Advancing Security Technology in the Air Domain
|
|
- Oswin Flowers
- 6 years ago
- Views:
Transcription
1 A Look at Air Power Past Present Future Advancing Security Technology in the Air Domain Information Technology, Cybersecurity, and Continuous Monitoring Prepare for the Future! Providing Innovative IT Solutions to the Federal Government Since 1976 SMS Data Products Group, 12 th Floor F Prepared By: Mr. Thomas Kupiec IT Evangelist SMS Chief Information Security Officer (571) tkupiec@sms.com
2 Who is this Person Briefing Me? About Tom Kupiec SMS Chief Information Security Officer Former Positions: NGA Deputy CIO/CISO (SES Retired) White House Sr. Cyber Advisor USCYBERCOM GO/SES Steering Committee IC Information Security Risk Management Committee (ISRMC) DISN Flag Panel (NGA Chair) CNSS Committee (NGA Chair) 9-11 IT Program Manager Pentagon Director Pentagon IT Operations FEDSIM Special Assistant to the Commissioner Some Projects DNI Drone Cyber Security Program F22/F35 Cyber Security RFI Study IC Integrated Technology Environment (ICITE) 9/11, Pentagon Renovation, CCSP Program
3 What are We Going to Talk About? Agenda Air Force Strategic Goals Air Domain Past Present The Future Air Domain will be lost without Cybersecurity
4 Air Force Strategic Plan AF Strategic Goals Require Next Generation IT Cyber Security Understanding IT and Cybersecurity is Very Important 1. Provide Effective 21st-Century Deterrence (Nuclear) 2. Maintain a Robust and Flexible Global Intelligence, Surveillance, and Reconnaissance (ISR) Capability 3. Ensure a Full-Spectrum Capable, High-End Focused Force 4. Pursue a Multi-Domain Approach to our Five Core Missions 5. Continue the Pursuit of Game- Changing Technologies
5 Lets Start the Journey THE PAST
6 The Beginning? The Wright Brothers December 17, 1903 Kitty Hawk North Carolina Cyber Security- What is that? 6
7 The Beginning? Ferdinand von Zeppelin Final Design 1895 First Flight 2 July 1900 Physical Security 7
8 Yes, The Beginning! John Wise First Balloon Flight 2 May, 1835, Philadelphia John Wise First Air Mail Delivery Service 1859 Lafayette, Indiana Physical Security 8
9 The Real Beginning of the Air Force Thaddeus Lowe Union Army Balloon Corps Chief Aeronaut 11 June 1861 Assigned by President Abraham Lincoln 19 July 1861 First Bull Run Centerville VA Physical Security 9
10 Air Power s 1920s 1930s 1940s 1950s 1960s Physical Security & Secrecy 10
11 Air Power F-16 B-2 F-18 Jamming Stealth & Encryption by 2020 Jamming 1970s 1980s 1990s Stealth & Jamming 2000s F s F-35 Stealth & Jamming All plans have been stolen Cyber retrofit F35- failed red team Very Limited Cybersecurity 11
12 Today THE PRESENT
13 Today F-40 Global Hawk Encryption UCAV Encryption Small UAV Encryption None Still Limited Cybersecurity 13
14 The Past Tells Us We are in Times of Exponential IT Growth
15 Tomorrow FUTURE
16 Blimps- are you kidding me? AEROSCRAFT 115MPH Lands anywhere Bulletproof skin Future Unmanned overseas convoys Smaller Amazon Models 66 ton cargo- $25 million 50 ton cargo- $55 million Limited Cybersecurity 16
17 Russia UCAV Russian Klimov RD-5000B Stealth UAV Maximum speed: 800 km/h (Mach 0.65) Ceiling: m Radius: km Wingspan: 11.5 m Length: m Armament: up to 2 tons of load in 2 bays Encryption Cybersecurity 17
18 New UAV MQ-9 Reaper 500 mph 50,000 feet 18 hour w/o refueling. 3,500 pounds ordinance - 2,000-pound JDAM - Hellfire missiles. Cybersecurity? 18
19 F-47 2 versions Manned or Unmanned Tail-less Aircraft Full Stealth Capabilities Cybersecurity? 19
20 Tomorrow Air Domain Future 1 manned plane will control squadron of UCAVS UCAVs will have payload of 150 autonomous swarming drones Individual smart Targeting 1 hour dwell UAVs have 30 lb. payload Cybersecurity a must!
21 Air Domain Cybersecurity Air frames very susceptible to cyber attacks -F22 -F35 -B2 Drones will increase in use and utility Cybersecurity must be built in 2 factor authentication Transport Encryption Autonomous default programming when jammed Currently 2-5 years behind on Cybersecurity There is Hope 21
22 Questions/Comments Let SMS put four decades of IT experience to work for you!
UAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationAerospace Systems Directorate
Aerospace Systems Directorate Dr. Doug Blake Director Aerospace Systems Directorate Air Force Research Laboratory 2 United States Air Force Mission The Mission of the United States Air Force is to Fly,
More informationUAVs as Communications Routing Nodes in Network-Centric Warfare
UAVs as Communications Routing Nodes in Network-Centric Warfare AUVSI s Unmanned Systems 2003 Symposium & Exhibition July 15-17, 17, 2003 Baltimore Convention Center Peter Rigstad L-3 3 Communications
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationAFRL UAS Initiatives. Air Force Research Laboratory. 15 Aug Dr. Reid Melville. Air Force Research Laboratory. Integrity Service Excellence
Air Force Research Laboratory AFRL UAS Initiatives 15 Aug 2018 Dr. Reid Melville Air Force Research Laboratory Integrity Service Excellence Distribution A : Approved for public release; distribution is
More informationDelivering the Next Generation of Data. Christophe De Hauwer, Chief Development Officer Designate
Delivering the Next Generation of Data Christophe De Hauwer, Chief Development Officer Designate INVESTOR DAY 215, 17 June 215 Summary Proliferation of global data usage/applications represents a significant
More informationCybersecurity and Commercial Aviation
Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers
More informationACUMEN AI on the Edge. For Military Applications
ACUMEN AI on the Edge For Military Applications Overview Artificial Intelligence (AI), is intelligence demonstrated by machines. In computer science, AI research is defined as the study of intelligent
More informationDirected Energy S&T. Challenges Overview. L. Bruce Simpson, SES Director Directed Energy Directorate Kirtland AFB, New Mexico
Directed Energy S&T Challenges Overview L. Bruce Simpson, SES Director Directed Energy Directorate Kirtland AFB, New Mexico Mission AFRL/Directed Energy Directorate Develop, integrate, and transition science
More informationHelping our customers master every decisive moment
Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com MORE THAN Overview 65,000 employees 60 Countries. Global presence 797 million Self-funded R&D* 2017 * Does not
More informationRole of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency
Role of NATO and Energy Security Centre of Excellence in Supporting Protection of Critical Energy Infrastructure and Enhancing its Resiliency 4 December 2017, Ramat Gan, Israel 15th International Energy
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationHelping our customers master every decisive moment
Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com Overview Over 80,000 employees 68 Countries Global presence 1bn Self-funded R&D* * Does not include externally
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationTest Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event
Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Mr. George Rumford Deputy Director Major Initiatives and Technical Analyses Test Resource Management Center January
More informationCommonwealth Cyber Initiative Letters of Support
James Madison University Norfolk State University University of Mary Washington Virginia Commonwealth University Virginia Community College System Virginia State University Commonwealth Cyber Initiative
More informationI n t e g r i t y - S e r v i c e - E x c e l l e n c e
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Chief Information Security Officer (CISO) Mr. Pete Kim (SES)
More informationRadiance Capabilities Overview Concepts to Capabilities
Radiance Capabilities Overview Concepts to Capabilities 350 Wynn Drive Huntsville, AL 35805 Phone: (256) 704-3400 Fax: (256) 704-3412 www.radiancetech.com Radiance Overview Established 15 March 1999 Headquarters:
More informationThe Success of the AMRAAM DBMS/DAS
The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production
More information48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition. Boeing QF-16 Program
48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition Boeing QF-16 Program QF-16 Full Scale Aerial Target Boeing Global Services and Support Maintenance, Modifications, &
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationThe Use and Applications of Unmanned- Aerial Systems (UAS) In Agriculture
The Use and Applications of Unmanned- Aerial Systems (UAS) In Agriculture R O B E R T A U S T I N, D E P A R T M E N T O F S O I L S C I E N C E N C S T A T E U N I V E R S I T Y DJI Inspire Photo Credit:
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationHOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1
HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,
More informationEADS in Defence Capturing Growth and Delivering Profits
EADS in Defence Capturing Growth and Delivering Profits Tom Enders CEO Defence & Security Systems Place for Date of presentation, place Global Investor Forum Paris June 20 & 21, 2005 1 Contents 1. EADS
More informationDefense Microelectronics Activity (DMEA) Advanced Technology Support Program IV (ATSP4) Technical Requirements and Objectives
Defense Microelectronics Activity (DMEA) Advanced Technology Support Program IV (ATSP4) Technical Requirements and Objectives DMEA/MEB 18 March 2014 3/18/2014 Page-1 DMEA ATSP4 Requirements Agenda Industry
More informationDepartment of Defense Emerging Needs for Standardization
Department of Defense Emerging Needs for Standardization Robert Gold Director, Engineering Enterprise Office of the Deputy Assistant Secretary of Defense for Systems Engineering SAE International 2016
More informationThe Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015
The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 Utilities Telecom Council Global Focus on Utility Information and Communications Technology (ICT) Formed more than
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationModule 2: Rise of Urbanization & Digital Technologies
Digital Cities Summit Oct 3-4, 2016 Module 2: Rise of Urbanization & Digital Technologies Day 1 Hong Kong a very densely populated city 7.3 million population and 1,110 km 2 land area Land composition:
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationMeeting of the BBC Audit and Risk Committee SUMMARY MINUTES. Thursday 22 June, 2017 New Broadcasting House, London
Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES Thursday 22 June, 2017 New Broadcasting House, London ITEMS OF BUSINESS 1. Internal Audit quarterly reporting: a) Internal Audit quarterly update
More informationDigital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert
Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert March 7th 2017 HUMAN DIGITAL LIFE PUBLIC AGENCIES SERVICE PROVIDER SERVICE REQUESTOR
More informationCybersecurity Testing
Cybersecurity Testing Tim Palmer Chief Technical Advisor, SAS Business Unit Torch Technologies, Inc. EXPERTISE // INNOVATION // CUSTOMER FOCUS // EXCELLENCE // INTEGRITY // COOPERATION // RELIABILITY About
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationJanuary Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet
January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationSecurity of Critical Information Infrastructure: Legal Issues
Security of Critical Information Infrastructure: Legal Issues Edward Bekeschenko, Partner INFOC Committee Meeting 26 May 2017 Agenda 1 Trends in Russia 3 2 International Practices 8 1 Trends in Russia
More information14 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates
More informationA NEW MODEL FOR AUTHENTICATION
All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world
More informationPresented by: - Anselm Charles ICT Manager CARICOM IMPACS
Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationSystems Engineering Division
Systems Engineering Division Bi-Monthly Meeting 16 August 2017 http://www.ndia.org/divisions/systems-engineering 1 Agenda (1 of 2) Time Topic Presenter(s) 0745 Coffee & Check-in 0830 1. Opening Remarks,
More informationSYSTEM DYNAMICS / ZACHMAN FRAMEWORK CHARACTERIZATION UAV T&E
SYSTEM DYNAMICS / ZACHMAN FRAMEWORK CHARACTERIZATION OF UAV T&E Bharath Dantu IMSE: Industrial, Manufacturing and Systems Engineering Eric Smith RIMES: Research Institute for Manufacturing and Engineering
More informationChoosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist
Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist Agenda Industry Background Cybersecurity Assessment Tools Cybersecurity Best Practices 2 Cybersecurity
More informationThe President s Spectrum Policy Initiative
The President s Spectrum Policy Initiative THE PRESIDENT S SPECTRUM POLICY INITIATIVE SPECTRUM MANAGEMENT FOR THE 21 ST CENTURY SPECTRUM MANAGEMENT REFORM Presentation To The National Academies Committee
More informationIllinois Conduit to Grid Modernization SADZI M. OLIVA, ACTING COMMISSIONER ILLINOIS COMMERCE COMMISSION
Illinois Conduit to Grid Modernization SADZI M. OLIVA, ACTING COMMISSIONER ILLINOIS COMMERCE COMMISSION Disclaimers Any views, statements, and opinions expressed in this presentation do not necessarily
More informationCybersecurity program & best practices
Cybersecurity program & best practices How Gogo Business Aviation secures its airborne networks and inflight internet systems Live Webinar Thursday, September 28, 2017 Welcome & housekeeping notes Webinar
More informationStrategies for Maritime Cyber Security Leveraging the Other Modes
Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems
More informationDigitalization Risk or opportunity?»
Digitalization Risk or opportunity?» Thomas Menze, Senior Consultant September 21 st, 2018 Dmitry Feshin, ARC Advisory Group representation Russia and CIS Программа презентации ARC старт операций в России
More informationWe did it our way. Tony Neate, Chief Executive - Get Safe Online Tony Larks, Vice President Marketing, Trend Micro & Director, Get Safe Online
We did it our way Tony Neate, Chief Executive - Get Safe Online Tony Larks, Vice President Marketing, Trend Micro & Director, Get Safe Online 12 June 2012 Who are the potential victims? What are they doing?
More informationTrustworthy ICT. FP7-ICT Objective 1.5 WP 2013
Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing
More informationDirect Digital Manufacturing
Direct Digital Manufacturing The Impact of DDM on the Supply Chain LMI Agenda Introduction--Video Overview - Impact of DDM Potential Impact in DoD supply chain DDM and counterfeits DoD readiness for DDM
More informationWashington State Interoperability Executive Committee
Washington State Interoperability Executive Committee Members include: Chief Al Compaan, Edmonds Chief Jim Sharp, West Pierce Clallam County Commissioner Mike Doherty Mayor Jennifer Gregorson Patti Kelly,
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationDEFENCE PRODUCTION, SALES AND PROCUREMENT: INTERNATIONAL BEST PRACTICES:
DEFENCE PRODUCTION, SALES AND PROCUREMENT: INTERNATIONAL BEST PRACTICES: DEFENCE INDUSTRIAL COOPERATION WITH FOREIGN COUNTRIES PROFESSOR ADRIAN KENDRY FORMER NATO SENIOR DEFENCE ECONOMIST AND ADVISER TO
More informationStandards for Building Autonomy
Standards for Building Autonomy Andrew Richards, CEO, Codeplay BSI Standards Matter, Edinburgh, 22 nd June 2017 How do we get from here Level 2 Level 3 Limited overall control Level 4 Deep self control
More informationCyber Management for Ports Results of Small Port Cyber Security Workshops
AAPA Port Governing Boards Cyber Management for Ports Results of Small Port Cyber Security Workshops MARAD and the CHCP June 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Recent
More informationDefence Spectrum Strategy
Alex Wright Spectrum Engineer Defence Spectrum Office Chief Information Officer Group Department of Defence Outline 1) Contemporary Spectrum Context 2) Defence Spectrum Strategy 3) Continuing Adaptation
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationIntelligence & Security Overview
Intelligence & Security Overview 2014 1 Our Mission Employees: ~10,000 84% cleared Headquarters: McLean, VA Mission: BAE Systems Intelligence & Security enables the U.S. government to transform data into
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationAmerican Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED
American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating
More informationIMPACT OF DRUGS AND SECURITY IN THE CARIBBEAN
INTER AMERICAN DRUG ABUSE CONTROL COMMISSION C I C A D Secretariat for Multidimensional Security FORTY EIGHTH REGULAR SESSION December 6 8, 2010 Washington, D.C. OEA/Ser.L/XIV.2.48 CICAD/doc.1823/10 6
More informationAnatomy of a Data Breach: A Practical Guide for Small Law Departments
Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed
More informationU.S. Army Cyber Center of Excellence and Fort Gordon
U.S. Army Cyber Center of Excellence and Fort Gordon W BUILDING A WORLD CLASS CYBER WORKFORCE TECHNET 2018 Cyberspace Capabilities in Support of Unified Land Operations- Outpacing Our Adversaries This
More informationTactical Microgrid Standardization Update to the EGSA Government Relations Committee
Tactical Microgrid Standards Consortium Tactical Microgrid Standardization Update to the EGSA Government Relations Committee Current as of 15 September 2017 US Army Engineer R&D Center (ERDC) US Army Communications-Electronics
More informationTACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017
TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017 AGENDA TPU Cybersecurity Program Overview Document Management & Program Governance Compliance Driven Best Practices Protect, Detect,
More informationGeoff Mulligan. Colorado Springs, Colorado
Geoff Mulligan Colorado Springs, Colorado 719.593.2992 geoff@mulligan.com P R O F E S S I O N A L S U M M A R Y Expert on the Internet of Things, Smart Cities, Internet and computer technologies and organizational
More informationBMVIT-CSJU Workshop Clean Sky TAKE OFF Intro to Clean Sky
BMVIT-CSJU Workshop Clean Sky TAKE OFF Intro to Clean Sky Vienna, 03 February 2011 1 ACARE and Clean Sky ACARE October 2002 : The Strategic Research Agenda (SRA) 5 Challenges Quality and Affordability
More informationRESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016
RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence
More informationCyberspace: New Frontiers in Technology Insertion
Cyberspace: New Frontiers in Technology Insertion Dr. John S. Bay, ST Chief Scientist, Air Force Research Laboratory, Information Directorate AFRL Structure AFRL Maj Gen C Bedke Staff XP Air Vehicles Space
More informationAF Life Cycle Management Center
AF Life Cycle Management Center AIRWORTHINESS & CORROSION PREVENTION & CONTROL 7 June 2017 Approved for public release; distribution is unlimited. Case Numbers: 88ABW-2016-5777 88ABW-2017-0851 88ABW-2017-2278
More informationDEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON STRATEGIC FORCES U.S. HOUSE OF REPRESENTATIVES
NOT FOR PUBLICATION UNTIL RELEASED BY THE UNITED STATES HOUSE OF REPRESENTATIVES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE U.S. HOUSE OF REPRESENTATIVES SUBJECT: Assuring National Security Space:
More informationEMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS
Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationCyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities
SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+
More informationMaking Making Infrastructure Infrastructure Great Again Great Again
Making Making Infrastructure Infrastructure Great Again Great Again Minnesota Chapter APWA PWX 2016 Minnesota Chapter APWA PWX 2016 August 29, 2016 August 30, 2016 Introduction of Speakers Dan Gage Executive
More informationStratofortress: The Story Of The B-52 By Martin W. Bowman
Stratofortress: The Story Of The B-52 By Martin W. Bowman The development of Boeing's B-52 Stratofortress began in the late 1940s when the Air Force saw a need for an all-jet bomber that could carry nuclear
More informationDriving Business Outcomes: Cisco Data Center Innovation and Solutions
Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationRecent Issues in Electric Grid Physical Security
Recent Issues in Electric Grid Physical Security Paul W. Parfomak, Ph.D. Congressional Research Service pparfomak@crs.loc.gov Carnegie Mellon University Electricity Industry Center October 8, 2014 What
More informationJUSTICE SUB-COMMITTEE ON POLICING AGENDA. 2nd Meeting, 2014 (Session 4) Thursday 20 February 2014
JSP/S4/14/2/A JUSTICE SUB-COMMITTEE ON POLICING AGENDA 2nd Meeting, 2014 (Session 4) Thursday 20 February 2014 The Sub-Committee will meet at 1.00 pm in Committee Room 6. 1. Decision on taking business
More informationCYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM
CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless
More informationIntegration of the Energy Industry
Session 2: Energy Integration Integration of the Energy Industry Tammie Gibson, PMP Schneider Electric August 9, 2016 Rhode Island Convention Center Providence, Rhode Island Overview Industry has become
More informationFrench-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017
French-American Foundation Conference on cyber issues Opening remarks 25 October 2017 Général d armée aérienne Denis MERCIER 1 Ladies and gentlemen, It is a great honour and a personal pleasure for me
More informationShareholder Luncheon and Webcast
OCTOBER 12, 2017 Shareholder Luncheon and Webcast HOWARD L. LANCE President & Chief Executive Officer Radiant Forward Looking Statement This presentation contains forward-looking statements and information,
More informationAddressing Cybersecurity in Infusion Devices
Addressing Cybersecurity in Infusion Devices Authored by GEORGE W. GRAY Chief Technology Officer / Vice President of Research & Development Ivenix, Inc. INTRODUCTION Cybersecurity has become an increasing
More informationSingapore Autonomous Vehicle Initiative (SAVI)
Singapore Autonomous Vehicle Initiative (SAVI) Dr Chin Kian Keong Group Director, Transportation and Road Operations CHIN_Kian_Keong@lta.gov.sg 1 Singapore ASIA Singapore Land area: 719 m 2 Population:
More informationDARPA TTO Air and Space Portfolio Update
DARPA TTO Air and Space Portfolio Update Ms. Pamela A. Melroy, Deputy Director DARPA Tactical Technology Office Briefing prepared for the National Research Council Aeronautics and Space Engineering Board
More informationSOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent
SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,
More informationLeveraging Data Provenance to Enhance Cyber Resilience
Leveraging Data Provenance to Enhance Cyber Resilience Thomas Moyer Karishma Chadha, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, Trent Jaeger, and Patrick
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationEffective Partnerships: Security and Privacy in Smart Cities
SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation
More informationMitigating Cybersecurity Risk with Hyper-Segmentation
Mitigating Cybersecurity Risk with Hyper-Segmentation Session 46, February 20, 2017 Eric Miller, Sr. Director, Ascension Information Services Paul Unbehagen, Chief Architect, Avaya 1 Speaker Introduction
More informationSoftware Test & Evaluation Summit/Workshop Review
Software Test & Evaluation Summit/Workshop Review The Summit/Workshop was facilitated by the NDIA Systems Engineering Division s Software Industry Experts Panel and the Developmental Test and Evaluation
More information