Higher Education in Texas: Serving Texas Through Transformational Education, Research, Discovery & Impact
|
|
- Prosper Wells
- 5 years ago
- Views:
Transcription
1 Higher Education in Texas: Serving Texas Through Transformational Education, Research, Discovery & Impact M. Dee Childs, Vice President for Information Technology & Chief Information Officer
2 v Texas A&M at a glance v Texas A&M v Aligning for the Future v IT Governance v Transforming IT at Texas A&M (and higher education in general) v Securing Information and Reputation + Obligatory Pie Chart v Shared Challenges & Opportunities v Dialogue/Conversation/Q&A Today s Presentation
3 Texas A&M University Highlights
4 How I got to Texas A&M Indiana University Louisiana State University University of Alabama in Huntsville Texas A&M University
5
6 Texas A&M at a Glance Second largest university in the U.S. (student size) 68,625 students enrolled (Fall 2017) 469,000+ former Aggies! Largest university in the U.S. (physical campus) ~ 94,000,000 ft. 2 of indoor space (think WiFi!) Committed to research Designated a land, sea and space grant university $892 million in research expenditures (FY2016)
7 Texas A&M Core Values Excellence Integrity Leadership Loyalty Respect Selfless Service
8 Texas A&M Division of IT Quick facts, current mission, structure and role
9 The provides IT services and resources that support the academic and research pursuits of Texas A&M University.
10 IT Service Areas Accounts & ID Management Security Operations Websites, Applications & Software Data Centers & Hardware Help & Consulting Audio, Video & Telecommunication Networks & Internet Access Academics & Research , Messaging & Collaboration
11 Infrastructure & Networking Provider of one of the largest university data network in the country ~200,000 network ports ~110,000 unique Wi-Fi users daily 3 campus data centers Manage statewide wide-area backbone + provide I2 connectivity for the A&M System TTVN video conferencing in network
12 Texas A&M System Wide Area Research and Education Network: Expanding the boundaries of the traditional classroom to distance education, data-intensive research, delivering health care and ag extension services to all counties in Texas Partnership with University of Texas for TX-BB 100 Gbpsring
13 Cross-Institutional Collaboration Empowers seamless collaboration between institutions through the InCommon Federation Use TAMU credentials to securely access: Eduroam Wi-Fi National supercomputing resources Libraries Scientific resources
14 Campus-wide IT Services Account creation & management over 30 sources single sign on for hundreds of applications Software and Application contracts & licensing IT Support for students, faculty and staff 24x7x365 support from Help Desk Central ~ 100,000 questions answered per year IT Security operations
15 Meeting & Exceeding Legal Standards Be more proactive instead or reactive for technology needs for grants Campus-wide IT planning, policy and strategy IT policy development Public information requests Legal holds & related services Coming soon: HIPAA Security Office NIST secure enclave / pcui prototype
16 Information Technology at Texas A&M
17 Aligning for the Future Renovations to meet campus needs
18 West Campus Data Center Reliability of a Tier 4 data center Redundant power & network Operationally AND security staffed 24x7x365 7 layers of Physical Security Pre-positioned, co-lo, build-to-suit & Aggie cloud options available late 2017-early 2018 LEED certified & supplies power back to the grid Working with President, Provost & CFO on additional investments for excellence
19 Incident & Operations Center Command center that actively monitors the health of our infrastructure Identify issues so we can respond as quickly as possible Seating for 14 operators 36 46ʺ LCD Planar panels in a 3x12 grid Multiple configurations possible
20 Help Desk Central IT assistance for Texas A&M students, faculty and staff Staffed with full-time and student staff 24x7x365 ~100,000 questions answered per year Newly renovated space to improve campus members experiences
21 IT Governance
22 IT Governance is the assurance that Information Technology aligns with the outcomes required by the University for successful fulfillment of its mission. Successful IT Governance includes input from all stakeholders, and assurance that their input is taken seriously.
23 Texas A&M University-wide IT Governance Framework
24 Transforming IT Increase Research Competitiveness Enhance Transformational Education / Accelerate Student Success Position Texas A&M as a premiere Technology University
25 Increase Research Competitiveness Position capacity ahead of demand. Leapfrog investments. Augment internal investment (HPC & storage for example with infrastructure grants (NSF/NIH). Increase research computing staff member engagement with faculty to help plan their technology needs during the development of research proposals. Improve the efficiency of research administration and compliance processes (e.g., Maestro enhancement or replacement acknowledging this will be a challenge). Address security risks appropriately for the sensitivity of research data. Understand impact/unintentional consequences of current incentives (e.g., startup packages, RDF). Optimize our own environment for success. Optimize use of Free national compute resources XSEDE, Jetstream, DOE funded, etc.
26 Enhance Transformational Education & Accelerate Student Success Eliminate boundaries of the traditional classroom Optimize use of technology Promote student engagement Facilitate active-learning Increase adoption of effective learning technology in courses and programs Face-to-face, blended, completely online & study abroad Create more digital learning objects and have them readily available for reuse in courses. Academic analytics to accelerate student success and completion rates
27 Position Texas A&M as a premiere technology university Make technology a signature reputational goal for A&M Use technology to differentiate from Vision 2020 peers, instead of competing on their areas of expertise (in life sciences, informatics, data science ) Technology infrastructure, human resources, security and compliance will be a competitive advantage for: Faculty recruitment Graduate student recruitment Extramural funding (NSF, NIH, DOE, DoD) Public/private partnerships IMPACT to the health, education, workforce development of TEXAS!
28 Securing Texas A&M s Information & Reputation IT Security overview
29 10 25 What is IT s highest priority? 60 Cyber Security Cyber Security Cyber Security
30
31
32
33
34
35
36
37
38 Shared Challenges & Opportunities Cybersecurity, Privacy, Compliance Business Continuity / Disaster Recovery / Resiliency Enterprise everything at scale Cloud everything? The Future of the Commodity Internet /Net Neutrality/ Ensuring ALL Texans have access to our services
39 Thank you! M. Dee Childs, Vice President for IT & Chief Information Officer IT.tamu.edu
STRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationLeadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION TO 2019
Leadership and Innovation to Every Building Greener THREE-YEAR STRATEGIC DIRECTION - 2017 TO 2019 TELUS Garden Office Tower- LEED Platinum Leadership and Innovation to Make Every Building Greener outlines
More informationAVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer
AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer 8:30 9:00AM Breakfast with Various Members of the Search Comm./Chair @ A306A 9:00 9:45AM Meeting with Provost and Deans @ A310
More informationOneUConn IT Service Delivery Vision
OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.
More informationSystem Chief Business Officer - B. J. Crain The Texas A&M University System Position Description--January 13, 2010
System Chief Business Officer - B. J. Crain Position Description--January 13, 2010 Dual reporting to the Chancellor and President of Texas A&M University with consideration to an executive oversight committee*
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationCalifornia s Public Libraries and CENIC: Frequently Asked Questions
Leading the Way to Tomorrow s Internet The Corporation for Education Network Initiatives in California California s Public Libraries and CENIC: Frequently Asked Questions What is CENIC? CENIC, the Corporation
More informationGeorgia State University Cyberinfrastructure Plan
Georgia State University Cyberinfrastructure Plan Summary Building relationships with a wide ecosystem of partners, technology, and researchers are important for GSU to expand its innovative improvements
More informationCyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)
Randall Sandone, CCISO Executive Director Critical Infrastructure Resilience Institute rsandone@illinois.edu Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal
More informationSTRATEGY STATEMENT OF QUALIFICATIONS
STRATEGY STATEMENT OF QUALIFICATIONS STOK IS YOUR VALUES- ALIGNED PARTNER IN THE DISCOVERY, CO-CREATION, AND DELIVERY OF HIGH- PERFORMANCE SPACES Salesforce Tower San Francisco, CA SERVICES LEED Platinum
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationCOMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888)
About Us Serving customers nationwide and abroad, we are an experienced IT Services provider helping a variety of clients maximize the value of their IT initiatives, streamline project management, and
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationIT Town Hall Meeting. IT Town Hall - October 6,
IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu IT Town Hall - October 6, 2014 1 Agenda
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationSilos of Excellence: Effectively Integrating the DSM Organization for Seamless EE and DR Program Delivery
Presented at the 2013 ACEEE National Conference on Energy Efficiency as a Resource Silos of Excellence: Effectively Integrating the DSM Organization for Seamless EE and DR Program Delivery Presented by:
More informationUsing the NIST Framework for Metrics 5/14/2015
Using the NIST Framework for Metrics 5/14/2015 ITD - Public Safety Safety improvements reduced total crashes by 29% and injury crashes by 41% in corridors after GARVEE projects were completed Ads / Commercials
More informationACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development
ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development Jeremy Fischer Indiana University 9 September 2014 Citation: Fischer, J.L. 2014. ACCI Recommendations on Long Term
More informationTX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark
TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark Stone Texas A&M University System Moderator Anh Selissen
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationGovernor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report
Friday, April 25, 2014 Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report State s first big data industry status report finds
More informationITC Vision for Campus IT: February 28, 2018
ITC Vision for Campus IT: 2018-2023 February 28, 2018 1 Content On-Going Strategic Initiatives, Processes ITC Vision for Campus IT Vision -2018-2023: Desired/Future State 2 Strategic Initiatives, Processes
More informationStatement of Organization, Functions, and Delegations of Authority: Office of the
This document is scheduled to be published in the Federal Register on 07/27/2016 and available online at http://federalregister.gov/a/2016-17737, and on FDsys.gov 4184-40P DEPARTMENT OF HEALTH AND HUMAN
More informationEffective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO
Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More information2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY
2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More information3 - Welcome. 4 - Your Success Begins Here Microsoft IT Academy. 7 - IBM Training. 8 - VMware Training. 9 - HP and Symantec Training
3 - Welcome 4 - Your Success Begins Here 5-6 - Microsoft IT Academy 7 - IBM Training 8 - VMware Training 9 - HP and Symantec Training 10 - Citrix Training 10 - Flexi Credits 11 - Our Partner Portfolio
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationCollege of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies
College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies UNIT STRATEGIC PLANNING UPDATES MARCH 2, 2009 Information Technologies Executive Summary Challenges
More informationWRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES
WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES WRI ROSS CENTER FOR SUSTAINABLE CITIES 2 Supporting partners to create local solutions by adapting,
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationUNIVERSITY OF VIRGINIA BOARD OF VISITORS. Meeting of the Audit, Compliance, and Risk Committee
UNIVERSITY OF VIRGINIA BOARD OF VISITORS Meeting of the Audit, Compliance, and Risk Committee March 1, 2018 AUDIT, COMPLIANCE, AND RISK COMMITTEE Thursday, March 1, 2018 10:45 11:30 a.m. Upper West Oval
More informationAn overview of the ehealth Strategy for NSW Health: & an update on key projects
ehealth NSW An overview of the ehealth Strategy for NSW Health: 2016-2026 & an update on key projects Dr Zoran Bolevich Chief Executive, Chief Information Officer 22 September 2016 1 ehealth NSW Established
More informationSTATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE
STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE PLAN STRUCTURE I INTRODUCTION Background History of the Project
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationClemson HPC and Cloud Computing
Clemson HPC and Cloud Computing Jill Gemmill, Ph.D. Executive Director Cyberinfrastructure Technology Integration Computing & Information Technology CLEMSON UNIVERSITY 2 About Clemson University South
More informationFederal-State Connections: Opportunities for Coordination and Collaboration
Federal-State Connections: Opportunities for Coordination and Collaboration State Health Information Exchange Program October 23, 2012 Chris Muir Program Manager 1 ONC Overview Vision A health system that
More informationIT Risk & Compliance Federal
Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,
More information112 th Annual Conference May 6-9, 2018 St. Louis, Missouri
8:30 10:30 May 6, 2018 Room 240 Complex 112 th Annual Conference May 6-9, 2018 St. Louis, Missouri Moderator/Speakers: Kevin Wachtel Finance Director/Treasurer, Villa Park, IL Alex Brown Senior Manager,
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationMeasurement Challenges and Opportunities for Developing Smart Grid Testbeds
Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart
More informationUNB S CYBERSECURITY PROGRAM
UNB S CYBERSECURITY PROGRAM SEPTEMBER 7, 017 A fundamental step towards an advanced cybersecurity practice at UNB was taken recently when the Board of Governors approved the Information Security Policy,
More informationCALIFORNIA CYBERSECURITY TASK FORCE
CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity
More informationNCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time
NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to
More informationCoupled Computing and Data Analytics to support Science EGI Viewpoint Yannick Legré, EGI.eu Director
Coupled Computing and Data Analytics to support Science EGI Viewpoint Yannick Legré, EGI.eu Director yannick.legre@egi.eu Credit slides: T. Ferrari www.egi.eu This work by EGI.eu is licensed under a Creative
More informationOFFICE OF THE CIO MEMORIAL UNIVERSITY OF NEWFOUNDLAND A PRESENTATION FOR THE IM COMMUNITY
OFFICE OF THE CIO MEMORIAL UNIVERSITY OF NEWFOUNDLAND A PRESENTATION FOR THE IM COMMUNITY Shelley Smith, Chief Information Officer January 23, 2017 OVERVIEW Memorial University of Newfoundland Convergence
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationUNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10
Exhibit R-2, PB 2010 Office of Secretary Of Defense RDT&E Budget Item Justification DATE: May 2009 3 - Advanced Technology Development (ATD) COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationExploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education
Exploring the Maturity of Risk Management Process in Government: An Integrated ERM Model at the U.S. Department of Education FEDERAL STUDENT AID ENTERPRISE RISK MANAGEMENT GROUP Cynthia Vitters 1. ERM
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationThe Business Value of including Cybersecurity and Vendor Risk in ERM
The Business Value of including Cybersecurity and Vendor Risk in ERM Yo Delmar, Vice President, Customer Engagement, MetricStream RMA GCOR XI April 4 5, 2017 Hyatt Regency, Cambridge, MA Tuesday 2:30 pm
More informationIT Town Hall Meeting
IT Town Hall Meeting Scott F. Midkiff Vice President for Information Technology and CIO Professor of Electrical and Computer Engineering Virginia Tech midkiff@vt.edu October 20, 2015 10/20/2015 IT Town
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationDELL EMC SOLUTIONS FOR HIGHER EDUCATION: Driving Innovation and Student Success through Digital Transformation
DELL EMC SOLUTIONS FOR HIGHER EDUCATION: Driving Innovation and Student Success through Digital Transformation The Need to Innovate IMPROVE STUDENT SUPPORT NEW RESEARCH RECRUIT FACULTY AND STUDENTS ENABLE
More informationINDUSTRY PERSPECTIVE
INDUSTRY PERSPECTIVE 1 A Brief Introduction As IT administrators and chief information officers, you face a particular challenge: facilitate the ability for your agency to work remotely, while reducing
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationTransformational Projects to Remain Globally Competitive. Dr Mary Davies, University Librarian & Director (Information Management)
Transformational Projects to Remain Globally Competitive Dr Mary Davies, University Librarian & Director (Information Management) Overview Global challenge Changing HE context and developments UWA s current
More informationEMPOWER DISCOVERY. Texas A&M Information Technology 2016 Annual Report
EMPOWER DISCOVERY Texas A&M Information Technology 2016 Annual Report FROM THE CIO Whether transforming learning, increasing innovation or expanding our impact, technology plays an essential role in supporting
More informationCommonwealth Cyber Initiative Blueprint Development
Commonwealth Cyber Initiative Blueprint Development Theresa Mayer and Laurel Miner Virginia Tech Presented to VRIC on August 14, 2018 https://www.networkworld.com/article/3235124/internet-of-things/internet-of-things-definitions-a-handy-guide-to-essential-iot-terms.html
More informationPresented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0
Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.
More informationRESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016
RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationEnergy Action Plan 2015
Energy Action Plan 2015 Purpose: In support of the Texas A&M University Vision 2020: Creating a Culture of Excellence and Action 2015: Education First Strategic Plan, the Energy Action Plan (EAP) 2015
More informationMINUTES COMMITTEE ON GOVERNANCE Conference Call April 7, 2010
MINUTES COMMITTEE ON GOVERNANCE Conference Call April 7, 2010 A conference call of the Committee on Governance was held April 7, 2010. Chair Dianna Morgan called the meeting to order at 1:03 p.m. Present
More informationWhich Side Are You On?
12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationEvolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha
Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,
More informationDrive Your Career Forward IIA Certifications and Qualifications
Drive Your Career Forward IIA Certifications and Qualifications Mapping Your Path for Growth Professional development is a journey. Demonstrating your knowledge, acumen, and leadership ability are key
More informationThe meeting will be webcast, with a link available at
November 29, 2017 TO: FR: RE: The Board of Trustees of the University of Oregon Angela Wilhelms, Secretary Notice of Executive and Audit Committee Meeting The Executive and Audit Committee of the Board
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationExecutive Summary and Overview
A Cross-Sector Capabilities, Resources, and Needs Assessment: Research to Support the Drafting of the Oregon Cybersecurity Center of Excellence Proposal Executive Summary and Overview Updated April 2018
More informationBrown University Libraries Technology Plan
Brown University Libraries Technology Plan 2009-2011 Technology Vision Brown University Library creates, develops, promotes, and uses technology to further the Library s mission and strategic directions
More informationFROM TACTIC TO STRATEGY:
FROM TACTIC TO STRATEGY: The CDW-G 2011 Cloud Computing Tracking Poll 2011 CDW Government LLC TABLE OF CONTENTS Introduction 3 Key findings 4 Planning for the cloud 16 Methodology and demographics 19 Appendix
More informationEnterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018
Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk
More informationCyberinfrastructure Framework for 21st Century Science & Engineering (CIF21)
Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation, Integration Alan Blatecky Director OCI 1 1 Framing the
More information