5 th Annual Identity Management Symposium
|
|
- Beverley Watts
- 5 years ago
- Views:
Transcription
1 Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates Learning Center, Alexandria, VA April 4-5, 2018
2 The 2018 Identity Management Symposium will provide a forum for members of the DoD, DHS, Federal Government, Private Industry, Academia, and other relevant stakeholders to discuss the latest updates from key organizations involved in advancing identity and access management practices and biometrics solutions that enhance National defense and security capabilities. Program Design & Goal: Our invited speakers will outline their organization s high-level identity and access management initiatives, to also include updates on the biometric initiatives and technologies that improve the efficiency and security of Government organizations. Stakeholders across the DoD, Federal Government, and Private Sector have prioritized the development of identity and access management best practices & technologies due to the increased and expansive use of personally identifiable information within civilian, Federal, and DoD IT environments. Safeguarding secure information and its accessibility is of critical importance to maintaining National security, and our speakers will detail how their organization contributes to this ongoing and evolving effort. Operating Guidelines: DSI s team specializes in the extensive research and development of our Symposium's content and focus areas, and we will assemble the most respected minds in the community from operational leaders, the R&D Community, key policy-makers, as well as solution providers from Industry and Academia. Our non-partisan approach allows us to reach across all involved organizations bring together a truly holistic group of decision makers and solution providers. DSI s Symposium directly supports DoD, DHS, and Federal Government priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. The Symposium is open and complimentary to all DoD and Federal employees and is considered an educational and training forum. (Industry and academia members are charged a fee of attendance) General Target Audience: Specific topics to be discussed include: Symposium is CLOSED TO PRESS / NO RECORDINGS Identity Management, Access Management, Biometrics, Identity Intelligence, Cyber Security, Authentication & Credentialing, Forensics, Digital Security - Enhancing Identity and Access Management Practices for Enhanced National Security - Developing Advanced Credentialing and Authentication Measures for Improved Digital Security - Identity Intelligence Information Exchange and Sharing Initiatives - Normalizing Identity and Access Management to a Single Identity Standard - Supporting DoD Identity Activities through Biometrics & Forensics Coordination - Driving Technology Development to Better Safeguard Sensitive Personally Identifiable Information (PII) - Supplementing National Security through Enhanced Capture and Recording of Biometric Information - Delivering Authentication Capabilities that Support the Operational Environment - Improving Non-Cooperative Facial Recognition Capabilities - Biometrics RDT&E Focus Areas and Future Investment
3 April 4 th, :00 8:45 Registration and Light Breakfast Reception Open 8:45 9:00 Chairman Opening Remarks Benji Hutchinson (Confirmed) Vice President, Federal Operations Advanced Recognition Systems Division, NEC Corporation of America 9:00 9:45 Enhancing Mission Readiness through Identity Operations - Supporting DoD identity activities through coordination of forensics and biometrics initiatives and operations - Securing forensics and biometrics as an enduring capability - Technological and collaborative efforts to enhance forensics and biometrics capabilities COL Jesse Galvan, USA (Confirmed) Deputy Director Defense Forensics and Biometrics Agency 9:45 10:30 Managing the FBI s Counterterrorism Watchlisting Efforts to Deter Terrorist Activities - Consolidating the Government s approach to terrorism screening - Providing appropriate and lawful use of terrorist information in screening processes - Efforts to improve information sharing capabilities with mission partners Marie Bernoi (Confirmed) Unit Chief, Identity Intelligence Unit, Terrorist Screening Center, FBI Steve Santa Ana (Confirmed) Biometrics Program Manager, Identity Intelligence Unit, Terrorist Screening Center, FBI Darren Eades (Confirmed) Management and Program Analyst, Identity Intelligence Unit, Terrorist Screening Center, FBI 10:30 11:00 Networking Break & Exhibits 11:00 11:45 Providing Identity Dominance and Intelligence to the Warfighter - Designing and sustaining enterprise biometric solutions that enable identity dominance on the battlefield and across the DoD - Integrating I2 and force protection as enduring capabilities in the intelligence cycle - Balancing requirements with affordability and long-term sustainability for improved buying power COL Donald Hurst, USA (Confirmed) Project Manager, DoD Biometrics (PMO DoD Biometrics) PEO IEW&S 11:45 12:30 Strengthening Authentication Processes at the DoD for Improved Identity Management - Normalizing identity and access management to a single identity standard with mission partners - Delivering authentication capabilities that support the operational environment - Providing identity and access lifecycle management to support business accountability, monitoring, and audit - Multi-factor authentication initiatives of interest COL Tom Clancy, USA (Confirmed) Director, Identity Management Programs and IdAM-PKI Lead DoD CIO
4 12:30 1:30 Networking Lunch 1:30 2:15 The Future of DHS Biometrics as Envisioned Under New DHS Biometric Policy: DHS Biometrics Expansion for Improved Identification and Encounter Management, May Enhancing effectiveness of subject identification by enhancing current biometric collection systems - Developing privacy policies and processes for an improved DHS biometric framework Steve Yonkers (Confirmed) Director of Identity and Credentialing, Screening Coordination Office Office of Policy, DHS 2:15 3:00 Advancing DoD Digital and Physical Security through Physical and Logical Access Control Measure Development - Initiatives to enhance physical and logical access control measures - Enterprise physical security mission areas - Current & emerging enhancements at DMDC Michael Sorrento, SES (Confirmed) Director Defense Manpower Data Center 3:00 3:30 The Identity IS the Perimeter: The State of Love and Trust - Cloud and mobile have changed everything - The perimeter isn t what it used to be - Re-thinking security architectures and models Sean Frazier (Confirmed) Advisory CISO, Federal Duo Security Inc. 3:30 4:00 Networking Break & Exhibits 4:00 4:45 Driving Biometric Capability Development to Support Enhanced Physical and Logical Access Control - Improving biometric technologies for enhanced physical & logical access control - Physical access control initiatives of interest - Department efforts to enhance non-cooperative biometric collection capabilities Arun Vemury (Confirmed) Director, Biometrics Technology Engine DHS 4:45 5:30 Meeting Evolving Network Threats through Integration of Advanced Access Management Solutions - Status of the FICAM Program and the way ahead - Delivering FICAM Playbooks to keep at pace with rapidly evolving threats - Collaborative efforts to improve Federal cybersecurity capabilities Jim Sheire (Confirmed) Division Director, Identity Assurance and Trusted Access GSA End of Day 1
5 April 5 th, :15 8:45 Registration and Light Breakfast Reception Open 8:55 9:00 Chairman Opening Remarks Benji Hutchinson (Confirmed) Vice President, Federal Operations Advanced Recognition Systems Division, NEC Corporation of America 9:00 9:45 Ensuring a Secure Nation through Advanced Biometric Identification, Information Sharing & Analysis - Enhancing the security of citizens and visitors through improved collection, analysis and sharing of biometric data - Integrating the Homeland Advanced Recognition Technology (HART) program to provide a more efficient biometric system for core DHS missions - Current privacy and technological considerations of interest Shonnie R. Lyon (Confirmed) Director, Office of Biometric Identity Management (OBIM) DHS 9:45 10:30 Managing the Foreign Access Management System for Improved Security Screening Capabilities - Executing foreign access management and screening to identity foreign threats and risks - Improving security of sensitive DHS information, programs and systems - Conducting foreign access requests and foreign contact reporting to improve screening Richard Moreta (Confirmed) Director, Center for International Safety & Security Office of the Chief Security Officer, Management Directorate, DHS 10:30 11:00 Networking Break & Exhibits 11:00 12:15 Future Biometric Capabilities and Technology for Improved DoD and Fed. Govt. Security This panel discussion will provide key insight on the future biometric capabilities and technologies to be integrated throughout the DoD and Federal Government for improved National security. The utilization of biometric technologies and services has provided the Federal Government a means to vastly improve its ability to deter actors, foreign or domestic, from causing harm to the United States and its citizens. At this discussion, our invited panelist will detail their organization s future considerations and strategies for biometric technologies, to also include the supporting RDT&E, challenges, and collaborative efforts to improve the DoD s future biometric capabilities. - Future biometric technologies of interest - Challenges associated with future biometric capability development - Current and future biometric initiatives of interest Moderator: Dr. Nasser Nasrabadi, Professor, West Virginia University, Site Director, Center for Identification Technology (CITeR) (Confirmed) Panelists: Dr. Terrence Adams, Program Manager, IARPA (Confirmed) David S. Bolme, Research Biometrics, Oak Ridge National Laboratory (Confirmed) Dr. Ioannis Kakadiaris, Hugh Roy & Lillie Cranz Cullen Distinguished Professor, Dept. of Computer Science, Director, Computational Biomedicine Lab, University of Houston (Confirmed)
6 12:15 1:15 Networking Lunch 1:15 2:00 Using Biometrics as a Foundation for Person-Centric Processes at USCIS - Developing capabilities to foster a more person-centric approach to identity management and immigration processing - Efforts to improve dissemination and access of immigration data - Addressing the challenges of regulation, policy, privacy and legacy operations Lee Bowes (Confirmed) Deputy Associate Director Immigration Records and Identity Services Directorate, USCIS 2:00 2:45 Improving Biometric Data Capture for Enhanced Identity Management and National Security - Improving the ability to capture biometric data in a marine environment - Enhancing biometric information processing and storage - Efforts to increase identity matching efficiencies and response time Michael Jones (Confirmed) Identity Dominance System Technical Direction Agent Lead NSWCDD 2:45 3:30 Providing Forensic Laboratory Services to Bolster DoD Investigative Operations - Technology and strategies supporting improved forensic examination capabilities - Efforts to improve investigator and special agent forensic training - Biometric capabilities of interest Dr. Roman Aranda IV (Confirmed) Supervisory Chemist, Forensic Exploitation Directorate Defense Forensic Science Center 3:30 End of Symposium 2018 Diamond Sponsor Platinum Sponsor
7 Gold Sponsors Media Partners
5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More informationIdentity Management Symposium
Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria,
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information13 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither
More information14 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates
More information12 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More informationbordersecuritysummit.dsigroup.org
Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationDefense Strategies Institute cordially invites you to an educational and training Summit:
Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationCybersecurity: Federalism as Defense-in-Depth
SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationFederal Information Sharing Resources for Small and Midsize Businesses
Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationSmart Cards & Credentialing in the Federal Government
Smart Cards & Credentialing in the Federal Government Smart Card Alliance 13 Feb 2003 Salt Lake City Bill Holcombe GSA Office of Governmentwide Policy New Urgency for Credentialing Solutions Post 9/11
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationRICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.
RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More information15 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 15 th DoD/VA and Government HIT Summit* ~Enhancing the Coordination of Connected Health IT for Military & Government~ October 10-11, 2018 The
More informationHelping the Military Integrate, Innovate and Secure Networks across the Enterprise
JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationElectronic Warfare: Innovation & Evolution in Global Electromagnetic Operations
Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationPROMOTING NATIONAL SECURITY SINCE HOMELAND SECURITY SYMPOSIUM & EXHIBITION
PROMOTING NATIONAL SECURITY SINCE 1919 2009 HOMELAND SECURITY SYMPOSIUM & EXHIBITION Building a Resilient & Sustainable Homeland Public and Private Sector Partners Serving America ONSITE AGENDA CRYSTAL
More informationDHS Supply Chain Activity: Cross-Sector Supply Chain Working Group and Strategy on Global Supply Chain Security
DHS Supply Chain Activity: Cross-Sector Supply Chain Working Group and Strategy on Global Supply Chain Security Josha Jordan U.S. Department of Homeland Security National Protection and Programs Directorate
More informationDepartment of Defense. Installation Energy Resilience
Department of Defense Installation Energy Resilience Lisa A. Jung DASD (Installation Energy) OASD(Energy, Installations and Environment) 19 June 2018 Installation Energy is Energy that Powers Our Military
More informationCyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security
Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationCYBERSECURITY RESILIENCE
CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationFISMAand the Risk Management Framework
FISMAand the Risk Management Framework The New Practice of Federal Cyber Security Stephen D. Gantz Daniel R. Phi I pott Darren Windham, Technical Editor ^jm* ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationCyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days
About Cyber Dialogue The Cyber Dialogue conference convenes an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationRCISC_11014 Prospect Brochure_V3.indd 1
RCISC_11014 Prospect Brochure_V3.indd 1 4/26/18 2:38 PM RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationAn Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS
An Overview of DHS s Role and Missions James McCament Chief of Legislative Affairs, USCIS DHS s Operational Components Customs and Border Protection (CBP) Immigration and Customs Enforcement (ICE) U.S.
More informationHow Advanced Persistent Threats Successfully Breach Large Organizations AND, What To Do About It
How Advanced Persistent Threats Successfully Breach Large Organizations AND, What To Do About It Robert West Chief Information Security Officer Department of Homeland Security Top 10 misconceptions about
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationSupplemental Programmatic Environmental Assessment (SPEA) for the Proposed
This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY
More informationDepartment of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview
Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview Kristen Baldwin Principal Deputy, Office of the Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) 17
More informationRSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief
RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationScience and Technology Directorate Standards Portfolio
Science and Technology Directorate Standards Portfolio Bert M. Coursey Challenges, Needs and Priorities in Homeland Security ANSI October 1, 2003 Directive for Developing Standards from the OHS National
More informationCybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities
June 2016 Issue Brief # 2016-01 Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities CYBERSECURITY FOR STATE AND LOCAL LAW ENFORCEMENT: A POLICY ROADMAP TO ENHANCE CAPABILITIES
More informationDecember 5-6,
December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland
More informationAmerican Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED
American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating
More informationKaryn Higa-Smith, Research Program Manager
Personal Identity Verification- Interoperability/ First Responder Authentication Credential (PIV-I/FRAC) I/FRAC) Technology Transition Work Group (TTWG) Karyn Higa-Smith, Research Program Manager Identity
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationCYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force
CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department
More informationBiometrics 101. Presented by The International Biometrics & Identification Association (IBIA)
Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationIT Town Hall Meeting. IT Town Hall - October 6,
IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu IT Town Hall - October 6, 2014 1 Agenda
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More information