Tech Spec. Hot Topics Packages

Size: px
Start display at page:

Download "Tech Spec. Hot Topics Packages"

Transcription

1 Hot Topics Packages Product Code Number (PCNs): HFEN1, CYBCC The Hot Topics portfolio is a group of issue-based packages containing Knowledge Collections and Standards. Each package focuses on current, trending issues that cross industries and provides a correlated solutions from across industries. Package Topics The first two packages are: Human Factors This package will help customers leverage regulated and industry best practices for incorporating human use considerations into product designs. Primary industries: Medical Device, Aerospace, Defense, Automotive, Technology, Manufacturing. Cybersecurity This topic is most commonly associated with data and identity theft issues. Our cybersecurity package will focus on how cybersecurity needs to be designed into the products themselves. Primary Industries: Medical Device, Aerospace, Defense, Automotive, Electronics/Telecom (Technology), Critical Manufacturing. Topics Covered in Human Factors Include: Introduction to Humans in Engineered Systems Managing Risk: The Human Element Human Factors in Systems Engineering Human Factors Methods for Improving Performance in the Process Industries The Measure of Man and Woman: Human Factors in Design Revised Edition Computer Access for People with Disabilities: A Human Factors Approach Topics Covered in Cybersecurity Include: Cybersecurity for Cyber-Physical Vehicle Systems Interconnecting Distributed Resources with Electric Power Systems Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities Medical device software - software life cycle processes define the medical device software lifecycle requirements. Cybersecurity for medical imaging Disaster/Emergency Management and Business Continuity Programs Telecommunications Physical Network Security Standard 2017 IHS Markit 1

2 Documents in Human Factors Knowledge Collections Title Handbook of Human Factors and Ergonomics 3rd Edition Complete Document Handbook of Human Systems Integration Complete Document Introduction to Humans in Engineered Systems Managing Risk: The Human Element Human Factors in Systems Engineering Human Factors Methods for Improving Performance in the Process Industries The Measure of Man and Woman: Human Factors in Design Revised Edition Computer Access for People with Disabilities: A Human Factors Approach Designing Telehealth for an Aging Population: A Human Factors Perspective Human Factors for Engineers People in Control: Human factors in control room design Security - The Human Factor Guidelines for Preventing Human Error in Process Safety Human Performance and Limitations in Aviation Publisher TF TF IET IET IET Standards AAMI/ANSI HE75 AAMI TIR51 AAMI TIR55 AAMI TIR61 ANSI/AAMI/ISO ASTM E2350 FAA FAA-HF-STD-001 FAA HFDG FDA Guidance Document UCM FDA UCM (Proposed) ANSI/HFES IHS Markit 2

3 ANSI/HFES 200 HFES 300 IEC 62366:2007 IEEE 1023 ISO ISO /TR ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO IHS Markit 3

4 ISO ISO ISO ISO ISO ISO ISO ISO ISO 1503 ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO 6385 ISO 7243 ISO ISO IHS Markit 4

5 ISO 7730 ISO 7731 ISO 7933 ISO 8996 ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO IHS Markit 5

6 ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO ISO 9886 ISO 9920 ISO 9921 ISO/IEC TR ISO/PAS ISO/TR ISO/TR ISO/TR ISO/TS ISO/TS SAE ARD50079 SAE ARD50083 SAE ARP6467 SAE AIR5995 SAE J IHS Markit 6

7 Documents in Cybersecurity Knowledge Collections Title Information Security Breaches - Avoidance and Treatment based on ISO27001 Information Security Law - The Emerging Standard for Corporate Compliance Information Security Risk Management for ISO27001/ISO27002 Securing Cloud Services - A pragmatic approach to security architecture in the Cloud The Insider Threat - Combatting the Enemy Within The True Cost of Information Security Breaches and Cyber Crime Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Agile IT Security Implementation Methodology BackTrack Testing Wireless Network Security BackTrack 4: Assuring Security by Penetration Testing Enterprise Security: A Data-Centric Approach to Securing the Enterprise Node Security Supervision and Safety of Complex Systems Transportation Infrastructure Security Utilizing Intelligent Transportation Systems Publisher Standards AAMI TIR AIA NAS9924 AMMI/ISO 14971:2007 ANS 10.7 ASCE 56-10/57-10 AWWA G IHS Markit 7

8 AWWA G440 DOD ETSI TR ETSI TR IEC 62304:2006 IEC IEC/ISO IEC/TR :2014 IEEE 1402 IEEE IEEE IEEE IEEE IEEE 1547 IEEE 1686 IEEE 1711 IEEE SA IEEE SA C ISA/IEC62443 ISO ISO/DTR (draft) ISO/IEC ISO/IEC 27032:2012 ISO/IEC ISO/TR :2009 ITU-T X.1208 ITU-T X.1500 ITU-T X.1582 MODUK Def Stan IHS Markit 8

9 NEMA MITA C SP 1 NFPA 1600 SAE J3061 SAE/TP SEPT FDA OTS SW STANDARD CK/L TIA 5017 TIA/EIA A For More Information about IHS: Americas 15 Inverness Way East Englewood, CO USA Tel: CustomerCare@ihs.com Europe, Middle East, and Africa Viewpoint One Willoughby Road Bracknell, Berkshire, UK RG12 8FB Tel: +44 (0) Customer.Support@ihs.com Asia Pacific Region 8 Marina View, Asia Square Tower 1 #12-01 Singapore International SupportAPAC@ihs.com Feb IHS Markit 9

WIRELESS POWER IN 2016: SIZING THE MARKET AND SEIZING THE OPPORTUNITY WPC MEETING TAIPEI

WIRELESS POWER IN 2016: SIZING THE MARKET AND SEIZING THE OPPORTUNITY WPC MEETING TAIPEI Information IHS TECHNOLOGY Analytics Expertise 16 JUNE 2016 WIRELESS POWER IN 2016: SIZING THE MARKET AND SEIZING THE OPPORTUNITY WPC MEETING TAIPEI David Green, Research Manager +44 1933 40 8057 David.Green@ihs.com

More information

V3.0 Networked Lighting Controls Technical Requirement Release. June 21, 2018

V3.0 Networked Lighting Controls Technical Requirement Release. June 21, 2018 V3.0 Networked Lighting Controls Technical Requirement Release June 21, 2018 Agenda 1. Introduction 2. Energy Monitoring 3. New Documentation Requirements 4. Product Families 5. DC/PoE 6. Cybersecurity

More information

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1 Addressing Future Challenges in the Development of Safe and Secure Software Components 2016 The MathWorks, Inc. 1 Cybersecurity Emerging Topic in the Auto Industry Vehicle-to-Infrastructure Wifi Hotspot

More information

Taking Back Control of Your Network With SD-LAN

Taking Back Control of Your Network With SD-LAN IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright

More information

Smart Grid Standards and Certification

Smart Grid Standards and Certification Smart Grid Standards and Certification June 27, 2012 Annabelle Lee Technical Executive Cyber Security alee@epri.com Current Environment 2 Current Grid Environment Legacy SCADA systems Limited cyber security

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

ISO/IEC ISO/IEC

ISO/IEC ISO/IEC ISO/IEC 27000 2010 6 3 1. ISO/IEC 27000 ISO/IEC 27000 ISMS ISO IEC ISO/IEC JTC1 SC 27 ISO/IEC 27001 ISO/IEC 27000 ISO/IEC 27001 ISMS requirements ISO/IEC 27000 ISMS overview and vocabulary ISO/IEC 27002

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

National Cyber Security Strategy (NCS) Toolkit

National Cyber Security Strategy (NCS) Toolkit National Cyber Security Strategy (NCS) Toolkit Let s create a toolkit to help states to develop or improve their national cyber security strategies Examples of Topics To Be Addressed The role, objectives

More information

International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management. Frequently Asked Questions

International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management. Frequently Asked Questions November 2002 International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management Introduction Frequently Asked Questions The National Institute of Standards and Technology s

More information

Cyber Security for Process Control Systems ABB's view

Cyber Security for Process Control Systems ABB's view Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control

More information

PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS

PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS Information Analytics Expertise IHS TECHNOLOGY CONSULTING & ADVISORY SERVICES PHYSICAL SECURITY IN FINANCIAL SERVICES CURRENT TRENDS AND FUTURE THREATS Oliver Philippou Senior Analyst Oliver.philippou@ihs.com

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework Keith Price Principal Consultant 1 About About me - Specialise in cybersecurity strategy, architecture, and assessment -

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

HUMAN CENTERED DESIGN

HUMAN CENTERED DESIGN HUMAN CENTERED DESIGN Ed Israelski PhD CHFP, Convener of Usability and Ergonomics Working Groups IEC/ISO Retired Director Human Factors, AbbVie Past Co-Chair HFE Committee, AAMI HFE Consultant Roundtable

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits February 2018 Copyright

More information

Internet of Things Security standards

Internet of Things Security standards Internet of Things Security standards Vangelis Gazis (vangelis.gazis@huawei.com) Chief Architect Security Internet of Things (IoT) Security Solution Planning & Architecture Design (SPD) Security standards

More information

THE FUTURE OF MANUFACTURING

THE FUTURE OF MANUFACTURING Information IHS TECHNOLOGY Analytics Expertise OCTOBER 2014 THE FUTURE OF MANUFACTURING WHERE ARE WE AND WHERE ARE WE GOING? Mark Watson, Associate Director Industrial Automation +44 (0) 1933 402255 mark.watson@ihs.com

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

ISO in the world today

ISO in the world today ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

Applying Human Factors to Medical Device Design

Applying Human Factors to Medical Device Design Applying Human Factors to Medical Device Design Standards and Guidelines MEDEC 2016 Tim Reeves, PhD CHFP About Tim Reeves Founder and Managing Director of Human Factors MD Inc. Ten- person human factors

More information

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

IEEE Standards Activities in the Smart Grid Space (ICT Focus) This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the

More information

LANmark-6 10G LANmark-6 A

LANmark-6 10G LANmark-6 A Field-testing procedure of LANmark-6 10G LANmark-6 A Cabling System Technical Paper Nexans Cabling Solutions March 2006 - Revision 1.1 Table of Contents 1 Introduction 3 2 How to proceed? 4 2.1 Introduction

More information

IEC/SC45A. Instrumentation, control and electrical systems for nuclear facilities. Jean-Paul BOUARD IEC/SC45A Secretary

IEC/SC45A. Instrumentation, control and electrical systems for nuclear facilities. Jean-Paul BOUARD IEC/SC45A Secretary IEC/SC45A Instrumentation, control and electrical systems for nuclear facilities Jean-Paul BOUARD IEC/SC45A Secretary 1/9 Who are we (1/2) 2 One of the oldest international standard body (1906) : 81 countries

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Solutions for Rising Video Surveillance Storage Demands

Solutions for Rising Video Surveillance Storage Demands IHS TECHNOLOGY FEBRUARY 2016 Solutions for Rising Video Surveillance Storage Demands Josh Woodhouse, Senior Analyst, Video Surveillance TABLE OF CONTENTS The Video Surveillance Market... 2 Options and

More information

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions. Jane s Military & Security Assessments Intelligence Centre Understand Threats. Assess Capabilities. Challenge Assumptions. OVERVIEW Comprehensive open-source data and independent expert analysis Jane s

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

International Software & Systems Engineering Standards

International Software & Systems Engineering Standards This presentation represents the opinion of the author and does not present positions of The MITRE Corporation or of the U.S. Department of Defense. Jim Moore The MITRE Corporation Chair, US TAG to ISO/IEC

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

Cyber Security. June 2015

Cyber Security. June 2015 Cyber Security June 2015 Table of contents Section Pages Introduction and methodology 3 Key findings 4 Respondent profile 5-9 Cyber security practices 10-25 Resources for monitoring cyber security events

More information

April 28, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, MD 20852

April 28, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, MD 20852 701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers

More information

Role of I&C Conceptual Design in NPP Licensing

Role of I&C Conceptual Design in NPP Licensing Role of I&C Conceptual Design in NPP Licensing RASU Deputy Design Division Director, Head of Subdivision Galivets Eugeniy Moscow October, 2016 Abstract Currently, modern NPP construction projects face

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Field-testing procedure of. LANmark-6 10G. Cabling System. Technical Paper Nexans Cabling Solutions June Revision 1.4

Field-testing procedure of. LANmark-6 10G. Cabling System. Technical Paper Nexans Cabling Solutions June Revision 1.4 Field-testing procedure of LANmark-6 10G Cabling System Technical Paper Nexans Cabling Solutions June 2007 - Revision 1.4 Table of Contents 1 Introduction 3 2 How to proceed? 4 2.1 Introduction 4 2.2 Permanent

More information

Click ISO to edit Master title style Update on development of the standard

Click ISO to edit Master title style Update on development of the standard Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?

More information

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Security in Power System Automation Status and Application of IEC 62351 Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Operator Integrator Vendor IEC 62351-10 Power Systems Security Architecture

More information

ICS Security Innovation Asia Pacific ICS Security Summit. Singapore 2013

ICS Security Innovation Asia Pacific ICS Security Summit. Singapore 2013 ICS Security Innovation Asia Pacific ICS Security Summit Singapore 2013 Connected Enterprise Global automation landscape Connecting expertise Providing decision ready intelligence Data availability Two-way

More information

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber

More information

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information

Consumer Survey Apps in the Car UK, US, DE, CN A survey of 4000 consumers from the UK, the US, Germany, and China

Consumer Survey Apps in the Car UK, US, DE, CN A survey of 4000 consumers from the UK, the US, Germany, and China IHS AUTOMOTIVE Annual Report Automotive Technology Consumer Survey Apps in the Car UK, US, DE, CN A survey of 4000 consumers from the UK, the US, Germany, and China 6 March 2015 ihs.com Colin Bird, Senior

More information

Education & Training. B. 3. Education & Training. Stefan Heuer / Managing Director TÜV Rheinland Thailand.

Education & Training. B. 3. Education & Training. Stefan Heuer / Managing Director TÜV Rheinland Thailand. Education & Training Stefan Heuer / Managing Director TÜV Rheinland Thailand stefan.heuer@tha.tuv.com 1 Awareness Preparedness Action & Reaction 2 Awareness - education of all related parties (government,

More information

Cybersecurity Test and Evaluation Achievable and Defensible Architectures

Cybersecurity Test and Evaluation Achievable and Defensible Architectures Cybersecurity Test and Evaluation Achievable and Defensible Architectures October 2015, ITEA Francis Scott Key Chapter Mr. Robert L. Laughman for COL Scott D. Brooks, Director, Survivability Evaluation

More information

April 21, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, Maryland 20852

April 21, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, Maryland 20852 April 21, 2016 Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, Maryland 20852 RE: Comments of ACT The App Association regarding the Food and

More information

Consideration of Cybersecurity vs Safety Risk Management

Consideration of Cybersecurity vs Safety Risk Management Consideration of Cybersecurity vs Safety Risk Management Weiping Zhong, Ph.D. Global Director of Risk Management/Medical Devices GE Healthcare DISCLAIMER: The views and opinions expressed in this presentation

More information

Cyber risk resilience

Cyber risk resilience Cyber risk resilience A consistent approach for a consistently major risk Sara Walton Standards Market Development (Risk, Resilience, Governance) 12 Sept 2017 Copyright 2017 BSI. All rights reserved 1

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

SCADA Security at. City of Guelph Water Services

SCADA Security at. City of Guelph Water Services SCADA Security at City of Guelph Water Services Graham Nasby, P.Eng., PMP, CAP Water SCADA & Security Specialist City of Guelph Water Services 1 1 Rationale Our Reliance on SCADA for Operations & Compliance

More information

COUNTRY PROFILE. Italy

COUNTRY PROFILE. Italy COUNTRY PROFILE Italy Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS

More information

Secrets of successful medical device connectivity. Agenda 4/5/17. * The secrets:

Secrets of successful medical device connectivity. Agenda 4/5/17. * The secrets: Secrets of successful medical device connectivity Bill Saltzstein Code Playbook Vancouver 2017 Agenda * The secrets: * All medical devices shall be connected * You shall understand the requirements requirements

More information

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB Discussion topics Introductions The digital transformation Innovating at scale How

More information

Embedded Tech Trends: Market Insights

Embedded Tech Trends: Market Insights Presentation Embedded Tech Trends: Market Insights ihsmarkit.com Brian Arbuckle, Senior Market Analyst, 0044 (0) 7973 336459, brian.arbuckle@ihsmarkit.com 22 January 2018 Another year on and what has changed?...

More information

DEEP FREEZE CLOUD FOR HIPAA COMPLIANCE

DEEP FREEZE CLOUD FOR HIPAA COMPLIANCE DEEP FREEZE CLOUD FOR HIPAA COMPLIANCE TM Content 01 Introduction P-3 02 HIPAA Regulations P-4 03 Deep Freeze Cloud for HIPAA Compliance P-5 04 Deep Freeze Cloud - Components P-6 Introduction The HIPAA

More information

Intelligent Buildings and Cybersecurity

Intelligent Buildings and Cybersecurity Intelligent Buildings and Cybersecurity March 14-18,2017 Frankfurt, Germany Ron Zimmer CABA President & CEO www.caba.org Connect to what s next 1 CABA Board of Directors and Vision CABA Vision Statement

More information

Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013

Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013 Cyber COBIT Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM December 2013 1 Agenda 1. Background & Definitions 2. Applying COBIT5 to Cybersecurity Governance 3. Cybersecurity Management 4. Cybersecurity

More information

Automotive Security Standardization activities and attacking trend

Automotive Security Standardization activities and attacking trend Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous

More information

Iso Controls Checklist File Type S

Iso Controls Checklist File Type S ISO 27002 CONTROLS CHECKLIST FILE TYPE S PDF - Are you looking for iso 27002 controls checklist file type s Books? Now, you will be happy that at this time iso 27002 controls checklist file type s PDF

More information

Advanced Search. Case Law This Quicklink, found on the left hand menu bar will take you to our complete listing of summaries of key cases.

Advanced Search. Case Law This Quicklink, found on the left hand menu bar will take you to our complete listing of summaries of key cases. Training Guide OHSIS provides an up-to-date reference source of key Occupational Health and Safety documentation relevant to the workplace. Retrieve information instantly on Health and Safety issues such

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Jean-Paul BOUARD IEC/SC45A Secretary. TWG NPPIC meeting May 2017 IAEA, Vienna (Austria)

Jean-Paul BOUARD IEC/SC45A Secretary. TWG NPPIC meeting May 2017 IAEA, Vienna (Austria) Jean-Paul BOUARD IEC/SC45A Secretary TWG NPPIC meeting 23-26 May 2017 IAEA, Vienna (Austria) Who are we (1/2) One of the oldest international standard body (1906) : 81 countries represented, In the world:

More information

TABLE OF CONTENTS. Section Description Page

TABLE OF CONTENTS. Section Description Page GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com DFARS Compliance SLAIT Consulting SECURITY SERVICES Mike D Arezzo Director of Security Services Introduction 18+ year career in Information Technology and Security General Electric (GE) as Software Governance

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information

COUNTRY PROFILE. Estonia

COUNTRY PROFILE. Estonia COUNTRY PROFILE Estonia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

COUNTRY PROFILE. Ireland

COUNTRY PROFILE. Ireland COUNTRY PROFILE Ireland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 18 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS

More information

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING

More information

CYBERTECH 2019 FIGURES:

CYBERTECH 2019 FIGURES: 2019 Supporters: Conference Chairman // DR. YOSSI VARDI CYBERTECH 2019 FIGURES: 18,000 attendees at the Cybertech 2019 conference and exhibition 180+ local and international speakers discussed the latest

More information

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013 COMPASS FOR THE COMPLIANCE WORLD Asia Pacific ICS Security Summit 3 December 2013 THE JOURNEY Why are you going - Mission Where are you going - Goals How will you get there Reg. Stnd. Process How will

More information

Mapping Your Success 2013 BSI Healthcare Roadshow: Mobile Health Software, Mobile Phones and Telemedicine Under the EU Approach

Mapping Your Success 2013 BSI Healthcare Roadshow: Mobile Health Software, Mobile Phones and Telemedicine Under the EU Approach Mapping Your Success 2013 BSI Healthcare Roadshow: Mobile Health Software, Mobile Phones and Telemedicine Under the EU Approach Telemedicine & mhealth Definition of Telemedicine: Use of telecommunication

More information

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. TRAINING WEEK COURSE OUTLINE May 9-13 2016 RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. Page2 FACILITATOR S BIOGRAPHY John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing

More information

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity. Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,

More information

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services

More information

COUNTRY PROFILE. Croatia

COUNTRY PROFILE. Croatia COUNTRY PROFILE Croatia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS

More information

IHS Standards Expert Training Manual

IHS Standards Expert Training Manual IHS Standards Expert Training Manual IHS Standards Expert Table of Contents Copyright... 14 Download Results to Excel... 10 Favourites Add a Favourite... 19 Add Notes to a Favourite... 21 Download the

More information

High performance monitoring & Control ACE3600 Remote Terminal Unit

High performance monitoring & Control ACE3600 Remote Terminal Unit High performance monitoring & Control ACE3600 Remote Terminal Unit Empower Your SCADA Network Utilities, now more than ever, are facing newer and greater hurdles. Multiple wired and wireless communication

More information

AUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS

AUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS AUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS May 2018 BSI Standards 020 8996 7261 Alex.Price@BSIgroup.com Copyright 2012 BSI. All rights reserved.

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27011 First edition 2008-12-15 Information technology Security techniques Information security management guidelines for telecommunications organizations based on ISO/IEC

More information

Volume I, Appendix B References Table of Contents

Volume I, Appendix B References Table of Contents Volume I, Appendix B References Table of Contents B Appendix - References... B-1 B.1 Documents Incorporated in the Guidelines... B-1 B.2 Other Documents Used in Developing the Guidelines... B-3 B.3 Additional

More information

Addressing Cyber Threats in Power Generation and Distribution

Addressing Cyber Threats in Power Generation and Distribution Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems

More information

Information Warfare Industry Day

Information Warfare Industry Day Information Warfare Industry Day 20180510 RDML Barrett, OPNAV N2N6G TRANSPORT COMMERCIAL INTERNET DISN SCI Coalition Networks ADNS TELEPORT NMCI & ONE-NET JRSS MOC GNOC NCDOC USMC ISNS / CANES / SUBLAN

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Investor Day May 2016

Investor Day May 2016 Investor Day 2016 31 May 2016 1 Group Enterprise FY2016 Highlights Group Enterprise FY16 Revenue Tech Partnerships SGD 6.4B, +2.6% 1 Group Enterprise ICT FY16 Revenue SGD $2.65B, +10.2% End-to-end telecommunicatio

More information

ISO/IEC TS Conformity assessment Guidelines for determining the duration of management system certification audits

ISO/IEC TS Conformity assessment Guidelines for determining the duration of management system certification audits TECHNICAL SPECIFICATION ISO/IEC TS 17023 First edition 2013-08-01 Conformity assessment Guidelines for determining the duration of management system certification audits Évaluation de la conformité Lignes

More information