About. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium
|
|
- Primrose Dorsey
- 6 years ago
- Views:
Transcription
1 Supported by
2 About Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration Industry Academia Cybersecurity Consortium Public Agencies National Cybersecurity R&D (NCR) Programme
3 GOALS Innovation ecosystem Use-inspired research Upgrade capabilities through technology adoption
4 Structure Membership Companies with interest and expertise in cybersecurity Representatives Government agencies Institutes for Higher Learning (IHLs) and research institutes
5 Steering Committee Prof. Ho Teck Hua (Chairman) Deputy President (Research & Technology), National University of Singapore (NUS) Mr George Loh Director, Programmes, National Research Foundation (NRF) Mr David Toh Prof. Aaron Thean Director, Industry Engagement and Collaboration, National University of Singapore (NUS) Director, NTUitive, Nanyang Technological University (NTU) Mr Ken Neo Dr Wong Woon Kwong Director, Research & Industry Collaborations, Singapore University of Technology & Design (SUTD) Director, Tech Transfer Office, Singapore Management University (SMU) Mr Arthur Poh Director, Enterprise and Innovation Hub, Singapore Institute of Technology (SIT)
6 Management Committee Prof. Abhik Roychoudhury Academic Director, Singapore Cybersecurity Consortium Professor, National University of Singapore (NUS) Dr Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium Mr Sim Kung Kiat Deputy Director, Intellectual Property Intermediary (IPI) Singapore Dr Yeo Sze Ling Research Scientist, Institute for Infocomm Research (I 2 R), A*STAR Dr Liu Yang Assistant Professor, Nanyang Technological University (NTU) A/P Gao Debin Associate Professor, Singapore Management University (SMU) Prof. David Yau Professor, Singapore University of Technology & Design (SUTD)
7 Membership as of 1 September 2017
8 Academia Public Agencies......
9 National Cybersecurity R&D Programme Research Projects National Cybersecurity R&D Laboratory Annual Postgraduate Scholarship Scalable Trustworthy Systems Effective Situation Awareness and Attack Attribution Resilient Systems Combatting Insider Threats Threats Detection, Analysis and Defence Efficient and Effective Digital Forensics Cyberspace Governance and Policy Research
10 Progressing Modes of Engagement Engage via training Engage via discussions and advice Engage via research collaboration
11 Membership Benefits Invitation to premium Consortium events Close access to research community to learn latest developments and give input on research direction Invitation to partner with seed-funded projects awarded by the Consortium Access to talent at universities for internship and hiring Facilitated access to technologies and infrastructures under the National Cybersecurity R&D Programme
12 TECHNOLOGY ADOPTION SPECIAL INTEREST GROUPS Knowledge exchange Discussion of timely issues and ideas Exploring R&D collaboration TECHNOLOGY TALKS Expert speakers Project showcases WILD & CRAZY IDEAS (WACI) DAY Ideas, ideas Problem statements
13 TECHNOLOGY ADOPTION CYBERSECURITY CAMP Workshop Industry talks Hackathons MANPOWER TRAINING
14 TECHNOLOGY ADOPTION TECHNOLOGY TRANSLATION MANPOWER TRAINING JOINT R&D Seed funding Student project match-up Infrastructure sharing
15 Special Interest Groups (SIGs) Threat Intelligence and Incident Response Data Protection and Privacy Cyber-Physical System (CPS) and IoT Security Led by Led by Led by System and Software Security Mobile Security Cybercrime and Investigation Future possibilities Led by Led by Led by
16 Seed Grant Call 2017 Develop technical solutions Study non-trivial issues Address gaps in Singapore s cybersecurity landscape Explore new ideas further projects under NCR Strengthen Singapore s cybersecurity capabilities against present and future threats Leverage collaborative effort of different sectors in the Consortium
17 R&D Partnership A B Member companies of the Consortium Institutes of Higher Learning (IHLs) Autonomous Universities, Polytechnics Research Institutes (RIs) ADSC, A*STAR Public Agencies (listed at SGDI) Local research entities not explicitly listed will be considered on a case-by-case basis.
18 Seed Grant 2017 Funded Projects No Proposal Title Team An Integrated Safety-Security Approach for Engineering Unmanned Aerial Systems (UAS) Traffic Management Solutions No More Snake Oil - Objective Evaluation Environment for Security Technologies Identification of IoT Devices behind NAT while Ensuring the Preservation of Data Privacy ADSC Nova Systems & Engineering NUS Insider Security Custodio Technologies SUTD 4 Mobile (ios) Security Study for Cyber-Attack Prevention NTU PayPal 5 6 Learning to Detect Anomalies in Cyber Physical Systems with Generative Adversarial Networks on Networked Sensor Time Series Data Secure Dataset Sharing for Remote Artificial Intelligence Innovations on Clinical Data NUS ST Electronics (Info-Security) Bioinformatics Institute, A*STAR Cloak
19 Community and Event Partnerships
20 Year 1: Sep 2016 Aug Nov Feb Jun Aug 2017 Technology Talk I (Kick-off) Cybersecurity SG-CRC 2017 Technology Talk II + Wild & Crazy Ideas (WACI) Day Technology Talk NUS Seed Grant Call Year 1 SIG Meetings SIG Meetings SIG Meetings
21 Upcoming Events Oct Dec 2017 Feb 2018 Apr 2018 Jun 2018 Technology Talk SUTD Cybersecurity Camp II Technology Talk V Technology Talk VI Technology Talk VII + WACI Day Seed Grant Call SIG Meetings SIG Meetings SIG Meetings Around-the-Campuses Technology Talk Series Showcase cybersecurity work at hosting institute Connect companies to talent pool
22
Building a Cybersecurity R&D Ecosystem in Singapore
Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored
More informationAbout Us. Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016
Supported by About Us Funded by the National Research Foundation (NRF) and anchored at the National University of Singapore (NUS) since 1 September 2016 Academia Vision: To set up a seamless platform for
More informationCYBERSECURITY SECTOR GETS $16 MILLION BOOST TO SPUR MORE READY-TO-USE SOLUTIONS
PRESS RELEASE 18 September 2017 CYBERSECURITY SECTOR GETS $16 MILLION BOOST TO SPUR MORE READY-TO-USE SOLUTIONS More than $16 million will be invested into new cybersecurity projects aimed at strengthening
More informationOptus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director
Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director Our Vision Support Australia's growth in a complex world via education and research excellence in cyber security
More informationIsrael and ICS Cyber Security
Israel and ICS Cyber Security Dr. Tal Steinherz Chief Technology Office Israel (INCB) 1 October 2015 The INCB The Israeli leads efforts and advises the government on: Cyber Ecosystem Establishing techno-scientific
More informationFirst Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.
First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationInformation Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011
Information Technology Information Sharing and Analysis Center First Symposium Barcelona, Spain Feb. 2, 2011 About Us Non Profit, US Corporation established in 2000 and operational in 2001 Fully funded
More informationCurrent procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH
Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence
More informationThe MoU was signed at the 7th Abu Dhabi-Singapore Joint Forum 2013 in Singapore
EMBARGOED UNTIL 26 NOVEMBER 2013, 1500H, SST MEDIA RELEASE A*STAR INSTITUTE OF MICROELECTRONICS, GLOBALFOUNDRIES SINGAPORE & MASDAR INSTITUTE OF SCIENCE AND TECHNOLOGY TO ESTABLISH R&D TWIN LAB TO ADVANCE
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationNational Cybersecurity Center of Excellence
The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationSingapore Advanced Research and Education Network. ipv6.singaren.net.sg
Singapore Advanced Research and Education Network www.singaren.net.sg ipv6.singaren.net.sg Background Singapore Advanced Research and Education Network (SingAREN) facilitates the cost-competitive adoption
More informationShaping the Department of Defense Engineering Workforce
Shaping the Department of Defense Engineering Workforce Ms. Aileen Sedmak Office of the Deputy Assistant Secretary of Defense for Systems Engineering 20th Annual NDIA Systems Engineering Conference Springfield,
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationOverview of ITU capacity building activities
Europe Centers of Excellence Steering Committee Meeting Copenhagen, Denmark 12 December 2017 Overview of ITU capacity building activities Mike Nxele Senior Human Capacity Building Officer, Human Capacity
More informationCommonwealth Cyber Initiative Blueprint Development
Commonwealth Cyber Initiative Blueprint Development Theresa Mayer and Laurel Miner Virginia Tech Presented to VRIC on August 14, 2018 https://www.networkworld.com/article/3235124/internet-of-things/internet-of-things-definitions-a-handy-guide-to-essential-iot-terms.html
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationChallenges and Opportunities in Cyber Physical System Research
Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy
More informationMedia Kit. California Cybersecurity Institute
Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government
More informationGovernment-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot
STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help
More informationCyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary
Cyberbit Range A Global Success Story 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary The Israeli Defense Forces Cyber Academy (Israel) The official training platform for the Israeli
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationITU-ACMA Asia Pacific Regulators Roundtable July 2014
ITU-ACMA Asia Pacific Regulators Roundtable 2014 21-22 July 2014 Session 2: Evolution of the Regulator Addressing International Concerns Content Page Cyber Security Cross-border Data Flow Interoperability
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationProject Progress Report
ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationSecura collaborates with Republic Polytechnic and the University of Glasgow to start cybersecurity research and development laboratory
FOR IMMEDIATE RELEASE Secura collaborates with Republic Polytechnic and the University of Glasgow to start cybersecurity research and development laboratory This collaboration aims to create a unique ecosystem
More informationBuilding Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018
Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral
More informationTechnical Advisory Board (TAB) Terms of Reference
Technical Advisory Board (TAB) Terms of Reference ACS Technical Advisory Board Terms of Reference V1.1 27 May 2017 Page 1 ACS Technical Advisory Board Terms of Reference V1.1 27 May 2017 Page 1 CONTENTS
More informationOpportunities for collaboration in Big Data between US and EU
Opportunities for collaboration in Big Data between US and EU Vasilis Papanikolaou ATC ilab, Greece ICT Policy, Research and Innovation for a Smart Society www.picasso-project.eu PICASSO has received funding
More informationMeasurement Challenges and Opportunities for Developing Smart Grid Testbeds
Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationWebinar on 5G funding opportunities for EU-US collaboration in Horizon 2020
Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Prof. Gerhard Fettweis Vodafone Chair Professor at TU Dresden Coordinator 5G Lab Germany PICASSO 5G Networks Expert Group Chair
More information8 July 2010 Certification in IT Business Continuity Management (CITBCM) 1
Wong Tew Kiat, CBCP, MBCI, SMSCS, COMIT Senior Chairman, CITBCM Resource Panel & Board of Assessors President, SCS - Business Continuity Group Service Delivery Director, NCS Pte Ltd 8 July 2010 Certification
More informationCOMMERCIAL-IN-CONFIDENCE
Industrial Transformation Asia-Pacific I 16-18 October 2018 I Singapore EXPO, Hall 1 & 2 I www.industrial-transformation.com Organised by International Partner Supported by Held In 1.0 ABOUT INDUSTRIAL
More informationUCD Centre for Cybersecurity & Cybercrime Investigation
UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder
More informationsafely connecting to future smart hospital & healthcare
Organizer Funding Organization Sponsors CYBER SECURITY ON MEDICAL AND HEALTHCARE SYSTEM safely connecting to future smart hospital & healthcare SYMPOSIUM CUM WORKSHOP Workshop: 30 November 2017 Symposium:
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationCyber Security in Europe and CEER s new PEER initiative
NARUC-CEER International Forum, 27 April 2017, Arlington, Virginia Cyber Security in Europe and CEER s new PEER initiative Lord Mogg, CEER President Outline New EU legislativedevelopments: NIS Directive
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationExploring threats and opportunities through Mega Trends in the Space 4.0 era
Exploring threats and opportunities through Mega Trends in the Space 4.0 era ESA Mega Trends Team Gianluigi Baldesi 06/03/2018 Objectives of this initiative sharing global mega trends across the Agency
More informationGood afternoon. I am pleased to join you at the National Security Conference today.
SPEECH BY DR YAACOB IBRAHIM, MINISTER FOR COMMUNICATIONS AND INFORMATION AND MINISTER-IN-CHARGE OF CYBER SECURITY, AT THE NATIONAL SECURITY CONFERENCE 2016 ON 7 NOVEMBER 2016, AT 2.15 PM, AT THE SUMMIT
More informationThe Core Strategy of ACAMP is to:
2017 marks ACAMP s 10 th year in business supporting SME s in all markets. ACAMP continues to work with its clients to accelerate their development, production and market-entry of micro/nano-technology
More informationNational Cybersecurity Center of Excellence
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationCANARIE Mandate Renewal Proposal
CANARIE Mandate Renewal Proposal Kathryn Anthonisen BCNET Conference April 23, 2018 Let s connect! @kanthonisen canarie.ca @canarie_inc canarie.ca @canarie_inc 2 Core Purpose Advancement of Canada s Knowledge
More informationICT and Disaster Risk Reduction Division ESCAP
1 ICT and Disaster Risk Reduction Division ESCAP http://www.unescap.org/publications/artificial-intelligence-and-broadband-divide-state-ict-connectivity-asia-and-pacific Landscape 2 3 Trends Potentials
More informationGulf Downstream Association (GDA) promoting knowledge sharing, networking and providing published and valuable data to members
Gulf Downstream Association (GDA) promoting knowledge sharing, networking and providing published and valuable data to members Overview GDA Profile Founding Members & Board of Directors Vision & Mission
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationOregon Fire Service Conference Enterprise Security Office Update. October 26, 2018
Oregon Fire Service Conference Enterprise Security Office Update October 26, 2018 2 State CIO Update Terrence Woods Interim State CIO Slide presented at August OAGTIM 3 Information Security Unify cybersecurity
More informationAligning Academic Supply and Industry Demand
Aligning Academic Supply and Industry Demand Presented by: RADM (ret) Ken Slaght, Co-Chair & President, San Diego Cyber Center of Excellence (CCOE) 1 Cyber Center of Excellence (CCOE) CCOE is a non-profit
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationSingapore s Smart Nation Initiative
2016/SMEMM/011 Agenda Item: 3.2.2 Singapore s Smart Nation Initiative Purpose: Information Submitted by: Singapore 23 rd Small and Medium Enterprises Ministerial Meeting Lima, Peru 9 September 2016 Singapore
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationNCCoE TRUSTED CLOUD: A SECURE SOLUTION
SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationto Address Cyber Physical Systems Security (CPSSEC)
Combating Threats: S&T is Building a Resilient Cyber Ecosystem to Address Cyber Physical Systems Security (CPSSEC) Follow us at dhsscitech CPS Security is Critical Smart cars, grids, medical devices, manufacturing,
More informationSystemic Analyser in Network Threats
Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationPresidential Documents
Federal Register Vol. 84, No. 61 Friday, March 29, 2019 Presidential Documents 12041 Title 3 Executive Order 13865 of March 26, 2019 The President Coordinating National Resilience to Electromagnetic Pulses
More informationCommitted to connecting the world
ITU-T: Standardization Sector Produces standards covering all fields of telecommunications on a worldwide basis and defines tariff and accounting principles for international telecommunication services
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationTrustworthy ICT. FP7-ICT Objective 1.5 WP 2013
Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing
More informationStakeholders Analysis
Stakeholders Analysis Introduction National Stakeholders ISP citizens CNIIP Media National CIRT Academia ONG, Public And Private Institutions sectoral CSIRTs Law enforcement 2 2 CIRT ISP A specialized
More informationUnderstanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents
Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from
More informationMass Big Data: Progressive Growth through Strategic Collaboration
Massachusetts Technology Collaborative Mass Big Data: Progressive Growth through Strategic Collaboration Patrick Larkin, Executive Director The Innovation Institute at the Massachusetts Technology Collaborative
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationNSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015
NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement
More information