kenna Security protects enterprises against data breaches

On the Radar: Kenna Security protects enterprises against data breaches On the Radar: Kenna Security protects enterprises against data breaches Kenna offers continuous analysis of vulnerabilities and prioritizes remediation activities Publication Date: 27 Mar 2018 Product

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

Air Entry/Exit Re-engineering (AEER)

Air Entry/Exit Re-engineering (AEER) Air Entry/Exit Re-engineering (AEER) Homeland Security Science & Technology Advisory Committee (HSSTAC) April 8, 2014 Bob Burns Director, Apex AEER Project Homeland Security Advanced Research Projects

More information

EU Code of Conduct on Data Centre Energy Efficiency

EU Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all

More information

Managing the Collective Collection: library print collections in the networked environment Constance Malpas Program Officer RLG Programs

Managing the Collective Collection: library print collections in the networked environment Constance Malpas Program Officer RLG Programs Managing the Collective Collection: library print collections in the networked environment Constance Malpas Program Officer ARL RLLF @ OCLC Dublin, OH 1 November 2007 Moving into the cloud the next wave

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate

More information

Cyber 360: The Business Law Update

Cyber 360: The Business Law Update NEW YORK STATE BAR ASSOCIATION Cyber 360: The Business Law Update A review of recent cybersecurity developments from a diverse set of legal perspectives in the world of business and finance. Business Law

More information

PUBLIC UTILITIES COMMISSION:

PUBLIC UTILITIES COMMISSION: PUBLIC UTILITIES COMMISSION: Water Infrastructure Partners Overhead Reviews FINANCIAL AUDITS DIVISION May 17, 2006 05060 CITY AND COUNTY OF SAN FRANCISCO OFFICE OF THE CONTROLLER Ed Harrington Controller

More information

National Biometric Security Project

National Biometric Security Project National Biometric Security Project Activity Update: 2003-2005 Biometric Consortium Conference 2005 National Biometric Security Project Mission Assist government and private sector organizations deter

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Security Management Occupations

Security Management Occupations Security Management Occupations Labor Market Analysis: San Diego County MARCH 2019 Summary To determine labor market demand for occupations that could be trained by a Security Management program, this

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

DATABASE ADMINISTRATOR

DATABASE ADMINISTRATOR DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is

More information

SPONSOR FOCUS 09. October 6-9, 2009 The Venetian and The Palazzo Congress Center Las Vegas (password: gondola)

SPONSOR FOCUS 09. October 6-9, 2009 The Venetian and The Palazzo Congress Center Las Vegas  (password: gondola) SPONSOR FOCUS 09 October 6-9, 2009 The Venetian and The Palazzo Congress Center Las Vegas www.mcafee.com/focus09; (password: gondola) FOCUS 09 Attendee Profile FOCUS is expected to attract 1,000+ security

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

System Overview. Security

System Overview. Security ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo

More information

Beyond Preclearance: The Next Generation U.S.-Canada Border

Beyond Preclearance: The Next Generation U.S.-Canada Border Beyond Preclearance: The Next Generation U.S.-Canada Border Gerry Bruno Vice President, Federal Government Affairs, Vancouver Airport Authority & Co-Chair, Beyond Preclearance Coalition Solomon Wong President

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

CenturyLink Data Center Services Herndon, Virginia

CenturyLink Data Center Services Herndon, Virginia CenturyLink Data Center Services Herndon, Virginia DATA CENTER SOLUTIONS TO SUPPORT GLOBAL ENTERPRISE IT The IT environment is rapidly changing. Organizations are expanding their IT infrastructure to accommodate

More information

DigitalPersona Altus. Solution Guide

DigitalPersona Altus. Solution Guide DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona

More information

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity. Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,

More information

Testimony of Donald D. Kittell Executive Vice President Securities Industry Association

Testimony of Donald D. Kittell Executive Vice President Securities Industry Association Testimony of Donald D. Kittell Executive Vice President Securities Industry Association "Government and Industry Efforts to Protect Our Money During Blackouts, Hurricanes and Other Disasters" Opening Remarks

More information

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 Grid Security & NERC Council of State Governments The Future of American Electricity Policy Academy Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 1965 Northeast blackout

More information

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

CONSIDERATIONS BEFORE MOVING TO THE CLOUD CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

Custom hosting solutions orchastrated for your needs.

Custom hosting solutions orchastrated for your needs. Custom hosting solutions orchastrated for your needs. Cloud Hosting IaaS Colocation DRaaS & Backup Hosting AWS Monitoring PaaS/CaaS (for Developers) Why Customers Choose Us Whether you re just starting

More information

Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart

Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart Programme: ICT Services Location: Hobart based with travel throughout Tasmania Reports To: ICT Manager

More information

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS Geoff Duncan, Senior Solutions Architect, Digital Fortress Brandon Tanner, Senior Manager, Rentsys Recovery

More information

Network Diversity and Survivability:

Network Diversity and Survivability: Network Diversity and Survivability: Five ways to evolve to true diversity WHITE PAPER An Independent Analysis Published on Behalf of Spectrum Enterprise TABLE OF CONTENTS Executive Summary... 2 Different

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Bay Area Regional Bicycle Share Pilot Project. Karen Schkolnick, BAAQMD SPUR Evening Forum: Bike Sharing Around the Bay June 25, 2013

Bay Area Regional Bicycle Share Pilot Project. Karen Schkolnick, BAAQMD SPUR Evening Forum: Bike Sharing Around the Bay June 25, 2013 Bay Area Regional Bicycle Share Pilot Project Karen Schkolnick, BAAQMD SPUR Evening Forum: Bike Sharing Around the Bay June 25, 2013 1 Overview Pilot Project Background and Goals Roadmap, Regional Process

More information

AFC Compliance Careers

AFC Compliance Careers AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation

More information

5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C

5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C WHITE PAR 5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C 1 WHITE PAR from Legacy Voice to VoIP and UC&C Voice communications are undergoing a profound shift, with many organizations

More information

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,

More information

Comparative Biometric Testing Official Test Plan

Comparative Biometric Testing Official Test Plan Comparative Biometric Testing Official Test Plan Version 2.1 Copyright 2002 International Biometric Group One Battery Park Plaza New York, NY 10004 212-809-9491 part of the Test Plan may be copied or reproduced

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

Challenges and Opportunities in Cyber Physical System Research

Challenges and Opportunities in Cyber Physical System Research Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy

More information

IT your way - Hybrid IT FAQs

IT your way - Hybrid IT FAQs Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification

Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification AAMVA UID9 Biometric Identification Report Phase I: Technical Capability of Biometric Systems to Perform 1:300m Identification Final Report Copyright 2003 International Biometric Group Version Description

More information

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

IPMA State of Washington. Disaster Recovery in. State and Local. Governments IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

Cisco MDS 9000 Port Analyzer Adapter, Enhanced: New version improves performance monitoring

Cisco MDS 9000 Port Analyzer Adapter, Enhanced: New version improves performance monitoring Hardware Announcement April 27, 2004 Cisco MDS 9000 Port Analyzer Adapter, Enhanced: New version improves performance monitoring Overview The Cisco MDS 9000 family is designed to offer investment protection,

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016

CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 TO: FROM: SUBJECT: CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 KELLY SCHERR, P.ENG., MBA, FEC MANAGING DIRECTOR ENVIRONMENTAL & ENGINEERING SERVICES AND CITY ENGINEER SHIFT RAPID

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market

More information